13781 lines
569 KiB
Java
13781 lines
569 KiB
Java
/*
|
|
* Copyright (C) 2006-2008 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package com.android.server.am;
|
|
|
|
import static android.content.pm.PackageManager.PERMISSION_GRANTED;
|
|
|
|
import com.android.internal.R;
|
|
import com.android.internal.os.BatteryStatsImpl;
|
|
import com.android.internal.os.ProcessStats;
|
|
import com.android.server.AttributeCache;
|
|
import com.android.server.IntentResolver;
|
|
import com.android.server.ProcessMap;
|
|
import com.android.server.SystemServer;
|
|
import com.android.server.Watchdog;
|
|
import com.android.server.am.ActivityStack.ActivityState;
|
|
import com.android.server.wm.WindowManagerService;
|
|
|
|
import dalvik.system.Zygote;
|
|
|
|
import android.app.Activity;
|
|
import android.app.ActivityManager;
|
|
import android.app.ActivityManagerNative;
|
|
import android.app.ActivityOptions;
|
|
import android.app.ActivityThread;
|
|
import android.app.AlertDialog;
|
|
import android.app.AppGlobals;
|
|
import android.app.ApplicationErrorReport;
|
|
import android.app.Dialog;
|
|
import android.app.IActivityController;
|
|
import android.app.IApplicationThread;
|
|
import android.app.IInstrumentationWatcher;
|
|
import android.app.INotificationManager;
|
|
import android.app.IProcessObserver;
|
|
import android.app.IServiceConnection;
|
|
import android.app.IStopUserCallback;
|
|
import android.app.IThumbnailReceiver;
|
|
import android.app.Instrumentation;
|
|
import android.app.Notification;
|
|
import android.app.NotificationManager;
|
|
import android.app.PendingIntent;
|
|
import android.app.backup.IBackupManager;
|
|
import android.content.ActivityNotFoundException;
|
|
import android.content.BroadcastReceiver;
|
|
import android.content.ClipData;
|
|
import android.content.ComponentCallbacks2;
|
|
import android.content.ComponentName;
|
|
import android.content.ContentProvider;
|
|
import android.content.ContentResolver;
|
|
import android.content.Context;
|
|
import android.content.DialogInterface;
|
|
import android.content.IContentProvider;
|
|
import android.content.IIntentReceiver;
|
|
import android.content.IIntentSender;
|
|
import android.content.Intent;
|
|
import android.content.IntentFilter;
|
|
import android.content.IntentSender;
|
|
import android.content.pm.ActivityInfo;
|
|
import android.content.pm.ApplicationInfo;
|
|
import android.content.pm.ConfigurationInfo;
|
|
import android.content.pm.IPackageDataObserver;
|
|
import android.content.pm.IPackageManager;
|
|
import android.content.pm.InstrumentationInfo;
|
|
import android.content.pm.PackageInfo;
|
|
import android.content.pm.PackageManager;
|
|
import android.content.pm.UserInfo;
|
|
import android.content.pm.PackageManager.NameNotFoundException;
|
|
import android.content.pm.PathPermission;
|
|
import android.content.pm.ProviderInfo;
|
|
import android.content.pm.ResolveInfo;
|
|
import android.content.pm.ServiceInfo;
|
|
import android.content.res.CompatibilityInfo;
|
|
import android.content.res.Configuration;
|
|
import android.graphics.Bitmap;
|
|
import android.net.Proxy;
|
|
import android.net.ProxyProperties;
|
|
import android.net.Uri;
|
|
import android.os.Binder;
|
|
import android.os.Build;
|
|
import android.os.Bundle;
|
|
import android.os.Debug;
|
|
import android.os.DropBoxManager;
|
|
import android.os.Environment;
|
|
import android.os.FileObserver;
|
|
import android.os.FileUtils;
|
|
import android.os.Handler;
|
|
import android.os.IBinder;
|
|
import android.os.IPermissionController;
|
|
import android.os.Looper;
|
|
import android.os.Message;
|
|
import android.os.Parcel;
|
|
import android.os.ParcelFileDescriptor;
|
|
import android.os.Process;
|
|
import android.os.RemoteCallbackList;
|
|
import android.os.RemoteException;
|
|
import android.os.SELinux;
|
|
import android.os.ServiceManager;
|
|
import android.os.StrictMode;
|
|
import android.os.SystemClock;
|
|
import android.os.SystemProperties;
|
|
import android.os.UserHandle;
|
|
import android.os.UserManager;
|
|
import android.provider.Settings;
|
|
import android.text.format.Time;
|
|
import android.util.EventLog;
|
|
import android.util.Log;
|
|
import android.util.Pair;
|
|
import android.util.PrintWriterPrinter;
|
|
import android.util.Slog;
|
|
import android.util.SparseArray;
|
|
import android.util.SparseIntArray;
|
|
import android.util.TimeUtils;
|
|
import android.view.Gravity;
|
|
import android.view.LayoutInflater;
|
|
import android.view.View;
|
|
import android.view.WindowManager;
|
|
import android.view.WindowManagerPolicy;
|
|
|
|
import java.io.BufferedInputStream;
|
|
import java.io.BufferedOutputStream;
|
|
import java.io.BufferedReader;
|
|
import java.io.DataInputStream;
|
|
import java.io.DataOutputStream;
|
|
import java.io.File;
|
|
import java.io.FileDescriptor;
|
|
import java.io.FileInputStream;
|
|
import java.io.FileNotFoundException;
|
|
import java.io.FileOutputStream;
|
|
import java.io.IOException;
|
|
import java.io.InputStreamReader;
|
|
import java.io.PrintWriter;
|
|
import java.io.StringWriter;
|
|
import java.lang.ref.WeakReference;
|
|
import java.util.ArrayList;
|
|
import java.util.Collections;
|
|
import java.util.Comparator;
|
|
import java.util.HashMap;
|
|
import java.util.HashSet;
|
|
import java.util.Iterator;
|
|
import java.util.List;
|
|
import java.util.Locale;
|
|
import java.util.Map;
|
|
import java.util.Map.Entry;
|
|
import java.util.Set;
|
|
import java.util.concurrent.atomic.AtomicBoolean;
|
|
import java.util.concurrent.atomic.AtomicLong;
|
|
|
|
public final class ActivityManagerService extends ActivityManagerNative
|
|
implements Watchdog.Monitor, BatteryStatsImpl.BatteryCallback {
|
|
private static final String USER_DATA_DIR = "/data/user/";
|
|
static final String TAG = "ActivityManager";
|
|
static final String TAG_MU = "ActivityManagerServiceMU";
|
|
static final boolean DEBUG = false;
|
|
static final boolean localLOGV = DEBUG;
|
|
static final boolean DEBUG_SWITCH = localLOGV || false;
|
|
static final boolean DEBUG_TASKS = localLOGV || false;
|
|
static final boolean DEBUG_PAUSE = localLOGV || false;
|
|
static final boolean DEBUG_OOM_ADJ = localLOGV || false;
|
|
static final boolean DEBUG_TRANSITION = localLOGV || false;
|
|
static final boolean DEBUG_BROADCAST = localLOGV || false;
|
|
static final boolean DEBUG_BACKGROUND_BROADCAST = DEBUG_BROADCAST || false;
|
|
static final boolean DEBUG_BROADCAST_LIGHT = DEBUG_BROADCAST || false;
|
|
static final boolean DEBUG_SERVICE = localLOGV || false;
|
|
static final boolean DEBUG_SERVICE_EXECUTING = localLOGV || false;
|
|
static final boolean DEBUG_VISBILITY = localLOGV || false;
|
|
static final boolean DEBUG_PROCESSES = localLOGV || false;
|
|
static final boolean DEBUG_PROCESS_OBSERVERS = localLOGV || false;
|
|
static final boolean DEBUG_PROVIDER = localLOGV || false;
|
|
static final boolean DEBUG_URI_PERMISSION = localLOGV || false;
|
|
static final boolean DEBUG_USER_LEAVING = localLOGV || false;
|
|
static final boolean DEBUG_RESULTS = localLOGV || false;
|
|
static final boolean DEBUG_BACKUP = localLOGV || false;
|
|
static final boolean DEBUG_CONFIGURATION = localLOGV || false;
|
|
static final boolean DEBUG_POWER = localLOGV || false;
|
|
static final boolean DEBUG_POWER_QUICK = DEBUG_POWER || false;
|
|
static final boolean DEBUG_MU = localLOGV || false;
|
|
static final boolean VALIDATE_TOKENS = false;
|
|
static final boolean SHOW_ACTIVITY_START_TIME = true;
|
|
|
|
// Control over CPU and battery monitoring.
|
|
static final long BATTERY_STATS_TIME = 30*60*1000; // write battery stats every 30 minutes.
|
|
static final boolean MONITOR_CPU_USAGE = true;
|
|
static final long MONITOR_CPU_MIN_TIME = 5*1000; // don't sample cpu less than every 5 seconds.
|
|
static final long MONITOR_CPU_MAX_TIME = 0x0fffffff; // wait possibly forever for next cpu sample.
|
|
static final boolean MONITOR_THREAD_CPU_USAGE = false;
|
|
|
|
// The flags that are set for all calls we make to the package manager.
|
|
static final int STOCK_PM_FLAGS = PackageManager.GET_SHARED_LIBRARY_FILES;
|
|
|
|
private static final String SYSTEM_DEBUGGABLE = "ro.debuggable";
|
|
|
|
static final boolean IS_USER_BUILD = "user".equals(Build.TYPE);
|
|
|
|
// Maximum number of recent tasks that we can remember.
|
|
static final int MAX_RECENT_TASKS = 20;
|
|
|
|
// Amount of time after a call to stopAppSwitches() during which we will
|
|
// prevent further untrusted switches from happening.
|
|
static final long APP_SWITCH_DELAY_TIME = 5*1000;
|
|
|
|
// How long we wait for a launched process to attach to the activity manager
|
|
// before we decide it's never going to come up for real.
|
|
static final int PROC_START_TIMEOUT = 10*1000;
|
|
|
|
// How long we wait for a launched process to attach to the activity manager
|
|
// before we decide it's never going to come up for real, when the process was
|
|
// started with a wrapper for instrumentation (such as Valgrind) because it
|
|
// could take much longer than usual.
|
|
static final int PROC_START_TIMEOUT_WITH_WRAPPER = 300*1000;
|
|
|
|
// How long to wait after going idle before forcing apps to GC.
|
|
static final int GC_TIMEOUT = 5*1000;
|
|
|
|
// The minimum amount of time between successive GC requests for a process.
|
|
static final int GC_MIN_INTERVAL = 60*1000;
|
|
|
|
// The rate at which we check for apps using excessive power -- 15 mins.
|
|
static final int POWER_CHECK_DELAY = (DEBUG_POWER_QUICK ? 2 : 15) * 60*1000;
|
|
|
|
// The minimum sample duration we will allow before deciding we have
|
|
// enough data on wake locks to start killing things.
|
|
static final int WAKE_LOCK_MIN_CHECK_DURATION = (DEBUG_POWER_QUICK ? 1 : 5) * 60*1000;
|
|
|
|
// The minimum sample duration we will allow before deciding we have
|
|
// enough data on CPU usage to start killing things.
|
|
static final int CPU_MIN_CHECK_DURATION = (DEBUG_POWER_QUICK ? 1 : 5) * 60*1000;
|
|
|
|
// How long we allow a receiver to run before giving up on it.
|
|
static final int BROADCAST_FG_TIMEOUT = 10*1000;
|
|
static final int BROADCAST_BG_TIMEOUT = 60*1000;
|
|
|
|
// How long we wait until we timeout on key dispatching.
|
|
static final int KEY_DISPATCHING_TIMEOUT = 5*1000;
|
|
|
|
// How long we wait until we timeout on key dispatching during instrumentation.
|
|
static final int INSTRUMENTATION_KEY_DISPATCHING_TIMEOUT = 60*1000;
|
|
|
|
static final int MY_PID = Process.myPid();
|
|
|
|
static final String[] EMPTY_STRING_ARRAY = new String[0];
|
|
|
|
public ActivityStack mMainStack;
|
|
|
|
private final boolean mHeadless;
|
|
|
|
// Whether we should show our dialogs (ANR, crash, etc) or just perform their
|
|
// default actuion automatically. Important for devices without direct input
|
|
// devices.
|
|
private boolean mShowDialogs = true;
|
|
|
|
/**
|
|
* Description of a request to start a new activity, which has been held
|
|
* due to app switches being disabled.
|
|
*/
|
|
static class PendingActivityLaunch {
|
|
ActivityRecord r;
|
|
ActivityRecord sourceRecord;
|
|
int startFlags;
|
|
}
|
|
|
|
final ArrayList<PendingActivityLaunch> mPendingActivityLaunches
|
|
= new ArrayList<PendingActivityLaunch>();
|
|
|
|
|
|
BroadcastQueue mFgBroadcastQueue;
|
|
BroadcastQueue mBgBroadcastQueue;
|
|
// Convenient for easy iteration over the queues. Foreground is first
|
|
// so that dispatch of foreground broadcasts gets precedence.
|
|
final BroadcastQueue[] mBroadcastQueues = new BroadcastQueue[2];
|
|
|
|
BroadcastQueue broadcastQueueForIntent(Intent intent) {
|
|
final boolean isFg = (intent.getFlags() & Intent.FLAG_RECEIVER_FOREGROUND) != 0;
|
|
if (DEBUG_BACKGROUND_BROADCAST) {
|
|
Slog.i(TAG, "Broadcast intent " + intent + " on "
|
|
+ (isFg ? "foreground" : "background")
|
|
+ " queue");
|
|
}
|
|
return (isFg) ? mFgBroadcastQueue : mBgBroadcastQueue;
|
|
}
|
|
|
|
BroadcastRecord broadcastRecordForReceiverLocked(IBinder receiver) {
|
|
for (BroadcastQueue queue : mBroadcastQueues) {
|
|
BroadcastRecord r = queue.getMatchingOrderedReceiver(receiver);
|
|
if (r != null) {
|
|
return r;
|
|
}
|
|
}
|
|
return null;
|
|
}
|
|
|
|
/**
|
|
* Activity we have told the window manager to have key focus.
|
|
*/
|
|
ActivityRecord mFocusedActivity = null;
|
|
/**
|
|
* List of intents that were used to start the most recent tasks.
|
|
*/
|
|
final ArrayList<TaskRecord> mRecentTasks = new ArrayList<TaskRecord>();
|
|
|
|
/**
|
|
* Process management.
|
|
*/
|
|
final ProcessList mProcessList = new ProcessList();
|
|
|
|
/**
|
|
* All of the applications we currently have running organized by name.
|
|
* The keys are strings of the application package name (as
|
|
* returned by the package manager), and the keys are ApplicationRecord
|
|
* objects.
|
|
*/
|
|
final ProcessMap<ProcessRecord> mProcessNames = new ProcessMap<ProcessRecord>();
|
|
|
|
/**
|
|
* The currently running isolated processes.
|
|
*/
|
|
final SparseArray<ProcessRecord> mIsolatedProcesses = new SparseArray<ProcessRecord>();
|
|
|
|
/**
|
|
* Counter for assigning isolated process uids, to avoid frequently reusing the
|
|
* same ones.
|
|
*/
|
|
int mNextIsolatedProcessUid = 0;
|
|
|
|
/**
|
|
* The currently running heavy-weight process, if any.
|
|
*/
|
|
ProcessRecord mHeavyWeightProcess = null;
|
|
|
|
/**
|
|
* The last time that various processes have crashed.
|
|
*/
|
|
final ProcessMap<Long> mProcessCrashTimes = new ProcessMap<Long>();
|
|
|
|
/**
|
|
* Set of applications that we consider to be bad, and will reject
|
|
* incoming broadcasts from (which the user has no control over).
|
|
* Processes are added to this set when they have crashed twice within
|
|
* a minimum amount of time; they are removed from it when they are
|
|
* later restarted (hopefully due to some user action). The value is the
|
|
* time it was added to the list.
|
|
*/
|
|
final ProcessMap<Long> mBadProcesses = new ProcessMap<Long>();
|
|
|
|
/**
|
|
* All of the processes we currently have running organized by pid.
|
|
* The keys are the pid running the application.
|
|
*
|
|
* <p>NOTE: This object is protected by its own lock, NOT the global
|
|
* activity manager lock!
|
|
*/
|
|
final SparseArray<ProcessRecord> mPidsSelfLocked = new SparseArray<ProcessRecord>();
|
|
|
|
/**
|
|
* All of the processes that have been forced to be foreground. The key
|
|
* is the pid of the caller who requested it (we hold a death
|
|
* link on it).
|
|
*/
|
|
abstract class ForegroundToken implements IBinder.DeathRecipient {
|
|
int pid;
|
|
IBinder token;
|
|
}
|
|
final SparseArray<ForegroundToken> mForegroundProcesses
|
|
= new SparseArray<ForegroundToken>();
|
|
|
|
/**
|
|
* List of records for processes that someone had tried to start before the
|
|
* system was ready. We don't start them at that point, but ensure they
|
|
* are started by the time booting is complete.
|
|
*/
|
|
final ArrayList<ProcessRecord> mProcessesOnHold
|
|
= new ArrayList<ProcessRecord>();
|
|
|
|
/**
|
|
* List of persistent applications that are in the process
|
|
* of being started.
|
|
*/
|
|
final ArrayList<ProcessRecord> mPersistentStartingProcesses
|
|
= new ArrayList<ProcessRecord>();
|
|
|
|
/**
|
|
* Processes that are being forcibly torn down.
|
|
*/
|
|
final ArrayList<ProcessRecord> mRemovedProcesses
|
|
= new ArrayList<ProcessRecord>();
|
|
|
|
/**
|
|
* List of running applications, sorted by recent usage.
|
|
* The first entry in the list is the least recently used.
|
|
* It contains ApplicationRecord objects. This list does NOT include
|
|
* any persistent application records (since we never want to exit them).
|
|
*/
|
|
final ArrayList<ProcessRecord> mLruProcesses
|
|
= new ArrayList<ProcessRecord>();
|
|
|
|
/**
|
|
* List of processes that should gc as soon as things are idle.
|
|
*/
|
|
final ArrayList<ProcessRecord> mProcessesToGc
|
|
= new ArrayList<ProcessRecord>();
|
|
|
|
/**
|
|
* This is the process holding what we currently consider to be
|
|
* the "home" activity.
|
|
*/
|
|
ProcessRecord mHomeProcess;
|
|
|
|
/**
|
|
* This is the process holding the activity the user last visited that
|
|
* is in a different process from the one they are currently in.
|
|
*/
|
|
ProcessRecord mPreviousProcess;
|
|
|
|
/**
|
|
* The time at which the previous process was last visible.
|
|
*/
|
|
long mPreviousProcessVisibleTime;
|
|
|
|
/**
|
|
* Which uses have been started, so are allowed to run code.
|
|
*/
|
|
final SparseArray<UserStartedState> mStartedUsers = new SparseArray<UserStartedState>();
|
|
|
|
/**
|
|
* Packages that the user has asked to have run in screen size
|
|
* compatibility mode instead of filling the screen.
|
|
*/
|
|
final CompatModePackages mCompatModePackages;
|
|
|
|
/**
|
|
* Set of PendingResultRecord objects that are currently active.
|
|
*/
|
|
final HashSet mPendingResultRecords = new HashSet();
|
|
|
|
/**
|
|
* Set of IntentSenderRecord objects that are currently active.
|
|
*/
|
|
final HashMap<PendingIntentRecord.Key, WeakReference<PendingIntentRecord>> mIntentSenderRecords
|
|
= new HashMap<PendingIntentRecord.Key, WeakReference<PendingIntentRecord>>();
|
|
|
|
/**
|
|
* Fingerprints (hashCode()) of stack traces that we've
|
|
* already logged DropBox entries for. Guarded by itself. If
|
|
* something (rogue user app) forces this over
|
|
* MAX_DUP_SUPPRESSED_STACKS entries, the contents are cleared.
|
|
*/
|
|
private final HashSet<Integer> mAlreadyLoggedViolatedStacks = new HashSet<Integer>();
|
|
private static final int MAX_DUP_SUPPRESSED_STACKS = 5000;
|
|
|
|
/**
|
|
* Strict Mode background batched logging state.
|
|
*
|
|
* The string buffer is guarded by itself, and its lock is also
|
|
* used to determine if another batched write is already
|
|
* in-flight.
|
|
*/
|
|
private final StringBuilder mStrictModeBuffer = new StringBuilder();
|
|
|
|
/**
|
|
* Keeps track of all IIntentReceivers that have been registered for
|
|
* broadcasts. Hash keys are the receiver IBinder, hash value is
|
|
* a ReceiverList.
|
|
*/
|
|
final HashMap mRegisteredReceivers = new HashMap();
|
|
|
|
/**
|
|
* Resolver for broadcast intents to registered receivers.
|
|
* Holds BroadcastFilter (subclass of IntentFilter).
|
|
*/
|
|
final IntentResolver<BroadcastFilter, BroadcastFilter> mReceiverResolver
|
|
= new IntentResolver<BroadcastFilter, BroadcastFilter>() {
|
|
@Override
|
|
protected boolean allowFilterResult(
|
|
BroadcastFilter filter, List<BroadcastFilter> dest) {
|
|
IBinder target = filter.receiverList.receiver.asBinder();
|
|
for (int i=dest.size()-1; i>=0; i--) {
|
|
if (dest.get(i).receiverList.receiver.asBinder() == target) {
|
|
return false;
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
@Override
|
|
protected BroadcastFilter[] newArray(int size) {
|
|
return new BroadcastFilter[size];
|
|
}
|
|
|
|
@Override
|
|
protected String packageForFilter(BroadcastFilter filter) {
|
|
return filter.packageName;
|
|
}
|
|
};
|
|
|
|
/**
|
|
* State of all active sticky broadcasts. Keys are the action of the
|
|
* sticky Intent, values are an ArrayList of all broadcasted intents with
|
|
* that action (which should usually be one).
|
|
*/
|
|
final HashMap<String, ArrayList<Intent>> mStickyBroadcasts =
|
|
new HashMap<String, ArrayList<Intent>>();
|
|
|
|
final ActiveServices mServices;
|
|
|
|
/**
|
|
* Backup/restore process management
|
|
*/
|
|
String mBackupAppName = null;
|
|
BackupRecord mBackupTarget = null;
|
|
|
|
/**
|
|
* List of PendingThumbnailsRecord objects of clients who are still
|
|
* waiting to receive all of the thumbnails for a task.
|
|
*/
|
|
final ArrayList mPendingThumbnails = new ArrayList();
|
|
|
|
/**
|
|
* List of HistoryRecord objects that have been finished and must
|
|
* still report back to a pending thumbnail receiver.
|
|
*/
|
|
final ArrayList mCancelledThumbnails = new ArrayList();
|
|
|
|
final ProviderMap mProviderMap = new ProviderMap();
|
|
|
|
/**
|
|
* List of content providers who have clients waiting for them. The
|
|
* application is currently being launched and the provider will be
|
|
* removed from this list once it is published.
|
|
*/
|
|
final ArrayList<ContentProviderRecord> mLaunchingProviders
|
|
= new ArrayList<ContentProviderRecord>();
|
|
|
|
/**
|
|
* Global set of specific Uri permissions that have been granted.
|
|
*/
|
|
final private SparseArray<HashMap<Uri, UriPermission>> mGrantedUriPermissions
|
|
= new SparseArray<HashMap<Uri, UriPermission>>();
|
|
|
|
CoreSettingsObserver mCoreSettingsObserver;
|
|
|
|
/**
|
|
* Thread-local storage used to carry caller permissions over through
|
|
* indirect content-provider access.
|
|
* @see #ActivityManagerService.openContentUri()
|
|
*/
|
|
private class Identity {
|
|
public int pid;
|
|
public int uid;
|
|
|
|
Identity(int _pid, int _uid) {
|
|
pid = _pid;
|
|
uid = _uid;
|
|
}
|
|
}
|
|
|
|
private static ThreadLocal<Identity> sCallerIdentity = new ThreadLocal<Identity>();
|
|
|
|
/**
|
|
* All information we have collected about the runtime performance of
|
|
* any user id that can impact battery performance.
|
|
*/
|
|
final BatteryStatsService mBatteryStatsService;
|
|
|
|
/**
|
|
* information about component usage
|
|
*/
|
|
final UsageStatsService mUsageStatsService;
|
|
|
|
/**
|
|
* Current configuration information. HistoryRecord objects are given
|
|
* a reference to this object to indicate which configuration they are
|
|
* currently running in, so this object must be kept immutable.
|
|
*/
|
|
Configuration mConfiguration = new Configuration();
|
|
|
|
/**
|
|
* Current sequencing integer of the configuration, for skipping old
|
|
* configurations.
|
|
*/
|
|
int mConfigurationSeq = 0;
|
|
|
|
/**
|
|
* Hardware-reported OpenGLES version.
|
|
*/
|
|
final int GL_ES_VERSION;
|
|
|
|
/**
|
|
* List of initialization arguments to pass to all processes when binding applications to them.
|
|
* For example, references to the commonly used services.
|
|
*/
|
|
HashMap<String, IBinder> mAppBindArgs;
|
|
|
|
/**
|
|
* Temporary to avoid allocations. Protected by main lock.
|
|
*/
|
|
final StringBuilder mStringBuilder = new StringBuilder(256);
|
|
|
|
/**
|
|
* Used to control how we initialize the service.
|
|
*/
|
|
boolean mStartRunning = false;
|
|
ComponentName mTopComponent;
|
|
String mTopAction;
|
|
String mTopData;
|
|
boolean mProcessesReady = false;
|
|
boolean mSystemReady = false;
|
|
boolean mBooting = false;
|
|
boolean mWaitingUpdate = false;
|
|
boolean mDidUpdate = false;
|
|
boolean mOnBattery = false;
|
|
boolean mLaunchWarningShown = false;
|
|
|
|
Context mContext;
|
|
|
|
int mFactoryTest;
|
|
|
|
boolean mCheckedForSetup;
|
|
|
|
/**
|
|
* The time at which we will allow normal application switches again,
|
|
* after a call to {@link #stopAppSwitches()}.
|
|
*/
|
|
long mAppSwitchesAllowedTime;
|
|
|
|
/**
|
|
* This is set to true after the first switch after mAppSwitchesAllowedTime
|
|
* is set; any switches after that will clear the time.
|
|
*/
|
|
boolean mDidAppSwitch;
|
|
|
|
/**
|
|
* Last time (in realtime) at which we checked for power usage.
|
|
*/
|
|
long mLastPowerCheckRealtime;
|
|
|
|
/**
|
|
* Last time (in uptime) at which we checked for power usage.
|
|
*/
|
|
long mLastPowerCheckUptime;
|
|
|
|
/**
|
|
* Set while we are wanting to sleep, to prevent any
|
|
* activities from being started/resumed.
|
|
*/
|
|
boolean mSleeping = false;
|
|
|
|
/**
|
|
* State of external calls telling us if the device is asleep.
|
|
*/
|
|
boolean mWentToSleep = false;
|
|
|
|
/**
|
|
* State of external call telling us if the lock screen is shown.
|
|
*/
|
|
boolean mLockScreenShown = false;
|
|
|
|
/**
|
|
* Set if we are shutting down the system, similar to sleeping.
|
|
*/
|
|
boolean mShuttingDown = false;
|
|
|
|
/**
|
|
* Task identifier that activities are currently being started
|
|
* in. Incremented each time a new task is created.
|
|
* todo: Replace this with a TokenSpace class that generates non-repeating
|
|
* integers that won't wrap.
|
|
*/
|
|
int mCurTask = 1;
|
|
|
|
/**
|
|
* Current sequence id for oom_adj computation traversal.
|
|
*/
|
|
int mAdjSeq = 0;
|
|
|
|
/**
|
|
* Current sequence id for process LRU updating.
|
|
*/
|
|
int mLruSeq = 0;
|
|
|
|
/**
|
|
* Keep track of the non-hidden/empty process we last found, to help
|
|
* determine how to distribute hidden/empty processes next time.
|
|
*/
|
|
int mNumNonHiddenProcs = 0;
|
|
|
|
/**
|
|
* Keep track of the number of hidden procs, to balance oom adj
|
|
* distribution between those and empty procs.
|
|
*/
|
|
int mNumHiddenProcs = 0;
|
|
|
|
/**
|
|
* Keep track of the number of service processes we last found, to
|
|
* determine on the next iteration which should be B services.
|
|
*/
|
|
int mNumServiceProcs = 0;
|
|
int mNewNumServiceProcs = 0;
|
|
|
|
/**
|
|
* System monitoring: number of processes that died since the last
|
|
* N procs were started.
|
|
*/
|
|
int[] mProcDeaths = new int[20];
|
|
|
|
/**
|
|
* This is set if we had to do a delayed dexopt of an app before launching
|
|
* it, to increasing the ANR timeouts in that case.
|
|
*/
|
|
boolean mDidDexOpt;
|
|
|
|
String mDebugApp = null;
|
|
boolean mWaitForDebugger = false;
|
|
boolean mDebugTransient = false;
|
|
String mOrigDebugApp = null;
|
|
boolean mOrigWaitForDebugger = false;
|
|
boolean mAlwaysFinishActivities = false;
|
|
IActivityController mController = null;
|
|
String mProfileApp = null;
|
|
ProcessRecord mProfileProc = null;
|
|
String mProfileFile;
|
|
ParcelFileDescriptor mProfileFd;
|
|
int mProfileType = 0;
|
|
boolean mAutoStopProfiler = false;
|
|
String mOpenGlTraceApp = null;
|
|
|
|
static class ProcessChangeItem {
|
|
static final int CHANGE_ACTIVITIES = 1<<0;
|
|
static final int CHANGE_IMPORTANCE= 1<<1;
|
|
int changes;
|
|
int uid;
|
|
int pid;
|
|
int importance;
|
|
boolean foregroundActivities;
|
|
}
|
|
|
|
final RemoteCallbackList<IProcessObserver> mProcessObservers
|
|
= new RemoteCallbackList<IProcessObserver>();
|
|
ProcessChangeItem[] mActiveProcessChanges = new ProcessChangeItem[5];
|
|
|
|
final ArrayList<ProcessChangeItem> mPendingProcessChanges
|
|
= new ArrayList<ProcessChangeItem>();
|
|
final ArrayList<ProcessChangeItem> mAvailProcessChanges
|
|
= new ArrayList<ProcessChangeItem>();
|
|
|
|
/**
|
|
* Callback of last caller to {@link #requestPss}.
|
|
*/
|
|
Runnable mRequestPssCallback;
|
|
|
|
/**
|
|
* Remaining processes for which we are waiting results from the last
|
|
* call to {@link #requestPss}.
|
|
*/
|
|
final ArrayList<ProcessRecord> mRequestPssList
|
|
= new ArrayList<ProcessRecord>();
|
|
|
|
/**
|
|
* Runtime statistics collection thread. This object's lock is used to
|
|
* protect all related state.
|
|
*/
|
|
final Thread mProcessStatsThread;
|
|
|
|
/**
|
|
* Used to collect process stats when showing not responding dialog.
|
|
* Protected by mProcessStatsThread.
|
|
*/
|
|
final ProcessStats mProcessStats = new ProcessStats(
|
|
MONITOR_THREAD_CPU_USAGE);
|
|
final AtomicLong mLastCpuTime = new AtomicLong(0);
|
|
final AtomicBoolean mProcessStatsMutexFree = new AtomicBoolean(true);
|
|
|
|
long mLastWriteTime = 0;
|
|
|
|
/**
|
|
* Set to true after the system has finished booting.
|
|
*/
|
|
boolean mBooted = false;
|
|
|
|
int mProcessLimit = ProcessList.MAX_HIDDEN_APPS;
|
|
int mProcessLimitOverride = -1;
|
|
|
|
WindowManagerService mWindowManager;
|
|
|
|
static ActivityManagerService mSelf;
|
|
static ActivityThread mSystemThread;
|
|
|
|
private int mCurrentUserId;
|
|
private UserManager mUserManager;
|
|
|
|
private final class AppDeathRecipient implements IBinder.DeathRecipient {
|
|
final ProcessRecord mApp;
|
|
final int mPid;
|
|
final IApplicationThread mAppThread;
|
|
|
|
AppDeathRecipient(ProcessRecord app, int pid,
|
|
IApplicationThread thread) {
|
|
if (localLOGV) Slog.v(
|
|
TAG, "New death recipient " + this
|
|
+ " for thread " + thread.asBinder());
|
|
mApp = app;
|
|
mPid = pid;
|
|
mAppThread = thread;
|
|
}
|
|
|
|
public void binderDied() {
|
|
if (localLOGV) Slog.v(
|
|
TAG, "Death received in " + this
|
|
+ " for thread " + mAppThread.asBinder());
|
|
synchronized(ActivityManagerService.this) {
|
|
appDiedLocked(mApp, mPid, mAppThread);
|
|
}
|
|
}
|
|
}
|
|
|
|
static final int SHOW_ERROR_MSG = 1;
|
|
static final int SHOW_NOT_RESPONDING_MSG = 2;
|
|
static final int SHOW_FACTORY_ERROR_MSG = 3;
|
|
static final int UPDATE_CONFIGURATION_MSG = 4;
|
|
static final int GC_BACKGROUND_PROCESSES_MSG = 5;
|
|
static final int WAIT_FOR_DEBUGGER_MSG = 6;
|
|
static final int SERVICE_TIMEOUT_MSG = 12;
|
|
static final int UPDATE_TIME_ZONE = 13;
|
|
static final int SHOW_UID_ERROR_MSG = 14;
|
|
static final int IM_FEELING_LUCKY_MSG = 15;
|
|
static final int PROC_START_TIMEOUT_MSG = 20;
|
|
static final int DO_PENDING_ACTIVITY_LAUNCHES_MSG = 21;
|
|
static final int KILL_APPLICATION_MSG = 22;
|
|
static final int FINALIZE_PENDING_INTENT_MSG = 23;
|
|
static final int POST_HEAVY_NOTIFICATION_MSG = 24;
|
|
static final int CANCEL_HEAVY_NOTIFICATION_MSG = 25;
|
|
static final int SHOW_STRICT_MODE_VIOLATION_MSG = 26;
|
|
static final int CHECK_EXCESSIVE_WAKE_LOCKS_MSG = 27;
|
|
static final int CLEAR_DNS_CACHE = 28;
|
|
static final int UPDATE_HTTP_PROXY = 29;
|
|
static final int SHOW_COMPAT_MODE_DIALOG_MSG = 30;
|
|
static final int DISPATCH_PROCESSES_CHANGED = 31;
|
|
static final int DISPATCH_PROCESS_DIED = 32;
|
|
static final int REPORT_MEM_USAGE = 33;
|
|
|
|
static final int FIRST_ACTIVITY_STACK_MSG = 100;
|
|
static final int FIRST_BROADCAST_QUEUE_MSG = 200;
|
|
static final int FIRST_COMPAT_MODE_MSG = 300;
|
|
|
|
AlertDialog mUidAlert;
|
|
CompatModeDialog mCompatModeDialog;
|
|
long mLastMemUsageReportTime = 0;
|
|
|
|
final Handler mHandler = new Handler() {
|
|
//public Handler() {
|
|
// if (localLOGV) Slog.v(TAG, "Handler started!");
|
|
//}
|
|
|
|
public void handleMessage(Message msg) {
|
|
switch (msg.what) {
|
|
case SHOW_ERROR_MSG: {
|
|
HashMap data = (HashMap) msg.obj;
|
|
synchronized (ActivityManagerService.this) {
|
|
ProcessRecord proc = (ProcessRecord)data.get("app");
|
|
if (proc != null && proc.crashDialog != null) {
|
|
Slog.e(TAG, "App already has crash dialog: " + proc);
|
|
return;
|
|
}
|
|
AppErrorResult res = (AppErrorResult) data.get("result");
|
|
if (mShowDialogs && !mSleeping && !mShuttingDown) {
|
|
Dialog d = new AppErrorDialog(mContext, res, proc);
|
|
d.show();
|
|
proc.crashDialog = d;
|
|
} else {
|
|
// The device is asleep, so just pretend that the user
|
|
// saw a crash dialog and hit "force quit".
|
|
res.set(0);
|
|
}
|
|
}
|
|
|
|
ensureBootCompleted();
|
|
} break;
|
|
case SHOW_NOT_RESPONDING_MSG: {
|
|
synchronized (ActivityManagerService.this) {
|
|
HashMap data = (HashMap) msg.obj;
|
|
ProcessRecord proc = (ProcessRecord)data.get("app");
|
|
if (proc != null && proc.anrDialog != null) {
|
|
Slog.e(TAG, "App already has anr dialog: " + proc);
|
|
return;
|
|
}
|
|
|
|
Intent intent = new Intent("android.intent.action.ANR");
|
|
if (!mProcessesReady) {
|
|
intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY
|
|
| Intent.FLAG_RECEIVER_FOREGROUND);
|
|
}
|
|
broadcastIntentLocked(null, null, intent,
|
|
null, null, 0, null, null, null,
|
|
false, false, MY_PID, Process.SYSTEM_UID, 0 /* TODO: Verify */);
|
|
|
|
if (mShowDialogs) {
|
|
Dialog d = new AppNotRespondingDialog(ActivityManagerService.this,
|
|
mContext, proc, (ActivityRecord)data.get("activity"));
|
|
d.show();
|
|
proc.anrDialog = d;
|
|
} else {
|
|
// Just kill the app if there is no dialog to be shown.
|
|
killAppAtUsersRequest(proc, null);
|
|
}
|
|
}
|
|
|
|
ensureBootCompleted();
|
|
} break;
|
|
case SHOW_STRICT_MODE_VIOLATION_MSG: {
|
|
HashMap<String, Object> data = (HashMap<String, Object>) msg.obj;
|
|
synchronized (ActivityManagerService.this) {
|
|
ProcessRecord proc = (ProcessRecord) data.get("app");
|
|
if (proc == null) {
|
|
Slog.e(TAG, "App not found when showing strict mode dialog.");
|
|
break;
|
|
}
|
|
if (proc.crashDialog != null) {
|
|
Slog.e(TAG, "App already has strict mode dialog: " + proc);
|
|
return;
|
|
}
|
|
AppErrorResult res = (AppErrorResult) data.get("result");
|
|
if (mShowDialogs && !mSleeping && !mShuttingDown) {
|
|
Dialog d = new StrictModeViolationDialog(mContext, res, proc);
|
|
d.show();
|
|
proc.crashDialog = d;
|
|
} else {
|
|
// The device is asleep, so just pretend that the user
|
|
// saw a crash dialog and hit "force quit".
|
|
res.set(0);
|
|
}
|
|
}
|
|
ensureBootCompleted();
|
|
} break;
|
|
case SHOW_FACTORY_ERROR_MSG: {
|
|
Dialog d = new FactoryErrorDialog(
|
|
mContext, msg.getData().getCharSequence("msg"));
|
|
d.show();
|
|
ensureBootCompleted();
|
|
} break;
|
|
case UPDATE_CONFIGURATION_MSG: {
|
|
final ContentResolver resolver = mContext.getContentResolver();
|
|
Settings.System.putConfiguration(resolver, (Configuration)msg.obj);
|
|
} break;
|
|
case GC_BACKGROUND_PROCESSES_MSG: {
|
|
synchronized (ActivityManagerService.this) {
|
|
performAppGcsIfAppropriateLocked();
|
|
}
|
|
} break;
|
|
case WAIT_FOR_DEBUGGER_MSG: {
|
|
synchronized (ActivityManagerService.this) {
|
|
ProcessRecord app = (ProcessRecord)msg.obj;
|
|
if (msg.arg1 != 0) {
|
|
if (!app.waitedForDebugger) {
|
|
Dialog d = new AppWaitingForDebuggerDialog(
|
|
ActivityManagerService.this,
|
|
mContext, app);
|
|
app.waitDialog = d;
|
|
app.waitedForDebugger = true;
|
|
d.show();
|
|
}
|
|
} else {
|
|
if (app.waitDialog != null) {
|
|
app.waitDialog.dismiss();
|
|
app.waitDialog = null;
|
|
}
|
|
}
|
|
}
|
|
} break;
|
|
case SERVICE_TIMEOUT_MSG: {
|
|
if (mDidDexOpt) {
|
|
mDidDexOpt = false;
|
|
Message nmsg = mHandler.obtainMessage(SERVICE_TIMEOUT_MSG);
|
|
nmsg.obj = msg.obj;
|
|
mHandler.sendMessageDelayed(nmsg, ActiveServices.SERVICE_TIMEOUT);
|
|
return;
|
|
}
|
|
mServices.serviceTimeout((ProcessRecord)msg.obj);
|
|
} break;
|
|
case UPDATE_TIME_ZONE: {
|
|
synchronized (ActivityManagerService.this) {
|
|
for (int i = mLruProcesses.size() - 1 ; i >= 0 ; i--) {
|
|
ProcessRecord r = mLruProcesses.get(i);
|
|
if (r.thread != null) {
|
|
try {
|
|
r.thread.updateTimeZone();
|
|
} catch (RemoteException ex) {
|
|
Slog.w(TAG, "Failed to update time zone for: " + r.info.processName);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
} break;
|
|
case CLEAR_DNS_CACHE: {
|
|
synchronized (ActivityManagerService.this) {
|
|
for (int i = mLruProcesses.size() - 1 ; i >= 0 ; i--) {
|
|
ProcessRecord r = mLruProcesses.get(i);
|
|
if (r.thread != null) {
|
|
try {
|
|
r.thread.clearDnsCache();
|
|
} catch (RemoteException ex) {
|
|
Slog.w(TAG, "Failed to clear dns cache for: " + r.info.processName);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
} break;
|
|
case UPDATE_HTTP_PROXY: {
|
|
ProxyProperties proxy = (ProxyProperties)msg.obj;
|
|
String host = "";
|
|
String port = "";
|
|
String exclList = "";
|
|
if (proxy != null) {
|
|
host = proxy.getHost();
|
|
port = Integer.toString(proxy.getPort());
|
|
exclList = proxy.getExclusionList();
|
|
}
|
|
synchronized (ActivityManagerService.this) {
|
|
for (int i = mLruProcesses.size() - 1 ; i >= 0 ; i--) {
|
|
ProcessRecord r = mLruProcesses.get(i);
|
|
if (r.thread != null) {
|
|
try {
|
|
r.thread.setHttpProxy(host, port, exclList);
|
|
} catch (RemoteException ex) {
|
|
Slog.w(TAG, "Failed to update http proxy for: " +
|
|
r.info.processName);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
} break;
|
|
case SHOW_UID_ERROR_MSG: {
|
|
String title = "System UIDs Inconsistent";
|
|
String text = "UIDs on the system are inconsistent, you need to wipe your"
|
|
+ " data partition or your device will be unstable.";
|
|
Log.e(TAG, title + ": " + text);
|
|
if (mShowDialogs) {
|
|
// XXX This is a temporary dialog, no need to localize.
|
|
AlertDialog d = new BaseErrorDialog(mContext);
|
|
d.getWindow().setType(WindowManager.LayoutParams.TYPE_SYSTEM_ERROR);
|
|
d.setCancelable(false);
|
|
d.setTitle(title);
|
|
d.setMessage(text);
|
|
d.setButton(DialogInterface.BUTTON_POSITIVE, "I'm Feeling Lucky",
|
|
mHandler.obtainMessage(IM_FEELING_LUCKY_MSG));
|
|
mUidAlert = d;
|
|
d.show();
|
|
}
|
|
} break;
|
|
case IM_FEELING_LUCKY_MSG: {
|
|
if (mUidAlert != null) {
|
|
mUidAlert.dismiss();
|
|
mUidAlert = null;
|
|
}
|
|
} break;
|
|
case PROC_START_TIMEOUT_MSG: {
|
|
if (mDidDexOpt) {
|
|
mDidDexOpt = false;
|
|
Message nmsg = mHandler.obtainMessage(PROC_START_TIMEOUT_MSG);
|
|
nmsg.obj = msg.obj;
|
|
mHandler.sendMessageDelayed(nmsg, PROC_START_TIMEOUT);
|
|
return;
|
|
}
|
|
ProcessRecord app = (ProcessRecord)msg.obj;
|
|
synchronized (ActivityManagerService.this) {
|
|
processStartTimedOutLocked(app);
|
|
}
|
|
} break;
|
|
case DO_PENDING_ACTIVITY_LAUNCHES_MSG: {
|
|
synchronized (ActivityManagerService.this) {
|
|
doPendingActivityLaunchesLocked(true);
|
|
}
|
|
} break;
|
|
case KILL_APPLICATION_MSG: {
|
|
synchronized (ActivityManagerService.this) {
|
|
int uid = msg.arg1;
|
|
boolean restart = (msg.arg2 == 1);
|
|
String pkg = (String) msg.obj;
|
|
forceStopPackageLocked(pkg, uid, restart, false, true, false,
|
|
UserHandle.getUserId(uid));
|
|
}
|
|
} break;
|
|
case FINALIZE_PENDING_INTENT_MSG: {
|
|
((PendingIntentRecord)msg.obj).completeFinalize();
|
|
} break;
|
|
case POST_HEAVY_NOTIFICATION_MSG: {
|
|
INotificationManager inm = NotificationManager.getService();
|
|
if (inm == null) {
|
|
return;
|
|
}
|
|
|
|
ActivityRecord root = (ActivityRecord)msg.obj;
|
|
ProcessRecord process = root.app;
|
|
if (process == null) {
|
|
return;
|
|
}
|
|
|
|
try {
|
|
Context context = mContext.createPackageContext(process.info.packageName, 0);
|
|
String text = mContext.getString(R.string.heavy_weight_notification,
|
|
context.getApplicationInfo().loadLabel(context.getPackageManager()));
|
|
Notification notification = new Notification();
|
|
notification.icon = com.android.internal.R.drawable.stat_sys_adb; //context.getApplicationInfo().icon;
|
|
notification.when = 0;
|
|
notification.flags = Notification.FLAG_ONGOING_EVENT;
|
|
notification.tickerText = text;
|
|
notification.defaults = 0; // please be quiet
|
|
notification.sound = null;
|
|
notification.vibrate = null;
|
|
notification.setLatestEventInfo(context, text,
|
|
mContext.getText(R.string.heavy_weight_notification_detail),
|
|
PendingIntent.getActivity(mContext, 0, root.intent,
|
|
PendingIntent.FLAG_CANCEL_CURRENT));
|
|
|
|
try {
|
|
int[] outId = new int[1];
|
|
inm.enqueueNotification("android", R.string.heavy_weight_notification,
|
|
notification, outId);
|
|
} catch (RuntimeException e) {
|
|
Slog.w(ActivityManagerService.TAG,
|
|
"Error showing notification for heavy-weight app", e);
|
|
} catch (RemoteException e) {
|
|
}
|
|
} catch (NameNotFoundException e) {
|
|
Slog.w(TAG, "Unable to create context for heavy notification", e);
|
|
}
|
|
} break;
|
|
case CANCEL_HEAVY_NOTIFICATION_MSG: {
|
|
INotificationManager inm = NotificationManager.getService();
|
|
if (inm == null) {
|
|
return;
|
|
}
|
|
try {
|
|
inm.cancelNotification("android",
|
|
R.string.heavy_weight_notification);
|
|
} catch (RuntimeException e) {
|
|
Slog.w(ActivityManagerService.TAG,
|
|
"Error canceling notification for service", e);
|
|
} catch (RemoteException e) {
|
|
}
|
|
} break;
|
|
case CHECK_EXCESSIVE_WAKE_LOCKS_MSG: {
|
|
synchronized (ActivityManagerService.this) {
|
|
checkExcessivePowerUsageLocked(true);
|
|
removeMessages(CHECK_EXCESSIVE_WAKE_LOCKS_MSG);
|
|
Message nmsg = obtainMessage(CHECK_EXCESSIVE_WAKE_LOCKS_MSG);
|
|
sendMessageDelayed(nmsg, POWER_CHECK_DELAY);
|
|
}
|
|
} break;
|
|
case SHOW_COMPAT_MODE_DIALOG_MSG: {
|
|
synchronized (ActivityManagerService.this) {
|
|
ActivityRecord ar = (ActivityRecord)msg.obj;
|
|
if (mCompatModeDialog != null) {
|
|
if (mCompatModeDialog.mAppInfo.packageName.equals(
|
|
ar.info.applicationInfo.packageName)) {
|
|
return;
|
|
}
|
|
mCompatModeDialog.dismiss();
|
|
mCompatModeDialog = null;
|
|
}
|
|
if (ar != null && false) {
|
|
if (mCompatModePackages.getPackageAskCompatModeLocked(
|
|
ar.packageName)) {
|
|
int mode = mCompatModePackages.computeCompatModeLocked(
|
|
ar.info.applicationInfo);
|
|
if (mode == ActivityManager.COMPAT_MODE_DISABLED
|
|
|| mode == ActivityManager.COMPAT_MODE_ENABLED) {
|
|
mCompatModeDialog = new CompatModeDialog(
|
|
ActivityManagerService.this, mContext,
|
|
ar.info.applicationInfo);
|
|
mCompatModeDialog.show();
|
|
}
|
|
}
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
case DISPATCH_PROCESSES_CHANGED: {
|
|
dispatchProcessesChanged();
|
|
break;
|
|
}
|
|
case DISPATCH_PROCESS_DIED: {
|
|
final int pid = msg.arg1;
|
|
final int uid = msg.arg2;
|
|
dispatchProcessDied(pid, uid);
|
|
break;
|
|
}
|
|
case REPORT_MEM_USAGE: {
|
|
boolean isDebuggable = "1".equals(SystemProperties.get(SYSTEM_DEBUGGABLE, "0"));
|
|
if (!isDebuggable) {
|
|
return;
|
|
}
|
|
synchronized (ActivityManagerService.this) {
|
|
long now = SystemClock.uptimeMillis();
|
|
if (now < (mLastMemUsageReportTime+5*60*1000)) {
|
|
// Don't report more than every 5 minutes to somewhat
|
|
// avoid spamming.
|
|
return;
|
|
}
|
|
mLastMemUsageReportTime = now;
|
|
}
|
|
Thread thread = new Thread() {
|
|
@Override public void run() {
|
|
StringBuilder dropBuilder = new StringBuilder(1024);
|
|
StringBuilder logBuilder = new StringBuilder(1024);
|
|
StringWriter oomSw = new StringWriter();
|
|
PrintWriter oomPw = new PrintWriter(oomSw);
|
|
StringWriter catSw = new StringWriter();
|
|
PrintWriter catPw = new PrintWriter(catSw);
|
|
String[] emptyArgs = new String[] { };
|
|
StringBuilder tag = new StringBuilder(128);
|
|
StringBuilder stack = new StringBuilder(128);
|
|
tag.append("Low on memory -- ");
|
|
dumpApplicationMemoryUsage(null, oomPw, " ", emptyArgs, true, catPw,
|
|
tag, stack);
|
|
dropBuilder.append(stack);
|
|
dropBuilder.append('\n');
|
|
dropBuilder.append('\n');
|
|
String oomString = oomSw.toString();
|
|
dropBuilder.append(oomString);
|
|
dropBuilder.append('\n');
|
|
logBuilder.append(oomString);
|
|
try {
|
|
java.lang.Process proc = Runtime.getRuntime().exec(new String[] {
|
|
"procrank", });
|
|
final InputStreamReader converter = new InputStreamReader(
|
|
proc.getInputStream());
|
|
BufferedReader in = new BufferedReader(converter);
|
|
String line;
|
|
while (true) {
|
|
line = in.readLine();
|
|
if (line == null) {
|
|
break;
|
|
}
|
|
if (line.length() > 0) {
|
|
logBuilder.append(line);
|
|
logBuilder.append('\n');
|
|
}
|
|
dropBuilder.append(line);
|
|
dropBuilder.append('\n');
|
|
}
|
|
converter.close();
|
|
} catch (IOException e) {
|
|
}
|
|
synchronized (ActivityManagerService.this) {
|
|
catPw.println();
|
|
dumpProcessesLocked(null, catPw, emptyArgs, 0, false, null);
|
|
catPw.println();
|
|
mServices.dumpServicesLocked(null, catPw, emptyArgs, 0,
|
|
false, false, null);
|
|
catPw.println();
|
|
dumpActivitiesLocked(null, catPw, emptyArgs, 0, false, false, null);
|
|
}
|
|
dropBuilder.append(catSw.toString());
|
|
addErrorToDropBox("lowmem", null, "system_server", null,
|
|
null, tag.toString(), dropBuilder.toString(), null, null);
|
|
Slog.i(TAG, logBuilder.toString());
|
|
synchronized (ActivityManagerService.this) {
|
|
long now = SystemClock.uptimeMillis();
|
|
if (mLastMemUsageReportTime < now) {
|
|
mLastMemUsageReportTime = now;
|
|
}
|
|
}
|
|
}
|
|
};
|
|
thread.start();
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
};
|
|
|
|
public static void setSystemProcess() {
|
|
try {
|
|
ActivityManagerService m = mSelf;
|
|
|
|
ServiceManager.addService("activity", m, true);
|
|
ServiceManager.addService("meminfo", new MemBinder(m));
|
|
ServiceManager.addService("gfxinfo", new GraphicsBinder(m));
|
|
ServiceManager.addService("dbinfo", new DbBinder(m));
|
|
if (MONITOR_CPU_USAGE) {
|
|
ServiceManager.addService("cpuinfo", new CpuBinder(m));
|
|
}
|
|
ServiceManager.addService("permission", new PermissionController(m));
|
|
|
|
ApplicationInfo info =
|
|
mSelf.mContext.getPackageManager().getApplicationInfo(
|
|
"android", STOCK_PM_FLAGS);
|
|
mSystemThread.installSystemApplicationInfo(info);
|
|
|
|
synchronized (mSelf) {
|
|
ProcessRecord app = mSelf.newProcessRecordLocked(
|
|
mSystemThread.getApplicationThread(), info,
|
|
info.processName, false);
|
|
app.persistent = true;
|
|
app.pid = MY_PID;
|
|
app.maxAdj = ProcessList.SYSTEM_ADJ;
|
|
mSelf.mProcessNames.put(app.processName, app.uid, app);
|
|
synchronized (mSelf.mPidsSelfLocked) {
|
|
mSelf.mPidsSelfLocked.put(app.pid, app);
|
|
}
|
|
mSelf.updateLruProcessLocked(app, true, true);
|
|
}
|
|
} catch (PackageManager.NameNotFoundException e) {
|
|
throw new RuntimeException(
|
|
"Unable to find android system package", e);
|
|
}
|
|
}
|
|
|
|
public void setWindowManager(WindowManagerService wm) {
|
|
mWindowManager = wm;
|
|
}
|
|
|
|
public static final Context main(int factoryTest) {
|
|
AThread thr = new AThread();
|
|
thr.start();
|
|
|
|
synchronized (thr) {
|
|
while (thr.mService == null) {
|
|
try {
|
|
thr.wait();
|
|
} catch (InterruptedException e) {
|
|
}
|
|
}
|
|
}
|
|
|
|
ActivityManagerService m = thr.mService;
|
|
mSelf = m;
|
|
ActivityThread at = ActivityThread.systemMain();
|
|
mSystemThread = at;
|
|
Context context = at.getSystemContext();
|
|
context.setTheme(android.R.style.Theme_Holo);
|
|
m.mContext = context;
|
|
m.mFactoryTest = factoryTest;
|
|
m.mMainStack = new ActivityStack(m, context, true);
|
|
|
|
m.mBatteryStatsService.publish(context);
|
|
m.mUsageStatsService.publish(context);
|
|
|
|
synchronized (thr) {
|
|
thr.mReady = true;
|
|
thr.notifyAll();
|
|
}
|
|
|
|
m.startRunning(null, null, null, null);
|
|
|
|
return context;
|
|
}
|
|
|
|
public static ActivityManagerService self() {
|
|
return mSelf;
|
|
}
|
|
|
|
static class AThread extends Thread {
|
|
ActivityManagerService mService;
|
|
boolean mReady = false;
|
|
|
|
public AThread() {
|
|
super("ActivityManager");
|
|
}
|
|
|
|
public void run() {
|
|
Looper.prepare();
|
|
|
|
android.os.Process.setThreadPriority(
|
|
android.os.Process.THREAD_PRIORITY_FOREGROUND);
|
|
android.os.Process.setCanSelfBackground(false);
|
|
|
|
ActivityManagerService m = new ActivityManagerService();
|
|
|
|
synchronized (this) {
|
|
mService = m;
|
|
notifyAll();
|
|
}
|
|
|
|
synchronized (this) {
|
|
while (!mReady) {
|
|
try {
|
|
wait();
|
|
} catch (InterruptedException e) {
|
|
}
|
|
}
|
|
}
|
|
|
|
// For debug builds, log event loop stalls to dropbox for analysis.
|
|
if (StrictMode.conditionallyEnableDebugLogging()) {
|
|
Slog.i(TAG, "Enabled StrictMode logging for AThread's Looper");
|
|
}
|
|
|
|
Looper.loop();
|
|
}
|
|
}
|
|
|
|
static class MemBinder extends Binder {
|
|
ActivityManagerService mActivityManagerService;
|
|
MemBinder(ActivityManagerService activityManagerService) {
|
|
mActivityManagerService = activityManagerService;
|
|
}
|
|
|
|
@Override
|
|
protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) {
|
|
if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
pw.println("Permission Denial: can't dump meminfo from from pid="
|
|
+ Binder.getCallingPid() + ", uid=" + Binder.getCallingUid()
|
|
+ " without permission " + android.Manifest.permission.DUMP);
|
|
return;
|
|
}
|
|
|
|
mActivityManagerService.dumpApplicationMemoryUsage(fd, pw, " ", args,
|
|
false, null, null, null);
|
|
}
|
|
}
|
|
|
|
static class GraphicsBinder extends Binder {
|
|
ActivityManagerService mActivityManagerService;
|
|
GraphicsBinder(ActivityManagerService activityManagerService) {
|
|
mActivityManagerService = activityManagerService;
|
|
}
|
|
|
|
@Override
|
|
protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) {
|
|
if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
pw.println("Permission Denial: can't dump gfxinfo from from pid="
|
|
+ Binder.getCallingPid() + ", uid=" + Binder.getCallingUid()
|
|
+ " without permission " + android.Manifest.permission.DUMP);
|
|
return;
|
|
}
|
|
|
|
mActivityManagerService.dumpGraphicsHardwareUsage(fd, pw, args);
|
|
}
|
|
}
|
|
|
|
static class DbBinder extends Binder {
|
|
ActivityManagerService mActivityManagerService;
|
|
DbBinder(ActivityManagerService activityManagerService) {
|
|
mActivityManagerService = activityManagerService;
|
|
}
|
|
|
|
@Override
|
|
protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) {
|
|
if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
pw.println("Permission Denial: can't dump dbinfo from from pid="
|
|
+ Binder.getCallingPid() + ", uid=" + Binder.getCallingUid()
|
|
+ " without permission " + android.Manifest.permission.DUMP);
|
|
return;
|
|
}
|
|
|
|
mActivityManagerService.dumpDbInfo(fd, pw, args);
|
|
}
|
|
}
|
|
|
|
static class CpuBinder extends Binder {
|
|
ActivityManagerService mActivityManagerService;
|
|
CpuBinder(ActivityManagerService activityManagerService) {
|
|
mActivityManagerService = activityManagerService;
|
|
}
|
|
|
|
@Override
|
|
protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) {
|
|
if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
pw.println("Permission Denial: can't dump cpuinfo from from pid="
|
|
+ Binder.getCallingPid() + ", uid=" + Binder.getCallingUid()
|
|
+ " without permission " + android.Manifest.permission.DUMP);
|
|
return;
|
|
}
|
|
|
|
synchronized (mActivityManagerService.mProcessStatsThread) {
|
|
pw.print(mActivityManagerService.mProcessStats.printCurrentLoad());
|
|
pw.print(mActivityManagerService.mProcessStats.printCurrentState(
|
|
SystemClock.uptimeMillis()));
|
|
}
|
|
}
|
|
}
|
|
|
|
private ActivityManagerService() {
|
|
Slog.i(TAG, "Memory class: " + ActivityManager.staticGetMemoryClass());
|
|
|
|
mFgBroadcastQueue = new BroadcastQueue(this, "foreground", BROADCAST_FG_TIMEOUT);
|
|
mBgBroadcastQueue = new BroadcastQueue(this, "background", BROADCAST_BG_TIMEOUT);
|
|
mBroadcastQueues[0] = mFgBroadcastQueue;
|
|
mBroadcastQueues[1] = mBgBroadcastQueue;
|
|
|
|
mServices = new ActiveServices(this);
|
|
|
|
File dataDir = Environment.getDataDirectory();
|
|
File systemDir = new File(dataDir, "system");
|
|
systemDir.mkdirs();
|
|
mBatteryStatsService = new BatteryStatsService(new File(
|
|
systemDir, "batterystats.bin").toString());
|
|
mBatteryStatsService.getActiveStatistics().readLocked();
|
|
mBatteryStatsService.getActiveStatistics().writeAsyncLocked();
|
|
mOnBattery = DEBUG_POWER ? true
|
|
: mBatteryStatsService.getActiveStatistics().getIsOnBattery();
|
|
mBatteryStatsService.getActiveStatistics().setCallback(this);
|
|
|
|
mUsageStatsService = new UsageStatsService(new File(
|
|
systemDir, "usagestats").toString());
|
|
mHeadless = "1".equals(SystemProperties.get("ro.config.headless", "0"));
|
|
|
|
// User 0 is the first and only user that runs at boot.
|
|
mStartedUsers.put(0, new UserStartedState(new UserHandle(0), true));
|
|
|
|
GL_ES_VERSION = SystemProperties.getInt("ro.opengles.version",
|
|
ConfigurationInfo.GL_ES_VERSION_UNDEFINED);
|
|
|
|
mConfiguration.setToDefaults();
|
|
mConfiguration.locale = Locale.getDefault();
|
|
mConfigurationSeq = mConfiguration.seq = 1;
|
|
mProcessStats.init();
|
|
|
|
mCompatModePackages = new CompatModePackages(this, systemDir);
|
|
|
|
// Add ourself to the Watchdog monitors.
|
|
Watchdog.getInstance().addMonitor(this);
|
|
|
|
mProcessStatsThread = new Thread("ProcessStats") {
|
|
public void run() {
|
|
while (true) {
|
|
try {
|
|
try {
|
|
synchronized(this) {
|
|
final long now = SystemClock.uptimeMillis();
|
|
long nextCpuDelay = (mLastCpuTime.get()+MONITOR_CPU_MAX_TIME)-now;
|
|
long nextWriteDelay = (mLastWriteTime+BATTERY_STATS_TIME)-now;
|
|
//Slog.i(TAG, "Cpu delay=" + nextCpuDelay
|
|
// + ", write delay=" + nextWriteDelay);
|
|
if (nextWriteDelay < nextCpuDelay) {
|
|
nextCpuDelay = nextWriteDelay;
|
|
}
|
|
if (nextCpuDelay > 0) {
|
|
mProcessStatsMutexFree.set(true);
|
|
this.wait(nextCpuDelay);
|
|
}
|
|
}
|
|
} catch (InterruptedException e) {
|
|
}
|
|
updateCpuStatsNow();
|
|
} catch (Exception e) {
|
|
Slog.e(TAG, "Unexpected exception collecting process stats", e);
|
|
}
|
|
}
|
|
}
|
|
};
|
|
mProcessStatsThread.start();
|
|
}
|
|
|
|
@Override
|
|
public boolean onTransact(int code, Parcel data, Parcel reply, int flags)
|
|
throws RemoteException {
|
|
if (code == SYSPROPS_TRANSACTION) {
|
|
// We need to tell all apps about the system property change.
|
|
ArrayList<IBinder> procs = new ArrayList<IBinder>();
|
|
synchronized(this) {
|
|
for (SparseArray<ProcessRecord> apps : mProcessNames.getMap().values()) {
|
|
final int NA = apps.size();
|
|
for (int ia=0; ia<NA; ia++) {
|
|
ProcessRecord app = apps.valueAt(ia);
|
|
if (app.thread != null) {
|
|
procs.add(app.thread.asBinder());
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
int N = procs.size();
|
|
for (int i=0; i<N; i++) {
|
|
Parcel data2 = Parcel.obtain();
|
|
try {
|
|
procs.get(i).transact(IBinder.SYSPROPS_TRANSACTION, data2, null, 0);
|
|
} catch (RemoteException e) {
|
|
}
|
|
data2.recycle();
|
|
}
|
|
}
|
|
try {
|
|
return super.onTransact(code, data, reply, flags);
|
|
} catch (RuntimeException e) {
|
|
// The activity manager only throws security exceptions, so let's
|
|
// log all others.
|
|
if (!(e instanceof SecurityException)) {
|
|
Slog.e(TAG, "Activity Manager Crash", e);
|
|
}
|
|
throw e;
|
|
}
|
|
}
|
|
|
|
void updateCpuStats() {
|
|
final long now = SystemClock.uptimeMillis();
|
|
if (mLastCpuTime.get() >= now - MONITOR_CPU_MIN_TIME) {
|
|
return;
|
|
}
|
|
if (mProcessStatsMutexFree.compareAndSet(true, false)) {
|
|
synchronized (mProcessStatsThread) {
|
|
mProcessStatsThread.notify();
|
|
}
|
|
}
|
|
}
|
|
|
|
void updateCpuStatsNow() {
|
|
synchronized (mProcessStatsThread) {
|
|
mProcessStatsMutexFree.set(false);
|
|
final long now = SystemClock.uptimeMillis();
|
|
boolean haveNewCpuStats = false;
|
|
|
|
if (MONITOR_CPU_USAGE &&
|
|
mLastCpuTime.get() < (now-MONITOR_CPU_MIN_TIME)) {
|
|
mLastCpuTime.set(now);
|
|
haveNewCpuStats = true;
|
|
mProcessStats.update();
|
|
//Slog.i(TAG, mProcessStats.printCurrentState());
|
|
//Slog.i(TAG, "Total CPU usage: "
|
|
// + mProcessStats.getTotalCpuPercent() + "%");
|
|
|
|
// Slog the cpu usage if the property is set.
|
|
if ("true".equals(SystemProperties.get("events.cpu"))) {
|
|
int user = mProcessStats.getLastUserTime();
|
|
int system = mProcessStats.getLastSystemTime();
|
|
int iowait = mProcessStats.getLastIoWaitTime();
|
|
int irq = mProcessStats.getLastIrqTime();
|
|
int softIrq = mProcessStats.getLastSoftIrqTime();
|
|
int idle = mProcessStats.getLastIdleTime();
|
|
|
|
int total = user + system + iowait + irq + softIrq + idle;
|
|
if (total == 0) total = 1;
|
|
|
|
EventLog.writeEvent(EventLogTags.CPU,
|
|
((user+system+iowait+irq+softIrq) * 100) / total,
|
|
(user * 100) / total,
|
|
(system * 100) / total,
|
|
(iowait * 100) / total,
|
|
(irq * 100) / total,
|
|
(softIrq * 100) / total);
|
|
}
|
|
}
|
|
|
|
long[] cpuSpeedTimes = mProcessStats.getLastCpuSpeedTimes();
|
|
final BatteryStatsImpl bstats = mBatteryStatsService.getActiveStatistics();
|
|
synchronized(bstats) {
|
|
synchronized(mPidsSelfLocked) {
|
|
if (haveNewCpuStats) {
|
|
if (mOnBattery) {
|
|
int perc = bstats.startAddingCpuLocked();
|
|
int totalUTime = 0;
|
|
int totalSTime = 0;
|
|
final int N = mProcessStats.countStats();
|
|
for (int i=0; i<N; i++) {
|
|
ProcessStats.Stats st = mProcessStats.getStats(i);
|
|
if (!st.working) {
|
|
continue;
|
|
}
|
|
ProcessRecord pr = mPidsSelfLocked.get(st.pid);
|
|
int otherUTime = (st.rel_utime*perc)/100;
|
|
int otherSTime = (st.rel_stime*perc)/100;
|
|
totalUTime += otherUTime;
|
|
totalSTime += otherSTime;
|
|
if (pr != null) {
|
|
BatteryStatsImpl.Uid.Proc ps = pr.batteryStats;
|
|
ps.addCpuTimeLocked(st.rel_utime-otherUTime,
|
|
st.rel_stime-otherSTime);
|
|
ps.addSpeedStepTimes(cpuSpeedTimes);
|
|
pr.curCpuTime += (st.rel_utime+st.rel_stime) * 10;
|
|
} else {
|
|
BatteryStatsImpl.Uid.Proc ps =
|
|
bstats.getProcessStatsLocked(st.name, st.pid);
|
|
if (ps != null) {
|
|
ps.addCpuTimeLocked(st.rel_utime-otherUTime,
|
|
st.rel_stime-otherSTime);
|
|
ps.addSpeedStepTimes(cpuSpeedTimes);
|
|
}
|
|
}
|
|
}
|
|
bstats.finishAddingCpuLocked(perc, totalUTime,
|
|
totalSTime, cpuSpeedTimes);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (mLastWriteTime < (now-BATTERY_STATS_TIME)) {
|
|
mLastWriteTime = now;
|
|
mBatteryStatsService.getActiveStatistics().writeAsyncLocked();
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
@Override
|
|
public void batteryNeedsCpuUpdate() {
|
|
updateCpuStatsNow();
|
|
}
|
|
|
|
@Override
|
|
public void batteryPowerChanged(boolean onBattery) {
|
|
// When plugging in, update the CPU stats first before changing
|
|
// the plug state.
|
|
updateCpuStatsNow();
|
|
synchronized (this) {
|
|
synchronized(mPidsSelfLocked) {
|
|
mOnBattery = DEBUG_POWER ? true : onBattery;
|
|
}
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Initialize the application bind args. These are passed to each
|
|
* process when the bindApplication() IPC is sent to the process. They're
|
|
* lazily setup to make sure the services are running when they're asked for.
|
|
*/
|
|
private HashMap<String, IBinder> getCommonServicesLocked() {
|
|
if (mAppBindArgs == null) {
|
|
mAppBindArgs = new HashMap<String, IBinder>();
|
|
|
|
// Setup the application init args
|
|
mAppBindArgs.put("package", ServiceManager.getService("package"));
|
|
mAppBindArgs.put("window", ServiceManager.getService("window"));
|
|
mAppBindArgs.put(Context.ALARM_SERVICE,
|
|
ServiceManager.getService(Context.ALARM_SERVICE));
|
|
}
|
|
return mAppBindArgs;
|
|
}
|
|
|
|
final void setFocusedActivityLocked(ActivityRecord r) {
|
|
if (mFocusedActivity != r) {
|
|
mFocusedActivity = r;
|
|
if (r != null) {
|
|
mWindowManager.setFocusedApp(r.appToken, true);
|
|
}
|
|
}
|
|
}
|
|
|
|
private final void updateLruProcessInternalLocked(ProcessRecord app,
|
|
boolean oomAdj, boolean updateActivityTime, int bestPos) {
|
|
// put it on the LRU to keep track of when it should be exited.
|
|
int lrui = mLruProcesses.indexOf(app);
|
|
if (lrui >= 0) mLruProcesses.remove(lrui);
|
|
|
|
int i = mLruProcesses.size()-1;
|
|
int skipTop = 0;
|
|
|
|
app.lruSeq = mLruSeq;
|
|
|
|
// compute the new weight for this process.
|
|
if (updateActivityTime) {
|
|
app.lastActivityTime = SystemClock.uptimeMillis();
|
|
}
|
|
if (app.activities.size() > 0) {
|
|
// If this process has activities, we more strongly want to keep
|
|
// it around.
