blob: f1ed1d9d954e12dbb1b9ee51777e40a1838b4156 [file] [log] [blame]
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2006 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server;
18
Felipe Lemee348dc32018-11-05 12:35:29 -080019import static android.os.IServiceManager.DUMP_FLAG_PRIORITY_CRITICAL;
20import static android.os.IServiceManager.DUMP_FLAG_PRIORITY_HIGH;
21import static android.os.IServiceManager.DUMP_FLAG_PRIORITY_NORMAL;
22import static android.os.IServiceManager.DUMP_FLAG_PROTO;
23import static android.view.Display.DEFAULT_DISPLAY;
24
Felipe Leme3aad1be2019-05-31 11:43:12 -070025import static com.android.server.utils.TimingsTraceAndSlog.SYSTEM_SERVER_TIMING_TAG;
26
Felipe Leme658c8e42018-11-30 12:49:45 -080027import android.annotation.NonNull;
Felipe Leme83e8f242019-08-14 16:57:56 +000028import android.annotation.StringRes;
Jeff Brown6f357d32014-01-15 20:40:55 -080029import android.app.ActivityThread;
Andrei Oneaf965d152019-10-30 18:08:24 +000030import android.app.AppCompatCallbacks;
Adam Lesinskief2ea1f2013-12-05 16:48:06 -080031import android.app.INotificationManager;
Adam Lesinski0debc9a2014-07-16 19:09:13 -070032import android.app.usage.UsageStatsManagerInternal;
Joe Onoratof3c3c4f2010-10-21 11:09:02 -040033import android.content.ComponentName;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080034import android.content.ContentResolver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080035import android.content.Context;
Joe Onoratof3c3c4f2010-10-21 11:09:02 -040036import android.content.Intent;
Jeff Sharkeyb0613dc2018-02-27 14:38:04 -070037import android.content.pm.PackageItemInfo;
Matthew Xie1dd01eb32013-04-26 12:37:54 -070038import android.content.pm.PackageManager;
Joe Onoratodc565f42010-10-04 15:27:22 -040039import android.content.res.Configuration;
Alan Viverettee54d2452015-05-06 10:41:43 -070040import android.content.res.Resources.Theme;
Fyodor Kupolov7fcd6592017-12-15 11:56:36 -080041import android.database.sqlite.SQLiteCompatibilityWalFlags;
Makoto Onuki50e00c82018-08-07 15:57:13 -070042import android.database.sqlite.SQLiteGlobal;
Winson72dbe7e2019-04-29 14:55:30 -070043import android.hardware.display.DisplayManagerInternal;
Roshan Pius7e6f5f52019-06-27 14:14:40 -070044import android.net.ConnectivityModuleConnector;
Remi NGUYEN VAN310da6f2019-02-14 18:04:20 +090045import android.net.NetworkStackClient;
Roshan Pius6f5338d2019-06-14 14:37:14 -070046import android.net.wifi.WifiStackClient;
Jeff Sharkeyd136e512016-03-09 22:30:56 -070047import android.os.BaseBundle;
Jeff Sharkey0a17db12016-11-04 11:23:46 -060048import android.os.Binder;
Jeff Sharkey55687722014-04-09 18:07:19 -070049import android.os.Build;
Jeff Sharkey48749fc2013-04-19 13:25:04 -070050import android.os.Environment;
Jeff Brown6f357d32014-01-15 20:40:55 -080051import android.os.FactoryTest;
Tao Bao4fd6c262016-01-19 14:22:24 -080052import android.os.FileUtils;
Joe Onorato1754d742016-11-21 17:51:35 -080053import android.os.IIncidentManager;
Jeff Hamilton35eef702010-06-09 15:45:18 -050054import android.os.Looper;
Alison Cichowlasf0afd8c2017-07-31 11:24:34 -040055import android.os.Message;
Fyodor Kupolova81b8c02017-11-13 15:51:03 -080056import android.os.Parcel;
Tao Bao4fd6c262016-01-19 14:22:24 -080057import android.os.PowerManager;
Narayan Kamath97780462017-02-06 20:24:08 +000058import android.os.Process;
Jeff Hamilton35eef702010-06-09 15:45:18 -050059import android.os.ServiceManager;
Brad Fitzpatrickc74a1b442010-09-10 16:03:29 -070060import android.os.StrictMode;
Jeff Hamilton35eef702010-06-09 15:45:18 -050061import android.os.SystemClock;
62import android.os.SystemProperties;
Amith Yamasanicd757062012-10-19 18:23:52 -070063import android.os.UserHandle;
Sudheer Shanka2250d562016-11-07 15:41:02 -080064import android.os.storage.IStorageManager;
Felipe Leme70bcf382019-01-24 14:55:03 -080065import android.provider.DeviceConfig;
Felipe Leme658c8e42018-11-30 12:49:45 -080066import android.provider.Settings;
Inseob Kimc1246e62018-11-08 13:13:54 +090067import android.sysprop.VoldProperties;
Felipe Leme658c8e42018-11-30 12:49:45 -080068import android.text.TextUtils;
Joe Onoratodc565f42010-10-04 15:27:22 -040069import android.util.DisplayMetrics;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080070import android.util.EventLog;
Joe Onorato8a9b2202010-02-26 18:56:32 -080071import android.util.Slog;
Brad Fitzpatrick5fdc0c72010-10-12 13:12:18 -070072import android.view.WindowManager;
Felipe Leme14ef4612019-02-07 12:24:38 -080073import android.view.contentcapture.ContentCaptureManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080074
Dan Morrille4d9a012013-03-28 18:10:43 -070075import com.android.internal.R;
Fyodor Kupolov8d3e82b2016-11-10 17:58:50 -080076import com.android.internal.logging.MetricsLogger;
Geoffrey Pitschaf759c52017-02-15 09:35:38 -050077import com.android.internal.notification.SystemNotificationChannels;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -070078import com.android.internal.os.BinderInternal;
Keun-young Parkd80e8942017-01-27 11:30:19 -080079import com.android.internal.util.ConcurrentUtils;
Tony Makb0d22622018-01-18 12:49:49 +000080import com.android.internal.util.EmergencyAffordanceManager;
Jeff Sharkeyd136e512016-03-09 22:30:56 -070081import com.android.internal.widget.ILockSettings;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -070082import com.android.server.am.ActivityManagerService;
Makoto Onukidf7e4812018-09-24 14:31:25 -070083import com.android.server.appbinding.AppBindingService;
Alex Salob81472f2018-12-12 14:44:28 -080084import com.android.server.attention.AttentionManagerService;
John Spurlock61560172015-02-06 19:46:04 -050085import com.android.server.audio.AudioService;
Ilya Matyukhine4675b32019-11-07 16:07:19 -080086import com.android.server.biometrics.AuthService;
Kevin Chyn352adfe2018-09-20 22:28:50 -070087import com.android.server.biometrics.BiometricService;
Felipe Lemee348dc32018-11-05 12:35:29 -080088import com.android.server.biometrics.face.FaceService;
89import com.android.server.biometrics.fingerprint.FingerprintService;
Kevin Chyn51676d22018-11-05 18:00:43 -080090import com.android.server.biometrics.iris.IrisService;
Tony Makb0d22622018-01-18 12:49:49 +000091import com.android.server.broadcastradio.BroadcastRadioService;
Wei Wanged7f5482017-02-21 11:35:10 -080092import com.android.server.camera.CameraServiceProxy;
Amith Yamasani30f8eb42013-11-06 14:54:50 -080093import com.android.server.clipboard.ClipboardService;
Andrei Oneacf109842019-07-17 19:03:10 +010094import com.android.server.compat.PlatformCompat;
atrost87488352019-10-10 19:27:31 +010095import com.android.server.compat.PlatformCompatNative;
Hugo Benichieab511b2016-09-09 09:23:47 +090096import com.android.server.connectivity.IpConnectivityMetrics;
Felipe Leme141864d2019-02-27 17:01:51 -080097import com.android.server.contentcapture.ContentCaptureManagerInternal;
Allen Hair1f556e32016-11-11 15:42:50 -080098import com.android.server.coverage.CoverageService;
Adam Lesinski2c8d67c2014-04-23 13:46:21 -070099import com.android.server.devicepolicy.DevicePolicyManagerService;
Tony Makb0d22622018-01-18 12:49:49 +0000100import com.android.server.display.DisplayManagerService;
Christine Franks0ada2772019-02-25 13:54:57 -0800101import com.android.server.display.color.ColorDisplayService;
Jeff Browncef440f2012-09-25 18:58:48 -0700102import com.android.server.dreams.DreamManagerService;
Selim Cinek705442f2016-09-13 16:02:33 -0700103import com.android.server.emergency.EmergencyAffordanceService;
Peiyong Linfd71c202019-01-23 15:29:59 -0800104import com.android.server.gpu.GpuService;
Jungshik Jang0792d372014-04-23 17:57:26 +0900105import com.android.server.hdmi.HdmiControlService;
Joe Onoratoe21ab7e2018-12-18 15:00:25 -0800106import com.android.server.incident.IncidentCompanionService;
Jeff Brown6ec6f792012-04-17 16:52:41 -0700107import com.android.server.input.InputManagerService;
Yohei Yukawa603f4d02018-09-11 15:04:58 -0700108import com.android.server.inputmethod.InputMethodManagerService;
Tarandeep Singh07b318b2019-07-17 11:12:04 -0700109import com.android.server.inputmethod.InputMethodSystemProperty;
Yohei Yukawabae5bea2018-11-12 15:08:30 -0800110import com.android.server.inputmethod.MultiClientInputMethodManagerService;
Adam Lesinskief2ea1f2013-12-05 16:48:06 -0800111import com.android.server.lights.LightsService;
Jeff Sharkeyd136e512016-03-09 22:30:56 -0700112import com.android.server.media.MediaResourceMonitorService;
Jeff Brown69b07162013-11-07 00:30:16 -0800113import com.android.server.media.MediaRouterService;
RoboErik01fe6612014-02-13 14:19:04 -0800114import com.android.server.media.MediaSessionService;
Michael Wrightc39d47a2014-07-08 18:07:36 -0700115import com.android.server.media.projection.MediaProjectionManagerService;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700116import com.android.server.net.NetworkPolicyManagerService;
Jeff Sharkey75279902011-05-24 18:39:45 -0700117import com.android.server.net.NetworkStatsService;
Ricky Wai1a6e6672017-10-27 14:46:01 +0100118import com.android.server.net.watchlist.NetworkWatchlistService;
Adam Lesinskief2ea1f2013-12-05 16:48:06 -0800119import com.android.server.notification.NotificationManagerService;
Andrew Scull5d7027d2017-04-12 11:46:27 +0100120import com.android.server.oemlock.OemLockService;