|
|
app.lruWeight = app.lastActivityTime;
|
|
} else if (app.pubProviders.size() > 0) {
|
|
// If this process contains content providers, we want to keep
|
|
// it a little more strongly.
|
|
app.lruWeight = app.lastActivityTime - ProcessList.CONTENT_APP_IDLE_OFFSET;
|
|
// Also don't let it kick out the first few "real" hidden processes.
|
|
skipTop = ProcessList.MIN_HIDDEN_APPS;
|
|
} else {
|
|
// If this process doesn't have activities, we less strongly
|
|
// want to keep it around, and generally want to avoid getting
|
|
// in front of any very recently used activities.
|
|
app.lruWeight = app.lastActivityTime - ProcessList.EMPTY_APP_IDLE_OFFSET;
|
|
// Also don't let it kick out the first few "real" hidden processes.
|
|
skipTop = ProcessList.MIN_HIDDEN_APPS;
|
|
}
|
|
|
|
while (i >= 0) {
|
|
ProcessRecord p = mLruProcesses.get(i);
|
|
// If this app shouldn't be in front of the first N background
|
|
// apps, then skip over that many that are currently hidden.
|
|
if (skipTop > 0 && p.setAdj >= ProcessList.HIDDEN_APP_MIN_ADJ) {
|
|
skipTop--;
|
|
}
|
|
if (p.lruWeight <= app.lruWeight || i < bestPos) {
|
|
mLruProcesses.add(i+1, app);
|
|
break;
|
|
}
|
|
i--;
|
|
}
|
|
if (i < 0) {
|
|
mLruProcesses.add(0, app);
|
|
}
|
|
|
|
// If the app is currently using a content provider or service,
|
|
// bump those processes as well.
|
|
if (app.connections.size() > 0) {
|
|
for (ConnectionRecord cr : app.connections) {
|
|
if (cr.binding != null && cr.binding.service != null
|
|
&& cr.binding.service.app != null
|
|
&& cr.binding.service.app.lruSeq != mLruSeq) {
|
|
updateLruProcessInternalLocked(cr.binding.service.app, false,
|
|
updateActivityTime, i+1);
|
|
}
|
|
}
|
|
}
|
|
for (int j=app.conProviders.size()-1; j>=0; j--) {
|
|
ContentProviderRecord cpr = app.conProviders.get(j).provider;
|
|
if (cpr.proc != null && cpr.proc.lruSeq != mLruSeq) {
|
|
updateLruProcessInternalLocked(cpr.proc, false,
|
|
updateActivityTime, i+1);
|
|
}
|
|
}
|
|
|
|
//Slog.i(TAG, "Putting proc to front: " + app.processName);
|
|
if (oomAdj) {
|
|
updateOomAdjLocked();
|
|
}
|
|
}
|
|
|
|
final void updateLruProcessLocked(ProcessRecord app,
|
|
boolean oomAdj, boolean updateActivityTime) {
|
|
mLruSeq++;
|
|
updateLruProcessInternalLocked(app, oomAdj, updateActivityTime, 0);
|
|
}
|
|
|
|
final ProcessRecord getProcessRecordLocked(
|
|
String processName, int uid) {
|
|
if (uid == Process.SYSTEM_UID) {
|
|
// The system gets to run in any process. If there are multiple
|
|
// processes with the same uid, just pick the first (this
|
|
// should never happen).
|
|
SparseArray<ProcessRecord> procs = mProcessNames.getMap().get(
|
|
processName);
|
|
if (procs == null) return null;
|
|
final int N = procs.size();
|
|
for (int i = 0; i < N; i++) {
|
|
if (UserHandle.isSameUser(procs.keyAt(i), uid)) return procs.valueAt(i);
|
|
}
|
|
}
|
|
ProcessRecord proc = mProcessNames.get(processName, uid);
|
|
return proc;
|
|
}
|
|
|
|
void ensurePackageDexOpt(String packageName) {
|
|
IPackageManager pm = AppGlobals.getPackageManager();
|
|
try {
|
|
if (pm.performDexOpt(packageName)) {
|
|
mDidDexOpt = true;
|
|
}
|
|
} catch (RemoteException e) {
|
|
}
|
|
}
|
|
|
|
boolean isNextTransitionForward() {
|
|
int transit = mWindowManager.getPendingAppTransition();
|
|
return transit == WindowManagerPolicy.TRANSIT_ACTIVITY_OPEN
|
|
|| transit == WindowManagerPolicy.TRANSIT_TASK_OPEN
|
|
|| transit == WindowManagerPolicy.TRANSIT_TASK_TO_FRONT;
|
|
}
|
|
|
|
final ProcessRecord startProcessLocked(String processName,
|
|
ApplicationInfo info, boolean knownToBeDead, int intentFlags,
|
|
String hostingType, ComponentName hostingName, boolean allowWhileBooting,
|
|
boolean isolated) {
|
|
ProcessRecord app;
|
|
if (!isolated) {
|
|
app = getProcessRecordLocked(processName, info.uid);
|
|
} else {
|
|
// If this is an isolated process, it can't re-use an existing process.
|
|
app = null;
|
|
}
|
|
// We don't have to do anything more if:
|
|
// (1) There is an existing application record; and
|
|
// (2) The caller doesn't think it is dead, OR there is no thread
|
|
// object attached to it so we know it couldn't have crashed; and
|
|
// (3) There is a pid assigned to it, so it is either starting or
|
|
// already running.
|
|
if (DEBUG_PROCESSES) Slog.v(TAG, "startProcess: name=" + processName
|
|
+ " app=" + app + " knownToBeDead=" + knownToBeDead
|
|
+ " thread=" + (app != null ? app.thread : null)
|
|
+ " pid=" + (app != null ? app.pid : -1));
|
|
if (app != null && app.pid > 0) {
|
|
if (!knownToBeDead || app.thread == null) {
|
|
// We already have the app running, or are waiting for it to
|
|
// come up (we have a pid but not yet its thread), so keep it.
|
|
if (DEBUG_PROCESSES) Slog.v(TAG, "App already running: " + app);
|
|
// If this is a new package in the process, add the package to the list
|
|
app.addPackage(info.packageName);
|
|
return app;
|
|
} else {
|
|
// An application record is attached to a previous process,
|
|
// clean it up now.
|
|
if (DEBUG_PROCESSES) Slog.v(TAG, "App died: " + app);
|
|
handleAppDiedLocked(app, true, true);
|
|
}
|
|
}
|
|
|
|
String hostingNameStr = hostingName != null
|
|
? hostingName.flattenToShortString() : null;
|
|
|
|
if (!isolated) {
|
|
if ((intentFlags&Intent.FLAG_FROM_BACKGROUND) != 0) {
|
|
// If we are in the background, then check to see if this process
|
|
// is bad. If so, we will just silently fail.
|
|
if (mBadProcesses.get(info.processName, info.uid) != null) {
|
|
if (DEBUG_PROCESSES) Slog.v(TAG, "Bad process: " + info.uid
|
|
+ "/" + info.processName);
|
|
return null;
|
|
}
|
|
} else {
|
|
// When the user is explicitly starting a process, then clear its
|
|
// crash count so that we won't make it bad until they see at
|
|
// least one crash dialog again, and make the process good again
|
|
// if it had been bad.
|
|
if (DEBUG_PROCESSES) Slog.v(TAG, "Clearing bad process: " + info.uid
|
|
+ "/" + info.processName);
|
|
mProcessCrashTimes.remove(info.processName, info.uid);
|
|
if (mBadProcesses.get(info.processName, info.uid) != null) {
|
|
EventLog.writeEvent(EventLogTags.AM_PROC_GOOD, info.uid,
|
|
info.processName);
|
|
mBadProcesses.remove(info.processName, info.uid);
|
|
if (app != null) {
|
|
app.bad = false;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (app == null) {
|
|
app = newProcessRecordLocked(null, info, processName, isolated);
|
|
if (app == null) {
|
|
Slog.w(TAG, "Failed making new process record for "
|
|
+ processName + "/" + info.uid + " isolated=" + isolated);
|
|
return null;
|
|
}
|
|
mProcessNames.put(processName, app.uid, app);
|
|
if (isolated) {
|
|
mIsolatedProcesses.put(app.uid, app);
|
|
}
|
|
} else {
|
|
// If this is a new package in the process, add the package to the list
|
|
app.addPackage(info.packageName);
|
|
}
|
|
|
|
// If the system is not ready yet, then hold off on starting this
|
|
// process until it is.
|
|
if (!mProcessesReady
|
|
&& !isAllowedWhileBooting(info)
|
|
&& !allowWhileBooting) {
|
|
if (!mProcessesOnHold.contains(app)) {
|
|
mProcessesOnHold.add(app);
|
|
}
|
|
if (DEBUG_PROCESSES) Slog.v(TAG, "System not ready, putting on hold: " + app);
|
|
return app;
|
|
}
|
|
|
|
startProcessLocked(app, hostingType, hostingNameStr);
|
|
return (app.pid != 0) ? app : null;
|
|
}
|
|
|
|
boolean isAllowedWhileBooting(ApplicationInfo ai) {
|
|
return (ai.flags&ApplicationInfo.FLAG_PERSISTENT) != 0;
|
|
}
|
|
|
|
private final void startProcessLocked(ProcessRecord app,
|
|
String hostingType, String hostingNameStr) {
|
|
if (app.pid > 0 && app.pid != MY_PID) {
|
|
synchronized (mPidsSelfLocked) {
|
|
mPidsSelfLocked.remove(app.pid);
|
|
mHandler.removeMessages(PROC_START_TIMEOUT_MSG, app);
|
|
}
|
|
app.setPid(0);
|
|
}
|
|
|
|
if (DEBUG_PROCESSES && mProcessesOnHold.contains(app)) Slog.v(TAG,
|
|
"startProcessLocked removing on hold: " + app);
|
|
mProcessesOnHold.remove(app);
|
|
|
|
updateCpuStats();
|
|
|
|
System.arraycopy(mProcDeaths, 0, mProcDeaths, 1, mProcDeaths.length-1);
|
|
mProcDeaths[0] = 0;
|
|
|
|
try {
|
|
int uid = app.uid;
|
|
|
|
int[] gids = null;
|
|
int mountExternal = Zygote.MOUNT_EXTERNAL_NONE;
|
|
if (!app.isolated) {
|
|
try {
|
|
final PackageManager pm = mContext.getPackageManager();
|
|
gids = pm.getPackageGids(app.info.packageName);
|
|
} catch (PackageManager.NameNotFoundException e) {
|
|
Slog.w(TAG, "Unable to retrieve gids", e);
|
|
}
|
|
|
|
if (Environment.isExternalStorageEmulated()) {
|
|
mountExternal = Zygote.MOUNT_EXTERNAL_MULTIUSER;
|
|
}
|
|
}
|
|
if (mFactoryTest != SystemServer.FACTORY_TEST_OFF) {
|
|
if (mFactoryTest == SystemServer.FACTORY_TEST_LOW_LEVEL
|
|
&& mTopComponent != null
|
|
&& app.processName.equals(mTopComponent.getPackageName())) {
|
|
uid = 0;
|
|
}
|
|
if (mFactoryTest == SystemServer.FACTORY_TEST_HIGH_LEVEL
|
|
&& (app.info.flags&ApplicationInfo.FLAG_FACTORY_TEST) != 0) {
|
|
uid = 0;
|
|
}
|
|
}
|
|
int debugFlags = 0;
|
|
if ((app.info.flags & ApplicationInfo.FLAG_DEBUGGABLE) != 0) {
|
|
debugFlags |= Zygote.DEBUG_ENABLE_DEBUGGER;
|
|
// Also turn on CheckJNI for debuggable apps. It's quite
|
|
// awkward to turn on otherwise.
|
|
debugFlags |= Zygote.DEBUG_ENABLE_CHECKJNI;
|
|
}
|
|
// Run the app in safe mode if its manifest requests so or the
|
|
// system is booted in safe mode.
|
|
if ((app.info.flags & ApplicationInfo.FLAG_VM_SAFE_MODE) != 0 ||
|
|
Zygote.systemInSafeMode == true) {
|
|
debugFlags |= Zygote.DEBUG_ENABLE_SAFEMODE;
|
|
}
|
|
if ("1".equals(SystemProperties.get("debug.checkjni"))) {
|
|
debugFlags |= Zygote.DEBUG_ENABLE_CHECKJNI;
|
|
}
|
|
if ("1".equals(SystemProperties.get("debug.jni.logging"))) {
|
|
debugFlags |= Zygote.DEBUG_ENABLE_JNI_LOGGING;
|
|
}
|
|
if ("1".equals(SystemProperties.get("debug.assert"))) {
|
|
debugFlags |= Zygote.DEBUG_ENABLE_ASSERT;
|
|
}
|
|
|
|
// Start the process. It will either succeed and return a result containing
|
|
// the PID of the new process, or else throw a RuntimeException.
|
|
Process.ProcessStartResult startResult = Process.start("android.app.ActivityThread",
|
|
app.processName, uid, uid, gids, debugFlags, mountExternal,
|
|
app.info.targetSdkVersion, null, null);
|
|
|
|
BatteryStatsImpl bs = app.batteryStats.getBatteryStats();
|
|
synchronized (bs) {
|
|
if (bs.isOnBattery()) {
|
|
app.batteryStats.incStartsLocked();
|
|
}
|
|
}
|
|
|
|
EventLog.writeEvent(EventLogTags.AM_PROC_START, startResult.pid, uid,
|
|
app.processName, hostingType,
|
|
hostingNameStr != null ? hostingNameStr : "");
|
|
|
|
if (app.persistent) {
|
|
Watchdog.getInstance().processStarted(app.processName, startResult.pid);
|
|
}
|
|
|
|
StringBuilder buf = mStringBuilder;
|
|
buf.setLength(0);
|
|
buf.append("Start proc ");
|
|
buf.append(app.processName);
|
|
buf.append(" for ");
|
|
buf.append(hostingType);
|
|
if (hostingNameStr != null) {
|
|
buf.append(" ");
|
|
buf.append(hostingNameStr);
|
|
}
|
|
buf.append(": pid=");
|
|
buf.append(startResult.pid);
|
|
buf.append(" uid=");
|
|
buf.append(uid);
|
|
buf.append(" gids={");
|
|
if (gids != null) {
|
|
for (int gi=0; gi<gids.length; gi++) {
|
|
if (gi != 0) buf.append(", ");
|
|
buf.append(gids[gi]);
|
|
|
|
}
|
|
}
|
|
buf.append("}");
|
|
Slog.i(TAG, buf.toString());
|
|
app.setPid(startResult.pid);
|
|
app.usingWrapper = startResult.usingWrapper;
|
|
app.removed = false;
|
|
synchronized (mPidsSelfLocked) {
|
|
this.mPidsSelfLocked.put(startResult.pid, app);
|
|
Message msg = mHandler.obtainMessage(PROC_START_TIMEOUT_MSG);
|
|
msg.obj = app;
|
|
mHandler.sendMessageDelayed(msg, startResult.usingWrapper
|
|
? PROC_START_TIMEOUT_WITH_WRAPPER : PROC_START_TIMEOUT);
|
|
}
|
|
} catch (RuntimeException e) {
|
|
// XXX do better error recovery.
|
|
app.setPid(0);
|
|
Slog.e(TAG, "Failure starting process " + app.processName, e);
|
|
}
|
|
}
|
|
|
|
void updateUsageStats(ActivityRecord resumedComponent, boolean resumed) {
|
|
if (resumed) {
|
|
mUsageStatsService.noteResumeComponent(resumedComponent.realActivity);
|
|
} else {
|
|
mUsageStatsService.notePauseComponent(resumedComponent.realActivity);
|
|
}
|
|
}
|
|
|
|
boolean startHomeActivityLocked(int userId, UserStartedState startingUser) {
|
|
if (mHeadless) {
|
|
// Added because none of the other calls to ensureBootCompleted seem to fire
|
|
// when running headless.
|
|
ensureBootCompleted();
|
|
return false;
|
|
}
|
|
|
|
if (mFactoryTest == SystemServer.FACTORY_TEST_LOW_LEVEL
|
|
&& mTopAction == null) {
|
|
// We are running in factory test mode, but unable to find
|
|
// the factory test app, so just sit around displaying the
|
|
// error message and don't try to start anything.
|
|
return false;
|
|
}
|
|
Intent intent = new Intent(
|
|
mTopAction,
|
|
mTopData != null ? Uri.parse(mTopData) : null);
|
|
intent.setComponent(mTopComponent);
|
|
if (mFactoryTest != SystemServer.FACTORY_TEST_LOW_LEVEL) {
|
|
intent.addCategory(Intent.CATEGORY_HOME);
|
|
}
|
|
ActivityInfo aInfo =
|
|
intent.resolveActivityInfo(mContext.getPackageManager(),
|
|
STOCK_PM_FLAGS);
|
|
if (aInfo != null) {
|
|
intent.setComponent(new ComponentName(
|
|
aInfo.applicationInfo.packageName, aInfo.name));
|
|
// Don't do this if the home app is currently being
|
|
// instrumented.
|
|
aInfo = new ActivityInfo(aInfo);
|
|
aInfo.applicationInfo = getAppInfoForUser(aInfo.applicationInfo, userId);
|
|
ProcessRecord app = getProcessRecordLocked(aInfo.processName,
|
|
aInfo.applicationInfo.uid);
|
|
if (app == null || app.instrumentationClass == null) {
|
|
intent.setFlags(intent.getFlags() | Intent.FLAG_ACTIVITY_NEW_TASK);
|
|
mMainStack.startActivityLocked(null, intent, null, aInfo,
|
|
null, null, 0, 0, 0, 0, null, false, null);
|
|
}
|
|
}
|
|
if (startingUser != null) {
|
|
mMainStack.addStartingUserLocked(startingUser);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* Starts the "new version setup screen" if appropriate.
|
|
*/
|
|
void startSetupActivityLocked() {
|
|
// Only do this once per boot.
|
|
if (mCheckedForSetup) {
|
|
return;
|
|
}
|
|
|
|
// We will show this screen if the current one is a different
|
|
// version than the last one shown, and we are not running in
|
|
// low-level factory test mode.
|
|
final ContentResolver resolver = mContext.getContentResolver();
|
|
if (mFactoryTest != SystemServer.FACTORY_TEST_LOW_LEVEL &&
|
|
Settings.Secure.getInt(resolver,
|
|
Settings.Secure.DEVICE_PROVISIONED, 0) != 0) {
|
|
mCheckedForSetup = true;
|
|
|
|
// See if we should be showing the platform update setup UI.
|
|
Intent intent = new Intent(Intent.ACTION_UPGRADE_SETUP);
|
|
List<ResolveInfo> ris = mSelf.mContext.getPackageManager()
|
|
.queryIntentActivities(intent, PackageManager.GET_META_DATA);
|
|
|
|
// We don't allow third party apps to replace this.
|
|
ResolveInfo ri = null;
|
|
for (int i=0; ris != null && i<ris.size(); i++) {
|
|
if ((ris.get(i).activityInfo.applicationInfo.flags
|
|
& ApplicationInfo.FLAG_SYSTEM) != 0) {
|
|
ri = ris.get(i);
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (ri != null) {
|
|
String vers = ri.activityInfo.metaData != null
|
|
? ri.activityInfo.metaData.getString(Intent.METADATA_SETUP_VERSION)
|
|
: null;
|
|
if (vers == null && ri.activityInfo.applicationInfo.metaData != null) {
|
|
vers = ri.activityInfo.applicationInfo.metaData.getString(
|
|
Intent.METADATA_SETUP_VERSION);
|
|
}
|
|
String lastVers = Settings.Secure.getString(
|
|
resolver, Settings.Secure.LAST_SETUP_SHOWN);
|
|
if (vers != null && !vers.equals(lastVers)) {
|
|
intent.setFlags(Intent.FLAG_ACTIVITY_NEW_TASK);
|
|
intent.setComponent(new ComponentName(
|
|
ri.activityInfo.packageName, ri.activityInfo.name));
|
|
mMainStack.startActivityLocked(null, intent, null, ri.activityInfo,
|
|
null, null, 0, 0, 0, 0, null, false, null);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
CompatibilityInfo compatibilityInfoForPackageLocked(ApplicationInfo ai) {
|
|
return mCompatModePackages.compatibilityInfoForPackageLocked(ai);
|
|
}
|
|
|
|
void enforceNotIsolatedCaller(String caller) {
|
|
if (UserHandle.isIsolated(Binder.getCallingUid())) {
|
|
throw new SecurityException("Isolated process not allowed to call " + caller);
|
|
}
|
|
}
|
|
|
|
public int getFrontActivityScreenCompatMode() {
|
|
enforceNotIsolatedCaller("getFrontActivityScreenCompatMode");
|
|
synchronized (this) {
|
|
return mCompatModePackages.getFrontActivityScreenCompatModeLocked();
|
|
}
|
|
}
|
|
|
|
public void setFrontActivityScreenCompatMode(int mode) {
|
|
enforceCallingPermission(android.Manifest.permission.SET_SCREEN_COMPATIBILITY,
|
|
"setFrontActivityScreenCompatMode");
|
|
synchronized (this) {
|
|
mCompatModePackages.setFrontActivityScreenCompatModeLocked(mode);
|
|
}
|
|
}
|
|
|
|
public int getPackageScreenCompatMode(String packageName) {
|
|
enforceNotIsolatedCaller("getPackageScreenCompatMode");
|
|
synchronized (this) {
|
|
return mCompatModePackages.getPackageScreenCompatModeLocked(packageName);
|
|
}
|
|
}
|
|
|
|
public void setPackageScreenCompatMode(String packageName, int mode) {
|
|
enforceCallingPermission(android.Manifest.permission.SET_SCREEN_COMPATIBILITY,
|
|
"setPackageScreenCompatMode");
|
|
synchronized (this) {
|
|
mCompatModePackages.setPackageScreenCompatModeLocked(packageName, mode);
|
|
}
|
|
}
|
|
|
|
public boolean getPackageAskScreenCompat(String packageName) {
|
|
enforceNotIsolatedCaller("getPackageAskScreenCompat");
|
|
synchronized (this) {
|
|
return mCompatModePackages.getPackageAskCompatModeLocked(packageName);
|
|
}
|
|
}
|
|
|
|
public void setPackageAskScreenCompat(String packageName, boolean ask) {
|
|
enforceCallingPermission(android.Manifest.permission.SET_SCREEN_COMPATIBILITY,
|
|
"setPackageAskScreenCompat");
|
|
synchronized (this) {
|
|
mCompatModePackages.setPackageAskCompatModeLocked(packageName, ask);
|
|
}
|
|
}
|
|
|
|
void reportResumedActivityLocked(ActivityRecord r) {
|
|
//Slog.i(TAG, "**** REPORT RESUME: " + r);
|
|
updateUsageStats(r, true);
|
|
}
|
|
|
|
private void dispatchProcessesChanged() {
|
|
int N;
|
|
synchronized (this) {
|
|
N = mPendingProcessChanges.size();
|
|
if (mActiveProcessChanges.length < N) {
|
|
mActiveProcessChanges = new ProcessChangeItem[N];
|
|
}
|
|
mPendingProcessChanges.toArray(mActiveProcessChanges);
|
|
mAvailProcessChanges.addAll(mPendingProcessChanges);
|
|
mPendingProcessChanges.clear();
|
|
if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG, "*** Delivering " + N + " process changes");
|
|
}
|
|
int i = mProcessObservers.beginBroadcast();
|
|
while (i > 0) {
|
|
i--;
|
|
final IProcessObserver observer = mProcessObservers.getBroadcastItem(i);
|
|
if (observer != null) {
|
|
try {
|
|
for (int j=0; j<N; j++) {
|
|
ProcessChangeItem item = mActiveProcessChanges[j];
|
|
if ((item.changes&ProcessChangeItem.CHANGE_ACTIVITIES) != 0) {
|
|
if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG, "ACTIVITIES CHANGED pid="
|
|
+ item.pid + " uid=" + item.uid + ": "
|
|
+ item.foregroundActivities);
|
|
observer.onForegroundActivitiesChanged(item.pid, item.uid,
|
|
item.foregroundActivities);
|
|
}
|
|
if ((item.changes&ProcessChangeItem.CHANGE_IMPORTANCE) != 0) {
|
|
if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG, "IMPORTANCE CHANGED pid="
|
|
+ item.pid + " uid=" + item.uid + ": " + item.importance);
|
|
observer.onImportanceChanged(item.pid, item.uid,
|
|
item.importance);
|
|
}
|
|
}
|
|
} catch (RemoteException e) {
|
|
}
|
|
}
|
|
}
|
|
mProcessObservers.finishBroadcast();
|
|
}
|
|
|
|
private void dispatchProcessDied(int pid, int uid) {
|
|
int i = mProcessObservers.beginBroadcast();
|
|
while (i > 0) {
|
|
i--;
|
|
final IProcessObserver observer = mProcessObservers.getBroadcastItem(i);
|
|
if (observer != null) {
|
|
try {
|
|
observer.onProcessDied(pid, uid);
|
|
} catch (RemoteException e) {
|
|
}
|
|
}
|
|
}
|
|
mProcessObservers.finishBroadcast();
|
|
}
|
|
|
|
final void doPendingActivityLaunchesLocked(boolean doResume) {
|
|
final int N = mPendingActivityLaunches.size();
|
|
if (N <= 0) {
|
|
return;
|
|
}
|
|
for (int i=0; i<N; i++) {
|
|
PendingActivityLaunch pal = mPendingActivityLaunches.get(i);
|
|
mMainStack.startActivityUncheckedLocked(pal.r, pal.sourceRecord,
|
|
pal.startFlags, doResume && i == (N-1), null);
|
|
}
|
|
mPendingActivityLaunches.clear();
|
|
}
|
|
|
|
public final int startActivity(IApplicationThread caller,
|
|
Intent intent, String resolvedType, IBinder resultTo,
|
|
String resultWho, int requestCode, int startFlags,
|
|
String profileFile, ParcelFileDescriptor profileFd, Bundle options) {
|
|
return startActivityAsUser(caller, intent, resolvedType, resultTo, resultWho, requestCode,
|
|
startFlags, profileFile, profileFd, options, UserHandle.getCallingUserId());
|
|
}
|
|
|
|
public final int startActivityAsUser(IApplicationThread caller,
|
|
Intent intent, String resolvedType, IBinder resultTo,
|
|
String resultWho, int requestCode, int startFlags,
|
|
String profileFile, ParcelFileDescriptor profileFd, Bundle options, int userId) {
|
|
enforceNotIsolatedCaller("startActivity");
|
|
if (userId != UserHandle.getCallingUserId()) {
|
|
// Requesting a different user, make sure that they have the permission
|
|
if (checkComponentPermission(
|
|
android.Manifest.permission.INTERACT_ACROSS_USERS_FULL,
|
|
Binder.getCallingPid(), Binder.getCallingUid(), -1, true)
|
|
== PackageManager.PERMISSION_GRANTED) {
|
|
// Translate to the current user id, if caller wasn't aware
|
|
if (userId == UserHandle.USER_CURRENT) {
|
|
userId = mCurrentUserId;
|
|
}
|
|
} else {
|
|
String msg = "Permission Denial: "
|
|
+ "Request to startActivity as user " + userId
|
|
+ " but is calling from user " + UserHandle.getCallingUserId()
|
|
+ "; this requires "
|
|
+ android.Manifest.permission.INTERACT_ACROSS_USERS_FULL;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
} else {
|
|
if (intent.getCategories() != null
|
|
&& intent.getCategories().contains(Intent.CATEGORY_HOME)) {
|
|
// Requesting home, set the identity to the current user
|
|
// HACK!
|
|
userId = mCurrentUserId;
|
|
} else {
|
|
// TODO: Fix this in a better way - calls coming from SystemUI should probably carry
|
|
// the current user's userId
|
|
if (Binder.getCallingUid() < Process.FIRST_APPLICATION_UID) {
|
|
userId = 0;
|
|
} else {
|
|
userId = Binder.getOrigCallingUser();
|
|
}
|
|
}
|
|
}
|
|
return mMainStack.startActivityMayWait(caller, -1, intent, resolvedType,
|
|
resultTo, resultWho, requestCode, startFlags, profileFile, profileFd,
|
|
null, null, options, userId);
|
|
}
|
|
|
|
public final WaitResult startActivityAndWait(IApplicationThread caller,
|
|
Intent intent, String resolvedType, IBinder resultTo,
|
|
String resultWho, int requestCode, int startFlags, String profileFile,
|
|
ParcelFileDescriptor profileFd, Bundle options) {
|
|
enforceNotIsolatedCaller("startActivityAndWait");
|
|
WaitResult res = new WaitResult();
|
|
int userId = Binder.getOrigCallingUser();
|
|
mMainStack.startActivityMayWait(caller, -1, intent, resolvedType,
|
|
resultTo, resultWho, requestCode, startFlags, profileFile, profileFd,
|
|
res, null, options, userId);
|
|
return res;
|
|
}
|
|
|
|
public final int startActivityWithConfig(IApplicationThread caller,
|
|
Intent intent, String resolvedType, IBinder resultTo,
|
|
String resultWho, int requestCode, int startFlags, Configuration config,
|
|
Bundle options) {
|
|
enforceNotIsolatedCaller("startActivityWithConfig");
|
|
int ret = mMainStack.startActivityMayWait(caller, -1, intent, resolvedType,
|
|
resultTo, resultWho, requestCode, startFlags,
|
|
null, null, null, config, options, Binder.getOrigCallingUser());
|
|
return ret;
|
|
}
|
|
|
|
public int startActivityIntentSender(IApplicationThread caller,
|
|
IntentSender intent, Intent fillInIntent, String resolvedType,
|
|
IBinder resultTo, String resultWho, int requestCode,
|
|
int flagsMask, int flagsValues, Bundle options) {
|
|
enforceNotIsolatedCaller("startActivityIntentSender");
|
|
// Refuse possible leaked file descriptors
|
|
if (fillInIntent != null && fillInIntent.hasFileDescriptors()) {
|
|
throw new IllegalArgumentException("File descriptors passed in Intent");
|
|
}
|
|
|
|
IIntentSender sender = intent.getTarget();
|
|
if (!(sender instanceof PendingIntentRecord)) {
|
|
throw new IllegalArgumentException("Bad PendingIntent object");
|
|
}
|
|
|
|
PendingIntentRecord pir = (PendingIntentRecord)sender;
|
|
|
|
synchronized (this) {
|
|
// If this is coming from the currently resumed activity, it is
|
|
// effectively saying that app switches are allowed at this point.
|
|
if (mMainStack.mResumedActivity != null
|
|
&& mMainStack.mResumedActivity.info.applicationInfo.uid ==
|
|
Binder.getCallingUid()) {
|
|
mAppSwitchesAllowedTime = 0;
|
|
}
|
|
}
|
|
int ret = pir.sendInner(0, fillInIntent, resolvedType, null, null,
|
|
resultTo, resultWho, requestCode, flagsMask, flagsValues, options);
|
|
return ret;
|
|
}
|
|
|
|
public boolean startNextMatchingActivity(IBinder callingActivity,
|
|
Intent intent, Bundle options) {
|
|
// Refuse possible leaked file descriptors
|
|
if (intent != null && intent.hasFileDescriptors() == true) {
|
|
throw new IllegalArgumentException("File descriptors passed in Intent");
|
|
}
|
|
|
|
synchronized (this) {
|
|
ActivityRecord r = mMainStack.isInStackLocked(callingActivity);
|
|
if (r == null) {
|
|
ActivityOptions.abort(options);
|
|
return false;
|
|
}
|
|
if (r.app == null || r.app.thread == null) {
|
|
// The caller is not running... d'oh!
|
|
ActivityOptions.abort(options);
|
|
return false;
|
|
}
|
|
intent = new Intent(intent);
|
|
// The caller is not allowed to change the data.
|
|
intent.setDataAndType(r.intent.getData(), r.intent.getType());
|
|
// And we are resetting to find the next component...
|
|
intent.setComponent(null);
|
|
|
|
ActivityInfo aInfo = null;
|
|
try {
|
|
List<ResolveInfo> resolves =
|
|
AppGlobals.getPackageManager().queryIntentActivities(
|
|
intent, r.resolvedType,
|
|
PackageManager.MATCH_DEFAULT_ONLY | STOCK_PM_FLAGS,
|
|
UserHandle.getCallingUserId());
|
|
|
|
// Look for the original activity in the list...
|
|
final int N = resolves != null ? resolves.size() : 0;
|
|
for (int i=0; i<N; i++) {
|
|
ResolveInfo rInfo = resolves.get(i);
|
|
if (rInfo.activityInfo.packageName.equals(r.packageName)
|
|
&& rInfo.activityInfo.name.equals(r.info.name)) {
|
|
// We found the current one... the next matching is
|
|
// after it.
|
|
i++;
|
|
if (i<N) {
|
|
aInfo = resolves.get(i).activityInfo;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
} catch (RemoteException e) {
|
|
}
|
|
|
|
if (aInfo == null) {
|
|
// Nobody who is next!
|
|
ActivityOptions.abort(options);
|
|
return false;
|
|
}
|
|
|
|
intent.setComponent(new ComponentName(
|
|
aInfo.applicationInfo.packageName, aInfo.name));
|
|
intent.setFlags(intent.getFlags()&~(
|
|
Intent.FLAG_ACTIVITY_FORWARD_RESULT|
|
|
Intent.FLAG_ACTIVITY_CLEAR_TOP|
|
|
Intent.FLAG_ACTIVITY_MULTIPLE_TASK|
|
|
Intent.FLAG_ACTIVITY_NEW_TASK));
|
|
|
|
// Okay now we need to start the new activity, replacing the
|
|
// currently running activity. This is a little tricky because
|
|
// we want to start the new one as if the current one is finished,
|
|
// but not finish the current one first so that there is no flicker.
|
|
// And thus...
|
|
final boolean wasFinishing = r.finishing;
|
|
r.finishing = true;
|
|
|
|
// Propagate reply information over to the new activity.
|
|
final ActivityRecord resultTo = r.resultTo;
|
|
final String resultWho = r.resultWho;
|
|
final int requestCode = r.requestCode;
|
|
r.resultTo = null;
|
|
if (resultTo != null) {
|
|
resultTo.removeResultsLocked(r, resultWho, requestCode);
|
|
}
|
|
|
|
final long origId = Binder.clearCallingIdentity();
|
|
int res = mMainStack.startActivityLocked(r.app.thread, intent,
|
|
r.resolvedType, aInfo, resultTo != null ? resultTo.appToken : null,
|
|
resultWho, requestCode, -1, r.launchedFromUid, 0,
|
|
options, false, null);
|
|
Binder.restoreCallingIdentity(origId);
|
|
|
|
r.finishing = wasFinishing;
|
|
if (res != ActivityManager.START_SUCCESS) {
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
}
|
|
|
|
public final int startActivityInPackage(int uid,
|
|
Intent intent, String resolvedType, IBinder resultTo,
|
|
String resultWho, int requestCode, int startFlags, Bundle options) {
|
|
|
|
// This is so super not safe, that only the system (or okay root)
|
|
// can do it.
|
|
final int callingUid = Binder.getCallingUid();
|
|
if (callingUid != 0 && callingUid != Process.myUid()) {
|
|
throw new SecurityException(
|
|
"startActivityInPackage only available to the system");
|
|
}
|
|
|
|
int ret = mMainStack.startActivityMayWait(null, uid, intent, resolvedType,
|
|
resultTo, resultWho, requestCode, startFlags,
|
|
null, null, null, null, options, UserHandle.getUserId(uid));
|
|
return ret;
|
|
}
|
|
|
|
public final int startActivities(IApplicationThread caller,
|
|
Intent[] intents, String[] resolvedTypes, IBinder resultTo, Bundle options) {
|
|
enforceNotIsolatedCaller("startActivities");
|
|
int ret = mMainStack.startActivities(caller, -1, intents, resolvedTypes, resultTo,
|
|
options, Binder.getOrigCallingUser());
|
|
return ret;
|
|
}
|
|
|
|
public final int startActivitiesInPackage(int uid,
|
|
Intent[] intents, String[] resolvedTypes, IBinder resultTo,
|
|
Bundle options) {
|
|
|
|
// This is so super not safe, that only the system (or okay root)
|
|
// can do it.
|
|
final int callingUid = Binder.getCallingUid();
|
|
if (callingUid != 0 && callingUid != Process.myUid()) {
|
|
throw new SecurityException(
|
|
"startActivityInPackage only available to the system");
|
|
}
|
|
int ret = mMainStack.startActivities(null, uid, intents, resolvedTypes, resultTo,
|
|
options, UserHandle.getUserId(uid));
|
|
return ret;
|
|
}
|
|
|
|
final void addRecentTaskLocked(TaskRecord task) {
|
|
int N = mRecentTasks.size();
|
|
// Quick case: check if the top-most recent task is the same.
|
|
if (N > 0 && mRecentTasks.get(0) == task) {
|
|
return;
|
|
}
|
|
// Remove any existing entries that are the same kind of task.
|
|
for (int i=0; i<N; i++) {
|
|
TaskRecord tr = mRecentTasks.get(i);
|
|
if (task.userId == tr.userId
|
|
&& ((task.affinity != null && task.affinity.equals(tr.affinity))
|
|
|| (task.intent != null && task.intent.filterEquals(tr.intent)))) {
|
|
mRecentTasks.remove(i);
|
|
i--;
|
|
N--;
|
|
if (task.intent == null) {
|
|
// If the new recent task we are adding is not fully
|
|
// specified, then replace it with the existing recent task.
|
|
task = tr;
|
|
}
|
|
}
|
|
}
|
|
if (N >= MAX_RECENT_TASKS) {
|
|
mRecentTasks.remove(N-1);
|
|
}
|
|
mRecentTasks.add(0, task);
|
|
}
|
|
|
|
public void setRequestedOrientation(IBinder token,
|
|
int requestedOrientation) {
|
|
synchronized (this) {
|
|
ActivityRecord r = mMainStack.isInStackLocked(token);
|
|
if (r == null) {
|
|
return;
|
|
}
|
|
final long origId = Binder.clearCallingIdentity();
|
|
mWindowManager.setAppOrientation(r.appToken, requestedOrientation);
|
|
Configuration config = mWindowManager.updateOrientationFromAppTokens(
|
|
mConfiguration,
|
|
r.mayFreezeScreenLocked(r.app) ? r.appToken : null);
|
|
if (config != null) {
|
|
r.frozenBeforeDestroy = true;
|
|
if (!updateConfigurationLocked(config, r, false, false)) {
|
|
mMainStack.resumeTopActivityLocked(null);
|
|
}
|
|
}
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
}
|
|
|
|
public int getRequestedOrientation(IBinder token) {
|
|
synchronized (this) {
|
|
ActivityRecord r = mMainStack.isInStackLocked(token);
|
|
if (r == null) {
|
|
return ActivityInfo.SCREEN_ORIENTATION_UNSPECIFIED;
|
|
}
|
|
return mWindowManager.getAppOrientation(r.appToken);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* This is the internal entry point for handling Activity.finish().
|
|
*
|
|
* @param token The Binder token referencing the Activity we want to finish.
|
|
* @param resultCode Result code, if any, from this Activity.
|
|
* @param resultData Result data (Intent), if any, from this Activity.
|
|
*
|
|
* @return Returns true if the activity successfully finished, or false if it is still running.
|
|
*/
|
|
public final boolean finishActivity(IBinder token, int resultCode, Intent resultData) {
|
|
// Refuse possible leaked file descriptors
|
|
if (resultData != null && resultData.hasFileDescriptors() == true) {
|
|
throw new IllegalArgumentException("File descriptors passed in Intent");
|
|
}
|
|
|
|
synchronized(this) {
|
|
if (mController != null) {
|
|
// Find the first activity that is not finishing.
|
|
ActivityRecord next = mMainStack.topRunningActivityLocked(token, 0);
|
|
if (next != null) {
|
|
// ask watcher if this is allowed
|
|
boolean resumeOK = true;
|
|
try {
|
|
resumeOK = mController.activityResuming(next.packageName);
|
|
} catch (RemoteException e) {
|
|
mController = null;
|
|
}
|
|
|
|
if (!resumeOK) {
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
final long origId = Binder.clearCallingIdentity();
|
|
boolean res = mMainStack.requestFinishActivityLocked(token, resultCode,
|
|
resultData, "app-request");
|
|
Binder.restoreCallingIdentity(origId);
|
|
return res;
|
|
}
|
|
}
|
|
|
|
public final void finishHeavyWeightApp() {
|
|
if (checkCallingPermission(android.Manifest.permission.FORCE_STOP_PACKAGES)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
String msg = "Permission Denial: finishHeavyWeightApp() from pid="
|
|
+ Binder.getCallingPid()
|
|
+ ", uid=" + Binder.getCallingUid()
|
|
+ " requires " + android.Manifest.permission.FORCE_STOP_PACKAGES;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
|
|
synchronized(this) {
|
|
if (mHeavyWeightProcess == null) {
|
|
return;
|
|
}
|
|
|
|
ArrayList<ActivityRecord> activities = new ArrayList<ActivityRecord>(
|
|
mHeavyWeightProcess.activities);
|
|
for (int i=0; i<activities.size(); i++) {
|
|
ActivityRecord r = activities.get(i);
|
|
if (!r.finishing) {
|
|
int index = mMainStack.indexOfTokenLocked(r.appToken);
|
|
if (index >= 0) {
|
|
mMainStack.finishActivityLocked(r, index, Activity.RESULT_CANCELED,
|
|
null, "finish-heavy");
|
|
}
|
|
}
|
|
}
|
|
|
|
mHeavyWeightProcess = null;
|
|
mHandler.sendEmptyMessage(CANCEL_HEAVY_NOTIFICATION_MSG);
|
|
}
|
|
}
|
|
|
|
public void crashApplication(int uid, int initialPid, String packageName,
|
|
String message) {
|
|
if (checkCallingPermission(android.Manifest.permission.FORCE_STOP_PACKAGES)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
String msg = "Permission Denial: crashApplication() from pid="
|
|
+ Binder.getCallingPid()
|
|
+ ", uid=" + Binder.getCallingUid()
|
|
+ " requires " + android.Manifest.permission.FORCE_STOP_PACKAGES;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
|
|
synchronized(this) {
|
|
ProcessRecord proc = null;
|
|
|
|
// Figure out which process to kill. We don't trust that initialPid
|
|
// still has any relation to current pids, so must scan through the
|
|
// list.
|
|
synchronized (mPidsSelfLocked) {
|
|
for (int i=0; i<mPidsSelfLocked.size(); i++) {
|
|
ProcessRecord p = mPidsSelfLocked.valueAt(i);
|
|
if (p.uid != uid) {
|
|
continue;
|
|
}
|
|
if (p.pid == initialPid) {
|
|
proc = p;
|
|
break;
|
|
}
|
|
for (String str : p.pkgList) {
|
|
if (str.equals(packageName)) {
|
|
proc = p;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (proc == null) {
|
|
Slog.w(TAG, "crashApplication: nothing for uid=" + uid
|
|
+ " initialPid=" + initialPid
|
|
+ " packageName=" + packageName);
|
|
return;
|
|
}
|
|
|
|
if (proc.thread != null) {
|
|
if (proc.pid == Process.myPid()) {
|
|
Log.w(TAG, "crashApplication: trying to crash self!");
|
|
return;
|
|
}
|
|
long ident = Binder.clearCallingIdentity();
|
|
try {
|
|
proc.thread.scheduleCrash(message);
|
|
} catch (RemoteException e) {
|
|
}
|
|
Binder.restoreCallingIdentity(ident);
|
|
}
|
|
}
|
|
}
|
|
|
|
public final void finishSubActivity(IBinder token, String resultWho,
|
|
int requestCode) {
|
|
synchronized(this) {
|
|
final long origId = Binder.clearCallingIdentity();
|
|
mMainStack.finishSubActivityLocked(token, resultWho, requestCode);
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
}
|
|
|
|
public boolean finishActivityAffinity(IBinder token) {
|
|
synchronized(this) {
|
|
final long origId = Binder.clearCallingIdentity();
|
|
boolean res = mMainStack.finishActivityAffinityLocked(token);
|
|
Binder.restoreCallingIdentity(origId);
|
|
return res;
|
|
}
|
|
}
|
|
|
|
public boolean willActivityBeVisible(IBinder token) {
|
|
synchronized(this) {
|
|
int i;
|
|
for (i=mMainStack.mHistory.size()-1; i>=0; i--) {
|
|
ActivityRecord r = (ActivityRecord)mMainStack.mHistory.get(i);
|
|
if (r.appToken == token) {
|
|
return true;
|
|
}
|
|
if (r.fullscreen && !r.finishing) {
|
|
return false;
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
}
|
|
|
|
public void overridePendingTransition(IBinder token, String packageName,
|
|
int enterAnim, int exitAnim) {
|
|
synchronized(this) {
|
|
ActivityRecord self = mMainStack.isInStackLocked(token);
|
|
if (self == null) {
|
|
return;
|
|
}
|
|
|
|
final long origId = Binder.clearCallingIdentity();
|
|
|
|
if (self.state == ActivityState.RESUMED
|
|
|| self.state == ActivityState.PAUSING) {
|
|
mWindowManager.overridePendingAppTransition(packageName,
|
|
enterAnim, exitAnim, null);
|
|
}
|
|
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Main function for removing an existing process from the activity manager
|
|
* as a result of that process going away. Clears out all connections
|
|
* to the process.
|
|
*/
|
|
private final void handleAppDiedLocked(ProcessRecord app,
|
|
boolean restarting, boolean allowRestart) {
|
|
cleanUpApplicationRecordLocked(app, restarting, allowRestart, -1);
|
|
if (!restarting) {
|
|
mLruProcesses.remove(app);
|
|
}
|
|
|
|
if (mProfileProc == app) {
|
|
clearProfilerLocked();
|
|
}
|
|
|
|
// Just in case...
|
|
if (mMainStack.mPausingActivity != null && mMainStack.mPausingActivity.app == app) {
|
|
if (DEBUG_PAUSE) Slog.v(TAG, "App died while pausing: " +mMainStack.mPausingActivity);
|
|
mMainStack.mPausingActivity = null;
|
|
}
|
|
if (mMainStack.mLastPausedActivity != null && mMainStack.mLastPausedActivity.app == app) {
|
|
mMainStack.mLastPausedActivity = null;
|
|
}
|
|
|
|
// Remove this application's activities from active lists.
|
|
mMainStack.removeHistoryRecordsForAppLocked(app);
|
|
|
|
boolean atTop = true;
|
|
boolean hasVisibleActivities = false;
|
|
|
|
// Clean out the history list.
|
|
int i = mMainStack.mHistory.size();
|
|
if (localLOGV) Slog.v(
|
|
TAG, "Removing app " + app + " from history with " + i + " entries");
|
|
while (i > 0) {
|
|
i--;
|
|
ActivityRecord r = (ActivityRecord)mMainStack.mHistory.get(i);
|
|
if (localLOGV) Slog.v(
|
|
TAG, "Record #" + i + " " + r + ": app=" + r.app);
|
|
if (r.app == app) {
|
|
if ((!r.haveState && !r.stateNotNeeded) || r.finishing) {
|
|
if (ActivityStack.DEBUG_ADD_REMOVE) {
|
|
RuntimeException here = new RuntimeException("here");
|
|
here.fillInStackTrace();
|
|
Slog.i(TAG, "Removing activity " + r + " from stack at " + i
|
|
+ ": haveState=" + r.haveState
|
|
+ " stateNotNeeded=" + r.stateNotNeeded
|
|
+ " finishing=" + r.finishing
|
|
+ " state=" + r.state, here);
|
|
}
|
|
if (!r.finishing) {
|
|
Slog.w(TAG, "Force removing " + r + ": app died, no saved state");
|
|
EventLog.writeEvent(EventLogTags.AM_FINISH_ACTIVITY,
|
|
System.identityHashCode(r),
|
|
r.task.taskId, r.shortComponentName,
|
|
"proc died without state saved");
|
|
}
|
|
mMainStack.removeActivityFromHistoryLocked(r);
|
|
|
|
} else {
|
|
// We have the current state for this activity, so
|
|
// it can be restarted later when needed.
|
|
if (localLOGV) Slog.v(
|
|
TAG, "Keeping entry, setting app to null");
|
|
if (r.visible) {
|
|
hasVisibleActivities = true;
|
|
}
|
|
r.app = null;
|
|
r.nowVisible = false;
|
|
if (!r.haveState) {
|
|
if (ActivityStack.DEBUG_SAVED_STATE) Slog.i(TAG,
|
|
"App died, clearing saved state of " + r);
|
|
r.icicle = null;
|
|
}
|
|
}
|
|
|
|
r.stack.cleanUpActivityLocked(r, true, true);
|
|
}
|
|
atTop = false;
|
|
}
|
|
|
|
app.activities.clear();
|
|
|
|
if (app.instrumentationClass != null) {
|
|
Slog.w(TAG, "Crash of app " + app.processName
|
|
+ " running instrumentation " + app.instrumentationClass);
|
|
Bundle info = new Bundle();
|
|
info.putString("shortMsg", "Process crashed.");
|
|
finishInstrumentationLocked(app, Activity.RESULT_CANCELED, info);
|
|
}
|
|
|
|
if (!restarting) {
|
|
if (!mMainStack.resumeTopActivityLocked(null)) {
|
|
// If there was nothing to resume, and we are not already
|
|
// restarting this process, but there is a visible activity that
|
|
// is hosted by the process... then make sure all visible
|
|
// activities are running, taking care of restarting this
|
|
// process.
|
|
if (hasVisibleActivities) {
|
|
mMainStack.ensureActivitiesVisibleLocked(null, 0);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
private final int getLRURecordIndexForAppLocked(IApplicationThread thread) {
|
|
IBinder threadBinder = thread.asBinder();
|
|
// Find the application record.
|
|
for (int i=mLruProcesses.size()-1; i>=0; i--) {
|
|
ProcessRecord rec = mLruProcesses.get(i);
|
|
if (rec.thread != null && rec.thread.asBinder() == threadBinder) {
|
|
return i;
|
|
}
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
final ProcessRecord getRecordForAppLocked(
|
|
IApplicationThread thread) {
|
|
if (thread == null) {
|
|
return null;
|
|
}
|
|
|
|
int appIndex = getLRURecordIndexForAppLocked(thread);
|
|
return appIndex >= 0 ? mLruProcesses.get(appIndex) : null;
|
|
}
|
|
|
|
final void appDiedLocked(ProcessRecord app, int pid,
|
|
IApplicationThread thread) {
|
|
|
|
mProcDeaths[0]++;
|
|
|
|
BatteryStatsImpl stats = mBatteryStatsService.getActiveStatistics();
|
|
synchronized (stats) {
|
|
stats.noteProcessDiedLocked(app.info.uid, pid);
|
|
}
|
|
|
|
// Clean up already done if the process has been re-started.
|
|
if (app.pid == pid && app.thread != null &&
|
|
app.thread.asBinder() == thread.asBinder()) {
|
|
if (!app.killedBackground) {
|
|
Slog.i(TAG, "Process " + app.processName + " (pid " + pid
|
|
+ ") has died.");
|
|
}
|
|
EventLog.writeEvent(EventLogTags.AM_PROC_DIED, app.pid, app.processName);
|
|
if (localLOGV) Slog.v(
|
|
TAG, "Dying app: " + app + ", pid: " + pid
|
|
+ ", thread: " + thread.asBinder());
|
|
boolean doLowMem = app.instrumentationClass == null;
|
|
handleAppDiedLocked(app, false, true);
|
|
|
|
if (doLowMem) {
|
|
// If there are no longer any background processes running,
|
|
// and the app that died was not running instrumentation,
|
|
// then tell everyone we are now low on memory.
|
|
boolean haveBg = false;
|
|
for (int i=mLruProcesses.size()-1; i>=0; i--) {
|
|
ProcessRecord rec = mLruProcesses.get(i);
|
|
if (rec.thread != null && rec.setAdj >= ProcessList.HIDDEN_APP_MIN_ADJ) {
|
|
haveBg = true;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (!haveBg) {
|
|
EventLog.writeEvent(EventLogTags.AM_LOW_MEMORY, mLruProcesses.size());
|
|
long now = SystemClock.uptimeMillis();
|
|
for (int i=mLruProcesses.size()-1; i>=0; i--) {
|
|
ProcessRecord rec = mLruProcesses.get(i);
|
|
if (rec != app && rec.thread != null &&
|
|
(rec.lastLowMemory+GC_MIN_INTERVAL) <= now) {
|
|
// The low memory report is overriding any current
|
|
// state for a GC request. Make sure to do
|
|
// heavy/important/visible/foreground processes first.
|
|
if (rec.setAdj <= ProcessList.HEAVY_WEIGHT_APP_ADJ) {
|
|
rec.lastRequestedGc = 0;
|
|
} else {
|
|
rec.lastRequestedGc = rec.lastLowMemory;
|
|
}
|
|
rec.reportLowMemory = true;
|
|
rec.lastLowMemory = now;
|
|
mProcessesToGc.remove(rec);
|
|
addProcessToGcListLocked(rec);
|
|
}
|
|
}
|
|
mHandler.sendEmptyMessage(REPORT_MEM_USAGE);
|
|
scheduleAppGcsLocked();
|
|
}
|
|
}
|
|
} else if (app.pid != pid) {
|
|
// A new process has already been started.
|
|
Slog.i(TAG, "Process " + app.processName + " (pid " + pid
|
|
+ ") has died and restarted (pid " + app.pid + ").");
|
|
EventLog.writeEvent(EventLogTags.AM_PROC_DIED, app.pid, app.processName);
|
|
} else if (DEBUG_PROCESSES) {
|
|
Slog.d(TAG, "Received spurious death notification for thread "
|
|
+ thread.asBinder());
|
|
}
|
|
}
|
|
|
|
/**
|
|
* If a stack trace dump file is configured, dump process stack traces.
|
|
* @param clearTraces causes the dump file to be erased prior to the new
|
|
* traces being written, if true; when false, the new traces will be
|
|
* appended to any existing file content.
|
|
* @param firstPids of dalvik VM processes to dump stack traces for first
|
|
* @param lastPids of dalvik VM processes to dump stack traces for last
|
|
* @param nativeProcs optional list of native process names to dump stack crawls
|
|
* @return file containing stack traces, or null if no dump file is configured
|
|
*/
|
|
public static File dumpStackTraces(boolean clearTraces, ArrayList<Integer> firstPids,
|
|
ProcessStats processStats, SparseArray<Boolean> lastPids, String[] nativeProcs) {
|
|
String tracesPath = SystemProperties.get("dalvik.vm.stack-trace-file", null);
|
|
if (tracesPath == null || tracesPath.length() == 0) {
|
|
return null;
|
|
}
|
|
|
|
File tracesFile = new File(tracesPath);
|
|
try {
|
|
File tracesDir = tracesFile.getParentFile();
|
|
if (!tracesDir.exists()) {
|
|
tracesFile.mkdirs();
|
|
if (!SELinux.restorecon(tracesDir)) {
|
|
return null;
|
|
}
|
|
}
|
|
FileUtils.setPermissions(tracesDir.getPath(), 0775, -1, -1); // drwxrwxr-x
|
|
|
|
if (clearTraces && tracesFile.exists()) tracesFile.delete();
|
|
tracesFile.createNewFile();
|
|
FileUtils.setPermissions(tracesFile.getPath(), 0666, -1, -1); // -rw-rw-rw-
|
|
} catch (IOException e) {
|
|
Slog.w(TAG, "Unable to prepare ANR traces file: " + tracesPath, e);
|
|
return null;
|
|
}
|
|
|
|
dumpStackTraces(tracesPath, firstPids, processStats, lastPids, nativeProcs);
|
|
return tracesFile;
|
|
}
|
|
|
|
private static void dumpStackTraces(String tracesPath, ArrayList<Integer> firstPids,
|
|
ProcessStats processStats, SparseArray<Boolean> lastPids, String[] nativeProcs) {
|
|
// Use a FileObserver to detect when traces finish writing.
|
|
// The order of traces is considered important to maintain for legibility.
|
|
FileObserver observer = new FileObserver(tracesPath, FileObserver.CLOSE_WRITE) {
|
|
public synchronized void onEvent(int event, String path) { notify(); }
|
|
};
|
|
|
|
try {
|
|
observer.startWatching();
|
|
|
|
// First collect all of the stacks of the most important pids.
|
|
if (firstPids != null) {
|
|
try {
|
|
int num = firstPids.size();
|
|
for (int i = 0; i < num; i++) {
|
|
synchronized (observer) {
|
|
Process.sendSignal(firstPids.get(i), Process.SIGNAL_QUIT);
|
|
observer.wait(200); // Wait for write-close, give up after 200msec
|
|
}
|
|
}
|
|
} catch (InterruptedException e) {
|
|
Log.wtf(TAG, e);
|
|
}
|
|
}
|
|
|
|
// Next measure CPU usage.
|
|
if (processStats != null) {
|
|
processStats.init();
|
|
System.gc();
|
|
processStats.update();
|
|
try {
|
|
synchronized (processStats) {
|
|
processStats.wait(500); // measure over 1/2 second.
|
|
}
|
|
} catch (InterruptedException e) {
|
|
}
|
|
processStats.update();
|
|
|
|
// We'll take the stack crawls of just the top apps using CPU.
|
|
final int N = processStats.countWorkingStats();
|
|
int numProcs = 0;
|
|
for (int i=0; i<N && numProcs<5; i++) {
|
|
ProcessStats.Stats stats = processStats.getWorkingStats(i);
|
|
if (lastPids.indexOfKey(stats.pid) >= 0) {
|
|
numProcs++;
|
|
try {
|
|
synchronized (observer) {
|
|
Process.sendSignal(stats.pid, Process.SIGNAL_QUIT);
|
|
observer.wait(200); // Wait for write-close, give up after 200msec
|
|
}
|
|
} catch (InterruptedException e) {
|
|
Log.wtf(TAG, e);
|
|
}
|
|
|
|
}
|
|
}
|
|
}
|
|
|
|
} finally {
|
|
observer.stopWatching();
|
|
}
|
|
|
|
if (nativeProcs != null) {
|
|
int[] pids = Process.getPidsForCommands(nativeProcs);
|
|
if (pids != null) {
|
|
for (int pid : pids) {
|
|
Debug.dumpNativeBacktraceToFile(pid, tracesPath);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
final void logAppTooSlow(ProcessRecord app, long startTime, String msg) {
|
|
if (true || IS_USER_BUILD) {
|
|
return;
|
|
}
|
|
String tracesPath = SystemProperties.get("dalvik.vm.stack-trace-file", null);
|
|
if (tracesPath == null || tracesPath.length() == 0) {
|
|
return;
|
|
}
|
|
|
|
StrictMode.ThreadPolicy oldPolicy = StrictMode.allowThreadDiskReads();
|
|
StrictMode.allowThreadDiskWrites();
|
|
try {
|
|
final File tracesFile = new File(tracesPath);
|
|
final File tracesDir = tracesFile.getParentFile();
|
|
final File tracesTmp = new File(tracesDir, "__tmp__");
|
|
try {
|
|
if (!tracesDir.exists()) {
|
|
tracesFile.mkdirs();
|
|
if (!SELinux.restorecon(tracesDir.getPath())) {
|
|
return;
|
|
}
|
|
}
|
|
FileUtils.setPermissions(tracesDir.getPath(), 0775, -1, -1); // drwxrwxr-x
|
|
|
|
if (tracesFile.exists()) {
|
|
tracesTmp.delete();
|
|
tracesFile.renameTo(tracesTmp);
|
|
}
|
|
StringBuilder sb = new StringBuilder();
|
|
Time tobj = new Time();
|
|
tobj.set(System.currentTimeMillis());
|
|
sb.append(tobj.format("%Y-%m-%d %H:%M:%S"));
|
|
sb.append(": ");
|
|
TimeUtils.formatDuration(SystemClock.uptimeMillis()-startTime, sb);
|
|
sb.append(" since ");
|
|
sb.append(msg);
|
|
FileOutputStream fos = new FileOutputStream(tracesFile);
|
|
fos.write(sb.toString().getBytes());
|
|
if (app == null) {
|
|
fos.write("\n*** No application process!".getBytes());
|
|
}
|
|
fos.close();
|
|
FileUtils.setPermissions(tracesFile.getPath(), 0666, -1, -1); // -rw-rw-rw-
|
|
} catch (IOException e) {
|
|
Slog.w(TAG, "Unable to prepare slow app traces file: " + tracesPath, e);
|
|
return;
|
|
}
|
|
|
|
if (app != null) {
|
|
ArrayList<Integer> firstPids = new ArrayList<Integer>();
|
|
firstPids.add(app.pid);
|
|
dumpStackTraces(tracesPath, firstPids, null, null, null);
|
|
}
|
|
|
|
File lastTracesFile = null;
|
|
File curTracesFile = null;
|
|
for (int i=9; i>=0; i--) {
|
|
String name = String.format("slow%02d.txt", i);
|
|
curTracesFile = new File(tracesDir, name);
|
|
if (curTracesFile.exists()) {
|
|
if (lastTracesFile != null) {
|
|
curTracesFile.renameTo(lastTracesFile);
|
|
} else {
|
|
curTracesFile.delete();
|
|
}
|
|
}
|
|
lastTracesFile = curTracesFile;
|
|
}
|
|
tracesFile.renameTo(curTracesFile);
|
|
if (tracesTmp.exists()) {
|
|
tracesTmp.renameTo(tracesFile);
|
|
}
|
|
} finally {
|
|
StrictMode.setThreadPolicy(oldPolicy);
|
|
}
|
|
}
|
|
|
|
final void appNotResponding(ProcessRecord app, ActivityRecord activity,
|
|
ActivityRecord parent, final String annotation) {
|
|
ArrayList<Integer> firstPids = new ArrayList<Integer>(5);
|
|
SparseArray<Boolean> lastPids = new SparseArray<Boolean>(20);
|
|
|
|
if (mController != null) {
|
|
try {
|
|
// 0 == continue, -1 = kill process immediately
|
|
int res = mController.appEarlyNotResponding(app.processName, app.pid, annotation);
|
|
if (res < 0 && app.pid != MY_PID) Process.killProcess(app.pid);
|
|
} catch (RemoteException e) {
|
|
mController = null;
|
|
}
|
|
}
|
|
|
|
long anrTime = SystemClock.uptimeMillis();
|
|
if (MONITOR_CPU_USAGE) {
|
|
updateCpuStatsNow();
|
|
}
|
|
|
|
synchronized (this) {
|
|
// PowerManager.reboot() can block for a long time, so ignore ANRs while shutting down.
|
|
if (mShuttingDown) {
|
|
Slog.i(TAG, "During shutdown skipping ANR: " + app + " " + annotation);
|
|
return;
|
|
} else if (app.notResponding) {
|
|
Slog.i(TAG, "Skipping duplicate ANR: " + app + " " + annotation);
|
|
return;
|
|
} else if (app.crashing) {
|
|
Slog.i(TAG, "Crashing app skipping ANR: " + app + " " + annotation);
|
|
return;
|
|
}
|
|
|
|
// In case we come through here for the same app before completing
|
|
// this one, mark as anring now so we will bail out.
|
|
app.notResponding = true;
|
|
|
|
// Log the ANR to the event log.
|
|
EventLog.writeEvent(EventLogTags.AM_ANR, app.pid, app.processName, app.info.flags,
|
|
annotation);
|
|
|
|
// Dump thread traces as quickly as we can, starting with "interesting" processes.
|
|
firstPids.add(app.pid);
|
|
|
|
int parentPid = app.pid;
|
|
if (parent != null && parent.app != null && parent.app.pid > 0) parentPid = parent.app.pid;
|
|
if (parentPid != app.pid) firstPids.add(parentPid);
|
|
|
|
if (MY_PID != app.pid && MY_PID != parentPid) firstPids.add(MY_PID);
|
|
|
|
for (int i = mLruProcesses.size() - 1; i >= 0; i--) {
|
|
ProcessRecord r = mLruProcesses.get(i);
|
|
if (r != null && r.thread != null) {
|
|
int pid = r.pid;
|
|
if (pid > 0 && pid != app.pid && pid != parentPid && pid != MY_PID) {
|
|
if (r.persistent) {
|
|
firstPids.add(pid);
|
|
} else {
|
|
lastPids.put(pid, Boolean.TRUE);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Log the ANR to the main log.
|
|
StringBuilder info = new StringBuilder();
|
|
info.setLength(0);
|
|
info.append("ANR in ").append(app.processName);
|
|
if (activity != null && activity.shortComponentName != null) {
|
|
info.append(" (").append(activity.shortComponentName).append(")");
|
|
}
|
|
info.append("\n");
|
|
if (annotation != null) {
|
|
info.append("Reason: ").append(annotation).append("\n");
|
|
}
|
|
if (parent != null && parent != activity) {
|
|
info.append("Parent: ").append(parent.shortComponentName).append("\n");
|
|
}
|
|
|
|
final ProcessStats processStats = new ProcessStats(true);
|
|
|
|
File tracesFile = dumpStackTraces(true, firstPids, processStats, lastPids, null);
|
|
|
|
String cpuInfo = null;
|
|
if (MONITOR_CPU_USAGE) {
|
|
updateCpuStatsNow();
|
|
synchronized (mProcessStatsThread) {
|
|
cpuInfo = mProcessStats.printCurrentState(anrTime);
|
|
}
|
|
info.append(processStats.printCurrentLoad());
|
|
info.append(cpuInfo);
|
|
}
|
|
|
|
info.append(processStats.printCurrentState(anrTime));
|
|
|
|
Slog.e(TAG, info.toString());
|
|
if (tracesFile == null) {
|
|
// There is no trace file, so dump (only) the alleged culprit's threads to the log
|
|
Process.sendSignal(app.pid, Process.SIGNAL_QUIT);
|
|
}
|
|
|
|
addErrorToDropBox("anr", app, app.processName, activity, parent, annotation,
|
|
cpuInfo, tracesFile, null);
|
|
|
|
if (mController != null) {
|
|
try {
|
|
// 0 == show dialog, 1 = keep waiting, -1 = kill process immediately
|
|
int res = mController.appNotResponding(app.processName, app.pid, info.toString());
|
|
if (res != 0) {
|
|
if (res < 0 && app.pid != MY_PID) Process.killProcess(app.pid);
|
|
return;
|
|
}
|
|
} catch (RemoteException e) {
|
|
mController = null;
|
|
}
|
|
}
|
|
|
|
// Unless configured otherwise, swallow ANRs in background processes & kill the process.
|
|
boolean showBackground = Settings.Secure.getInt(mContext.getContentResolver(),
|
|
Settings.Secure.ANR_SHOW_BACKGROUND, 0) != 0;
|
|
|
|
synchronized (this) {
|
|
if (!showBackground && !app.isInterestingToUserLocked() && app.pid != MY_PID) {
|
|
Slog.w(TAG, "Killing " + app + ": background ANR");
|
|
EventLog.writeEvent(EventLogTags.AM_KILL, app.pid,
|
|
app.processName, app.setAdj, "background ANR");
|
|
Process.killProcessQuiet(app.pid);
|
|
return;
|
|
}
|
|
|
|
// Set the app's notResponding state, and look up the errorReportReceiver
|
|
makeAppNotRespondingLocked(app,
|
|
activity != null ? activity.shortComponentName : null,
|
|
annotation != null ? "ANR " + annotation : "ANR",
|
|
info.toString());
|
|
|
|
// Bring up the infamous App Not Responding dialog
|
|
Message msg = Message.obtain();
|
|
HashMap map = new HashMap();
|
|
msg.what = SHOW_NOT_RESPONDING_MSG;
|
|
msg.obj = map;
|
|
map.put("app", app);
|
|
if (activity != null) {
|
|
map.put("activity", activity);
|
|
}
|
|
|
|
mHandler.sendMessage(msg);
|
|
}
|
|
}
|
|
|
|
final void showLaunchWarningLocked(final ActivityRecord cur, final ActivityRecord next) {
|
|
if (!mLaunchWarningShown) {
|
|
mLaunchWarningShown = true;
|
|
mHandler.post(new Runnable() {
|
|
@Override
|
|
public void run() {
|
|
synchronized (ActivityManagerService.this) {
|
|
final Dialog d = new LaunchWarningWindow(mContext, cur, next);
|
|
d.show();
|
|
mHandler.postDelayed(new Runnable() {
|
|
@Override
|
|
public void run() {
|
|
synchronized (ActivityManagerService.this) {
|
|
d.dismiss();
|
|
mLaunchWarningShown = false;
|
|
}
|
|
}
|
|
}, 4000);
|
|
}
|
|
}
|
|
});
|
|
}
|
|
}
|
|
|
|
public boolean clearApplicationUserData(final String packageName,
|
|
final IPackageDataObserver observer, final int userId) {
|
|
enforceNotIsolatedCaller("clearApplicationUserData");
|
|
int uid = Binder.getCallingUid();
|
|
int pid = Binder.getCallingPid();
|
|
long callingId = Binder.clearCallingIdentity();
|
|
try {
|
|
IPackageManager pm = AppGlobals.getPackageManager();
|
|
int pkgUid = -1;
|
|
synchronized(this) {
|
|
try {
|
|
pkgUid = pm.getPackageUid(packageName, userId);
|
|
} catch (RemoteException e) {
|
|
}
|
|
if (pkgUid == -1) {
|
|
Slog.w(TAG, "Invalid packageName:" + packageName);
|
|
return false;
|
|
}
|
|
if (uid == pkgUid || checkComponentPermission(
|
|
android.Manifest.permission.CLEAR_APP_USER_DATA,
|
|
pid, uid, -1, true)
|
|
== PackageManager.PERMISSION_GRANTED) {
|
|
forceStopPackageLocked(packageName, pkgUid);
|
|
} else {
|
|
throw new SecurityException(pid+" does not have permission:"+
|
|
android.Manifest.permission.CLEAR_APP_USER_DATA+" to clear data" +
|
|
"for process:"+packageName);
|
|
}
|
|
}
|
|
|
|
try {
|
|
//clear application user data
|
|
pm.clearApplicationUserData(packageName, observer, userId);
|
|
Intent intent = new Intent(Intent.ACTION_PACKAGE_DATA_CLEARED,
|
|
Uri.fromParts("package", packageName, null));
|
|
intent.putExtra(Intent.EXTRA_UID, pkgUid);
|
|
broadcastIntentInPackage("android", Process.SYSTEM_UID, intent,
|
|
null, null, 0, null, null, null, false, false, userId);
|
|
} catch (RemoteException e) {
|
|
}
|
|
} finally {
|
|
Binder.restoreCallingIdentity(callingId);
|
|
}
|
|
return true;
|
|
}
|
|
|
|
public void killBackgroundProcesses(final String packageName) {
|
|
if (checkCallingPermission(android.Manifest.permission.KILL_BACKGROUND_PROCESSES)
|
|
!= PackageManager.PERMISSION_GRANTED &&
|
|
checkCallingPermission(android.Manifest.permission.RESTART_PACKAGES)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
String msg = "Permission Denial: killBackgroundProcesses() from pid="
|
|
+ Binder.getCallingPid()
|
|
+ ", uid=" + Binder.getCallingUid()
|
|
+ " requires " + android.Manifest.permission.KILL_BACKGROUND_PROCESSES;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
|
|
int userId = UserHandle.getCallingUserId();
|
|
long callingId = Binder.clearCallingIdentity();
|
|
try {
|
|
IPackageManager pm = AppGlobals.getPackageManager();
|
|
int pkgUid = -1;
|
|
synchronized(this) {
|
|
try {
|
|
pkgUid = pm.getPackageUid(packageName, userId);
|
|
} catch (RemoteException e) {
|
|
}
|
|
if (pkgUid == -1) {
|
|
Slog.w(TAG, "Invalid packageName: " + packageName);
|
|
return;
|
|
}
|
|
killPackageProcessesLocked(packageName, pkgUid, -1,
|
|
ProcessList.SERVICE_ADJ, false, true, true, false, "kill background");
|
|
}
|
|
} finally {
|
|
Binder.restoreCallingIdentity(callingId);
|
|
}
|
|
}
|
|
|
|
public void killAllBackgroundProcesses() {
|
|
if (checkCallingPermission(android.Manifest.permission.KILL_BACKGROUND_PROCESSES)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
String msg = "Permission Denial: killAllBackgroundProcesses() from pid="
|
|
+ Binder.getCallingPid()
|
|
+ ", uid=" + Binder.getCallingUid()
|
|
+ " requires " + android.Manifest.permission.KILL_BACKGROUND_PROCESSES;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
|
|
long callingId = Binder.clearCallingIdentity();
|
|
try {
|
|
synchronized(this) {
|
|
ArrayList<ProcessRecord> procs = new ArrayList<ProcessRecord>();
|
|
for (SparseArray<ProcessRecord> apps : mProcessNames.getMap().values()) {
|
|
final int NA = apps.size();
|
|
for (int ia=0; ia<NA; ia++) {
|
|
ProcessRecord app = apps.valueAt(ia);
|
|
if (app.persistent) {
|
|
// we don't kill persistent processes
|
|
continue;
|
|
}
|
|
if (app.removed) {
|
|
procs.add(app);
|
|
} else if (app.setAdj >= ProcessList.HIDDEN_APP_MIN_ADJ) {
|
|
app.removed = true;
|
|
procs.add(app);
|
|
}
|
|
}
|
|
}
|
|
|
|
int N = procs.size();
|
|
for (int i=0; i<N; i++) {
|
|
removeProcessLocked(procs.get(i), false, true, "kill all background");
|
|
}
|
|
}
|
|
} finally {
|
|
Binder.restoreCallingIdentity(callingId);
|
|
}
|
|
}
|
|
|
|
public void forceStopPackage(final String packageName) {
|
|
if (checkCallingPermission(android.Manifest.permission.FORCE_STOP_PACKAGES)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
String msg = "Permission Denial: forceStopPackage() from pid="
|
|
+ Binder.getCallingPid()
|
|
+ ", uid=" + Binder.getCallingUid()
|
|
+ " requires " + android.Manifest.permission.FORCE_STOP_PACKAGES;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
final int userId = UserHandle.getCallingUserId();
|
|
long callingId = Binder.clearCallingIdentity();
|
|
try {
|
|
IPackageManager pm = AppGlobals.getPackageManager();
|
|
int pkgUid = -1;
|
|
synchronized(this) {
|
|
try {
|
|
pkgUid = pm.getPackageUid(packageName, userId);
|
|
} catch (RemoteException e) {
|
|
}
|
|
if (pkgUid == -1) {
|
|
Slog.w(TAG, "Invalid packageName: " + packageName);
|
|
return;
|
|
}
|
|
forceStopPackageLocked(packageName, pkgUid);
|
|
try {
|
|
pm.setPackageStoppedState(packageName, true, userId);
|
|
} catch (RemoteException e) {
|
|
} catch (IllegalArgumentException e) {
|
|
Slog.w(TAG, "Failed trying to unstop package "
|
|
+ packageName + ": " + e);
|
|
}
|
|
}
|
|
} finally {
|
|
Binder.restoreCallingIdentity(callingId);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* The pkg name and uid have to be specified.