MÃ¥rten Kongstad2e0d0f32016-06-02 09:35:31 +0200121import com.android.server.om.OverlayManagerService;
Nandana Duttd11850c2018-12-12 17:26:57 +0000122import com.android.server.os.BugreportManagerService;
Svet Ganov37e43272016-09-09 16:01:32 -0700123import com.android.server.os.DeviceIdentifiersPolicyService;
Jeff Sharkey7a96c392012-11-15 14:01:46 -0800124import com.android.server.os.SchedulingPolicyService;
Calin Juravle91d40f12017-03-15 18:38:57 -0700125import com.android.server.pm.BackgroundDexOptService;
Tony Makb0d22622018-01-18 12:49:49 +0000126import com.android.server.pm.CrossProfileAppsService;
Alan Stokesbe9ec972018-12-10 14:07:47 +0000127import com.android.server.pm.DynamicCodeLoggingService;
Jeff Brownf69c8122012-09-12 17:00:34 -0700128import com.android.server.pm.Installer;
Amith Yamasani4f582632014-02-19 14:31:52 -0800129import com.android.server.pm.LauncherAppsService;
Andreas Gampea8908752015-11-10 08:58:14 -0800130import com.android.server.pm.OtaDexoptService;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700131import com.android.server.pm.PackageManagerService;
Makoto Onuki6f7362d92016-03-04 13:39:41 -0800132import com.android.server.pm.ShortcutService;
Amith Yamasani258848d2012-08-10 17:06:33 -0700133import com.android.server.pm.UserManagerService;
Svet Ganovd8eb8b22019-04-05 18:52:08 -0700134import com.android.server.policy.PermissionPolicyService;
Wale Ogunwaleb699ce02016-07-18 12:05:30 -0700135import com.android.server.policy.PhoneWindowManager;
Eugene Susla4ab95112018-12-17 14:45:11 -0800136import com.android.server.policy.role.LegacyRoleResolutionPolicy;
Jeff Brown4f8ecd82012-06-18 18:29:13 -0700137import com.android.server.power.PowerManagerService;
138import com.android.server.power.ShutdownThread;
Wei Wangbad7c202018-11-01 11:57:39 -0700139import com.android.server.power.ThermalManagerService;
Kenny Rootf96836e2019-11-19 17:11:34 -0800140import com.android.server.recoverysystem.RecoverySystemService;
Amith Yamasanif20d6402014-05-24 15:34:37 -0700141import com.android.server.restrictions.RestrictionsManagerService;
Eugene Susla6d4922722018-11-08 16:25:28 -0800142import com.android.server.role.RoleManagerService;
Richard Uhlerb29f1452018-09-12 16:38:15 +0100143import com.android.server.rollback.RollbackManagerService;
Janis Danisevskis8ff1e192016-06-03 11:31:55 -0700144import com.android.server.security.KeyAttestationApplicationIdProviderService;
Robin Lee13935492017-03-23 15:28:37 +0000145import com.android.server.security.KeyChainSystemService;
Mathew Inwood4e2ed6a2018-11-26 15:31:16 +0000146import com.android.server.signedconfig.SignedConfigService;
Arunesh Mishraa772e5f2016-01-25 10:33:11 -0800147import com.android.server.soundtrigger.SoundTriggerService;
Adam Lesinskief2ea1f2013-12-05 16:48:06 -0800148import com.android.server.statusbar.StatusBarManagerService;
149import com.android.server.storage.DeviceStorageMonitorService;
Santos Cordon5d2c1e62014-11-21 15:20:15 -0800150import com.android.server.telecom.TelecomLoaderService;
William Hestera96d3d32018-12-19 13:14:51 -0800151import com.android.server.testharness.TestHarnessModeService;
Abodunrinwa Tokid32906c2018-01-18 04:34:44 -0800152import com.android.server.textclassifier.TextClassificationManagerService;
Yohei Yukawaeb1e8042018-09-12 14:02:00 -0700153import com.android.server.textservices.TextServicesManagerService;
Adrian Roos82142c22014-03-27 14:56:59 +0100154import com.android.server.trust.TrustManagerService;
Jae Seo39570912014-02-20 18:23:25 -0800155import com.android.server.tv.TvInputManagerService;
Fyodor Kupolov3235e0c2016-11-17 11:44:49 -0800156import com.android.server.tv.TvRemoteService;
Adam Lesinskief2ea1f2013-12-05 16:48:06 -0800157import com.android.server.twilight.TwilightService;
Wale Ogunwale6d50dcc2018-07-21 23:00:40 -0700158import com.android.server.uri.UriGrantsManagerService;
Adam Lesinski0debc9a2014-07-16 19:09:13 -0700159import com.android.server.usage.UsageStatsService;
Felipe Leme3aad1be2019-05-31 11:43:12 -0700160import com.android.server.utils.TimingsTraceAndSlog;
Ruben Brunkdd18a0b2015-12-04 16:16:31 -0800161import com.android.server.vr.VrManagerService;
Torne (Richard Coles)08cfaf62014-05-08 16:07:05 +0100162import com.android.server.webkit.WebViewUpdateService;
Felipe Lemee348dc32018-11-05 12:35:29 -0800163import com.android.server.wm.ActivityTaskManagerService;
Wale Ogunwale1f5e53d2018-11-05 05:12:46 -0800164import com.android.server.wm.WindowManagerGlobalLock;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700165import com.android.server.wm.WindowManagerService;
166
167import dalvik.system.VMRuntime;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700168
Alex Salob81472f2018-12-12 14:44:28 -0800169import com.google.android.startop.iorap.IorapForwardingService;
170
Tao Bao4fd6c262016-01-19 14:22:24 -0800171import java.io.File;
172import java.io.IOException;
Narayan Kamathbf882052015-08-11 15:40:34 +0100173import java.util.Locale;
Bob Leee5408332009-09-04 18:31:17 -0700174import java.util.Timer;
Fyodor Kupolov311b9fa2016-12-02 16:24:35 -0800175import java.util.concurrent.CountDownLatch;
Keun-young Parkd80e8942017-01-27 11:30:19 -0800176import java.util.concurrent.Future;
Bob Leee5408332009-09-04 18:31:17 -0700177
Jeff Brown6f357d32014-01-15 20:40:55 -0800178public final class SystemServer {
Christine Franksea7d71b2018-07-03 14:46:07 -0700179
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800180 private static final String TAG = "SystemServer";
Jeff Brown6f357d32014-01-15 20:40:55 -0800181
Ben Komalo553acf02011-09-19 14:25:28 -0700182 private static final String ENCRYPTING_STATE = "trigger_restart_min_framework";
Ben Komalo3573d402011-09-23 15:08:24 -0700183 private static final String ENCRYPTED_STATE = "1";
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800184
Jeff Brown6f357d32014-01-15 20:40:55 -0800185 private static final long SNAPSHOT_INTERVAL = 60 * 60 * 1000; // 1hr
186
187 // The earliest supported time. We pick one day into 1970, to
188 // give any timezone code room without going into negative time.
189 private static final long EARLIEST_SUPPORTED_TIME = 86400 * 1000;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800190
Makoto Onuki712886f2018-04-27 15:22:50 -0700191 private static final long SLOW_DISPATCH_THRESHOLD_MS = 100;
192 private static final long SLOW_DELIVERY_THRESHOLD_MS = 200;
193
Amith Yamasani817ec492013-12-20 13:27:30 -0800194 /*
195 * Implementation class names. TODO: Move them to a codegen class or load
196 * them from the build system somehow.
197 */
198 private static final String BACKUP_MANAGER_SERVICE_CLASS =
Annie Meng384230f2018-11-28 10:58:08 +0000199 "com.android.server.backup.BackupManagerService$Lifecycle";
Amith Yamasani817ec492013-12-20 13:27:30 -0800200 private static final String APPWIDGET_SERVICE_CLASS =
201 "com.android.server.appwidget.AppWidgetService";
Dianne Hackborn91097de2014-04-04 18:02:06 -0700202 private static final String VOICE_RECOGNITION_MANAGER_SERVICE_CLASS =
203 "com.android.server.voiceinteraction.VoiceInteractionManagerService";
Amith Yamasani817ec492013-12-20 13:27:30 -0800204 private static final String PRINT_MANAGER_SERVICE_CLASS =
205 "com.android.server.print.PrintManagerService";
Eugene Susla6ed45d82017-01-22 13:52:51 -0800206 private static final String COMPANION_DEVICE_MANAGER_SERVICE_CLASS =
Eugene Susla0d3dd122017-04-18 10:56:37 -0700207 "com.android.server.companion.CompanionDeviceManagerService";
Tej Singhc53ac0a2019-09-20 16:29:13 -0700208 private static final String STATS_COMPANION_SERVICE_LIFECYCLE_CLASS =
209 "com.android.server.stats.StatsCompanionService$Lifecycle";
Adam Lesinski2cb6c602014-02-14 17:19:56 -0800210 private static final String USB_SERVICE_CLASS =
211 "com.android.server.usb.UsbService$Lifecycle";
Mike Lockwood5781cd52015-03-27 13:23:41 -0700212 private static final String MIDI_SERVICE_CLASS =
213 "com.android.server.midi.MidiService$Lifecycle";
Adam Lesinskif542a332014-02-19 12:29:58 -0800214 private static final String WIFI_SERVICE_CLASS =
215 "com.android.server.wifi.WifiService";
Etan Cohen04133272016-10-26 11:22:06 -0700216 private static final String WIFI_AWARE_SERVICE_CLASS =
217 "com.android.server.wifi.aware.WifiAwareService";
Adam Lesinskif542a332014-02-19 12:29:58 -0800218 private static final String WIFI_P2P_SERVICE_CLASS =
219 "com.android.server.wifi.p2p.WifiP2pService";
Robert Quattlebaum87a71042017-05-15 15:45:20 -0700220 private static final String LOWPAN_SERVICE_CLASS =
221 "com.android.server.lowpan.LowpanService";
Lorenzo Colittif9ff2c92014-05-21 16:32:11 -0700222 private static final String ETHERNET_SERVICE_CLASS =
223 "com.android.server.ethernet.EthernetService";
Christopher Tate7060b042014-06-09 19:50:00 -0700224 private static final String JOB_SCHEDULER_SERVICE_CLASS =
225 "com.android.server.job.JobSchedulerService";
Jim Miller4f93c582016-01-27 19:05:43 -0800226 private static final String LOCK_SETTINGS_SERVICE_CLASS =
Andrew Scull507d11c2017-05-03 17:19:01 +0100227 "com.android.server.locksettings.LockSettingsService$Lifecycle";
Sudheer Shanka2250d562016-11-07 15:41:02 -0800228 private static final String STORAGE_MANAGER_SERVICE_CLASS =
229 "com.android.server.StorageManagerService$Lifecycle";
Jeff Sharkeye8cece92017-01-04 11:33:33 -0700230 private static final String STORAGE_STATS_SERVICE_CLASS =
231 "com.android.server.usage.StorageStatsService$Lifecycle";
Jeff Sharkey4175be22016-01-09 14:57:45 -0700232 private static final String SEARCH_MANAGER_SERVICE_CLASS =
233 "com.android.server.search.SearchManagerService$Lifecycle";
Wei Liud699cf82016-03-25 16:32:10 -0700234 private static final String THERMAL_OBSERVER_CLASS =
235 "com.google.android.clockwork.ThermalObserver";
Calvin On5555bcc2017-02-21 16:41:43 -0800236 private static final String WEAR_CONNECTIVITY_SERVICE_CLASS =
Calvin On3cda1cf2018-02-14 13:57:07 -0800237 "com.android.clockwork.connectivity.WearConnectivityService";
Damien Bargiacchiae4cb672018-05-30 13:28:15 -0700238 private static final String WEAR_POWER_SERVICE_CLASS =
239 "com.android.clockwork.power.WearPowerService";
Chris Phoenixbc839a32017-10-21 14:46:15 -0700240 private static final String WEAR_SIDEKICK_SERVICE_CLASS =
241 "com.google.android.clockwork.sidekick.SidekickService";
Julius D'souza069f46c2017-03-22 13:27:00 -0700242 private static final String WEAR_DISPLAY_SERVICE_CLASS =
243 "com.google.android.clockwork.display.WearDisplayService";
Ivan Podogovf9973822017-05-11 15:51:34 +0100244 private static final String WEAR_LEFTY_SERVICE_CLASS =
245 "com.google.android.clockwork.lefty.WearLeftyService";
Damien Bargiacchi2d92eeb2016-04-07 14:01:03 -0700246 private static final String WEAR_TIME_SERVICE_CLASS =
247 "com.google.android.clockwork.time.WearTimeService";
Michael Kwan01ad0aa2018-02-28 15:19:04 -0800248 private static final String WEAR_GLOBAL_ACTIONS_SERVICE_CLASS =
249 "com.android.clockwork.globalactions.GlobalActionsService";
Jeff Sharkey1cab76a2016-04-12 18:23:31 -0600250 private static final String ACCOUNT_SERVICE_CLASS =
251 "com.android.server.accounts.AccountManagerService$Lifecycle";
Jeff Sharkeya3ebfec2016-04-04 08:58:04 -0600252 private static final String CONTENT_SERVICE_CLASS =
253 "com.android.server.content.ContentService$Lifecycle";
Jeff Sharkey1cab76a2016-04-12 18:23:31 -0600254 private static final String WALLPAPER_SERVICE_CLASS =
255 "com.android.server.wallpaper.WallpaperManagerService$Lifecycle";
Felipe Leme5381aa42016-10-13 09:02:32 -0700256 private static final String AUTO_FILL_MANAGER_SERVICE_CLASS =
Svet Ganov2f8fb1f2017-03-13 00:21:04 -0700257 "com.android.server.autofill.AutofillManagerService";
Felipe Leme749b8892018-12-03 16:30:30 -0800258 private static final String CONTENT_CAPTURE_MANAGER_SERVICE_CLASS =
259 "com.android.server.contentcapture.ContentCaptureManagerService";
Robert Berry835123d2019-03-18 16:33:42 -0400260 private static final String SYSTEM_CAPTIONS_MANAGER_SERVICE_CLASS =
261 "com.android.server.systemcaptions.SystemCaptionsManagerService";
Neil Fuller328532a2017-03-16 18:32:21 +0000262 private static final String TIME_ZONE_RULES_MANAGER_SERVICE_CLASS =
263 "com.android.server.timezone.RulesManagerService$Lifecycle";
Nick Felker1bfe59d2017-10-12 13:27:02 -0700264 private static final String IOT_SERVICE_CLASS =
Ralph Nathan090c2c32018-04-19 22:19:03 -0700265 "com.android.things.server.IoTSystemService";
Jason Monk8f5f7ff2017-10-17 14:12:42 -0400266 private static final String SLICE_MANAGER_SERVICE_CLASS =
267 "com.android.server.slice.SliceManagerService$Lifecycle";
Steve Paik94292a32018-01-26 17:16:53 -0800268 private static final String CAR_SERVICE_HELPER_SERVICE_CLASS =
269 "com.android.internal.car.CarServiceHelperService";
Neil Fullerfeeee682018-05-30 14:35:24 +0100270 private static final String TIME_DETECTOR_SERVICE_CLASS =
271 "com.android.server.timedetector.TimeDetectorService$Lifecycle";
Rhed Jao8a39cef2018-07-18 11:43:33 +0800272 private static final String ACCESSIBILITY_MANAGER_SERVICE_CLASS =
273 "com.android.server.accessibility.AccessibilityManagerService$Lifecycle";
Kenny Rootf74bfde2018-01-18 15:42:48 -0800274 private static final String ADB_SERVICE_CLASS =
275 "com.android.server.adb.AdbService$Lifecycle";
Sunny Goyal54e91342018-11-14 11:59:02 -0800276 private static final String APP_PREDICTION_MANAGER_SERVICE_CLASS =
277 "com.android.server.appprediction.AppPredictionManagerService";
Winson Chung3fb0f252019-01-08 17:41:55 -0800278 private static final String CONTENT_SUGGESTIONS_SERVICE_CLASS =
279 "com.android.server.contentsuggestions.ContentSuggestionsManagerService";
Makoto Onuki52c24b32019-08-23 10:18:28 -0700280 private static final String DEVICE_IDLE_CONTROLLER_CLASS =
281 "com.android.server.DeviceIdleController";
Sudheer Shankaf5b36962019-10-04 16:16:13 -0700282 private static final String BLOB_STORE_MANAGER_SERVICE_CLASS =
283 "com.android.server.blob.BlobStoreManagerService";
Jason Monk8f5f7ff2017-10-17 14:12:42 -0400284
Andres Morales68d4acd2014-07-01 19:40:41 -0700285 private static final String PERSISTENT_DATA_BLOCK_PROP = "ro.frp.pst";
Amith Yamasani817ec492013-12-20 13:27:30 -0800286
Tao Bao4fd6c262016-01-19 14:22:24 -0800287 private static final String UNCRYPT_PACKAGE_FILE = "/cache/recovery/uncrypt_file";
288 private static final String BLOCK_MAP_FILE = "/cache/recovery/block.map";
289
David Andersona032a2b2019-02-07 14:07:23 -0800290 private static final String GSI_RUNNING_PROP = "ro.gsid.image_running";
291
Tim Murrayeef4a3d2016-04-19 14:14:20 -0700292 // maximum number of binder threads used for system_server
293 // will be higher than the system default
294 private static final int sMaxBinderThreads = 31;
295
Alan Viveretteba398ea2015-12-16 15:28:23 -0500296 /**
Christine Franksea7d71b2018-07-03 14:46:07 -0700297 * Default theme used by the system context. This is used to style system-provided dialogs, such
298 * as the Power Off dialog, and other visual content.
Alan Viveretteba398ea2015-12-16 15:28:23 -0500299 */
300 private static final int DEFAULT_SYSTEM_THEME =
Michael Kwan9c7274c2016-06-13 12:48:55 -0700301 com.android.internal.R.style.Theme_DeviceDefault_System;
Alan Viveretteba398ea2015-12-16 15:28:23 -0500302
Jeff Brown6f357d32014-01-15 20:40:55 -0800303 private final int mFactoryTestMode;
304 private Timer mProfilerSnapshotTimer;
305
306 private Context mSystemContext;
307 private SystemServiceManager mSystemServiceManager;
308
Jeff Brown4ccb8232014-01-16 22:16:42 -0800309 // TODO: remove all of these references by improving dependency resolution and boot phases
Jeff Brown4ccb8232014-01-16 22:16:42 -0800310 private PowerManagerService mPowerManagerService;
311 private ActivityManagerService mActivityManagerService;
Wale Ogunwale1f5e53d2018-11-05 05:12:46 -0800312 private WindowManagerGlobalLock mWindowManagerGlobalLock;
Gustav Sennton6258dcd2015-10-30 19:25:37 +0000313 private WebViewUpdateService mWebViewUpdateService;
Jeff Brown4ccb8232014-01-16 22:16:42 -0800314 private DisplayManagerService mDisplayManagerService;
Jeff Brown2c43c332014-06-12 22:38:59 -0700315 private PackageManagerService mPackageManagerService;
316 private PackageManager mPackageManager;
Jeff Brown6f357d32014-01-15 20:40:55 -0800317 private ContentResolver mContentResolver;
Jeff Sharkey1cab76a2016-04-12 18:23:31 -0600318 private EntropyMixer mEntropyMixer;
Jeff Brown6f357d32014-01-15 20:40:55 -0800319
Jeff Brown2c43c332014-06-12 22:38:59 -0700320 private boolean mOnlyCore;
321 private boolean mFirstBoot;
Makoto Onukib4739d92019-02-15 15:22:04 -0800322 private final int mStartCount;
Fyodor Kupolov6733e6c2017-01-06 18:27:05 -0800323 private final boolean mRuntimeRestart;
Makoto Onukie8edbcf2018-03-02 16:49:29 -0800324 private final long mRuntimeStartElapsedTime;
325 private final long mRuntimeStartUptime;
Jeff Brown2c43c332014-06-12 22:38:59 -0700326
Keun-young Park9b73a542017-02-01 12:09:58 -0800327 private static final String START_SENSOR_SERVICE = "StartSensorService";
Yifan Hong26b421f2017-03-10 13:41:11 -0800328 private static final String START_HIDL_SERVICES = "StartHidlServices";
329
Makoto Onukib4739d92019-02-15 15:22:04 -0800330 private static final String SYSPROP_START_COUNT = "sys.system_server.start_count";
331 private static final String SYSPROP_START_ELAPSED = "sys.system_server.start_elapsed";
332 private static final String SYSPROP_START_UPTIME = "sys.system_server.start_uptime";
Yifan Hong26b421f2017-03-10 13:41:11 -0800333
Keun-young Park9b73a542017-02-01 12:09:58 -0800334 private Future<?> mSensorServiceStart;
Narayan Kamath97780462017-02-06 20:24:08 +0000335 private Future<?> mZygotePreload;
336
Jeff Brown6f357d32014-01-15 20:40:55 -0800337 /**
Keun-young Park9b73a542017-02-01 12:09:58 -0800338 * Start the sensor service. This is a blocking call and can take time.
Jeff Brown6f357d32014-01-15 20:40:55 -0800339 */
Svet Ganovb9d71a62015-04-30 10:38:13 -0700340 private static native void startSensorService();
Jeff Brown6f357d32014-01-15 20:40:55 -0800341
342 /**
Christine Franksea7d71b2018-07-03 14:46:07 -0700343 * Start all HIDL services that are run inside the system server. This may take some time.
Yifan Hong26b421f2017-03-10 13:41:11 -0800344 */
345 private static native void startHidlServices();
346
347 /**
Ryan Savitskicfdc1512018-12-14 16:20:52 +0000348 * Mark this process' heap as profileable. Only for debug builds.
349 */
350 private static native void initZygoteChildHeapProfiling();
351
352 /**
Jeff Brown6f357d32014-01-15 20:40:55 -0800353 * The main entry point from zygote.
354 */
355 public static void main(String[] args) {
356 new SystemServer().run();
357 }
358
359 public SystemServer() {
Jeff Brown2c43c332014-06-12 22:38:59 -0700360 // Check for factory test mode.