|
|
* @see android.app.IActivityManager#killApplicationWithUid(java.lang.String, int)
|
|
*/
|
|
public void killApplicationWithUid(String pkg, int uid) {
|
|
if (pkg == null) {
|
|
return;
|
|
}
|
|
// Make sure the uid is valid.
|
|
if (uid < 0) {
|
|
Slog.w(TAG, "Invalid uid specified for pkg : " + pkg);
|
|
return;
|
|
}
|
|
int callerUid = Binder.getCallingUid();
|
|
// Only the system server can kill an application
|
|
if (callerUid == Process.SYSTEM_UID) {
|
|
// Post an aysnc message to kill the application
|
|
Message msg = mHandler.obtainMessage(KILL_APPLICATION_MSG);
|
|
msg.arg1 = uid;
|
|
msg.arg2 = 0;
|
|
msg.obj = pkg;
|
|
mHandler.sendMessage(msg);
|
|
} else {
|
|
throw new SecurityException(callerUid + " cannot kill pkg: " +
|
|
pkg);
|
|
}
|
|
}
|
|
|
|
public void closeSystemDialogs(String reason) {
|
|
enforceNotIsolatedCaller("closeSystemDialogs");
|
|
|
|
final int uid = Binder.getCallingUid();
|
|
final long origId = Binder.clearCallingIdentity();
|
|
synchronized (this) {
|
|
closeSystemDialogsLocked(uid, reason);
|
|
}
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
|
|
void closeSystemDialogsLocked(int callingUid, String reason) {
|
|
Intent intent = new Intent(Intent.ACTION_CLOSE_SYSTEM_DIALOGS);
|
|
intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY);
|
|
if (reason != null) {
|
|
intent.putExtra("reason", reason);
|
|
}
|
|
mWindowManager.closeSystemDialogs(reason);
|
|
|
|
for (int i=mMainStack.mHistory.size()-1; i>=0; i--) {
|
|
ActivityRecord r = (ActivityRecord)mMainStack.mHistory.get(i);
|
|
if ((r.info.flags&ActivityInfo.FLAG_FINISH_ON_CLOSE_SYSTEM_DIALOGS) != 0) {
|
|
r.stack.finishActivityLocked(r, i,
|
|
Activity.RESULT_CANCELED, null, "close-sys");
|
|
}
|
|
}
|
|
|
|
broadcastIntentLocked(null, null, intent, null,
|
|
null, 0, null, null, null, false, false, -1,
|
|
callingUid, 0 /* TODO: Verify */);
|
|
}
|
|
|
|
public Debug.MemoryInfo[] getProcessMemoryInfo(int[] pids)
|
|
throws RemoteException {
|
|
enforceNotIsolatedCaller("getProcessMemoryInfo");
|
|
Debug.MemoryInfo[] infos = new Debug.MemoryInfo[pids.length];
|
|
for (int i=pids.length-1; i>=0; i--) {
|
|
infos[i] = new Debug.MemoryInfo();
|
|
Debug.getMemoryInfo(pids[i], infos[i]);
|
|
}
|
|
return infos;
|
|
}
|
|
|
|
public long[] getProcessPss(int[] pids) throws RemoteException {
|
|
enforceNotIsolatedCaller("getProcessPss");
|
|
long[] pss = new long[pids.length];
|
|
for (int i=pids.length-1; i>=0; i--) {
|
|
pss[i] = Debug.getPss(pids[i]);
|
|
}
|
|
return pss;
|
|
}
|
|
|
|
public void killApplicationProcess(String processName, int uid) {
|
|
if (processName == null) {
|
|
return;
|
|
}
|
|
|
|
int callerUid = Binder.getCallingUid();
|
|
// Only the system server can kill an application
|
|
if (callerUid == Process.SYSTEM_UID) {
|
|
synchronized (this) {
|
|
ProcessRecord app = getProcessRecordLocked(processName, uid);
|
|
if (app != null && app.thread != null) {
|
|
try {
|
|
app.thread.scheduleSuicide();
|
|
} catch (RemoteException e) {
|
|
// If the other end already died, then our work here is done.
|
|
}
|
|
} else {
|
|
Slog.w(TAG, "Process/uid not found attempting kill of "
|
|
+ processName + " / " + uid);
|
|
}
|
|
}
|
|
} else {
|
|
throw new SecurityException(callerUid + " cannot kill app process: " +
|
|
processName);
|
|
}
|
|
}
|
|
|
|
private void forceStopPackageLocked(final String packageName, int uid) {
|
|
forceStopPackageLocked(packageName, uid, false, false, true, false,
|
|
UserHandle.getUserId(uid));
|
|
Intent intent = new Intent(Intent.ACTION_PACKAGE_RESTARTED,
|
|
Uri.fromParts("package", packageName, null));
|
|
if (!mProcessesReady) {
|
|
intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY);
|
|
}
|
|
intent.putExtra(Intent.EXTRA_UID, uid);
|
|
broadcastIntentLocked(null, null, intent,
|
|
null, null, 0, null, null, null,
|
|
false, false,
|
|
MY_PID, Process.SYSTEM_UID, UserHandle.getUserId(uid));
|
|
}
|
|
|
|
private void forceStopUserLocked(int userId) {
|
|
forceStopPackageLocked(null, -1, false, false, true, false, userId);
|
|
Intent intent = new Intent(Intent.ACTION_USER_STOPPED);
|
|
intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY);
|
|
intent.putExtra(Intent.EXTRA_USER_HANDLE, userId);
|
|
broadcastIntentLocked(null, null, intent,
|
|
null, null, 0, null, null, null,
|
|
false, false,
|
|
MY_PID, Process.SYSTEM_UID, userId);
|
|
}
|
|
|
|
private final boolean killPackageProcessesLocked(String packageName, int uid,
|
|
int userId, int minOomAdj, boolean callerWillRestart, boolean allowRestart,
|
|
boolean doit, boolean evenPersistent, String reason) {
|
|
ArrayList<ProcessRecord> procs = new ArrayList<ProcessRecord>();
|
|
|
|
// Remove all processes this package may have touched: all with the
|
|
// same UID (except for the system or root user), and all whose name
|
|
// matches the package name.
|
|
final String procNamePrefix = packageName != null ? (packageName + ":") : null;
|
|
for (SparseArray<ProcessRecord> apps : mProcessNames.getMap().values()) {
|
|
final int NA = apps.size();
|
|
for (int ia=0; ia<NA; ia++) {
|
|
ProcessRecord app = apps.valueAt(ia);
|
|
if (app.persistent && !evenPersistent) {
|
|
// we don't kill persistent processes
|
|
continue;
|
|
}
|
|
if (app.removed) {
|
|
if (doit) {
|
|
procs.add(app);
|
|
}
|
|
// If no package is specified, we call all processes under the
|
|
// give user id.
|
|
} else if (packageName == null) {
|
|
if (app.userId == userId) {
|
|
if (app.setAdj >= minOomAdj) {
|
|
if (!doit) {
|
|
return true;
|
|
}
|
|
app.removed = true;
|
|
procs.add(app);
|
|
}
|
|
}
|
|
// If uid is specified and the uid and process name match
|
|
// Or, the uid is not specified and the process name matches
|
|
} else if (((uid > 0 && uid != Process.SYSTEM_UID && app.info.uid == uid)
|
|
|| ((app.processName.equals(packageName)
|
|
|| app.processName.startsWith(procNamePrefix))
|
|
&& uid < 0))) {
|
|
if (app.setAdj >= minOomAdj) {
|
|
if (!doit) {
|
|
return true;
|
|
}
|
|
app.removed = true;
|
|
procs.add(app);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
int N = procs.size();
|
|
for (int i=0; i<N; i++) {
|
|
removeProcessLocked(procs.get(i), callerWillRestart, allowRestart, reason);
|
|
}
|
|
return N > 0;
|
|
}
|
|
|
|
private final boolean forceStopPackageLocked(String name, int uid,
|
|
boolean callerWillRestart, boolean purgeCache, boolean doit,
|
|
boolean evenPersistent, int userId) {
|
|
int i;
|
|
int N;
|
|
|
|
if (uid < 0 && name != null) {
|
|
try {
|
|
uid = AppGlobals.getPackageManager().getPackageUid(name, userId);
|
|
} catch (RemoteException e) {
|
|
}
|
|
}
|
|
|
|
if (doit) {
|
|
if (name != null) {
|
|
Slog.i(TAG, "Force stopping package " + name + " uid=" + uid);
|
|
} else {
|
|
Slog.i(TAG, "Force stopping user " + userId);
|
|
}
|
|
|
|
Iterator<SparseArray<Long>> badApps = mProcessCrashTimes.getMap().values().iterator();
|
|
while (badApps.hasNext()) {
|
|
SparseArray<Long> ba = badApps.next();
|
|
for (i=ba.size()-1; i>=0; i--) {
|
|
boolean remove = false;
|
|
final int entUid = ba.keyAt(i);
|
|
if (name != null) {
|
|
if (entUid == uid) {
|
|
remove = true;
|
|
}
|
|
} else if (UserHandle.getUserId(entUid) == userId) {
|
|
remove = true;
|
|
}
|
|
if (remove) {
|
|
ba.removeAt(i);
|
|
}
|
|
}
|
|
if (ba.size() == 0) {
|
|
badApps.remove();
|
|
}
|
|
}
|
|
}
|
|
|
|
boolean didSomething = killPackageProcessesLocked(name, uid,
|
|
name == null ? userId : -1 , -100, callerWillRestart, false,
|
|
doit, evenPersistent,
|
|
name == null ? ("force stop user " + userId) : ("force stop " + name));
|
|
|
|
TaskRecord lastTask = null;
|
|
for (i=0; i<mMainStack.mHistory.size(); i++) {
|
|
ActivityRecord r = (ActivityRecord)mMainStack.mHistory.get(i);
|
|
final boolean samePackage = r.packageName.equals(name)
|
|
|| (name == null && r.userId == userId);
|
|
if (r.userId == userId
|
|
&& (samePackage || r.task == lastTask)
|
|
&& (r.app == null || evenPersistent || !r.app.persistent)) {
|
|
if (!doit) {
|
|
if (r.finishing) {
|
|
// If this activity is just finishing, then it is not
|
|
// interesting as far as something to stop.
|
|
continue;
|
|
}
|
|
return true;
|
|
}
|
|
didSomething = true;
|
|
Slog.i(TAG, " Force finishing activity " + r);
|
|
if (samePackage) {
|
|
if (r.app != null) {
|
|
r.app.removed = true;
|
|
}
|
|
r.app = null;
|
|
}
|
|
lastTask = r.task;
|
|
if (r.stack.finishActivityLocked(r, i, Activity.RESULT_CANCELED,
|
|
null, "force-stop", true)) {
|
|
i--;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (mServices.forceStopLocked(name, userId, evenPersistent, doit)) {
|
|
if (!doit) {
|
|
return true;
|
|
}
|
|
didSomething = true;
|
|
}
|
|
|
|
ArrayList<ContentProviderRecord> providers = new ArrayList<ContentProviderRecord>();
|
|
for (ContentProviderRecord provider : mProviderMap.getProvidersByClass(userId).values()) {
|
|
if ((name == null || provider.info.packageName.equals(name))
|
|
&& (provider.proc == null || evenPersistent || !provider.proc.persistent)) {
|
|
if (!doit) {
|
|
return true;
|
|
}
|
|
didSomething = true;
|
|
providers.add(provider);
|
|
}
|
|
}
|
|
|
|
N = providers.size();
|
|
for (i=0; i<N; i++) {
|
|
removeDyingProviderLocked(null, providers.get(i), true);
|
|
}
|
|
|
|
if (doit) {
|
|
if (purgeCache && name != null) {
|
|
AttributeCache ac = AttributeCache.instance();
|
|
if (ac != null) {
|
|
ac.removePackage(name);
|
|
}
|
|
}
|
|
if (mBooted) {
|
|
mMainStack.resumeTopActivityLocked(null);
|
|
mMainStack.scheduleIdleLocked();
|
|
}
|
|
}
|
|
|
|
return didSomething;
|
|
}
|
|
|
|
private final boolean removeProcessLocked(ProcessRecord app,
|
|
boolean callerWillRestart, boolean allowRestart, String reason) {
|
|
final String name = app.processName;
|
|
final int uid = app.uid;
|
|
if (DEBUG_PROCESSES) Slog.d(
|
|
TAG, "Force removing proc " + app.toShortString() + " (" + name
|
|
+ "/" + uid + ")");
|
|
|
|
mProcessNames.remove(name, uid);
|
|
mIsolatedProcesses.remove(app.uid);
|
|
if (mHeavyWeightProcess == app) {
|
|
mHeavyWeightProcess = null;
|
|
mHandler.sendEmptyMessage(CANCEL_HEAVY_NOTIFICATION_MSG);
|
|
}
|
|
boolean needRestart = false;
|
|
if (app.pid > 0 && app.pid != MY_PID) {
|
|
int pid = app.pid;
|
|
synchronized (mPidsSelfLocked) {
|
|
mPidsSelfLocked.remove(pid);
|
|
mHandler.removeMessages(PROC_START_TIMEOUT_MSG, app);
|
|
}
|
|
Slog.i(TAG, "Killing proc " + app.toShortString() + ": " + reason);
|
|
handleAppDiedLocked(app, true, allowRestart);
|
|
mLruProcesses.remove(app);
|
|
Process.killProcessQuiet(pid);
|
|
|
|
if (app.persistent && !app.isolated) {
|
|
if (!callerWillRestart) {
|
|
addAppLocked(app.info, false);
|
|
} else {
|
|
needRestart = true;
|
|
}
|
|
}
|
|
} else {
|
|
mRemovedProcesses.add(app);
|
|
}
|
|
|
|
return needRestart;
|
|
}
|
|
|
|
private final void processStartTimedOutLocked(ProcessRecord app) {
|
|
final int pid = app.pid;
|
|
boolean gone = false;
|
|
synchronized (mPidsSelfLocked) {
|
|
ProcessRecord knownApp = mPidsSelfLocked.get(pid);
|
|
if (knownApp != null && knownApp.thread == null) {
|
|
mPidsSelfLocked.remove(pid);
|
|
gone = true;
|
|
}
|
|
}
|
|
|
|
if (gone) {
|
|
Slog.w(TAG, "Process " + app + " failed to attach");
|
|
EventLog.writeEvent(EventLogTags.AM_PROCESS_START_TIMEOUT, pid, app.uid,
|
|
app.processName);
|
|
mProcessNames.remove(app.processName, app.uid);
|
|
mIsolatedProcesses.remove(app.uid);
|
|
if (mHeavyWeightProcess == app) {
|
|
mHeavyWeightProcess = null;
|
|
mHandler.sendEmptyMessage(CANCEL_HEAVY_NOTIFICATION_MSG);
|
|
}
|
|
// Take care of any launching providers waiting for this process.
|
|
checkAppInLaunchingProvidersLocked(app, true);
|
|
// Take care of any services that are waiting for the process.
|
|
mServices.processStartTimedOutLocked(app);
|
|
EventLog.writeEvent(EventLogTags.AM_KILL, pid,
|
|
app.processName, app.setAdj, "start timeout");
|
|
Process.killProcessQuiet(pid);
|
|
if (mBackupTarget != null && mBackupTarget.app.pid == pid) {
|
|
Slog.w(TAG, "Unattached app died before backup, skipping");
|
|
try {
|
|
IBackupManager bm = IBackupManager.Stub.asInterface(
|
|
ServiceManager.getService(Context.BACKUP_SERVICE));
|
|
bm.agentDisconnected(app.info.packageName);
|
|
} catch (RemoteException e) {
|
|
// Can't happen; the backup manager is local
|
|
}
|
|
}
|
|
if (isPendingBroadcastProcessLocked(pid)) {
|
|
Slog.w(TAG, "Unattached app died before broadcast acknowledged, skipping");
|
|
skipPendingBroadcastLocked(pid);
|
|
}
|
|
} else {
|
|
Slog.w(TAG, "Spurious process start timeout - pid not known for " + app);
|
|
}
|
|
}
|
|
|
|
private final boolean attachApplicationLocked(IApplicationThread thread,
|
|
int pid) {
|
|
|
|
// Find the application record that is being attached... either via
|
|
// the pid if we are running in multiple processes, or just pull the
|
|
// next app record if we are emulating process with anonymous threads.
|
|
ProcessRecord app;
|
|
if (pid != MY_PID && pid >= 0) {
|
|
synchronized (mPidsSelfLocked) {
|
|
app = mPidsSelfLocked.get(pid);
|
|
}
|
|
} else {
|
|
app = null;
|
|
}
|
|
|
|
if (app == null) {
|
|
Slog.w(TAG, "No pending application record for pid " + pid
|
|
+ " (IApplicationThread " + thread + "); dropping process");
|
|
EventLog.writeEvent(EventLogTags.AM_DROP_PROCESS, pid);
|
|
if (pid > 0 && pid != MY_PID) {
|
|
Process.killProcessQuiet(pid);
|
|
} else {
|
|
try {
|
|
thread.scheduleExit();
|
|
} catch (Exception e) {
|
|
// Ignore exceptions.
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
// If this application record is still attached to a previous
|
|
// process, clean it up now.
|
|
if (app.thread != null) {
|
|
handleAppDiedLocked(app, true, true);
|
|
}
|
|
|
|
// Tell the process all about itself.
|
|
|
|
if (localLOGV) Slog.v(
|
|
TAG, "Binding process pid " + pid + " to record " + app);
|
|
|
|
String processName = app.processName;
|
|
try {
|
|
AppDeathRecipient adr = new AppDeathRecipient(
|
|
app, pid, thread);
|
|
thread.asBinder().linkToDeath(adr, 0);
|
|
app.deathRecipient = adr;
|
|
} catch (RemoteException e) {
|
|
app.resetPackageList();
|
|
startProcessLocked(app, "link fail", processName);
|
|
return false;
|
|
}
|
|
|
|
EventLog.writeEvent(EventLogTags.AM_PROC_BOUND, app.pid, app.processName);
|
|
|
|
app.thread = thread;
|
|
app.curAdj = app.setAdj = -100;
|
|
app.curSchedGroup = Process.THREAD_GROUP_DEFAULT;
|
|
app.setSchedGroup = Process.THREAD_GROUP_BG_NONINTERACTIVE;
|
|
app.forcingToForeground = null;
|
|
app.foregroundServices = false;
|
|
app.hasShownUi = false;
|
|
app.debugging = false;
|
|
|
|
mHandler.removeMessages(PROC_START_TIMEOUT_MSG, app);
|
|
|
|
boolean normalMode = mProcessesReady || isAllowedWhileBooting(app.info);
|
|
List providers = normalMode ? generateApplicationProvidersLocked(app) : null;
|
|
|
|
if (!normalMode) {
|
|
Slog.i(TAG, "Launching preboot mode app: " + app);
|
|
}
|
|
|
|
if (localLOGV) Slog.v(
|
|
TAG, "New app record " + app
|
|
+ " thread=" + thread.asBinder() + " pid=" + pid);
|
|
try {
|
|
int testMode = IApplicationThread.DEBUG_OFF;
|
|
if (mDebugApp != null && mDebugApp.equals(processName)) {
|
|
testMode = mWaitForDebugger
|
|
? IApplicationThread.DEBUG_WAIT
|
|
: IApplicationThread.DEBUG_ON;
|
|
app.debugging = true;
|
|
if (mDebugTransient) {
|
|
mDebugApp = mOrigDebugApp;
|
|
mWaitForDebugger = mOrigWaitForDebugger;
|
|
}
|
|
}
|
|
String profileFile = app.instrumentationProfileFile;
|
|
ParcelFileDescriptor profileFd = null;
|
|
boolean profileAutoStop = false;
|
|
if (mProfileApp != null && mProfileApp.equals(processName)) {
|
|
mProfileProc = app;
|
|
profileFile = mProfileFile;
|
|
profileFd = mProfileFd;
|
|
profileAutoStop = mAutoStopProfiler;
|
|
}
|
|
boolean enableOpenGlTrace = false;
|
|
if (mOpenGlTraceApp != null && mOpenGlTraceApp.equals(processName)) {
|
|
enableOpenGlTrace = true;
|
|
mOpenGlTraceApp = null;
|
|
}
|
|
|
|
// If the app is being launched for restore or full backup, set it up specially
|
|
boolean isRestrictedBackupMode = false;
|
|
if (mBackupTarget != null && mBackupAppName.equals(processName)) {
|
|
isRestrictedBackupMode = (mBackupTarget.backupMode == BackupRecord.RESTORE)
|
|
|| (mBackupTarget.backupMode == BackupRecord.RESTORE_FULL)
|
|
|| (mBackupTarget.backupMode == BackupRecord.BACKUP_FULL);
|
|
}
|
|
|
|
ensurePackageDexOpt(app.instrumentationInfo != null
|
|
? app.instrumentationInfo.packageName
|
|
: app.info.packageName);
|
|
if (app.instrumentationClass != null) {
|
|
ensurePackageDexOpt(app.instrumentationClass.getPackageName());
|
|
}
|
|
if (DEBUG_CONFIGURATION) Slog.v(TAG, "Binding proc "
|
|
+ processName + " with config " + mConfiguration);
|
|
ApplicationInfo appInfo = app.instrumentationInfo != null
|
|
? app.instrumentationInfo : app.info;
|
|
app.compat = compatibilityInfoForPackageLocked(appInfo);
|
|
if (profileFd != null) {
|
|
profileFd = profileFd.dup();
|
|
}
|
|
thread.bindApplication(processName, appInfo, providers,
|
|
app.instrumentationClass, profileFile, profileFd, profileAutoStop,
|
|
app.instrumentationArguments, app.instrumentationWatcher, testMode,
|
|
enableOpenGlTrace, isRestrictedBackupMode || !normalMode, app.persistent,
|
|
new Configuration(mConfiguration), app.compat, getCommonServicesLocked(),
|
|
mCoreSettingsObserver.getCoreSettingsLocked());
|
|
updateLruProcessLocked(app, false, true);
|
|
app.lastRequestedGc = app.lastLowMemory = SystemClock.uptimeMillis();
|
|
} catch (Exception e) {
|
|
// todo: Yikes! What should we do? For now we will try to
|
|
// start another process, but that could easily get us in
|
|
// an infinite loop of restarting processes...
|
|
Slog.w(TAG, "Exception thrown during bind!", e);
|
|
|
|
app.resetPackageList();
|
|
app.unlinkDeathRecipient();
|
|
startProcessLocked(app, "bind fail", processName);
|
|
return false;
|
|
}
|
|
|
|
// Remove this record from the list of starting applications.
|
|
mPersistentStartingProcesses.remove(app);
|
|
if (DEBUG_PROCESSES && mProcessesOnHold.contains(app)) Slog.v(TAG,
|
|
"Attach application locked removing on hold: " + app);
|
|
mProcessesOnHold.remove(app);
|
|
|
|
boolean badApp = false;
|
|
boolean didSomething = false;
|
|
|
|
// See if the top visible activity is waiting to run in this process...
|
|
ActivityRecord hr = mMainStack.topRunningActivityLocked(null);
|
|
if (hr != null && normalMode) {
|
|
if (hr.app == null && app.uid == hr.info.applicationInfo.uid
|
|
&& processName.equals(hr.processName)) {
|
|
try {
|
|
if (mHeadless) {
|
|
Slog.e(TAG, "Starting activities not supported on headless device: " + hr);
|
|
} else if (mMainStack.realStartActivityLocked(hr, app, true, true)) {
|
|
didSomething = true;
|
|
}
|
|
} catch (Exception e) {
|
|
Slog.w(TAG, "Exception in new application when starting activity "
|
|
+ hr.intent.getComponent().flattenToShortString(), e);
|
|
badApp = true;
|
|
}
|
|
} else {
|
|
mMainStack.ensureActivitiesVisibleLocked(hr, null, processName, 0);
|
|
}
|
|
}
|
|
|
|
// Find any services that should be running in this process...
|
|
if (!badApp) {
|
|
try {
|
|
didSomething |= mServices.attachApplicationLocked(app, processName);
|
|
} catch (Exception e) {
|
|
badApp = true;
|
|
}
|
|
}
|
|
|
|
// Check if a next-broadcast receiver is in this process...
|
|
if (!badApp && isPendingBroadcastProcessLocked(pid)) {
|
|
try {
|
|
didSomething = sendPendingBroadcastsLocked(app);
|
|
} catch (Exception e) {
|
|
// If the app died trying to launch the receiver we declare it 'bad'
|
|
badApp = true;
|
|
}
|
|
}
|
|
|
|
// Check whether the next backup agent is in this process...
|
|
if (!badApp && mBackupTarget != null && mBackupTarget.appInfo.uid == app.uid) {
|
|
if (DEBUG_BACKUP) Slog.v(TAG, "New app is backup target, launching agent for " + app);
|
|
ensurePackageDexOpt(mBackupTarget.appInfo.packageName);
|
|
try {
|
|
thread.scheduleCreateBackupAgent(mBackupTarget.appInfo,
|
|
compatibilityInfoForPackageLocked(mBackupTarget.appInfo),
|
|
mBackupTarget.backupMode);
|
|
} catch (Exception e) {
|
|
Slog.w(TAG, "Exception scheduling backup agent creation: ");
|
|
e.printStackTrace();
|
|
}
|
|
}
|
|
|
|
if (badApp) {
|
|
// todo: Also need to kill application to deal with all
|
|
// kinds of exceptions.
|
|
handleAppDiedLocked(app, false, true);
|
|
return false;
|
|
}
|
|
|
|
if (!didSomething) {
|
|
updateOomAdjLocked();
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
public final void attachApplication(IApplicationThread thread) {
|
|
synchronized (this) {
|
|
int callingPid = Binder.getCallingPid();
|
|
final long origId = Binder.clearCallingIdentity();
|
|
attachApplicationLocked(thread, callingPid);
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
}
|
|
|
|
public final void activityIdle(IBinder token, Configuration config, boolean stopProfiling) {
|
|
final long origId = Binder.clearCallingIdentity();
|
|
ActivityRecord r = mMainStack.activityIdleInternal(token, false, config);
|
|
if (stopProfiling) {
|
|
synchronized (this) {
|
|
if (mProfileProc == r.app) {
|
|
if (mProfileFd != null) {
|
|
try {
|
|
mProfileFd.close();
|
|
} catch (IOException e) {
|
|
}
|
|
clearProfilerLocked();
|
|
}
|
|
}
|
|
}
|
|
}
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
|
|
void enableScreenAfterBoot() {
|
|
EventLog.writeEvent(EventLogTags.BOOT_PROGRESS_ENABLE_SCREEN,
|
|
SystemClock.uptimeMillis());
|
|
mWindowManager.enableScreenAfterBoot();
|
|
|
|
synchronized (this) {
|
|
updateEventDispatchingLocked();
|
|
}
|
|
}
|
|
|
|
public void showBootMessage(final CharSequence msg, final boolean always) {
|
|
enforceNotIsolatedCaller("showBootMessage");
|
|
mWindowManager.showBootMessage(msg, always);
|
|
}
|
|
|
|
public void dismissKeyguardOnNextActivity() {
|
|
enforceNotIsolatedCaller("dismissKeyguardOnNextActivity");
|
|
final long token = Binder.clearCallingIdentity();
|
|
try {
|
|
synchronized (this) {
|
|
if (mLockScreenShown) {
|
|
mLockScreenShown = false;
|
|
comeOutOfSleepIfNeededLocked();
|
|
}
|
|
mMainStack.dismissKeyguardOnNextActivityLocked();
|
|
}
|
|
} finally {
|
|
Binder.restoreCallingIdentity(token);
|
|
}
|
|
}
|
|
|
|
final void finishBooting() {
|
|
IntentFilter pkgFilter = new IntentFilter();
|
|
pkgFilter.addAction(Intent.ACTION_QUERY_PACKAGE_RESTART);
|
|
pkgFilter.addDataScheme("package");
|
|
mContext.registerReceiver(new BroadcastReceiver() {
|
|
@Override
|
|
public void onReceive(Context context, Intent intent) {
|
|
String[] pkgs = intent.getStringArrayExtra(Intent.EXTRA_PACKAGES);
|
|
if (pkgs != null) {
|
|
for (String pkg : pkgs) {
|
|
synchronized (ActivityManagerService.this) {
|
|
if (forceStopPackageLocked(pkg, -1, false, false, false, false, 0)) {
|
|
setResultCode(Activity.RESULT_OK);
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}, pkgFilter);
|
|
|
|
synchronized (this) {
|
|
// Ensure that any processes we had put on hold are now started
|
|
// up.
|
|
final int NP = mProcessesOnHold.size();
|
|
if (NP > 0) {
|
|
ArrayList<ProcessRecord> procs =
|
|
new ArrayList<ProcessRecord>(mProcessesOnHold);
|
|
for (int ip=0; ip<NP; ip++) {
|
|
if (DEBUG_PROCESSES) Slog.v(TAG, "Starting process on hold: "
|
|
+ procs.get(ip));
|
|
startProcessLocked(procs.get(ip), "on-hold", null);
|
|
}
|
|
}
|
|
|
|
if (mFactoryTest != SystemServer.FACTORY_TEST_LOW_LEVEL) {
|
|
// Start looking for apps that are abusing wake locks.
|
|
Message nmsg = mHandler.obtainMessage(CHECK_EXCESSIVE_WAKE_LOCKS_MSG);
|
|
mHandler.sendMessageDelayed(nmsg, POWER_CHECK_DELAY);
|
|
// Tell anyone interested that we are done booting!
|
|
SystemProperties.set("sys.boot_completed", "1");
|
|
SystemProperties.set("dev.bootcomplete", "1");
|
|
for (int i=0; i<mStartedUsers.size(); i++) {
|
|
UserStartedState uss = mStartedUsers.valueAt(i);
|
|
if (uss.mState == UserStartedState.STATE_BOOTING) {
|
|
uss.mState = UserStartedState.STATE_RUNNING;
|
|
broadcastIntentLocked(null, null,
|
|
new Intent(Intent.ACTION_BOOT_COMPLETED, null),
|
|
null, null, 0, null, null,
|
|
android.Manifest.permission.RECEIVE_BOOT_COMPLETED,
|
|
false, false, MY_PID, Process.SYSTEM_UID,
|
|
mStartedUsers.keyAt(i));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
final void ensureBootCompleted() {
|
|
boolean booting;
|
|
boolean enableScreen;
|
|
synchronized (this) {
|
|
booting = mBooting;
|
|
mBooting = false;
|
|
enableScreen = !mBooted;
|
|
mBooted = true;
|
|
}
|
|
|
|
if (booting) {
|
|
finishBooting();
|
|
}
|
|
|
|
if (enableScreen) {
|
|
enableScreenAfterBoot();
|
|
}
|
|
}
|
|
|
|
public final void activityPaused(IBinder token) {
|
|
final long origId = Binder.clearCallingIdentity();
|
|
mMainStack.activityPaused(token, false);
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
|
|
public final void activityStopped(IBinder token, Bundle icicle, Bitmap thumbnail,
|
|
CharSequence description) {
|
|
if (localLOGV) Slog.v(
|
|
TAG, "Activity stopped: token=" + token);
|
|
|
|
// Refuse possible leaked file descriptors
|
|
if (icicle != null && icicle.hasFileDescriptors()) {
|
|
throw new IllegalArgumentException("File descriptors passed in Bundle");
|
|
}
|
|
|
|
ActivityRecord r = null;
|
|
|
|
final long origId = Binder.clearCallingIdentity();
|
|
|
|
synchronized (this) {
|
|
r = mMainStack.isInStackLocked(token);
|
|
if (r != null) {
|
|
r.stack.activityStoppedLocked(r, icicle, thumbnail, description);
|
|
}
|
|
}
|
|
|
|
if (r != null) {
|
|
sendPendingThumbnail(r, null, null, null, false);
|
|
}
|
|
|
|
trimApplications();
|
|
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
|
|
public final void activityDestroyed(IBinder token) {
|
|
if (DEBUG_SWITCH) Slog.v(TAG, "ACTIVITY DESTROYED: " + token);
|
|
mMainStack.activityDestroyed(token);
|
|
}
|
|
|
|
public String getCallingPackage(IBinder token) {
|
|
synchronized (this) {
|
|
ActivityRecord r = getCallingRecordLocked(token);
|
|
return r != null && r.app != null ? r.info.packageName : null;
|
|
}
|
|
}
|
|
|
|
public ComponentName getCallingActivity(IBinder token) {
|
|
synchronized (this) {
|
|
ActivityRecord r = getCallingRecordLocked(token);
|
|
return r != null ? r.intent.getComponent() : null;
|
|
}
|
|
}
|
|
|
|
private ActivityRecord getCallingRecordLocked(IBinder token) {
|
|
ActivityRecord r = mMainStack.isInStackLocked(token);
|
|
if (r == null) {
|
|
return null;
|
|
}
|
|
return r.resultTo;
|
|
}
|
|
|
|
public ComponentName getActivityClassForToken(IBinder token) {
|
|
synchronized(this) {
|
|
ActivityRecord r = mMainStack.isInStackLocked(token);
|
|
if (r == null) {
|
|
return null;
|
|
}
|
|
return r.intent.getComponent();
|
|
}
|
|
}
|
|
|
|
public String getPackageForToken(IBinder token) {
|
|
synchronized(this) {
|
|
ActivityRecord r = mMainStack.isInStackLocked(token);
|
|
if (r == null) {
|
|
return null;
|
|
}
|
|
return r.packageName;
|
|
}
|
|
}
|
|
|
|
public IIntentSender getIntentSender(int type,
|
|
String packageName, IBinder token, String resultWho,
|
|
int requestCode, Intent[] intents, String[] resolvedTypes,
|
|
int flags, Bundle options) {
|
|
enforceNotIsolatedCaller("getIntentSender");
|
|
// Refuse possible leaked file descriptors
|
|
if (intents != null) {
|
|
if (intents.length < 1) {
|
|
throw new IllegalArgumentException("Intents array length must be >= 1");
|
|
}
|
|
for (int i=0; i<intents.length; i++) {
|
|
Intent intent = intents[i];
|
|
if (intent != null) {
|
|
if (intent.hasFileDescriptors()) {
|
|
throw new IllegalArgumentException("File descriptors passed in Intent");
|
|
}
|
|
if (type == ActivityManager.INTENT_SENDER_BROADCAST &&
|
|
(intent.getFlags()&Intent.FLAG_RECEIVER_BOOT_UPGRADE) != 0) {
|
|
throw new IllegalArgumentException(
|
|
"Can't use FLAG_RECEIVER_BOOT_UPGRADE here");
|
|
}
|
|
intents[i] = new Intent(intent);
|
|
}
|
|
}
|
|
if (resolvedTypes != null && resolvedTypes.length != intents.length) {
|
|
throw new IllegalArgumentException(
|
|
"Intent array length does not match resolvedTypes length");
|
|
}
|
|
}
|
|
if (options != null) {
|
|
if (options.hasFileDescriptors()) {
|
|
throw new IllegalArgumentException("File descriptors passed in options");
|
|
}
|
|
}
|
|
|
|
synchronized(this) {
|
|
int callingUid = Binder.getCallingUid();
|
|
try {
|
|
if (callingUid != 0 && callingUid != Process.SYSTEM_UID) {
|
|
int uid = AppGlobals.getPackageManager()
|
|
.getPackageUid(packageName, UserHandle.getUserId(callingUid));
|
|
if (!UserHandle.isSameApp(callingUid, uid)) {
|
|
String msg = "Permission Denial: getIntentSender() from pid="
|
|
+ Binder.getCallingPid()
|
|
+ ", uid=" + Binder.getCallingUid()
|
|
+ ", (need uid=" + uid + ")"
|
|
+ " is not allowed to send as package " + packageName;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
}
|
|
|
|
if (DEBUG_MU)
|
|
Slog.i(TAG_MU, "Getting intent sender for origCallingUid="
|
|
+ Binder.getOrigCallingUid());
|
|
return getIntentSenderLocked(type, packageName, Binder.getOrigCallingUid(),
|
|
token, resultWho, requestCode, intents, resolvedTypes, flags, options);
|
|
|
|
} catch (RemoteException e) {
|
|
throw new SecurityException(e);
|
|
}
|
|
}
|
|
}
|
|
|
|
IIntentSender getIntentSenderLocked(int type,
|
|
String packageName, int callingUid, IBinder token, String resultWho,
|
|
int requestCode, Intent[] intents, String[] resolvedTypes, int flags,
|
|
Bundle options) {
|
|
if (DEBUG_MU)
|
|
Slog.v(TAG_MU, "getIntentSenderLocked(): uid=" + callingUid);
|
|
ActivityRecord activity = null;
|
|
if (type == ActivityManager.INTENT_SENDER_ACTIVITY_RESULT) {
|
|
activity = mMainStack.isInStackLocked(token);
|
|
if (activity == null) {
|
|
return null;
|
|
}
|
|
if (activity.finishing) {
|
|
return null;
|
|
}
|
|
}
|
|
|
|
final boolean noCreate = (flags&PendingIntent.FLAG_NO_CREATE) != 0;
|
|
final boolean cancelCurrent = (flags&PendingIntent.FLAG_CANCEL_CURRENT) != 0;
|
|
final boolean updateCurrent = (flags&PendingIntent.FLAG_UPDATE_CURRENT) != 0;
|
|
flags &= ~(PendingIntent.FLAG_NO_CREATE|PendingIntent.FLAG_CANCEL_CURRENT
|
|
|PendingIntent.FLAG_UPDATE_CURRENT);
|
|
|
|
PendingIntentRecord.Key key = new PendingIntentRecord.Key(
|
|
type, packageName, activity, resultWho,
|
|
requestCode, intents, resolvedTypes, flags, options,
|
|
UserHandle.getUserId(callingUid));
|
|
WeakReference<PendingIntentRecord> ref;
|
|
ref = mIntentSenderRecords.get(key);
|
|
PendingIntentRecord rec = ref != null ? ref.get() : null;
|
|
if (rec != null) {
|
|
if (!cancelCurrent) {
|
|
if (updateCurrent) {
|
|
if (rec.key.requestIntent != null) {
|
|
rec.key.requestIntent.replaceExtras(intents != null ?
|
|
intents[intents.length - 1] : null);
|
|
}
|
|
if (intents != null) {
|
|
intents[intents.length-1] = rec.key.requestIntent;
|
|
rec.key.allIntents = intents;
|
|
rec.key.allResolvedTypes = resolvedTypes;
|
|
} else {
|
|
rec.key.allIntents = null;
|
|
rec.key.allResolvedTypes = null;
|
|
}
|
|
}
|
|
return rec;
|
|
}
|
|
rec.canceled = true;
|
|
mIntentSenderRecords.remove(key);
|
|
}
|
|
if (noCreate) {
|
|
return rec;
|
|
}
|
|
rec = new PendingIntentRecord(this, key, callingUid);
|
|
mIntentSenderRecords.put(key, rec.ref);
|
|
if (type == ActivityManager.INTENT_SENDER_ACTIVITY_RESULT) {
|
|
if (activity.pendingResults == null) {
|
|
activity.pendingResults
|
|
= new HashSet<WeakReference<PendingIntentRecord>>();
|
|
}
|
|
activity.pendingResults.add(rec.ref);
|
|
}
|
|
return rec;
|
|
}
|
|
|
|
public void cancelIntentSender(IIntentSender sender) {
|
|
if (!(sender instanceof PendingIntentRecord)) {
|
|
return;
|
|
}
|
|
synchronized(this) {
|
|
PendingIntentRecord rec = (PendingIntentRecord)sender;
|
|
try {
|
|
int uid = AppGlobals.getPackageManager()
|
|
.getPackageUid(rec.key.packageName, UserHandle.getCallingUserId());
|
|
if (!UserHandle.isSameApp(uid, Binder.getCallingUid())) {
|
|
String msg = "Permission Denial: cancelIntentSender() from pid="
|
|
+ Binder.getCallingPid()
|
|
+ ", uid=" + Binder.getCallingUid()
|
|
+ " is not allowed to cancel packges "
|
|
+ rec.key.packageName;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
} catch (RemoteException e) {
|
|
throw new SecurityException(e);
|
|
}
|
|
cancelIntentSenderLocked(rec, true);
|
|
}
|
|
}
|
|
|
|
void cancelIntentSenderLocked(PendingIntentRecord rec, boolean cleanActivity) {
|
|
rec.canceled = true;
|
|
mIntentSenderRecords.remove(rec.key);
|
|
if (cleanActivity && rec.key.activity != null) {
|
|
rec.key.activity.pendingResults.remove(rec.ref);
|
|
}
|
|
}
|
|
|
|
public String getPackageForIntentSender(IIntentSender pendingResult) {
|
|
if (!(pendingResult instanceof PendingIntentRecord)) {
|
|
return null;
|
|
}
|
|
try {
|
|
PendingIntentRecord res = (PendingIntentRecord)pendingResult;
|
|
return res.key.packageName;
|
|
} catch (ClassCastException e) {
|
|
}
|
|
return null;
|
|
}
|
|
|
|
public int getUidForIntentSender(IIntentSender sender) {
|
|
if (sender instanceof PendingIntentRecord) {
|
|
try {
|
|
PendingIntentRecord res = (PendingIntentRecord)sender;
|
|
return res.uid;
|
|
} catch (ClassCastException e) {
|
|
}
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
public boolean isIntentSenderTargetedToPackage(IIntentSender pendingResult) {
|
|
if (!(pendingResult instanceof PendingIntentRecord)) {
|
|
return false;
|
|
}
|
|
try {
|
|
PendingIntentRecord res = (PendingIntentRecord)pendingResult;
|
|
if (res.key.allIntents == null) {
|
|
return false;
|
|
}
|
|
for (int i=0; i<res.key.allIntents.length; i++) {
|
|
Intent intent = res.key.allIntents[i];
|
|
if (intent.getPackage() != null && intent.getComponent() != null) {
|
|
return false;
|
|
}
|
|
}
|
|
return true;
|
|
} catch (ClassCastException e) {
|
|
}
|
|
return false;
|
|
}
|
|
|
|
public boolean isIntentSenderAnActivity(IIntentSender pendingResult) {
|
|
if (!(pendingResult instanceof PendingIntentRecord)) {
|
|
return false;
|
|
}
|
|
try {
|
|
PendingIntentRecord res = (PendingIntentRecord)pendingResult;
|
|
if (res.key.type == ActivityManager.INTENT_SENDER_ACTIVITY) {
|
|
return true;
|
|
}
|
|
return false;
|
|
} catch (ClassCastException e) {
|
|
}
|
|
return false;
|
|
}
|
|
|
|
public void setProcessLimit(int max) {
|
|
enforceCallingPermission(android.Manifest.permission.SET_PROCESS_LIMIT,
|
|
"setProcessLimit()");
|
|
synchronized (this) {
|
|
mProcessLimit = max < 0 ? ProcessList.MAX_HIDDEN_APPS : max;
|
|
mProcessLimitOverride = max;
|
|
}
|
|
trimApplications();
|
|
}
|
|
|
|
public int getProcessLimit() {
|
|
synchronized (this) {
|
|
return mProcessLimitOverride;
|
|
}
|
|
}
|
|
|
|
void foregroundTokenDied(ForegroundToken token) {
|
|
synchronized (ActivityManagerService.this) {
|
|
synchronized (mPidsSelfLocked) {
|
|
ForegroundToken cur
|
|
= mForegroundProcesses.get(token.pid);
|
|
if (cur != token) {
|
|
return;
|
|
}
|
|
mForegroundProcesses.remove(token.pid);
|
|
ProcessRecord pr = mPidsSelfLocked.get(token.pid);
|
|
if (pr == null) {
|
|
return;
|
|
}
|
|
pr.forcingToForeground = null;
|
|
pr.foregroundServices = false;
|
|
}
|
|
updateOomAdjLocked();
|
|
}
|
|
}
|
|
|
|
public void setProcessForeground(IBinder token, int pid, boolean isForeground) {
|
|
enforceCallingPermission(android.Manifest.permission.SET_PROCESS_LIMIT,
|
|
"setProcessForeground()");
|
|
synchronized(this) {
|
|
boolean changed = false;
|
|
|
|
synchronized (mPidsSelfLocked) {
|
|
ProcessRecord pr = mPidsSelfLocked.get(pid);
|
|
if (pr == null && isForeground) {
|
|
Slog.w(TAG, "setProcessForeground called on unknown pid: " + pid);
|
|
return;
|
|
}
|
|
ForegroundToken oldToken = mForegroundProcesses.get(pid);
|
|
if (oldToken != null) {
|
|
oldToken.token.unlinkToDeath(oldToken, 0);
|
|
mForegroundProcesses.remove(pid);
|
|
if (pr != null) {
|
|
pr.forcingToForeground = null;
|
|
}
|
|
changed = true;
|
|
}
|
|
if (isForeground && token != null) {
|
|
ForegroundToken newToken = new ForegroundToken() {
|
|
public void binderDied() {
|
|
foregroundTokenDied(this);
|
|
}
|
|
};
|
|
newToken.pid = pid;
|
|
newToken.token = token;
|
|
try {
|
|
token.linkToDeath(newToken, 0);
|
|
mForegroundProcesses.put(pid, newToken);
|
|
pr.forcingToForeground = token;
|
|
changed = true;
|
|
} catch (RemoteException e) {
|
|
// If the process died while doing this, we will later
|
|
// do the cleanup with the process death link.
|
|
}
|
|
}
|
|
}
|
|
|
|
if (changed) {
|
|
updateOomAdjLocked();
|
|
}
|
|
}
|
|
}
|
|
|
|
// =========================================================
|
|
// PERMISSIONS
|
|
// =========================================================
|
|
|
|
static class PermissionController extends IPermissionController.Stub {
|
|
ActivityManagerService mActivityManagerService;
|
|
PermissionController(ActivityManagerService activityManagerService) {
|
|
mActivityManagerService = activityManagerService;
|
|
}
|
|
|
|
public boolean checkPermission(String permission, int pid, int uid) {
|
|
return mActivityManagerService.checkPermission(permission, pid,
|
|
uid) == PackageManager.PERMISSION_GRANTED;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* This can be called with or without the global lock held.
|
|
*/
|
|
int checkComponentPermission(String permission, int pid, int uid,
|
|
int owningUid, boolean exported) {
|
|
// We might be performing an operation on behalf of an indirect binder
|
|
// invocation, e.g. via {@link #openContentUri}. Check and adjust the
|
|
// client identity accordingly before proceeding.
|
|
Identity tlsIdentity = sCallerIdentity.get();
|
|
if (tlsIdentity != null) {
|
|
Slog.d(TAG, "checkComponentPermission() adjusting {pid,uid} to {"
|
|
+ tlsIdentity.pid + "," + tlsIdentity.uid + "}");
|
|
uid = tlsIdentity.uid;
|
|
pid = tlsIdentity.pid;
|
|
}
|
|
|
|
if (pid == MY_PID) {
|
|
return PackageManager.PERMISSION_GRANTED;
|
|
}
|
|
|
|
return ActivityManager.checkComponentPermission(permission, uid,
|
|
owningUid, exported);
|
|
}
|
|
|
|
/**
|
|
* As the only public entry point for permissions checking, this method
|
|
* can enforce the semantic that requesting a check on a null global
|
|
* permission is automatically denied. (Internally a null permission
|
|
* string is used when calling {@link #checkComponentPermission} in cases
|
|
* when only uid-based security is needed.)
|
|
*
|
|
* This can be called with or without the global lock held.
|
|
*/
|
|
public int checkPermission(String permission, int pid, int uid) {
|
|
if (permission == null) {
|
|
return PackageManager.PERMISSION_DENIED;
|
|
}
|
|
return checkComponentPermission(permission, pid, UserHandle.getAppId(uid), -1, true);
|
|
}
|
|
|
|
/**
|
|
* Binder IPC calls go through the public entry point.
|
|
* This can be called with or without the global lock held.
|
|
*/
|
|
int checkCallingPermission(String permission) {
|
|
return checkPermission(permission,
|
|
Binder.getCallingPid(),
|
|
UserHandle.getAppId(Binder.getCallingUid()));
|
|
}
|
|
|
|
/**
|
|
* This can be called with or without the global lock held.
|
|
*/
|
|
void enforceCallingPermission(String permission, String func) {
|
|
if (checkCallingPermission(permission)
|
|
== PackageManager.PERMISSION_GRANTED) {
|
|
return;
|
|
}
|
|
|
|
String msg = "Permission Denial: " + func + " from pid="
|
|
+ Binder.getCallingPid()
|
|
+ ", uid=" + Binder.getCallingUid()
|
|
+ " requires " + permission;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
|
|
/**
|
|
* Determine if UID is holding permissions required to access {@link Uri} in
|
|
* the given {@link ProviderInfo}. Final permission checking is always done
|
|
* in {@link ContentProvider}.
|
|
*/
|
|
private final boolean checkHoldingPermissionsLocked(
|
|
IPackageManager pm, ProviderInfo pi, Uri uri, int uid, int modeFlags) {
|
|
if (DEBUG_URI_PERMISSION) Slog.v(TAG,
|
|
"checkHoldingPermissionsLocked: uri=" + uri + " uid=" + uid);
|
|
|
|
if (pi.applicationInfo.uid == uid) {
|
|
return true;
|
|
} else if (!pi.exported) {
|
|
return false;
|
|
}
|
|
|
|
boolean readMet = (modeFlags & Intent.FLAG_GRANT_READ_URI_PERMISSION) == 0;
|
|
boolean writeMet = (modeFlags & Intent.FLAG_GRANT_WRITE_URI_PERMISSION) == 0;
|
|
try {
|
|
// check if target holds top-level <provider> permissions
|
|
if (!readMet && pi.readPermission != null
|
|
&& (pm.checkUidPermission(pi.readPermission, uid) == PERMISSION_GRANTED)) {
|
|
readMet = true;
|
|
}
|
|
if (!writeMet && pi.writePermission != null
|
|
&& (pm.checkUidPermission(pi.writePermission, uid) == PERMISSION_GRANTED)) {
|
|
writeMet = true;
|
|
}
|
|
|
|
// track if unprotected read/write is allowed; any denied
|
|
// <path-permission> below removes this ability
|
|
boolean allowDefaultRead = pi.readPermission == null;
|
|
boolean allowDefaultWrite = pi.writePermission == null;
|
|
|
|
// check if target holds any <path-permission> that match uri
|
|
final PathPermission[] pps = pi.pathPermissions;
|
|
if (pps != null) {
|
|
final String path = uri.getPath();
|
|
int i = pps.length;
|
|
while (i > 0 && (!readMet || !writeMet)) {
|
|
i--;
|
|
PathPermission pp = pps[i];
|
|
if (pp.match(path)) {
|
|
if (!readMet) {
|
|
final String pprperm = pp.getReadPermission();
|
|
if (DEBUG_URI_PERMISSION) Slog.v(TAG, "Checking read perm for "
|
|
+ pprperm + " for " + pp.getPath()
|
|
+ ": match=" + pp.match(path)
|
|
+ " check=" + pm.checkUidPermission(pprperm, uid));
|
|
if (pprperm != null) {
|
|
if (pm.checkUidPermission(pprperm, uid) == PERMISSION_GRANTED) {
|
|
readMet = true;
|
|
} else {
|
|
allowDefaultRead = false;
|
|
}
|
|
}
|
|
}
|
|
if (!writeMet) {
|
|
final String ppwperm = pp.getWritePermission();
|
|
if (DEBUG_URI_PERMISSION) Slog.v(TAG, "Checking write perm "
|
|
+ ppwperm + " for " + pp.getPath()
|
|
+ ": match=" + pp.match(path)
|
|
+ " check=" + pm.checkUidPermission(ppwperm, uid));
|
|
if (ppwperm != null) {
|
|
if (pm.checkUidPermission(ppwperm, uid) == PERMISSION_GRANTED) {
|
|
writeMet = true;
|
|
} else {
|
|
allowDefaultWrite = false;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// grant unprotected <provider> read/write, if not blocked by
|
|
// <path-permission> above
|
|
if (allowDefaultRead) readMet = true;
|
|
if (allowDefaultWrite) writeMet = true;
|
|
|
|
} catch (RemoteException e) {
|
|
return false;
|
|
}
|
|
|
|
return readMet && writeMet;
|
|
}
|
|
|
|
private final boolean checkUriPermissionLocked(Uri uri, int uid,
|
|
int modeFlags) {
|
|
// Root gets to do everything.
|
|
if (uid == 0) {
|
|
return true;
|
|
}
|
|
HashMap<Uri, UriPermission> perms = mGrantedUriPermissions.get(uid);
|
|
if (perms == null) return false;
|
|
UriPermission perm = perms.get(uri);
|
|
if (perm == null) return false;
|
|
return (modeFlags&perm.modeFlags) == modeFlags;
|
|
}
|
|
|
|
public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) {
|
|
enforceNotIsolatedCaller("checkUriPermission");
|
|
|
|
// Another redirected-binder-call permissions check as in
|
|
// {@link checkComponentPermission}.
|
|
Identity tlsIdentity = sCallerIdentity.get();
|
|
if (tlsIdentity != null) {
|
|
uid = tlsIdentity.uid;
|
|
pid = tlsIdentity.pid;
|
|
}
|
|
|
|
uid = UserHandle.getAppId(uid);
|
|
// Our own process gets to do everything.
|
|
if (pid == MY_PID) {
|
|
return PackageManager.PERMISSION_GRANTED;
|
|
}
|
|
synchronized(this) {
|
|
return checkUriPermissionLocked(uri, uid, modeFlags)
|
|
? PackageManager.PERMISSION_GRANTED
|
|
: PackageManager.PERMISSION_DENIED;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Check if the targetPkg can be granted permission to access uri by
|
|
* the callingUid using the given modeFlags. Throws a security exception
|
|
* if callingUid is not allowed to do this. Returns the uid of the target
|
|
* if the URI permission grant should be performed; returns -1 if it is not
|
|
* needed (for example targetPkg already has permission to access the URI).
|
|
* If you already know the uid of the target, you can supply it in
|
|
* lastTargetUid else set that to -1.
|
|
*/
|
|
int checkGrantUriPermissionLocked(int callingUid, String targetPkg,
|
|
Uri uri, int modeFlags, int lastTargetUid) {
|
|
modeFlags &= (Intent.FLAG_GRANT_READ_URI_PERMISSION
|
|
| Intent.FLAG_GRANT_WRITE_URI_PERMISSION);
|
|
if (modeFlags == 0) {
|
|
return -1;
|
|
}
|
|
|
|
if (targetPkg != null) {
|
|
if (DEBUG_URI_PERMISSION) Slog.v(TAG,
|
|
"Checking grant " + targetPkg + " permission to " + uri);
|
|
}
|
|
|
|
final IPackageManager pm = AppGlobals.getPackageManager();
|
|
|
|
// If this is not a content: uri, we can't do anything with it.
|
|
if (!ContentResolver.SCHEME_CONTENT.equals(uri.getScheme())) {
|
|
if (DEBUG_URI_PERMISSION) Slog.v(TAG,
|
|
"Can't grant URI permission for non-content URI: " + uri);
|
|
return -1;
|
|
}
|
|
|
|
String name = uri.getAuthority();
|
|
ProviderInfo pi = null;
|
|
ContentProviderRecord cpr = mProviderMap.getProviderByName(name,
|
|
UserHandle.getUserId(callingUid));
|
|
if (cpr != null) {
|
|
pi = cpr.info;
|
|
} else {
|
|
try {
|
|
pi = pm.resolveContentProvider(name,
|
|
PackageManager.GET_URI_PERMISSION_PATTERNS, UserHandle.getUserId(callingUid));
|
|
} catch (RemoteException ex) {
|
|
}
|
|
}
|
|
if (pi == null) {
|
|
Slog.w(TAG, "No content provider found for permission check: " + uri.toSafeString());
|
|
return -1;
|
|
}
|
|
|
|
int targetUid = lastTargetUid;
|
|
if (targetUid < 0 && targetPkg != null) {
|
|
try {
|
|
targetUid = pm.getPackageUid(targetPkg, UserHandle.getUserId(callingUid));
|
|
if (targetUid < 0) {
|
|
if (DEBUG_URI_PERMISSION) Slog.v(TAG,
|
|
"Can't grant URI permission no uid for: " + targetPkg);
|
|
return -1;
|
|
}
|
|
} catch (RemoteException ex) {
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
if (targetUid >= 0) {
|
|
// First... does the target actually need this permission?
|
|
if (checkHoldingPermissionsLocked(pm, pi, uri, targetUid, modeFlags)) {
|
|
// No need to grant the target this permission.
|
|
if (DEBUG_URI_PERMISSION) Slog.v(TAG,
|
|
"Target " + targetPkg + " already has full permission to " + uri);
|
|
return -1;
|
|
}
|
|
} else {
|
|
// First... there is no target package, so can anyone access it?
|
|
boolean allowed = pi.exported;
|
|
if ((modeFlags&Intent.FLAG_GRANT_READ_URI_PERMISSION) != 0) {
|
|
if (pi.readPermission != null) {
|
|
allowed = false;
|
|
}
|
|
}
|
|
if ((modeFlags&Intent.FLAG_GRANT_WRITE_URI_PERMISSION) != 0) {
|
|
if (pi.writePermission != null) {
|
|
allowed = false;
|
|
}
|
|
}
|
|
if (allowed) {
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
// Second... is the provider allowing granting of URI permissions?
|
|
if (!pi.grantUriPermissions) {
|
|
throw new SecurityException("Provider " + pi.packageName
|
|
+ "/" + pi.name
|
|
+ " does not allow granting of Uri permissions (uri "
|
|
+ uri + ")");
|
|
}
|
|
if (pi.uriPermissionPatterns != null) {
|
|
final int N = pi.uriPermissionPatterns.length;
|
|
boolean allowed = false;
|
|
for (int i=0; i<N; i++) {
|
|
if (pi.uriPermissionPatterns[i] != null
|
|
&& pi.uriPermissionPatterns[i].match(uri.getPath())) {
|
|
allowed = true;
|
|
break;
|
|
}
|
|
}
|
|
if (!allowed) {
|
|
throw new SecurityException("Provider " + pi.packageName
|
|
+ "/" + pi.name
|
|
+ " does not allow granting of permission to path of Uri "
|
|
+ uri);
|
|
}
|
|
}
|
|
|
|
// Third... does the caller itself have permission to access
|
|
// this uri?
|
|
if (callingUid != Process.myUid()) {
|
|
if (!checkHoldingPermissionsLocked(pm, pi, uri, callingUid, modeFlags)) {
|
|
if (!checkUriPermissionLocked(uri, callingUid, modeFlags)) {
|
|
throw new SecurityException("Uid " + callingUid
|
|
+ " does not have permission to uri " + uri);
|
|
}
|
|
}
|
|
}
|
|
|
|
return targetUid;
|
|
}
|
|
|
|
public int checkGrantUriPermission(int callingUid, String targetPkg,
|
|
Uri uri, int modeFlags) {
|
|
enforceNotIsolatedCaller("checkGrantUriPermission");
|
|
synchronized(this) {
|
|
return checkGrantUriPermissionLocked(callingUid, targetPkg, uri, modeFlags, -1);
|
|
}
|
|
}
|
|
|
|
void grantUriPermissionUncheckedLocked(int targetUid, String targetPkg,
|
|
Uri uri, int modeFlags, UriPermissionOwner owner) {
|
|
modeFlags &= (Intent.FLAG_GRANT_READ_URI_PERMISSION
|
|
| Intent.FLAG_GRANT_WRITE_URI_PERMISSION);
|
|
if (modeFlags == 0) {
|
|
return;
|
|
}
|
|
|
|
// So here we are: the caller has the assumed permission
|
|
// to the uri, and the target doesn't. Let's now give this to
|
|
// the target.
|
|
|
|
if (DEBUG_URI_PERMISSION) Slog.v(TAG,
|
|
"Granting " + targetPkg + "/" + targetUid + " permission to " + uri);
|
|
|
|
HashMap<Uri, UriPermission> targetUris
|
|
= mGrantedUriPermissions.get(targetUid);
|
|
if (targetUris == null) {
|
|
targetUris = new HashMap<Uri, UriPermission>();
|
|
mGrantedUriPermissions.put(targetUid, targetUris);
|
|
}
|
|
|
|
UriPermission perm = targetUris.get(uri);
|
|
if (perm == null) {
|
|
perm = new UriPermission(targetUid, uri);
|
|
targetUris.put(uri, perm);
|
|
}
|
|
|
|
perm.modeFlags |= modeFlags;
|
|
if (owner == null) {
|
|
perm.globalModeFlags |= modeFlags;
|
|
} else {
|
|
if ((modeFlags&Intent.FLAG_GRANT_READ_URI_PERMISSION) != 0) {
|
|
perm.readOwners.add(owner);
|
|
owner.addReadPermission(perm);
|
|
}
|
|
if ((modeFlags&Intent.FLAG_GRANT_WRITE_URI_PERMISSION) != 0) {
|
|
perm.writeOwners.add(owner);
|
|
owner.addWritePermission(perm);
|
|
}
|
|
}
|
|
}
|
|
|
|
void grantUriPermissionLocked(int callingUid, String targetPkg, Uri uri,
|
|
int modeFlags, UriPermissionOwner owner) {
|
|
if (targetPkg == null) {
|
|
throw new NullPointerException("targetPkg");
|
|
}
|
|
|
|
int targetUid = checkGrantUriPermissionLocked(callingUid, targetPkg, uri, modeFlags, -1);
|
|
if (targetUid < 0) {
|
|
return;
|
|
}
|
|
|
|
grantUriPermissionUncheckedLocked(targetUid, targetPkg, uri, modeFlags, owner);
|
|
}
|
|
|
|
static class NeededUriGrants extends ArrayList<Uri> {
|
|
final String targetPkg;
|
|
final int targetUid;
|
|
final int flags;
|
|
|
|
NeededUriGrants(String _targetPkg, int _targetUid, int _flags) {
|
|
targetPkg = _targetPkg;
|
|
targetUid = _targetUid;
|
|
flags = _flags;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Like checkGrantUriPermissionLocked, but takes an Intent.
|
|
*/
|
|
NeededUriGrants checkGrantUriPermissionFromIntentLocked(int callingUid,
|
|
String targetPkg, Intent intent, int mode, NeededUriGrants needed) {
|
|
if (DEBUG_URI_PERMISSION) Slog.v(TAG,
|
|
"Checking URI perm to data=" + (intent != null ? intent.getData() : null)
|
|
+ " clip=" + (intent != null ? intent.getClipData() : null)
|
|
+ " from " + intent + "; flags=0x"
|
|
+ Integer.toHexString(intent != null ? intent.getFlags() : 0));
|
|
|
|
if (targetPkg == null) {
|
|
throw new NullPointerException("targetPkg");
|
|
}
|
|
|
|
if (intent == null) {
|
|
return null;
|
|
}
|
|
Uri data = intent.getData();
|
|
ClipData clip = intent.getClipData();
|
|
if (data == null && clip == null) {
|
|
return null;
|
|
}
|
|
if (data != null) {
|
|
int target = checkGrantUriPermissionLocked(callingUid, targetPkg, data,
|
|
mode, needed != null ? needed.targetUid : -1);
|
|
if (target > 0) {
|
|
if (needed == null) {
|
|
needed = new NeededUriGrants(targetPkg, target, mode);
|
|
}
|
|
needed.add(data);
|
|
}
|
|
}
|
|
if (clip != null) {
|
|
for (int i=0; i<clip.getItemCount(); i++) {
|
|
Uri uri = clip.getItemAt(i).getUri();
|
|
if (uri != null) {
|
|
int target = -1;
|
|
target = checkGrantUriPermissionLocked(callingUid, targetPkg, uri,
|
|
mode, needed != null ? needed.targetUid : -1);
|
|
if (target > 0) {
|
|
if (needed == null) {
|
|
needed = new NeededUriGrants(targetPkg, target, mode);
|
|
}
|
|
needed.add(uri);
|
|
}
|
|
} else {
|
|
Intent clipIntent = clip.getItemAt(i).getIntent();
|
|
if (clipIntent != null) {
|
|
NeededUriGrants newNeeded = checkGrantUriPermissionFromIntentLocked(
|
|
callingUid, targetPkg, clipIntent, mode, needed);
|
|
if (newNeeded != null) {
|
|
needed = newNeeded;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return needed;
|
|
}
|
|
|
|
/**
|
|
* Like grantUriPermissionUncheckedLocked, but takes an Intent.
|
|
*/
|
|
void grantUriPermissionUncheckedFromIntentLocked(NeededUriGrants needed,
|
|
UriPermissionOwner owner) {
|
|
if (needed != null) {
|
|
for (int i=0; i<needed.size(); i++) {
|
|
grantUriPermissionUncheckedLocked(needed.targetUid, needed.targetPkg,
|
|
needed.get(i), needed.flags, owner);
|
|
}
|
|
}
|
|
}
|
|
|
|
void grantUriPermissionFromIntentLocked(int callingUid,
|
|
String targetPkg, Intent intent, UriPermissionOwner owner) {
|
|
NeededUriGrants needed = checkGrantUriPermissionFromIntentLocked(callingUid, targetPkg,
|
|
intent, intent != null ? intent.getFlags() : 0, null);
|
|
if (needed == null) {
|
|
return;
|
|
}
|
|
|
|
grantUriPermissionUncheckedFromIntentLocked(needed, owner);
|
|
}
|
|
|
|
public void grantUriPermission(IApplicationThread caller, String targetPkg,
|
|
Uri uri, int modeFlags) {
|
|
enforceNotIsolatedCaller("grantUriPermission");
|
|
synchronized(this) {
|
|
final ProcessRecord r = getRecordForAppLocked(caller);
|
|
if (r == null) {
|
|
throw new SecurityException("Unable to find app for caller "
|
|
+ caller
|
|
+ " when granting permission to uri " + uri);
|
|
}
|
|
if (targetPkg == null) {
|
|
throw new IllegalArgumentException("null target");
|
|
}
|
|
if (uri == null) {
|
|
throw new IllegalArgumentException("null uri");
|
|
}
|
|
|
|
grantUriPermissionLocked(r.uid, targetPkg, uri, modeFlags,
|
|
null);
|
|
}
|
|
}
|
|
|
|
void removeUriPermissionIfNeededLocked(UriPermission perm) {
|
|
if ((perm.modeFlags&(Intent.FLAG_GRANT_READ_URI_PERMISSION
|
|
|Intent.FLAG_GRANT_WRITE_URI_PERMISSION)) == 0) {
|
|
HashMap<Uri, UriPermission> perms
|
|
= mGrantedUriPermissions.get(perm.uid);
|
|
if (perms != null) {
|
|
if (DEBUG_URI_PERMISSION) Slog.v(TAG,
|
|
"Removing " + perm.uid + " permission to " + perm.uri);
|
|
perms.remove(perm.uri);
|
|
if (perms.size() == 0) {
|
|
mGrantedUriPermissions.remove(perm.uid);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
private void revokeUriPermissionLocked(int callingUid, Uri uri,
|
|
int modeFlags) {
|
|
modeFlags &= (Intent.FLAG_GRANT_READ_URI_PERMISSION
|
|
| Intent.FLAG_GRANT_WRITE_URI_PERMISSION);
|
|
if (modeFlags == 0) {
|
|
return;
|
|
}
|
|
|
|
if (DEBUG_URI_PERMISSION) Slog.v(TAG,
|
|
"Revoking all granted permissions to " + uri);
|
|
|
|
final IPackageManager pm = AppGlobals.getPackageManager();
|
|
|
|
final String authority = uri.getAuthority();
|
|
ProviderInfo pi = null;
|
|
int userId = UserHandle.getUserId(callingUid);
|
|
ContentProviderRecord cpr = mProviderMap.getProviderByName(authority, userId);
|
|
if (cpr != null) {
|
|
pi = cpr.info;
|
|
} else {
|
|
try {
|
|
pi = pm.resolveContentProvider(authority,
|
|
PackageManager.GET_URI_PERMISSION_PATTERNS, userId);
|
|
} catch (RemoteException ex) {
|
|
}
|
|
}
|
|
if (pi == null) {
|
|
Slog.w(TAG, "No content provider found for permission revoke: " + uri.toSafeString());
|
|
return;
|
|
}
|
|
|
|
// Does the caller have this permission on the URI?