Jeff Brown6f357d32014-01-15 20:40:55 -0800361 mFactoryTestMode = FactoryTest.getMode();
Makoto Onukie8edbcf2018-03-02 16:49:29 -0800362
Makoto Onukib4739d92019-02-15 15:22:04 -0800363 // Record process start information.
364 // Note SYSPROP_START_COUNT will increment by *2* on a FDE device when it fully boots;
365 // one for the password screen, second for the actual boot.
366 mStartCount = SystemProperties.getInt(SYSPROP_START_COUNT, 0) + 1;
Makoto Onukie8edbcf2018-03-02 16:49:29 -0800367 mRuntimeStartElapsedTime = SystemClock.elapsedRealtime();
368 mRuntimeStartUptime = SystemClock.uptimeMillis();
Makoto Onukib4739d92019-02-15 15:22:04 -0800369
370 // Remember if it's runtime restart(when sys.boot_completed is already set) or reboot
371 // We don't use "mStartCount > 1" here because it'll be wrong on a FDE device.
372 // TODO: mRuntimeRestart will *not* be set to true if the proccess crashes before
373 // sys.boot_completed is set. Fix it.
374 mRuntimeRestart = "1".equals(SystemProperties.get("sys.boot_completed"));
Jeff Brown6f357d32014-01-15 20:40:55 -0800375 }
376
377 private void run() {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700378 TimingsTraceAndSlog t = new TimingsTraceAndSlog();
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900379 try {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700380 t.traceBegin("InitBeforeStartServices");
Makoto Onukib4739d92019-02-15 15:22:04 -0800381
382 // Record the process start information in sys props.
383 SystemProperties.set(SYSPROP_START_COUNT, String.valueOf(mStartCount));
384 SystemProperties.set(SYSPROP_START_ELAPSED, String.valueOf(mRuntimeStartElapsedTime));
385 SystemProperties.set(SYSPROP_START_UPTIME, String.valueOf(mRuntimeStartUptime));
386
387 EventLog.writeEvent(EventLogTags.SYSTEM_SERVER_START,
388 mStartCount, mRuntimeStartUptime, mRuntimeStartElapsedTime);
389
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900390 // If a device's clock is before 1970 (before 0), a lot of
391 // APIs crash dealing with negative numbers, notably
392 // java.io.File#setLastModified, so instead we fake it and
393 // hope that time from cell towers or NTP fixes it shortly.
394 if (System.currentTimeMillis() < EARLIEST_SUPPORTED_TIME) {
395 Slog.w(TAG, "System clock is before 1970; setting to 1970.");
396 SystemClock.setCurrentTimeMillis(EARLIEST_SUPPORTED_TIME);
397 }
Jeff Brown6f357d32014-01-15 20:40:55 -0800398
Przemyslaw Szczepaniakfbe00fa2017-07-28 13:21:48 +0000399 //
400 // Default the timezone property to GMT if not set.
401 //
Christine Franksea7d71b2018-07-03 14:46:07 -0700402 String timezoneProperty = SystemProperties.get("persist.sys.timezone");
Przemyslaw Szczepaniakfbe00fa2017-07-28 13:21:48 +0000403 if (timezoneProperty == null || timezoneProperty.isEmpty()) {
404 Slog.w(TAG, "Timezone not set; setting to GMT.");
405 SystemProperties.set("persist.sys.timezone", "GMT");
406 }
407
Yasuhiro Matsudaebf94652015-09-02 22:48:13 +0900408 // If the system has "persist.sys.language" and friends set, replace them with
409 // "persist.sys.locale". Note that the default locale at this point is calculated
410 // using the "-Duser.locale" command line flag. That flag is usually populated by
411 // AndroidRuntime using the same set of system properties, but only the system_server
412 // and system apps are allowed to set them.
413 //
414 // NOTE: Most changes made here will need an equivalent change to
415 // core/jni/AndroidRuntime.cpp
416 if (!SystemProperties.get("persist.sys.language").isEmpty()) {
417 final String languageTag = Locale.getDefault().toLanguageTag();
Narayan Kamathbf882052015-08-11 15:40:34 +0100418
Yasuhiro Matsudaebf94652015-09-02 22:48:13 +0900419 SystemProperties.set("persist.sys.locale", languageTag);
420 SystemProperties.set("persist.sys.language", "");
421 SystemProperties.set("persist.sys.country", "");
422 SystemProperties.set("persist.sys.localevar", "");
423 }
Narayan Kamathbf882052015-08-11 15:40:34 +0100424
Jeff Sharkey0a17db12016-11-04 11:23:46 -0600425 // The system server should never make non-oneway calls
426 Binder.setWarnOnBlocking(true);
Jeff Sharkeyb0613dc2018-02-27 14:38:04 -0700427 // The system server should always load safe labels
Philip P. Moltmann20dd4312018-10-08 16:56:49 -0700428 PackageItemInfo.forceSafeLabels();
Makoto Onuki50e00c82018-08-07 15:57:13 -0700429
430 // Default to FULL within the system server.
431 SQLiteGlobal.sDefaultSyncMode = SQLiteGlobal.SYNC_MODE_FULL;
432
Fyodor Kupolov7fcd6592017-12-15 11:56:36 -0800433 // Deactivate SQLiteCompatibilityWalFlags until settings provider is initialized
434 SQLiteCompatibilityWalFlags.init(null);
Jeff Sharkey0a17db12016-11-04 11:23:46 -0600435
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900436 // Here we go!
437 Slog.i(TAG, "Entered the Android system server!");
Fyodor Kupolov6733e6c2017-01-06 18:27:05 -0800438 int uptimeMillis = (int) SystemClock.elapsedRealtime();
Fyodor Kupolov8d3e82b2016-11-10 17:58:50 -0800439 EventLog.writeEvent(EventLogTags.BOOT_PROGRESS_SYSTEM_RUN, uptimeMillis);
Fyodor Kupolov4ba91b92017-01-20 18:12:35 -0800440 if (!mRuntimeRestart) {
Fyodor Kupolov6733e6c2017-01-06 18:27:05 -0800441 MetricsLogger.histogram(null, "boot_system_server_init", uptimeMillis);
Fyodor Kupolov3235e0c2016-11-17 11:44:49 -0800442 }
Jeff Brown6f357d32014-01-15 20:40:55 -0800443
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900444 // In case the runtime switched since last boot (such as when
445 // the old runtime was removed in an OTA), set the system
Eugene Suslad0999242019-11-04 10:08:13 -0800446 // property so that it is in sync. We can't do this in
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900447 // libnativehelper's JniInvocation::Init code where we already
448 // had to fallback to a different runtime because it is
449 // running as root and we need to be the system user to set
450 // the property. http://b/11463182
451 SystemProperties.set("persist.sys.dalvik.vm.lib.2", VMRuntime.getRuntime().vmLibrary());
Jeff Brown6f357d32014-01-15 20:40:55 -0800452
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900453 // Mmmmmm... more memory!
454 VMRuntime.getRuntime().clearGrowthLimit();
Jeff Brown6f357d32014-01-15 20:40:55 -0800455
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900456 // The system server has to run all of the time, so it needs to be
457 // as efficient as possible with its memory usage.
458 VMRuntime.getRuntime().setTargetHeapUtilization(0.8f);
Jeff Brown6f357d32014-01-15 20:40:55 -0800459
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900460 // Some devices rely on runtime fingerprint generation, so make sure
461 // we've defined it before booting further.
462 Build.ensureFingerprintProperty();
Jeff Sharkey55687722014-04-09 18:07:19 -0700463
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900464 // Within the system server, it is an error to access Environment paths without
465 // explicitly specifying a user.
466 Environment.setUserRequired(true);
Jeff Brown6f357d32014-01-15 20:40:55 -0800467
Jeff Sharkeyd136e512016-03-09 22:30:56 -0700468 // Within the system server, any incoming Bundles should be defused
469 // to avoid throwing BadParcelableException.
470 BaseBundle.setShouldDefuse(true);
471
Fyodor Kupolova81b8c02017-11-13 15:51:03 -0800472 // Within the system server, when parceling exceptions, include the stack trace
473 Parcel.setStackTraceParceling(true);
474
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900475 // Ensure binder calls into the system always run at foreground priority.
476 BinderInternal.disableBackgroundScheduling(true);
Jeff Brown6f357d32014-01-15 20:40:55 -0800477
Tim Murrayeef4a3d2016-04-19 14:14:20 -0700478 // Increase the number of binder threads in system_server
479 BinderInternal.setMaxThreads(sMaxBinderThreads);
480
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900481 // Prepare the main looper thread (this thread).
482 android.os.Process.setThreadPriority(
Christine Franksea7d71b2018-07-03 14:46:07 -0700483 android.os.Process.THREAD_PRIORITY_FOREGROUND);
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900484 android.os.Process.setCanSelfBackground(false);
485 Looper.prepareMainLooper();
Makoto Onuki712886f2018-04-27 15:22:50 -0700486 Looper.getMainLooper().setSlowLogThresholdMs(
487 SLOW_DISPATCH_THRESHOLD_MS, SLOW_DELIVERY_THRESHOLD_MS);
Jeff Brown6f357d32014-01-15 20:40:55 -0800488
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900489 // Initialize native services.
490 System.loadLibrary("android_servers");
Jeff Brown6f357d32014-01-15 20:40:55 -0800491
Ryan Savitskicfdc1512018-12-14 16:20:52 +0000492 // Debug builds - allow heap profiling.
493 if (Build.IS_DEBUGGABLE) {
494 initZygoteChildHeapProfiling();
495 }
496
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900497 // Check whether we failed to shut down last time we tried.
498 // This call may not return.
499 performPendingShutdown();
Jeff Brown6f357d32014-01-15 20:40:55 -0800500
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900501 // Initialize the system context.
502 createSystemContext();
Jeff Brown6f357d32014-01-15 20:40:55 -0800503
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900504 // Create the system service manager.
505 mSystemServiceManager = new SystemServiceManager(mSystemContext);
Makoto Onukie8edbcf2018-03-02 16:49:29 -0800506 mSystemServiceManager.setStartInfo(mRuntimeRestart,
507 mRuntimeStartElapsedTime, mRuntimeStartUptime);
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900508 LocalServices.addService(SystemServiceManager.class, mSystemServiceManager);
Fyodor Kupolove29a5a12016-12-16 16:14:17 -0800509 // Prepare the thread pool for init tasks that can be parallelized
Felipe Leme29f1ae92019-10-03 15:38:43 -0700510 SystemServerInitThreadPool.start();
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900511 } finally {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700512 t.traceEnd(); // InitBeforeStartServices
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900513 }
Jeff Brown6f357d32014-01-15 20:40:55 -0800514
515 // Start services.