|
|
if (!checkHoldingPermissionsLocked(pm, pi, uri, callingUid, modeFlags)) {
|
|
// Right now, if you are not the original owner of the permission,
|
|
// you are not allowed to revoke it.
|
|
//if (!checkUriPermissionLocked(uri, callingUid, modeFlags)) {
|
|
throw new SecurityException("Uid " + callingUid
|
|
+ " does not have permission to uri " + uri);
|
|
//}
|
|
}
|
|
|
|
// Go through all of the permissions and remove any that match.
|
|
final List<String> SEGMENTS = uri.getPathSegments();
|
|
if (SEGMENTS != null) {
|
|
final int NS = SEGMENTS.size();
|
|
int N = mGrantedUriPermissions.size();
|
|
for (int i=0; i<N; i++) {
|
|
HashMap<Uri, UriPermission> perms
|
|
= mGrantedUriPermissions.valueAt(i);
|
|
Iterator<UriPermission> it = perms.values().iterator();
|
|
toploop:
|
|
while (it.hasNext()) {
|
|
UriPermission perm = it.next();
|
|
Uri targetUri = perm.uri;
|
|
if (!authority.equals(targetUri.getAuthority())) {
|
|
continue;
|
|
}
|
|
List<String> targetSegments = targetUri.getPathSegments();
|
|
if (targetSegments == null) {
|
|
continue;
|
|
}
|
|
if (targetSegments.size() < NS) {
|
|
continue;
|
|
}
|
|
for (int j=0; j<NS; j++) {
|
|
if (!SEGMENTS.get(j).equals(targetSegments.get(j))) {
|
|
continue toploop;
|
|
}
|
|
}
|
|
if (DEBUG_URI_PERMISSION) Slog.v(TAG,
|
|
"Revoking " + perm.uid + " permission to " + perm.uri);
|
|
perm.clearModes(modeFlags);
|
|
if (perm.modeFlags == 0) {
|
|
it.remove();
|
|
}
|
|
}
|
|
if (perms.size() == 0) {
|
|
mGrantedUriPermissions.remove(
|
|
mGrantedUriPermissions.keyAt(i));
|
|
N--;
|
|
i--;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
public void revokeUriPermission(IApplicationThread caller, Uri uri,
|
|
int modeFlags) {
|
|
enforceNotIsolatedCaller("revokeUriPermission");
|
|
synchronized(this) {
|
|
final ProcessRecord r = getRecordForAppLocked(caller);
|
|
if (r == null) {
|
|
throw new SecurityException("Unable to find app for caller "
|
|
+ caller
|
|
+ " when revoking permission to uri " + uri);
|
|
}
|
|
if (uri == null) {
|
|
Slog.w(TAG, "revokeUriPermission: null uri");
|
|
return;
|
|
}
|
|
|
|
modeFlags &= (Intent.FLAG_GRANT_READ_URI_PERMISSION
|
|
| Intent.FLAG_GRANT_WRITE_URI_PERMISSION);
|
|
if (modeFlags == 0) {
|
|
return;
|
|
}
|
|
|
|
final IPackageManager pm = AppGlobals.getPackageManager();
|
|
|
|
final String authority = uri.getAuthority();
|
|
ProviderInfo pi = null;
|
|
ContentProviderRecord cpr = mProviderMap.getProviderByName(authority, r.userId);
|
|
if (cpr != null) {
|
|
pi = cpr.info;
|
|
} else {
|
|
try {
|
|
pi = pm.resolveContentProvider(authority,
|
|
PackageManager.GET_URI_PERMISSION_PATTERNS, r.userId);
|
|
} catch (RemoteException ex) {
|
|
}
|
|
}
|
|
if (pi == null) {
|
|
Slog.w(TAG, "No content provider found for permission revoke: "
|
|
+ uri.toSafeString());
|
|
return;
|
|
}
|
|
|
|
revokeUriPermissionLocked(r.uid, uri, modeFlags);
|
|
}
|
|
}
|
|
|
|
@Override
|
|
public IBinder newUriPermissionOwner(String name) {
|
|
enforceNotIsolatedCaller("newUriPermissionOwner");
|
|
synchronized(this) {
|
|
UriPermissionOwner owner = new UriPermissionOwner(this, name);
|
|
return owner.getExternalTokenLocked();
|
|
}
|
|
}
|
|
|
|
@Override
|
|
public void grantUriPermissionFromOwner(IBinder token, int fromUid, String targetPkg,
|
|
Uri uri, int modeFlags) {
|
|
synchronized(this) {
|
|
UriPermissionOwner owner = UriPermissionOwner.fromExternalToken(token);
|
|
if (owner == null) {
|
|
throw new IllegalArgumentException("Unknown owner: " + token);
|
|
}
|
|
if (fromUid != Binder.getCallingUid()) {
|
|
if (Binder.getCallingUid() != Process.myUid()) {
|
|
// Only system code can grant URI permissions on behalf
|
|
// of other users.
|
|
throw new SecurityException("nice try");
|
|
}
|
|
}
|
|
if (targetPkg == null) {
|
|
throw new IllegalArgumentException("null target");
|
|
}
|
|
if (uri == null) {
|
|
throw new IllegalArgumentException("null uri");
|
|
}
|
|
|
|
grantUriPermissionLocked(fromUid, targetPkg, uri, modeFlags, owner);
|
|
}
|
|
}
|
|
|
|
@Override
|
|
public void revokeUriPermissionFromOwner(IBinder token, Uri uri, int mode) {
|
|
synchronized(this) {
|
|
UriPermissionOwner owner = UriPermissionOwner.fromExternalToken(token);
|
|
if (owner == null) {
|
|
throw new IllegalArgumentException("Unknown owner: " + token);
|
|
}
|
|
|
|
if (uri == null) {
|
|
owner.removeUriPermissionsLocked(mode);
|
|
} else {
|
|
owner.removeUriPermissionLocked(uri, mode);
|
|
}
|
|
}
|
|
}
|
|
|
|
public void showWaitingForDebugger(IApplicationThread who, boolean waiting) {
|
|
synchronized (this) {
|
|
ProcessRecord app =
|
|
who != null ? getRecordForAppLocked(who) : null;
|
|
if (app == null) return;
|
|
|
|
Message msg = Message.obtain();
|
|
msg.what = WAIT_FOR_DEBUGGER_MSG;
|
|
msg.obj = app;
|
|
msg.arg1 = waiting ? 1 : 0;
|
|
mHandler.sendMessage(msg);
|
|
}
|
|
}
|
|
|
|
public void getMemoryInfo(ActivityManager.MemoryInfo outInfo) {
|
|
final long homeAppMem = mProcessList.getMemLevel(ProcessList.HOME_APP_ADJ);
|
|
final long hiddenAppMem = mProcessList.getMemLevel(ProcessList.HIDDEN_APP_MIN_ADJ);
|
|
outInfo.availMem = Process.getFreeMemory();
|
|
outInfo.totalMem = Process.getTotalMemory();
|
|
outInfo.threshold = homeAppMem;
|
|
outInfo.lowMemory = outInfo.availMem < (homeAppMem + ((hiddenAppMem-homeAppMem)/2));
|
|
outInfo.hiddenAppThreshold = hiddenAppMem;
|
|
outInfo.secondaryServerThreshold = mProcessList.getMemLevel(
|
|
ProcessList.SERVICE_ADJ);
|
|
outInfo.visibleAppThreshold = mProcessList.getMemLevel(
|
|
ProcessList.VISIBLE_APP_ADJ);
|
|
outInfo.foregroundAppThreshold = mProcessList.getMemLevel(
|
|
ProcessList.FOREGROUND_APP_ADJ);
|
|
}
|
|
|
|
// =========================================================
|
|
// TASK MANAGEMENT
|
|
// =========================================================
|
|
|
|
public List getTasks(int maxNum, int flags,
|
|
IThumbnailReceiver receiver) {
|
|
ArrayList list = new ArrayList();
|
|
|
|
PendingThumbnailsRecord pending = null;
|
|
IApplicationThread topThumbnail = null;
|
|
ActivityRecord topRecord = null;
|
|
|
|
synchronized(this) {
|
|
if (localLOGV) Slog.v(
|
|
TAG, "getTasks: max=" + maxNum + ", flags=" + flags
|
|
+ ", receiver=" + receiver);
|
|
|
|
if (checkCallingPermission(android.Manifest.permission.GET_TASKS)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
if (receiver != null) {
|
|
// If the caller wants to wait for pending thumbnails,
|
|
// it ain't gonna get them.
|
|
try {
|
|
receiver.finished();
|
|
} catch (RemoteException ex) {
|
|
}
|
|
}
|
|
String msg = "Permission Denial: getTasks() from pid="
|
|
+ Binder.getCallingPid()
|
|
+ ", uid=" + Binder.getCallingUid()
|
|
+ " requires " + android.Manifest.permission.GET_TASKS;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
|
|
int pos = mMainStack.mHistory.size()-1;
|
|
ActivityRecord next =
|
|
pos >= 0 ? (ActivityRecord)mMainStack.mHistory.get(pos) : null;
|
|
ActivityRecord top = null;
|
|
TaskRecord curTask = null;
|
|
int numActivities = 0;
|
|
int numRunning = 0;
|
|
while (pos >= 0 && maxNum > 0) {
|
|
final ActivityRecord r = next;
|
|
pos--;
|
|
next = pos >= 0 ? (ActivityRecord)mMainStack.mHistory.get(pos) : null;
|
|
|
|
// Initialize state for next task if needed.
|
|
if (top == null ||
|
|
(top.state == ActivityState.INITIALIZING
|
|
&& top.task == r.task)) {
|
|
top = r;
|
|
curTask = r.task;
|
|
numActivities = numRunning = 0;
|
|
}
|
|
|
|
// Add 'r' into the current task.
|
|
numActivities++;
|
|
if (r.app != null && r.app.thread != null) {
|
|
numRunning++;
|
|
}
|
|
|
|
if (localLOGV) Slog.v(
|
|
TAG, r.intent.getComponent().flattenToShortString()
|
|
+ ": task=" + r.task);
|
|
|
|
// If the next one is a different task, generate a new
|
|
// TaskInfo entry for what we have.
|
|
if (next == null || next.task != curTask) {
|
|
ActivityManager.RunningTaskInfo ci
|
|
= new ActivityManager.RunningTaskInfo();
|
|
ci.id = curTask.taskId;
|
|
ci.baseActivity = r.intent.getComponent();
|
|
ci.topActivity = top.intent.getComponent();
|
|
if (top.thumbHolder != null) {
|
|
ci.description = top.thumbHolder.lastDescription;
|
|
}
|
|
ci.numActivities = numActivities;
|
|
ci.numRunning = numRunning;
|
|
//System.out.println(
|
|
// "#" + maxNum + ": " + " descr=" + ci.description);
|
|
if (ci.thumbnail == null && receiver != null) {
|
|
if (localLOGV) Slog.v(
|
|
TAG, "State=" + top.state + "Idle=" + top.idle
|
|
+ " app=" + top.app
|
|
+ " thr=" + (top.app != null ? top.app.thread : null));
|
|
if (top.state == ActivityState.RESUMED
|
|
|| top.state == ActivityState.PAUSING) {
|
|
if (top.idle && top.app != null
|
|
&& top.app.thread != null) {
|
|
topRecord = top;
|
|
topThumbnail = top.app.thread;
|
|
} else {
|
|
top.thumbnailNeeded = true;
|
|
}
|
|
}
|
|
if (pending == null) {
|
|
pending = new PendingThumbnailsRecord(receiver);
|
|
}
|
|
pending.pendingRecords.add(top);
|
|
}
|
|
list.add(ci);
|
|
maxNum--;
|
|
top = null;
|
|
}
|
|
}
|
|
|
|
if (pending != null) {
|
|
mPendingThumbnails.add(pending);
|
|
}
|
|
}
|
|
|
|
if (localLOGV) Slog.v(TAG, "We have pending thumbnails: " + pending);
|
|
|
|
if (topThumbnail != null) {
|
|
if (localLOGV) Slog.v(TAG, "Requesting top thumbnail");
|
|
try {
|
|
topThumbnail.requestThumbnail(topRecord.appToken);
|
|
} catch (Exception e) {
|
|
Slog.w(TAG, "Exception thrown when requesting thumbnail", e);
|
|
sendPendingThumbnail(null, topRecord.appToken, null, null, true);
|
|
}
|
|
}
|
|
|
|
if (pending == null && receiver != null) {
|
|
// In this case all thumbnails were available and the client
|
|
// is being asked to be told when the remaining ones come in...
|
|
// which is unusually, since the top-most currently running
|
|
// activity should never have a canned thumbnail! Oh well.
|
|
try {
|
|
receiver.finished();
|
|
} catch (RemoteException ex) {
|
|
}
|
|
}
|
|
|
|
return list;
|
|
}
|
|
|
|
public List<ActivityManager.RecentTaskInfo> getRecentTasks(int maxNum,
|
|
int flags, int userId) {
|
|
final int callingUid = Binder.getCallingUid();
|
|
if (userId != UserHandle.getCallingUserId()) {
|
|
// Check if the caller is holding permissions for cross-user requests.
|
|
if (checkComponentPermission(
|
|
android.Manifest.permission.INTERACT_ACROSS_USERS_FULL,
|
|
Binder.getCallingPid(), callingUid, -1, true)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
String msg = "Permission Denial: "
|
|
+ "Request to get recent tasks for user " + userId
|
|
+ " but is calling from user " + UserHandle.getUserId(callingUid)
|
|
+ "; this requires "
|
|
+ android.Manifest.permission.INTERACT_ACROSS_USERS_FULL;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
} else {
|
|
if (userId == UserHandle.USER_CURRENT) {
|
|
userId = mCurrentUserId;
|
|
}
|
|
}
|
|
}
|
|
|
|
synchronized (this) {
|
|
enforceCallingPermission(android.Manifest.permission.GET_TASKS,
|
|
"getRecentTasks()");
|
|
final boolean detailed = checkCallingPermission(
|
|
android.Manifest.permission.GET_DETAILED_TASKS)
|
|
== PackageManager.PERMISSION_GRANTED;
|
|
|
|
IPackageManager pm = AppGlobals.getPackageManager();
|
|
|
|
final int N = mRecentTasks.size();
|
|
ArrayList<ActivityManager.RecentTaskInfo> res
|
|
= new ArrayList<ActivityManager.RecentTaskInfo>(
|
|
maxNum < N ? maxNum : N);
|
|
for (int i=0; i<N && maxNum > 0; i++) {
|
|
TaskRecord tr = mRecentTasks.get(i);
|
|
// Only add calling user's recent tasks
|
|
if (tr.userId != userId) continue;
|
|
// Return the entry if desired by the caller. We always return
|
|
// the first entry, because callers always expect this to be the
|
|
// foreground app. We may filter others if the caller has
|
|
// not supplied RECENT_WITH_EXCLUDED and there is some reason
|
|
// we should exclude the entry.
|
|
|
|
if (i == 0
|
|
|| ((flags&ActivityManager.RECENT_WITH_EXCLUDED) != 0)
|
|
|| (tr.intent == null)
|
|
|| ((tr.intent.getFlags()
|
|
&Intent.FLAG_ACTIVITY_EXCLUDE_FROM_RECENTS) == 0)) {
|
|
ActivityManager.RecentTaskInfo rti
|
|
= new ActivityManager.RecentTaskInfo();
|
|
rti.id = tr.numActivities > 0 ? tr.taskId : -1;
|
|
rti.persistentId = tr.taskId;
|
|
rti.baseIntent = new Intent(
|
|
tr.intent != null ? tr.intent : tr.affinityIntent);
|
|
if (!detailed) {
|
|
rti.baseIntent.replaceExtras((Bundle)null);
|
|
}
|
|
rti.origActivity = tr.origActivity;
|
|
rti.description = tr.lastDescription;
|
|
|
|
if ((flags&ActivityManager.RECENT_IGNORE_UNAVAILABLE) != 0) {
|
|
// Check whether this activity is currently available.
|
|
try {
|
|
if (rti.origActivity != null) {
|
|
if (pm.getActivityInfo(rti.origActivity, 0, userId)
|
|
== null) {
|
|
continue;
|
|
}
|
|
} else if (rti.baseIntent != null) {
|
|
if (pm.queryIntentActivities(rti.baseIntent,
|
|
null, 0, userId) == null) {
|
|
continue;
|
|
}
|
|
}
|
|
} catch (RemoteException e) {
|
|
// Will never happen.
|
|
}
|
|
}
|
|
|
|
res.add(rti);
|
|
maxNum--;
|
|
}
|
|
}
|
|
return res;
|
|
}
|
|
}
|
|
|
|
private TaskRecord taskForIdLocked(int id) {
|
|
final int N = mRecentTasks.size();
|
|
for (int i=0; i<N; i++) {
|
|
TaskRecord tr = mRecentTasks.get(i);
|
|
if (tr.taskId == id) {
|
|
return tr;
|
|
}
|
|
}
|
|
return null;
|
|
}
|
|
|
|
public ActivityManager.TaskThumbnails getTaskThumbnails(int id) {
|
|
synchronized (this) {
|
|
enforceCallingPermission(android.Manifest.permission.READ_FRAME_BUFFER,
|
|
"getTaskThumbnails()");
|
|
TaskRecord tr = taskForIdLocked(id);
|
|
if (tr != null) {
|
|
return mMainStack.getTaskThumbnailsLocked(tr);
|
|
}
|
|
}
|
|
return null;
|
|
}
|
|
|
|
public boolean removeSubTask(int taskId, int subTaskIndex) {
|
|
synchronized (this) {
|
|
enforceCallingPermission(android.Manifest.permission.REMOVE_TASKS,
|
|
"removeSubTask()");
|
|
long ident = Binder.clearCallingIdentity();
|
|
try {
|
|
return mMainStack.removeTaskActivitiesLocked(taskId, subTaskIndex,
|
|
true) != null;
|
|
} finally {
|
|
Binder.restoreCallingIdentity(ident);
|
|
}
|
|
}
|
|
}
|
|
|
|
private void cleanUpRemovedTaskLocked(TaskRecord tr, int flags) {
|
|
final boolean killProcesses = (flags&ActivityManager.REMOVE_TASK_KILL_PROCESS) != 0;
|
|
Intent baseIntent = new Intent(
|
|
tr.intent != null ? tr.intent : tr.affinityIntent);
|
|
ComponentName component = baseIntent.getComponent();
|
|
if (component == null) {
|
|
Slog.w(TAG, "Now component for base intent of task: " + tr);
|
|
return;
|
|
}
|
|
|
|
// Find any running services associated with this app.
|
|
mServices.cleanUpRemovedTaskLocked(tr, component, baseIntent);
|
|
|
|
if (killProcesses) {
|
|
// Find any running processes associated with this app.
|
|
final String pkg = component.getPackageName();
|
|
ArrayList<ProcessRecord> procs = new ArrayList<ProcessRecord>();
|
|
HashMap<String, SparseArray<ProcessRecord>> pmap = mProcessNames.getMap();
|
|
for (SparseArray<ProcessRecord> uids : pmap.values()) {
|
|
for (int i=0; i<uids.size(); i++) {
|
|
ProcessRecord proc = uids.valueAt(i);
|
|
if (proc.userId != tr.userId) {
|
|
continue;
|
|
}
|
|
if (!proc.pkgList.contains(pkg)) {
|
|
continue;
|
|
}
|
|
procs.add(proc);
|
|
}
|
|
}
|
|
|
|
// Kill the running processes.
|
|
for (int i=0; i<procs.size(); i++) {
|
|
ProcessRecord pr = procs.get(i);
|
|
if (pr.setSchedGroup == Process.THREAD_GROUP_BG_NONINTERACTIVE) {
|
|
Slog.i(TAG, "Killing " + pr.toShortString() + ": remove task");
|
|
EventLog.writeEvent(EventLogTags.AM_KILL, pr.pid,
|
|
pr.processName, pr.setAdj, "remove task");
|
|
pr.killedBackground = true;
|
|
Process.killProcessQuiet(pr.pid);
|
|
} else {
|
|
pr.waitingToKill = "remove task";
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
public boolean removeTask(int taskId, int flags) {
|
|
synchronized (this) {
|
|
enforceCallingPermission(android.Manifest.permission.REMOVE_TASKS,
|
|
"removeTask()");
|
|
long ident = Binder.clearCallingIdentity();
|
|
try {
|
|
ActivityRecord r = mMainStack.removeTaskActivitiesLocked(taskId, -1,
|
|
false);
|
|
if (r != null) {
|
|
mRecentTasks.remove(r.task);
|
|
cleanUpRemovedTaskLocked(r.task, flags);
|
|
return true;
|
|
} else {
|
|
TaskRecord tr = null;
|
|
int i=0;
|
|
while (i < mRecentTasks.size()) {
|
|
TaskRecord t = mRecentTasks.get(i);
|
|
if (t.taskId == taskId) {
|
|
tr = t;
|
|
break;
|
|
}
|
|
i++;
|
|
}
|
|
if (tr != null) {
|
|
if (tr.numActivities <= 0) {
|
|
// Caller is just removing a recent task that is
|
|
// not actively running. That is easy!
|
|
mRecentTasks.remove(i);
|
|
cleanUpRemovedTaskLocked(tr, flags);
|
|
return true;
|
|
} else {
|
|
Slog.w(TAG, "removeTask: task " + taskId
|
|
+ " does not have activities to remove, "
|
|
+ " but numActivities=" + tr.numActivities
|
|
+ ": " + tr);
|
|
}
|
|
}
|
|
}
|
|
} finally {
|
|
Binder.restoreCallingIdentity(ident);
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
private final int findAffinityTaskTopLocked(int startIndex, String affinity) {
|
|
int j;
|
|
TaskRecord startTask = ((ActivityRecord)mMainStack.mHistory.get(startIndex)).task;
|
|
TaskRecord jt = startTask;
|
|
|
|
// First look backwards
|
|
for (j=startIndex-1; j>=0; j--) {
|
|
ActivityRecord r = (ActivityRecord)mMainStack.mHistory.get(j);
|
|
if (r.task != jt) {
|
|
jt = r.task;
|
|
if (affinity.equals(jt.affinity)) {
|
|
return j;
|
|
}
|
|
}
|
|
}
|
|
|
|
// Now look forwards
|
|
final int N = mMainStack.mHistory.size();
|
|
jt = startTask;
|
|
for (j=startIndex+1; j<N; j++) {
|
|
ActivityRecord r = (ActivityRecord)mMainStack.mHistory.get(j);
|
|
if (r.task != jt) {
|
|
if (affinity.equals(jt.affinity)) {
|
|
return j;
|
|
}
|
|
jt = r.task;
|
|
}
|
|
}
|
|
|
|
// Might it be at the top?
|
|
if (affinity.equals(((ActivityRecord)mMainStack.mHistory.get(N-1)).task.affinity)) {
|
|
return N-1;
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
|
|
/**
|
|
* TODO: Add mController hook
|
|
*/
|
|
public void moveTaskToFront(int task, int flags, Bundle options) {
|
|
enforceCallingPermission(android.Manifest.permission.REORDER_TASKS,
|
|
"moveTaskToFront()");
|
|
|
|
synchronized(this) {
|
|
if (!checkAppSwitchAllowedLocked(Binder.getCallingPid(),
|
|
Binder.getCallingUid(), "Task to front")) {
|
|
ActivityOptions.abort(options);
|
|
return;
|
|
}
|
|
final long origId = Binder.clearCallingIdentity();
|
|
try {
|
|
TaskRecord tr = taskForIdLocked(task);
|
|
if (tr != null) {
|
|
if ((flags&ActivityManager.MOVE_TASK_NO_USER_ACTION) == 0) {
|
|
mMainStack.mUserLeaving = true;
|
|
}
|
|
if ((flags&ActivityManager.MOVE_TASK_WITH_HOME) != 0) {
|
|
// Caller wants the home activity moved with it. To accomplish this,
|
|
// we'll just move the home task to the top first.
|
|
mMainStack.moveHomeToFrontLocked();
|
|
}
|
|
mMainStack.moveTaskToFrontLocked(tr, null, options);
|
|
return;
|
|
}
|
|
for (int i=mMainStack.mHistory.size()-1; i>=0; i--) {
|
|
ActivityRecord hr = (ActivityRecord)mMainStack.mHistory.get(i);
|
|
if (hr.task.taskId == task) {
|
|
if ((flags&ActivityManager.MOVE_TASK_NO_USER_ACTION) == 0) {
|
|
mMainStack.mUserLeaving = true;
|
|
}
|
|
if ((flags&ActivityManager.MOVE_TASK_WITH_HOME) != 0) {
|
|
// Caller wants the home activity moved with it. To accomplish this,
|
|
// we'll just move the home task to the top first.
|
|
mMainStack.moveHomeToFrontLocked();
|
|
}
|
|
mMainStack.moveTaskToFrontLocked(hr.task, null, options);
|
|
return;
|
|
}
|
|
}
|
|
} finally {
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
ActivityOptions.abort(options);
|
|
}
|
|
}
|
|
|
|
public void moveTaskToBack(int task) {
|
|
enforceCallingPermission(android.Manifest.permission.REORDER_TASKS,
|
|
"moveTaskToBack()");
|
|
|
|
synchronized(this) {
|
|
if (mMainStack.mResumedActivity != null
|
|
&& mMainStack.mResumedActivity.task.taskId == task) {
|
|
if (!checkAppSwitchAllowedLocked(Binder.getCallingPid(),
|
|
Binder.getCallingUid(), "Task to back")) {
|
|
return;
|
|
}
|
|
}
|
|
final long origId = Binder.clearCallingIdentity();
|
|
mMainStack.moveTaskToBackLocked(task, null);
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Moves an activity, and all of the other activities within the same task, to the bottom
|
|
* of the history stack. The activity's order within the task is unchanged.
|
|
*
|
|
* @param token A reference to the activity we wish to move
|
|
* @param nonRoot If false then this only works if the activity is the root
|
|
* of a task; if true it will work for any activity in a task.
|
|
* @return Returns true if the move completed, false if not.
|
|
*/
|
|
public boolean moveActivityTaskToBack(IBinder token, boolean nonRoot) {
|
|
enforceNotIsolatedCaller("moveActivityTaskToBack");
|
|
synchronized(this) {
|
|
final long origId = Binder.clearCallingIdentity();
|
|
int taskId = getTaskForActivityLocked(token, !nonRoot);
|
|
if (taskId >= 0) {
|
|
return mMainStack.moveTaskToBackLocked(taskId, null);
|
|
}
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
return false;
|
|
}
|
|
|
|
public void moveTaskBackwards(int task) {
|
|
enforceCallingPermission(android.Manifest.permission.REORDER_TASKS,
|
|
"moveTaskBackwards()");
|
|
|
|
synchronized(this) {
|
|
if (!checkAppSwitchAllowedLocked(Binder.getCallingPid(),
|
|
Binder.getCallingUid(), "Task backwards")) {
|
|
return;
|
|
}
|
|
final long origId = Binder.clearCallingIdentity();
|
|
moveTaskBackwardsLocked(task);
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
}
|
|
|
|
private final void moveTaskBackwardsLocked(int task) {
|
|
Slog.e(TAG, "moveTaskBackwards not yet implemented!");
|
|
}
|
|
|
|
public int getTaskForActivity(IBinder token, boolean onlyRoot) {
|
|
synchronized(this) {
|
|
return getTaskForActivityLocked(token, onlyRoot);
|
|
}
|
|
}
|
|
|
|
int getTaskForActivityLocked(IBinder token, boolean onlyRoot) {
|
|
final int N = mMainStack.mHistory.size();
|
|
TaskRecord lastTask = null;
|
|
for (int i=0; i<N; i++) {
|
|
ActivityRecord r = (ActivityRecord)mMainStack.mHistory.get(i);
|
|
if (r.appToken == token) {
|
|
if (!onlyRoot || lastTask != r.task) {
|
|
return r.task.taskId;
|
|
}
|
|
return -1;
|
|
}
|
|
lastTask = r.task;
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
|
|
// =========================================================
|
|
// THUMBNAILS
|
|
// =========================================================
|
|
|
|
public void reportThumbnail(IBinder token,
|
|
Bitmap thumbnail, CharSequence description) {
|
|
//System.out.println("Report thumbnail for " + token + ": " + thumbnail);
|
|
final long origId = Binder.clearCallingIdentity();
|
|
sendPendingThumbnail(null, token, thumbnail, description, true);
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
|
|
final void sendPendingThumbnail(ActivityRecord r, IBinder token,
|
|
Bitmap thumbnail, CharSequence description, boolean always) {
|
|
TaskRecord task = null;
|
|
ArrayList receivers = null;
|
|
|
|
//System.out.println("Send pending thumbnail: " + r);
|
|
|
|
synchronized(this) {
|
|
if (r == null) {
|
|
r = mMainStack.isInStackLocked(token);
|
|
if (r == null) {
|
|
return;
|
|
}
|
|
}
|
|
if (thumbnail == null && r.thumbHolder != null) {
|
|
thumbnail = r.thumbHolder.lastThumbnail;
|
|
description = r.thumbHolder.lastDescription;
|
|
}
|
|
if (thumbnail == null && !always) {
|
|
// If there is no thumbnail, and this entry is not actually
|
|
// going away, then abort for now and pick up the next
|
|
// thumbnail we get.
|
|
return;
|
|
}
|
|
task = r.task;
|
|
|
|
int N = mPendingThumbnails.size();
|
|
int i=0;
|
|
while (i<N) {
|
|
PendingThumbnailsRecord pr =
|
|
(PendingThumbnailsRecord)mPendingThumbnails.get(i);
|
|
//System.out.println("Looking in " + pr.pendingRecords);
|
|
if (pr.pendingRecords.remove(r)) {
|
|
if (receivers == null) {
|
|
receivers = new ArrayList();
|
|
}
|
|
receivers.add(pr);
|
|
if (pr.pendingRecords.size() == 0) {
|
|
pr.finished = true;
|
|
mPendingThumbnails.remove(i);
|
|
N--;
|
|
continue;
|
|
}
|
|
}
|
|
i++;
|
|
}
|
|
}
|
|
|
|
if (receivers != null) {
|
|
final int N = receivers.size();
|
|
for (int i=0; i<N; i++) {
|
|
try {
|
|
PendingThumbnailsRecord pr =
|
|
(PendingThumbnailsRecord)receivers.get(i);
|
|
pr.receiver.newThumbnail(
|
|
task != null ? task.taskId : -1, thumbnail, description);
|
|
if (pr.finished) {
|
|
pr.receiver.finished();
|
|
}
|
|
} catch (Exception e) {
|
|
Slog.w(TAG, "Exception thrown when sending thumbnail", e);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// =========================================================
|
|
// CONTENT PROVIDERS
|
|
// =========================================================
|
|
|
|
private final List<ProviderInfo> generateApplicationProvidersLocked(ProcessRecord app) {
|
|
List<ProviderInfo> providers = null;
|
|
try {
|
|
providers = AppGlobals.getPackageManager().
|
|
queryContentProviders(app.processName, app.uid,
|
|
STOCK_PM_FLAGS | PackageManager.GET_URI_PERMISSION_PATTERNS);
|
|
} catch (RemoteException ex) {
|
|
}
|
|
if (DEBUG_MU)
|
|
Slog.v(TAG_MU, "generateApplicationProvidersLocked, app.info.uid = " + app.uid);
|
|
int userId = app.userId;
|
|
if (providers != null) {
|
|
int N = providers.size();
|
|
for (int i=0; i<N; i++) {
|
|
ProviderInfo cpi =
|
|
(ProviderInfo)providers.get(i);
|
|
boolean singleton = isSingleton(cpi.processName, cpi.applicationInfo,
|
|
cpi.name, cpi.flags);
|
|
if (singleton && UserHandle.getUserId(app.uid) != 0) {
|
|
// This is a singleton provider, but a user besides the
|
|
// default user is asking to initialize a process it runs
|
|
// in... well, no, it doesn't actually run in this process,
|
|
// it runs in the process of the default user. Get rid of it.
|
|
providers.remove(i);
|
|
N--;
|
|
continue;
|
|
}
|
|
|
|
ComponentName comp = new ComponentName(cpi.packageName, cpi.name);
|
|
ContentProviderRecord cpr = mProviderMap.getProviderByClass(comp, userId);
|
|
if (cpr == null) {
|
|
cpr = new ContentProviderRecord(this, cpi, app.info, comp, singleton);
|
|
mProviderMap.putProviderByClass(comp, cpr);
|
|
}
|
|
if (DEBUG_MU)
|
|
Slog.v(TAG_MU, "generateApplicationProvidersLocked, cpi.uid = " + cpr.uid);
|
|
app.pubProviders.put(cpi.name, cpr);
|
|
app.addPackage(cpi.applicationInfo.packageName);
|
|
ensurePackageDexOpt(cpi.applicationInfo.packageName);
|
|
}
|
|
}
|
|
return providers;
|
|
}
|
|
|
|
/**
|
|
* Check if {@link ProcessRecord} has a possible chance at accessing the
|
|
* given {@link ProviderInfo}. Final permission checking is always done
|
|
* in {@link ContentProvider}.
|
|
*/
|
|
private final String checkContentProviderPermissionLocked(
|
|
ProviderInfo cpi, ProcessRecord r) {
|
|
final int callingPid = (r != null) ? r.pid : Binder.getCallingPid();
|
|
final int callingUid = (r != null) ? r.uid : Binder.getCallingUid();
|
|
if (checkComponentPermission(cpi.readPermission, callingPid, callingUid,
|
|
cpi.applicationInfo.uid, cpi.exported)
|
|
== PackageManager.PERMISSION_GRANTED) {
|
|
return null;
|
|
}
|
|
if (checkComponentPermission(cpi.writePermission, callingPid, callingUid,
|
|
cpi.applicationInfo.uid, cpi.exported)
|
|
== PackageManager.PERMISSION_GRANTED) {
|
|
return null;
|
|
}
|
|
|
|
PathPermission[] pps = cpi.pathPermissions;
|
|
if (pps != null) {
|
|
int i = pps.length;
|
|
while (i > 0) {
|
|
i--;
|
|
PathPermission pp = pps[i];
|
|
if (checkComponentPermission(pp.getReadPermission(), callingPid, callingUid,
|
|
cpi.applicationInfo.uid, cpi.exported)
|
|
== PackageManager.PERMISSION_GRANTED) {
|
|
return null;
|
|
}
|
|
if (checkComponentPermission(pp.getWritePermission(), callingPid, callingUid,
|
|
cpi.applicationInfo.uid, cpi.exported)
|
|
== PackageManager.PERMISSION_GRANTED) {
|
|
return null;
|
|
}
|
|
}
|
|
}
|
|
|
|
HashMap<Uri, UriPermission> perms = mGrantedUriPermissions.get(callingUid);
|
|
if (perms != null) {
|
|
for (Map.Entry<Uri, UriPermission> uri : perms.entrySet()) {
|
|
if (uri.getKey().getAuthority().equals(cpi.authority)) {
|
|
return null;
|
|
}
|
|
}
|
|
}
|
|
|
|
String msg;
|
|
if (!cpi.exported) {
|
|
msg = "Permission Denial: opening provider " + cpi.name
|
|
+ " from " + (r != null ? r : "(null)") + " (pid=" + callingPid
|
|
+ ", uid=" + callingUid + ") that is not exported from uid "
|
|
+ cpi.applicationInfo.uid;
|
|
} else {
|
|
msg = "Permission Denial: opening provider " + cpi.name
|
|
+ " from " + (r != null ? r : "(null)") + " (pid=" + callingPid
|
|
+ ", uid=" + callingUid + ") requires "
|
|
+ cpi.readPermission + " or " + cpi.writePermission;
|
|
}
|
|
Slog.w(TAG, msg);
|
|
return msg;
|
|
}
|
|
|
|
ContentProviderConnection incProviderCountLocked(ProcessRecord r,
|
|
final ContentProviderRecord cpr, IBinder externalProcessToken, boolean stable) {
|
|
if (r != null) {
|
|
for (int i=0; i<r.conProviders.size(); i++) {
|
|
ContentProviderConnection conn = r.conProviders.get(i);
|
|
if (conn.provider == cpr) {
|
|
if (DEBUG_PROVIDER) Slog.v(TAG,
|
|
"Adding provider requested by "
|
|
+ r.processName + " from process "
|
|
+ cpr.info.processName + ": " + cpr.name.flattenToShortString()
|
|
+ " scnt=" + conn.stableCount + " uscnt=" + conn.unstableCount);
|
|
if (stable) {
|
|
conn.stableCount++;
|
|
conn.numStableIncs++;
|
|
} else {
|
|
conn.unstableCount++;
|
|
conn.numUnstableIncs++;
|
|
}
|
|
return conn;
|
|
}
|
|
}
|
|
ContentProviderConnection conn = new ContentProviderConnection(cpr, r);
|
|
if (stable) {
|
|
conn.stableCount = 1;
|
|
conn.numStableIncs = 1;
|
|
} else {
|
|
conn.unstableCount = 1;
|
|
conn.numUnstableIncs = 1;
|
|
}
|
|
cpr.connections.add(conn);
|
|
r.conProviders.add(conn);
|
|
return conn;
|
|
}
|
|
cpr.addExternalProcessHandleLocked(externalProcessToken);
|
|
return null;
|
|
}
|
|
|
|
boolean decProviderCountLocked(ContentProviderConnection conn,
|
|
ContentProviderRecord cpr, IBinder externalProcessToken, boolean stable) {
|
|
if (conn != null) {
|
|
cpr = conn.provider;
|
|
if (DEBUG_PROVIDER) Slog.v(TAG,
|
|
"Removing provider requested by "
|
|
+ conn.client.processName + " from process "
|
|
+ cpr.info.processName + ": " + cpr.name.flattenToShortString()
|
|
+ " scnt=" + conn.stableCount + " uscnt=" + conn.unstableCount);
|
|
if (stable) {
|
|
conn.stableCount--;
|
|
} else {
|
|
conn.unstableCount--;
|
|
}
|
|
if (conn.stableCount == 0 && conn.unstableCount == 0) {
|
|
cpr.connections.remove(conn);
|
|
conn.client.conProviders.remove(conn);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
cpr.removeExternalProcessHandleLocked(externalProcessToken);
|
|
return false;
|
|
}
|
|
|
|
private final ContentProviderHolder getContentProviderImpl(IApplicationThread caller,
|
|
String name, IBinder token, boolean stable) {
|
|
ContentProviderRecord cpr;
|
|
ContentProviderConnection conn = null;
|
|
ProviderInfo cpi = null;
|
|
|
|
synchronized(this) {
|
|
ProcessRecord r = null;
|
|
if (caller != null) {
|
|
r = getRecordForAppLocked(caller);
|
|
if (r == null) {
|
|
throw new SecurityException(
|
|
"Unable to find app for caller " + caller
|
|
+ " (pid=" + Binder.getCallingPid()
|
|
+ ") when getting content provider " + name);
|
|
}
|
|
}
|
|
|
|
// First check if this content provider has been published...
|
|
int userId = UserHandle.getUserId(r != null ? r.uid : Binder.getCallingUid());
|
|
cpr = mProviderMap.getProviderByName(name, userId);
|
|
boolean providerRunning = cpr != null;
|
|
if (providerRunning) {
|
|
cpi = cpr.info;
|
|
String msg;
|
|
if ((msg=checkContentProviderPermissionLocked(cpi, r)) != null) {
|
|
throw new SecurityException(msg);
|
|
}
|
|
|
|
if (r != null && cpr.canRunHere(r)) {
|
|
// This provider has been published or is in the process
|
|
// of being published... but it is also allowed to run
|
|
// in the caller's process, so don't make a connection
|
|
// and just let the caller instantiate its own instance.
|
|
ContentProviderHolder holder = cpr.newHolder(null);
|
|
// don't give caller the provider object, it needs
|
|
// to make its own.
|
|
holder.provider = null;
|
|
return holder;
|
|
}
|
|
|
|
final long origId = Binder.clearCallingIdentity();
|
|
|
|
// In this case the provider instance already exists, so we can
|
|
// return it right away.
|
|
conn = incProviderCountLocked(r, cpr, token, stable);
|
|
if (conn != null && (conn.stableCount+conn.unstableCount) == 1) {
|
|
if (cpr.proc != null && r.setAdj <= ProcessList.PERCEPTIBLE_APP_ADJ) {
|
|
// If this is a perceptible app accessing the provider,
|
|
// make sure to count it as being accessed and thus
|
|
// back up on the LRU list. This is good because
|
|
// content providers are often expensive to start.
|
|
updateLruProcessLocked(cpr.proc, false, true);
|
|
}
|
|
}
|
|
|
|
if (cpr.proc != null) {
|
|
if (false) {
|
|
if (cpr.name.flattenToShortString().equals(
|
|
"com.android.providers.calendar/.CalendarProvider2")) {
|
|
Slog.v(TAG, "****************** KILLING "
|
|
+ cpr.name.flattenToShortString());
|
|
Process.killProcess(cpr.proc.pid);
|
|
}
|
|
}
|
|
boolean success = updateOomAdjLocked(cpr.proc);
|
|
if (DEBUG_PROVIDER) Slog.i(TAG, "Adjust success: " + success);
|
|
// NOTE: there is still a race here where a signal could be
|
|
// pending on the process even though we managed to update its
|
|
// adj level. Not sure what to do about this, but at least
|
|
// the race is now smaller.
|
|
if (!success) {
|
|
// Uh oh... it looks like the provider's process
|
|
// has been killed on us. We need to wait for a new
|
|
// process to be started, and make sure its death
|
|
// doesn't kill our process.
|
|
Slog.i(TAG,
|
|
"Existing provider " + cpr.name.flattenToShortString()
|
|
+ " is crashing; detaching " + r);
|
|
boolean lastRef = decProviderCountLocked(conn, cpr, token, stable);
|
|
appDiedLocked(cpr.proc, cpr.proc.pid, cpr.proc.thread);
|
|
if (!lastRef) {
|
|
// This wasn't the last ref our process had on
|
|
// the provider... we have now been killed, bail.
|
|
return null;
|
|
}
|
|
providerRunning = false;
|
|
conn = null;
|
|
}
|
|
}
|
|
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
|
|
boolean singleton;
|
|
if (!providerRunning) {
|
|
try {
|
|
cpi = AppGlobals.getPackageManager().
|
|
resolveContentProvider(name,
|
|
STOCK_PM_FLAGS | PackageManager.GET_URI_PERMISSION_PATTERNS, userId);
|
|
} catch (RemoteException ex) {
|
|
}
|
|
if (cpi == null) {
|
|
return null;
|
|
}
|
|
singleton = isSingleton(cpi.processName, cpi.applicationInfo,
|
|
cpi.name, cpi.flags);
|
|
if (singleton) {
|
|
userId = 0;
|
|
}
|
|
cpi.applicationInfo = getAppInfoForUser(cpi.applicationInfo, userId);
|
|
|
|
String msg;
|
|
if ((msg=checkContentProviderPermissionLocked(cpi, r)) != null) {
|
|
throw new SecurityException(msg);
|
|
}
|
|
|
|
if (!mProcessesReady && !mDidUpdate && !mWaitingUpdate
|
|
&& !cpi.processName.equals("system")) {
|
|
// If this content provider does not run in the system
|
|
// process, and the system is not yet ready to run other
|
|
// processes, then fail fast instead of hanging.
|
|
throw new IllegalArgumentException(
|
|
"Attempt to launch content provider before system ready");
|
|
}
|
|
|
|
// Make sure that the user who owns this provider is started. If not,
|
|
// we don't want to allow it to run.
|
|
if (mStartedUsers.get(userId) == null) {
|
|
Slog.w(TAG, "Unable to launch app "
|
|
+ cpi.applicationInfo.packageName + "/"
|
|
+ cpi.applicationInfo.uid + " for provider "
|
|
+ name + ": user " + userId + " is stopped");
|
|
return null;
|
|
}
|
|
|
|
ComponentName comp = new ComponentName(cpi.packageName, cpi.name);
|
|
cpr = mProviderMap.getProviderByClass(comp, userId);
|
|
final boolean firstClass = cpr == null;
|
|
if (firstClass) {
|
|
try {
|
|
ApplicationInfo ai =
|
|
AppGlobals.getPackageManager().
|
|
getApplicationInfo(
|
|
cpi.applicationInfo.packageName,
|
|
STOCK_PM_FLAGS, userId);
|
|
if (ai == null) {
|
|
Slog.w(TAG, "No package info for content provider "
|
|
+ cpi.name);
|
|
return null;
|
|
}
|
|
ai = getAppInfoForUser(ai, userId);
|
|
cpr = new ContentProviderRecord(this, cpi, ai, comp, singleton);
|
|
} catch (RemoteException ex) {
|
|
// pm is in same process, this will never happen.
|
|
}
|
|
}
|
|
|
|
if (r != null && cpr.canRunHere(r)) {
|
|
// If this is a multiprocess provider, then just return its
|
|
// info and allow the caller to instantiate it. Only do
|
|
// this if the provider is the same user as the caller's
|
|
// process, or can run as root (so can be in any process).
|
|
return cpr.newHolder(null);
|
|
}
|
|
|
|
if (DEBUG_PROVIDER) {
|
|
RuntimeException e = new RuntimeException("here");
|
|
Slog.w(TAG, "LAUNCHING REMOTE PROVIDER (myuid " + r.uid
|
|
+ " pruid " + cpr.appInfo.uid + "): " + cpr.info.name, e);
|
|
}
|
|
|
|
// This is single process, and our app is now connecting to it.
|
|
// See if we are already in the process of launching this
|
|
// provider.
|
|
final int N = mLaunchingProviders.size();
|
|
int i;
|
|
for (i=0; i<N; i++) {
|
|
if (mLaunchingProviders.get(i) == cpr) {
|
|
break;
|
|
}
|
|
}
|
|
|
|
// If the provider is not already being launched, then get it
|
|
// started.
|
|
if (i >= N) {
|
|
final long origId = Binder.clearCallingIdentity();
|
|
|
|
try {
|
|
// Content provider is now in use, its package can't be stopped.
|
|
try {
|
|
AppGlobals.getPackageManager().setPackageStoppedState(
|
|
cpr.appInfo.packageName, false, userId);
|
|
} catch (RemoteException e) {
|
|
} catch (IllegalArgumentException e) {
|
|
Slog.w(TAG, "Failed trying to unstop package "
|
|
+ cpr.appInfo.packageName + ": " + e);
|
|
}
|
|
|
|
ProcessRecord proc = startProcessLocked(cpi.processName,
|
|
cpr.appInfo, false, 0, "content provider",
|
|
new ComponentName(cpi.applicationInfo.packageName,
|
|
cpi.name), false, false);
|
|
if (proc == null) {
|
|
Slog.w(TAG, "Unable to launch app "
|
|
+ cpi.applicationInfo.packageName + "/"
|
|
+ cpi.applicationInfo.uid + " for provider "
|
|
+ name + ": process is bad");
|
|
return null;
|
|
}
|
|
cpr.launchingApp = proc;
|
|
mLaunchingProviders.add(cpr);
|
|
} finally {
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
}
|
|
|
|
// Make sure the provider is published (the same provider class
|
|
// may be published under multiple names).
|
|
if (firstClass) {
|
|
mProviderMap.putProviderByClass(comp, cpr);
|
|
}
|
|
|
|
mProviderMap.putProviderByName(name, cpr);
|
|
conn = incProviderCountLocked(r, cpr, token, stable);
|
|
if (conn != null) {
|
|
conn.waiting = true;
|
|
}
|
|
}
|
|
}
|
|
|
|
// Wait for the provider to be published...
|
|
synchronized (cpr) {
|
|
while (cpr.provider == null) {
|
|
if (cpr.launchingApp == null) {
|
|
Slog.w(TAG, "Unable to launch app "
|
|
+ cpi.applicationInfo.packageName + "/"
|
|
+ cpi.applicationInfo.uid + " for provider "
|
|
+ name + ": launching app became null");
|
|
EventLog.writeEvent(EventLogTags.AM_PROVIDER_LOST_PROCESS,
|
|
cpi.applicationInfo.packageName,
|
|
cpi.applicationInfo.uid, name);
|
|
return null;
|
|
}
|
|
try {
|
|
if (DEBUG_MU) {
|
|
Slog.v(TAG_MU, "Waiting to start provider " + cpr + " launchingApp="
|
|
+ cpr.launchingApp);
|
|
}
|
|
if (conn != null) {
|
|
conn.waiting = true;
|
|
}
|
|
cpr.wait();
|
|
} catch (InterruptedException ex) {
|
|
} finally {
|
|
if (conn != null) {
|
|
conn.waiting = false;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return cpr != null ? cpr.newHolder(conn) : null;
|
|
}
|
|
|
|
public final ContentProviderHolder getContentProvider(
|
|
IApplicationThread caller, String name, boolean stable) {
|
|
enforceNotIsolatedCaller("getContentProvider");
|
|
if (caller == null) {
|
|
String msg = "null IApplicationThread when getting content provider "
|
|
+ name;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
|
|
return getContentProviderImpl(caller, name, null, stable);
|
|
}
|
|
|
|
public ContentProviderHolder getContentProviderExternal(String name, IBinder token) {
|
|
enforceCallingPermission(android.Manifest.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY,
|
|
"Do not have permission in call getContentProviderExternal()");
|
|
return getContentProviderExternalUnchecked(name, token);
|
|
}
|
|
|
|
private ContentProviderHolder getContentProviderExternalUnchecked(String name,IBinder token) {
|
|
return getContentProviderImpl(null, name, token, true);
|
|
}
|
|
|
|
/**
|
|
* Drop a content provider from a ProcessRecord's bookkeeping
|
|
* @param cpr
|
|
*/
|
|
public void removeContentProvider(IBinder connection, boolean stable) {
|
|
enforceNotIsolatedCaller("removeContentProvider");
|
|
synchronized (this) {
|
|
ContentProviderConnection conn;
|
|
try {
|
|
conn = (ContentProviderConnection)connection;
|
|
} catch (ClassCastException e) {
|
|
String msg ="removeContentProvider: " + connection
|
|
+ " not a ContentProviderConnection";
|
|
Slog.w(TAG, msg);
|
|
throw new IllegalArgumentException(msg);
|
|
}
|
|
if (conn == null) {
|
|
throw new NullPointerException("connection is null");
|
|
}
|
|
if (decProviderCountLocked(conn, null, null, stable)) {
|
|
updateOomAdjLocked();
|
|
}
|
|
}
|
|
}
|
|
|
|
public void removeContentProviderExternal(String name, IBinder token) {
|
|
enforceCallingPermission(android.Manifest.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY,
|
|
"Do not have permission in call removeContentProviderExternal()");
|
|
removeContentProviderExternalUnchecked(name, token);
|
|
}
|
|
|
|
private void removeContentProviderExternalUnchecked(String name, IBinder token) {
|
|
synchronized (this) {
|
|
ContentProviderRecord cpr = mProviderMap.getProviderByName(name,
|
|
Binder.getOrigCallingUser());
|
|
if(cpr == null) {
|
|
//remove from mProvidersByClass
|
|
if(localLOGV) Slog.v(TAG, name+" content provider not found in providers list");
|
|
return;
|
|
}
|
|
|
|
//update content provider record entry info
|
|
ComponentName comp = new ComponentName(cpr.info.packageName, cpr.info.name);
|
|
ContentProviderRecord localCpr = mProviderMap.getProviderByClass(comp,
|
|
Binder.getOrigCallingUser());
|
|
if (localCpr.hasExternalProcessHandles()) {
|
|
if (localCpr.removeExternalProcessHandleLocked(token)) {
|
|
updateOomAdjLocked();
|
|
} else {
|
|
Slog.e(TAG, "Attmpt to remove content provider " + localCpr
|
|
+ " with no external reference for token: "
|
|
+ token + ".");
|
|
}
|
|
} else {
|
|
Slog.e(TAG, "Attmpt to remove content provider: " + localCpr
|
|
+ " with no external references.");
|
|
}
|
|
}
|
|
}
|
|
|
|
public final void publishContentProviders(IApplicationThread caller,
|
|
List<ContentProviderHolder> providers) {
|
|
if (providers == null) {
|
|
return;
|
|
}
|
|
|
|
enforceNotIsolatedCaller("publishContentProviders");
|
|
synchronized (this) {
|
|
final ProcessRecord r = getRecordForAppLocked(caller);
|
|
if (DEBUG_MU)
|
|
Slog.v(TAG_MU, "ProcessRecord uid = " + r.uid);
|
|
if (r == null) {
|
|
throw new SecurityException(
|
|
"Unable to find app for caller " + caller
|
|
+ " (pid=" + Binder.getCallingPid()
|
|
+ ") when publishing content providers");
|
|
}
|
|
|
|
final long origId = Binder.clearCallingIdentity();
|
|
|
|
final int N = providers.size();
|
|
for (int i=0; i<N; i++) {
|
|
ContentProviderHolder src = providers.get(i);
|
|
if (src == null || src.info == null || src.provider == null) {
|
|
continue;
|
|
}
|
|
ContentProviderRecord dst = r.pubProviders.get(src.info.name);
|
|
if (DEBUG_MU)
|
|
Slog.v(TAG_MU, "ContentProviderRecord uid = " + dst.uid);
|
|
if (dst != null) {
|
|
ComponentName comp = new ComponentName(dst.info.packageName, dst.info.name);
|
|
mProviderMap.putProviderByClass(comp, dst);
|
|
String names[] = dst.info.authority.split(";");
|
|
for (int j = 0; j < names.length; j++) {
|
|
mProviderMap.putProviderByName(names[j], dst);
|
|
}
|
|
|
|
int NL = mLaunchingProviders.size();
|
|
int j;
|
|
for (j=0; j<NL; j++) {
|
|
if (mLaunchingProviders.get(j) == dst) {
|
|
mLaunchingProviders.remove(j);
|
|
j--;
|
|
NL--;
|
|
}
|
|
}
|
|
synchronized (dst) {
|
|
dst.provider = src.provider;
|
|
dst.proc = r;
|
|
dst.notifyAll();
|
|
}
|
|
updateOomAdjLocked(r);
|
|
}
|
|
}
|
|
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
}
|
|
|
|
public boolean refContentProvider(IBinder connection, int stable, int unstable) {
|
|
ContentProviderConnection conn;
|
|
try {
|
|
conn = (ContentProviderConnection)connection;
|
|
} catch (ClassCastException e) {
|
|
String msg ="refContentProvider: " + connection
|
|
+ " not a ContentProviderConnection";
|
|
Slog.w(TAG, msg);
|
|
throw new IllegalArgumentException(msg);
|
|
}
|
|
if (conn == null) {
|
|
throw new NullPointerException("connection is null");
|
|
}
|
|
|
|
synchronized (this) {
|
|
if (stable > 0) {
|
|
conn.numStableIncs += stable;
|
|
}
|
|
stable = conn.stableCount + stable;
|
|
if (stable < 0) {
|
|
throw new IllegalStateException("stableCount < 0: " + stable);
|
|
}
|
|
|
|
if (unstable > 0) {
|
|
conn.numUnstableIncs += unstable;
|
|
}
|
|
unstable = conn.unstableCount + unstable;
|
|
if (unstable < 0) {
|
|
throw new IllegalStateException("unstableCount < 0: " + unstable);
|
|
}
|
|
|
|
if ((stable+unstable) <= 0) {
|
|
throw new IllegalStateException("ref counts can't go to zero here: stable="
|
|
+ stable + " unstable=" + unstable);
|
|
}
|
|
conn.stableCount = stable;
|
|
conn.unstableCount = unstable;
|
|
return !conn.dead;
|
|
}
|
|
}
|
|
|
|
public void unstableProviderDied(IBinder connection) {
|
|
ContentProviderConnection conn;
|
|
try {
|
|
conn = (ContentProviderConnection)connection;
|
|
} catch (ClassCastException e) {
|
|
String msg ="refContentProvider: " + connection
|
|
+ " not a ContentProviderConnection";
|
|
Slog.w(TAG, msg);
|
|
throw new IllegalArgumentException(msg);
|
|
}
|
|
if (conn == null) {
|
|
throw new NullPointerException("connection is null");
|
|
}
|
|
|
|
// Safely retrieve the content provider associated with the connection.
|
|
IContentProvider provider;
|
|
synchronized (this) {
|
|
provider = conn.provider.provider;
|
|
}
|
|
|
|
if (provider == null) {
|
|
// Um, yeah, we're way ahead of you.
|
|
return;
|
|
}
|
|
|
|
// Make sure the caller is being honest with us.
|
|
if (provider.asBinder().pingBinder()) {
|
|
// Er, no, still looks good to us.
|
|
synchronized (this) {
|
|
Slog.w(TAG, "unstableProviderDied: caller " + Binder.getCallingUid()
|
|
+ " says " + conn + " died, but we don't agree");
|
|
return;
|
|
}
|
|
}
|
|
|
|
// Well look at that! It's dead!
|
|
synchronized (this) {
|
|
if (conn.provider.provider != provider) {
|
|
// But something changed... good enough.
|
|
return;
|
|
}
|
|
|
|
ProcessRecord proc = conn.provider.proc;
|
|
if (proc == null || proc.thread == null) {
|
|
// Seems like the process is already cleaned up.
|
|
return;
|
|
}
|
|
|
|
// As far as we're concerned, this is just like receiving a
|
|
// death notification... just a bit prematurely.
|
|
Slog.i(TAG, "Process " + proc.processName + " (pid " + proc.pid
|
|
+ ") early provider death");
|
|
final long ident = Binder.clearCallingIdentity();
|
|
try {
|
|
appDiedLocked(proc, proc.pid, proc.thread);
|
|
} finally {
|
|
Binder.restoreCallingIdentity(ident);
|
|
}
|
|
}
|
|
}
|
|
|
|
public static final void installSystemProviders() {
|
|
List<ProviderInfo> providers;
|
|
synchronized (mSelf) {
|
|
ProcessRecord app = mSelf.mProcessNames.get("system", Process.SYSTEM_UID);
|
|
providers = mSelf.generateApplicationProvidersLocked(app);
|
|
if (providers != null) {
|
|
for (int i=providers.size()-1; i>=0; i--) {
|
|
ProviderInfo pi = (ProviderInfo)providers.get(i);
|
|
if ((pi.applicationInfo.flags&ApplicationInfo.FLAG_SYSTEM) == 0) {
|
|
Slog.w(TAG, "Not installing system proc provider " + pi.name
|
|
+ ": not system .apk");
|
|
providers.remove(i);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if (providers != null) {
|
|
mSystemThread.installSystemProviders(providers);
|
|
}
|
|
|
|
mSelf.mCoreSettingsObserver = new CoreSettingsObserver(mSelf);
|
|
|
|
mSelf.mUsageStatsService.monitorPackages();
|
|
}
|
|
|
|
/**
|
|
* Allows app to retrieve the MIME type of a URI without having permission
|
|
* to access its content provider.
|
|
*
|
|
* CTS tests for this functionality can be run with "runtest cts-appsecurity".
|
|
*
|
|
* Test cases are at cts/tests/appsecurity-tests/test-apps/UsePermissionDiffCert/
|
|
* src/com/android/cts/usespermissiondiffcertapp/AccessPermissionWithDiffSigTest.java
|
|
*/
|
|
public String getProviderMimeType(Uri uri) {
|
|
enforceNotIsolatedCaller("getProviderMimeType");
|
|
final String name = uri.getAuthority();
|
|
final long ident = Binder.clearCallingIdentity();
|
|
ContentProviderHolder holder = null;
|
|
|
|
try {
|
|
holder = getContentProviderExternalUnchecked(name, null);
|
|
if (holder != null) {
|
|
return holder.provider.getType(uri);
|
|
}
|
|
} catch (RemoteException e) {
|
|
Log.w(TAG, "Content provider dead retrieving " + uri, e);
|
|
return null;
|
|
} finally {
|
|
if (holder != null) {
|
|
removeContentProviderExternalUnchecked(name, null);
|
|
}
|
|
Binder.restoreCallingIdentity(ident);
|
|
}
|
|
|
|
return null;
|
|
}
|
|
|
|
// =========================================================
|
|
// GLOBAL MANAGEMENT
|
|
// =========================================================
|
|
|
|
final ProcessRecord newProcessRecordLocked(IApplicationThread thread,
|
|
ApplicationInfo info, String customProcess, boolean isolated) {
|
|
String proc = customProcess != null ? customProcess : info.processName;
|
|
BatteryStatsImpl.Uid.Proc ps = null;
|
|
BatteryStatsImpl stats = mBatteryStatsService.getActiveStatistics();
|
|
int uid = info.uid;
|
|
if (isolated) {
|
|
int userId = UserHandle.getUserId(uid);
|
|
int stepsLeft = Process.LAST_ISOLATED_UID - Process.FIRST_ISOLATED_UID + 1;
|
|
uid = 0;
|
|
while (true) {
|
|
if (mNextIsolatedProcessUid < Process.FIRST_ISOLATED_UID
|
|
|| mNextIsolatedProcessUid > Process.LAST_ISOLATED_UID) {
|
|
mNextIsolatedProcessUid = Process.FIRST_ISOLATED_UID;
|
|
}
|
|
uid = UserHandle.getUid(userId, mNextIsolatedProcessUid);
|
|
mNextIsolatedProcessUid++;
|
|
if (mIsolatedProcesses.indexOfKey(uid) < 0) {
|
|
// No process for this uid, use it.
|
|
break;
|
|
}
|
|
stepsLeft--;
|
|
if (stepsLeft <= 0) {
|
|
return null;
|
|
}
|
|
}
|
|
}
|
|
synchronized (stats) {
|
|
ps = stats.getProcessStatsLocked(info.uid, proc);
|
|
}
|
|
return new ProcessRecord(ps, thread, info, proc, uid);
|
|
}
|
|
|
|
final ProcessRecord addAppLocked(ApplicationInfo info, boolean isolated) {
|
|
ProcessRecord app;
|
|
if (!isolated) {
|
|
app = getProcessRecordLocked(info.processName, info.uid);
|
|
} else {
|
|
app = null;
|
|
}
|
|
|
|
if (app == null) {
|
|
app = newProcessRecordLocked(null, info, null, isolated);
|
|
mProcessNames.put(info.processName, app.uid, app);
|
|
if (isolated) {
|
|
mIsolatedProcesses.put(app.uid, app);
|
|
}
|
|
updateLruProcessLocked(app, true, true);
|
|
}
|
|
|
|
// This package really, really can not be stopped.
|
|
try {
|
|
AppGlobals.getPackageManager().setPackageStoppedState(
|
|
info.packageName, false, UserHandle.getUserId(app.uid));
|
|
} catch (RemoteException e) {
|
|
} catch (IllegalArgumentException e) {
|
|
Slog.w(TAG, "Failed trying to unstop package "
|
|
+ info.packageName + ": " + e);
|
|
}
|
|
|
|
if ((info.flags&(ApplicationInfo.FLAG_SYSTEM|ApplicationInfo.FLAG_PERSISTENT))
|
|
== (ApplicationInfo.FLAG_SYSTEM|ApplicationInfo.FLAG_PERSISTENT)) {
|
|
app.persistent = true;
|
|
app.maxAdj = ProcessList.PERSISTENT_PROC_ADJ;
|
|
}
|
|
if (app.thread == null && mPersistentStartingProcesses.indexOf(app) < 0) {
|
|
mPersistentStartingProcesses.add(app);
|
|
startProcessLocked(app, "added application", app.processName);
|
|
}
|
|
|
|
return app;
|
|
}
|
|
|
|
public void unhandledBack() {
|
|
enforceCallingPermission(android.Manifest.permission.FORCE_BACK,
|
|
"unhandledBack()");
|
|
|
|
synchronized(this) {
|
|
int count = mMainStack.mHistory.size();
|
|
if (DEBUG_SWITCH) Slog.d(
|
|
TAG, "Performing unhandledBack(): stack size = " + count);
|
|
if (count > 1) {
|
|
final long origId = Binder.clearCallingIdentity();
|
|
mMainStack.finishActivityLocked((ActivityRecord)mMainStack.mHistory.get(count-1),
|
|
count-1, Activity.RESULT_CANCELED, null, "unhandled-back");
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
}
|
|
}
|
|
|
|
public ParcelFileDescriptor openContentUri(Uri uri) throws RemoteException {
|
|
enforceNotIsolatedCaller("openContentUri");
|
|
String name = uri.getAuthority();
|
|
ContentProviderHolder cph = getContentProviderExternalUnchecked(name, null);
|
|
ParcelFileDescriptor pfd = null;
|
|
if (cph != null) {
|
|
// We record the binder invoker's uid in thread-local storage before
|
|
// going to the content provider to open the file. Later, in the code
|
|
// that handles all permissions checks, we look for this uid and use
|
|
// that rather than the Activity Manager's own uid. The effect is that
|
|
// we do the check against the caller's permissions even though it looks
|
|
// to the content provider like the Activity Manager itself is making
|
|
// the request.
|
|
sCallerIdentity.set(new Identity(
|
|
Binder.getCallingPid(), Binder.getCallingUid()));
|
|
try {
|
|
pfd = cph.provider.openFile(uri, "r");
|
|
} catch (FileNotFoundException e) {
|
|
// do nothing; pfd will be returned null
|
|
} finally {
|
|
// Ensure that whatever happens, we clean up the identity state
|
|
sCallerIdentity.remove();
|
|
}
|
|
|
|
// We've got the fd now, so we're done with the provider.
|
|
removeContentProviderExternalUnchecked(name, null);
|
|
} else {
|
|
Slog.d(TAG, "Failed to get provider for authority '" + name + "'");
|
|
}
|
|
return pfd;
|
|
}
|
|
|
|
// Actually is sleeping or shutting down or whatever else in the future
|
|
// is an inactive state.
|
|
public boolean isSleeping() {
|
|
return mSleeping || mShuttingDown;
|
|
}
|
|
|
|
public void goingToSleep() {
|
|
if (checkCallingPermission(android.Manifest.permission.DEVICE_POWER)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
throw new SecurityException("Requires permission "
|
|
+ android.Manifest.permission.DEVICE_POWER);
|
|
}
|
|
|
|
synchronized(this) {
|
|
mWentToSleep = true;
|
|
updateEventDispatchingLocked();
|
|
|
|
if (!mSleeping) {
|
|
mSleeping = true;
|
|
mMainStack.stopIfSleepingLocked();
|
|
|
|
// Initialize the wake times of all processes.
|
|
checkExcessivePowerUsageLocked(false);
|
|
mHandler.removeMessages(CHECK_EXCESSIVE_WAKE_LOCKS_MSG);
|
|
Message nmsg = mHandler.obtainMessage(CHECK_EXCESSIVE_WAKE_LOCKS_MSG);
|
|
mHandler.sendMessageDelayed(nmsg, POWER_CHECK_DELAY);
|
|
}
|
|
}
|
|
}
|
|
|
|
public boolean shutdown(int timeout) {
|
|
if (checkCallingPermission(android.Manifest.permission.SHUTDOWN)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
throw new SecurityException("Requires permission "
|
|
+ android.Manifest.permission.SHUTDOWN);
|
|
}
|
|
|
|
boolean timedout = false;
|
|
|
|
synchronized(this) {
|
|
mShuttingDown = true;
|
|
updateEventDispatchingLocked();
|
|
|
|
if (mMainStack.mResumedActivity != null) {
|
|
mMainStack.stopIfSleepingLocked();
|
|
final long endTime = System.currentTimeMillis() + timeout;
|
|
while (mMainStack.mResumedActivity != null
|
|
|| mMainStack.mPausingActivity != null) {
|
|
long delay = endTime - System.currentTimeMillis();
|
|
if (delay <= 0) {
|
|
Slog.w(TAG, "Activity manager shutdown timed out");
|
|
timedout = true;
|
|
break;
|
|
}
|
|
try {
|
|
this.wait();
|
|
} catch (InterruptedException e) {
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
mUsageStatsService.shutdown();
|
|
mBatteryStatsService.shutdown();
|
|
|
|
return timedout;
|
|
}
|
|
|
|
public final void activitySlept(IBinder token) {
|
|
if (localLOGV) Slog.v(
|
|
TAG, "Activity slept: token=" + token);
|
|
|
|
ActivityRecord r = null;
|
|
|
|
final long origId = Binder.clearCallingIdentity();
|
|
|
|
synchronized (this) {
|
|
r = mMainStack.isInStackLocked(token);
|
|
if (r != null) {
|
|
mMainStack.activitySleptLocked(r);
|
|
}
|
|
}
|
|
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
|
|
private void comeOutOfSleepIfNeededLocked() {
|
|
if (!mWentToSleep && !mLockScreenShown) {
|
|
if (mSleeping) {
|
|
mSleeping = false;
|
|
mMainStack.awakeFromSleepingLocked();
|
|
mMainStack.resumeTopActivityLocked(null);
|
|
}
|
|
}
|
|
}
|
|
|
|
public void wakingUp() {
|
|
if (checkCallingPermission(android.Manifest.permission.DEVICE_POWER)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
throw new SecurityException("Requires permission "
|
|
+ android.Manifest.permission.DEVICE_POWER);
|
|
}
|
|
|
|
synchronized(this) {
|
|
mWentToSleep = false;
|
|
updateEventDispatchingLocked();
|
|
comeOutOfSleepIfNeededLocked();
|
|
}
|
|
}
|
|
|
|
private void updateEventDispatchingLocked() {
|
|
mWindowManager.setEventDispatching(mBooted && !mWentToSleep && !mShuttingDown);
|
|
}
|
|
|
|
public void setLockScreenShown(boolean shown) {
|
|
if (checkCallingPermission(android.Manifest.permission.DEVICE_POWER)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
throw new SecurityException("Requires permission "
|
|
+ android.Manifest.permission.DEVICE_POWER);
|
|
}
|
|
|
|
synchronized(this) {
|
|
mLockScreenShown = shown;
|
|
comeOutOfSleepIfNeededLocked();
|
|
}
|
|
}
|
|
|
|
public void stopAppSwitches() {
|
|
if (checkCallingPermission(android.Manifest.permission.STOP_APP_SWITCHES)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
throw new SecurityException("Requires permission "
|
|
+ android.Manifest.permission.STOP_APP_SWITCHES);
|
|
}
|
|
|
|
synchronized(this) {
|
|
mAppSwitchesAllowedTime = SystemClock.uptimeMillis()
|
|
+ APP_SWITCH_DELAY_TIME;
|
|
mDidAppSwitch = false;
|
|
mHandler.removeMessages(DO_PENDING_ACTIVITY_LAUNCHES_MSG);
|
|
Message msg = mHandler.obtainMessage(DO_PENDING_ACTIVITY_LAUNCHES_MSG);
|
|
mHandler.sendMessageDelayed(msg, APP_SWITCH_DELAY_TIME);
|
|
}
|
|
}
|
|
|
|
public void resumeAppSwitches() {
|
|
if (checkCallingPermission(android.Manifest.permission.STOP_APP_SWITCHES)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
throw new SecurityException("Requires permission "
|
|
+ android.Manifest.permission.STOP_APP_SWITCHES);
|
|
}
|
|
|
|
synchronized(this) {
|
|
// Note that we don't execute any pending app switches... we will
|
|
// let those wait until either the timeout, or the next start
|
|
// activity request.
|
|
mAppSwitchesAllowedTime = 0;
|
|
}
|
|
}
|
|
|
|
boolean checkAppSwitchAllowedLocked(int callingPid, int callingUid,
|
|
String name) {
|
|
if (mAppSwitchesAllowedTime < SystemClock.uptimeMillis()) {
|
|
return true;
|
|
}
|
|
|
|
final int perm = checkComponentPermission(
|
|
android.Manifest.permission.STOP_APP_SWITCHES, callingPid,
|
|
callingUid, -1, true);
|
|
if (perm == PackageManager.PERMISSION_GRANTED) {
|
|
return true;
|
|
}
|
|
|
|
Slog.w(TAG, name + " request from " + callingUid + " stopped");
|
|
return false;
|
|
}
|
|
|
|
public void setDebugApp(String packageName, boolean waitForDebugger,
|
|
boolean persistent) {
|
|
enforceCallingPermission(android.Manifest.permission.SET_DEBUG_APP,
|
|
"setDebugApp()");
|
|
|
|
// Note that this is not really thread safe if there are multiple
|
|
// callers into it at the same time, but that's not a situation we
|
|
// care about.
|
|
if (persistent) {
|
|
final ContentResolver resolver = mContext.getContentResolver();
|
|
Settings.System.putString(
|
|
resolver, Settings.System.DEBUG_APP,
|
|
packageName);
|
|
Settings.System.putInt(
|
|
resolver, Settings.System.WAIT_FOR_DEBUGGER,
|
|
waitForDebugger ? 1 : 0);
|
|
}
|
|
|
|
synchronized (this) {
|
|
if (!persistent) {
|
|
mOrigDebugApp = mDebugApp;
|
|
mOrigWaitForDebugger = mWaitForDebugger;
|
|
}
|
|
mDebugApp = packageName;
|
|
mWaitForDebugger = waitForDebugger;
|
|
mDebugTransient = !persistent;
|
|
if (packageName != null) {
|
|
final long origId = Binder.clearCallingIdentity();
|
|
forceStopPackageLocked(packageName, -1, false, false, true, true, 0);
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
}
|
|
}
|
|
|
|
void setOpenGlTraceApp(ApplicationInfo app, String processName) {
|
|
synchronized (this) {
|
|
boolean isDebuggable = "1".equals(SystemProperties.get(SYSTEM_DEBUGGABLE, "0"));
|
|
if (!isDebuggable) {
|
|
if ((app.flags&ApplicationInfo.FLAG_DEBUGGABLE) == 0) {
|
|
throw new SecurityException("Process not debuggable: " + app.packageName);
|
|
}
|
|
}
|
|
|
|
mOpenGlTraceApp = processName;
|
|
}
|
|
}
|
|
|
|
void setProfileApp(ApplicationInfo app, String processName, String profileFile,
|
|
ParcelFileDescriptor profileFd, boolean autoStopProfiler) {
|
|
synchronized (this) {
|
|
boolean isDebuggable = "1".equals(SystemProperties.get(SYSTEM_DEBUGGABLE, "0"));
|
|
if (!isDebuggable) {
|
|
if ((app.flags&ApplicationInfo.FLAG_DEBUGGABLE) == 0) {
|
|
throw new SecurityException("Process not debuggable: " + app.packageName);
|
|
}
|
|
}
|
|
mProfileApp = processName;
|
|
mProfileFile = profileFile;
|
|
if (mProfileFd != null) {
|
|
try {
|
|
mProfileFd.close();
|
|
} catch (IOException e) {
|
|
}
|
|
mProfileFd = null;
|
|
}
|
|
mProfileFd = profileFd;
|
|
mProfileType = 0;
|
|
mAutoStopProfiler = autoStopProfiler;
|
|
}
|
|
}
|
|
|
|
public void setAlwaysFinish(boolean enabled) {
|
|
enforceCallingPermission(android.Manifest.permission.SET_ALWAYS_FINISH,
|
|
"setAlwaysFinish()");
|
|
|
|
Settings.System.putInt(
|
|
mContext.getContentResolver(),
|
|
Settings.System.ALWAYS_FINISH_ACTIVITIES, enabled ? 1 : 0);
|
|
|
|
synchronized (this) {
|
|
mAlwaysFinishActivities = enabled;
|
|
}
|
|
}
|
|
|
|
public void setActivityController(IActivityController controller) {
|
|
enforceCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER,
|
|
"setActivityController()");
|
|
synchronized (this) {
|
|
mController = controller;
|
|
}
|
|
}
|
|
|
|
public boolean isUserAMonkey() {
|
|
// For now the fact that there is a controller implies
|
|
// we have a monkey.
|
|
synchronized (this) {
|
|
return mController != null;
|
|
}
|
|
}
|
|
|
|
public void registerProcessObserver(IProcessObserver observer) {
|
|
enforceCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER,
|
|
"registerProcessObserver()");
|
|
synchronized (this) {
|
|
mProcessObservers.register(observer);
|
|
}
|
|
}
|
|
|
|
public void unregisterProcessObserver(IProcessObserver observer) {
|
|
synchronized (this) {
|
|
mProcessObservers.unregister(observer);
|
|
}
|
|
}
|
|
|
|
public void setImmersive(IBinder token, boolean immersive) {
|
|
synchronized(this) {
|
|
ActivityRecord r = mMainStack.isInStackLocked(token);
|
|
if (r == null) {
|
|
throw new IllegalArgumentException();
|
|
}
|
|
r.immersive = immersive;
|
|
}
|
|
}
|
|
|
|
public boolean isImmersive(IBinder token) {
|
|
synchronized (this) {
|
|
ActivityRecord r = mMainStack.isInStackLocked(token);
|
|
if (r == null) {
|
|
throw new IllegalArgumentException();
|
|
}
|
|
return r.immersive;
|
|
}
|
|
}
|
|
|
|
public boolean isTopActivityImmersive() {
|
|
enforceNotIsolatedCaller("startActivity");
|
|
synchronized (this) {
|
|
ActivityRecord r = mMainStack.topRunningActivityLocked(null);
|
|
return (r != null) ? r.immersive : false;
|
|
}
|
|
}
|
|
|
|
public final void enterSafeMode() {
|
|
synchronized(this) {
|
|
// It only makes sense to do this before the system is ready
|
|
// and started launching other packages.
|
|
if (!mSystemReady) {
|
|
try {
|
|
AppGlobals.getPackageManager().enterSafeMode();
|
|
} catch (RemoteException e) {
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
public final void showSafeModeOverlay() {
|
|
View v = LayoutInflater.from(mContext).inflate(
|
|
com.android.internal.R.layout.safe_mode, null);
|
|
WindowManager.LayoutParams lp = new WindowManager.LayoutParams();
|
|
lp.type = WindowManager.LayoutParams.TYPE_SECURE_SYSTEM_OVERLAY;
|
|
lp.width = WindowManager.LayoutParams.WRAP_CONTENT;
|
|
lp.height = WindowManager.LayoutParams.WRAP_CONTENT;
|
|
lp.gravity = Gravity.BOTTOM | Gravity.START;
|
|
lp.format = v.getBackground().getOpacity();
|
|
lp.flags = WindowManager.LayoutParams.FLAG_NOT_FOCUSABLE
|
|
| WindowManager.LayoutParams.FLAG_NOT_TOUCHABLE;
|
|
((WindowManager)mContext.getSystemService(
|
|
Context.WINDOW_SERVICE)).addView(v, lp);
|
|
}
|
|
|
|
public void noteWakeupAlarm(IIntentSender sender) {
|
|
if (!(sender instanceof PendingIntentRecord)) {
|
|
return;
|
|
}
|
|
BatteryStatsImpl stats = mBatteryStatsService.getActiveStatistics();
|
|
synchronized (stats) {
|
|
if (mBatteryStatsService.isOnBattery()) {
|
|
mBatteryStatsService.enforceCallingPermission();
|
|
PendingIntentRecord rec = (PendingIntentRecord)sender;
|
|
int MY_UID = Binder.getCallingUid();
|
|
int uid = rec.uid == MY_UID ? Process.SYSTEM_UID : rec.uid;
|
|
BatteryStatsImpl.Uid.Pkg pkg =
|
|
stats.getPackageStatsLocked(uid, rec.key.packageName);
|
|
pkg.incWakeupsLocked();
|
|
}
|
|
}
|
|
}
|
|
|
|
public boolean killPids(int[] pids, String pReason, boolean secure) {
|
|
if (Binder.getCallingUid() != Process.SYSTEM_UID) {
|
|
throw new SecurityException("killPids only available to the system");
|
|
}
|
|
String reason = (pReason == null) ? "Unknown" : pReason;
|
|
// XXX Note: don't acquire main activity lock here, because the window
|
|
// manager calls in with its locks held.
|
|
|
|
boolean killed = false;
|
|
synchronized (mPidsSelfLocked) {
|
|
int[] types = new int[pids.length];
|
|
int worstType = 0;
|
|
for (int i=0; i<pids.length; i++) {
|
|
ProcessRecord proc = mPidsSelfLocked.get(pids[i]);
|
|
if (proc != null) {
|
|
int type = proc.setAdj;
|
|
types[i] = type;
|
|
if (type > worstType) {
|
|
worstType = type;
|
|
}
|
|
}
|
|
}
|
|
|
|
// If the worst oom_adj is somewhere in the hidden proc LRU range,
|
|
// then constrain it so we will kill all hidden procs.
|
|
if (worstType < ProcessList.HIDDEN_APP_MAX_ADJ
|
|
&& worstType > ProcessList.HIDDEN_APP_MIN_ADJ) {
|
|
worstType = ProcessList.HIDDEN_APP_MIN_ADJ;
|
|
}
|
|
|
|
// If this is not a secure call, don't let it kill processes that
|
|
// are important.
|
|
if (!secure && worstType < ProcessList.SERVICE_ADJ) {
|
|
worstType = ProcessList.SERVICE_ADJ;
|
|
}
|
|
|
|
Slog.w(TAG, "Killing processes " + reason + " at adjustment " + worstType);
|
|
for (int i=0; i<pids.length; i++) {
|
|
ProcessRecord proc = mPidsSelfLocked.get(pids[i]);
|
|
if (proc == null) {
|
|
continue;
|
|
}
|
|
int adj = proc.setAdj;
|
|
if (adj >= worstType && !proc.killedBackground) {
|
|
Slog.w(TAG, "Killing " + proc + " (adj " + adj + "): " + reason);
|
|
EventLog.writeEvent(EventLogTags.AM_KILL, proc.pid,
|
|
proc.processName, adj, reason);
|
|
killed = true;
|
|
proc.killedBackground = true;
|
|
Process.killProcessQuiet(pids[i]);
|
|
}
|
|
}
|
|
}
|
|
return killed;
|
|
}
|
|
|
|
@Override
|
|
public boolean killProcessesBelowForeground(String reason) {
|
|
if (Binder.getCallingUid() != Process.SYSTEM_UID) {
|
|
throw new SecurityException("killProcessesBelowForeground() only available to system");
|
|
}
|
|
|
|
return killProcessesBelowAdj(ProcessList.FOREGROUND_APP_ADJ, reason);
|
|
}
|
|
|
|
private boolean killProcessesBelowAdj(int belowAdj, String reason) {
|
|
if (Binder.getCallingUid() != Process.SYSTEM_UID) {
|
|
throw new SecurityException("killProcessesBelowAdj() only available to system");
|
|
}
|
|
|
|
boolean killed = false;
|
|
synchronized (mPidsSelfLocked) {
|
|
final int size = mPidsSelfLocked.size();
|
|
for (int i = 0; i < size; i++) {
|
|
final int pid = mPidsSelfLocked.keyAt(i);
|
|
final ProcessRecord proc = mPidsSelfLocked.valueAt(i);
|
|
if (proc == null) continue;
|
|
|
|
final int adj = proc.setAdj;
|
|
if (adj > belowAdj && !proc.killedBackground) {
|
|
Slog.w(TAG, "Killing " + proc + " (adj " + adj + "): " + reason);
|
|
EventLog.writeEvent(
|
|
EventLogTags.AM_KILL, proc.pid, proc.processName, adj, reason);
|
|
killed = true;
|
|
proc.killedBackground = true;
|
|
Process.killProcessQuiet(pid);
|
|
}
|
|
}
|
|
}
|
|
return killed;
|
|
}
|
|
|
|
public final void startRunning(String pkg, String cls, String action,
|
|
String data) {
|
|
synchronized(this) {
|
|
if (mStartRunning) {
|
|
return;
|
|
}
|
|
mStartRunning = true;
|
|
mTopComponent = pkg != null && cls != null
|
|
? new ComponentName(pkg, cls) : null;
|
|
mTopAction = action != null ? action : Intent.ACTION_MAIN;
|
|
mTopData = data;
|
|
if (!mSystemReady) {
|
|
return;
|
|
}
|
|
}
|
|
|
|
systemReady(null);
|
|
}
|
|
|
|
private void retrieveSettings() {
|
|
final ContentResolver resolver = mContext.getContentResolver();
|
|
String debugApp = Settings.System.getString(
|
|
resolver, Settings.System.DEBUG_APP);
|
|
boolean waitForDebugger = Settings.System.getInt(
|
|
resolver, Settings.System.WAIT_FOR_DEBUGGER, 0) != 0;
|
|
boolean alwaysFinishActivities = Settings.System.getInt(
|
|
resolver, Settings.System.ALWAYS_FINISH_ACTIVITIES, 0) != 0;
|
|
|
|
Configuration configuration = new Configuration();
|
|
Settings.System.getConfiguration(resolver, configuration);
|
|
|
|
synchronized (this) {
|
|
mDebugApp = mOrigDebugApp = debugApp;
|
|
mWaitForDebugger = mOrigWaitForDebugger = waitForDebugger;
|
|
mAlwaysFinishActivities = alwaysFinishActivities;
|
|
// This happens before any activities are started, so we can
|
|
// change mConfiguration in-place.
|
|
updateConfigurationLocked(configuration, null, false, true);
|
|
if (DEBUG_CONFIGURATION) Slog.v(TAG, "Initial config: " + mConfiguration);
|
|
}
|
|
}
|
|
|
|
public boolean testIsSystemReady() {
|
|
// no need to synchronize(this) just to read & return the value
|
|
return mSystemReady;
|
|
}
|
|
|
|
private static File getCalledPreBootReceiversFile() {
|
|
File dataDir = Environment.getDataDirectory();
|
|
File systemDir = new File(dataDir, "system");
|
|
File fname = new File(systemDir, "called_pre_boots.dat");
|
|
return fname;
|
|
}
|
|
|
|
static final int LAST_DONE_VERSION = 10000;
|
|
|
|
private static ArrayList<ComponentName> readLastDonePreBootReceivers() {
|
|
ArrayList<ComponentName> lastDoneReceivers = new ArrayList<ComponentName>();
|
|
File file = getCalledPreBootReceiversFile();
|
|
FileInputStream fis = null;
|
|
try {
|
|
fis = new FileInputStream(file);
|
|
DataInputStream dis = new DataInputStream(new BufferedInputStream(fis, 2048));
|
|
int fvers = dis.readInt();
|
|
if (fvers == LAST_DONE_VERSION) {
|
|
String vers = dis.readUTF();
|
|
String codename = dis.readUTF();
|
|
String build = dis.readUTF();
|
|
if (android.os.Build.VERSION.RELEASE.equals(vers)
|
|
&& android.os.Build.VERSION.CODENAME.equals(codename)
|
|
&& android.os.Build.VERSION.INCREMENTAL.equals(build)) {
|
|
int num = dis.readInt();
|
|
while (num > 0) {
|
|
num--;
|
|
String pkg = dis.readUTF();
|
|
String cls = dis.readUTF();
|
|
lastDoneReceivers.add(new ComponentName(pkg, cls));
|
|
}
|
|
}
|
|
}
|
|
} catch (FileNotFoundException e) {
|
|
} catch (IOException e) {
|
|
Slog.w(TAG, "Failure reading last done pre-boot receivers", e);
|
|
} finally {
|
|
if (fis != null) {
|
|
try {
|
|
fis.close();
|
|
} catch (IOException e) {
|
|
}
|
|
}
|
|
}
|
|
return lastDoneReceivers;
|
|
}
|
|
|
|
private static void writeLastDonePreBootReceivers(ArrayList<ComponentName> list) {
|
|
File file = getCalledPreBootReceiversFile();
|
|
FileOutputStream fos = null;
|
|
DataOutputStream dos = null;
|
|
try {
|
|
Slog.i(TAG, "Writing new set of last done pre-boot receivers...");
|
|
fos = new FileOutputStream(file);
|
|
dos = new DataOutputStream(new BufferedOutputStream(fos, 2048));
|
|
dos.writeInt(LAST_DONE_VERSION);
|
|
dos.writeUTF(android.os.Build.VERSION.RELEASE);
|
|
dos.writeUTF(android.os.Build.VERSION.CODENAME);
|
|
dos.writeUTF(android.os.Build.VERSION.INCREMENTAL);
|
|
dos.writeInt(list.size());
|
|
for (int i=0; i<list.size(); i++) {
|
|
dos.writeUTF(list.get(i).getPackageName());
|
|
dos.writeUTF(list.get(i).getClassName());
|
|
}
|
|
} catch (IOException e) {
|
|
Slog.w(TAG, "Failure writing last done pre-boot receivers", e);
|
|
file.delete();
|
|
} finally {
|
|
FileUtils.sync(fos);
|
|
if (dos != null) {
|
|
try {
|
|
dos.close();
|
|
} catch (IOException e) {
|
|
// TODO Auto-generated catch block
|
|
e.printStackTrace();
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
public void systemReady(final Runnable goingCallback) {
|
|
synchronized(this) {
|
|
if (mSystemReady) {
|
|
if (goingCallback != null) goingCallback.run();
|
|
return;
|
|
}
|
|
|
|
// Check to see if there are any update receivers to run.
|
|
if (!mDidUpdate) {
|
|
if (mWaitingUpdate) {
|
|
return;
|
|
}
|
|
Intent intent = new Intent(Intent.ACTION_PRE_BOOT_COMPLETED);
|
|
List<ResolveInfo> ris = null;
|
|
try {
|
|
ris = AppGlobals.getPackageManager().queryIntentReceivers(
|
|
intent, null, 0, 0);
|
|
} catch (RemoteException e) {
|
|
}
|
|
if (ris != null) {
|
|
for (int i=ris.size()-1; i>=0; i--) {
|
|
if ((ris.get(i).activityInfo.applicationInfo.flags
|
|
&ApplicationInfo.FLAG_SYSTEM) == 0) {
|
|
ris.remove(i);
|
|
}
|
|
}
|
|
intent.addFlags(Intent.FLAG_RECEIVER_BOOT_UPGRADE);
|
|
|
|
ArrayList<ComponentName> lastDoneReceivers = readLastDonePreBootReceivers();
|
|
|
|
final ArrayList<ComponentName> doneReceivers = new ArrayList<ComponentName>();
|
|
for (int i=0; i<ris.size(); i++) {
|
|
ActivityInfo ai = ris.get(i).activityInfo;
|
|
ComponentName comp = new ComponentName(ai.packageName, ai.name);
|
|
if (lastDoneReceivers.contains(comp)) {
|
|
ris.remove(i);
|
|
i--;
|
|
}
|
|
}
|
|
|
|
for (int i=0; i<ris.size(); i++) {
|
|
ActivityInfo ai = ris.get(i).activityInfo;
|
|
ComponentName comp = new ComponentName(ai.packageName, ai.name);
|
|
doneReceivers.add(comp);
|
|
intent.setComponent(comp);
|
|
IIntentReceiver finisher = null;
|
|
if (i == ris.size()-1) {
|
|
finisher = new IIntentReceiver.Stub() {
|
|
public void performReceive(Intent intent, int resultCode,
|
|
String data, Bundle extras, boolean ordered,
|
|
boolean sticky) {
|
|
// The raw IIntentReceiver interface is called
|
|
// with the AM lock held, so redispatch to
|
|
// execute our code without the lock.
|
|
mHandler.post(new Runnable() {
|
|
public void run() {
|
|
synchronized (ActivityManagerService.this) {
|
|
mDidUpdate = true;
|
|
}
|
|
writeLastDonePreBootReceivers(doneReceivers);
|
|
showBootMessage(mContext.getText(
|
|
R.string.android_upgrading_complete),
|
|
false);
|
|
systemReady(goingCallback);
|
|
}
|
|
});
|
|
}
|
|
};
|
|
}
|
|
Slog.i(TAG, "Sending system update to: " + intent.getComponent());
|
|
/* TODO: Send this to all users */
|
|
broadcastIntentLocked(null, null, intent, null, finisher,
|
|
0, null, null, null, true, false, MY_PID, Process.SYSTEM_UID,
|
|
0 /* UserId zero */);
|
|
if (finisher != null) {
|
|
mWaitingUpdate = true;
|
|
}
|
|
}
|
|
}
|
|
if (mWaitingUpdate) {
|
|
return;
|
|
}
|
|
mDidUpdate = true;
|
|
}
|
|
|
|
mSystemReady = true;
|
|
if (!mStartRunning) {
|
|
return;
|
|
}
|
|
}
|
|
|
|
ArrayList<ProcessRecord> procsToKill = null;
|
|
synchronized(mPidsSelfLocked) {
|
|
for (int i=mPidsSelfLocked.size()-1; i>=0; i--) {
|
|
ProcessRecord proc = mPidsSelfLocked.valueAt(i);
|
|
if (!isAllowedWhileBooting(proc.info)){
|
|
if (procsToKill == null) {
|
|
procsToKill = new ArrayList<ProcessRecord>();
|
|
}
|
|
procsToKill.add(proc);
|
|
}
|
|
}
|
|
}
|
|
|
|
synchronized(this) {
|
|
if (procsToKill != null) {
|
|
for (int i=procsToKill.size()-1; i>=0; i--) {
|
|
ProcessRecord proc = procsToKill.get(i);
|
|
Slog.i(TAG, "Removing system update proc: " + proc);
|
|
removeProcessLocked(proc, true, false, "system update done");
|
|
}
|
|
}
|
|
|
|
// Now that we have cleaned up any update processes, we
|
|
// are ready to start launching real processes and know that
|
|
// we won't trample on them any more.
|
|
mProcessesReady = true;
|
|
}
|
|
|
|
Slog.i(TAG, "System now ready");
|
|
EventLog.writeEvent(EventLogTags.BOOT_PROGRESS_AMS_READY,
|
|
SystemClock.uptimeMillis());
|
|
|
|
synchronized(this) {
|
|
// Make sure we have no pre-ready processes sitting around.
|
|
|
|
if (mFactoryTest == SystemServer.FACTORY_TEST_LOW_LEVEL) {
|
|
ResolveInfo ri = mContext.getPackageManager()
|
|
.resolveActivity(new Intent(Intent.ACTION_FACTORY_TEST),
|
|
STOCK_PM_FLAGS);
|
|
CharSequence errorMsg = null;
|
|
if (ri != null) {
|
|
ActivityInfo ai = ri.activityInfo;
|
|
ApplicationInfo app = ai.applicationInfo;
|
|
if ((app.flags&ApplicationInfo.FLAG_SYSTEM) != 0) {
|
|
mTopAction = Intent.ACTION_FACTORY_TEST;
|
|
mTopData = null;
|
|
mTopComponent = new ComponentName(app.packageName,
|
|
ai.name);
|
|
} else {
|
|
errorMsg = mContext.getResources().getText(
|
|
com.android.internal.R.string.factorytest_not_system);
|
|
}
|
|
} else {
|
|
errorMsg = mContext.getResources().getText(
|
|
com.android.internal.R.string.factorytest_no_action);
|
|
}
|
|
if (errorMsg != null) {
|
|
mTopAction = null;
|
|
mTopData = null;
|
|
mTopComponent = null;
|
|
Message msg = Message.obtain();
|
|
msg.what = SHOW_FACTORY_ERROR_MSG;
|
|
msg.getData().putCharSequence("msg", errorMsg);
|
|
mHandler.sendMessage(msg);
|
|
}
|
|
}
|
|
}
|
|
|
|
retrieveSettings();
|
|
|
|
if (goingCallback != null) goingCallback.run();
|
|
|
|
synchronized (this) {
|
|
if (mFactoryTest != SystemServer.FACTORY_TEST_LOW_LEVEL) {
|
|
try {
|
|
List apps = AppGlobals.getPackageManager().
|
|
getPersistentApplications(STOCK_PM_FLAGS);
|
|
if (apps != null) {
|
|
int N = apps.size();
|
|
int i;
|
|
for (i=0; i<N; i++) {
|
|
ApplicationInfo info
|
|
= (ApplicationInfo)apps.get(i);
|
|
if (info != null &&
|
|
!info.packageName.equals("android")) {
|
|
addAppLocked(info, false);
|
|
}
|
|
}
|
|
}
|
|
} catch (RemoteException ex) {
|
|
// pm is in same process, this will never happen.
|
|
}
|
|
}
|
|
|
|
// Start up initial activity.
|
|
mBooting = true;
|
|
|
|
try {
|
|
if (AppGlobals.getPackageManager().hasSystemUidErrors()) {
|
|
Message msg = Message.obtain();
|
|
msg.what = SHOW_UID_ERROR_MSG;
|
|
mHandler.sendMessage(msg);
|
|
}
|
|
} catch (RemoteException e) {
|
|
}
|
|
|
|
mMainStack.resumeTopActivityLocked(null);
|
|
}
|
|
}
|
|
|
|
private boolean makeAppCrashingLocked(ProcessRecord app,
|
|
String shortMsg, String longMsg, String stackTrace) {
|
|
app.crashing = true;
|
|
app.crashingReport = generateProcessError(app,
|
|
ActivityManager.ProcessErrorStateInfo.CRASHED, null, shortMsg, longMsg, stackTrace);
|
|
startAppProblemLocked(app);
|
|
app.stopFreezingAllLocked();
|
|
return handleAppCrashLocked(app);
|
|
}
|
|
|
|
private void makeAppNotRespondingLocked(ProcessRecord app,
|
|
String activity, String shortMsg, String longMsg) {
|
|
app.notResponding = true;
|
|
app.notRespondingReport = generateProcessError(app,
|
|
ActivityManager.ProcessErrorStateInfo.NOT_RESPONDING,
|
|
activity, shortMsg, longMsg, null);
|
|
startAppProblemLocked(app);
|
|
app.stopFreezingAllLocked();
|
|
}
|
|
|
|
/**
|
|
* Generate a process error record, suitable for attachment to a ProcessRecord.
|
|
*
|
|
* @param app The ProcessRecord in which the error occurred.
|
|
* @param condition Crashing, Application Not Responding, etc. Values are defined in
|
|
* ActivityManager.AppErrorStateInfo
|
|
* @param activity The activity associated with the crash, if known.
|
|
* @param shortMsg Short message describing the crash.
|
|
* @param longMsg Long message describing the crash.
|
|
* @param stackTrace Full crash stack trace, may be null.
|
|
*
|
|
* @return Returns a fully-formed AppErrorStateInfo record.
|
|
*/
|
|
private ActivityManager.ProcessErrorStateInfo generateProcessError(ProcessRecord app,
|
|
int condition, String activity, String shortMsg, String longMsg, String stackTrace) {
|
|
ActivityManager.ProcessErrorStateInfo report = new ActivityManager.ProcessErrorStateInfo();
|
|
|
|
report.condition = condition;
|
|
report.processName = app.processName;
|
|
report.pid = app.pid;
|
|
report.uid = app.info.uid;
|
|
report.tag = activity;
|
|
report.shortMsg = shortMsg;
|
|
report.longMsg = longMsg;
|
|
report.stackTrace = stackTrace;
|
|
|
|
return report;
|
|
}
|
|
|
|
void killAppAtUsersRequest(ProcessRecord app, Dialog fromDialog) {
|
|
synchronized (this) {
|
|
app.crashing = false;
|
|
app.crashingReport = null;
|
|
app.notResponding = false;
|
|
app.notRespondingReport = null;
|
|
if (app.anrDialog == fromDialog) {
|
|
app.anrDialog = null;
|
|
}
|
|
if (app.waitDialog == fromDialog) {
|
|
app.waitDialog = null;
|
|
}
|
|
if (app.pid > 0 && app.pid != MY_PID) {
|
|
handleAppCrashLocked(app);
|
|
Slog.i(ActivityManagerService.TAG, "Killing " + app + ": user's request");
|
|
EventLog.writeEvent(EventLogTags.AM_KILL, app.pid,
|
|
app.processName, app.setAdj, "user's request after error");
|
|
Process.killProcessQuiet(app.pid);
|
|
}
|
|
}
|
|
}
|
|
|
|
private boolean handleAppCrashLocked(ProcessRecord app) {
|
|
if (mHeadless) {
|
|
Log.e(TAG, "handleAppCrashLocked: " + app.processName);
|
|
return false;
|
|
}
|
|
long now = SystemClock.uptimeMillis();
|
|
|
|
Long crashTime;
|
|
if (!app.isolated) {
|
|
crashTime = mProcessCrashTimes.get(app.info.processName, app.uid);
|
|
} else {
|
|
crashTime = null;
|
|
}
|
|
if (crashTime != null && now < crashTime+ProcessList.MIN_CRASH_INTERVAL) {
|
|
// This process loses!
|
|
Slog.w(TAG, "Process " + app.info.processName
|
|
+ " has crashed too many times: killing!");
|
|
EventLog.writeEvent(EventLogTags.AM_PROCESS_CRASHED_TOO_MUCH,
|
|
app.info.processName, app.uid);
|
|
for (int i=mMainStack.mHistory.size()-1; i>=0; i--) {
|
|
ActivityRecord r = (ActivityRecord)mMainStack.mHistory.get(i);
|
|
if (r.app == app) {
|
|
Slog.w(TAG, " Force finishing activity "
|
|
+ r.intent.getComponent().flattenToShortString());
|
|
r.stack.finishActivityLocked(r, i, Activity.RESULT_CANCELED, null, "crashed");
|
|
}
|
|
}
|
|
if (!app.persistent) {
|
|
// We don't want to start this process again until the user
|
|
// explicitly does so... but for persistent process, we really
|
|
// need to keep it running. If a persistent process is actually
|
|
// repeatedly crashing, then badness for everyone.
|
|
EventLog.writeEvent(EventLogTags.AM_PROC_BAD, app.uid,
|
|
app.info.processName);
|
|
if (!app.isolated) {
|
|
// XXX We don't have a way to mark isolated processes
|
|
// as bad, since they don't have a peristent identity.
|
|
mBadProcesses.put(app.info.processName, app.uid, now);
|
|
mProcessCrashTimes.remove(app.info.processName, app.uid);
|
|
}
|
|
app.bad = true;
|
|
app.removed = true;
|
|
// Don't let services in this process be restarted and potentially
|
|
// annoy the user repeatedly. Unless it is persistent, since those
|
|
// processes run critical code.
|
|
removeProcessLocked(app, false, false, "crash");
|
|
mMainStack.resumeTopActivityLocked(null);
|
|
return false;
|
|
}
|
|
mMainStack.resumeTopActivityLocked(null);
|
|
} else {
|
|
ActivityRecord r = mMainStack.topRunningActivityLocked(null);
|
|
if (r != null && r.app == app) {
|
|
// If the top running activity is from this crashing
|
|
// process, then terminate it to avoid getting in a loop.
|
|
Slog.w(TAG, " Force finishing activity "
|
|
+ r.intent.getComponent().flattenToShortString());
|
|
int index = mMainStack.indexOfActivityLocked(r);
|
|
r.stack.finishActivityLocked(r, index,
|
|
Activity.RESULT_CANCELED, null, "crashed");
|
|
// Also terminate any activities below it that aren't yet
|
|
// stopped, to avoid a situation where one will get
|
|
// re-start our crashing activity once it gets resumed again.
|
|
index--;
|
|
if (index >= 0) {
|
|
r = (ActivityRecord)mMainStack.mHistory.get(index);
|
|
if (r.state == ActivityState.RESUMED
|
|
|| r.state == ActivityState.PAUSING
|
|
|| r.state == ActivityState.PAUSED) {
|
|
if (!r.isHomeActivity || mHomeProcess != r.app) {
|
|
Slog.w(TAG, " Force finishing activity "
|
|
+ r.intent.getComponent().flattenToShortString());
|
|
r.stack.finishActivityLocked(r, index,
|
|
Activity.RESULT_CANCELED, null, "crashed");
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Bump up the crash count of any services currently running in the proc.
|
|
if (app.services.size() != 0) {
|
|
// Any services running in the application need to be placed
|
|
// back in the pending list.
|
|
Iterator<ServiceRecord> it = app.services.iterator();
|
|
while (it.hasNext()) {
|
|
ServiceRecord sr = it.next();
|
|
sr.crashCount++;
|
|
}
|
|
}
|
|
|
|
// If the crashing process is what we consider to be the "home process" and it has been
|
|
// replaced by a third-party app, clear the package preferred activities from packages
|
|
// with a home activity running in the process to prevent a repeatedly crashing app
|
|
// from blocking the user to manually clear the list.
|
|
if (app == mHomeProcess && mHomeProcess.activities.size() > 0
|
|
&& (mHomeProcess.info.flags & ApplicationInfo.FLAG_SYSTEM) == 0) {
|
|
Iterator it = mHomeProcess.activities.iterator();
|
|
while (it.hasNext()) {
|
|
ActivityRecord r = (ActivityRecord)it.next();
|
|
if (r.isHomeActivity) {
|
|
Log.i(TAG, "Clearing package preferred activities from " + r.packageName);
|
|
try {
|
|
ActivityThread.getPackageManager()
|
|
.clearPackagePreferredActivities(r.packageName);
|
|
} catch (RemoteException c) {
|
|
// pm is in same process, this will never happen.
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!app.isolated) {
|
|
// XXX Can't keep track of crash times for isolated processes,
|
|
// because they don't have a perisistent identity.
|
|
mProcessCrashTimes.put(app.info.processName, app.uid, now);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
void startAppProblemLocked(ProcessRecord app) {
|
|
app.errorReportReceiver = ApplicationErrorReport.getErrorReportReceiver(
|
|
mContext, app.info.packageName, app.info.flags);
|
|
skipCurrentReceiverLocked(app);
|
|
}
|
|
|
|
void skipCurrentReceiverLocked(ProcessRecord app) {
|
|
for (BroadcastQueue queue : mBroadcastQueues) {
|
|
queue.skipCurrentReceiverLocked(app);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Used by {@link com.android.internal.os.RuntimeInit} to report when an application crashes.
|
|
* The application process will exit immediately after this call returns.
|
|
* @param app object of the crashing app, null for the system server
|
|
* @param crashInfo describing the exception
|
|
*/
|
|
public void handleApplicationCrash(IBinder app, ApplicationErrorReport.CrashInfo crashInfo) {
|
|
ProcessRecord r = findAppProcess(app, "Crash");
|
|
final String processName = app == null ? "system_server"
|
|
: (r == null ? "unknown" : r.processName);
|
|
|
|
EventLog.writeEvent(EventLogTags.AM_CRASH, Binder.getCallingPid(),
|
|
processName,
|
|
r == null ? -1 : r.info.flags,
|
|
crashInfo.exceptionClassName,
|
|
crashInfo.exceptionMessage,
|
|
crashInfo.throwFileName,
|
|
crashInfo.throwLineNumber);
|
|
|
|
addErrorToDropBox("crash", r, processName, null, null, null, null, null, crashInfo);
|
|
|
|
crashApplication(r, crashInfo);
|
|
}
|
|
|
|
public void handleApplicationStrictModeViolation(
|
|
IBinder app,
|
|
int violationMask,
|
|
StrictMode.ViolationInfo info) {
|
|
ProcessRecord r = findAppProcess(app, "StrictMode");
|
|
if (r == null) {
|
|
return;
|
|
}
|
|
|
|
if ((violationMask & StrictMode.PENALTY_DROPBOX) != 0) {
|
|
Integer stackFingerprint = info.hashCode();
|
|
boolean logIt = true;
|
|
synchronized (mAlreadyLoggedViolatedStacks) {
|
|
if (mAlreadyLoggedViolatedStacks.contains(stackFingerprint)) {
|
|
logIt = false;
|
|
// TODO: sub-sample into EventLog for these, with
|
|
// the info.durationMillis? Then we'd get
|
|
// the relative pain numbers, without logging all
|
|
// the stack traces repeatedly. We'd want to do
|
|
// likewise in the client code, which also does
|
|
// dup suppression, before the Binder call.
|
|
} else {
|
|
if (mAlreadyLoggedViolatedStacks.size() >= MAX_DUP_SUPPRESSED_STACKS) {
|
|
mAlreadyLoggedViolatedStacks.clear();
|
|
}
|
|
mAlreadyLoggedViolatedStacks.add(stackFingerprint);
|
|
}
|
|
}
|
|
if (logIt) {
|
|
logStrictModeViolationToDropBox(r, info);
|
|
}
|
|
}
|
|
|
|
if ((violationMask & StrictMode.PENALTY_DIALOG) != 0) {
|
|
AppErrorResult result = new AppErrorResult();
|
|
synchronized (this) {
|
|
final long origId = Binder.clearCallingIdentity();
|
|
|
|
Message msg = Message.obtain();
|
|
msg.what = SHOW_STRICT_MODE_VIOLATION_MSG;
|
|
HashMap<String, Object> data = new HashMap<String, Object>();
|
|
data.put("result", result);
|
|
data.put("app", r);
|
|
data.put("violationMask", violationMask);
|
|
data.put("info", info);
|
|
msg.obj = data;
|
|
mHandler.sendMessage(msg);
|
|
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
int res = result.get();
|
|
Slog.w(TAG, "handleApplicationStrictModeViolation; res=" + res);
|
|
}
|
|
}
|
|
|
|
// Depending on the policy in effect, there could be a bunch of
|
|
// these in quick succession so we try to batch these together to
|
|
// minimize disk writes, number of dropbox entries, and maximize
|
|
// compression, by having more fewer, larger records.
|
|
private void logStrictModeViolationToDropBox(
|
|
ProcessRecord process,
|
|
StrictMode.ViolationInfo info) {
|
|
if (info == null) {
|
|
return;
|
|
}
|
|
final boolean isSystemApp = process == null ||
|
|
(process.info.flags & (ApplicationInfo.FLAG_SYSTEM |
|
|
ApplicationInfo.FLAG_UPDATED_SYSTEM_APP)) != 0;
|
|
final String processName = process == null ? "unknown" : process.processName;
|
|
final String dropboxTag = isSystemApp ? "system_app_strictmode" : "data_app_strictmode";
|
|
final DropBoxManager dbox = (DropBoxManager)
|
|
mContext.getSystemService(Context.DROPBOX_SERVICE);
|
|
|
|
// Exit early if the dropbox isn't configured to accept this report type.
|
|
if (dbox == null || !dbox.isTagEnabled(dropboxTag)) return;
|
|
|
|
boolean bufferWasEmpty;
|
|
boolean needsFlush;
|
|
final StringBuilder sb = isSystemApp ? mStrictModeBuffer : new StringBuilder(1024);
|
|
synchronized (sb) {
|
|
bufferWasEmpty = sb.length() == 0;
|
|
appendDropBoxProcessHeaders(process, processName, sb);
|
|
sb.append("Build: ").append(Build.FINGERPRINT).append("\n");
|
|
sb.append("System-App: ").append(isSystemApp).append("\n");
|
|
sb.append("Uptime-Millis: ").append(info.violationUptimeMillis).append("\n");
|
|
if (info.violationNumThisLoop != 0) {
|
|
sb.append("Loop-Violation-Number: ").append(info.violationNumThisLoop).append("\n");
|
|
}
|
|
if (info.numAnimationsRunning != 0) {
|
|
sb.append("Animations-Running: ").append(info.numAnimationsRunning).append("\n");
|
|
}
|
|
if (info.broadcastIntentAction != null) {
|
|
sb.append("Broadcast-Intent-Action: ").append(info.broadcastIntentAction).append("\n");
|
|
}
|
|
if (info.durationMillis != -1) {
|
|
sb.append("Duration-Millis: ").append(info.durationMillis).append("\n");
|
|
}
|
|
if (info.numInstances != -1) {
|
|
sb.append("Instance-Count: ").append(info.numInstances).append("\n");
|
|
}
|
|
if (info.tags != null) {
|
|
for (String tag : info.tags) {
|
|
sb.append("Span-Tag: ").append(tag).append("\n");
|
|
}
|
|
}
|
|
sb.append("\n");
|
|
if (info.crashInfo != null && info.crashInfo.stackTrace != null) {
|
|
sb.append(info.crashInfo.stackTrace);
|
|
}
|
|
sb.append("\n");
|
|
|
|
// Only buffer up to ~64k. Various logging bits truncate
|
|
// things at 128k.
|
|
needsFlush = (sb.length() > 64 * 1024);
|
|
}
|
|
|
|
// Flush immediately if the buffer's grown too large, or this
|
|
// is a non-system app. Non-system apps are isolated with a
|
|
// different tag & policy and not batched.
|
|
//
|
|
// Batching is useful during internal testing with
|
|
// StrictMode settings turned up high. Without batching,
|
|
// thousands of separate files could be created on boot.
|
|
if (!isSystemApp || needsFlush) {
|
|
new Thread("Error dump: " + dropboxTag) {
|
|
@Override
|
|
public void run() {
|
|
String report;
|
|
synchronized (sb) {
|
|
report = sb.toString();
|
|
sb.delete(0, sb.length());
|
|
sb.trimToSize();
|
|
}
|
|
if (report.length() != 0) {
|
|
dbox.addText(dropboxTag, report);
|
|
}
|
|
}
|
|
}.start();
|
|
return;
|
|
}
|
|
|
|
// System app batching:
|
|
if (!bufferWasEmpty) {
|
|
// An existing dropbox-writing thread is outstanding, so
|
|
// we don't need to start it up. The existing thread will
|
|
// catch the buffer appends we just did.
|
|
return;
|
|
}
|
|
|
|
// Worker thread to both batch writes and to avoid blocking the caller on I/O.
|
|
// (After this point, we shouldn't access AMS internal data structures.)
|
|
new Thread("Error dump: " + dropboxTag) {
|
|
@Override
|
|
public void run() {
|
|
// 5 second sleep to let stacks arrive and be batched together
|
|
try {
|
|
Thread.sleep(5000); // 5 seconds
|
|
} catch (InterruptedException e) {}
|
|
|
|
String errorReport;
|
|
synchronized (mStrictModeBuffer) {
|
|
errorReport = mStrictModeBuffer.toString();
|
|
if (errorReport.length() == 0) {
|
|
return;
|
|
}
|
|
mStrictModeBuffer.delete(0, mStrictModeBuffer.length());
|
|
mStrictModeBuffer.trimToSize();
|
|
}
|
|
dbox.addText(dropboxTag, errorReport);
|
|
}
|
|
}.start();
|
|
}
|
|
|
|
/**
|
|
* Used by {@link Log} via {@link com.android.internal.os.RuntimeInit} to report serious errors.
|
|
* @param app object of the crashing app, null for the system server
|
|
* @param tag reported by the caller
|
|
* @param crashInfo describing the context of the error
|
|
* @return true if the process should exit immediately (WTF is fatal)
|
|
*/
|
|
public boolean handleApplicationWtf(IBinder app, String tag,
|
|
ApplicationErrorReport.CrashInfo crashInfo) {
|
|
ProcessRecord r = findAppProcess(app, "WTF");
|
|
final String processName = app == null ? "system_server"
|
|
: (r == null ? "unknown" : r.processName);
|
|
|
|
EventLog.writeEvent(EventLogTags.AM_WTF, Binder.getCallingPid(),
|
|
processName,
|
|
r == null ? -1 : r.info.flags,
|
|
tag, crashInfo.exceptionMessage);
|
|
|
|
addErrorToDropBox("wtf", r, processName, null, null, tag, null, null, crashInfo);
|
|
|
|
if (r != null && r.pid != Process.myPid() &&
|
|
Settings.Secure.getInt(mContext.getContentResolver(),
|
|
Settings.Secure.WTF_IS_FATAL, 0) != 0) {
|
|
crashApplication(r, crashInfo);
|
|
return true;
|
|
} else {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @param app object of some object (as stored in {@link com.android.internal.os.RuntimeInit})
|
|
* @return the corresponding {@link ProcessRecord} object, or null if none could be found
|
|
*/
|
|
private ProcessRecord findAppProcess(IBinder app, String reason) {
|
|
if (app == null) {
|
|
return null;
|
|
}
|
|
|
|
synchronized (this) {
|
|
for (SparseArray<ProcessRecord> apps : mProcessNames.getMap().values()) {
|
|
final int NA = apps.size();
|
|
for (int ia=0; ia<NA; ia++) {
|
|
ProcessRecord p = apps.valueAt(ia);
|
|
if (p.thread != null && p.thread.asBinder() == app) {
|
|
return p;
|
|
}
|
|
}
|
|
}
|
|
|
|
Slog.w(TAG, "Can't find mystery application for " + reason
|
|
+ " from pid=" + Binder.getCallingPid()
|
|
+ " uid=" + Binder.getCallingUid() + ": " + app);
|
|
return null;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Utility function for addErrorToDropBox and handleStrictModeViolation's logging
|
|
* to append various headers to the dropbox log text.
|
|
*/
|
|
private void appendDropBoxProcessHeaders(ProcessRecord process, String processName,
|
|
StringBuilder sb) {
|
|
// Watchdog thread ends up invoking this function (with
|
|
// a null ProcessRecord) to add the stack file to dropbox.
|
|
// Do not acquire a lock on this (am) in such cases, as it
|
|
// could cause a potential deadlock, if and when watchdog
|
|
// is invoked due to unavailability of lock on am and it
|
|
// would prevent watchdog from killing system_server.
|
|
if (process == null) {
|
|
sb.append("Process: ").append(processName).append("\n");
|
|
return;
|
|
}
|
|
// Note: ProcessRecord 'process' is guarded by the service
|
|
// instance. (notably process.pkgList, which could otherwise change
|
|
// concurrently during execution of this method)
|
|
synchronized (this) {
|
|
sb.append("Process: ").append(processName).append("\n");
|
|
int flags = process.info.flags;
|
|
IPackageManager pm = AppGlobals.getPackageManager();
|
|
sb.append("Flags: 0x").append(Integer.toString(flags, 16)).append("\n");
|
|
for (String pkg : process.pkgList) {
|
|
sb.append("Package: ").append(pkg);
|
|
try {
|
|
PackageInfo pi = pm.getPackageInfo(pkg, 0, 0);
|
|
if (pi != null) {
|
|
sb.append(" v").append(pi.versionCode);
|
|
if (pi.versionName != null) {
|
|
sb.append(" (").append(pi.versionName).append(")");
|
|
}
|
|
}
|
|
} catch (RemoteException e) {
|
|
Slog.e(TAG, "Error getting package info: " + pkg, e);
|
|
}
|
|
sb.append("\n");
|
|
}
|
|
}
|
|
}
|
|
|
|
private static String processClass(ProcessRecord process) {
|
|
if (process == null || process.pid == MY_PID) {
|
|
return "system_server";
|
|
} else if ((process.info.flags & ApplicationInfo.FLAG_SYSTEM) != 0) {
|
|
return "system_app";
|
|
} else {
|
|
return "data_app";
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Write a description of an error (crash, WTF, ANR) to the drop box.
|
|
* @param eventType to include in the drop box tag ("crash", "wtf", etc.)
|
|
* @param process which caused the error, null means the system server
|
|
* @param activity which triggered the error, null if unknown
|
|
* @param parent activity related to the error, null if unknown
|
|
* @param subject line related to the error, null if absent
|
|
* @param report in long form describing the error, null if absent
|
|
* @param logFile to include in the report, null if none
|
|
* @param crashInfo giving an application stack trace, null if absent
|
|
*/
|
|
public void addErrorToDropBox(String eventType,
|
|
ProcessRecord process, String processName, ActivityRecord activity,
|
|
ActivityRecord parent, String subject,
|
|
final String report, final File logFile,
|
|
final ApplicationErrorReport.CrashInfo crashInfo) {
|
|
// NOTE -- this must never acquire the ActivityManagerService lock,
|
|
// otherwise the watchdog may be prevented from resetting the system.
|
|
|
|
final String dropboxTag = processClass(process) + "_" + eventType;
|
|
final DropBoxManager dbox = (DropBoxManager)
|
|
mContext.getSystemService(Context.DROPBOX_SERVICE);
|
|
|
|
// Exit early if the dropbox isn't configured to accept this report type.
|
|
if (dbox == null || !dbox.isTagEnabled(dropboxTag)) return;
|
|
|
|
final StringBuilder sb = new StringBuilder(1024);
|
|
appendDropBoxProcessHeaders(process, processName, sb);
|
|
if (activity != null) {
|
|
sb.append("Activity: ").append(activity.shortComponentName).append("\n");
|
|
}
|
|
if (parent != null && parent.app != null && parent.app.pid != process.pid) {
|
|
sb.append("Parent-Process: ").append(parent.app.processName).append("\n");
|
|
}
|
|
if (parent != null && parent != activity) {
|
|
sb.append("Parent-Activity: ").append(parent.shortComponentName).append("\n");
|
|
}
|
|
if (subject != null) {
|
|
sb.append("Subject: ").append(subject).append("\n");
|
|
}
|
|
sb.append("Build: ").append(Build.FINGERPRINT).append("\n");
|
|
if (Debug.isDebuggerConnected()) {
|
|
sb.append("Debugger: Connected\n");
|
|
}
|
|
sb.append("\n");
|
|
|
|
// Do the rest in a worker thread to avoid blocking the caller on I/O
|
|
// (After this point, we shouldn't access AMS internal data structures.)
|
|
Thread worker = new Thread("Error dump: " + dropboxTag) {
|
|
@Override
|
|
public void run() {
|
|
if (report != null) {
|
|
sb.append(report);
|
|
}
|
|
if (logFile != null) {
|
|
try {
|
|
sb.append(FileUtils.readTextFile(logFile, 128 * 1024, "\n\n[[TRUNCATED]]"));
|
|
} catch (IOException e) {
|
|
Slog.e(TAG, "Error reading " + logFile, e);
|
|
}
|
|
}
|
|
if (crashInfo != null && crashInfo.stackTrace != null) {
|
|
sb.append(crashInfo.stackTrace);
|
|
}
|
|
|
|
String setting = Settings.Secure.ERROR_LOGCAT_PREFIX + dropboxTag;
|
|
int lines = Settings.Secure.getInt(mContext.getContentResolver(), setting, 0);
|
|
if (lines > 0) {
|
|
sb.append("\n");
|
|
|
|
// Merge several logcat streams, and take the last N lines
|
|
InputStreamReader input = null;
|
|
try {
|
|
java.lang.Process logcat = new ProcessBuilder("/system/bin/logcat",
|
|
"-v", "time", "-b", "events", "-b", "system", "-b", "main",
|
|
"-t", String.valueOf(lines)).redirectErrorStream(true).start();
|
|
|
|
try { logcat.getOutputStream().close(); } catch (IOException e) {}
|
|
try { logcat.getErrorStream().close(); } catch (IOException e) {}
|
|
input = new InputStreamReader(logcat.getInputStream());
|
|
|
|
int num;
|
|
char[] buf = new char[8192];
|
|
while ((num = input.read(buf)) > 0) sb.append(buf, 0, num);
|
|
} catch (IOException e) {
|
|
Slog.e(TAG, "Error running logcat", e);
|
|
} finally {
|
|
if (input != null) try { input.close(); } catch (IOException e) {}
|
|
}
|
|
}
|
|
|
|
dbox.addText(dropboxTag, sb.toString());
|
|
}
|
|
};
|
|
|
|
if (process == null) {
|
|
// If process is null, we are being called from some internal code
|
|
// and may be about to die -- run this synchronously.
|
|
worker.run();
|
|
} else {
|
|
worker.start();
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Bring up the "unexpected error" dialog box for a crashing app.
|
|
* Deal with edge cases (intercepts from instrumented applications,
|
|
* ActivityController, error intent receivers, that sort of thing).
|
|
* @param r the application crashing
|
|
* @param crashInfo describing the failure
|
|
*/
|
|
private void crashApplication(ProcessRecord r, ApplicationErrorReport.CrashInfo crashInfo) {
|
|
long timeMillis = System.currentTimeMillis();
|
|
String shortMsg = crashInfo.exceptionClassName;
|
|
String longMsg = crashInfo.exceptionMessage;
|
|
String stackTrace = crashInfo.stackTrace;
|
|
if (shortMsg != null && longMsg != null) {
|
|
longMsg = shortMsg + ": " + longMsg;
|
|
} else if (shortMsg != null) {
|
|
longMsg = shortMsg;
|
|
}
|
|
|
|
AppErrorResult result = new AppErrorResult();
|
|
synchronized (this) {
|
|
if (mController != null) {
|
|
try {
|
|
String name = r != null ? r.processName : null;
|
|
int pid = r != null ? r.pid : Binder.getCallingPid();
|
|
if (!mController.appCrashed(name, pid,
|
|
shortMsg, longMsg, timeMillis, crashInfo.stackTrace)) {
|
|
Slog.w(TAG, "Force-killing crashed app " + name
|
|
+ " at watcher's request");
|
|
Process.killProcess(pid);
|
|
return;
|
|
}
|
|
} catch (RemoteException e) {
|
|
mController = null;
|
|
}
|
|
}
|
|
|
|
final long origId = Binder.clearCallingIdentity();
|
|
|
|
// If this process is running instrumentation, finish it.
|
|
if (r != null && r.instrumentationClass != null) {
|
|
Slog.w(TAG, "Error in app " + r.processName
|
|
+ " running instrumentation " + r.instrumentationClass + ":");
|
|
if (shortMsg != null) Slog.w(TAG, " " + shortMsg);
|
|
if (longMsg != null) Slog.w(TAG, " " + longMsg);
|
|
Bundle info = new Bundle();
|
|
info.putString("shortMsg", shortMsg);
|
|
info.putString("longMsg", longMsg);
|
|
finishInstrumentationLocked(r, Activity.RESULT_CANCELED, info);
|
|
Binder.restoreCallingIdentity(origId);
|
|
return;
|
|
}
|
|
|
|
// If we can't identify the process or it's already exceeded its crash quota,
|
|
// quit right away without showing a crash dialog.
|
|
if (r == null || !makeAppCrashingLocked(r, shortMsg, longMsg, stackTrace)) {
|
|
Binder.restoreCallingIdentity(origId);
|
|
return;
|
|
}
|
|
|
|
Message msg = Message.obtain();
|
|
msg.what = SHOW_ERROR_MSG;
|
|
HashMap data = new HashMap();
|
|
data.put("result", result);
|
|
data.put("app", r);
|
|
msg.obj = data;
|
|
mHandler.sendMessage(msg);
|
|
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
|
|
int res = result.get();
|
|
|
|
Intent appErrorIntent = null;
|
|
synchronized (this) {
|
|
if (r != null && !r.isolated) {
|
|
// XXX Can't keep track of crash time for isolated processes,
|
|
// since they don't have a persistent identity.
|
|
mProcessCrashTimes.put(r.info.processName, r.uid,
|
|
SystemClock.uptimeMillis());
|
|
}
|
|
if (res == AppErrorDialog.FORCE_QUIT_AND_REPORT) {
|
|
appErrorIntent = createAppErrorIntentLocked(r, timeMillis, crashInfo);
|
|
}
|
|
}
|
|
|
|
if (appErrorIntent != null) {
|
|
try {
|
|
mContext.startActivity(appErrorIntent);
|
|
} catch (ActivityNotFoundException e) {
|
|
Slog.w(TAG, "bug report receiver dissappeared", e);
|
|
}
|
|
}
|
|
}
|
|
|
|
Intent createAppErrorIntentLocked(ProcessRecord r,
|
|
long timeMillis, ApplicationErrorReport.CrashInfo crashInfo) {
|
|
ApplicationErrorReport report = createAppErrorReportLocked(r, timeMillis, crashInfo);
|
|
if (report == null) {
|
|
return null;
|
|
}
|
|
Intent result = new Intent(Intent.ACTION_APP_ERROR);
|
|
result.setComponent(r.errorReportReceiver);
|
|
result.putExtra(Intent.EXTRA_BUG_REPORT, report);
|
|
result.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK);
|
|
return result;
|
|
}
|
|
|
|
private ApplicationErrorReport createAppErrorReportLocked(ProcessRecord r,
|
|
long timeMillis, ApplicationErrorReport.CrashInfo crashInfo) {
|
|
if (r.errorReportReceiver == null) {
|
|
return null;
|
|
}
|
|
|
|
if (!r.crashing && !r.notResponding) {
|
|
return null;
|
|
}
|
|
|
|
ApplicationErrorReport report = new ApplicationErrorReport();
|
|
report.packageName = r.info.packageName;
|
|
report.installerPackageName = r.errorReportReceiver.getPackageName();
|
|
report.processName = r.processName;
|
|
report.time = timeMillis;
|
|
report.systemApp = (r.info.flags & ApplicationInfo.FLAG_SYSTEM) != 0;
|
|
|
|
if (r.crashing) {
|
|
report.type = ApplicationErrorReport.TYPE_CRASH;
|
|
report.crashInfo = crashInfo;
|
|
} else if (r.notResponding) {
|
|
report.type = ApplicationErrorReport.TYPE_ANR;
|
|
report.anrInfo = new ApplicationErrorReport.AnrInfo();
|
|
|
|
report.anrInfo.activity = r.notRespondingReport.tag;
|
|
report.anrInfo.cause = r.notRespondingReport.shortMsg;
|
|
report.anrInfo.info = r.notRespondingReport.longMsg;
|
|
}
|
|
|
|
return report;
|
|
}
|
|
|
|
public List<ActivityManager.ProcessErrorStateInfo> getProcessesInErrorState() {
|
|
enforceNotIsolatedCaller("getProcessesInErrorState");
|
|
// assume our apps are happy - lazy create the list
|
|
List<ActivityManager.ProcessErrorStateInfo> errList = null;
|
|
|
|
final boolean allUsers = ActivityManager.checkUidPermission(
|
|
android.Manifest.permission.INTERACT_ACROSS_USERS_FULL,
|
|
Binder.getCallingUid()) == PackageManager.PERMISSION_GRANTED;
|
|
int userId = UserHandle.getUserId(Binder.getCallingUid());
|
|
|
|
synchronized (this) {
|
|
|
|
// iterate across all processes
|
|
for (int i=mLruProcesses.size()-1; i>=0; i--) {
|
|
ProcessRecord app = mLruProcesses.get(i);
|
|
if (!allUsers && app.userId != userId) {
|
|
continue;
|
|
}
|
|
if ((app.thread != null) && (app.crashing || app.notResponding)) {
|
|
// This one's in trouble, so we'll generate a report for it
|
|
// crashes are higher priority (in case there's a crash *and* an anr)
|
|
ActivityManager.ProcessErrorStateInfo report = null;
|
|
if (app.crashing) {
|
|
report = app.crashingReport;
|
|
} else if (app.notResponding) {
|
|
report = app.notRespondingReport;
|
|
}
|
|
|
|
if (report != null) {
|
|
if (errList == null) {
|
|
errList = new ArrayList<ActivityManager.ProcessErrorStateInfo>(1);
|
|
}
|
|
errList.add(report);
|
|
} else {
|
|
Slog.w(TAG, "Missing app error report, app = " + app.processName +
|
|
" crashing = " + app.crashing +
|
|
" notResponding = " + app.notResponding);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return errList;
|
|
}
|
|
|
|
static int oomAdjToImportance(int adj, ActivityManager.RunningAppProcessInfo currApp) {
|
|
if (adj >= ProcessList.HIDDEN_APP_MIN_ADJ) {
|
|
if (currApp != null) {
|
|
currApp.lru = adj - ProcessList.HIDDEN_APP_MIN_ADJ + 1;
|
|
}
|
|
return ActivityManager.RunningAppProcessInfo.IMPORTANCE_BACKGROUND;
|
|
} else if (adj >= ProcessList.SERVICE_B_ADJ) {
|
|
return ActivityManager.RunningAppProcessInfo.IMPORTANCE_SERVICE;
|
|
} else if (adj >= ProcessList.HOME_APP_ADJ) {
|
|
if (currApp != null) {
|
|
currApp.lru = 0;
|
|
}
|
|
return ActivityManager.RunningAppProcessInfo.IMPORTANCE_BACKGROUND;
|
|
} else if (adj >= ProcessList.SERVICE_ADJ) {
|
|
return ActivityManager.RunningAppProcessInfo.IMPORTANCE_SERVICE;
|
|
} else if (adj >= ProcessList.HEAVY_WEIGHT_APP_ADJ) {
|
|
return ActivityManager.RunningAppProcessInfo.IMPORTANCE_CANT_SAVE_STATE;
|
|
} else if (adj >= ProcessList.PERCEPTIBLE_APP_ADJ) {
|
|
return ActivityManager.RunningAppProcessInfo.IMPORTANCE_PERCEPTIBLE;
|
|
} else if (adj >= ProcessList.VISIBLE_APP_ADJ) {
|
|
return ActivityManager.RunningAppProcessInfo.IMPORTANCE_VISIBLE;
|
|
} else {
|
|
return ActivityManager.RunningAppProcessInfo.IMPORTANCE_FOREGROUND;
|
|
}
|
|
}
|
|
|
|
private void fillInProcMemInfo(ProcessRecord app,
|
|
ActivityManager.RunningAppProcessInfo outInfo) {
|
|
outInfo.pid = app.pid;
|
|
outInfo.uid = app.info.uid;
|
|
if (mHeavyWeightProcess == app) {
|
|
outInfo.flags |= ActivityManager.RunningAppProcessInfo.FLAG_CANT_SAVE_STATE;
|
|
}
|
|
if (app.persistent) {
|
|
outInfo.flags |= ActivityManager.RunningAppProcessInfo.FLAG_PERSISTENT;
|
|
}
|
|
if (app.hasActivities) {
|
|
outInfo.flags |= ActivityManager.RunningAppProcessInfo.FLAG_HAS_ACTIVITIES;
|
|
}
|
|
outInfo.lastTrimLevel = app.trimMemoryLevel;
|
|
int adj = app.curAdj;
|
|
outInfo.importance = oomAdjToImportance(adj, outInfo);
|
|
outInfo.importanceReasonCode = app.adjTypeCode;
|
|
}
|
|
|
|
public List<ActivityManager.RunningAppProcessInfo> getRunningAppProcesses() {
|
|
enforceNotIsolatedCaller("getRunningAppProcesses");
|
|
// Lazy instantiation of list
|
|
List<ActivityManager.RunningAppProcessInfo> runList = null;
|
|
final boolean allUsers = ActivityManager.checkUidPermission(
|
|
android.Manifest.permission.INTERACT_ACROSS_USERS_FULL,
|
|
Binder.getCallingUid()) == PackageManager.PERMISSION_GRANTED;
|
|
int userId = UserHandle.getUserId(Binder.getCallingUid());
|
|
synchronized (this) {
|
|
// Iterate across all processes
|
|
for (int i=mLruProcesses.size()-1; i>=0; i--) {
|
|
ProcessRecord app = mLruProcesses.get(i);
|
|
if (!allUsers && app.userId != userId) {
|
|
continue;
|
|
}
|
|
if ((app.thread != null) && (!app.crashing && !app.notResponding)) {
|
|
// Generate process state info for running application
|
|
ActivityManager.RunningAppProcessInfo currApp =
|
|
new ActivityManager.RunningAppProcessInfo(app.processName,
|
|
app.pid, app.getPackageList());
|
|
fillInProcMemInfo(app, currApp);
|
|
if (app.adjSource instanceof ProcessRecord) {
|
|
currApp.importanceReasonPid = ((ProcessRecord)app.adjSource).pid;
|
|
currApp.importanceReasonImportance = oomAdjToImportance(
|
|
app.adjSourceOom, null);
|
|
} else if (app.adjSource instanceof ActivityRecord) {
|
|
ActivityRecord r = (ActivityRecord)app.adjSource;
|
|
if (r.app != null) currApp.importanceReasonPid = r.app.pid;
|
|
}
|
|
if (app.adjTarget instanceof ComponentName) {
|
|
currApp.importanceReasonComponent = (ComponentName)app.adjTarget;
|
|
}
|
|
//Slog.v(TAG, "Proc " + app.processName + ": imp=" + currApp.importance
|
|
// + " lru=" + currApp.lru);
|
|
if (runList == null) {
|
|
runList = new ArrayList<ActivityManager.RunningAppProcessInfo>();
|
|
}
|
|
runList.add(currApp);
|
|
}
|
|
}
|
|
}
|
|
return runList;
|
|
}
|
|
|
|
public List<ApplicationInfo> getRunningExternalApplications() {
|
|
enforceNotIsolatedCaller("getRunningExternalApplications");
|
|
List<ActivityManager.RunningAppProcessInfo> runningApps = getRunningAppProcesses();
|
|
List<ApplicationInfo> retList = new ArrayList<ApplicationInfo>();
|
|
if (runningApps != null && runningApps.size() > 0) {
|
|
Set<String> extList = new HashSet<String>();
|
|
for (ActivityManager.RunningAppProcessInfo app : runningApps) {
|
|
if (app.pkgList != null) {
|
|
for (String pkg : app.pkgList) {
|
|
extList.add(pkg);
|
|
}
|
|
}
|
|
}
|
|
IPackageManager pm = AppGlobals.getPackageManager();
|
|
for (String pkg : extList) {
|
|
try {
|
|
ApplicationInfo info = pm.getApplicationInfo(pkg, 0, UserHandle.getCallingUserId());
|
|
if ((info.flags & ApplicationInfo.FLAG_EXTERNAL_STORAGE) != 0) {
|
|
retList.add(info);
|
|
}
|
|
} catch (RemoteException e) {
|
|
}
|
|
}
|
|
}
|
|
return retList;
|
|
}
|
|
|
|
@Override
|
|
public void getMyMemoryState(ActivityManager.RunningAppProcessInfo outInfo) {
|
|
enforceNotIsolatedCaller("getMyMemoryState");
|
|
synchronized (this) {
|
|
ProcessRecord proc;
|
|
synchronized (mPidsSelfLocked) {
|
|
proc = mPidsSelfLocked.get(Binder.getCallingPid());
|
|
}
|
|
fillInProcMemInfo(proc, outInfo);
|
|
}
|
|
}
|
|
|
|
@Override
|
|
protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) {
|
|
if (checkCallingPermission(android.Manifest.permission.DUMP)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
pw.println("Permission Denial: can't dump ActivityManager from from pid="
|
|
+ Binder.getCallingPid()
|
|
+ ", uid=" + Binder.getCallingUid()
|
|
+ " without permission "
|
|
+ android.Manifest.permission.DUMP);
|
|
return;
|
|
}
|
|
|
|
boolean dumpAll = false;
|
|
boolean dumpClient = false;
|
|
String dumpPackage = null;
|
|
|
|
int opti = 0;
|
|
while (opti < args.length) {
|
|
String opt = args[opti];
|
|
if (opt == null || opt.length() <= 0 || opt.charAt(0) != '-') {
|
|
break;
|
|
}
|
|
opti++;
|
|
if ("-a".equals(opt)) {
|
|
dumpAll = true;
|
|
} else if ("-c".equals(opt)) {
|
|
dumpClient = true;
|
|
} else if ("-h".equals(opt)) {
|
|
pw.println("Activity manager dump options:");
|
|
pw.println(" [-a] [-c] [-h] [cmd] ...");
|
|
pw.println(" cmd may be one of:");
|
|
pw.println(" a[ctivities]: activity stack state");
|
|
pw.println(" b[roadcasts] [PACKAGE_NAME]: broadcast state");
|
|
pw.println(" i[ntents] [PACKAGE_NAME]: pending intent state");
|
|
pw.println(" p[rocesses] [PACKAGE_NAME]: process state");
|
|
pw.println(" o[om]: out of memory management");
|
|
pw.println(" prov[iders] [COMP_SPEC ...]: content provider state");
|
|
pw.println(" provider [COMP_SPEC]: provider client-side state");
|
|
pw.println(" s[ervices] [COMP_SPEC ...]: service state");
|
|
pw.println(" service [COMP_SPEC]: service client-side state");
|
|
pw.println(" package [PACKAGE_NAME]: all state related to given package");
|
|
pw.println(" all: dump all activities");
|
|
pw.println(" top: dump the top activity");
|
|
pw.println(" cmd may also be a COMP_SPEC to dump activities.");
|
|
pw.println(" COMP_SPEC may be a component name (com.foo/.myApp),");
|
|
pw.println(" a partial substring in a component name, a");
|
|
pw.println(" hex object identifier.");
|
|
pw.println(" -a: include all available server state.");
|
|
pw.println(" -c: include client state.");
|
|
return;
|
|
} else {
|
|
pw.println("Unknown argument: " + opt + "; use -h for help");
|
|
}
|
|
}
|
|
|
|
long origId = Binder.clearCallingIdentity();
|
|
boolean more = false;
|
|
// Is the caller requesting to dump a particular piece of data?
|
|
if (opti < args.length) {
|
|
String cmd = args[opti];
|
|
opti++;
|
|
if ("activities".equals(cmd) || "a".equals(cmd)) {
|
|
synchronized (this) {
|
|
dumpActivitiesLocked(fd, pw, args, opti, true, dumpClient, null);
|
|
}
|
|
} else if ("broadcasts".equals(cmd) || "b".equals(cmd)) {
|
|
String[] newArgs;
|
|
String name;
|
|
if (opti >= args.length) {
|
|
name = null;
|
|
newArgs = EMPTY_STRING_ARRAY;
|
|
} else {
|
|
name = args[opti];
|
|
opti++;
|
|
newArgs = new String[args.length - opti];
|
|
if (args.length > 2) System.arraycopy(args, opti, newArgs, 0,
|
|
args.length - opti);
|
|
}
|
|
synchronized (this) {
|
|
dumpBroadcastsLocked(fd, pw, args, opti, true, name);
|
|
}
|
|
} else if ("intents".equals(cmd) || "i".equals(cmd)) {
|
|
String[] newArgs;
|
|
String name;
|
|
if (opti >= args.length) {
|
|
name = null;
|
|
newArgs = EMPTY_STRING_ARRAY;
|
|
} else {
|
|
name = args[opti];
|
|
opti++;
|
|
newArgs = new String[args.length - opti];
|
|
if (args.length > 2) System.arraycopy(args, opti, newArgs, 0,
|
|
args.length - opti);
|
|
}
|
|
synchronized (this) {
|
|
dumpPendingIntentsLocked(fd, pw, args, opti, true, name);
|
|
}
|
|
} else if ("processes".equals(cmd) || "p".equals(cmd)) {
|
|
String[] newArgs;
|
|
String name;
|
|
if (opti >= args.length) {
|
|
name = null;
|
|
newArgs = EMPTY_STRING_ARRAY;
|
|
} else {
|
|
name = args[opti];
|
|
opti++;
|
|
newArgs = new String[args.length - opti];
|
|
if (args.length > 2) System.arraycopy(args, opti, newArgs, 0,
|
|
args.length - opti);
|
|
}
|
|
synchronized (this) {
|
|
dumpProcessesLocked(fd, pw, args, opti, true, name);
|
|
}
|
|
} else if ("oom".equals(cmd) || "o".equals(cmd)) {
|
|
synchronized (this) {
|
|
dumpOomLocked(fd, pw, args, opti, true);
|
|
}
|
|
} else if ("provider".equals(cmd)) {
|
|
String[] newArgs;
|
|
String name;
|
|
if (opti >= args.length) {
|
|
name = null;
|
|
newArgs = EMPTY_STRING_ARRAY;
|
|
} else {
|
|
name = args[opti];
|
|
opti++;
|
|
newArgs = new String[args.length - opti];
|
|
if (args.length > 2) System.arraycopy(args, opti, newArgs, 0, args.length - opti);
|
|
}
|
|
if (!dumpProvider(fd, pw, name, newArgs, 0, dumpAll)) {
|
|
pw.println("No providers match: " + name);
|
|
pw.println("Use -h for help.");
|
|
}
|
|
} else if ("providers".equals(cmd) || "prov".equals(cmd)) {
|
|
synchronized (this) {
|
|
dumpProvidersLocked(fd, pw, args, opti, true, null);
|
|
}
|
|
} else if ("service".equals(cmd)) {
|
|
String[] newArgs;
|
|
String name;
|
|
if (opti >= args.length) {
|
|
name = null;
|
|
newArgs = EMPTY_STRING_ARRAY;
|
|
} else {
|
|
name = args[opti];
|
|
opti++;
|
|
newArgs = new String[args.length - opti];
|
|
if (args.length > 2) System.arraycopy(args, opti, newArgs, 0,
|
|
args.length - opti);
|
|
}
|
|
if (!mServices.dumpService(fd, pw, name, newArgs, 0, dumpAll)) {
|
|
pw.println("No services match: " + name);
|
|
pw.println("Use -h for help.");
|
|
}
|
|
} else if ("package".equals(cmd)) {
|
|
String[] newArgs;
|
|
if (opti >= args.length) {
|
|
pw.println("package: no package name specified");
|
|
pw.println("Use -h for help.");
|
|
} else {
|
|
dumpPackage = args[opti];
|
|
opti++;
|
|
newArgs = new String[args.length - opti];
|
|
if (args.length > 2) System.arraycopy(args, opti, newArgs, 0,
|
|
args.length - opti);
|
|
args = newArgs;
|
|
opti = 0;
|
|
more = true;
|
|
}
|
|
} else if ("services".equals(cmd) || "s".equals(cmd)) {
|
|
synchronized (this) {
|
|
mServices.dumpServicesLocked(fd, pw, args, opti, true, dumpClient, null);
|
|
}
|
|
} else {
|
|
// Dumping a single activity?