516 try {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700517 t.traceBegin("StartServices");
518 startBootstrapServices(t);
519 startCoreServices(t);
520 startOtherServices(t);
Fyodor Kupolovcd824ef2017-02-07 11:25:14 -0800521 SystemServerInitThreadPool.shutdown();
Jeff Brown2c43c332014-06-12 22:38:59 -0700522 } catch (Throwable ex) {
Jeff Brown6f357d32014-01-15 20:40:55 -0800523 Slog.e("System", "******************************************");
524 Slog.e("System", "************ Failure starting system services", ex);
525 throw ex;
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900526 } finally {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700527 t.traceEnd(); // StartServices
Jeff Brown6f357d32014-01-15 20:40:55 -0800528 }
529
Jeff Sharkey89182982017-11-01 19:02:56 -0600530 StrictMode.initVmDefaults(null);
531
Fyodor Kupolov4ba91b92017-01-20 18:12:35 -0800532 if (!mRuntimeRestart && !isFirstBootOrUpgrade()) {
Fyodor Kupolov24e12dc2017-01-17 12:20:36 -0800533 int uptimeMillis = (int) SystemClock.elapsedRealtime();
534 MetricsLogger.histogram(null, "boot_system_server_ready", uptimeMillis);
535 final int MAX_UPTIME_MILLIS = 60 * 1000;
536 if (uptimeMillis > MAX_UPTIME_MILLIS) {
Keun-young Park9b73a542017-02-01 12:09:58 -0800537 Slog.wtf(SYSTEM_SERVER_TIMING_TAG,
Fyodor Kupolov24e12dc2017-01-17 12:20:36 -0800538 "SystemServer init took too long. uptimeMillis=" + uptimeMillis);
539 }
Fyodor Kupolov6733e6c2017-01-06 18:27:05 -0800540 }
Jeff Brown6f357d32014-01-15 20:40:55 -0800541
Andreas Gampee697a4f2018-10-09 10:40:52 -0700542 // Diagnostic to ensure that the system is in a base healthy state. Done here as a common
543 // non-zygote process.
544 if (!VMRuntime.hasBootImageSpaces()) {
545 Slog.wtf(TAG, "Runtime is not running with a boot image!");
546 }
547
Jeff Brown6f357d32014-01-15 20:40:55 -0800548 // Loop forever.
549 Looper.loop();
550 throw new RuntimeException("Main thread loop unexpectedly exited");
551 }
552
Fyodor Kupolov4ba91b92017-01-20 18:12:35 -0800553 private boolean isFirstBootOrUpgrade() {
Svet Ganovd8eb8b22019-04-05 18:52:08 -0700554 return mPackageManagerService.isFirstBoot() || mPackageManagerService.isDeviceUpgrading();
Fyodor Kupolov4ba91b92017-01-20 18:12:35 -0800555 }
556
Jeff Brown6f357d32014-01-15 20:40:55 -0800557 private void reportWtf(String msg, Throwable e) {
Dianne Hackborn661cd522011-08-22 00:26:20 -0700558 Slog.w(TAG, "***********************************************");
Dianne Hackborn8d051722014-10-01 14:59:58 -0700559 Slog.wtf(TAG, "BOOT FAILURE " + msg, e);
Dianne Hackborn661cd522011-08-22 00:26:20 -0700560 }
561
Jeff Brown6f357d32014-01-15 20:40:55 -0800562 private void performPendingShutdown() {
563 final String shutdownAction = SystemProperties.get(
564 ShutdownThread.SHUTDOWN_ACTION_PROPERTY, "");
565 if (shutdownAction != null && shutdownAction.length() > 0) {
566 boolean reboot = (shutdownAction.charAt(0) == '1');
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800567
Jeff Brown6f357d32014-01-15 20:40:55 -0800568 final String reason;
569 if (shutdownAction.length() > 1) {
570 reason = shutdownAction.substring(1, shutdownAction.length());
571 } else {
572 reason = null;
Kenny Rootf547d672010-09-22 10:36:48 -0700573 }
Jeff Brown6f357d32014-01-15 20:40:55 -0800574
Tao Bao4fd6c262016-01-19 14:22:24 -0800575 // If it's a pending reboot into recovery to apply an update,
576 // always make sure uncrypt gets executed properly when needed.
577 // If '/cache/recovery/block.map' hasn't been created, stop the
578 // reboot which will fail for sure, and get a chance to capture a
Tao Baoe8a403d2015-12-31 07:44:55 -0800579 // bugreport when that's still feasible. (Bug: 26444951)
Tianjie Xu3a66fc42017-06-09 15:50:14 -0700580 if (reason != null && reason.startsWith(PowerManager.REBOOT_RECOVERY_UPDATE)) {
Tao Bao4fd6c262016-01-19 14:22:24 -0800581 File packageFile = new File(UNCRYPT_PACKAGE_FILE);
582 if (packageFile.exists()) {
583 String filename = null;
584 try {
585 filename = FileUtils.readTextFile(packageFile, 0, null);
586 } catch (IOException e) {
587 Slog.e(TAG, "Error reading uncrypt package file", e);
588 }
589
590 if (filename != null && filename.startsWith("/data")) {
591 if (!new File(BLOCK_MAP_FILE).exists()) {
592 Slog.e(TAG, "Can't find block map file, uncrypt failed or " +
Christine Franksea7d71b2018-07-03 14:46:07 -0700593 "unexpected runtime restart?");
Tao Bao4fd6c262016-01-19 14:22:24 -0800594 return;
595 }
596 }
597 }
598 }
Alison Cichowlasf0afd8c2017-07-31 11:24:34 -0400599 Runnable runnable = new Runnable() {
600 @Override
601 public void run() {
602 synchronized (this) {
603 ShutdownThread.rebootOrShutdown(null, reboot, reason);
604 }
605 }
606 };
607
608 // ShutdownThread must run on a looper capable of displaying the UI.
609 Message msg = Message.obtain(UiThread.getHandler(), runnable);
610 msg.setAsynchronous(true);
611 UiThread.getHandler().sendMessage(msg);
612
Kenny Rootf547d672010-09-22 10:36:48 -0700613 }
Jeff Brown6f357d32014-01-15 20:40:55 -0800614 }
Kenny Rootf547d672010-09-22 10:36:48 -0700615
Jeff Brown6f357d32014-01-15 20:40:55 -0800616 private void createSystemContext() {
617 ActivityThread activityThread = ActivityThread.systemMain();
618 mSystemContext = activityThread.getSystemContext();
Alan Viveretteba398ea2015-12-16 15:28:23 -0500619 mSystemContext.setTheme(DEFAULT_SYSTEM_THEME);
Adam Lesinskia82b6262017-03-21 16:56:17 -0700620
621 final Context systemUiContext = activityThread.getSystemUiContext();
622 systemUiContext.setTheme(DEFAULT_SYSTEM_THEME);
Jeff Brown6f357d32014-01-15 20:40:55 -0800623 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800624
Jeff Brown2c43c332014-06-12 22:38:59 -0700625 /**
Christine Franksea7d71b2018-07-03 14:46:07 -0700626 * Starts the small tangle of critical services that are needed to get the system off the
627 * ground. These services have complex mutual dependencies which is why we initialize them all
628 * in one place here. Unless your service is also entwined in these dependencies, it should be
629 * initialized in one of the other functions.
Jeff Brown2c43c332014-06-12 22:38:59 -0700630 */
Felipe Leme3aad1be2019-05-31 11:43:12 -0700631 private void startBootstrapServices(@NonNull TimingsTraceAndSlog t) {
Felipe Leme137e7812019-06-10 11:38:05 -0700632 t.traceBegin("startBootstrapServices");
633
Zimuzob065b152019-04-16 13:33:01 +0100634 // Start the watchdog as early as possible so we can crash the system server
635 // if we deadlock during early boot
Felipe Leme3aad1be2019-05-31 11:43:12 -0700636 t.traceBegin("StartWatchdog");
Zimuzob065b152019-04-16 13:33:01 +0100637 final Watchdog watchdog = Watchdog.getInstance();
638 watchdog.start();
Felipe Leme3aad1be2019-05-31 11:43:12 -0700639 t.traceEnd();
Zimuzob065b152019-04-16 13:33:01 +0100640
Fyodor Kupolovb76e0fd2017-01-30 13:28:25 -0800641 Slog.i(TAG, "Reading configuration...");
642 final String TAG_SYSTEM_CONFIG = "ReadingSystemConfig";
Felipe Leme3aad1be2019-05-31 11:43:12 -0700643 t.traceBegin(TAG_SYSTEM_CONFIG);
Felipe Lemeb68b7692019-10-09 10:43:03 -0700644 SystemServerInitThreadPool.submit(SystemConfig::getInstance, TAG_SYSTEM_CONFIG);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700645 t.traceEnd();
Fyodor Kupolovb76e0fd2017-01-30 13:28:25 -0800646
atrostde54a8ac2019-08-15 16:53:01 +0100647 // Platform compat service is used by ActivityManagerService, PackageManagerService, and
648 // possibly others in the future. b/135010838.
649 t.traceBegin("PlatformCompat");
atrost87488352019-10-10 19:27:31 +0100650 PlatformCompat platformCompat = new PlatformCompat(mSystemContext);
651 ServiceManager.addService(Context.PLATFORM_COMPAT_SERVICE, platformCompat);
652 ServiceManager.addService(Context.PLATFORM_COMPAT_NATIVE_SERVICE,
653 new PlatformCompatNative(platformCompat));
Andrei Oneaf965d152019-10-30 18:08:24 +0000654 AppCompatCallbacks.install(new long[0]);
atrostde54a8ac2019-08-15 16:53:01 +0100655 t.traceEnd();
656
Jeff Brown6f357d32014-01-15 20:40:55 -0800657 // Wait for installd to finish starting up so that it has a chance to
658 // create critical directories such as /data/user with the appropriate
659 // permissions. We need this to complete before we initialize other services.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700660 t.traceBegin("StartInstaller");
Narayan Kamath76a748e2014-11-10 14:23:41 +0000661 Installer installer = mSystemServiceManager.startService(Installer.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700662 t.traceEnd();
Jeff Brown6f357d32014-01-15 20:40:55 -0800663
Svet Ganov37e43272016-09-09 16:01:32 -0700664 // In some cases after launching an app we need to access device identifiers,
665 // therefore register the device identifier policy before the activity manager.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700666 t.traceBegin("DeviceIdentifiersPolicyService");
Svet Ganov37e43272016-09-09 16:01:32 -0700667 mSystemServiceManager.startService(DeviceIdentifiersPolicyService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700668 t.traceEnd();
Svet Ganov37e43272016-09-09 16:01:32 -0700669
Wale Ogunwale6d50dcc2018-07-21 23:00:40 -0700670 // Uri Grants Manager.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700671 t.traceBegin("UriGrantsManagerService");
Wale Ogunwale6d50dcc2018-07-21 23:00:40 -0700672 mSystemServiceManager.startService(UriGrantsManagerService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700673 t.traceEnd();
Wale Ogunwale6d50dcc2018-07-21 23:00:40 -0700674
Jeff Brown6f357d32014-01-15 20:40:55 -0800675 // Activity manager runs the show.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700676 t.traceBegin("StartActivityManager");
Wale Ogunwale16e505a2018-05-07 15:00:49 -0700677 // TODO: Might need to move after migration to WM.