|
|
if (!dumpActivity(fd, pw, cmd, args, opti, dumpAll)) {
|
|
pw.println("Bad activity command, or no activities match: " + cmd);
|
|
pw.println("Use -h for help.");
|
|
}
|
|
}
|
|
if (!more) {
|
|
Binder.restoreCallingIdentity(origId);
|
|
return;
|
|
}
|
|
}
|
|
|
|
// No piece of data specified, dump everything.
|
|
synchronized (this) {
|
|
boolean needSep;
|
|
needSep = dumpPendingIntentsLocked(fd, pw, args, opti, dumpAll, dumpPackage);
|
|
if (needSep) {
|
|
pw.println(" ");
|
|
}
|
|
if (dumpAll) {
|
|
pw.println("-------------------------------------------------------------------------------");
|
|
}
|
|
needSep = dumpBroadcastsLocked(fd, pw, args, opti, dumpAll, dumpPackage);
|
|
if (needSep) {
|
|
pw.println(" ");
|
|
}
|
|
if (dumpAll) {
|
|
pw.println("-------------------------------------------------------------------------------");
|
|
}
|
|
needSep = dumpProvidersLocked(fd, pw, args, opti, dumpAll, dumpPackage);
|
|
if (needSep) {
|
|
pw.println(" ");
|
|
}
|
|
if (dumpAll) {
|
|
pw.println("-------------------------------------------------------------------------------");
|
|
}
|
|
needSep = mServices.dumpServicesLocked(fd, pw, args, opti, dumpAll, dumpClient, dumpPackage);
|
|
if (needSep) {
|
|
pw.println(" ");
|
|
}
|
|
if (dumpAll) {
|
|
pw.println("-------------------------------------------------------------------------------");
|
|
}
|
|
needSep = dumpActivitiesLocked(fd, pw, args, opti, dumpAll, dumpClient, dumpPackage);
|
|
if (needSep) {
|
|
pw.println(" ");
|
|
}
|
|
if (dumpAll) {
|
|
pw.println("-------------------------------------------------------------------------------");
|
|
}
|
|
dumpProcessesLocked(fd, pw, args, opti, dumpAll, dumpPackage);
|
|
}
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
|
|
boolean dumpActivitiesLocked(FileDescriptor fd, PrintWriter pw, String[] args,
|
|
int opti, boolean dumpAll, boolean dumpClient, String dumpPackage) {
|
|
pw.println("ACTIVITY MANAGER ACTIVITIES (dumpsys activity activities)");
|
|
pw.println(" Main stack:");
|
|
dumpHistoryList(fd, pw, mMainStack.mHistory, " ", "Hist", true, !dumpAll, dumpClient,
|
|
dumpPackage);
|
|
pw.println(" ");
|
|
pw.println(" Running activities (most recent first):");
|
|
dumpHistoryList(fd, pw, mMainStack.mLRUActivities, " ", "Run", false, !dumpAll, false,
|
|
dumpPackage);
|
|
if (mMainStack.mWaitingVisibleActivities.size() > 0) {
|
|
pw.println(" ");
|
|
pw.println(" Activities waiting for another to become visible:");
|
|
dumpHistoryList(fd, pw, mMainStack.mWaitingVisibleActivities, " ", "Wait", false,
|
|
!dumpAll, false, dumpPackage);
|
|
}
|
|
if (mMainStack.mStoppingActivities.size() > 0) {
|
|
pw.println(" ");
|
|
pw.println(" Activities waiting to stop:");
|
|
dumpHistoryList(fd, pw, mMainStack.mStoppingActivities, " ", "Stop", false,
|
|
!dumpAll, false, dumpPackage);
|
|
}
|
|
if (mMainStack.mGoingToSleepActivities.size() > 0) {
|
|
pw.println(" ");
|
|
pw.println(" Activities waiting to sleep:");
|
|
dumpHistoryList(fd, pw, mMainStack.mGoingToSleepActivities, " ", "Sleep", false,
|
|
!dumpAll, false, dumpPackage);
|
|
}
|
|
if (mMainStack.mFinishingActivities.size() > 0) {
|
|
pw.println(" ");
|
|
pw.println(" Activities waiting to finish:");
|
|
dumpHistoryList(fd, pw, mMainStack.mFinishingActivities, " ", "Fin", false,
|
|
!dumpAll, false, dumpPackage);
|
|
}
|
|
|
|
pw.println(" ");
|
|
if (mMainStack.mPausingActivity != null) {
|
|
pw.println(" mPausingActivity: " + mMainStack.mPausingActivity);
|
|
}
|
|
pw.println(" mResumedActivity: " + mMainStack.mResumedActivity);
|
|
pw.println(" mFocusedActivity: " + mFocusedActivity);
|
|
if (dumpAll) {
|
|
pw.println(" mLastPausedActivity: " + mMainStack.mLastPausedActivity);
|
|
pw.println(" mSleepTimeout: " + mMainStack.mSleepTimeout);
|
|
pw.println(" mDismissKeyguardOnNextActivity: "
|
|
+ mMainStack.mDismissKeyguardOnNextActivity);
|
|
}
|
|
|
|
if (mRecentTasks.size() > 0) {
|
|
pw.println();
|
|
pw.println(" Recent tasks:");
|
|
|
|
final int N = mRecentTasks.size();
|
|
for (int i=0; i<N; i++) {
|
|
TaskRecord tr = mRecentTasks.get(i);
|
|
if (dumpPackage != null) {
|
|
if (tr.realActivity == null ||
|
|
!dumpPackage.equals(tr.realActivity)) {
|
|
continue;
|
|
}
|
|
}
|
|
pw.print(" * Recent #"); pw.print(i); pw.print(": ");
|
|
pw.println(tr);
|
|
if (dumpAll) {
|
|
mRecentTasks.get(i).dump(pw, " ");
|
|
}
|
|
}
|
|
}
|
|
|
|
if (dumpAll) {
|
|
pw.println(" ");
|
|
pw.println(" mCurTask: " + mCurTask);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
boolean dumpProcessesLocked(FileDescriptor fd, PrintWriter pw, String[] args,
|
|
int opti, boolean dumpAll, String dumpPackage) {
|
|
boolean needSep = false;
|
|
int numPers = 0;
|
|
|
|
pw.println("ACTIVITY MANAGER RUNNING PROCESSES (dumpsys activity processes)");
|
|
|
|
if (dumpAll) {
|
|
for (SparseArray<ProcessRecord> procs : mProcessNames.getMap().values()) {
|
|
final int NA = procs.size();
|
|
for (int ia=0; ia<NA; ia++) {
|
|
ProcessRecord r = procs.valueAt(ia);
|
|
if (dumpPackage != null && !dumpPackage.equals(r.info.packageName)) {
|
|
continue;
|
|
}
|
|
if (!needSep) {
|
|
pw.println(" All known processes:");
|
|
needSep = true;
|
|
}
|
|
pw.print(r.persistent ? " *PERS*" : " *APP*");
|
|
pw.print(" UID "); pw.print(procs.keyAt(ia));
|
|
pw.print(" "); pw.println(r);
|
|
r.dump(pw, " ");
|
|
if (r.persistent) {
|
|
numPers++;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (mIsolatedProcesses.size() > 0) {
|
|
if (needSep) pw.println(" ");
|
|
needSep = true;
|
|
pw.println(" Isolated process list (sorted by uid):");
|
|
for (int i=0; i<mIsolatedProcesses.size(); i++) {
|
|
ProcessRecord r = mIsolatedProcesses.valueAt(i);
|
|
if (dumpPackage != null && !dumpPackage.equals(r.info.packageName)) {
|
|
continue;
|
|
}
|
|
pw.println(String.format("%sIsolated #%2d: %s",
|
|
" ", i, r.toString()));
|
|
}
|
|
}
|
|
|
|
if (mLruProcesses.size() > 0) {
|
|
if (needSep) pw.println(" ");
|
|
needSep = true;
|
|
pw.println(" Process LRU list (sorted by oom_adj):");
|
|
dumpProcessOomList(pw, this, mLruProcesses, " ",
|
|
"Proc", "PERS", false, dumpPackage);
|
|
needSep = true;
|
|
}
|
|
|
|
if (dumpAll) {
|
|
synchronized (mPidsSelfLocked) {
|
|
boolean printed = false;
|
|
for (int i=0; i<mPidsSelfLocked.size(); i++) {
|
|
ProcessRecord r = mPidsSelfLocked.valueAt(i);
|
|
if (dumpPackage != null && !dumpPackage.equals(r.info.packageName)) {
|
|
continue;
|
|
}
|
|
if (!printed) {
|
|
if (needSep) pw.println(" ");
|
|
needSep = true;
|
|
pw.println(" PID mappings:");
|
|
printed = true;
|
|
}
|
|
pw.print(" PID #"); pw.print(mPidsSelfLocked.keyAt(i));
|
|
pw.print(": "); pw.println(mPidsSelfLocked.valueAt(i));
|
|
}
|
|
}
|
|
}
|
|
|
|
if (mForegroundProcesses.size() > 0) {
|
|
synchronized (mPidsSelfLocked) {
|
|
boolean printed = false;
|
|
for (int i=0; i<mForegroundProcesses.size(); i++) {
|
|
ProcessRecord r = mPidsSelfLocked.get(
|
|
mForegroundProcesses.valueAt(i).pid);
|
|
if (dumpPackage != null && (r == null
|
|
|| !dumpPackage.equals(r.info.packageName))) {
|
|
continue;
|
|
}
|
|
if (!printed) {
|
|
if (needSep) pw.println(" ");
|
|
needSep = true;
|
|
pw.println(" Foreground Processes:");
|
|
printed = true;
|
|
}
|
|
pw.print(" PID #"); pw.print(mForegroundProcesses.keyAt(i));
|
|
pw.print(": "); pw.println(mForegroundProcesses.valueAt(i));
|
|
}
|
|
}
|
|
}
|
|
|
|
if (mPersistentStartingProcesses.size() > 0) {
|
|
if (needSep) pw.println(" ");
|
|
needSep = true;
|
|
pw.println(" Persisent processes that are starting:");
|
|
dumpProcessList(pw, this, mPersistentStartingProcesses, " ",
|
|
"Starting Norm", "Restarting PERS", dumpPackage);
|
|
}
|
|
|
|
if (mRemovedProcesses.size() > 0) {
|
|
if (needSep) pw.println(" ");
|
|
needSep = true;
|
|
pw.println(" Processes that are being removed:");
|
|
dumpProcessList(pw, this, mRemovedProcesses, " ",
|
|
"Removed Norm", "Removed PERS", dumpPackage);
|
|
}
|
|
|
|
if (mProcessesOnHold.size() > 0) {
|
|
if (needSep) pw.println(" ");
|
|
needSep = true;
|
|
pw.println(" Processes that are on old until the system is ready:");
|
|
dumpProcessList(pw, this, mProcessesOnHold, " ",
|
|
"OnHold Norm", "OnHold PERS", dumpPackage);
|
|
}
|
|
|
|
needSep = dumpProcessesToGc(fd, pw, args, opti, needSep, dumpAll, dumpPackage);
|
|
|
|
if (mProcessCrashTimes.getMap().size() > 0) {
|
|
boolean printed = false;
|
|
long now = SystemClock.uptimeMillis();
|
|
for (Map.Entry<String, SparseArray<Long>> procs
|
|
: mProcessCrashTimes.getMap().entrySet()) {
|
|
String pname = procs.getKey();
|
|
SparseArray<Long> uids = procs.getValue();
|
|
final int N = uids.size();
|
|
for (int i=0; i<N; i++) {
|
|
int puid = uids.keyAt(i);
|
|
ProcessRecord r = mProcessNames.get(pname, puid);
|
|
if (dumpPackage != null && (r == null
|
|
|| !dumpPackage.equals(r.info.packageName))) {
|
|
continue;
|
|
}
|
|
if (!printed) {
|
|
if (needSep) pw.println(" ");
|
|
needSep = true;
|
|
pw.println(" Time since processes crashed:");
|
|
printed = true;
|
|
}
|
|
pw.print(" Process "); pw.print(pname);
|
|
pw.print(" uid "); pw.print(puid);
|
|
pw.print(": last crashed ");
|
|
TimeUtils.formatDuration(now-uids.valueAt(i), pw);
|
|
pw.println(" ago");
|
|
}
|
|
}
|
|
}
|
|
|
|
if (mBadProcesses.getMap().size() > 0) {
|
|
boolean printed = false;
|
|
for (Map.Entry<String, SparseArray<Long>> procs
|
|
: mBadProcesses.getMap().entrySet()) {
|
|
String pname = procs.getKey();
|
|
SparseArray<Long> uids = procs.getValue();
|
|
final int N = uids.size();
|
|
for (int i=0; i<N; i++) {
|
|
int puid = uids.keyAt(i);
|
|
ProcessRecord r = mProcessNames.get(pname, puid);
|
|
if (dumpPackage != null && (r == null
|
|
|| !dumpPackage.equals(r.info.packageName))) {
|
|
continue;
|
|
}
|
|
if (!printed) {
|
|
if (needSep) pw.println(" ");
|
|
needSep = true;
|
|
pw.println(" Bad processes:");
|
|
}
|
|
pw.print(" Bad process "); pw.print(pname);
|
|
pw.print(" uid "); pw.print(puid);
|
|
pw.print(": crashed at time ");
|
|
pw.println(uids.valueAt(i));
|
|
}
|
|
}
|
|
}
|
|
|
|
pw.println();
|
|
pw.println(" mStartedUsers:");
|
|
for (int i=0; i<mStartedUsers.size(); i++) {
|
|
UserStartedState uss = mStartedUsers.valueAt(i);
|
|
pw.print(" User #"); pw.print(uss.mHandle.getIdentifier());
|
|
pw.println(":");
|
|
uss.dump(" ", pw);
|
|
}
|
|
pw.println(" mHomeProcess: " + mHomeProcess);
|
|
pw.println(" mPreviousProcess: " + mPreviousProcess);
|
|
if (dumpAll) {
|
|
StringBuilder sb = new StringBuilder(128);
|
|
sb.append(" mPreviousProcessVisibleTime: ");
|
|
TimeUtils.formatDuration(mPreviousProcessVisibleTime, sb);
|
|
pw.println(sb);
|
|
}
|
|
if (mHeavyWeightProcess != null) {
|
|
pw.println(" mHeavyWeightProcess: " + mHeavyWeightProcess);
|
|
}
|
|
pw.println(" mConfiguration: " + mConfiguration);
|
|
if (dumpAll) {
|
|
pw.println(" mConfigWillChange: " + mMainStack.mConfigWillChange);
|
|
if (mCompatModePackages.getPackages().size() > 0) {
|
|
boolean printed = false;
|
|
for (Map.Entry<String, Integer> entry
|
|
: mCompatModePackages.getPackages().entrySet()) {
|
|
String pkg = entry.getKey();
|
|
int mode = entry.getValue();
|
|
if (dumpPackage != null && !dumpPackage.equals(pkg)) {
|
|
continue;
|
|
}
|
|
if (!printed) {
|
|
pw.println(" mScreenCompatPackages:");
|
|
printed = true;
|
|
}
|
|
pw.print(" "); pw.print(pkg); pw.print(": ");
|
|
pw.print(mode); pw.println();
|
|
}
|
|
}
|
|
}
|
|
if (mSleeping || mWentToSleep || mLockScreenShown) {
|
|
pw.println(" mSleeping=" + mSleeping + " mWentToSleep=" + mWentToSleep
|
|
+ " mLockScreenShown " + mLockScreenShown);
|
|
}
|
|
if (mShuttingDown) {
|
|
pw.println(" mShuttingDown=" + mShuttingDown);
|
|
}
|
|
if (mDebugApp != null || mOrigDebugApp != null || mDebugTransient
|
|
|| mOrigWaitForDebugger) {
|
|
pw.println(" mDebugApp=" + mDebugApp + "/orig=" + mOrigDebugApp
|
|
+ " mDebugTransient=" + mDebugTransient
|
|
+ " mOrigWaitForDebugger=" + mOrigWaitForDebugger);
|
|
}
|
|
if (mOpenGlTraceApp != null) {
|
|
pw.println(" mOpenGlTraceApp=" + mOpenGlTraceApp);
|
|
}
|
|
if (mProfileApp != null || mProfileProc != null || mProfileFile != null
|
|
|| mProfileFd != null) {
|
|
pw.println(" mProfileApp=" + mProfileApp + " mProfileProc=" + mProfileProc);
|
|
pw.println(" mProfileFile=" + mProfileFile + " mProfileFd=" + mProfileFd);
|
|
pw.println(" mProfileType=" + mProfileType + " mAutoStopProfiler="
|
|
+ mAutoStopProfiler);
|
|
}
|
|
if (mAlwaysFinishActivities || mController != null) {
|
|
pw.println(" mAlwaysFinishActivities=" + mAlwaysFinishActivities
|
|
+ " mController=" + mController);
|
|
}
|
|
if (dumpAll) {
|
|
pw.println(" Total persistent processes: " + numPers);
|
|
pw.println(" mStartRunning=" + mStartRunning
|
|
+ " mProcessesReady=" + mProcessesReady
|
|
+ " mSystemReady=" + mSystemReady);
|
|
pw.println(" mBooting=" + mBooting
|
|
+ " mBooted=" + mBooted
|
|
+ " mFactoryTest=" + mFactoryTest);
|
|
pw.print(" mLastPowerCheckRealtime=");
|
|
TimeUtils.formatDuration(mLastPowerCheckRealtime, pw);
|
|
pw.println("");
|
|
pw.print(" mLastPowerCheckUptime=");
|
|
TimeUtils.formatDuration(mLastPowerCheckUptime, pw);
|
|
pw.println("");
|
|
pw.println(" mGoingToSleep=" + mMainStack.mGoingToSleep);
|
|
pw.println(" mLaunchingActivity=" + mMainStack.mLaunchingActivity);
|
|
pw.println(" mAdjSeq=" + mAdjSeq + " mLruSeq=" + mLruSeq);
|
|
pw.println(" mNumNonHiddenProcs=" + mNumNonHiddenProcs
|
|
+ " mNumHiddenProcs=" + mNumHiddenProcs
|
|
+ " mNumServiceProcs=" + mNumServiceProcs
|
|
+ " mNewNumServiceProcs=" + mNewNumServiceProcs);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
boolean dumpProcessesToGc(FileDescriptor fd, PrintWriter pw, String[] args,
|
|
int opti, boolean needSep, boolean dumpAll, String dumpPackage) {
|
|
if (mProcessesToGc.size() > 0) {
|
|
boolean printed = false;
|
|
long now = SystemClock.uptimeMillis();
|
|
for (int i=0; i<mProcessesToGc.size(); i++) {
|
|
ProcessRecord proc = mProcessesToGc.get(i);
|
|
if (dumpPackage != null && !dumpPackage.equals(proc.info.packageName)) {
|
|
continue;
|
|
}
|
|
if (!printed) {
|
|
if (needSep) pw.println(" ");
|
|
needSep = true;
|
|
pw.println(" Processes that are waiting to GC:");
|
|
printed = true;
|
|
}
|
|
pw.print(" Process "); pw.println(proc);
|
|
pw.print(" lowMem="); pw.print(proc.reportLowMemory);
|
|
pw.print(", last gced=");
|
|
pw.print(now-proc.lastRequestedGc);
|
|
pw.print(" ms ago, last lowMem=");
|
|
pw.print(now-proc.lastLowMemory);
|
|
pw.println(" ms ago");
|
|
|
|
}
|
|
}
|
|
return needSep;
|
|
}
|
|
|
|
boolean dumpOomLocked(FileDescriptor fd, PrintWriter pw, String[] args,
|
|
int opti, boolean dumpAll) {
|
|
boolean needSep = false;
|
|
|
|
if (mLruProcesses.size() > 0) {
|
|
if (needSep) pw.println(" ");
|
|
needSep = true;
|
|
pw.println(" OOM levels:");
|
|
pw.print(" SYSTEM_ADJ: "); pw.println(ProcessList.SYSTEM_ADJ);
|
|
pw.print(" PERSISTENT_PROC_ADJ: "); pw.println(ProcessList.PERSISTENT_PROC_ADJ);
|
|
pw.print(" FOREGROUND_APP_ADJ: "); pw.println(ProcessList.FOREGROUND_APP_ADJ);
|
|
pw.print(" VISIBLE_APP_ADJ: "); pw.println(ProcessList.VISIBLE_APP_ADJ);
|
|
pw.print(" PERCEPTIBLE_APP_ADJ: "); pw.println(ProcessList.PERCEPTIBLE_APP_ADJ);
|
|
pw.print(" HEAVY_WEIGHT_APP_ADJ: "); pw.println(ProcessList.HEAVY_WEIGHT_APP_ADJ);
|
|
pw.print(" BACKUP_APP_ADJ: "); pw.println(ProcessList.BACKUP_APP_ADJ);
|
|
pw.print(" SERVICE_ADJ: "); pw.println(ProcessList.SERVICE_ADJ);
|
|
pw.print(" HOME_APP_ADJ: "); pw.println(ProcessList.HOME_APP_ADJ);
|
|
pw.print(" PREVIOUS_APP_ADJ: "); pw.println(ProcessList.PREVIOUS_APP_ADJ);
|
|
pw.print(" SERVICE_B_ADJ: "); pw.println(ProcessList.SERVICE_B_ADJ);
|
|
pw.print(" HIDDEN_APP_MIN_ADJ: "); pw.println(ProcessList.HIDDEN_APP_MIN_ADJ);
|
|
pw.print(" HIDDEN_APP_MAX_ADJ: "); pw.println(ProcessList.HIDDEN_APP_MAX_ADJ);
|
|
|
|
if (needSep) pw.println(" ");
|
|
needSep = true;
|
|
pw.println(" Process OOM control:");
|
|
dumpProcessOomList(pw, this, mLruProcesses, " ",
|
|
"Proc", "PERS", true, null);
|
|
needSep = true;
|
|
}
|
|
|
|
needSep = dumpProcessesToGc(fd, pw, args, opti, needSep, dumpAll, null);
|
|
|
|
pw.println();
|
|
pw.println(" mHomeProcess: " + mHomeProcess);
|
|
pw.println(" mPreviousProcess: " + mPreviousProcess);
|
|
if (mHeavyWeightProcess != null) {
|
|
pw.println(" mHeavyWeightProcess: " + mHeavyWeightProcess);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* There are three ways to call this:
|
|
* - no provider specified: dump all the providers
|
|
* - a flattened component name that matched an existing provider was specified as the
|
|
* first arg: dump that one provider
|
|
* - the first arg isn't the flattened component name of an existing provider:
|
|
* dump all providers whose component contains the first arg as a substring
|
|
*/
|
|
protected boolean dumpProvider(FileDescriptor fd, PrintWriter pw, String name, String[] args,
|
|
int opti, boolean dumpAll) {
|
|
return mProviderMap.dumpProvider(fd, pw, name, args, opti, dumpAll);
|
|
}
|
|
|
|
static class ItemMatcher {
|
|
ArrayList<ComponentName> components;
|
|
ArrayList<String> strings;
|
|
ArrayList<Integer> objects;
|
|
boolean all;
|
|
|
|
ItemMatcher() {
|
|
all = true;
|
|
}
|
|
|
|
void build(String name) {
|
|
ComponentName componentName = ComponentName.unflattenFromString(name);
|
|
if (componentName != null) {
|
|
if (components == null) {
|
|
components = new ArrayList<ComponentName>();
|
|
}
|
|
components.add(componentName);
|
|
all = false;
|
|
} else {
|
|
int objectId = 0;
|
|
// Not a '/' separated full component name; maybe an object ID?
|
|
try {
|
|
objectId = Integer.parseInt(name, 16);
|
|
if (objects == null) {
|
|
objects = new ArrayList<Integer>();
|
|
}
|
|
objects.add(objectId);
|
|
all = false;
|
|
} catch (RuntimeException e) {
|
|
// Not an integer; just do string match.
|
|
if (strings == null) {
|
|
strings = new ArrayList<String>();
|
|
}
|
|
strings.add(name);
|
|
all = false;
|
|
}
|
|
}
|
|
}
|
|
|
|
int build(String[] args, int opti) {
|
|
for (; opti<args.length; opti++) {
|
|
String name = args[opti];
|
|
if ("--".equals(name)) {
|
|
return opti+1;
|
|
}
|
|
build(name);
|
|
}
|
|
return opti;
|
|
}
|
|
|
|
boolean match(Object object, ComponentName comp) {
|
|
if (all) {
|
|
return true;
|
|
}
|
|
if (components != null) {
|
|
for (int i=0; i<components.size(); i++) {
|
|
if (components.get(i).equals(comp)) {
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
if (objects != null) {
|
|
for (int i=0; i<objects.size(); i++) {
|
|
if (System.identityHashCode(object) == objects.get(i)) {
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
if (strings != null) {
|
|
String flat = comp.flattenToString();
|
|
for (int i=0; i<strings.size(); i++) {
|
|
if (flat.contains(strings.get(i))) {
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* There are three things that cmd can be:
|
|
* - a flattened component name that matches an existing activity
|
|
* - the cmd arg isn't the flattened component name of an existing activity:
|
|
* dump all activity whose component contains the cmd as a substring
|
|
* - A hex number of the ActivityRecord object instance.
|
|
*/
|
|
protected boolean dumpActivity(FileDescriptor fd, PrintWriter pw, String name, String[] args,
|
|
int opti, boolean dumpAll) {
|
|
ArrayList<ActivityRecord> activities = new ArrayList<ActivityRecord>();
|
|
|
|
if ("all".equals(name)) {
|
|
synchronized (this) {
|
|
for (ActivityRecord r1 : (ArrayList<ActivityRecord>)mMainStack.mHistory) {
|
|
activities.add(r1);
|
|
}
|
|
}
|
|
} else if ("top".equals(name)) {
|
|
synchronized (this) {
|
|
final int N = mMainStack.mHistory.size();
|
|
if (N > 0) {
|
|
activities.add((ActivityRecord)mMainStack.mHistory.get(N-1));
|
|
}
|
|
}
|
|
} else {
|
|
ItemMatcher matcher = new ItemMatcher();
|
|
matcher.build(name);
|
|
|
|
synchronized (this) {
|
|
for (ActivityRecord r1 : (ArrayList<ActivityRecord>)mMainStack.mHistory) {
|
|
if (matcher.match(r1, r1.intent.getComponent())) {
|
|
activities.add(r1);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (activities.size() <= 0) {
|
|
return false;
|
|
}
|
|
|
|
String[] newArgs = new String[args.length - opti];
|
|
if (args.length > 2) System.arraycopy(args, opti, newArgs, 0, args.length - opti);
|
|
|
|
TaskRecord lastTask = null;
|
|
boolean needSep = false;
|
|
for (int i=activities.size()-1; i>=0; i--) {
|
|
ActivityRecord r = (ActivityRecord)activities.get(i);
|
|
if (needSep) {
|
|
pw.println();
|
|
}
|
|
needSep = true;
|
|
synchronized (this) {
|
|
if (lastTask != r.task) {
|
|
lastTask = r.task;
|
|
pw.print("TASK "); pw.print(lastTask.affinity);
|
|
pw.print(" id="); pw.println(lastTask.taskId);
|
|
if (dumpAll) {
|
|
lastTask.dump(pw, " ");
|
|
}
|
|
}
|
|
}
|
|
dumpActivity(" ", fd, pw, activities.get(i), newArgs, dumpAll);
|
|
}
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* Invokes IApplicationThread.dumpActivity() on the thread of the specified activity if
|
|
* there is a thread associated with the activity.
|
|
*/
|
|
private void dumpActivity(String prefix, FileDescriptor fd, PrintWriter pw,
|
|
final ActivityRecord r, String[] args, boolean dumpAll) {
|
|
String innerPrefix = prefix + " ";
|
|
synchronized (this) {
|
|
pw.print(prefix); pw.print("ACTIVITY "); pw.print(r.shortComponentName);
|
|
pw.print(" "); pw.print(Integer.toHexString(System.identityHashCode(r)));
|
|
pw.print(" pid=");
|
|
if (r.app != null) pw.println(r.app.pid);
|
|
else pw.println("(not running)");
|
|
if (dumpAll) {
|
|
r.dump(pw, innerPrefix);
|
|
}
|
|
}
|
|
if (r.app != null && r.app.thread != null) {
|
|
// flush anything that is already in the PrintWriter since the thread is going
|
|
// to write to the file descriptor directly
|
|
pw.flush();
|
|
try {
|
|
TransferPipe tp = new TransferPipe();
|
|
try {
|
|
r.app.thread.dumpActivity(tp.getWriteFd().getFileDescriptor(),
|
|
r.appToken, innerPrefix, args);
|
|
tp.go(fd);
|
|
} finally {
|
|
tp.kill();
|
|
}
|
|
} catch (IOException e) {
|
|
pw.println(innerPrefix + "Failure while dumping the activity: " + e);
|
|
} catch (RemoteException e) {
|
|
pw.println(innerPrefix + "Got a RemoteException while dumping the activity");
|
|
}
|
|
}
|
|
}
|
|
|
|
boolean dumpBroadcastsLocked(FileDescriptor fd, PrintWriter pw, String[] args,
|
|
int opti, boolean dumpAll, String dumpPackage) {
|
|
boolean needSep = false;
|
|
boolean onlyHistory = false;
|
|
|
|
if ("history".equals(dumpPackage)) {
|
|
onlyHistory = true;
|
|
dumpPackage = null;
|
|
}
|
|
|
|
pw.println("ACTIVITY MANAGER BROADCAST STATE (dumpsys activity broadcasts)");
|
|
if (!onlyHistory && dumpAll) {
|
|
if (mRegisteredReceivers.size() > 0) {
|
|
boolean printed = false;
|
|
Iterator it = mRegisteredReceivers.values().iterator();
|
|
while (it.hasNext()) {
|
|
ReceiverList r = (ReceiverList)it.next();
|
|
if (dumpPackage != null && (r.app == null ||
|
|
!dumpPackage.equals(r.app.info.packageName))) {
|
|
continue;
|
|
}
|
|
if (!printed) {
|
|
pw.println(" Registered Receivers:");
|
|
needSep = true;
|
|
printed = true;
|
|
}
|
|
pw.print(" * "); pw.println(r);
|
|
r.dump(pw, " ");
|
|
}
|
|
}
|
|
|
|
if (mReceiverResolver.dump(pw, needSep ?
|
|
"\n Receiver Resolver Table:" : " Receiver Resolver Table:",
|
|
" ", dumpPackage, false)) {
|
|
needSep = true;
|
|
}
|
|
}
|
|
|
|
for (BroadcastQueue q : mBroadcastQueues) {
|
|
needSep = q.dumpLocked(fd, pw, args, opti, dumpAll, dumpPackage, needSep);
|
|
}
|
|
|
|
needSep = true;
|
|
|
|
if (!onlyHistory && mStickyBroadcasts != null && dumpPackage == null) {
|
|
if (needSep) {
|
|
pw.println();
|
|
}
|
|
needSep = true;
|
|
pw.println(" Sticky broadcasts:");
|
|
StringBuilder sb = new StringBuilder(128);
|
|
for (Map.Entry<String, ArrayList<Intent>> ent
|
|
: mStickyBroadcasts.entrySet()) {
|
|
pw.print(" * Sticky action "); pw.print(ent.getKey());
|
|
if (dumpAll) {
|
|
pw.println(":");
|
|
ArrayList<Intent> intents = ent.getValue();
|
|
final int N = intents.size();
|
|
for (int i=0; i<N; i++) {
|
|
sb.setLength(0);
|
|
sb.append(" Intent: ");
|
|
intents.get(i).toShortString(sb, false, true, false, false);
|
|
pw.println(sb.toString());
|
|
Bundle bundle = intents.get(i).getExtras();
|
|
if (bundle != null) {
|
|
pw.print(" ");
|
|
pw.println(bundle.toString());
|
|
}
|
|
}
|
|
} else {
|
|
pw.println("");
|
|
}
|
|
}
|
|
needSep = true;
|
|
}
|
|
|
|
if (!onlyHistory && dumpAll) {
|
|
pw.println();
|
|
for (BroadcastQueue queue : mBroadcastQueues) {
|
|
pw.println(" mBroadcastsScheduled [" + queue.mQueueName + "]="
|
|
+ queue.mBroadcastsScheduled);
|
|
}
|
|
pw.println(" mHandler:");
|
|
mHandler.dump(new PrintWriterPrinter(pw), " ");
|
|
needSep = true;
|
|
}
|
|
|
|
return needSep;
|
|
}
|
|
|
|
boolean dumpProvidersLocked(FileDescriptor fd, PrintWriter pw, String[] args,
|
|
int opti, boolean dumpAll, String dumpPackage) {
|
|
boolean needSep = true;
|
|
|
|
ItemMatcher matcher = new ItemMatcher();
|
|
matcher.build(args, opti);
|
|
|
|
pw.println("ACTIVITY MANAGER CONTENT PROVIDERS (dumpsys activity providers)");
|
|
|
|
mProviderMap.dumpProvidersLocked(pw, dumpAll);
|
|
|
|
if (mLaunchingProviders.size() > 0) {
|
|
boolean printed = false;
|
|
for (int i=mLaunchingProviders.size()-1; i>=0; i--) {
|
|
ContentProviderRecord r = mLaunchingProviders.get(i);
|
|
if (dumpPackage != null && !dumpPackage.equals(r.name.getPackageName())) {
|
|
continue;
|
|
}
|
|
if (!printed) {
|
|
if (needSep) pw.println(" ");
|
|
needSep = true;
|
|
pw.println(" Launching content providers:");
|
|
printed = true;
|
|
}
|
|
pw.print(" Launching #"); pw.print(i); pw.print(": ");
|
|
pw.println(r);
|
|
}
|
|
}
|
|
|
|
if (mGrantedUriPermissions.size() > 0) {
|
|
if (needSep) pw.println();
|
|
needSep = true;
|
|
pw.println("Granted Uri Permissions:");
|
|
for (int i=0; i<mGrantedUriPermissions.size(); i++) {
|
|
int uid = mGrantedUriPermissions.keyAt(i);
|
|
HashMap<Uri, UriPermission> perms
|
|
= mGrantedUriPermissions.valueAt(i);
|
|
pw.print(" * UID "); pw.print(uid);
|
|
pw.println(" holds:");
|
|
for (UriPermission perm : perms.values()) {
|
|
pw.print(" "); pw.println(perm);
|
|
if (dumpAll) {
|
|
perm.dump(pw, " ");
|
|
}
|
|
}
|
|
}
|
|
needSep = true;
|
|
}
|
|
|
|
return needSep;
|
|
}
|
|
|
|
boolean dumpPendingIntentsLocked(FileDescriptor fd, PrintWriter pw, String[] args,
|
|
int opti, boolean dumpAll, String dumpPackage) {
|
|
boolean needSep = false;
|
|
|
|
if (mIntentSenderRecords.size() > 0) {
|
|
boolean printed = false;
|
|
Iterator<WeakReference<PendingIntentRecord>> it
|
|
= mIntentSenderRecords.values().iterator();
|
|
while (it.hasNext()) {
|
|
WeakReference<PendingIntentRecord> ref = it.next();
|
|
PendingIntentRecord rec = ref != null ? ref.get(): null;
|
|
if (dumpPackage != null && (rec == null
|
|
|| !dumpPackage.equals(rec.key.packageName))) {
|
|
continue;
|
|
}
|
|
if (!printed) {
|
|
pw.println("ACTIVITY MANAGER PENDING INTENTS (dumpsys activity intents)");
|
|
printed = true;
|
|
}
|
|
needSep = true;
|
|
if (rec != null) {
|
|
pw.print(" * "); pw.println(rec);
|
|
if (dumpAll) {
|
|
rec.dump(pw, " ");
|
|
}
|
|
} else {
|
|
pw.print(" * "); pw.println(ref);
|
|
}
|
|
}
|
|
}
|
|
|
|
return needSep;
|
|
}
|
|
|
|
private static final void dumpHistoryList(FileDescriptor fd, PrintWriter pw, List list,
|
|
String prefix, String label, boolean complete, boolean brief, boolean client,
|
|
String dumpPackage) {
|
|
TaskRecord lastTask = null;
|
|
boolean needNL = false;
|
|
final String innerPrefix = prefix + " ";
|
|
final String[] args = new String[0];
|
|
for (int i=list.size()-1; i>=0; i--) {
|
|
final ActivityRecord r = (ActivityRecord)list.get(i);
|
|
if (dumpPackage != null && !dumpPackage.equals(r.packageName)) {
|
|
continue;
|
|
}
|
|
final boolean full = !brief && (complete || !r.isInHistory());
|
|
if (needNL) {
|
|
pw.println(" ");
|
|
needNL = false;
|
|
}
|
|
if (lastTask != r.task) {
|
|
lastTask = r.task;
|
|
pw.print(prefix);
|
|
pw.print(full ? "* " : " ");
|
|
pw.println(lastTask);
|
|
if (full) {
|
|
lastTask.dump(pw, prefix + " ");
|
|
} else if (complete) {
|
|
// Complete + brief == give a summary. Isn't that obvious?!?
|
|
if (lastTask.intent != null) {
|
|
pw.print(prefix); pw.print(" ");
|
|
pw.println(lastTask.intent.toInsecureStringWithClip());
|
|
}
|
|
}
|
|
}
|
|
pw.print(prefix); pw.print(full ? " * " : " "); pw.print(label);
|
|
pw.print(" #"); pw.print(i); pw.print(": ");
|
|
pw.println(r);
|
|
if (full) {
|
|
r.dump(pw, innerPrefix);
|
|
} else if (complete) {
|
|
// Complete + brief == give a summary. Isn't that obvious?!?
|
|
pw.print(innerPrefix); pw.println(r.intent.toInsecureString());
|
|
if (r.app != null) {
|
|
pw.print(innerPrefix); pw.println(r.app);
|
|
}
|
|
}
|
|
if (client && r.app != null && r.app.thread != null) {
|
|
// flush anything that is already in the PrintWriter since the thread is going
|
|
// to write to the file descriptor directly
|
|
pw.flush();
|
|
try {
|
|
TransferPipe tp = new TransferPipe();
|
|
try {
|
|
r.app.thread.dumpActivity(tp.getWriteFd().getFileDescriptor(),
|
|
r.appToken, innerPrefix, args);
|
|
// Short timeout, since blocking here can
|
|
// deadlock with the application.
|
|
tp.go(fd, 2000);
|
|
} finally {
|
|
tp.kill();
|
|
}
|
|
} catch (IOException e) {
|
|
pw.println(innerPrefix + "Failure while dumping the activity: " + e);
|
|
} catch (RemoteException e) {
|
|
pw.println(innerPrefix + "Got a RemoteException while dumping the activity");
|
|
}
|
|
needNL = true;
|
|
}
|
|
}
|
|
}
|
|
|
|
private static String buildOomTag(String prefix, String space, int val, int base) {
|
|
if (val == base) {
|
|
if (space == null) return prefix;
|
|
return prefix + " ";
|
|
}
|
|
return prefix + "+" + Integer.toString(val-base);
|
|
}
|
|
|
|
private static final int dumpProcessList(PrintWriter pw,
|
|
ActivityManagerService service, List list,
|
|
String prefix, String normalLabel, String persistentLabel,
|
|
String dumpPackage) {
|
|
int numPers = 0;
|
|
final int N = list.size()-1;
|
|
for (int i=N; i>=0; i--) {
|
|
ProcessRecord r = (ProcessRecord)list.get(i);
|
|
if (dumpPackage != null && !dumpPackage.equals(r.info.packageName)) {
|
|
continue;
|
|
}
|
|
pw.println(String.format("%s%s #%2d: %s",
|
|
prefix, (r.persistent ? persistentLabel : normalLabel),
|
|
i, r.toString()));
|
|
if (r.persistent) {
|
|
numPers++;
|
|
}
|
|
}
|
|
return numPers;
|
|
}
|
|
|
|
private static final boolean dumpProcessOomList(PrintWriter pw,
|
|
ActivityManagerService service, List<ProcessRecord> origList,
|
|
String prefix, String normalLabel, String persistentLabel,
|
|
boolean inclDetails, String dumpPackage) {
|
|
|
|
ArrayList<Pair<ProcessRecord, Integer>> list
|
|
= new ArrayList<Pair<ProcessRecord, Integer>>(origList.size());
|
|
for (int i=0; i<origList.size(); i++) {
|
|
ProcessRecord r = origList.get(i);
|
|
if (dumpPackage != null && !dumpPackage.equals(r.info.packageName)) {
|
|
continue;
|
|
}
|
|
list.add(new Pair<ProcessRecord, Integer>(origList.get(i), i));
|
|
}
|
|
|
|
if (list.size() <= 0) {
|
|
return false;
|
|
}
|
|
|
|
Comparator<Pair<ProcessRecord, Integer>> comparator
|
|
= new Comparator<Pair<ProcessRecord, Integer>>() {
|
|
@Override
|
|
public int compare(Pair<ProcessRecord, Integer> object1,
|
|
Pair<ProcessRecord, Integer> object2) {
|
|
if (object1.first.setAdj != object2.first.setAdj) {
|
|
return object1.first.setAdj > object2.first.setAdj ? -1 : 1;
|
|
}
|
|
if (object1.second.intValue() != object2.second.intValue()) {
|
|
return object1.second.intValue() > object2.second.intValue() ? -1 : 1;
|
|
}
|
|
return 0;
|
|
}
|
|
};
|
|
|
|
Collections.sort(list, comparator);
|
|
|
|
final long curRealtime = SystemClock.elapsedRealtime();
|
|
final long realtimeSince = curRealtime - service.mLastPowerCheckRealtime;
|
|
final long curUptime = SystemClock.uptimeMillis();
|
|
final long uptimeSince = curUptime - service.mLastPowerCheckUptime;
|
|
|
|
for (int i=list.size()-1; i>=0; i--) {
|
|
ProcessRecord r = list.get(i).first;
|
|
String oomAdj;
|
|
if (r.setAdj >= ProcessList.HIDDEN_APP_MIN_ADJ) {
|
|
oomAdj = buildOomTag("bak", " ", r.setAdj, ProcessList.HIDDEN_APP_MIN_ADJ);
|
|
} else if (r.setAdj >= ProcessList.SERVICE_B_ADJ) {
|
|
oomAdj = buildOomTag("svcb ", null, r.setAdj, ProcessList.SERVICE_B_ADJ);
|
|
} else if (r.setAdj >= ProcessList.PREVIOUS_APP_ADJ) {
|
|
oomAdj = buildOomTag("prev ", null, r.setAdj, ProcessList.PREVIOUS_APP_ADJ);
|
|
} else if (r.setAdj >= ProcessList.HOME_APP_ADJ) {
|
|
oomAdj = buildOomTag("home ", null, r.setAdj, ProcessList.HOME_APP_ADJ);
|
|
} else if (r.setAdj >= ProcessList.SERVICE_ADJ) {
|
|
oomAdj = buildOomTag("svc ", null, r.setAdj, ProcessList.SERVICE_ADJ);
|
|
} else if (r.setAdj >= ProcessList.BACKUP_APP_ADJ) {
|
|
oomAdj = buildOomTag("bkup ", null, r.setAdj, ProcessList.BACKUP_APP_ADJ);
|
|
} else if (r.setAdj >= ProcessList.HEAVY_WEIGHT_APP_ADJ) {
|
|
oomAdj = buildOomTag("hvy ", null, r.setAdj, ProcessList.HEAVY_WEIGHT_APP_ADJ);
|
|
} else if (r.setAdj >= ProcessList.PERCEPTIBLE_APP_ADJ) {
|
|
oomAdj = buildOomTag("prcp ", null, r.setAdj, ProcessList.PERCEPTIBLE_APP_ADJ);
|
|
} else if (r.setAdj >= ProcessList.VISIBLE_APP_ADJ) {
|
|
oomAdj = buildOomTag("vis ", null, r.setAdj, ProcessList.VISIBLE_APP_ADJ);
|
|
} else if (r.setAdj >= ProcessList.FOREGROUND_APP_ADJ) {
|
|
oomAdj = buildOomTag("fore ", null, r.setAdj, ProcessList.FOREGROUND_APP_ADJ);
|
|
} else if (r.setAdj >= ProcessList.PERSISTENT_PROC_ADJ) {
|
|
oomAdj = buildOomTag("pers ", null, r.setAdj, ProcessList.PERSISTENT_PROC_ADJ);
|
|
} else if (r.setAdj >= ProcessList.SYSTEM_ADJ) {
|
|
oomAdj = buildOomTag("sys ", null, r.setAdj, ProcessList.SYSTEM_ADJ);
|
|
} else {
|
|
oomAdj = Integer.toString(r.setAdj);
|
|
}
|
|
String schedGroup;
|
|
switch (r.setSchedGroup) {
|
|
case Process.THREAD_GROUP_BG_NONINTERACTIVE:
|
|
schedGroup = "B";
|
|
break;
|
|
case Process.THREAD_GROUP_DEFAULT:
|
|
schedGroup = "F";
|
|
break;
|
|
default:
|
|
schedGroup = Integer.toString(r.setSchedGroup);
|
|
break;
|
|
}
|
|
String foreground;
|
|
if (r.foregroundActivities) {
|
|
foreground = "A";
|
|
} else if (r.foregroundServices) {
|
|
foreground = "S";
|
|
} else {
|
|
foreground = " ";
|
|
}
|
|
pw.println(String.format("%s%s #%2d: adj=%s/%s%s trm=%2d %s (%s)",
|
|
prefix, (r.persistent ? persistentLabel : normalLabel),
|
|
(origList.size()-1)-list.get(i).second, oomAdj, schedGroup,
|
|
foreground, r.trimMemoryLevel, r.toShortString(), r.adjType));
|
|
if (r.adjSource != null || r.adjTarget != null) {
|
|
pw.print(prefix);
|
|
pw.print(" ");
|
|
if (r.adjTarget instanceof ComponentName) {
|
|
pw.print(((ComponentName)r.adjTarget).flattenToShortString());
|
|
} else if (r.adjTarget != null) {
|
|
pw.print(r.adjTarget.toString());
|
|
} else {
|
|
pw.print("{null}");
|
|
}
|
|
pw.print("<=");
|
|
if (r.adjSource instanceof ProcessRecord) {
|
|
pw.print("Proc{");
|
|
pw.print(((ProcessRecord)r.adjSource).toShortString());
|
|
pw.println("}");
|
|
} else if (r.adjSource != null) {
|
|
pw.println(r.adjSource.toString());
|
|
} else {
|
|
pw.println("{null}");
|
|
}
|
|
}
|
|
if (inclDetails) {
|
|
pw.print(prefix);
|
|
pw.print(" ");
|
|
pw.print("oom: max="); pw.print(r.maxAdj);
|
|
pw.print(" hidden="); pw.print(r.hiddenAdj);
|
|
pw.print(" empty="); pw.print(r.emptyAdj);
|
|
pw.print(" curRaw="); pw.print(r.curRawAdj);
|
|
pw.print(" setRaw="); pw.print(r.setRawAdj);
|
|
pw.print(" cur="); pw.print(r.curAdj);
|
|
pw.print(" set="); pw.println(r.setAdj);
|
|
pw.print(prefix);
|
|
pw.print(" ");
|
|
pw.print("keeping="); pw.print(r.keeping);
|
|
pw.print(" hidden="); pw.print(r.hidden);
|
|
pw.print(" empty="); pw.print(r.empty);
|
|
pw.print(" hasAboveClient="); pw.println(r.hasAboveClient);
|
|
|
|
if (!r.keeping) {
|
|
if (r.lastWakeTime != 0) {
|
|
long wtime;
|
|
BatteryStatsImpl stats = service.mBatteryStatsService.getActiveStatistics();
|
|
synchronized (stats) {
|
|
wtime = stats.getProcessWakeTime(r.info.uid,
|
|
r.pid, curRealtime);
|
|
}
|
|
long timeUsed = wtime - r.lastWakeTime;
|
|
pw.print(prefix);
|
|
pw.print(" ");
|
|
pw.print("keep awake over ");
|
|
TimeUtils.formatDuration(realtimeSince, pw);
|
|
pw.print(" used ");
|
|
TimeUtils.formatDuration(timeUsed, pw);
|
|
pw.print(" (");
|
|
pw.print((timeUsed*100)/realtimeSince);
|
|
pw.println("%)");
|
|
}
|
|
if (r.lastCpuTime != 0) {
|
|
long timeUsed = r.curCpuTime - r.lastCpuTime;
|
|
pw.print(prefix);
|
|
pw.print(" ");
|
|
pw.print("run cpu over ");
|
|
TimeUtils.formatDuration(uptimeSince, pw);
|
|
pw.print(" used ");
|
|
TimeUtils.formatDuration(timeUsed, pw);
|
|
pw.print(" (");
|
|
pw.print((timeUsed*100)/uptimeSince);
|
|
pw.println("%)");
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
ArrayList<ProcessRecord> collectProcesses(PrintWriter pw, int start, String[] args) {
|
|
ArrayList<ProcessRecord> procs;
|
|
synchronized (this) {
|
|
if (args != null && args.length > start
|
|
&& args[start].charAt(0) != '-') {
|
|
procs = new ArrayList<ProcessRecord>();
|
|
int pid = -1;
|
|
try {
|
|
pid = Integer.parseInt(args[start]);
|
|
} catch (NumberFormatException e) {
|
|
|
|
}
|
|
for (int i=mLruProcesses.size()-1; i>=0; i--) {
|
|
ProcessRecord proc = mLruProcesses.get(i);
|
|
if (proc.pid == pid) {
|
|
procs.add(proc);
|
|
} else if (proc.processName.equals(args[start])) {
|
|
procs.add(proc);
|
|
}
|
|
}
|
|
if (procs.size() <= 0) {
|
|
pw.println("No process found for: " + args[start]);
|
|
return null;
|
|
}
|
|
} else {
|
|
procs = new ArrayList<ProcessRecord>(mLruProcesses);
|
|
}
|
|
}
|
|
return procs;
|
|
}
|
|
|
|
final void dumpGraphicsHardwareUsage(FileDescriptor fd,
|
|
PrintWriter pw, String[] args) {
|
|
ArrayList<ProcessRecord> procs = collectProcesses(pw, 0, args);
|
|
if (procs == null) {
|
|
return;
|
|
}
|
|
|
|
long uptime = SystemClock.uptimeMillis();
|
|
long realtime = SystemClock.elapsedRealtime();
|
|
pw.println("Applications Graphics Acceleration Info:");
|
|
pw.println("Uptime: " + uptime + " Realtime: " + realtime);
|
|
|
|
for (int i = procs.size() - 1 ; i >= 0 ; i--) {
|
|
ProcessRecord r = procs.get(i);
|
|
if (r.thread != null) {
|
|
pw.println("\n** Graphics info for pid " + r.pid + " [" + r.processName + "] **");
|
|
pw.flush();
|
|
try {
|
|
TransferPipe tp = new TransferPipe();
|
|
try {
|
|
r.thread.dumpGfxInfo(tp.getWriteFd().getFileDescriptor(), args);
|
|
tp.go(fd);
|
|
} finally {
|
|
tp.kill();
|
|
}
|
|
} catch (IOException e) {
|
|
pw.println("Failure while dumping the app: " + r);
|
|
pw.flush();
|
|
} catch (RemoteException e) {
|
|
pw.println("Got a RemoteException while dumping the app " + r);
|
|
pw.flush();
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
final void dumpDbInfo(FileDescriptor fd, PrintWriter pw, String[] args) {
|
|
ArrayList<ProcessRecord> procs = collectProcesses(pw, 0, args);
|
|
if (procs == null) {
|
|
return;
|
|
}
|
|
|
|
pw.println("Applications Database Info:");
|
|
|
|
for (int i = procs.size() - 1 ; i >= 0 ; i--) {
|
|
ProcessRecord r = procs.get(i);
|
|
if (r.thread != null) {
|
|
pw.println("\n** Database info for pid " + r.pid + " [" + r.processName + "] **");
|
|
pw.flush();
|
|
try {
|
|
TransferPipe tp = new TransferPipe();
|
|
try {
|
|
r.thread.dumpDbInfo(tp.getWriteFd().getFileDescriptor(), args);
|
|
tp.go(fd);
|
|
} finally {
|
|
tp.kill();
|
|
}
|
|
} catch (IOException e) {
|
|
pw.println("Failure while dumping the app: " + r);
|
|
pw.flush();
|
|
} catch (RemoteException e) {
|
|
pw.println("Got a RemoteException while dumping the app " + r);
|
|
pw.flush();
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
final static class MemItem {
|
|
final String label;
|
|
final String shortLabel;
|
|
final long pss;
|
|
final int id;
|
|
ArrayList<MemItem> subitems;
|
|
|
|
public MemItem(String _label, String _shortLabel, long _pss, int _id) {
|
|
label = _label;
|
|
shortLabel = _shortLabel;
|
|
pss = _pss;
|
|
id = _id;
|
|
}
|
|
}
|
|
|
|
static final void dumpMemItems(PrintWriter pw, String prefix, ArrayList<MemItem> items,
|
|
boolean sort) {
|
|
if (sort) {
|
|
Collections.sort(items, new Comparator<MemItem>() {
|
|
@Override
|
|
public int compare(MemItem lhs, MemItem rhs) {
|
|
if (lhs.pss < rhs.pss) {
|
|
return 1;
|
|
} else if (lhs.pss > rhs.pss) {
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
});
|
|
}
|
|
|
|
for (int i=0; i<items.size(); i++) {
|
|
MemItem mi = items.get(i);
|
|
pw.print(prefix); pw.printf("%7d kB: ", mi.pss); pw.println(mi.label);
|
|
if (mi.subitems != null) {
|
|
dumpMemItems(pw, prefix + " ", mi.subitems, true);
|
|
}
|
|
}
|
|
}
|
|
|
|
// These are in KB.
|
|
static final long[] DUMP_MEM_BUCKETS = new long[] {
|
|
5*1024, 7*1024, 10*1024, 15*1024, 20*1024, 30*1024, 40*1024, 80*1024,
|
|
120*1024, 160*1024, 200*1024,
|
|
250*1024, 300*1024, 350*1024, 400*1024, 500*1024, 600*1024, 800*1024,
|
|
1*1024*1024, 2*1024*1024, 5*1024*1024, 10*1024*1024, 20*1024*1024
|
|
};
|
|
|
|
static final void appendMemBucket(StringBuilder out, long memKB, String label,
|
|
boolean stackLike) {
|
|
int start = label.lastIndexOf('.');
|
|
if (start >= 0) start++;
|
|
else start = 0;
|
|
int end = label.length();
|
|
for (int i=0; i<DUMP_MEM_BUCKETS.length; i++) {
|
|
if (DUMP_MEM_BUCKETS[i] >= memKB) {
|
|
long bucket = DUMP_MEM_BUCKETS[i]/1024;
|
|
out.append(bucket);
|
|
out.append(stackLike ? "MB." : "MB ");
|
|
out.append(label, start, end);
|
|
return;
|
|
}
|
|
}
|
|
out.append(memKB/1024);
|
|
out.append(stackLike ? "MB." : "MB ");
|
|
out.append(label, start, end);
|
|
}
|
|
|
|
static final int[] DUMP_MEM_OOM_ADJ = new int[] {
|
|
ProcessList.SYSTEM_ADJ, ProcessList.PERSISTENT_PROC_ADJ, ProcessList.FOREGROUND_APP_ADJ,
|
|
ProcessList.VISIBLE_APP_ADJ, ProcessList.PERCEPTIBLE_APP_ADJ, ProcessList.HEAVY_WEIGHT_APP_ADJ,
|
|
ProcessList.BACKUP_APP_ADJ, ProcessList.SERVICE_ADJ, ProcessList.HOME_APP_ADJ,
|
|
ProcessList.PREVIOUS_APP_ADJ, ProcessList.SERVICE_B_ADJ, ProcessList.HIDDEN_APP_MAX_ADJ
|
|
};
|
|
static final String[] DUMP_MEM_OOM_LABEL = new String[] {
|
|
"System", "Persistent", "Foreground",
|
|
"Visible", "Perceptible", "Heavy Weight",
|
|
"Backup", "A Services", "Home", "Previous",
|
|
"B Services", "Background"
|
|
};
|
|
|
|
final void dumpApplicationMemoryUsage(FileDescriptor fd,
|
|
PrintWriter pw, String prefix, String[] args, boolean brief,
|
|
PrintWriter categoryPw, StringBuilder outTag, StringBuilder outStack) {
|
|
boolean dumpAll = false;
|
|
boolean oomOnly = false;
|
|
|
|
int opti = 0;
|
|
while (opti < args.length) {
|
|
String opt = args[opti];
|
|
if (opt == null || opt.length() <= 0 || opt.charAt(0) != '-') {
|
|
break;
|
|
}
|
|
opti++;
|
|
if ("-a".equals(opt)) {
|
|
dumpAll = true;
|
|
} else if ("--oom".equals(opt)) {
|
|
oomOnly = true;
|
|
} else if ("-h".equals(opt)) {
|
|
pw.println("meminfo dump options: [-a] [--oom] [process]");
|
|
pw.println(" -a: include all available information for each process.");
|
|
pw.println(" --oom: only show processes organized by oom adj.");
|
|
pw.println("If [process] is specified it can be the name or ");
|
|
pw.println("pid of a specific process to dump.");
|
|
return;
|
|
} else {
|
|
pw.println("Unknown argument: " + opt + "; use -h for help");
|
|
}
|
|
}
|
|
|
|
ArrayList<ProcessRecord> procs = collectProcesses(pw, opti, args);
|
|
if (procs == null) {
|
|
return;
|
|
}
|
|
|
|
final boolean isCheckinRequest = scanArgs(args, "--checkin");
|
|
long uptime = SystemClock.uptimeMillis();
|
|
long realtime = SystemClock.elapsedRealtime();
|
|
|
|
if (procs.size() == 1 || isCheckinRequest) {
|
|
dumpAll = true;
|
|
}
|
|
|
|
if (isCheckinRequest) {
|
|
// short checkin version
|
|
pw.println(uptime + "," + realtime);
|
|
pw.flush();
|
|
} else {
|
|
pw.println("Applications Memory Usage (kB):");
|
|
pw.println("Uptime: " + uptime + " Realtime: " + realtime);
|
|
}
|
|
|
|
String[] innerArgs = new String[args.length-opti];
|
|
System.arraycopy(args, opti, innerArgs, 0, args.length-opti);
|
|
|
|
ArrayList<MemItem> procMems = new ArrayList<MemItem>();
|
|
long nativePss=0, dalvikPss=0, otherPss=0;
|
|
long[] miscPss = new long[Debug.MemoryInfo.NUM_OTHER_STATS];
|
|
|
|
long oomPss[] = new long[DUMP_MEM_OOM_LABEL.length];
|
|
ArrayList<MemItem>[] oomProcs = (ArrayList<MemItem>[])
|
|
new ArrayList[DUMP_MEM_OOM_LABEL.length];
|
|
|
|
long totalPss = 0;
|
|
|
|
for (int i = procs.size() - 1 ; i >= 0 ; i--) {
|
|
ProcessRecord r = procs.get(i);
|
|
if (r.thread != null) {
|
|
if (!isCheckinRequest && dumpAll) {
|
|
pw.println("\n** MEMINFO in pid " + r.pid + " [" + r.processName + "] **");
|
|
pw.flush();
|
|
}
|
|
Debug.MemoryInfo mi = null;
|
|
if (dumpAll) {
|
|
try {
|
|
mi = r.thread.dumpMemInfo(fd, isCheckinRequest, dumpAll, innerArgs);
|
|
} catch (RemoteException e) {
|
|
if (!isCheckinRequest) {
|
|
pw.println("Got RemoteException!");
|
|
pw.flush();
|
|
}
|
|
}
|
|
} else {
|
|
mi = new Debug.MemoryInfo();
|
|
Debug.getMemoryInfo(r.pid, mi);
|
|
}
|
|
|
|
if (!isCheckinRequest && mi != null) {
|
|
long myTotalPss = mi.getTotalPss();
|
|
totalPss += myTotalPss;
|
|
MemItem pssItem = new MemItem(r.processName + " (pid " + r.pid + ")",
|
|
r.processName, myTotalPss, 0);
|
|
procMems.add(pssItem);
|
|
|
|
nativePss += mi.nativePss;
|
|
dalvikPss += mi.dalvikPss;
|
|
otherPss += mi.otherPss;
|
|
for (int j=0; j<Debug.MemoryInfo.NUM_OTHER_STATS; j++) {
|
|
long mem = mi.getOtherPss(j);
|
|
miscPss[j] += mem;
|
|
otherPss -= mem;
|
|
}
|
|
|
|
for (int oomIndex=0; oomIndex<oomPss.length; oomIndex++) {
|
|
if (r.setAdj <= DUMP_MEM_OOM_ADJ[oomIndex]
|
|
|| oomIndex == (oomPss.length-1)) {
|
|
oomPss[oomIndex] += myTotalPss;
|
|
if (oomProcs[oomIndex] == null) {
|
|
oomProcs[oomIndex] = new ArrayList<MemItem>();
|
|
}
|
|
oomProcs[oomIndex].add(pssItem);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!isCheckinRequest && procs.size() > 1) {
|
|
ArrayList<MemItem> catMems = new ArrayList<MemItem>();
|
|
|
|
catMems.add(new MemItem("Native", "Native", nativePss, -1));
|
|
catMems.add(new MemItem("Dalvik", "Dalvik", dalvikPss, -2));
|
|
catMems.add(new MemItem("Unknown", "Unknown", otherPss, -3));
|
|
for (int j=0; j<Debug.MemoryInfo.NUM_OTHER_STATS; j++) {
|
|
String label = Debug.MemoryInfo.getOtherLabel(j);
|
|
catMems.add(new MemItem(label, label, miscPss[j], j));
|
|
}
|
|
|
|
ArrayList<MemItem> oomMems = new ArrayList<MemItem>();
|
|
for (int j=0; j<oomPss.length; j++) {
|
|
if (oomPss[j] != 0) {
|
|
String label = DUMP_MEM_OOM_LABEL[j];
|
|
MemItem item = new MemItem(label, label, oomPss[j],
|
|
DUMP_MEM_OOM_ADJ[j]);
|
|
item.subitems = oomProcs[j];
|
|
oomMems.add(item);
|
|
}
|
|
}
|
|
|
|
if (outTag != null || outStack != null) {
|
|
if (outTag != null) {
|
|
appendMemBucket(outTag, totalPss, "total", false);
|
|
}
|
|
if (outStack != null) {
|
|
appendMemBucket(outStack, totalPss, "total", true);
|
|
}
|
|
boolean firstLine = true;
|
|
for (int i=0; i<oomMems.size(); i++) {
|
|
MemItem miCat = oomMems.get(i);
|
|
if (miCat.subitems == null || miCat.subitems.size() < 1) {
|
|
continue;
|
|
}
|
|
if (miCat.id < ProcessList.SERVICE_ADJ
|
|
|| miCat.id == ProcessList.HOME_APP_ADJ
|
|
|| miCat.id == ProcessList.PREVIOUS_APP_ADJ) {
|
|
if (outTag != null && miCat.id <= ProcessList.FOREGROUND_APP_ADJ) {
|
|
outTag.append(" / ");
|
|
}
|
|
if (outStack != null) {
|
|
if (miCat.id >= ProcessList.FOREGROUND_APP_ADJ) {
|
|
if (firstLine) {
|
|
outStack.append(":");
|
|
firstLine = false;
|
|
}
|
|
outStack.append("\n\t at ");
|
|
} else {
|
|
outStack.append("$");
|
|
}
|
|
}
|
|
for (int j=0; j<miCat.subitems.size(); j++) {
|
|
MemItem mi = miCat.subitems.get(j);
|
|
if (j > 0) {
|
|
if (outTag != null) {
|
|
outTag.append(" ");
|
|
}
|
|
if (outStack != null) {
|
|
outStack.append("$");
|
|
}
|
|
}
|
|
if (outTag != null && miCat.id <= ProcessList.FOREGROUND_APP_ADJ) {
|
|
appendMemBucket(outTag, mi.pss, mi.shortLabel, false);
|
|
}
|
|
if (outStack != null) {
|
|
appendMemBucket(outStack, mi.pss, mi.shortLabel, true);
|
|
}
|
|
}
|
|
if (outStack != null && miCat.id >= ProcessList.FOREGROUND_APP_ADJ) {
|
|
outStack.append("(");
|
|
for (int k=0; k<DUMP_MEM_OOM_ADJ.length; k++) {
|
|
if (DUMP_MEM_OOM_ADJ[k] == miCat.id) {
|
|
outStack.append(DUMP_MEM_OOM_LABEL[k]);
|
|
outStack.append(":");
|
|
outStack.append(DUMP_MEM_OOM_ADJ[k]);
|
|
}
|
|
}
|
|
outStack.append(")");
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!brief && !oomOnly) {
|
|
pw.println();
|
|
pw.println("Total PSS by process:");
|
|
dumpMemItems(pw, " ", procMems, true);
|
|
pw.println();
|
|
}
|
|
pw.println("Total PSS by OOM adjustment:");
|
|
dumpMemItems(pw, " ", oomMems, false);
|
|
if (!oomOnly) {
|
|
PrintWriter out = categoryPw != null ? categoryPw : pw;
|
|
out.println();
|
|
out.println("Total PSS by category:");
|
|
dumpMemItems(out, " ", catMems, true);
|
|
}
|
|
pw.println();
|
|
pw.print("Total PSS: "); pw.print(totalPss); pw.println(" kB");
|
|
final int[] SINGLE_LONG_FORMAT = new int[] {
|
|
Process.PROC_SPACE_TERM|Process.PROC_OUT_LONG
|
|
};
|
|
long[] longOut = new long[1];
|
|
Process.readProcFile("/sys/kernel/mm/ksm/pages_shared",
|
|
SINGLE_LONG_FORMAT, null, longOut, null);
|
|
long shared = longOut[0] * ProcessList.PAGE_SIZE / 1024;
|
|
longOut[0] = 0;
|
|
Process.readProcFile("/sys/kernel/mm/ksm/pages_sharing",
|
|
SINGLE_LONG_FORMAT, null, longOut, null);
|
|
long sharing = longOut[0] * ProcessList.PAGE_SIZE / 1024;
|
|
longOut[0] = 0;
|
|
Process.readProcFile("/sys/kernel/mm/ksm/pages_unshared",
|
|
SINGLE_LONG_FORMAT, null, longOut, null);
|
|
long unshared = longOut[0] * ProcessList.PAGE_SIZE / 1024;
|
|
longOut[0] = 0;
|
|
Process.readProcFile("/sys/kernel/mm/ksm/pages_volatile",
|
|
SINGLE_LONG_FORMAT, null, longOut, null);
|
|
long voltile = longOut[0] * ProcessList.PAGE_SIZE / 1024;
|
|
pw.print(" KSM: "); pw.print(sharing); pw.print(" kB saved from shared ");
|
|
pw.print(shared); pw.println(" kB");
|
|
pw.print(" "); pw.print(unshared); pw.print(" kB unshared; ");
|
|
pw.print(voltile); pw.println(" kB volatile");
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Searches array of arguments for the specified string
|
|
* @param args array of argument strings
|
|
* @param value value to search for
|
|
* @return true if the value is contained in the array
|
|
*/
|
|
private static boolean scanArgs(String[] args, String value) {
|
|
if (args != null) {
|
|
for (String arg : args) {
|
|
if (value.equals(arg)) {
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
private final boolean removeDyingProviderLocked(ProcessRecord proc,
|
|
ContentProviderRecord cpr, boolean always) {
|
|
final boolean inLaunching = mLaunchingProviders.contains(cpr);
|
|
|
|
if (!inLaunching || always) {
|
|
synchronized (cpr) {
|
|
cpr.launchingApp = null;
|
|
cpr.notifyAll();
|
|
}
|
|
mProviderMap.removeProviderByClass(cpr.name, UserHandle.getUserId(cpr.uid));
|
|
String names[] = cpr.info.authority.split(";");
|
|
for (int j = 0; j < names.length; j++) {
|
|
mProviderMap.removeProviderByName(names[j], UserHandle.getUserId(cpr.uid));
|
|
}
|
|
}
|
|
|
|
for (int i=0; i<cpr.connections.size(); i++) {
|
|
ContentProviderConnection conn = cpr.connections.get(i);
|
|
if (conn.waiting) {
|
|
// If this connection is waiting for the provider, then we don't
|
|
// need to mess with its process unless we are always removing
|
|
// or for some reason the provider is not currently launching.
|
|
if (inLaunching && !always) {
|
|
continue;
|
|
}
|
|
}
|
|
ProcessRecord capp = conn.client;
|
|
conn.dead = true;
|
|
if (conn.stableCount > 0) {
|
|
if (!capp.persistent && capp.thread != null
|
|
&& capp.pid != 0
|
|
&& capp.pid != MY_PID) {
|
|
Slog.i(TAG, "Kill " + capp.processName
|
|
+ " (pid " + capp.pid + "): provider " + cpr.info.name
|
|
+ " in dying process " + (proc != null ? proc.processName : "??"));
|
|
EventLog.writeEvent(EventLogTags.AM_KILL, capp.pid,
|
|
capp.processName, capp.setAdj, "dying provider "
|
|
+ cpr.name.toShortString());
|
|
Process.killProcessQuiet(capp.pid);
|
|
}
|
|
} else if (capp.thread != null && conn.provider.provider != null) {
|
|
try {
|
|
capp.thread.unstableProviderDied(conn.provider.provider.asBinder());
|
|
} catch (RemoteException e) {
|
|
}
|
|
// In the protocol here, we don't expect the client to correctly
|
|
// clean up this connection, we'll just remove it.
|
|
cpr.connections.remove(i);
|
|
conn.client.conProviders.remove(conn);
|
|
}
|
|
}
|
|
|
|
if (inLaunching && always) {
|
|
mLaunchingProviders.remove(cpr);
|
|
}
|
|
return inLaunching;
|
|
}
|
|
|
|
/**
|
|
* Main code for cleaning up a process when it has gone away. This is
|
|
* called both as a result of the process dying, or directly when stopping
|
|
* a process when running in single process mode.
|
|
*/
|
|
private final void cleanUpApplicationRecordLocked(ProcessRecord app,
|
|
boolean restarting, boolean allowRestart, int index) {
|
|
if (index >= 0) {
|
|
mLruProcesses.remove(index);
|
|
}
|
|
|
|
mProcessesToGc.remove(app);
|
|
|
|
// Dismiss any open dialogs.
|
|
if (app.crashDialog != null) {
|
|
app.crashDialog.dismiss();
|
|
app.crashDialog = null;
|
|
}
|
|
if (app.anrDialog != null) {
|
|
app.anrDialog.dismiss();
|
|
app.anrDialog = null;
|
|
}
|
|
if (app.waitDialog != null) {
|
|
app.waitDialog.dismiss();
|
|
app.waitDialog = null;
|
|
}
|
|
|
|
app.crashing = false;
|
|
app.notResponding = false;
|
|
|
|
app.resetPackageList();
|
|
app.unlinkDeathRecipient();
|
|
app.thread = null;
|
|
app.forcingToForeground = null;
|
|
app.foregroundServices = false;
|
|
app.foregroundActivities = false;
|
|
app.hasShownUi = false;
|
|
app.hasAboveClient = false;
|
|
|
|
mServices.killServicesLocked(app, allowRestart);
|
|
|
|
boolean restart = false;
|
|
|
|
// Remove published content providers.
|
|
if (!app.pubProviders.isEmpty()) {
|
|
Iterator<ContentProviderRecord> it = app.pubProviders.values().iterator();
|
|
while (it.hasNext()) {
|
|
ContentProviderRecord cpr = it.next();
|
|
|
|
final boolean always = app.bad || !allowRestart;
|
|
if (removeDyingProviderLocked(app, cpr, always) || always) {
|
|
// We left the provider in the launching list, need to
|
|
// restart it.
|
|
restart = true;
|
|
}
|
|
|
|
cpr.provider = null;
|
|
cpr.proc = null;
|
|
}
|
|
app.pubProviders.clear();
|
|
}
|
|
|
|
// Take care of any launching providers waiting for this process.
|
|
if (checkAppInLaunchingProvidersLocked(app, false)) {
|
|
restart = true;
|
|
}
|
|
|
|
// Unregister from connected content providers.
|
|
if (!app.conProviders.isEmpty()) {
|
|
for (int i=0; i<app.conProviders.size(); i++) {
|
|
ContentProviderConnection conn = app.conProviders.get(i);
|
|
conn.provider.connections.remove(conn);
|
|
}
|
|
app.conProviders.clear();
|
|
}
|
|
|
|
// At this point there may be remaining entries in mLaunchingProviders
|
|
// where we were the only one waiting, so they are no longer of use.
|
|
// Look for these and clean up if found.
|
|
// XXX Commented out for now. Trying to figure out a way to reproduce
|
|
// the actual situation to identify what is actually going on.
|
|
if (false) {
|
|
for (int i=0; i<mLaunchingProviders.size(); i++) {
|
|
ContentProviderRecord cpr = (ContentProviderRecord)
|
|
mLaunchingProviders.get(i);
|
|
if (cpr.connections.size() <= 0 && !cpr.hasExternalProcessHandles()) {
|
|
synchronized (cpr) {
|
|
cpr.launchingApp = null;
|
|
cpr.notifyAll();
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
skipCurrentReceiverLocked(app);
|
|
|
|
// Unregister any receivers.
|
|
if (app.receivers.size() > 0) {
|
|
Iterator<ReceiverList> it = app.receivers.iterator();
|
|
while (it.hasNext()) {
|
|
removeReceiverLocked(it.next());
|
|
}
|
|
app.receivers.clear();
|
|
}
|
|
|
|
// If the app is undergoing backup, tell the backup manager about it
|
|
if (mBackupTarget != null && app.pid == mBackupTarget.app.pid) {
|
|
if (DEBUG_BACKUP) Slog.d(TAG, "App " + mBackupTarget.appInfo + " died during backup");
|
|
try {
|
|
IBackupManager bm = IBackupManager.Stub.asInterface(
|
|
ServiceManager.getService(Context.BACKUP_SERVICE));
|
|
bm.agentDisconnected(app.info.packageName);
|
|
} catch (RemoteException e) {
|
|
// can't happen; backup manager is local
|
|
}
|
|
}
|
|
|
|
for (int i = mPendingProcessChanges.size()-1; i>=0; i--) {
|
|
ProcessChangeItem item = mPendingProcessChanges.get(i);
|
|
if (item.pid == app.pid) {
|
|
mPendingProcessChanges.remove(i);
|
|
mAvailProcessChanges.add(item);
|
|
}
|
|
}
|
|
mHandler.obtainMessage(DISPATCH_PROCESS_DIED, app.pid, app.info.uid, null).sendToTarget();
|
|
|
|
// If the caller is restarting this app, then leave it in its
|
|
// current lists and let the caller take care of it.
|
|
if (restarting) {
|
|
return;
|
|
}
|
|
|
|
if (!app.persistent || app.isolated) {
|
|
if (DEBUG_PROCESSES) Slog.v(TAG,
|
|
"Removing non-persistent process during cleanup: " + app);
|
|
mProcessNames.remove(app.processName, app.uid);
|
|
mIsolatedProcesses.remove(app.uid);
|
|
if (mHeavyWeightProcess == app) {
|
|
mHeavyWeightProcess = null;
|
|
mHandler.sendEmptyMessage(CANCEL_HEAVY_NOTIFICATION_MSG);
|
|
}
|
|
} else if (!app.removed) {
|
|
// This app is persistent, so we need to keep its record around.
|
|
// If it is not already on the pending app list, add it there
|
|
// and start a new process for it.
|
|
if (mPersistentStartingProcesses.indexOf(app) < 0) {
|
|
mPersistentStartingProcesses.add(app);
|
|
restart = true;
|
|
}
|
|
}
|
|
if (DEBUG_PROCESSES && mProcessesOnHold.contains(app)) Slog.v(TAG,
|
|
"Clean-up removing on hold: " + app);
|
|
mProcessesOnHold.remove(app);
|
|
|
|
if (app == mHomeProcess) {
|
|
mHomeProcess = null;
|
|
}
|
|
if (app == mPreviousProcess) {
|
|
mPreviousProcess = null;
|
|
}
|
|
|
|
if (restart && !app.isolated) {
|
|
// We have components that still need to be running in the
|
|
// process, so re-launch it.
|
|
mProcessNames.put(app.processName, app.uid, app);
|
|
startProcessLocked(app, "restart", app.processName);
|
|
} else if (app.pid > 0 && app.pid != MY_PID) {
|
|
// Goodbye!
|
|
synchronized (mPidsSelfLocked) {
|
|
mPidsSelfLocked.remove(app.pid);
|
|
mHandler.removeMessages(PROC_START_TIMEOUT_MSG, app);
|
|
}
|
|
app.setPid(0);
|
|
}
|
|
}
|
|
|
|
boolean checkAppInLaunchingProvidersLocked(ProcessRecord app, boolean alwaysBad) {
|
|
// Look through the content providers we are waiting to have launched,
|
|
// and if any run in this process then either schedule a restart of
|
|
// the process or kill the client waiting for it if this process has
|
|
// gone bad.
|
|
int NL = mLaunchingProviders.size();
|
|
boolean restart = false;
|
|
for (int i=0; i<NL; i++) {
|
|
ContentProviderRecord cpr = mLaunchingProviders.get(i);
|
|
if (cpr.launchingApp == app) {
|
|
if (!alwaysBad && !app.bad) {
|
|
restart = true;
|
|
} else {
|
|
removeDyingProviderLocked(app, cpr, true);
|
|
NL = mLaunchingProviders.size();
|
|
}
|
|
}
|
|
}
|
|
return restart;
|
|
}
|
|
|
|
// =========================================================
|
|
// SERVICES
|
|
// =========================================================
|
|
|
|
public List<ActivityManager.RunningServiceInfo> getServices(int maxNum,
|
|
int flags) {
|
|
enforceNotIsolatedCaller("getServices");
|
|
synchronized (this) {
|
|
return mServices.getRunningServiceInfoLocked(maxNum, flags);
|
|
}
|
|
}
|
|
|
|
public PendingIntent getRunningServiceControlPanel(ComponentName name) {
|
|
enforceNotIsolatedCaller("getRunningServiceControlPanel");
|
|
synchronized (this) {
|
|
return mServices.getRunningServiceControlPanelLocked(name);
|
|
}
|
|
}
|
|
|
|
public ComponentName startService(IApplicationThread caller, Intent service,
|
|
String resolvedType, int userId) {
|
|
enforceNotIsolatedCaller("startService");
|
|
// Refuse possible leaked file descriptors
|
|
if (service != null && service.hasFileDescriptors() == true) {
|
|
throw new IllegalArgumentException("File descriptors passed in Intent");
|
|
}
|
|
|
|
if (DEBUG_SERVICE)
|
|
Slog.v(TAG, "startService: " + service + " type=" + resolvedType);
|
|
synchronized(this) {
|
|
final int callingPid = Binder.getCallingPid();
|
|
final int callingUid = Binder.getCallingUid();
|
|
checkValidCaller(callingUid, userId);
|
|
final long origId = Binder.clearCallingIdentity();
|
|
ComponentName res = mServices.startServiceLocked(caller, service,
|
|
resolvedType, callingPid, callingUid, userId);
|
|
Binder.restoreCallingIdentity(origId);
|
|
return res;
|
|
}
|
|
}
|
|
|
|
ComponentName startServiceInPackage(int uid,
|
|
Intent service, String resolvedType) {
|
|
synchronized(this) {
|
|
if (DEBUG_SERVICE)
|
|
Slog.v(TAG, "startServiceInPackage: " + service + " type=" + resolvedType);
|
|
final long origId = Binder.clearCallingIdentity();
|
|
ComponentName res = mServices.startServiceLocked(null, service,
|
|
resolvedType, -1, uid, UserHandle.getUserId(uid));
|
|
Binder.restoreCallingIdentity(origId);
|
|
return res;
|
|
}
|
|
}
|
|
|
|
public int stopService(IApplicationThread caller, Intent service,
|
|
String resolvedType, int userId) {
|
|
enforceNotIsolatedCaller("stopService");
|
|
// Refuse possible leaked file descriptors
|
|
if (service != null && service.hasFileDescriptors() == true) {
|
|
throw new IllegalArgumentException("File descriptors passed in Intent");
|
|
}
|
|
|
|
checkValidCaller(Binder.getCallingUid(), userId);
|
|
|
|
synchronized(this) {
|
|
return mServices.stopServiceLocked(caller, service, resolvedType, userId);
|
|
}
|
|
}
|
|
|
|
public IBinder peekService(Intent service, String resolvedType) {
|
|
enforceNotIsolatedCaller("peekService");
|
|
// Refuse possible leaked file descriptors
|
|
if (service != null && service.hasFileDescriptors() == true) {
|
|
throw new IllegalArgumentException("File descriptors passed in Intent");
|
|
}
|
|
synchronized(this) {
|
|
return mServices.peekServiceLocked(service, resolvedType);
|
|
}
|
|
}
|
|
|
|
public boolean stopServiceToken(ComponentName className, IBinder token,
|
|
int startId) {
|
|
synchronized(this) {
|
|
return mServices.stopServiceTokenLocked(className, token, startId);
|
|
}
|
|
}
|
|
|
|
public void setServiceForeground(ComponentName className, IBinder token,
|
|
int id, Notification notification, boolean removeNotification) {
|
|
synchronized(this) {
|
|
mServices.setServiceForegroundLocked(className, token, id, notification,
|
|
removeNotification);
|
|
}
|
|
}
|
|
|
|
boolean isSingleton(String componentProcessName, ApplicationInfo aInfo,
|
|
String className, int flags) {
|
|
boolean result = false;
|
|
if (UserHandle.getAppId(aInfo.uid) >= Process.FIRST_APPLICATION_UID) {
|
|
if ((flags&ServiceInfo.FLAG_SINGLE_USER) != 0) {
|
|
if (ActivityManager.checkUidPermission(
|
|
android.Manifest.permission.INTERACT_ACROSS_USERS,
|
|
aInfo.uid) != PackageManager.PERMISSION_GRANTED) {
|
|
ComponentName comp = new ComponentName(aInfo.packageName, className);
|
|
String msg = "Permission Denial: Component " + comp.flattenToShortString()
|
|
+ " requests FLAG_SINGLE_USER, but app does not hold "
|
|
+ android.Manifest.permission.INTERACT_ACROSS_USERS;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
result = true;
|
|
}
|
|
} else if (componentProcessName == aInfo.packageName) {
|
|
result = (aInfo.flags & ApplicationInfo.FLAG_PERSISTENT) != 0;
|
|
} else if ("system".equals(componentProcessName)) {
|
|
result = true;
|
|
}
|
|
if (DEBUG_MU) {
|
|
Slog.v(TAG, "isSingleton(" + componentProcessName + ", " + aInfo
|
|
+ ", " + className + ", 0x" + Integer.toHexString(flags) + ") = " + result);
|
|
}
|
|
return result;
|
|
}
|
|
|
|
public int bindService(IApplicationThread caller, IBinder token,
|
|
Intent service, String resolvedType,
|
|
IServiceConnection connection, int flags, int userId) {
|
|
enforceNotIsolatedCaller("bindService");
|
|
// Refuse possible leaked file descriptors
|
|
if (service != null && service.hasFileDescriptors() == true) {
|
|
throw new IllegalArgumentException("File descriptors passed in Intent");
|
|
}
|
|
|
|
checkValidCaller(Binder.getCallingUid(), userId);
|
|
|
|
synchronized(this) {
|
|
return mServices.bindServiceLocked(caller, token, service, resolvedType,
|
|
connection, flags, userId);
|
|
}
|
|
}
|
|
|
|
public boolean unbindService(IServiceConnection connection) {
|
|
synchronized (this) {
|
|
return mServices.unbindServiceLocked(connection);
|
|
}
|
|
}
|
|
|
|
public void publishService(IBinder token, Intent intent, IBinder service) {
|
|
// Refuse possible leaked file descriptors
|
|
if (intent != null && intent.hasFileDescriptors() == true) {
|
|
throw new IllegalArgumentException("File descriptors passed in Intent");
|
|
}
|
|
|
|
synchronized(this) {
|
|
if (!(token instanceof ServiceRecord)) {
|
|
throw new IllegalArgumentException("Invalid service token");
|
|
}
|
|
mServices.publishServiceLocked((ServiceRecord)token, intent, service);
|
|
}
|
|
}
|
|
|
|
public void unbindFinished(IBinder token, Intent intent, boolean doRebind) {
|
|
// Refuse possible leaked file descriptors
|
|
if (intent != null && intent.hasFileDescriptors() == true) {
|
|
throw new IllegalArgumentException("File descriptors passed in Intent");
|
|
}
|
|
|
|
synchronized(this) {
|
|
mServices.unbindFinishedLocked((ServiceRecord)token, intent, doRebind);
|
|
}
|
|
}
|
|
|
|
public void serviceDoneExecuting(IBinder token, int type, int startId, int res) {
|
|
synchronized(this) {
|
|
if (!(token instanceof ServiceRecord)) {
|
|
throw new IllegalArgumentException("Invalid service token");
|
|
}
|
|
mServices.serviceDoneExecutingLocked((ServiceRecord)token, type, startId, res);
|
|
}
|
|
}
|
|
|
|
// =========================================================
|
|
// BACKUP AND RESTORE
|
|
// =========================================================
|
|
|
|
// Cause the target app to be launched if necessary and its backup agent
|
|
// instantiated. The backup agent will invoke backupAgentCreated() on the
|
|
// activity manager to announce its creation.
|
|
public boolean bindBackupAgent(ApplicationInfo app, int backupMode) {
|
|
if (DEBUG_BACKUP) Slog.v(TAG, "startBackupAgent: app=" + app + " mode=" + backupMode);
|
|
enforceCallingPermission("android.permission.BACKUP", "startBackupAgent");
|
|
|
|
synchronized(this) {
|
|
// !!! TODO: currently no check here that we're already bound
|
|
BatteryStatsImpl.Uid.Pkg.Serv ss = null;
|
|
BatteryStatsImpl stats = mBatteryStatsService.getActiveStatistics();
|
|
synchronized (stats) {
|
|
ss = stats.getServiceStatsLocked(app.uid, app.packageName, app.name);
|
|
}
|
|
|
|
// Backup agent is now in use, its package can't be stopped.
|
|
try {
|
|
AppGlobals.getPackageManager().setPackageStoppedState(
|
|
app.packageName, false, UserHandle.getUserId(app.uid));
|
|
} catch (RemoteException e) {
|
|
} catch (IllegalArgumentException e) {
|
|
Slog.w(TAG, "Failed trying to unstop package "
|
|
+ app.packageName + ": " + e);
|
|
}
|
|
|
|
BackupRecord r = new BackupRecord(ss, app, backupMode);
|
|
ComponentName hostingName = (backupMode == IApplicationThread.BACKUP_MODE_INCREMENTAL)
|
|
? new ComponentName(app.packageName, app.backupAgentName)
|
|
: new ComponentName("android", "FullBackupAgent");
|
|
// startProcessLocked() returns existing proc's record if it's already running
|
|
ProcessRecord proc = startProcessLocked(app.processName, app,
|
|
false, 0, "backup", hostingName, false, false);
|
|
if (proc == null) {
|
|
Slog.e(TAG, "Unable to start backup agent process " + r);
|
|
return false;
|
|
}
|
|
|
|
r.app = proc;
|
|
mBackupTarget = r;
|
|
mBackupAppName = app.packageName;
|
|
|
|
// Try not to kill the process during backup
|
|
updateOomAdjLocked(proc);
|
|
|
|
// If the process is already attached, schedule the creation of the backup agent now.
|
|
// If it is not yet live, this will be done when it attaches to the framework.
|
|
if (proc.thread != null) {
|
|
if (DEBUG_BACKUP) Slog.v(TAG, "Agent proc already running: " + proc);
|
|
try {
|
|
proc.thread.scheduleCreateBackupAgent(app,
|
|
compatibilityInfoForPackageLocked(app), backupMode);
|
|
} catch (RemoteException e) {
|
|
// Will time out on the backup manager side
|
|
}
|
|
} else {
|
|
if (DEBUG_BACKUP) Slog.v(TAG, "Agent proc not running, waiting for attach");
|
|
}
|
|
// Invariants: at this point, the target app process exists and the application
|
|
// is either already running or in the process of coming up. mBackupTarget and
|
|
// mBackupAppName describe the app, so that when it binds back to the AM we
|
|
// know that it's scheduled for a backup-agent operation.
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
// A backup agent has just come up
|
|
public void backupAgentCreated(String agentPackageName, IBinder agent) {
|
|
if (DEBUG_BACKUP) Slog.v(TAG, "backupAgentCreated: " + agentPackageName
|
|
+ " = " + agent);
|
|
|
|
synchronized(this) {
|
|
if (!agentPackageName.equals(mBackupAppName)) {
|
|
Slog.e(TAG, "Backup agent created for " + agentPackageName + " but not requested!");
|
|
return;
|
|
}
|
|
}
|
|
|
|
long oldIdent = Binder.clearCallingIdentity();
|
|
try {
|
|
IBackupManager bm = IBackupManager.Stub.asInterface(
|
|
ServiceManager.getService(Context.BACKUP_SERVICE));
|
|
bm.agentConnected(agentPackageName, agent);
|
|
} catch (RemoteException e) {
|
|
// can't happen; the backup manager service is local
|
|
} catch (Exception e) {
|
|
Slog.w(TAG, "Exception trying to deliver BackupAgent binding: ");
|
|
e.printStackTrace();
|
|
} finally {
|
|
Binder.restoreCallingIdentity(oldIdent);
|
|
}
|
|
}
|
|
|
|
// done with this agent
|
|
public void unbindBackupAgent(ApplicationInfo appInfo) {
|
|
if (DEBUG_BACKUP) Slog.v(TAG, "unbindBackupAgent: " + appInfo);
|
|
if (appInfo == null) {
|
|
Slog.w(TAG, "unbind backup agent for null app");
|
|
return;
|
|
}
|
|
|
|
synchronized(this) {
|
|
if (mBackupAppName == null) {
|
|
Slog.w(TAG, "Unbinding backup agent with no active backup");
|
|
return;
|
|
}
|
|
|
|
if (!mBackupAppName.equals(appInfo.packageName)) {
|
|
Slog.e(TAG, "Unbind of " + appInfo + " but is not the current backup target");
|
|
return;
|
|
}
|
|
|
|
ProcessRecord proc = mBackupTarget.app;
|
|
mBackupTarget = null;
|
|
mBackupAppName = null;
|
|
|
|
// Not backing this app up any more; reset its OOM adjustment
|
|
updateOomAdjLocked(proc);
|
|
|
|
// If the app crashed during backup, 'thread' will be null here
|
|
if (proc.thread != null) {
|
|
try {
|
|
proc.thread.scheduleDestroyBackupAgent(appInfo,
|
|
compatibilityInfoForPackageLocked(appInfo));
|
|
} catch (Exception e) {
|
|
Slog.e(TAG, "Exception when unbinding backup agent:");
|
|
e.printStackTrace();
|
|
}
|
|
}
|
|
}
|
|
}
|
|
// =========================================================
|
|
// BROADCASTS
|
|
// =========================================================
|
|
|
|
private final List getStickiesLocked(String action, IntentFilter filter,
|
|
List cur) {
|
|
final ContentResolver resolver = mContext.getContentResolver();
|
|
final ArrayList<Intent> list = mStickyBroadcasts.get(action);
|
|
if (list == null) {
|
|
return cur;
|
|
}
|
|
int N = list.size();
|
|
for (int i=0; i<N; i++) {
|
|
Intent intent = list.get(i);
|
|
if (filter.match(resolver, intent, true, TAG) >= 0) {
|
|
if (cur == null) {
|
|
cur = new ArrayList<Intent>();
|
|
}
|
|
cur.add(intent);
|
|
}
|
|
}
|
|
return cur;
|
|
}
|
|
|
|
boolean isPendingBroadcastProcessLocked(int pid) {
|
|
return mFgBroadcastQueue.isPendingBroadcastProcessLocked(pid)
|
|
|| mBgBroadcastQueue.isPendingBroadcastProcessLocked(pid);
|
|
}
|
|
|
|
void skipPendingBroadcastLocked(int pid) {
|
|
Slog.w(TAG, "Unattached app died before broadcast acknowledged, skipping");
|
|
for (BroadcastQueue queue : mBroadcastQueues) {
|
|
queue.skipPendingBroadcastLocked(pid);
|
|
}
|
|
}
|
|
|
|
// The app just attached; send any pending broadcasts that it should receive
|
|
boolean sendPendingBroadcastsLocked(ProcessRecord app) {
|
|
boolean didSomething = false;
|
|
for (BroadcastQueue queue : mBroadcastQueues) {
|
|
didSomething |= queue.sendPendingBroadcastsLocked(app);
|
|
}
|
|
return didSomething;
|
|
}
|
|
|
|
public Intent registerReceiver(IApplicationThread caller, String callerPackage,
|
|
IIntentReceiver receiver, IntentFilter filter, String permission) {
|
|
enforceNotIsolatedCaller("registerReceiver");
|
|
int callingUid;
|
|
synchronized(this) {
|
|
ProcessRecord callerApp = null;
|
|
if (caller != null) {
|
|
callerApp = getRecordForAppLocked(caller);
|
|
if (callerApp == null) {
|
|
throw new SecurityException(
|
|
"Unable to find app for caller " + caller
|
|
+ " (pid=" + Binder.getCallingPid()
|
|
+ ") when registering receiver " + receiver);
|
|
}
|
|
if (callerApp.info.uid != Process.SYSTEM_UID &&
|
|
!callerApp.pkgList.contains(callerPackage)) {
|
|
throw new SecurityException("Given caller package " + callerPackage
|
|
+ " is not running in process " + callerApp);
|
|
}
|
|
callingUid = callerApp.info.uid;
|
|
} else {
|
|
callerPackage = null;
|
|
callingUid = Binder.getCallingUid();
|
|
}
|
|
|
|
List allSticky = null;
|
|
|
|
// Look for any matching sticky broadcasts...
|
|
Iterator actions = filter.actionsIterator();
|
|
if (actions != null) {
|
|
while (actions.hasNext()) {
|
|
String action = (String)actions.next();
|
|
allSticky = getStickiesLocked(action, filter, allSticky);
|
|
}
|
|
} else {
|
|
allSticky = getStickiesLocked(null, filter, allSticky);
|
|
}
|
|
|
|
// The first sticky in the list is returned directly back to
|
|
// the client.
|
|
Intent sticky = allSticky != null ? (Intent)allSticky.get(0) : null;
|
|
|
|
if (DEBUG_BROADCAST) Slog.v(TAG, "Register receiver " + filter
|
|
+ ": " + sticky);
|
|
|
|
if (receiver == null) {
|
|
return sticky;
|
|
}
|
|
|
|
ReceiverList rl
|
|
= (ReceiverList)mRegisteredReceivers.get(receiver.asBinder());
|
|
if (rl == null) {
|
|
rl = new ReceiverList(this, callerApp,
|
|
Binder.getCallingPid(),
|
|
Binder.getCallingUid(), receiver);
|
|
if (rl.app != null) {
|
|
rl.app.receivers.add(rl);
|
|
} else {
|
|
try {
|
|
receiver.asBinder().linkToDeath(rl, 0);
|
|
} catch (RemoteException e) {
|
|
return sticky;
|
|
}
|
|
rl.linkedToDeath = true;
|
|
}
|
|
mRegisteredReceivers.put(receiver.asBinder(), rl);
|
|
}
|
|
BroadcastFilter bf = new BroadcastFilter(filter, rl, callerPackage,
|
|
permission, callingUid);
|
|
rl.add(bf);
|
|
if (!bf.debugCheck()) {
|
|
Slog.w(TAG, "==> For Dynamic broadast");
|
|
}
|
|
mReceiverResolver.addFilter(bf);
|
|
|
|
// Enqueue broadcasts for all existing stickies that match
|
|
// this filter.
|
|
if (allSticky != null) {
|
|
ArrayList receivers = new ArrayList();
|
|
receivers.add(bf);
|
|
|
|
int N = allSticky.size();
|
|
for (int i=0; i<N; i++) {
|
|
Intent intent = (Intent)allSticky.get(i);
|
|
BroadcastQueue queue = broadcastQueueForIntent(intent);
|
|
BroadcastRecord r = new BroadcastRecord(queue, intent, null,
|
|
null, -1, -1, null, receivers, null, 0, null, null,
|
|
false, true, true, -1);
|
|
queue.enqueueParallelBroadcastLocked(r);
|
|
queue.scheduleBroadcastsLocked();
|
|
}
|
|
}
|
|
|
|
return sticky;
|
|
}
|
|
}
|
|
|
|
public void unregisterReceiver(IIntentReceiver receiver) {
|
|
if (DEBUG_BROADCAST) Slog.v(TAG, "Unregister receiver: " + receiver);
|
|
|
|
final long origId = Binder.clearCallingIdentity();
|
|
try {
|
|
boolean doTrim = false;
|
|
|
|
synchronized(this) {
|
|
ReceiverList rl
|
|
= (ReceiverList)mRegisteredReceivers.get(receiver.asBinder());
|
|
if (rl != null) {
|
|
if (rl.curBroadcast != null) {
|
|
BroadcastRecord r = rl.curBroadcast;
|
|
final boolean doNext = finishReceiverLocked(
|
|
receiver.asBinder(), r.resultCode, r.resultData,
|
|
r.resultExtras, r.resultAbort, true);
|
|
if (doNext) {
|
|
doTrim = true;
|
|
r.queue.processNextBroadcast(false);
|
|
}
|
|
}
|
|
|
|
if (rl.app != null) {
|
|
rl.app.receivers.remove(rl);
|
|
}
|
|
removeReceiverLocked(rl);
|
|
if (rl.linkedToDeath) {
|
|
rl.linkedToDeath = false;
|
|
rl.receiver.asBinder().unlinkToDeath(rl, 0);
|
|
}
|
|
}
|
|
}
|
|
|
|
// If we actually concluded any broadcasts, we might now be able
|
|
// to trim the recipients' apps from our working set
|
|
if (doTrim) {
|
|
trimApplications();
|
|
return;
|
|
}
|
|
|
|
} finally {
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
}
|
|
|
|
void removeReceiverLocked(ReceiverList rl) {
|
|
mRegisteredReceivers.remove(rl.receiver.asBinder());
|
|
int N = rl.size();
|
|
for (int i=0; i<N; i++) {
|
|
mReceiverResolver.removeFilter(rl.get(i));
|
|
}
|
|
}
|
|
|
|
private final void sendPackageBroadcastLocked(int cmd, String[] packages) {
|
|
for (int i = mLruProcesses.size() - 1 ; i >= 0 ; i--) {
|
|
ProcessRecord r = mLruProcesses.get(i);
|
|
if (r.thread != null) {
|
|
try {
|
|
r.thread.dispatchPackageBroadcast(cmd, packages);
|
|
} catch (RemoteException ex) {
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
private final int broadcastIntentLocked(ProcessRecord callerApp,
|
|
String callerPackage, Intent intent, String resolvedType,
|
|
IIntentReceiver resultTo, int resultCode, String resultData,
|
|
Bundle map, String requiredPermission,
|
|
boolean ordered, boolean sticky, int callingPid, int callingUid,
|
|
int userId) {
|
|
intent = new Intent(intent);
|
|
|
|
// By default broadcasts do not go to stopped apps.
|
|
intent.addFlags(Intent.FLAG_EXCLUDE_STOPPED_PACKAGES);
|
|
|
|
if (DEBUG_BROADCAST_LIGHT) Slog.v(
|
|
TAG, (sticky ? "Broadcast sticky: ": "Broadcast: ") + intent
|
|
+ " ordered=" + ordered + " userid=" + userId);
|
|
if ((resultTo != null) && !ordered) {
|
|
Slog.w(TAG, "Broadcast " + intent + " not ordered but result callback requested!");
|
|
}
|
|
|
|
// If the caller is trying to send this broadcast to a different
|
|
// user, verify that is allowed.
|
|
if (UserHandle.getUserId(callingUid) != userId) {
|
|
if (checkComponentPermission(
|
|
android.Manifest.permission.INTERACT_ACROSS_USERS,
|
|
callingPid, callingUid, -1, true) != PackageManager.PERMISSION_GRANTED
|
|
&& checkComponentPermission(
|
|
android.Manifest.permission.INTERACT_ACROSS_USERS_FULL,
|
|
callingPid, callingUid, -1, true)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
String msg = "Permission Denial: " + intent.getAction()
|
|
+ " broadcast from " + callerPackage
|
|
+ " asks to send as user " + userId
|
|
+ " but is calling from user " + UserHandle.getUserId(callingUid)
|
|
+ "; this requires "
|
|
+ android.Manifest.permission.INTERACT_ACROSS_USERS;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
} else {
|
|
if (userId == UserHandle.USER_CURRENT) {
|
|
userId = mCurrentUserId;
|
|
}
|
|
}
|
|
}
|
|
|
|
// Make sure that the user who is receiving this broadcast is started
|
|
// If not, we will just skip it.
|
|
if (mStartedUsers.get(userId) == null) {
|
|
Slog.w(TAG, "Skipping broadcast of " + intent
|
|
+ ": user " + userId + " is stopped");
|
|
return ActivityManager.BROADCAST_SUCCESS;
|
|
}
|
|
|
|
// Handle special intents: if this broadcast is from the package
|
|
// manager about a package being removed, we need to remove all of
|
|
// its activities from the history stack.
|
|
final boolean uidRemoved = Intent.ACTION_UID_REMOVED.equals(
|
|
intent.getAction());
|
|
if (Intent.ACTION_PACKAGE_REMOVED.equals(intent.getAction())
|
|
|| Intent.ACTION_PACKAGE_CHANGED.equals(intent.getAction())
|
|
|| Intent.ACTION_EXTERNAL_APPLICATIONS_UNAVAILABLE.equals(intent.getAction())
|
|
|| uidRemoved) {
|
|
if (checkComponentPermission(
|
|
android.Manifest.permission.BROADCAST_PACKAGE_REMOVED,
|
|
callingPid, callingUid, -1, true)
|
|
== PackageManager.PERMISSION_GRANTED) {
|
|
if (uidRemoved) {
|
|
final Bundle intentExtras = intent.getExtras();
|
|
final int uid = intentExtras != null
|
|
? intentExtras.getInt(Intent.EXTRA_UID) : -1;
|
|
if (uid >= 0) {
|
|
BatteryStatsImpl bs = mBatteryStatsService.getActiveStatistics();
|
|
synchronized (bs) {
|
|
bs.removeUidStatsLocked(uid);
|
|
}
|
|
}
|
|
} else {
|
|
// If resources are unvailble just force stop all
|
|
// those packages and flush the attribute cache as well.
|
|
if (Intent.ACTION_EXTERNAL_APPLICATIONS_UNAVAILABLE.equals(intent.getAction())) {
|
|
String list[] = intent.getStringArrayExtra(Intent.EXTRA_CHANGED_PACKAGE_LIST);
|
|
if (list != null && (list.length > 0)) {
|
|
for (String pkg : list) {
|
|
forceStopPackageLocked(pkg, -1, false, true, true, false, userId);
|
|
}
|
|
sendPackageBroadcastLocked(
|
|
IApplicationThread.EXTERNAL_STORAGE_UNAVAILABLE, list);
|
|
}
|
|
} else {
|
|
Uri data = intent.getData();
|
|
String ssp;
|
|
if (data != null && (ssp=data.getSchemeSpecificPart()) != null) {
|
|
if (!intent.getBooleanExtra(Intent.EXTRA_DONT_KILL_APP, false)) {
|
|
forceStopPackageLocked(ssp,
|
|
intent.getIntExtra(Intent.EXTRA_UID, -1), false, true, true,
|
|
false, userId);
|
|
}
|
|
if (Intent.ACTION_PACKAGE_REMOVED.equals(intent.getAction())) {
|
|
sendPackageBroadcastLocked(IApplicationThread.PACKAGE_REMOVED,
|
|
new String[] {ssp});
|
|
}
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
String msg = "Permission Denial: " + intent.getAction()
|
|
+ " broadcast from " + callerPackage + " (pid=" + callingPid
|
|
+ ", uid=" + callingUid + ")"
|
|
+ " requires "
|
|
+ android.Manifest.permission.BROADCAST_PACKAGE_REMOVED;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
|
|
// Special case for adding a package: by default turn on compatibility
|
|
// mode.
|
|
} else if (Intent.ACTION_PACKAGE_ADDED.equals(intent.getAction())) {
|
|
Uri data = intent.getData();
|
|
String ssp;
|
|
if (data != null && (ssp=data.getSchemeSpecificPart()) != null) {
|
|
mCompatModePackages.handlePackageAddedLocked(ssp,
|
|
intent.getBooleanExtra(Intent.EXTRA_REPLACING, false));
|
|
}
|
|
}
|
|
|
|
/*
|
|
* If this is the time zone changed action, queue up a message that will reset the timezone
|
|
* of all currently running processes. This message will get queued up before the broadcast
|
|
* happens.
|
|
*/
|
|
if (intent.ACTION_TIMEZONE_CHANGED.equals(intent.getAction())) {
|
|
mHandler.sendEmptyMessage(UPDATE_TIME_ZONE);
|
|
}
|
|
|
|
if (intent.ACTION_CLEAR_DNS_CACHE.equals(intent.getAction())) {
|
|
mHandler.sendEmptyMessage(CLEAR_DNS_CACHE);
|
|
}
|
|
|
|
if (Proxy.PROXY_CHANGE_ACTION.equals(intent.getAction())) {
|
|
ProxyProperties proxy = intent.getParcelableExtra("proxy");
|
|
mHandler.sendMessage(mHandler.obtainMessage(UPDATE_HTTP_PROXY, proxy));
|
|
}
|
|
|
|
/*
|
|
* Prevent non-system code (defined here to be non-persistent
|
|
* processes) from sending protected broadcasts.
|
|
*/
|
|
if (callingUid == Process.SYSTEM_UID || callingUid == Process.PHONE_UID
|
|
|| callingUid == Process.SHELL_UID || callingUid == Process.BLUETOOTH_UID ||
|
|
callingUid == 0) {
|
|
// Always okay.
|
|
} else if (callerApp == null || !callerApp.persistent) {
|
|
try {
|
|
if (AppGlobals.getPackageManager().isProtectedBroadcast(
|
|
intent.getAction())) {
|
|
String msg = "Permission Denial: not allowed to send broadcast "
|
|
+ intent.getAction() + " from pid="
|
|
+ callingPid + ", uid=" + callingUid;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
} catch (RemoteException e) {
|
|
Slog.w(TAG, "Remote exception", e);
|
|
return ActivityManager.BROADCAST_SUCCESS;
|
|
}
|
|
}
|
|
|
|
// Add to the sticky list if requested.
|
|
if (sticky) {
|
|
if (checkPermission(android.Manifest.permission.BROADCAST_STICKY,
|
|
callingPid, callingUid)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
String msg = "Permission Denial: broadcastIntent() requesting a sticky broadcast from pid="
|
|
+ callingPid + ", uid=" + callingUid
|
|
+ " requires " + android.Manifest.permission.BROADCAST_STICKY;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
if (requiredPermission != null) {
|
|
Slog.w(TAG, "Can't broadcast sticky intent " + intent
|
|
+ " and enforce permission " + requiredPermission);
|
|
return ActivityManager.BROADCAST_STICKY_CANT_HAVE_PERMISSION;
|
|
}
|
|
if (intent.getComponent() != null) {
|
|
throw new SecurityException(
|
|
"Sticky broadcasts can't target a specific component");
|
|
}
|
|
ArrayList<Intent> list = mStickyBroadcasts.get(intent.getAction());
|
|
if (list == null) {
|
|
list = new ArrayList<Intent>();
|
|
mStickyBroadcasts.put(intent.getAction(), list);
|
|
}
|
|
int N = list.size();
|
|
int i;
|
|
for (i=0; i<N; i++) {
|
|
if (intent.filterEquals(list.get(i))) {
|
|
// This sticky already exists, replace it.
|
|
list.set(i, new Intent(intent));
|
|
break;
|
|
}
|
|
}
|
|
if (i >= N) {
|
|
list.add(new Intent(intent));
|
|
}
|
|
}
|
|
|
|
// Figure out who all will receive this broadcast.
|
|
List receivers = null;
|
|
List<BroadcastFilter> registeredReceivers = null;
|
|
try {
|
|
// Need to resolve the intent to interested receivers...
|
|
if ((intent.getFlags()&Intent.FLAG_RECEIVER_REGISTERED_ONLY)
|
|
== 0) {
|
|
receivers = AppGlobals.getPackageManager().queryIntentReceivers(
|
|
intent, resolvedType, STOCK_PM_FLAGS, userId);
|
|
}
|
|
if (intent.getComponent() == null) {
|
|
registeredReceivers = mReceiverResolver.queryIntent(intent,
|
|
resolvedType, false, userId);
|
|
}
|
|
} catch (RemoteException ex) {
|
|
// pm is in same process, this will never happen.
|
|
}
|
|
|
|
final boolean replacePending =
|
|
(intent.getFlags()&Intent.FLAG_RECEIVER_REPLACE_PENDING) != 0;
|
|
|
|
if (DEBUG_BROADCAST) Slog.v(TAG, "Enqueing broadcast: " + intent.getAction()
|
|
+ " replacePending=" + replacePending);
|
|
|
|
int NR = registeredReceivers != null ? registeredReceivers.size() : 0;
|
|
if (!ordered && NR > 0) {
|
|
// If we are not serializing this broadcast, then send the
|
|
// registered receivers separately so they don't wait for the
|
|
// components to be launched.
|
|
final BroadcastQueue queue = broadcastQueueForIntent(intent);
|
|
BroadcastRecord r = new BroadcastRecord(queue, intent, callerApp,
|
|
callerPackage, callingPid, callingUid, requiredPermission,
|
|
registeredReceivers, resultTo, resultCode, resultData, map,
|
|
ordered, sticky, false, userId);
|
|
if (DEBUG_BROADCAST) Slog.v(
|
|
TAG, "Enqueueing parallel broadcast " + r);
|
|
final boolean replaced = replacePending && queue.replaceParallelBroadcastLocked(r);
|
|
if (!replaced) {
|
|
queue.enqueueParallelBroadcastLocked(r);
|
|
queue.scheduleBroadcastsLocked();
|
|
}
|
|
registeredReceivers = null;
|
|
NR = 0;
|
|
}
|
|
|
|
// Merge into one list.
|
|
int ir = 0;
|
|
if (receivers != null) {
|
|
// A special case for PACKAGE_ADDED: do not allow the package
|
|
// being added to see this broadcast. This prevents them from
|
|
// using this as a back door to get run as soon as they are
|
|
// installed. Maybe in the future we want to have a special install
|
|
// broadcast or such for apps, but we'd like to deliberately make
|
|
// this decision.
|
|
String skipPackages[] = null;
|
|
if (Intent.ACTION_PACKAGE_ADDED.equals(intent.getAction())
|
|
|| Intent.ACTION_PACKAGE_RESTARTED.equals(intent.getAction())
|
|
|| Intent.ACTION_PACKAGE_DATA_CLEARED.equals(intent.getAction())) {
|
|
Uri data = intent.getData();
|
|
if (data != null) {
|
|
String pkgName = data.getSchemeSpecificPart();
|
|
if (pkgName != null) {
|
|
skipPackages = new String[] { pkgName };
|
|
}
|
|
}
|
|
} else if (Intent.ACTION_EXTERNAL_APPLICATIONS_AVAILABLE.equals(intent.getAction())) {
|
|
skipPackages = intent.getStringArrayExtra(Intent.EXTRA_CHANGED_PACKAGE_LIST);
|
|
}
|
|
if (skipPackages != null && (skipPackages.length > 0)) {
|
|
for (String skipPackage : skipPackages) {
|
|
if (skipPackage != null) {
|
|
int NT = receivers.size();
|
|
for (int it=0; it<NT; it++) {
|
|
ResolveInfo curt = (ResolveInfo)receivers.get(it);
|
|
if (curt.activityInfo.packageName.equals(skipPackage)) {
|
|
receivers.remove(it);
|
|
it--;
|
|
NT--;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
int NT = receivers != null ? receivers.size() : 0;
|
|
int it = 0;
|
|
ResolveInfo curt = null;
|
|
BroadcastFilter curr = null;
|
|
while (it < NT && ir < NR) {
|
|
if (curt == null) {
|
|
curt = (ResolveInfo)receivers.get(it);
|
|
}
|
|
if (curr == null) {
|
|
curr = registeredReceivers.get(ir);
|
|
}
|
|
if (curr.getPriority() >= curt.priority) {
|
|
// Insert this broadcast record into the final list.
|
|
receivers.add(it, curr);
|
|
ir++;
|
|
curr = null;
|
|
it++;
|
|
NT++;
|
|
} else {
|
|
// Skip to the next ResolveInfo in the final list.
|
|
it++;
|
|
curt = null;
|
|
}
|
|
}
|
|
}
|
|
while (ir < NR) {
|
|
if (receivers == null) {
|
|
receivers = new ArrayList();
|
|
}
|
|
receivers.add(registeredReceivers.get(ir));
|
|
ir++;
|
|
}
|
|
|
|
if ((receivers != null && receivers.size() > 0)
|
|
|| resultTo != null) {
|
|
BroadcastQueue queue = broadcastQueueForIntent(intent);
|
|
BroadcastRecord r = new BroadcastRecord(queue, intent, callerApp,
|
|
callerPackage, callingPid, callingUid, requiredPermission,
|
|
receivers, resultTo, resultCode, resultData, map, ordered,
|
|
sticky, false, userId);
|
|
if (DEBUG_BROADCAST) Slog.v(
|
|
TAG, "Enqueueing ordered broadcast " + r
|
|
+ ": prev had " + queue.mOrderedBroadcasts.size());
|
|
if (DEBUG_BROADCAST) {
|
|
int seq = r.intent.getIntExtra("seq", -1);
|
|
Slog.i(TAG, "Enqueueing broadcast " + r.intent.getAction() + " seq=" + seq);
|
|
}
|
|
boolean replaced = replacePending && queue.replaceOrderedBroadcastLocked(r);
|
|
if (!replaced) {
|
|
queue.enqueueOrderedBroadcastLocked(r);
|
|
queue.scheduleBroadcastsLocked();
|
|
}
|
|
}
|
|
|
|
return ActivityManager.BROADCAST_SUCCESS;
|
|
}
|
|
|
|
final Intent verifyBroadcastLocked(Intent intent) {
|
|
// Refuse possible leaked file descriptors
|
|
if (intent != null && intent.hasFileDescriptors() == true) {
|
|
throw new IllegalArgumentException("File descriptors passed in Intent");
|
|
}
|
|
|
|
int flags = intent.getFlags();
|
|
|
|
if (!mProcessesReady) {
|
|
// if the caller really truly claims to know what they're doing, go
|
|
// ahead and allow the broadcast without launching any receivers
|
|
if ((flags&Intent.FLAG_RECEIVER_REGISTERED_ONLY_BEFORE_BOOT) != 0) {
|
|
intent = new Intent(intent);
|
|
intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY);
|
|
} else if ((flags&Intent.FLAG_RECEIVER_REGISTERED_ONLY) == 0) {
|
|
Slog.e(TAG, "Attempt to launch receivers of broadcast intent " + intent
|
|
+ " before boot completion");
|
|
throw new IllegalStateException("Cannot broadcast before boot completed");
|
|
}
|
|
}
|
|
|
|
if ((flags&Intent.FLAG_RECEIVER_BOOT_UPGRADE) != 0) {
|
|
throw new IllegalArgumentException(
|
|
"Can't use FLAG_RECEIVER_BOOT_UPGRADE here");
|
|
}
|
|
|
|
return intent;
|
|
}
|
|
|
|
public final int broadcastIntent(IApplicationThread caller,
|
|
Intent intent, String resolvedType, IIntentReceiver resultTo,
|
|
int resultCode, String resultData, Bundle map,
|
|
String requiredPermission, boolean serialized, boolean sticky, int userId) {
|
|
enforceNotIsolatedCaller("broadcastIntent");
|
|
synchronized(this) {
|
|
intent = verifyBroadcastLocked(intent);
|
|
|
|
final ProcessRecord callerApp = getRecordForAppLocked(caller);
|
|
final int callingPid = Binder.getCallingPid();
|
|
final int callingUid = Binder.getCallingUid();
|
|
final long origId = Binder.clearCallingIdentity();
|
|
int res = broadcastIntentLocked(callerApp,
|
|
callerApp != null ? callerApp.info.packageName : null,
|
|
intent, resolvedType, resultTo,
|
|
resultCode, resultData, map, requiredPermission, serialized, sticky,
|
|
callingPid, callingUid, userId);
|
|
Binder.restoreCallingIdentity(origId);
|
|
return res;
|
|
}
|
|
}
|
|
|
|
int broadcastIntentInPackage(String packageName, int uid,
|
|
Intent intent, String resolvedType, IIntentReceiver resultTo,
|
|
int resultCode, String resultData, Bundle map,
|
|
String requiredPermission, boolean serialized, boolean sticky, int userId) {
|
|
synchronized(this) {
|
|
intent = verifyBroadcastLocked(intent);
|
|
|
|
final long origId = Binder.clearCallingIdentity();
|
|
int res = broadcastIntentLocked(null, packageName, intent, resolvedType,
|
|
resultTo, resultCode, resultData, map, requiredPermission,
|
|
serialized, sticky, -1, uid, userId);
|
|
Binder.restoreCallingIdentity(origId);
|
|
return res;
|
|
}
|
|
}
|
|
|
|
// TODO: Use the userId; maybe mStickyBroadcasts need to be tied to the user.
|
|
public final void unbroadcastIntent(IApplicationThread caller, Intent intent, int userId) {
|
|
// Refuse possible leaked file descriptors
|
|
if (intent != null && intent.hasFileDescriptors() == true) {
|
|
throw new IllegalArgumentException("File descriptors passed in Intent");
|
|
}
|
|
|
|
synchronized(this) {
|
|
if (checkCallingPermission(android.Manifest.permission.BROADCAST_STICKY)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
String msg = "Permission Denial: unbroadcastIntent() from pid="
|
|
+ Binder.getCallingPid()
|
|
+ ", uid=" + Binder.getCallingUid()
|
|
+ " requires " + android.Manifest.permission.BROADCAST_STICKY;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
ArrayList<Intent> list = mStickyBroadcasts.get(intent.getAction());
|
|
if (list != null) {
|
|
int N = list.size();
|
|
int i;
|
|
for (i=0; i<N; i++) {
|
|
if (intent.filterEquals(list.get(i))) {
|
|
list.remove(i);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
private final boolean finishReceiverLocked(IBinder receiver, int resultCode,
|
|
String resultData, Bundle resultExtras, boolean resultAbort,
|
|
boolean explicit) {
|
|
final BroadcastRecord r = broadcastRecordForReceiverLocked(receiver);
|
|
if (r == null) {
|
|
Slog.w(TAG, "finishReceiver called but not found on queue");
|
|
return false;
|
|
}
|
|
|
|
return r.queue.finishReceiverLocked(r, resultCode, resultData, resultExtras, resultAbort,
|
|
explicit);
|
|
}
|
|
|
|
public void finishReceiver(IBinder who, int resultCode, String resultData,
|
|
Bundle resultExtras, boolean resultAbort) {
|
|
if (DEBUG_BROADCAST) Slog.v(TAG, "Finish receiver: " + who);
|
|
|
|
// Refuse possible leaked file descriptors
|
|
if (resultExtras != null && resultExtras.hasFileDescriptors()) {
|
|
throw new IllegalArgumentException("File descriptors passed in Bundle");
|
|
}
|
|
|
|
final long origId = Binder.clearCallingIdentity();
|
|
try {
|
|
boolean doNext = false;
|
|
BroadcastRecord r = null;
|
|
|
|
synchronized(this) {
|
|
r = broadcastRecordForReceiverLocked(who);
|
|
if (r != null) {
|
|
doNext = r.queue.finishReceiverLocked(r, resultCode,
|
|
resultData, resultExtras, resultAbort, true);
|
|
}
|
|
}
|
|
|
|
if (doNext) {
|
|
r.queue.processNextBroadcast(false);
|
|
}
|
|
trimApplications();
|
|
} finally {
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
}
|
|
|
|
// =========================================================
|
|
// INSTRUMENTATION
|
|
// =========================================================
|
|
|
|
public boolean startInstrumentation(ComponentName className,
|
|
String profileFile, int flags, Bundle arguments,
|
|
IInstrumentationWatcher watcher) {
|
|
enforceNotIsolatedCaller("startInstrumentation");
|
|
// Refuse possible leaked file descriptors
|
|
if (arguments != null && arguments.hasFileDescriptors()) {
|
|
throw new IllegalArgumentException("File descriptors passed in Bundle");
|
|
}
|
|
|
|
synchronized(this) {
|
|
InstrumentationInfo ii = null;
|
|
ApplicationInfo ai = null;
|
|
try {
|
|
ii = mContext.getPackageManager().getInstrumentationInfo(
|
|
className, STOCK_PM_FLAGS);
|
|
ai = mContext.getPackageManager().getApplicationInfo(
|
|
ii.targetPackage, STOCK_PM_FLAGS);
|
|
} catch (PackageManager.NameNotFoundException e) {
|
|
}
|
|
if (ii == null) {
|
|
reportStartInstrumentationFailure(watcher, className,
|
|
"Unable to find instrumentation info for: " + className);
|
|
return false;
|
|
}
|
|
if (ai == null) {
|
|
reportStartInstrumentationFailure(watcher, className,
|
|
"Unable to find instrumentation target package: " + ii.targetPackage);
|
|
return false;
|
|
}
|
|
|
|
int match = mContext.getPackageManager().checkSignatures(
|
|
ii.targetPackage, ii.packageName);
|
|
if (match < 0 && match != PackageManager.SIGNATURE_FIRST_NOT_SIGNED) {
|
|
String msg = "Permission Denial: starting instrumentation "
|
|
+ className + " from pid="
|
|
+ Binder.getCallingPid()
|
|
+ ", uid=" + Binder.getCallingPid()
|
|
+ " not allowed because package " + ii.packageName
|
|
+ " does not have a signature matching the target "
|
|
+ ii.targetPackage;
|
|
reportStartInstrumentationFailure(watcher, className, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
|
|
int userId = UserHandle.getCallingUserId();
|
|
final long origId = Binder.clearCallingIdentity();
|
|
// Instrumentation can kill and relaunch even persistent processes
|
|
forceStopPackageLocked(ii.targetPackage, -1, true, false, true, true, userId);
|
|
ProcessRecord app = addAppLocked(ai, false);
|
|
app.instrumentationClass = className;
|
|
app.instrumentationInfo = ai;
|
|
app.instrumentationProfileFile = profileFile;
|
|
app.instrumentationArguments = arguments;
|
|
app.instrumentationWatcher = watcher;
|
|
app.instrumentationResultClass = className;
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* Report errors that occur while attempting to start Instrumentation. Always writes the
|
|
* error to the logs, but if somebody is watching, send the report there too. This enables
|
|
* the "am" command to report errors with more information.
|
|
*
|
|
* @param watcher The IInstrumentationWatcher. Null if there isn't one.
|
|
* @param cn The component name of the instrumentation.
|
|
* @param report The error report.
|
|
*/
|
|
private void reportStartInstrumentationFailure(IInstrumentationWatcher watcher,
|
|
ComponentName cn, String report) {
|
|
Slog.w(TAG, report);
|
|
try {
|
|
if (watcher != null) {
|
|
Bundle results = new Bundle();
|
|
results.putString(Instrumentation.REPORT_KEY_IDENTIFIER, "ActivityManagerService");
|
|
results.putString("Error", report);
|
|
watcher.instrumentationStatus(cn, -1, results);
|
|
}
|
|
} catch (RemoteException e) {
|
|
Slog.w(TAG, e);
|
|
}
|
|
}
|
|
|
|
void finishInstrumentationLocked(ProcessRecord app, int resultCode, Bundle results) {
|
|
if (app.instrumentationWatcher != null) {
|
|
try {
|
|
// NOTE: IInstrumentationWatcher *must* be oneway here
|
|
app.instrumentationWatcher.instrumentationFinished(
|
|
app.instrumentationClass,
|
|
resultCode,
|
|
results);
|
|
} catch (RemoteException e) {
|
|
}
|
|
}
|
|
app.instrumentationWatcher = null;
|
|
app.instrumentationClass = null;
|
|
app.instrumentationInfo = null;
|
|
app.instrumentationProfileFile = null;
|
|
app.instrumentationArguments = null;
|
|
|
|
forceStopPackageLocked(app.info.packageName, -1, false, false, true, true, app.userId);
|
|
}
|
|
|
|
public void finishInstrumentation(IApplicationThread target,
|
|
int resultCode, Bundle results) {
|
|
int userId = UserHandle.getCallingUserId();
|
|
// Refuse possible leaked file descriptors
|
|
if (results != null && results.hasFileDescriptors()) {
|
|
throw new IllegalArgumentException("File descriptors passed in Intent");
|
|
}
|
|
|
|
synchronized(this) {
|
|
ProcessRecord app = getRecordForAppLocked(target);
|
|
if (app == null) {
|
|
Slog.w(TAG, "finishInstrumentation: no app for " + target);
|
|
return;
|
|
}
|
|
final long origId = Binder.clearCallingIdentity();
|
|
finishInstrumentationLocked(app, resultCode, results);
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
}
|
|
|
|
// =========================================================
|
|
// CONFIGURATION
|
|
// =========================================================
|
|
|
|
public ConfigurationInfo getDeviceConfigurationInfo() {
|
|
ConfigurationInfo config = new ConfigurationInfo();
|
|
synchronized (this) {
|
|
config.reqTouchScreen = mConfiguration.touchscreen;
|
|
config.reqKeyboardType = mConfiguration.keyboard;
|
|
config.reqNavigation = mConfiguration.navigation;
|
|
if (mConfiguration.navigation == Configuration.NAVIGATION_DPAD
|
|
|| mConfiguration.navigation == Configuration.NAVIGATION_TRACKBALL) {
|
|
config.reqInputFeatures |= ConfigurationInfo.INPUT_FEATURE_FIVE_WAY_NAV;
|
|
}
|
|
if (mConfiguration.keyboard != Configuration.KEYBOARD_UNDEFINED
|
|
&& mConfiguration.keyboard != Configuration.KEYBOARD_NOKEYS) {
|
|
config.reqInputFeatures |= ConfigurationInfo.INPUT_FEATURE_HARD_KEYBOARD;
|
|
}
|
|
config.reqGlEsVersion = GL_ES_VERSION;
|
|
}
|
|
return config;
|
|
}
|
|
|
|
public Configuration getConfiguration() {
|
|
Configuration ci;
|
|
synchronized(this) {
|
|
ci = new Configuration(mConfiguration);
|
|
}
|
|
return ci;
|
|
}
|
|
|
|
public void updatePersistentConfiguration(Configuration values) {
|
|
enforceCallingPermission(android.Manifest.permission.CHANGE_CONFIGURATION,
|
|
"updateConfiguration()");
|
|
enforceCallingPermission(android.Manifest.permission.WRITE_SETTINGS,
|
|
"updateConfiguration()");
|
|
if (values == null) {
|
|
throw new NullPointerException("Configuration must not be null");
|
|
}
|
|
|
|
synchronized(this) {
|
|
final long origId = Binder.clearCallingIdentity();
|
|
updateConfigurationLocked(values, null, true, false);
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
}
|
|
|
|
public void updateConfiguration(Configuration values) {
|
|
enforceCallingPermission(android.Manifest.permission.CHANGE_CONFIGURATION,
|
|
"updateConfiguration()");
|
|
|
|
synchronized(this) {
|
|
if (values == null && mWindowManager != null) {
|
|
// sentinel: fetch the current configuration from the window manager
|
|
values = mWindowManager.computeNewConfiguration();
|
|
}
|
|
|
|
if (mWindowManager != null) {
|
|
mProcessList.applyDisplaySize(mWindowManager);
|
|
}
|
|
|
|
final long origId = Binder.clearCallingIdentity();
|
|
if (values != null) {
|
|
Settings.System.clearConfiguration(values);
|
|
}
|
|
updateConfigurationLocked(values, null, false, false);
|
|
Binder.restoreCallingIdentity(origId);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Do either or both things: (1) change the current configuration, and (2)
|
|
* make sure the given activity is running with the (now) current
|
|
* configuration. Returns true if the activity has been left running, or
|
|
* false if <var>starting</var> is being destroyed to match the new
|
|
* configuration.
|
|
* @param persistent TODO
|
|
*/
|
|
boolean updateConfigurationLocked(Configuration values,
|
|
ActivityRecord starting, boolean persistent, boolean initLocale) {
|
|
// do nothing if we are headless
|
|
if (mHeadless) return true;
|
|
|
|
int changes = 0;
|
|
|
|
boolean kept = true;
|
|
|
|
if (values != null) {
|
|
Configuration newConfig = new Configuration(mConfiguration);
|
|
changes = newConfig.updateFrom(values);
|
|
if (changes != 0) {
|
|
if (DEBUG_SWITCH || DEBUG_CONFIGURATION) {
|
|
Slog.i(TAG, "Updating configuration to: " + values);
|
|
}
|
|
|
|
EventLog.writeEvent(EventLogTags.CONFIGURATION_CHANGED, changes);
|
|
|
|
if (values.locale != null && !initLocale) {
|
|
saveLocaleLocked(values.locale,
|
|
!values.locale.equals(mConfiguration.locale),
|
|
values.userSetLocale);
|
|
}
|
|
|
|
mConfigurationSeq++;
|
|
if (mConfigurationSeq <= 0) {
|
|
mConfigurationSeq = 1;
|
|
}
|
|
newConfig.seq = mConfigurationSeq;
|
|
mConfiguration = newConfig;
|
|
Slog.i(TAG, "Config changed: " + newConfig);
|
|
|
|
final Configuration configCopy = new Configuration(mConfiguration);
|
|
|
|
// TODO: If our config changes, should we auto dismiss any currently
|
|
// showing dialogs?
|
|
mShowDialogs = shouldShowDialogs(newConfig);
|
|
|
|
AttributeCache ac = AttributeCache.instance();
|
|
if (ac != null) {
|
|
ac.updateConfiguration(configCopy);
|
|
}
|
|
|
|
// Make sure all resources in our process are updated
|
|
// right now, so that anyone who is going to retrieve
|
|
// resource values after we return will be sure to get
|
|
// the new ones. This is especially important during
|
|
// boot, where the first config change needs to guarantee
|
|
// all resources have that config before following boot
|
|
// code is executed.
|
|
mSystemThread.applyConfigurationToResources(configCopy);
|
|
|
|
if (persistent && Settings.System.hasInterestingConfigurationChanges(changes)) {
|
|
Message msg = mHandler.obtainMessage(UPDATE_CONFIGURATION_MSG);
|
|
msg.obj = new Configuration(configCopy);
|
|
mHandler.sendMessage(msg);
|
|
}
|
|
|
|
for (int i=mLruProcesses.size()-1; i>=0; i--) {
|
|
ProcessRecord app = mLruProcesses.get(i);
|
|
try {
|
|
if (app.thread != null) {
|
|
if (DEBUG_CONFIGURATION) Slog.v(TAG, "Sending to proc "
|
|
+ app.processName + " new config " + mConfiguration);
|
|
app.thread.scheduleConfigurationChanged(configCopy);
|
|
}
|
|
} catch (Exception e) {
|
|
}
|
|
}
|
|
Intent intent = new Intent(Intent.ACTION_CONFIGURATION_CHANGED);
|
|
intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY
|
|
| Intent.FLAG_RECEIVER_REPLACE_PENDING);
|
|
broadcastIntentLocked(null, null, intent, null, null, 0, null, null,
|
|
null, false, false, MY_PID, Process.SYSTEM_UID, 0 /* TODO: Verify */);
|
|
if ((changes&ActivityInfo.CONFIG_LOCALE) != 0) {
|
|
broadcastIntentLocked(null, null,
|
|
new Intent(Intent.ACTION_LOCALE_CHANGED),
|
|
null, null, 0, null, null,
|
|
null, false, false, MY_PID, Process.SYSTEM_UID, 0 /* TODO: Verify */);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (changes != 0 && starting == null) {
|
|
// If the configuration changed, and the caller is not already
|
|
// in the process of starting an activity, then find the top
|
|
// activity to check if its configuration needs to change.
|
|
starting = mMainStack.topRunningActivityLocked(null);
|
|
}
|
|
|
|
if (starting != null) {
|
|
kept = mMainStack.ensureActivityConfigurationLocked(starting, changes);
|
|
// And we need to make sure at this point that all other activities
|
|
// are made visible with the correct configuration.
|
|
mMainStack.ensureActivitiesVisibleLocked(starting, changes);
|
|
}
|
|
|
|
if (values != null && mWindowManager != null) {
|
|
mWindowManager.setNewConfiguration(mConfiguration);
|
|
}
|
|
|
|
return kept;
|
|
}
|
|
|
|
/**
|
|
* Decide based on the configuration whether we should shouw the ANR,
|
|
* crash, etc dialogs. The idea is that if there is no affordnace to
|
|
* press the on-screen buttons, we shouldn't show the dialog.
|
|
*
|
|
* A thought: SystemUI might also want to get told about this, the Power
|
|
* dialog / global actions also might want different behaviors.
|
|
*/
|
|
private static final boolean shouldShowDialogs(Configuration config) {
|
|
return !(config.keyboard == Configuration.KEYBOARD_NOKEYS
|
|
&& config.touchscreen == Configuration.TOUCHSCREEN_NOTOUCH);
|
|
}
|
|
|
|
/**
|
|
* Save the locale. You must be inside a synchronized (this) block.
|
|
*/
|
|
private void saveLocaleLocked(Locale l, boolean isDiff, boolean isPersist) {
|
|
if(isDiff) {
|
|
SystemProperties.set("user.language", l.getLanguage());
|
|
SystemProperties.set("user.region", l.getCountry());
|
|
}
|
|
|
|
if(isPersist) {
|
|
SystemProperties.set("persist.sys.language", l.getLanguage());
|
|
SystemProperties.set("persist.sys.country", l.getCountry());
|
|
SystemProperties.set("persist.sys.localevar", l.getVariant());
|
|
}
|
|
}
|
|
|
|
@Override
|
|
public boolean targetTaskAffinityMatchesActivity(IBinder token, String destAffinity) {
|
|
ActivityRecord srec = ActivityRecord.forToken(token);
|
|
return srec != null && srec.task.affinity != null &&
|
|
srec.task.affinity.equals(destAffinity);
|
|
}
|
|
|
|
public boolean navigateUpTo(IBinder token, Intent destIntent, int resultCode,
|
|
Intent resultData) {
|
|
ComponentName dest = destIntent.getComponent();
|
|
|
|
synchronized (this) {
|
|
ActivityRecord srec = ActivityRecord.forToken(token);
|
|
if (srec == null) {
|
|
return false;
|
|
}
|
|
ArrayList<ActivityRecord> history = srec.stack.mHistory;
|
|
final int start = history.indexOf(srec);
|
|
if (start < 0) {
|
|
// Current activity is not in history stack; do nothing.
|
|
return false;
|
|
}
|
|
int finishTo = start - 1;
|
|
ActivityRecord parent = null;
|
|
boolean foundParentInTask = false;
|
|
if (dest != null) {
|
|
TaskRecord tr = srec.task;
|
|
for (int i = start - 1; i >= 0; i--) {
|
|
ActivityRecord r = history.get(i);
|
|
if (tr != r.task) {
|
|
// Couldn't find parent in the same task; stop at the one above this.
|
|
// (Root of current task; in-app "home" behavior)
|
|
// Always at least finish the current activity.
|
|
finishTo = Math.min(start - 1, i + 1);
|
|
parent = history.get(finishTo);
|
|
break;
|
|
} else if (r.info.packageName.equals(dest.getPackageName()) &&
|
|
r.info.name.equals(dest.getClassName())) {
|
|
finishTo = i;
|
|
parent = r;
|
|
foundParentInTask = true;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (mController != null) {
|
|
ActivityRecord next = mMainStack.topRunningActivityLocked(token, 0);
|
|
if (next != null) {
|
|
// ask watcher if this is allowed
|
|
boolean resumeOK = true;
|
|
try {
|
|
resumeOK = mController.activityResuming(next.packageName);
|
|
} catch (RemoteException e) {
|
|
mController = null;
|
|
}
|
|
|
|
if (!resumeOK) {
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
final long origId = Binder.clearCallingIdentity();
|
|
for (int i = start; i > finishTo; i--) {
|
|
ActivityRecord r = history.get(i);
|
|
mMainStack.requestFinishActivityLocked(r.appToken, resultCode, resultData,
|
|
"navigate-up");
|
|
// Only return the supplied result for the first activity finished
|
|
resultCode = Activity.RESULT_CANCELED;
|
|
resultData = null;
|
|
}
|
|
|
|
if (parent != null && foundParentInTask) {
|
|
final int parentLaunchMode = parent.info.launchMode;
|
|
final int destIntentFlags = destIntent.getFlags();
|
|
if (parentLaunchMode == ActivityInfo.LAUNCH_SINGLE_INSTANCE ||
|
|
parentLaunchMode == ActivityInfo.LAUNCH_SINGLE_TASK ||
|
|
parentLaunchMode == ActivityInfo.LAUNCH_SINGLE_TOP ||
|
|
(destIntentFlags & Intent.FLAG_ACTIVITY_CLEAR_TOP) != 0) {
|
|
parent.deliverNewIntentLocked(srec.info.applicationInfo.uid, destIntent);
|
|
} else {
|
|
try {
|
|
ActivityInfo aInfo = AppGlobals.getPackageManager().getActivityInfo(
|
|
destIntent.getComponent(), 0, UserHandle.getCallingUserId());
|
|
int res = mMainStack.startActivityLocked(srec.app.thread, destIntent,
|
|
null, aInfo, parent.appToken, null,
|
|
0, -1, parent.launchedFromUid, 0, null, true, null);
|
|
foundParentInTask = res == ActivityManager.START_SUCCESS;
|
|
} catch (RemoteException e) {
|
|
foundParentInTask = false;
|
|
}
|
|
mMainStack.requestFinishActivityLocked(parent.appToken, resultCode,
|
|
resultData, "navigate-up");
|
|
}
|
|
}
|
|
Binder.restoreCallingIdentity(origId);
|
|
return foundParentInTask;
|
|
}
|
|
}
|
|
|
|
public int getLaunchedFromUid(IBinder activityToken) {
|
|
ActivityRecord srec = ActivityRecord.forToken(activityToken);
|
|
if (srec == null) {
|
|
return -1;
|
|
}
|
|
return srec.launchedFromUid;
|
|
}
|
|
|
|
// =========================================================
|
|
// LIFETIME MANAGEMENT
|
|
// =========================================================
|
|
|
|
// Returns which broadcast queue the app is the current [or imminent] receiver
|
|
// on, or 'null' if the app is not an active broadcast recipient.
|
|
private BroadcastQueue isReceivingBroadcast(ProcessRecord app) {
|
|
BroadcastRecord r = app.curReceiver;
|
|
if (r != null) {
|
|
return r.queue;
|
|
}
|
|
|
|
// It's not the current receiver, but it might be starting up to become one
|
|
synchronized (this) {
|
|
for (BroadcastQueue queue : mBroadcastQueues) {
|
|
r = queue.mPendingBroadcast;
|
|
if (r != null && r.curApp == app) {
|
|
// found it; report which queue it's in
|
|
return queue;
|
|
}
|
|
}
|
|
}
|
|
|
|
return null;
|
|
}
|
|
|
|
private final int computeOomAdjLocked(ProcessRecord app, int hiddenAdj,
|
|
int emptyAdj, ProcessRecord TOP_APP, boolean recursed, boolean doingAll) {
|
|
if (mAdjSeq == app.adjSeq) {
|
|
// This adjustment has already been computed. If we are calling
|
|
// from the top, we may have already computed our adjustment with
|
|
// an earlier hidden adjustment that isn't really for us... if
|
|
// so, use the new hidden adjustment.
|
|
if (!recursed && app.hidden) {
|
|
app.curAdj = app.curRawAdj = app.nonStoppingAdj =
|
|
app.hasActivities ? hiddenAdj : emptyAdj;
|
|
}
|
|
return app.curRawAdj;
|
|
}
|
|
|
|
if (app.thread == null) {
|
|
app.adjSeq = mAdjSeq;
|
|
app.curSchedGroup = Process.THREAD_GROUP_BG_NONINTERACTIVE;
|
|
return (app.curAdj=app.curRawAdj=ProcessList.HIDDEN_APP_MAX_ADJ);
|
|
}
|
|
|
|
app.adjTypeCode = ActivityManager.RunningAppProcessInfo.REASON_UNKNOWN;
|
|
app.adjSource = null;
|
|
app.adjTarget = null;
|
|
app.empty = false;
|
|
app.hidden = false;
|
|
|
|
final int activitiesSize = app.activities.size();
|
|
|
|
if (app.maxAdj <= ProcessList.FOREGROUND_APP_ADJ) {
|
|
// The max adjustment doesn't allow this app to be anything
|
|
// below foreground, so it is not worth doing work for it.