678 ActivityTaskManagerService atm = mSystemServiceManager.startService(
679 ActivityTaskManagerService.Lifecycle.class).getService();
Wale Ogunwale9e4f3e02018-05-17 09:35:39 -0700680 mActivityManagerService = ActivityManagerService.Lifecycle.startService(
681 mSystemServiceManager, atm);
Dianne Hackborn91097de2014-04-04 18:02:06 -0700682 mActivityManagerService.setSystemServiceManager(mSystemServiceManager);
Narayan Kamath76a748e2014-11-10 14:23:41 +0000683 mActivityManagerService.setInstaller(installer);
Wale Ogunwale1f5e53d2018-11-05 05:12:46 -0800684 mWindowManagerGlobalLock = atm.getGlobalLock();
Felipe Leme3aad1be2019-05-31 11:43:12 -0700685 t.traceEnd();
Jeff Brown4ccb8232014-01-16 22:16:42 -0800686
Jeff Brown2c43c332014-06-12 22:38:59 -0700687 // Power manager needs to be started early because other services need it.
688 // Native daemons may be watching for it to be registered so it must be ready
689 // to handle incoming binder calls immediately (including being able to verify
690 // the permissions for those calls).
Felipe Leme3aad1be2019-05-31 11:43:12 -0700691 t.traceBegin("StartPowerManager");
Jeff Brown2c43c332014-06-12 22:38:59 -0700692 mPowerManagerService = mSystemServiceManager.startService(PowerManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700693 t.traceEnd();
Jeff Brown2c43c332014-06-12 22:38:59 -0700694
Felipe Leme3aad1be2019-05-31 11:43:12 -0700695 t.traceBegin("StartThermalManager");
Wei Wangbad7c202018-11-01 11:57:39 -0700696 mSystemServiceManager.startService(ThermalManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700697 t.traceEnd();
Wei Wangbad7c202018-11-01 11:57:39 -0700698
Jeff Brown2c43c332014-06-12 22:38:59 -0700699 // Now that the power manager has been started, let the activity manager
700 // initialize power management features.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700701 t.traceBegin("InitPowerManagement");
Jeff Brown2c43c332014-06-12 22:38:59 -0700702 mActivityManagerService.initPowerManagement();
Felipe Leme3aad1be2019-05-31 11:43:12 -0700703 t.traceEnd();
Jeff Brown2c43c332014-06-12 22:38:59 -0700704
Jeff Sharkeyfe6f85c2017-01-20 10:42:57 -0700705 // Bring up recovery system in case a rescue party needs a reboot
Felipe Leme3aad1be2019-05-31 11:43:12 -0700706 t.traceBegin("StartRecoverySystemService");
Narayan Kamath1c888f62017-10-30 14:35:15 +0000707 mSystemServiceManager.startService(RecoverySystemService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700708 t.traceEnd();
Jeff Sharkeyfe6f85c2017-01-20 10:42:57 -0700709
710 // Now that we have the bare essentials of the OS up and running, take
711 // note that we just booted, which might send out a rescue party if
712 // we're stuck in a runtime restart loop.
713 RescueParty.noteBoot(mSystemContext);
714
Jeff Brown5d6443b2015-04-10 20:15:01 -0700715 // Manages LEDs and display backlight so we need it to bring up the display.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700716 t.traceBegin("StartLightsService");
Jeff Brown5d6443b2015-04-10 20:15:01 -0700717 mSystemServiceManager.startService(LightsService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700718 t.traceEnd();
Jeff Brown5d6443b2015-04-10 20:15:01 -0700719
Felipe Leme3aad1be2019-05-31 11:43:12 -0700720 t.traceBegin("StartSidekickService");
Chris Phoenixbc839a32017-10-21 14:46:15 -0700721 // Package manager isn't started yet; need to use SysProp not hardware feature
722 if (SystemProperties.getBoolean("config.enable_sidekick_graphics", false)) {
723 mSystemServiceManager.startService(WEAR_SIDEKICK_SERVICE_CLASS);
724 }
Felipe Leme3aad1be2019-05-31 11:43:12 -0700725 t.traceEnd();
Chris Phoenixbc839a32017-10-21 14:46:15 -0700726
Jeff Brown4ccb8232014-01-16 22:16:42 -0800727 // Display manager is needed to provide display metrics before package manager
728 // starts up.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700729 t.traceBegin("StartDisplayManager");
Jeff Brown4ccb8232014-01-16 22:16:42 -0800730 mDisplayManagerService = mSystemServiceManager.startService(DisplayManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700731 t.traceEnd();
Jeff Brown2c43c332014-06-12 22:38:59 -0700732
733 // We need the default display before we can initialize the package manager.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700734 t.traceBegin("WaitForDisplay");
Felipe Leme137e7812019-06-10 11:38:05 -0700735 mSystemServiceManager.startBootPhase(t, SystemService.PHASE_WAIT_FOR_DEFAULT_DISPLAY);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700736 t.traceEnd();
Jeff Brown2c43c332014-06-12 22:38:59 -0700737
738 // Only run "core" apps if we're encrypting the device.
Inseob Kimc1246e62018-11-08 13:13:54 +0900739 String cryptState = VoldProperties.decrypt().orElse("");
Jeff Brown2c43c332014-06-12 22:38:59 -0700740 if (ENCRYPTING_STATE.equals(cryptState)) {
741 Slog.w(TAG, "Detected encryption in progress - only parsing core apps");
742 mOnlyCore = true;
743 } else if (ENCRYPTED_STATE.equals(cryptState)) {
744 Slog.w(TAG, "Device encrypted - only parsing core apps");
745 mOnlyCore = true;
746 }
747
748 // Start the package manager.
Fyodor Kupolov6733e6c2017-01-06 18:27:05 -0800749 if (!mRuntimeRestart) {
750 MetricsLogger.histogram(null, "boot_package_manager_init_start",
751 (int) SystemClock.elapsedRealtime());
752 }
Zimuzoe5cc6ab2019-06-14 11:47:45 +0100753
Felipe Leme3aad1be2019-05-31 11:43:12 -0700754 t.traceBegin("StartPackageManagerService");
Zimuzoe5cc6ab2019-06-14 11:47:45 +0100755 try {
756 Watchdog.getInstance().pauseWatchingCurrentThread("packagemanagermain");
757 mPackageManagerService = PackageManagerService.main(mSystemContext, installer,
758 mFactoryTestMode != FactoryTest.FACTORY_TEST_OFF, mOnlyCore);
759 } finally {
760 Watchdog.getInstance().resumeWatchingCurrentThread("packagemanagermain");
761 }
762
Jeff Brown2c43c332014-06-12 22:38:59 -0700763 mFirstBoot = mPackageManagerService.isFirstBoot();
764 mPackageManager = mSystemContext.getPackageManager();
Felipe Leme3aad1be2019-05-31 11:43:12 -0700765 t.traceEnd();
Fyodor Kupolov4ba91b92017-01-20 18:12:35 -0800766 if (!mRuntimeRestart && !isFirstBootOrUpgrade()) {
Fyodor Kupolov6733e6c2017-01-06 18:27:05 -0800767 MetricsLogger.histogram(null, "boot_package_manager_init_ready",
768 (int) SystemClock.elapsedRealtime());
769 }
Andreas Gampeabcbe2f2016-02-26 11:25:36 -0800770 // Manages A/B OTA dexopting. This is a bootstrap service as we need it to rename
771 // A/B artifacts after boot, before anything else might touch/need them.
772 // Note: this isn't needed during decryption (we don't have /data anyways).
773 if (!mOnlyCore) {
774 boolean disableOtaDexopt = SystemProperties.getBoolean("config.disable_otadexopt",
775 false);
776 if (!disableOtaDexopt) {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700777 t.traceBegin("StartOtaDexOptService");
Andreas Gampeabcbe2f2016-02-26 11:25:36 -0800778 try {
Zimuzof3c46142019-05-31 12:46:12 +0100779 Watchdog.getInstance().pauseWatchingCurrentThread("moveab");
Andreas Gampeabcbe2f2016-02-26 11:25:36 -0800780 OtaDexoptService.main(mSystemContext, mPackageManagerService);
781 } catch (Throwable e) {
782 reportWtf("starting OtaDexOptService", e);
783 } finally {
Zimuzof3c46142019-05-31 12:46:12 +0100784 Watchdog.getInstance().resumeWatchingCurrentThread("moveab");
Felipe Leme3aad1be2019-05-31 11:43:12 -0700785 t.traceEnd();
Andreas Gampeabcbe2f2016-02-26 11:25:36 -0800786 }
787 }
788 }
789
Felipe Leme3aad1be2019-05-31 11:43:12 -0700790 t.traceBegin("StartUserManagerService");
Amith Yamasanid04aaa32016-06-13 12:09:36 -0700791 mSystemServiceManager.startService(UserManagerService.LifeCycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700792 t.traceEnd();
Adam Lesinski3c153512014-07-23 17:34:34 -0700793
Jeff Brown2c43c332014-06-12 22:38:59 -0700794 // Initialize attribute cache used to cache resources from packages.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700795 t.traceBegin("InitAttributerCache");
Jeff Brown2c43c332014-06-12 22:38:59 -0700796 AttributeCache.init(mSystemContext);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700797 t.traceEnd();
Jeff Brown2c43c332014-06-12 22:38:59 -0700798
799 // Set up the Application instance for the system process and get started.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700800 t.traceBegin("SetSystemProcess");
Jeff Brown2c43c332014-06-12 22:38:59 -0700801 mActivityManagerService.setSystemProcess();
Felipe Leme3aad1be2019-05-31 11:43:12 -0700802 t.traceEnd();
Svet Ganovb9d71a62015-04-30 10:38:13 -0700803
Zimuzob065b152019-04-16 13:33:01 +0100804 // Complete the watchdog setup with an ActivityManager instance and listen for reboots
805 // Do this only after the ActivityManagerService is properly started as a system process
Felipe Leme3aad1be2019-05-31 11:43:12 -0700806 t.traceBegin("InitWatchdog");
Zimuzob065b152019-04-16 13:33:01 +0100807 watchdog.init(mSystemContext, mActivityManagerService);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700808 t.traceEnd();
Zimuzob065b152019-04-16 13:33:01 +0100809
Joel Fernandes2d314e12017-04-04 16:32:15 -0700810 // DisplayManagerService needs to setup android.display scheduling related policies
811 // since setSystemProcess() would have overridden policies due to setProcessGroup
812 mDisplayManagerService.setupSchedulerPolicies();
813
MÃ¥rten Kongstad2e0d0f32016-06-02 09:35:31 +0200814 // Manages Overlay packages
Felipe Leme3aad1be2019-05-31 11:43:12 -0700815 t.traceBegin("StartOverlayManagerService");
MÃ¥rten Kongstad77b53b22019-10-01 08:29:21 +0200816 mSystemServiceManager.startService(new OverlayManagerService(mSystemContext));
Felipe Leme3aad1be2019-05-31 11:43:12 -0700817 t.traceEnd();
MÃ¥rten Kongstad2e0d0f32016-06-02 09:35:31 +0200818
Felipe Leme3aad1be2019-05-31 11:43:12 -0700819 t.traceBegin("StartSensorPrivacyService");
Chad Brubaker90f391f2018-10-19 10:26:19 -0700820 mSystemServiceManager.startService(new SensorPrivacyService(mSystemContext));
Felipe Leme3aad1be2019-05-31 11:43:12 -0700821 t.traceEnd();
Chad Brubaker90f391f2018-10-19 10:26:19 -0700822
Winson72dbe7e2019-04-29 14:55:30 -0700823 if (SystemProperties.getInt("persist.sys.displayinset.top", 0) > 0) {
824 // DisplayManager needs the overlay immediately.
825 mActivityManagerService.updateSystemUiContext();
826 LocalServices.getService(DisplayManagerInternal.class).onOverlayChanged();
827 }
828
Svet Ganovb9d71a62015-04-30 10:38:13 -0700829 // The sensor service needs access to package manager service, app ops
830 // service, and permissions service, therefore we start it after them.
Keun-young Park9b73a542017-02-01 12:09:58 -0800831 // Start sensor service in a separate thread. Completion should be checked
832 // before using it.
Felipe Lemeb68b7692019-10-09 10:43:03 -0700833 mSensorServiceStart = SystemServerInitThreadPool.submit(() -> {
Felipe Leme137e7812019-06-10 11:38:05 -0700834 TimingsTraceAndSlog traceLog = TimingsTraceAndSlog.newAsyncLog();
Keun-young Park9b73a542017-02-01 12:09:58 -0800835 traceLog.traceBegin(START_SENSOR_SERVICE);
836 startSensorService();
837 traceLog.traceEnd();
838 }, START_SENSOR_SERVICE);
Felipe Leme137e7812019-06-10 11:38:05 -0700839
840 t.traceEnd(); // startBootstrapServices
Jeff Brown6f357d32014-01-15 20:40:55 -0800841 }
842
Jeff Brown2c43c332014-06-12 22:38:59 -0700843 /**
844 * Starts some essential services that are not tangled up in the bootstrap process.
845 */
Felipe Leme3aad1be2019-05-31 11:43:12 -0700846 private void startCoreServices(@NonNull TimingsTraceAndSlog t) {
Felipe Leme137e7812019-06-10 11:38:05 -0700847 t.traceBegin("startCoreServices");
848
Felipe Leme3aad1be2019-05-31 11:43:12 -0700849 t.traceBegin("StartBatteryService");
Jeff Brown21392762014-06-13 19:00:36 -0700850 // Tracks the battery level. Requires LightService.
851 mSystemServiceManager.startService(BatteryService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700852 t.traceEnd();
Adam Lesinski0debc9a2014-07-16 19:09:13 -0700853
854 // Tracks application usage stats.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700855 t.traceBegin("StartUsageService");
Adam Lesinski0debc9a2014-07-16 19:09:13 -0700856 mSystemServiceManager.startService(UsageStatsService.class);
857 mActivityManagerService.setUsageStatsManager(
858 LocalServices.getService(UsageStatsManagerInternal.class));
Felipe Leme3aad1be2019-05-31 11:43:12 -0700859 t.traceEnd();
Torne (Richard Coles)4dbeb352014-07-29 19:14:24 +0100860
861 // Tracks whether the updatable WebView is in a ready state and watches for update installs.
Torne (Richard Coles)ff937ac2017-10-02 17:09:32 -0400862 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_WEBVIEW)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700863 t.traceBegin("StartWebViewUpdateService");
Torne (Richard Coles)ff937ac2017-10-02 17:09:32 -0400864 mWebViewUpdateService = mSystemServiceManager.startService(WebViewUpdateService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700865 t.traceEnd();
Torne (Richard Coles)ff937ac2017-10-02 17:09:32 -0400866 }
Fyodor Kupolovca348512018-01-10 18:05:53 -0800867
Marcin Oczeretkoc80c81a2018-08-30 20:15:52 +0100868 // Tracks and caches the device state.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700869 t.traceBegin("StartCachedDeviceStateService");
Marcin Oczeretkoc80c81a2018-08-30 20:15:52 +0100870 mSystemServiceManager.startService(CachedDeviceStateService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700871 t.traceEnd();
Marcin Oczeretkoc80c81a2018-08-30 20:15:52 +0100872
Fyodor Kupolovca348512018-01-10 18:05:53 -0800873 // Tracks cpu time spent in binder calls
Felipe Leme3aad1be2019-05-31 11:43:12 -0700874 t.traceBegin("StartBinderCallsStatsService");
Olivier Gaillard1d7f6152018-07-03 13:57:58 +0100875 mSystemServiceManager.startService(BinderCallsStatsService.LifeCycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700876 t.traceEnd();
Marcin Oczeretkod8cc8592018-08-22 16:07:36 +0100877
878 // Tracks time spent in handling messages in handlers.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700879 t.traceBegin("StartLooperStatsService");
Marcin Oczeretkod8cc8592018-08-22 16:07:36 +0100880 mSystemServiceManager.startService(LooperStatsService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700881 t.traceEnd();
Richard Uhlerb29f1452018-09-12 16:38:15 +0100882
883 // Manages apk rollbacks.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700884 t.traceBegin("StartRollbackManagerService");
Richard Uhlere95d0552018-12-27 15:03:41 +0000885 mSystemServiceManager.startService(RollbackManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700886 t.traceEnd();
Nandana Duttd11850c2018-12-12 17:26:57 +0000887
888 // Service to capture bugreports.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700889 t.traceBegin("StartBugreportManagerService");
Nandana Duttd11850c2018-12-12 17:26:57 +0000890 mSystemServiceManager.startService(BugreportManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700891 t.traceEnd();
Peiyong Linfd71c202019-01-23 15:29:59 -0800892
893 // Serivce for GPU and GPU driver.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700894 t.traceBegin("GpuService");
Peiyong Linfd71c202019-01-23 15:29:59 -0800895 mSystemServiceManager.startService(GpuService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700896 t.traceEnd();
Felipe Leme137e7812019-06-10 11:38:05 -0700897
898 t.traceEnd(); // startCoreServices
Jeff Brown2c43c332014-06-12 22:38:59 -0700899 }
900
901 /**
Christine Franksea7d71b2018-07-03 14:46:07 -0700902 * Starts a miscellaneous grab bag of stuff that has yet to be refactored and organized.
Jeff Brown2c43c332014-06-12 22:38:59 -0700903 */
Felipe Leme3aad1be2019-05-31 11:43:12 -0700904 private void startOtherServices(@NonNull TimingsTraceAndSlog t) {
Felipe Leme137e7812019-06-10 11:38:05 -0700905 t.traceBegin("startOtherServices");
906
Jeff Brown6f357d32014-01-15 20:40:55 -0800907 final Context context = mSystemContext;
Jeff Brown7f6c2312012-04-13 20:38:38 -0700908 VibratorService vibrator = null;
Po-Chien Hsueh4e908c22019-03-07 11:57:17 +0800909 DynamicSystemService dynamicSystem = null;
Sudheer Shanka2250d562016-11-07 15:41:02 -0800910 IStorageManager storageManager = null;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700911 NetworkManagementService networkManagement = null;
Nathan Haroldb7282172017-09-11 19:50:19 -0700912 IpSecService ipSecService = null;
Jeff Sharkey75279902011-05-24 18:39:45 -0700913 NetworkStatsService networkStats = null;
Jeff Sharkeya4620792011-05-20 15:29:23 -0700914 NetworkPolicyManagerService networkPolicy = null;
Mike Lockwood0f79b542009-08-14 14:18:49 -0400915 ConnectivityService connectivity = null;
Christine Franksea7d71b2018-07-03 14:46:07 -0700916 NsdService serviceDiscovery = null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800917 WindowManagerService wm = null;
Mike Lockwoodb01e8bf2011-08-29 20:11:07 -0400918 SerialService serial = null;
Amith Yamasani6734b9f2010-09-13 16:24:08 -0700919 NetworkTimeUpdateService networkTimeUpdater = null;
Jeff Brown6ec6f792012-04-17 16:52:41 -0700920 InputManagerService inputManager = null;
Wink Savillea12a7b32012-09-20 10:09:45 -0700921 TelephonyRegistry telephonyRegistry = null;
Erik Gilling51e95df2013-06-26 11:06:51 -0700922 ConsumerIrService consumerIr = null;
Ye Wend97e1fd2014-07-24 12:56:45 -0700923 MmsServiceBroker mmsService = null;
Polina Bondarenkof8754ac2016-02-12 20:38:23 +0100924 HardwarePropertiesManagerService hardwarePropertiesService = null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800925
Abodunrinwa Tokid32906c2018-01-18 04:34:44 -0800926 boolean disableSystemTextClassifier = SystemProperties.getBoolean(
927 "config.disable_systemtextclassifier", false);
Felipe Leme29397ce2018-11-16 17:30:36 -0800928
Steve Paik117fcb02018-09-13 09:43:54 -0700929 boolean disableNetworkTime = SystemProperties.getBoolean("config.disable_networktime",
930 false);
Ivan Podogov8adaec02016-09-14 18:14:31 +0100931 boolean disableCameraService = SystemProperties.getBoolean("config.disable_cameraservice",
932 false);
Ivan Podogovf9973822017-05-11 15:51:34 +0100933 boolean enableLeftyService = SystemProperties.getBoolean("config.enable_lefty", false);
Wei Liu09de4192016-09-07 13:33:49 -0700934
Colin Cross039deed2017-02-18 20:05:47 +0000935 boolean isEmulator = SystemProperties.get("ro.kernel.qemu").equals("1");
936
Erik Wolsheimer640734f2018-01-29 13:57:44 -0800937 boolean isWatch = context.getPackageManager().hasSystemFeature(
938 PackageManager.FEATURE_WATCH);
939
paulhsia0a1b3222018-11-08 18:15:46 +0800940 boolean isArc = context.getPackageManager().hasSystemFeature(
941 "org.chromium.arc");
942
Rick Yiub2875922018-09-12 11:07:25 +0000943 boolean enableVrService = context.getPackageManager().hasSystemFeature(
944 PackageManager.FEATURE_VR_MODE_HIGH_PERFORMANCE);
945
Jeff Sharkeyfe6f85c2017-01-20 10:42:57 -0700946 // For debugging RescueParty
947 if (Build.IS_DEBUGGABLE && SystemProperties.getBoolean("debug.crash_system", false)) {
948 throw new RuntimeException();
949 }
950
Dan Morrille4d9a012013-03-28 18:10:43 -0700951 try {
Narayan Kamath97780462017-02-06 20:24:08 +0000952 final String SECONDARY_ZYGOTE_PRELOAD = "SecondaryZygotePreload";
953 // We start the preload ~1s before the webview factory preparation, to
954 // ensure that it completes before the 32 bit relro process is forked
955 // from the zygote. In the event that it takes too long, the webview
956 // RELRO process will block, but it will do so without holding any locks.