|
|
app.adjType = "fixed";
|
|
app.adjSeq = mAdjSeq;
|
|
app.curRawAdj = app.nonStoppingAdj = app.maxAdj;
|
|
app.hasActivities = false;
|
|
app.foregroundActivities = false;
|
|
app.keeping = true;
|
|
app.curSchedGroup = Process.THREAD_GROUP_DEFAULT;
|
|
// System process can do UI, and when they do we want to have
|
|
// them trim their memory after the user leaves the UI. To
|
|
// facilitate this, here we need to determine whether or not it
|
|
// is currently showing UI.
|
|
app.systemNoUi = true;
|
|
if (app == TOP_APP) {
|
|
app.systemNoUi = false;
|
|
app.hasActivities = true;
|
|
} else if (activitiesSize > 0) {
|
|
for (int j = 0; j < activitiesSize; j++) {
|
|
final ActivityRecord r = app.activities.get(j);
|
|
if (r.visible) {
|
|
app.systemNoUi = false;
|
|
}
|
|
if (r.app == app) {
|
|
app.hasActivities = true;
|
|
}
|
|
}
|
|
}
|
|
return (app.curAdj=app.maxAdj);
|
|
}
|
|
|
|
app.keeping = false;
|
|
app.systemNoUi = false;
|
|
app.hasActivities = false;
|
|
|
|
// Determine the importance of the process, starting with most
|
|
// important to least, and assign an appropriate OOM adjustment.
|
|
int adj;
|
|
int schedGroup;
|
|
boolean foregroundActivities = false;
|
|
boolean interesting = false;
|
|
BroadcastQueue queue;
|
|
if (app == TOP_APP) {
|
|
// The last app on the list is the foreground app.
|
|
adj = ProcessList.FOREGROUND_APP_ADJ;
|
|
schedGroup = Process.THREAD_GROUP_DEFAULT;
|
|
app.adjType = "top-activity";
|
|
foregroundActivities = true;
|
|
interesting = true;
|
|
app.hasActivities = true;
|
|
} else if (app.instrumentationClass != null) {
|
|
// Don't want to kill running instrumentation.
|
|
adj = ProcessList.FOREGROUND_APP_ADJ;
|
|
schedGroup = Process.THREAD_GROUP_DEFAULT;
|
|
app.adjType = "instrumentation";
|
|
interesting = true;
|
|
} else if ((queue = isReceivingBroadcast(app)) != null) {
|
|
// An app that is currently receiving a broadcast also
|
|
// counts as being in the foreground for OOM killer purposes.
|
|
// It's placed in a sched group based on the nature of the
|
|
// broadcast as reflected by which queue it's active in.
|
|
adj = ProcessList.FOREGROUND_APP_ADJ;
|
|
schedGroup = (queue == mFgBroadcastQueue)
|
|
? Process.THREAD_GROUP_DEFAULT : Process.THREAD_GROUP_BG_NONINTERACTIVE;
|
|
app.adjType = "broadcast";
|
|
} else if (app.executingServices.size() > 0) {
|
|
// An app that is currently executing a service callback also
|
|
// counts as being in the foreground.
|
|
adj = ProcessList.FOREGROUND_APP_ADJ;
|
|
schedGroup = Process.THREAD_GROUP_DEFAULT;
|
|
app.adjType = "exec-service";
|
|
} else {
|
|
// Assume process is hidden (has activities); we will correct
|
|
// later if this is not the case.
|
|
adj = hiddenAdj;
|
|
schedGroup = Process.THREAD_GROUP_BG_NONINTERACTIVE;
|
|
app.hidden = true;
|
|
app.adjType = "bg-activities";
|
|
}
|
|
|
|
boolean hasStoppingActivities = false;
|
|
|
|
// Examine all activities if not already foreground.
|
|
if (!foregroundActivities && activitiesSize > 0) {
|
|
for (int j = 0; j < activitiesSize; j++) {
|
|
final ActivityRecord r = app.activities.get(j);
|
|
if (r.visible) {
|
|
// App has a visible activity; only upgrade adjustment.
|
|
if (adj > ProcessList.VISIBLE_APP_ADJ) {
|
|
adj = ProcessList.VISIBLE_APP_ADJ;
|
|
app.adjType = "visible";
|
|
}
|
|
schedGroup = Process.THREAD_GROUP_DEFAULT;
|
|
app.hidden = false;
|
|
app.hasActivities = true;
|
|
foregroundActivities = true;
|
|
break;
|
|
} else if (r.state == ActivityState.PAUSING || r.state == ActivityState.PAUSED) {
|
|
if (adj > ProcessList.PERCEPTIBLE_APP_ADJ) {
|
|
adj = ProcessList.PERCEPTIBLE_APP_ADJ;
|
|
app.adjType = "pausing";
|
|
}
|
|
app.hidden = false;
|
|
foregroundActivities = true;
|
|
} else if (r.state == ActivityState.STOPPING) {
|
|
// We will apply the actual adjustment later, because
|
|
// we want to allow this process to immediately go through
|
|
// any memory trimming that is in effect.
|
|
app.hidden = false;
|
|
foregroundActivities = true;
|
|
hasStoppingActivities = true;
|
|
}
|
|
if (r.app == app) {
|
|
app.hasActivities = true;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (adj == hiddenAdj && !app.hasActivities) {
|
|
// Whoops, this process is completely empty as far as we know
|
|
// at this point.
|
|
adj = emptyAdj;
|
|
app.empty = true;
|
|
app.adjType = "bg-empty";
|
|
}
|
|
|
|
if (adj > ProcessList.PERCEPTIBLE_APP_ADJ) {
|
|
if (app.foregroundServices) {
|
|
// The user is aware of this app, so make it visible.
|
|
adj = ProcessList.PERCEPTIBLE_APP_ADJ;
|
|
app.hidden = false;
|
|
app.adjType = "foreground-service";
|
|
schedGroup = Process.THREAD_GROUP_DEFAULT;
|
|
} else if (app.forcingToForeground != null) {
|
|
// The user is aware of this app, so make it visible.
|
|
adj = ProcessList.PERCEPTIBLE_APP_ADJ;
|
|
app.hidden = false;
|
|
app.adjType = "force-foreground";
|
|
app.adjSource = app.forcingToForeground;
|
|
schedGroup = Process.THREAD_GROUP_DEFAULT;
|
|
}
|
|
}
|
|
|
|
if (app.foregroundServices) {
|
|
interesting = true;
|
|
}
|
|
|
|
if (adj > ProcessList.HEAVY_WEIGHT_APP_ADJ && app == mHeavyWeightProcess) {
|
|
// We don't want to kill the current heavy-weight process.
|
|
adj = ProcessList.HEAVY_WEIGHT_APP_ADJ;
|
|
schedGroup = Process.THREAD_GROUP_BG_NONINTERACTIVE;
|
|
app.hidden = false;
|
|
app.adjType = "heavy";
|
|
}
|
|
|
|
if (adj > ProcessList.HOME_APP_ADJ && app == mHomeProcess) {
|
|
// This process is hosting what we currently consider to be the
|
|
// home app, so we don't want to let it go into the background.
|
|
adj = ProcessList.HOME_APP_ADJ;
|
|
schedGroup = Process.THREAD_GROUP_BG_NONINTERACTIVE;
|
|
app.hidden = false;
|
|
app.adjType = "home";
|
|
}
|
|
|
|
if (adj > ProcessList.PREVIOUS_APP_ADJ && app == mPreviousProcess
|
|
&& app.activities.size() > 0) {
|
|
// This was the previous process that showed UI to the user.
|
|
// We want to try to keep it around more aggressively, to give
|
|
// a good experience around switching between two apps.
|
|
adj = ProcessList.PREVIOUS_APP_ADJ;
|
|
schedGroup = Process.THREAD_GROUP_BG_NONINTERACTIVE;
|
|
app.hidden = false;
|
|
app.adjType = "previous";
|
|
}
|
|
|
|
if (false) Slog.i(TAG, "OOM " + app + ": initial adj=" + adj
|
|
+ " reason=" + app.adjType);
|
|
|
|
// By default, we use the computed adjustment. It may be changed if
|
|
// there are applications dependent on our services or providers, but
|
|
// this gives us a baseline and makes sure we don't get into an
|
|
// infinite recursion.
|
|
app.adjSeq = mAdjSeq;
|
|
app.curRawAdj = app.nonStoppingAdj = adj;
|
|
|
|
if (mBackupTarget != null && app == mBackupTarget.app) {
|
|
// If possible we want to avoid killing apps while they're being backed up
|
|
if (adj > ProcessList.BACKUP_APP_ADJ) {
|
|
if (DEBUG_BACKUP) Slog.v(TAG, "oom BACKUP_APP_ADJ for " + app);
|
|
adj = ProcessList.BACKUP_APP_ADJ;
|
|
app.adjType = "backup";
|
|
app.hidden = false;
|
|
}
|
|
}
|
|
|
|
if (app.services.size() != 0 && (adj > ProcessList.FOREGROUND_APP_ADJ
|
|
|| schedGroup == Process.THREAD_GROUP_BG_NONINTERACTIVE)) {
|
|
final long now = SystemClock.uptimeMillis();
|
|
// This process is more important if the top activity is
|
|
// bound to the service.
|
|
Iterator<ServiceRecord> jt = app.services.iterator();
|
|
while (jt.hasNext() && adj > ProcessList.FOREGROUND_APP_ADJ) {
|
|
ServiceRecord s = jt.next();
|
|
if (s.startRequested) {
|
|
if (app.hasShownUi && app != mHomeProcess) {
|
|
// If this process has shown some UI, let it immediately
|
|
// go to the LRU list because it may be pretty heavy with
|
|
// UI stuff. We'll tag it with a label just to help
|
|
// debug and understand what is going on.
|
|
if (adj > ProcessList.SERVICE_ADJ) {
|
|
app.adjType = "started-bg-ui-services";
|
|
}
|
|
} else {
|
|
if (now < (s.lastActivity + ActiveServices.MAX_SERVICE_INACTIVITY)) {
|
|
// This service has seen some activity within
|
|
// recent memory, so we will keep its process ahead
|
|
// of the background processes.
|
|
if (adj > ProcessList.SERVICE_ADJ) {
|
|
adj = ProcessList.SERVICE_ADJ;
|
|
app.adjType = "started-services";
|
|
app.hidden = false;
|
|
}
|
|
}
|
|
// If we have let the service slide into the background
|
|
// state, still have some text describing what it is doing
|
|
// even though the service no longer has an impact.
|
|
if (adj > ProcessList.SERVICE_ADJ) {
|
|
app.adjType = "started-bg-services";
|
|
}
|
|
}
|
|
// Don't kill this process because it is doing work; it
|
|
// has said it is doing work.
|
|
app.keeping = true;
|
|
}
|
|
if (s.connections.size() > 0 && (adj > ProcessList.FOREGROUND_APP_ADJ
|
|
|| schedGroup == Process.THREAD_GROUP_BG_NONINTERACTIVE)) {
|
|
Iterator<ArrayList<ConnectionRecord>> kt
|
|
= s.connections.values().iterator();
|
|
while (kt.hasNext() && adj > ProcessList.FOREGROUND_APP_ADJ) {
|
|
ArrayList<ConnectionRecord> clist = kt.next();
|
|
for (int i=0; i<clist.size() && adj > ProcessList.FOREGROUND_APP_ADJ; i++) {
|
|
// XXX should compute this based on the max of
|
|
// all connected clients.
|
|
ConnectionRecord cr = clist.get(i);
|
|
if (cr.binding.client == app) {
|
|
// Binding to ourself is not interesting.
|
|
continue;
|
|
}
|
|
if ((cr.flags&Context.BIND_WAIVE_PRIORITY) == 0) {
|
|
ProcessRecord client = cr.binding.client;
|
|
int clientAdj = adj;
|
|
int myHiddenAdj = hiddenAdj;
|
|
if (myHiddenAdj > client.hiddenAdj) {
|
|
if (client.hiddenAdj >= ProcessList.VISIBLE_APP_ADJ) {
|
|
myHiddenAdj = client.hiddenAdj;
|
|
} else {
|
|
myHiddenAdj = ProcessList.VISIBLE_APP_ADJ;
|
|
}
|
|
}
|
|
int myEmptyAdj = emptyAdj;
|
|
if (myEmptyAdj > client.emptyAdj) {
|
|
if (client.emptyAdj >= ProcessList.VISIBLE_APP_ADJ) {
|
|
myEmptyAdj = client.emptyAdj;
|
|
} else {
|
|
myEmptyAdj = ProcessList.VISIBLE_APP_ADJ;
|
|
}
|
|
}
|
|
clientAdj = computeOomAdjLocked(client, myHiddenAdj,
|
|
myEmptyAdj, TOP_APP, true, doingAll);
|
|
String adjType = null;
|
|
if ((cr.flags&Context.BIND_ALLOW_OOM_MANAGEMENT) != 0) {
|
|
// Not doing bind OOM management, so treat
|
|
// this guy more like a started service.
|
|
if (app.hasShownUi && app != mHomeProcess) {
|
|
// If this process has shown some UI, let it immediately
|
|
// go to the LRU list because it may be pretty heavy with
|
|
// UI stuff. We'll tag it with a label just to help
|
|
// debug and understand what is going on.
|
|
if (adj > clientAdj) {
|
|
adjType = "bound-bg-ui-services";
|
|
}
|
|
app.hidden = false;
|
|
clientAdj = adj;
|
|
} else {
|
|
if (now >= (s.lastActivity
|
|
+ ActiveServices.MAX_SERVICE_INACTIVITY)) {
|
|
// This service has not seen activity within
|
|
// recent memory, so allow it to drop to the
|
|
// LRU list if there is no other reason to keep
|
|
// it around. We'll also tag it with a label just
|
|
// to help debug and undertand what is going on.
|
|
if (adj > clientAdj) {
|
|
adjType = "bound-bg-services";
|
|
}
|
|
clientAdj = adj;
|
|
}
|
|
}
|
|
}
|
|
if (adj > clientAdj) {
|
|
// If this process has recently shown UI, and
|
|
// the process that is binding to it is less
|
|
// important than being visible, then we don't
|
|
// care about the binding as much as we care
|
|
// about letting this process get into the LRU
|
|
// list to be killed and restarted if needed for
|
|
// memory.
|
|
if (app.hasShownUi && app != mHomeProcess
|
|
&& clientAdj > ProcessList.PERCEPTIBLE_APP_ADJ) {
|
|
adjType = "bound-bg-ui-services";
|
|
} else {
|
|
if ((cr.flags&(Context.BIND_ABOVE_CLIENT
|
|
|Context.BIND_IMPORTANT)) != 0) {
|
|
adj = clientAdj;
|
|
} else if ((cr.flags&Context.BIND_NOT_VISIBLE) != 0
|
|
&& clientAdj < ProcessList.PERCEPTIBLE_APP_ADJ
|
|
&& adj > ProcessList.PERCEPTIBLE_APP_ADJ) {
|
|
adj = ProcessList.PERCEPTIBLE_APP_ADJ;
|
|
} else if (clientAdj > ProcessList.VISIBLE_APP_ADJ) {
|
|
adj = clientAdj;
|
|
} else {
|
|
app.pendingUiClean = true;
|
|
if (adj > ProcessList.VISIBLE_APP_ADJ) {
|
|
adj = ProcessList.VISIBLE_APP_ADJ;
|
|
}
|
|
}
|
|
if (!client.hidden) {
|
|
app.hidden = false;
|
|
}
|
|
if (client.keeping) {
|
|
app.keeping = true;
|
|
}
|
|
adjType = "service";
|
|
}
|
|
}
|
|
if (adjType != null) {
|
|
app.adjType = adjType;
|
|
app.adjTypeCode = ActivityManager.RunningAppProcessInfo
|
|
.REASON_SERVICE_IN_USE;
|
|
app.adjSource = cr.binding.client;
|
|
app.adjSourceOom = clientAdj;
|
|
app.adjTarget = s.name;
|
|
}
|
|
if ((cr.flags&Context.BIND_NOT_FOREGROUND) == 0) {
|
|
if (client.curSchedGroup == Process.THREAD_GROUP_DEFAULT) {
|
|
schedGroup = Process.THREAD_GROUP_DEFAULT;
|
|
}
|
|
}
|
|
}
|
|
if ((cr.flags&Context.BIND_ADJUST_WITH_ACTIVITY) != 0) {
|
|
ActivityRecord a = cr.activity;
|
|
if (a != null && adj > ProcessList.FOREGROUND_APP_ADJ &&
|
|
(a.visible || a.state == ActivityState.RESUMED
|
|
|| a.state == ActivityState.PAUSING)) {
|
|
adj = ProcessList.FOREGROUND_APP_ADJ;
|
|
if ((cr.flags&Context.BIND_NOT_FOREGROUND) == 0) {
|
|
schedGroup = Process.THREAD_GROUP_DEFAULT;
|
|
}
|
|
app.hidden = false;
|
|
app.adjType = "service";
|
|
app.adjTypeCode = ActivityManager.RunningAppProcessInfo
|
|
.REASON_SERVICE_IN_USE;
|
|
app.adjSource = a;
|
|
app.adjSourceOom = adj;
|
|
app.adjTarget = s.name;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Finally, if this process has active services running in it, we
|
|
// would like to avoid killing it unless it would prevent the current
|
|
// application from running. By default we put the process in
|
|
// with the rest of the background processes; as we scan through
|
|
// its services we may bump it up from there.
|
|
if (adj > hiddenAdj) {
|
|
adj = hiddenAdj;
|
|
app.hidden = false;
|
|
app.adjType = "bg-services";
|
|
}
|
|
}
|
|
|
|
if (app.pubProviders.size() != 0 && (adj > ProcessList.FOREGROUND_APP_ADJ
|
|
|| schedGroup == Process.THREAD_GROUP_BG_NONINTERACTIVE)) {
|
|
Iterator<ContentProviderRecord> jt = app.pubProviders.values().iterator();
|
|
while (jt.hasNext() && (adj > ProcessList.FOREGROUND_APP_ADJ
|
|
|| schedGroup == Process.THREAD_GROUP_BG_NONINTERACTIVE)) {
|
|
ContentProviderRecord cpr = jt.next();
|
|
for (int i = cpr.connections.size()-1;
|
|
i >= 0 && (adj > ProcessList.FOREGROUND_APP_ADJ
|
|
|| schedGroup == Process.THREAD_GROUP_BG_NONINTERACTIVE);
|
|
i--) {
|
|
ContentProviderConnection conn = cpr.connections.get(i);
|
|
ProcessRecord client = conn.client;
|
|
if (client == app) {
|
|
// Being our own client is not interesting.
|
|
continue;
|
|
}
|
|
int myHiddenAdj = hiddenAdj;
|
|
if (myHiddenAdj > client.hiddenAdj) {
|
|
if (client.hiddenAdj > ProcessList.FOREGROUND_APP_ADJ) {
|
|
myHiddenAdj = client.hiddenAdj;
|
|
} else {
|
|
myHiddenAdj = ProcessList.FOREGROUND_APP_ADJ;
|
|
}
|
|
}
|
|
int myEmptyAdj = emptyAdj;
|
|
if (myEmptyAdj > client.emptyAdj) {
|
|
if (client.emptyAdj > ProcessList.FOREGROUND_APP_ADJ) {
|
|
myEmptyAdj = client.emptyAdj;
|
|
} else {
|
|
myEmptyAdj = ProcessList.FOREGROUND_APP_ADJ;
|
|
}
|
|
}
|
|
int clientAdj = computeOomAdjLocked(client, myHiddenAdj,
|
|
myEmptyAdj, TOP_APP, true, doingAll);
|
|
if (adj > clientAdj) {
|
|
if (app.hasShownUi && app != mHomeProcess
|
|
&& clientAdj > ProcessList.PERCEPTIBLE_APP_ADJ) {
|
|
app.adjType = "bg-ui-provider";
|
|
} else {
|
|
adj = clientAdj > ProcessList.FOREGROUND_APP_ADJ
|
|
? clientAdj : ProcessList.FOREGROUND_APP_ADJ;
|
|
app.adjType = "provider";
|
|
}
|
|
if (!client.hidden) {
|
|
app.hidden = false;
|
|
}
|
|
if (client.keeping) {
|
|
app.keeping = true;
|
|
}
|
|
app.adjTypeCode = ActivityManager.RunningAppProcessInfo
|
|
.REASON_PROVIDER_IN_USE;
|
|
app.adjSource = client;
|
|
app.adjSourceOom = clientAdj;
|
|
app.adjTarget = cpr.name;
|
|
}
|
|
if (client.curSchedGroup == Process.THREAD_GROUP_DEFAULT) {
|
|
schedGroup = Process.THREAD_GROUP_DEFAULT;
|
|
}
|
|
}
|
|
// If the provider has external (non-framework) process
|
|
// dependencies, ensure that its adjustment is at least
|
|
// FOREGROUND_APP_ADJ.
|
|
if (cpr.hasExternalProcessHandles()) {
|
|
if (adj > ProcessList.FOREGROUND_APP_ADJ) {
|
|
adj = ProcessList.FOREGROUND_APP_ADJ;
|
|
schedGroup = Process.THREAD_GROUP_DEFAULT;
|
|
app.hidden = false;
|
|
app.keeping = true;
|
|
app.adjType = "provider";
|
|
app.adjTarget = cpr.name;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (adj == ProcessList.SERVICE_ADJ) {
|
|
if (doingAll) {
|
|
app.serviceb = mNewNumServiceProcs > (mNumServiceProcs/3);
|
|
mNewNumServiceProcs++;
|
|
}
|
|
if (app.serviceb) {
|
|
adj = ProcessList.SERVICE_B_ADJ;
|
|
}
|
|
} else {
|
|
app.serviceb = false;
|
|
}
|
|
|
|
app.nonStoppingAdj = adj;
|
|
|
|
if (hasStoppingActivities) {
|
|
// Only upgrade adjustment.
|
|
if (adj > ProcessList.PERCEPTIBLE_APP_ADJ) {
|
|
adj = ProcessList.PERCEPTIBLE_APP_ADJ;
|
|
app.adjType = "stopping";
|
|
}
|
|
}
|
|
|
|
app.curRawAdj = adj;
|
|
|
|
//Slog.i(TAG, "OOM ADJ " + app + ": pid=" + app.pid +
|
|
// " adj=" + adj + " curAdj=" + app.curAdj + " maxAdj=" + app.maxAdj);
|
|
if (adj > app.maxAdj) {
|
|
adj = app.maxAdj;
|
|
if (app.maxAdj <= ProcessList.PERCEPTIBLE_APP_ADJ) {
|
|
schedGroup = Process.THREAD_GROUP_DEFAULT;
|
|
}
|
|
}
|
|
if (adj < ProcessList.HIDDEN_APP_MIN_ADJ) {
|
|
app.keeping = true;
|
|
}
|
|
|
|
if (app.hasAboveClient) {
|
|
// If this process has bound to any services with BIND_ABOVE_CLIENT,
|
|
// then we need to drop its adjustment to be lower than the service's
|
|
// in order to honor the request. We want to drop it by one adjustment
|
|
// level... but there is special meaning applied to various levels so
|
|
// we will skip some of them.
|
|
if (adj < ProcessList.FOREGROUND_APP_ADJ) {
|
|
// System process will not get dropped, ever
|
|
} else if (adj < ProcessList.VISIBLE_APP_ADJ) {
|
|
adj = ProcessList.VISIBLE_APP_ADJ;
|
|
} else if (adj < ProcessList.PERCEPTIBLE_APP_ADJ) {
|
|
adj = ProcessList.PERCEPTIBLE_APP_ADJ;
|
|
} else if (adj < ProcessList.HIDDEN_APP_MIN_ADJ) {
|
|
adj = ProcessList.HIDDEN_APP_MIN_ADJ;
|
|
} else if (adj < ProcessList.HIDDEN_APP_MAX_ADJ) {
|
|
adj++;
|
|
}
|
|
}
|
|
|
|
int importance = app.memImportance;
|
|
if (importance == 0 || adj != app.curAdj || schedGroup != app.curSchedGroup) {
|
|
app.curAdj = adj;
|
|
app.curSchedGroup = schedGroup;
|
|
if (!interesting) {
|
|
// For this reporting, if there is not something explicitly
|
|
// interesting in this process then we will push it to the
|
|
// background importance.
|
|
importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_BACKGROUND;
|
|
} else if (adj >= ProcessList.HIDDEN_APP_MIN_ADJ) {
|
|
importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_BACKGROUND;
|
|
} else if (adj >= ProcessList.SERVICE_B_ADJ) {
|
|
importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_SERVICE;
|
|
} else if (adj >= ProcessList.HOME_APP_ADJ) {
|
|
importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_BACKGROUND;
|
|
} else if (adj >= ProcessList.SERVICE_ADJ) {
|
|
importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_SERVICE;
|
|
} else if (adj >= ProcessList.HEAVY_WEIGHT_APP_ADJ) {
|
|
importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_CANT_SAVE_STATE;
|
|
} else if (adj >= ProcessList.PERCEPTIBLE_APP_ADJ) {
|
|
importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_PERCEPTIBLE;
|
|
} else if (adj >= ProcessList.VISIBLE_APP_ADJ) {
|
|
importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_VISIBLE;
|
|
} else if (adj >= ProcessList.FOREGROUND_APP_ADJ) {
|
|
importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_FOREGROUND;
|
|
} else {
|
|
importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_PERSISTENT;
|
|
}
|
|
}
|
|
|
|
int changes = importance != app.memImportance ? ProcessChangeItem.CHANGE_IMPORTANCE : 0;
|
|
if (foregroundActivities != app.foregroundActivities) {
|
|
changes |= ProcessChangeItem.CHANGE_ACTIVITIES;
|
|
}
|
|
if (changes != 0) {
|
|
if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG, "Changes in " + app + ": " + changes);
|
|
app.memImportance = importance;
|
|
app.foregroundActivities = foregroundActivities;
|
|
int i = mPendingProcessChanges.size()-1;
|
|
ProcessChangeItem item = null;
|
|
while (i >= 0) {
|
|
item = mPendingProcessChanges.get(i);
|
|
if (item.pid == app.pid) {
|
|
if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG, "Re-using existing item: " + item);
|
|
break;
|
|
}
|
|
i--;
|
|
}
|
|
if (i < 0) {
|
|
// No existing item in pending changes; need a new one.
|
|
final int NA = mAvailProcessChanges.size();
|
|
if (NA > 0) {
|
|
item = mAvailProcessChanges.remove(NA-1);
|
|
if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG, "Retreiving available item: " + item);
|
|
} else {
|
|
item = new ProcessChangeItem();
|
|
if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG, "Allocating new item: " + item);
|
|
}
|
|
item.changes = 0;
|
|
item.pid = app.pid;
|
|
item.uid = app.info.uid;
|
|
if (mPendingProcessChanges.size() == 0) {
|
|
if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG,
|
|
"*** Enqueueing dispatch processes changed!");
|
|
mHandler.obtainMessage(DISPATCH_PROCESSES_CHANGED).sendToTarget();
|
|
}
|
|
mPendingProcessChanges.add(item);
|
|
}
|
|
item.changes |= changes;
|
|
item.importance = importance;
|
|
item.foregroundActivities = foregroundActivities;
|
|
if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG, "Item "
|
|
+ Integer.toHexString(System.identityHashCode(item))
|
|
+ " " + app.toShortString() + ": changes=" + item.changes
|
|
+ " importance=" + item.importance
|
|
+ " foreground=" + item.foregroundActivities
|
|
+ " type=" + app.adjType + " source=" + app.adjSource
|
|
+ " target=" + app.adjTarget);
|
|
}
|
|
|
|
return app.curRawAdj;
|
|
}
|
|
|
|
/**
|
|
* Ask a given process to GC right now.
|
|
*/
|
|
final void performAppGcLocked(ProcessRecord app) {
|
|
try {
|
|
app.lastRequestedGc = SystemClock.uptimeMillis();
|
|
if (app.thread != null) {
|
|
if (app.reportLowMemory) {
|
|
app.reportLowMemory = false;
|
|
app.thread.scheduleLowMemory();
|
|
} else {
|
|
app.thread.processInBackground();
|
|
}
|
|
}
|
|
} catch (Exception e) {
|
|
// whatever.
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Returns true if things are idle enough to perform GCs.
|
|
*/
|
|
private final boolean canGcNowLocked() {
|
|
boolean processingBroadcasts = false;
|
|
for (BroadcastQueue q : mBroadcastQueues) {
|
|
if (q.mParallelBroadcasts.size() != 0 || q.mOrderedBroadcasts.size() != 0) {
|
|
processingBroadcasts = true;
|
|
}
|
|
}
|
|
return !processingBroadcasts
|
|
&& (mSleeping || (mMainStack.mResumedActivity != null &&
|
|
mMainStack.mResumedActivity.idle));
|
|
}
|
|
|
|
/**
|
|
* Perform GCs on all processes that are waiting for it, but only
|
|
* if things are idle.
|
|
*/
|
|
final void performAppGcsLocked() {
|
|
final int N = mProcessesToGc.size();
|
|
if (N <= 0) {
|
|
return;
|
|
}
|
|
if (canGcNowLocked()) {
|
|
while (mProcessesToGc.size() > 0) {
|
|
ProcessRecord proc = mProcessesToGc.remove(0);
|
|
if (proc.curRawAdj > ProcessList.PERCEPTIBLE_APP_ADJ || proc.reportLowMemory) {
|
|
if ((proc.lastRequestedGc+GC_MIN_INTERVAL)
|
|
<= SystemClock.uptimeMillis()) {
|
|
// To avoid spamming the system, we will GC processes one
|
|
// at a time, waiting a few seconds between each.
|
|
performAppGcLocked(proc);
|
|
scheduleAppGcsLocked();
|
|
return;
|
|
} else {
|
|
// It hasn't been long enough since we last GCed this
|
|
// process... put it in the list to wait for its time.
|
|
addProcessToGcListLocked(proc);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
scheduleAppGcsLocked();
|
|
}
|
|
}
|
|
|
|
/**
|
|
* If all looks good, perform GCs on all processes waiting for them.
|
|
*/
|
|
final void performAppGcsIfAppropriateLocked() {
|
|
if (canGcNowLocked()) {
|
|
performAppGcsLocked();
|
|
return;
|
|
}
|
|
// Still not idle, wait some more.
|
|
scheduleAppGcsLocked();
|
|
}
|
|
|
|
/**
|
|
* Schedule the execution of all pending app GCs.
|
|
*/
|
|
final void scheduleAppGcsLocked() {
|
|
mHandler.removeMessages(GC_BACKGROUND_PROCESSES_MSG);
|
|
|
|
if (mProcessesToGc.size() > 0) {
|
|
// Schedule a GC for the time to the next process.
|
|
ProcessRecord proc = mProcessesToGc.get(0);
|
|
Message msg = mHandler.obtainMessage(GC_BACKGROUND_PROCESSES_MSG);
|
|
|
|
long when = proc.lastRequestedGc + GC_MIN_INTERVAL;
|
|
long now = SystemClock.uptimeMillis();
|
|
if (when < (now+GC_TIMEOUT)) {
|
|
when = now + GC_TIMEOUT;
|
|
}
|
|
mHandler.sendMessageAtTime(msg, when);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Add a process to the array of processes waiting to be GCed. Keeps the
|
|
* list in sorted order by the last GC time. The process can't already be
|
|
* on the list.
|
|
*/
|
|
final void addProcessToGcListLocked(ProcessRecord proc) {
|
|
boolean added = false;
|
|
for (int i=mProcessesToGc.size()-1; i>=0; i--) {
|
|
if (mProcessesToGc.get(i).lastRequestedGc <
|
|
proc.lastRequestedGc) {
|
|
added = true;
|
|
mProcessesToGc.add(i+1, proc);
|
|
break;
|
|
}
|
|
}
|
|
if (!added) {
|
|
mProcessesToGc.add(0, proc);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Set up to ask a process to GC itself. This will either do it
|
|
* immediately, or put it on the list of processes to gc the next
|
|
* time things are idle.
|
|
*/
|
|
final void scheduleAppGcLocked(ProcessRecord app) {
|
|
long now = SystemClock.uptimeMillis();
|
|
if ((app.lastRequestedGc+GC_MIN_INTERVAL) > now) {
|
|
return;
|
|
}
|
|
if (!mProcessesToGc.contains(app)) {
|
|
addProcessToGcListLocked(app);
|
|
scheduleAppGcsLocked();
|
|
}
|
|
}
|
|
|
|
final void checkExcessivePowerUsageLocked(boolean doKills) {
|
|
updateCpuStatsNow();
|
|
|
|
BatteryStatsImpl stats = mBatteryStatsService.getActiveStatistics();
|
|
boolean doWakeKills = doKills;
|
|
boolean doCpuKills = doKills;
|
|
if (mLastPowerCheckRealtime == 0) {
|
|
doWakeKills = false;
|
|
}
|
|
if (mLastPowerCheckUptime == 0) {
|
|
doCpuKills = false;
|
|
}
|
|
if (stats.isScreenOn()) {
|
|
doWakeKills = false;
|
|
}
|
|
final long curRealtime = SystemClock.elapsedRealtime();
|
|
final long realtimeSince = curRealtime - mLastPowerCheckRealtime;
|
|
final long curUptime = SystemClock.uptimeMillis();
|
|
final long uptimeSince = curUptime - mLastPowerCheckUptime;
|
|
mLastPowerCheckRealtime = curRealtime;
|
|
mLastPowerCheckUptime = curUptime;
|
|
if (realtimeSince < WAKE_LOCK_MIN_CHECK_DURATION) {
|
|
doWakeKills = false;
|
|
}
|
|
if (uptimeSince < CPU_MIN_CHECK_DURATION) {
|
|
doCpuKills = false;
|
|
}
|
|
int i = mLruProcesses.size();
|
|
while (i > 0) {
|
|
i--;
|
|
ProcessRecord app = mLruProcesses.get(i);
|
|
if (!app.keeping) {
|
|
long wtime;
|
|
synchronized (stats) {
|
|
wtime = stats.getProcessWakeTime(app.info.uid,
|
|
app.pid, curRealtime);
|
|
}
|
|
long wtimeUsed = wtime - app.lastWakeTime;
|
|
long cputimeUsed = app.curCpuTime - app.lastCpuTime;
|
|
if (DEBUG_POWER) {
|
|
StringBuilder sb = new StringBuilder(128);
|
|
sb.append("Wake for ");
|
|
app.toShortString(sb);
|
|
sb.append(": over ");
|
|
TimeUtils.formatDuration(realtimeSince, sb);
|
|
sb.append(" used ");
|
|
TimeUtils.formatDuration(wtimeUsed, sb);
|
|
sb.append(" (");
|
|
sb.append((wtimeUsed*100)/realtimeSince);
|
|
sb.append("%)");
|
|
Slog.i(TAG, sb.toString());
|
|
sb.setLength(0);
|
|
sb.append("CPU for ");
|
|
app.toShortString(sb);
|
|
sb.append(": over ");
|
|
TimeUtils.formatDuration(uptimeSince, sb);
|
|
sb.append(" used ");
|
|
TimeUtils.formatDuration(cputimeUsed, sb);
|
|
sb.append(" (");
|
|
sb.append((cputimeUsed*100)/uptimeSince);
|
|
sb.append("%)");
|
|
Slog.i(TAG, sb.toString());
|
|
}
|
|
// If a process has held a wake lock for more
|
|
// than 50% of the time during this period,
|
|
// that sounds bad. Kill!
|
|
if (doWakeKills && realtimeSince > 0
|
|
&& ((wtimeUsed*100)/realtimeSince) >= 50) {
|
|
synchronized (stats) {
|
|
stats.reportExcessiveWakeLocked(app.info.uid, app.processName,
|
|
realtimeSince, wtimeUsed);
|
|
}
|
|
Slog.w(TAG, "Excessive wake lock in " + app.processName
|
|
+ " (pid " + app.pid + "): held " + wtimeUsed
|
|
+ " during " + realtimeSince);
|
|
EventLog.writeEvent(EventLogTags.AM_KILL, app.pid,
|
|
app.processName, app.setAdj, "excessive wake lock");
|
|
Process.killProcessQuiet(app.pid);
|
|
} else if (doCpuKills && uptimeSince > 0
|
|
&& ((cputimeUsed*100)/uptimeSince) >= 50) {
|
|
synchronized (stats) {
|
|
stats.reportExcessiveCpuLocked(app.info.uid, app.processName,
|
|
uptimeSince, cputimeUsed);
|
|
}
|
|
Slog.w(TAG, "Excessive CPU in " + app.processName
|
|
+ " (pid " + app.pid + "): used " + cputimeUsed
|
|
+ " during " + uptimeSince);
|
|
EventLog.writeEvent(EventLogTags.AM_KILL, app.pid,
|
|
app.processName, app.setAdj, "excessive cpu");
|
|
Process.killProcessQuiet(app.pid);
|
|
} else {
|
|
app.lastWakeTime = wtime;
|
|
app.lastCpuTime = app.curCpuTime;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
private final boolean updateOomAdjLocked(ProcessRecord app, int hiddenAdj,
|
|
int emptyAdj, ProcessRecord TOP_APP, boolean doingAll) {
|
|
app.hiddenAdj = hiddenAdj;
|
|
app.emptyAdj = emptyAdj;
|
|
|
|
if (app.thread == null) {
|
|
return false;
|
|
}
|
|
|
|
final boolean wasKeeping = app.keeping;
|
|
|
|
boolean success = true;
|
|
|
|
computeOomAdjLocked(app, hiddenAdj, emptyAdj, TOP_APP, false, doingAll);
|
|
|
|
if (app.curRawAdj != app.setRawAdj) {
|
|
if (wasKeeping && !app.keeping) {
|
|
// This app is no longer something we want to keep. Note
|
|
// its current wake lock time to later know to kill it if
|
|
// it is not behaving well.
|
|
BatteryStatsImpl stats = mBatteryStatsService.getActiveStatistics();
|
|
synchronized (stats) {
|
|
app.lastWakeTime = stats.getProcessWakeTime(app.info.uid,
|
|
app.pid, SystemClock.elapsedRealtime());
|
|
}
|
|
app.lastCpuTime = app.curCpuTime;
|
|
}
|
|
|
|
app.setRawAdj = app.curRawAdj;
|
|
}
|
|
|
|
if (app.curAdj != app.setAdj) {
|
|
if (Process.setOomAdj(app.pid, app.curAdj)) {
|
|
if (DEBUG_SWITCH || DEBUG_OOM_ADJ) Slog.v(
|
|
TAG, "Set " + app.pid + " " + app.processName +
|
|
" adj " + app.curAdj + ": " + app.adjType);
|
|
app.setAdj = app.curAdj;
|
|
} else {
|
|
success = false;
|
|
Slog.w(TAG, "Failed setting oom adj of " + app + " to " + app.curAdj);
|
|
}
|
|
}
|
|
if (app.setSchedGroup != app.curSchedGroup) {
|
|
app.setSchedGroup = app.curSchedGroup;
|
|
if (DEBUG_SWITCH || DEBUG_OOM_ADJ) Slog.v(TAG,
|
|
"Setting process group of " + app.processName
|
|
+ " to " + app.curSchedGroup);
|
|
if (app.waitingToKill != null &&
|
|
app.setSchedGroup == Process.THREAD_GROUP_BG_NONINTERACTIVE) {
|
|
Slog.i(TAG, "Killing " + app.toShortString() + ": " + app.waitingToKill);
|
|
EventLog.writeEvent(EventLogTags.AM_KILL, app.pid,
|
|
app.processName, app.setAdj, app.waitingToKill);
|
|
app.killedBackground = true;
|
|
Process.killProcessQuiet(app.pid);
|
|
success = false;
|
|
} else {
|
|
if (true) {
|
|
long oldId = Binder.clearCallingIdentity();
|
|
try {
|
|
Process.setProcessGroup(app.pid, app.curSchedGroup);
|
|
} catch (Exception e) {
|
|
Slog.w(TAG, "Failed setting process group of " + app.pid
|
|
+ " to " + app.curSchedGroup);
|
|
e.printStackTrace();
|
|
} finally {
|
|
Binder.restoreCallingIdentity(oldId);
|
|
}
|
|
} else {
|
|
if (app.thread != null) {
|
|
try {
|
|
app.thread.setSchedulingGroup(app.curSchedGroup);
|
|
} catch (RemoteException e) {
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return success;
|
|
}
|
|
|
|
private final ActivityRecord resumedAppLocked() {
|
|
ActivityRecord resumedActivity = mMainStack.mResumedActivity;
|
|
if (resumedActivity == null || resumedActivity.app == null) {
|
|
resumedActivity = mMainStack.mPausingActivity;
|
|
if (resumedActivity == null || resumedActivity.app == null) {
|
|
resumedActivity = mMainStack.topRunningActivityLocked(null);
|
|
}
|
|
}
|
|
return resumedActivity;
|
|
}
|
|
|
|
final boolean updateOomAdjLocked(ProcessRecord app) {
|
|
final ActivityRecord TOP_ACT = resumedAppLocked();
|
|
final ProcessRecord TOP_APP = TOP_ACT != null ? TOP_ACT.app : null;
|
|
int curAdj = app.curAdj;
|
|
final boolean wasHidden = curAdj >= ProcessList.HIDDEN_APP_MIN_ADJ
|
|
&& curAdj <= ProcessList.HIDDEN_APP_MAX_ADJ;
|
|
|
|
mAdjSeq++;
|
|
|
|
boolean success = updateOomAdjLocked(app, app.hiddenAdj, app.emptyAdj,
|
|
TOP_APP, false);
|
|
final boolean nowHidden = app.curAdj >= ProcessList.HIDDEN_APP_MIN_ADJ
|
|
&& app.curAdj <= ProcessList.HIDDEN_APP_MAX_ADJ;
|
|
if (nowHidden != wasHidden) {
|
|
// Changed to/from hidden state, so apps after it in the LRU
|
|
// list may also be changed.
|
|
updateOomAdjLocked();
|
|
}
|
|
return success;
|
|
}
|
|
|
|
final void updateOomAdjLocked() {
|
|
final ActivityRecord TOP_ACT = resumedAppLocked();
|
|
final ProcessRecord TOP_APP = TOP_ACT != null ? TOP_ACT.app : null;
|
|
|
|
if (false) {
|
|
RuntimeException e = new RuntimeException();
|
|
e.fillInStackTrace();
|
|
Slog.i(TAG, "updateOomAdj: top=" + TOP_ACT, e);
|
|
}
|
|
|
|
mAdjSeq++;
|
|
mNewNumServiceProcs = 0;
|
|
|
|
// Let's determine how many processes we have running vs.
|
|
// how many slots we have for background processes; we may want
|
|
// to put multiple processes in a slot of there are enough of
|
|
// them.
|
|
int numSlots = (ProcessList.HIDDEN_APP_MAX_ADJ
|
|
- ProcessList.HIDDEN_APP_MIN_ADJ + 1) / 2;
|
|
int emptyFactor = (mLruProcesses.size()-mNumNonHiddenProcs-mNumHiddenProcs)/numSlots;
|
|
if (emptyFactor < 1) emptyFactor = 1;
|
|
int hiddenFactor = (mNumHiddenProcs > 0 ? mNumHiddenProcs : 1)/numSlots;
|
|
if (hiddenFactor < 1) hiddenFactor = 1;
|
|
int stepHidden = 0;
|
|
int stepEmpty = 0;
|
|
final int emptyProcessLimit = mProcessLimit > 1 ? mProcessLimit / 2 : mProcessLimit;
|
|
final int hiddenProcessLimit = mProcessLimit > 1 ? mProcessLimit / 2 : mProcessLimit;
|
|
int numHidden = 0;
|
|
int numEmpty = 0;
|
|
int numTrimming = 0;
|
|
|
|
mNumNonHiddenProcs = 0;
|
|
mNumHiddenProcs = 0;
|
|
|
|
// First update the OOM adjustment for each of the
|
|
// application processes based on their current state.
|
|
int i = mLruProcesses.size();
|
|
int curHiddenAdj = ProcessList.HIDDEN_APP_MIN_ADJ;
|
|
int nextHiddenAdj = curHiddenAdj+1;
|
|
int curEmptyAdj = ProcessList.HIDDEN_APP_MIN_ADJ;
|
|
int nextEmptyAdj = curEmptyAdj+2;
|
|
while (i > 0) {
|
|
i--;
|
|
ProcessRecord app = mLruProcesses.get(i);
|
|
//Slog.i(TAG, "OOM " + app + ": cur hidden=" + curHiddenAdj);
|
|
updateOomAdjLocked(app, curHiddenAdj, curEmptyAdj, TOP_APP, true);
|
|
if (!app.killedBackground) {
|
|
if (app.curRawAdj == curHiddenAdj && app.hasActivities) {
|
|
// This process was assigned as a hidden process... step the
|
|
// hidden level.
|
|
mNumHiddenProcs++;
|
|
if (curHiddenAdj != nextHiddenAdj) {
|
|
stepHidden++;
|
|
if (stepHidden >= hiddenFactor) {
|
|
stepHidden = 0;
|
|
curHiddenAdj = nextHiddenAdj;
|
|
nextHiddenAdj += 2;
|
|
if (nextHiddenAdj > ProcessList.HIDDEN_APP_MAX_ADJ) {
|
|
nextHiddenAdj = ProcessList.HIDDEN_APP_MAX_ADJ;
|
|
}
|
|
}
|
|
}
|
|
numHidden++;
|
|
if (numHidden > hiddenProcessLimit) {
|
|
Slog.i(TAG, "No longer want " + app.processName
|
|
+ " (pid " + app.pid + "): hidden #" + numHidden);
|
|
EventLog.writeEvent(EventLogTags.AM_KILL, app.pid,
|
|
app.processName, app.setAdj, "too many background");
|
|
app.killedBackground = true;
|
|
Process.killProcessQuiet(app.pid);
|
|
}
|
|
} else {
|
|
if (app.curRawAdj == curEmptyAdj || app.curRawAdj == curHiddenAdj) {
|
|
// This process was assigned as an empty process... step the
|
|
// empty level.
|
|
if (curEmptyAdj != nextEmptyAdj) {
|
|
stepEmpty++;
|
|
if (stepEmpty >= emptyFactor) {
|
|
stepEmpty = 0;
|
|
curEmptyAdj = nextEmptyAdj;
|
|
nextEmptyAdj += 2;
|
|
if (nextEmptyAdj > ProcessList.HIDDEN_APP_MAX_ADJ) {
|
|
nextEmptyAdj = ProcessList.HIDDEN_APP_MAX_ADJ;
|
|
}
|
|
}
|
|
}
|
|
} else if (app.curRawAdj < ProcessList.HIDDEN_APP_MIN_ADJ) {
|
|
mNumNonHiddenProcs++;
|
|
}
|
|
if (app.curAdj >= ProcessList.HIDDEN_APP_MIN_ADJ) {
|
|
numEmpty++;
|
|
if (numEmpty > emptyProcessLimit) {
|
|
Slog.i(TAG, "No longer want " + app.processName
|
|
+ " (pid " + app.pid + "): empty #" + numEmpty);
|
|
EventLog.writeEvent(EventLogTags.AM_KILL, app.pid,
|
|
app.processName, app.setAdj, "too many background");
|
|
app.killedBackground = true;
|
|
Process.killProcessQuiet(app.pid);
|
|
}
|
|
}
|
|
}
|
|
if (app.isolated && app.services.size() <= 0) {
|
|
// If this is an isolated process, and there are no
|
|
// services running in it, then the process is no longer
|
|
// needed. We agressively kill these because we can by
|
|
// definition not re-use the same process again, and it is
|
|
// good to avoid having whatever code was running in them
|
|
// left sitting around after no longer needed.
|
|
Slog.i(TAG, "Isolated process " + app.processName
|
|
+ " (pid " + app.pid + ") no longer needed");
|
|
EventLog.writeEvent(EventLogTags.AM_KILL, app.pid,
|
|
app.processName, app.setAdj, "isolated not needed");
|
|
app.killedBackground = true;
|
|
Process.killProcessQuiet(app.pid);
|
|
}
|
|
if (app.nonStoppingAdj >= ProcessList.HOME_APP_ADJ
|
|
&& app.nonStoppingAdj != ProcessList.SERVICE_B_ADJ
|
|
&& !app.killedBackground) {
|
|
numTrimming++;
|
|
}
|
|
}
|
|
}
|
|
|
|
mNumServiceProcs = mNewNumServiceProcs;
|
|
|
|
// Now determine the memory trimming level of background processes.
|
|
// Unfortunately we need to start at the back of the list to do this
|
|
// properly. We only do this if the number of background apps we
|
|
// are managing to keep around is less than half the maximum we desire;
|
|
// if we are keeping a good number around, we'll let them use whatever
|
|
// memory they want.
|
|
if (numHidden <= (ProcessList.MAX_HIDDEN_APPS/4)
|
|
&& numEmpty <= (ProcessList.MAX_HIDDEN_APPS/4)) {
|
|
final int numHiddenAndEmpty = numHidden + numEmpty;
|
|
final int N = mLruProcesses.size();
|
|
int factor = numTrimming/3;
|
|
int minFactor = 2;
|
|
if (mHomeProcess != null) minFactor++;
|
|
if (mPreviousProcess != null) minFactor++;
|
|
if (factor < minFactor) factor = minFactor;
|
|
int step = 0;
|
|
int fgTrimLevel;
|
|
if (numHiddenAndEmpty <= (ProcessList.MAX_HIDDEN_APPS/5)) {
|
|
fgTrimLevel = ComponentCallbacks2.TRIM_MEMORY_RUNNING_CRITICAL;
|
|
} else if (numHiddenAndEmpty <= (ProcessList.MAX_HIDDEN_APPS/3)) {
|
|
fgTrimLevel = ComponentCallbacks2.TRIM_MEMORY_RUNNING_LOW;
|
|
} else {
|
|
fgTrimLevel = ComponentCallbacks2.TRIM_MEMORY_RUNNING_MODERATE;
|
|
}
|
|
int curLevel = ComponentCallbacks2.TRIM_MEMORY_COMPLETE;
|
|
for (i=0; i<N; i++) {
|
|
ProcessRecord app = mLruProcesses.get(i);
|
|
if (app.nonStoppingAdj >= ProcessList.HOME_APP_ADJ
|
|
&& app.nonStoppingAdj != ProcessList.SERVICE_B_ADJ
|
|
&& !app.killedBackground) {
|
|
if (app.trimMemoryLevel < curLevel && app.thread != null) {
|
|
try {
|
|
app.thread.scheduleTrimMemory(curLevel);
|
|
} catch (RemoteException e) {
|
|
}
|
|
if (false) {
|
|
// For now we won't do this; our memory trimming seems
|
|
// to be good enough at this point that destroying
|
|
// activities causes more harm than good.
|
|
if (curLevel >= ComponentCallbacks2.TRIM_MEMORY_COMPLETE
|
|
&& app != mHomeProcess && app != mPreviousProcess) {
|
|
// Need to do this on its own message because the stack may not
|
|
// be in a consistent state at this point.
|
|
// For these apps we will also finish their activities
|
|
// to help them free memory.
|
|
mMainStack.scheduleDestroyActivities(app, false, "trim");
|
|
}
|
|
}
|
|
}
|
|
app.trimMemoryLevel = curLevel;
|
|
step++;
|
|
if (step >= factor) {
|
|
step = 0;
|
|
switch (curLevel) {
|
|
case ComponentCallbacks2.TRIM_MEMORY_COMPLETE:
|
|
curLevel = ComponentCallbacks2.TRIM_MEMORY_MODERATE;
|
|
break;
|
|
case ComponentCallbacks2.TRIM_MEMORY_MODERATE:
|
|
curLevel = ComponentCallbacks2.TRIM_MEMORY_BACKGROUND;
|
|
break;
|
|
}
|
|
}
|
|
} else if (app.nonStoppingAdj == ProcessList.HEAVY_WEIGHT_APP_ADJ) {
|
|
if (app.trimMemoryLevel < ComponentCallbacks2.TRIM_MEMORY_BACKGROUND
|
|
&& app.thread != null) {
|
|
try {
|
|
app.thread.scheduleTrimMemory(
|
|
ComponentCallbacks2.TRIM_MEMORY_BACKGROUND);
|
|
} catch (RemoteException e) {
|
|
}
|
|
}
|
|
app.trimMemoryLevel = ComponentCallbacks2.TRIM_MEMORY_BACKGROUND;
|
|
} else {
|
|
if ((app.nonStoppingAdj > ProcessList.VISIBLE_APP_ADJ || app.systemNoUi)
|
|
&& app.pendingUiClean) {
|
|
// If this application is now in the background and it
|
|
// had done UI, then give it the special trim level to
|
|
// have it free UI resources.
|
|
final int level = ComponentCallbacks2.TRIM_MEMORY_UI_HIDDEN;
|
|
if (app.trimMemoryLevel < level && app.thread != null) {
|
|
try {
|
|
app.thread.scheduleTrimMemory(level);
|
|
} catch (RemoteException e) {
|
|
}
|
|
}
|
|
app.pendingUiClean = false;
|
|
}
|
|
if (app.trimMemoryLevel < fgTrimLevel && app.thread != null) {
|
|
try {
|
|
app.thread.scheduleTrimMemory(fgTrimLevel);
|
|
} catch (RemoteException e) {
|
|
}
|
|
}
|
|
app.trimMemoryLevel = fgTrimLevel;
|
|
}
|
|
}
|
|
} else {
|
|
final int N = mLruProcesses.size();
|
|
for (i=0; i<N; i++) {
|
|
ProcessRecord app = mLruProcesses.get(i);
|
|
if ((app.nonStoppingAdj > ProcessList.VISIBLE_APP_ADJ || app.systemNoUi)
|
|
&& app.pendingUiClean) {
|
|
if (app.trimMemoryLevel < ComponentCallbacks2.TRIM_MEMORY_UI_HIDDEN
|
|
&& app.thread != null) {
|
|
try {
|
|
app.thread.scheduleTrimMemory(
|
|
ComponentCallbacks2.TRIM_MEMORY_UI_HIDDEN);
|
|
} catch (RemoteException e) {
|
|
}
|
|
}
|
|
app.pendingUiClean = false;
|
|
}
|
|
app.trimMemoryLevel = 0;
|
|
}
|
|
}
|
|
|
|
if (mAlwaysFinishActivities) {
|
|
// Need to do this on its own message because the stack may not
|
|
// be in a consistent state at this point.
|
|
mMainStack.scheduleDestroyActivities(null, false, "always-finish");
|
|
}
|
|
}
|
|
|
|
final void trimApplications() {
|
|
synchronized (this) {
|
|
int i;
|
|
|
|
// First remove any unused application processes whose package
|
|
// has been removed.
|
|
for (i=mRemovedProcesses.size()-1; i>=0; i--) {
|
|
final ProcessRecord app = mRemovedProcesses.get(i);
|
|
if (app.activities.size() == 0
|
|
&& app.curReceiver == null && app.services.size() == 0) {
|
|
Slog.i(
|
|
TAG, "Exiting empty application process "
|
|
+ app.processName + " ("
|
|
+ (app.thread != null ? app.thread.asBinder() : null)
|
|
+ ")\n");
|
|
if (app.pid > 0 && app.pid != MY_PID) {
|
|
EventLog.writeEvent(EventLogTags.AM_KILL, app.pid,
|
|
app.processName, app.setAdj, "empty");
|
|
Process.killProcessQuiet(app.pid);
|
|
} else {
|
|
try {
|
|
app.thread.scheduleExit();
|
|
} catch (Exception e) {
|
|
// Ignore exceptions.
|
|
}
|
|
}
|
|
cleanUpApplicationRecordLocked(app, false, true, -1);
|
|
mRemovedProcesses.remove(i);
|
|
|
|
if (app.persistent) {
|
|
if (app.persistent) {
|
|
addAppLocked(app.info, false);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Now update the oom adj for all processes.
|
|
updateOomAdjLocked();
|
|
}
|
|
}
|
|
|
|
/** This method sends the specified signal to each of the persistent apps */
|
|
public void signalPersistentProcesses(int sig) throws RemoteException {
|
|
if (sig != Process.SIGNAL_USR1) {
|
|
throw new SecurityException("Only SIGNAL_USR1 is allowed");
|
|
}
|
|
|
|
synchronized (this) {
|
|
if (checkCallingPermission(android.Manifest.permission.SIGNAL_PERSISTENT_PROCESSES)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
throw new SecurityException("Requires permission "
|
|
+ android.Manifest.permission.SIGNAL_PERSISTENT_PROCESSES);
|
|
}
|
|
|
|
for (int i = mLruProcesses.size() - 1 ; i >= 0 ; i--) {
|
|
ProcessRecord r = mLruProcesses.get(i);
|
|
if (r.thread != null && r.persistent) {
|
|
Process.sendSignal(r.pid, sig);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
private void stopProfilerLocked(ProcessRecord proc, String path, int profileType) {
|
|
if (proc == null || proc == mProfileProc) {
|
|
proc = mProfileProc;
|
|
path = mProfileFile;
|
|
profileType = mProfileType;
|
|
clearProfilerLocked();
|
|
}
|
|
if (proc == null) {
|
|
return;
|
|
}
|
|
try {
|
|
proc.thread.profilerControl(false, path, null, profileType);
|
|
} catch (RemoteException e) {
|
|
throw new IllegalStateException("Process disappeared");
|
|
}
|
|
}
|
|
|
|
private void clearProfilerLocked() {
|
|
if (mProfileFd != null) {
|
|
try {
|
|
mProfileFd.close();
|
|
} catch (IOException e) {
|
|
}
|
|
}
|
|
mProfileApp = null;
|
|
mProfileProc = null;
|
|
mProfileFile = null;
|
|
mProfileType = 0;
|
|
mAutoStopProfiler = false;
|
|
}
|
|
|
|
public boolean profileControl(String process, boolean start,
|
|
String path, ParcelFileDescriptor fd, int profileType) throws RemoteException {
|
|
|
|
try {
|
|
synchronized (this) {
|
|
// note: hijacking SET_ACTIVITY_WATCHER, but should be changed to
|
|
// its own permission.
|
|
if (checkCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
throw new SecurityException("Requires permission "
|
|
+ android.Manifest.permission.SET_ACTIVITY_WATCHER);
|
|
}
|
|
|
|
if (start && fd == null) {
|
|
throw new IllegalArgumentException("null fd");
|
|
}
|
|
|
|
ProcessRecord proc = null;
|
|
if (process != null) {
|
|
try {
|
|
int pid = Integer.parseInt(process);
|
|
synchronized (mPidsSelfLocked) {
|
|
proc = mPidsSelfLocked.get(pid);
|
|
}
|
|
} catch (NumberFormatException e) {
|
|
}
|
|
|
|
if (proc == null) {
|
|
HashMap<String, SparseArray<ProcessRecord>> all
|
|
= mProcessNames.getMap();
|
|
SparseArray<ProcessRecord> procs = all.get(process);
|
|
if (procs != null && procs.size() > 0) {
|
|
proc = procs.valueAt(0);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (start && (proc == null || proc.thread == null)) {
|
|
throw new IllegalArgumentException("Unknown process: " + process);
|
|
}
|
|
|
|
if (start) {
|
|
stopProfilerLocked(null, null, 0);
|
|
setProfileApp(proc.info, proc.processName, path, fd, false);
|
|
mProfileProc = proc;
|
|
mProfileType = profileType;
|
|
try {
|
|
fd = fd.dup();
|
|
} catch (IOException e) {
|
|
fd = null;
|
|
}
|
|
proc.thread.profilerControl(start, path, fd, profileType);
|
|
fd = null;
|
|
mProfileFd = null;
|
|
} else {
|
|
stopProfilerLocked(proc, path, profileType);
|
|
if (fd != null) {
|
|
try {
|
|
fd.close();
|
|
} catch (IOException e) {
|
|
}
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
} catch (RemoteException e) {
|
|
throw new IllegalStateException("Process disappeared");
|
|
} finally {
|
|
if (fd != null) {
|
|
try {
|
|
fd.close();
|
|
} catch (IOException e) {
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
public boolean dumpHeap(String process, boolean managed,
|
|
String path, ParcelFileDescriptor fd) throws RemoteException {
|
|
|
|
try {
|
|
synchronized (this) {
|
|
// note: hijacking SET_ACTIVITY_WATCHER, but should be changed to
|
|
// its own permission (same as profileControl).
|
|
if (checkCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
throw new SecurityException("Requires permission "
|
|
+ android.Manifest.permission.SET_ACTIVITY_WATCHER);
|
|
}
|
|
|
|
if (fd == null) {
|
|
throw new IllegalArgumentException("null fd");
|
|
}
|
|
|
|
ProcessRecord proc = null;
|
|
try {
|
|
int pid = Integer.parseInt(process);
|
|
synchronized (mPidsSelfLocked) {
|
|
proc = mPidsSelfLocked.get(pid);
|
|
}
|
|
} catch (NumberFormatException e) {
|
|
}
|
|
|
|
if (proc == null) {
|
|
HashMap<String, SparseArray<ProcessRecord>> all
|
|
= mProcessNames.getMap();
|
|
SparseArray<ProcessRecord> procs = all.get(process);
|
|
if (procs != null && procs.size() > 0) {
|
|
proc = procs.valueAt(0);
|
|
}
|
|
}
|
|
|
|
if (proc == null || proc.thread == null) {
|
|
throw new IllegalArgumentException("Unknown process: " + process);
|
|
}
|
|
|
|
boolean isDebuggable = "1".equals(SystemProperties.get(SYSTEM_DEBUGGABLE, "0"));
|
|
if (!isDebuggable) {
|
|
if ((proc.info.flags&ApplicationInfo.FLAG_DEBUGGABLE) == 0) {
|
|
throw new SecurityException("Process not debuggable: " + proc);
|
|
}
|
|
}
|
|
|
|
proc.thread.dumpHeap(managed, path, fd);
|
|
fd = null;
|
|
return true;
|
|
}
|
|
} catch (RemoteException e) {
|
|
throw new IllegalStateException("Process disappeared");
|
|
} finally {
|
|
if (fd != null) {
|
|
try {
|
|
fd.close();
|
|
} catch (IOException e) {
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/** In this method we try to acquire our lock to make sure that we have not deadlocked */
|
|
public void monitor() {
|
|
synchronized (this) { }
|
|
}
|
|
|
|
void onCoreSettingsChange(Bundle settings) {
|
|
for (int i = mLruProcesses.size() - 1; i >= 0; i--) {
|
|
ProcessRecord processRecord = mLruProcesses.get(i);
|
|
try {
|
|
if (processRecord.thread != null) {
|
|
processRecord.thread.setCoreSettings(settings);
|
|
}
|
|
} catch (RemoteException re) {
|
|
/* ignore */
|
|
}
|
|
}
|
|
}
|
|
|
|
// Multi-user methods
|
|
|
|
@Override
|
|
public boolean switchUser(int userId) {
|
|
if (checkCallingPermission(android.Manifest.permission.INTERACT_ACROSS_USERS_FULL)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
String msg = "Permission Denial: switchUser() from pid="
|
|
+ Binder.getCallingPid()
|
|
+ ", uid=" + Binder.getCallingUid()
|
|
+ " requires " + android.Manifest.permission.INTERACT_ACROSS_USERS_FULL;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
synchronized (this) {
|
|
if (mCurrentUserId == userId) {
|
|
return true;
|
|
}
|
|
|
|
// If the user we are switching to is not currently started, then
|
|
// we need to start it now.
|
|
if (mStartedUsers.get(userId) == null) {
|
|
mStartedUsers.put(userId, new UserStartedState(new UserHandle(userId), false));
|
|
}
|
|
|
|
mCurrentUserId = userId;
|
|
boolean haveActivities = mMainStack.switchUser(userId);
|
|
if (!haveActivities) {
|
|
startHomeActivityLocked(userId, mStartedUsers.get(userId));
|
|
}
|
|
}
|
|
|
|
long ident = Binder.clearCallingIdentity();
|
|
try {
|
|
// Inform of user switch
|
|
Intent addedIntent = new Intent(Intent.ACTION_USER_SWITCHED);
|
|
addedIntent.putExtra(Intent.EXTRA_USER_HANDLE, userId);
|
|
mContext.sendBroadcast(addedIntent, android.Manifest.permission.MANAGE_USERS);
|
|
} finally {
|
|
Binder.restoreCallingIdentity(ident);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
void finishUserSwitch(UserStartedState uss) {
|
|
synchronized (this) {
|
|
if (uss.mState == UserStartedState.STATE_BOOTING
|
|
&& mStartedUsers.get(uss.mHandle.getIdentifier()) == uss) {
|
|
uss.mState = UserStartedState.STATE_RUNNING;
|
|
broadcastIntentLocked(null, null,
|
|
new Intent(Intent.ACTION_BOOT_COMPLETED, null),
|
|
null, null, 0, null, null,
|
|
android.Manifest.permission.RECEIVE_BOOT_COMPLETED,
|
|
false, false, MY_PID, Process.SYSTEM_UID, uss.mHandle.getIdentifier());
|
|
}
|
|
}
|
|
}
|
|
|
|
@Override
|
|
public int stopUser(final int userId, final IStopUserCallback callback) {
|
|
if (checkCallingPermission(android.Manifest.permission.INTERACT_ACROSS_USERS_FULL)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
String msg = "Permission Denial: switchUser() from pid="
|
|
+ Binder.getCallingPid()
|
|
+ ", uid=" + Binder.getCallingUid()
|
|
+ " requires " + android.Manifest.permission.INTERACT_ACROSS_USERS_FULL;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
if (userId <= 0) {
|
|
throw new IllegalArgumentException("Can't stop primary user " + userId);
|
|
}
|
|
synchronized (this) {
|
|
if (mCurrentUserId == userId) {
|
|
return ActivityManager.USER_OP_IS_CURRENT;
|
|
}
|
|
|
|
final UserStartedState uss = mStartedUsers.get(userId);
|
|
if (uss == null) {
|
|
// User is not started, nothing to do... but we do need to
|
|
// callback if requested.
|
|
if (callback != null) {
|
|
mHandler.post(new Runnable() {
|
|
@Override
|
|
public void run() {
|
|
try {
|
|
callback.userStopped(userId);
|
|
} catch (RemoteException e) {
|
|
}
|
|
}
|
|
});
|
|
}
|
|
return ActivityManager.USER_OP_SUCCESS;
|
|
}
|
|
|
|
if (callback != null) {
|
|
uss.mStopCallbacks.add(callback);
|
|
}
|
|
|
|
if (uss.mState != UserStartedState.STATE_STOPPING) {
|
|
uss.mState = UserStartedState.STATE_STOPPING;
|
|
|
|
long ident = Binder.clearCallingIdentity();
|
|
try {
|
|
// Inform of user switch
|
|
Intent intent = new Intent(Intent.ACTION_SHUTDOWN);
|
|
final IIntentReceiver resultReceiver = new IIntentReceiver.Stub() {
|
|
@Override
|
|
public void performReceive(Intent intent, int resultCode, String data,
|
|
Bundle extras, boolean ordered, boolean sticky) {
|
|
finishUserStop(uss);
|
|
}
|
|
};
|
|
broadcastIntentLocked(null, null, intent,
|
|
null, resultReceiver, 0, null, null, null,
|
|
true, false, MY_PID, Process.SYSTEM_UID, userId);
|
|
} finally {
|
|
Binder.restoreCallingIdentity(ident);
|
|
}
|
|
}
|
|
}
|
|
|
|
return ActivityManager.USER_OP_SUCCESS;
|
|
}
|
|
|
|
void finishUserStop(UserStartedState uss) {
|
|
final int userId = uss.mHandle.getIdentifier();
|
|
boolean stopped;
|
|
ArrayList<IStopUserCallback> callbacks;
|
|
synchronized (this) {
|
|
callbacks = new ArrayList<IStopUserCallback>(uss.mStopCallbacks);
|
|
if (uss.mState != UserStartedState.STATE_STOPPING
|
|
|| mStartedUsers.get(userId) != uss) {
|
|
stopped = false;
|
|
} else {
|
|
stopped = true;
|
|
// User can no longer run.
|
|
mStartedUsers.remove(userId);
|
|
|
|
// Clean up all state and processes associated with the user.
|
|
// Kill all the processes for the user.
|
|
forceStopUserLocked(userId);
|
|
}
|
|
}
|
|
|
|
for (int i=0; i<callbacks.size(); i++) {
|
|
try {
|
|
if (stopped) callbacks.get(i).userStopped(userId);
|
|
else callbacks.get(i).userStopAborted(userId);
|
|
} catch (RemoteException e) {
|
|
}
|
|
}
|
|
}
|
|
|
|
@Override
|
|
public UserInfo getCurrentUser() {
|
|
if (checkCallingPermission(android.Manifest.permission.INTERACT_ACROSS_USERS_FULL)
|
|
!= PackageManager.PERMISSION_GRANTED) {
|
|
String msg = "Permission Denial: getCurrentUser() from pid="
|
|
+ Binder.getCallingPid()
|
|
+ ", uid=" + Binder.getCallingUid()
|
|
+ " requires " + android.Manifest.permission.INTERACT_ACROSS_USERS_FULL;
|
|
Slog.w(TAG, msg);
|
|
throw new SecurityException(msg);
|
|
}
|
|
synchronized (this) {
|
|
return getUserManager().getUserInfo(mCurrentUserId);
|
|
}
|
|
}
|
|
|
|
private boolean userExists(int userId) {
|
|
UserInfo user = getUserManager().getUserInfo(userId);
|
|
return user != null;
|
|
}
|
|
|
|
UserManager getUserManager() {
|
|
if (mUserManager == null) {
|
|
mUserManager = (UserManager) mContext.getSystemService(Context.USER_SERVICE);
|
|
}
|
|
return mUserManager;
|
|
}
|
|
|
|
private void checkValidCaller(int uid, int userId) {
|
|
if (UserHandle.getUserId(uid) == userId || uid == Process.SYSTEM_UID || uid == 0) return;
|
|
|
|
throw new SecurityException("Caller uid=" + uid
|
|
+ " is not privileged to communicate with user=" + userId);
|
|
}
|
|
|
|
private int applyUserId(int uid, int userId) {
|
|
return UserHandle.getUid(userId, uid);
|
|
}
|
|
|
|
ApplicationInfo getAppInfoForUser(ApplicationInfo info, int userId) {
|
|
if (info == null) return null;
|
|
ApplicationInfo newInfo = new ApplicationInfo(info);
|
|
newInfo.uid = applyUserId(info.uid, userId);
|
|
newInfo.dataDir = USER_DATA_DIR + userId + "/"
|
|
+ info.packageName;
|
|
return newInfo;
|
|
}
|
|
|
|
ActivityInfo getActivityInfoForUser(ActivityInfo aInfo, int userId) {
|
|
if (aInfo == null
|
|
|| (userId < 1 && aInfo.applicationInfo.uid < UserHandle.PER_USER_RANGE)) {
|
|
return aInfo;
|
|
}
|
|
|
|
ActivityInfo info = new ActivityInfo(aInfo);
|
|
info.applicationInfo = getAppInfoForUser(info.applicationInfo, userId);
|
|
return info;
|
|
}
|
|
}
|