Felipe Lemeb68b7692019-10-09 10:43:03 -0700957 mZygotePreload = SystemServerInitThreadPool.submit(() -> {
Narayan Kamath97780462017-02-06 20:24:08 +0000958 try {
959 Slog.i(TAG, SECONDARY_ZYGOTE_PRELOAD);
Felipe Leme137e7812019-06-10 11:38:05 -0700960 TimingsTraceAndSlog traceLog = TimingsTraceAndSlog.newAsyncLog();
Narayan Kamath97780462017-02-06 20:24:08 +0000961 traceLog.traceBegin(SECONDARY_ZYGOTE_PRELOAD);
Chris Wailesefce9292019-01-11 13:19:20 -0800962 if (!Process.ZYGOTE_PROCESS.preloadDefault(Build.SUPPORTED_32_BIT_ABIS[0])) {
Narayan Kamath97780462017-02-06 20:24:08 +0000963 Slog.e(TAG, "Unable to preload default resources");
964 }
965 traceLog.traceEnd();
966 } catch (Exception ex) {
967 Slog.e(TAG, "Exception preloading default resources", ex);
968 }
969 }, SECONDARY_ZYGOTE_PRELOAD);
970
Felipe Leme3aad1be2019-05-31 11:43:12 -0700971 t.traceBegin("StartKeyAttestationApplicationIdProviderService");
Janis Danisevskis8ff1e192016-06-03 11:31:55 -0700972 ServiceManager.addService("sec_key_att_app_id_provider",
973 new KeyAttestationApplicationIdProviderService(context));
Felipe Leme3aad1be2019-05-31 11:43:12 -0700974 t.traceEnd();
Janis Danisevskis8ff1e192016-06-03 11:31:55 -0700975
Felipe Leme3aad1be2019-05-31 11:43:12 -0700976 t.traceBegin("StartKeyChainSystemService");
Robin Lee13935492017-03-23 15:28:37 +0000977 mSystemServiceManager.startService(KeyChainSystemService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700978 t.traceEnd();
Robin Lee13935492017-03-23 15:28:37 +0000979
Felipe Leme3aad1be2019-05-31 11:43:12 -0700980 t.traceBegin("StartSchedulingPolicyService");
Dianne Hackborn35f72be2013-09-16 10:57:39 -0700981 ServiceManager.addService("scheduling_policy", new SchedulingPolicyService());
Felipe Leme3aad1be2019-05-31 11:43:12 -0700982 t.traceEnd();
Glenn Kasten07b04652012-04-23 15:00:43 -0700983
Felipe Leme3aad1be2019-05-31 11:43:12 -0700984 t.traceBegin("StartTelecomLoaderService");
Santos Cordon5d2c1e62014-11-21 15:20:15 -0800985 mSystemServiceManager.startService(TelecomLoaderService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700986 t.traceEnd();
Santos Cordon5d2c1e62014-11-21 15:20:15 -0800987
Felipe Leme3aad1be2019-05-31 11:43:12 -0700988 t.traceBegin("StartTelephonyRegistry");
Jeff Brown2c43c332014-06-12 22:38:59 -0700989 telephonyRegistry = new TelephonyRegistry(context);
990 ServiceManager.addService("telephony.registry", telephonyRegistry);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700991 t.traceEnd();
Svetoslavb3038ec2013-02-13 14:39:30 -0800992
Felipe Leme3aad1be2019-05-31 11:43:12 -0700993 t.traceBegin("StartEntropyMixer");
Jeff Sharkey1cab76a2016-04-12 18:23:31 -0600994 mEntropyMixer = new EntropyMixer(context);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700995 t.traceEnd();
Nick Kralevich79619dd2013-03-04 13:05:32 -0800996
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800997 mContentResolver = context.getContentResolver();
998
Fred Quintanae91ebe22009-09-29 20:44:30 -0700999 // The AccountManager must come before the ContentService
Felipe Leme3aad1be2019-05-31 11:43:12 -07001000 t.traceBegin("StartAccountManagerService");
Jeff Sharkey1cab76a2016-04-12 18:23:31 -06001001 mSystemServiceManager.startService(ACCOUNT_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001002 t.traceEnd();
Fred Quintana60307342009-03-24 22:48:12 -07001003
Felipe Leme3aad1be2019-05-31 11:43:12 -07001004 t.traceBegin("StartContentService");
Jeff Sharkeya3ebfec2016-04-04 08:58:04 -06001005 mSystemServiceManager.startService(CONTENT_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001006 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001007
Felipe Leme3aad1be2019-05-31 11:43:12 -07001008 t.traceBegin("InstallSystemProviders");
Jeff Brown4ccb8232014-01-16 22:16:42 -08001009 mActivityManagerService.installSystemProviders();
Fyodor Kupolov7fcd6592017-12-15 11:56:36 -08001010 // Now that SettingsProvider is ready, reactivate SQLiteCompatibilityWalFlags
1011 SQLiteCompatibilityWalFlags.reset();
Felipe Leme3aad1be2019-05-31 11:43:12 -07001012 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001013
Yohei Yukawab8bbdaf2018-03-14 18:04:52 -07001014 // Records errors and logs, for example wtf()
1015 // Currently this service indirectly depends on SettingsProvider so do this after
1016 // InstallSystemProviders.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001017 t.traceBegin("StartDropBoxManager");
Yohei Yukawab8bbdaf2018-03-14 18:04:52 -07001018 mSystemServiceManager.startService(DropBoxManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001019 t.traceEnd();
Yohei Yukawab8bbdaf2018-03-14 18:04:52 -07001020
Felipe Leme3aad1be2019-05-31 11:43:12 -07001021 t.traceBegin("StartVibratorService");
Jeff Brown7f6c2312012-04-13 20:38:38 -07001022 vibrator = new VibratorService(context);
1023 ServiceManager.addService("vibrator", vibrator);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001024 t.traceEnd();
The Android Open Source Project10592532009-03-18 17:39:46 -07001025
Felipe Leme3aad1be2019-05-31 11:43:12 -07001026 t.traceBegin("StartDynamicSystemService");
Po-Chien Hsueh4e908c22019-03-07 11:57:17 +08001027 dynamicSystem = new DynamicSystemService(context);
1028 ServiceManager.addService("dynamic_system", dynamicSystem);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001029 t.traceEnd();
Howard Chen0a947642019-01-07 14:10:44 +08001030
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001031 if (!isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001032 t.traceBegin("StartConsumerIrService");
Wei Liu09de4192016-09-07 13:33:49 -07001033 consumerIr = new ConsumerIrService(context);
1034 ServiceManager.addService(Context.CONSUMER_IR_SERVICE, consumerIr);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001035 t.traceEnd();
Wei Liu09de4192016-09-07 13:33:49 -07001036 }
Erik Gilling51e95df2013-06-26 11:06:51 -07001037
Felipe Leme3aad1be2019-05-31 11:43:12 -07001038 t.traceBegin("StartAlarmManagerService");
Suprabh Shukla6226c2f2018-08-22 18:15:04 -07001039 mSystemServiceManager.startService(new AlarmManagerService(context));
Felipe Leme3aad1be2019-05-31 11:43:12 -07001040 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001041
Felipe Leme3aad1be2019-05-31 11:43:12 -07001042 t.traceBegin("StartInputManagerService");
Jeff Brown4ccb8232014-01-16 22:16:42 -08001043 inputManager = new InputManagerService(context);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001044 t.traceEnd();
Jeff Browna9d131c2012-09-20 16:48:17 -07001045
Felipe Leme3aad1be2019-05-31 11:43:12 -07001046 t.traceBegin("StartWindowManagerService");
Keun-young Park9b73a542017-02-01 12:09:58 -08001047 // WMS needs sensor service ready
1048 ConcurrentUtils.waitForFutureNoInterrupt(mSensorServiceStart, START_SENSOR_SERVICE);
1049 mSensorServiceStart = null;
Yohei Yukawae24ed792018-08-28 19:10:32 -07001050 wm = WindowManagerService.main(context, inputManager, !mFirstBoot, mOnlyCore,
Yunfan Chenc2ff6cf2018-12-04 16:56:21 -08001051 new PhoneWindowManager(), mActivityManagerService.mActivityTaskManager);
Vishnu Naire9852f52017-10-11 18:09:55 -07001052 ServiceManager.addService(Context.WINDOW_SERVICE, wm, /* allowIsolated= */ false,
Vishnu Naire78b01a2017-10-26 10:11:54 -07001053 DUMP_FLAG_PRIORITY_CRITICAL | DUMP_FLAG_PROTO);
Vishnu Nair3764f4e2018-03-02 07:56:44 -08001054 ServiceManager.addService(Context.INPUT_SERVICE, inputManager,
1055 /* allowIsolated= */ false, DUMP_FLAG_PRIORITY_CRITICAL);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001056 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001057
Felipe Leme3aad1be2019-05-31 11:43:12 -07001058 t.traceBegin("SetWindowManagerService");
Bryce Leef19cbe22018-02-02 15:09:21 -08001059 mActivityManagerService.setWindowManager(wm);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001060 t.traceEnd();
Bryce Leef19cbe22018-02-02 15:09:21 -08001061
Felipe Leme3aad1be2019-05-31 11:43:12 -07001062 t.traceBegin("WindowManagerServiceOnInitReady");
Bryce Leef19cbe22018-02-02 15:09:21 -08001063 wm.onInitReady();
Felipe Leme3aad1be2019-05-31 11:43:12 -07001064 t.traceEnd();
Bryce Leef19cbe22018-02-02 15:09:21 -08001065
Yifan Hong604c12c2017-03-20 10:57:44 -07001066 // Start receiving calls from HIDL services. Start in in a separate thread
1067 // because it need to connect to SensorManager. This have to start
1068 // after START_SENSOR_SERVICE is done.
Felipe Lemeb68b7692019-10-09 10:43:03 -07001069 SystemServerInitThreadPool.submit(() -> {
Felipe Leme137e7812019-06-10 11:38:05 -07001070 TimingsTraceAndSlog traceLog = TimingsTraceAndSlog.newAsyncLog();
Roger 1 Jönsson341b2c12017-05-17 14:21:55 +02001071 traceLog.traceBegin(START_HIDL_SERVICES);
Yifan Hong604c12c2017-03-20 10:57:44 -07001072 startHidlServices();
Roger 1 Jönsson341b2c12017-05-17 14:21:55 +02001073 traceLog.traceEnd();
Yifan Hong604c12c2017-03-20 10:57:44 -07001074 }, START_HIDL_SERVICES);
1075
Rick Yiub2875922018-09-12 11:07:25 +00001076 if (!isWatch && enableVrService) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001077 t.traceBegin("StartVrManagerService");
Wei Liuef89d212016-09-19 15:10:33 -07001078 mSystemServiceManager.startService(VrManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001079 t.traceEnd();
Wei Liuef89d212016-09-19 15:10:33 -07001080 }
Ruben Brunkdd18a0b2015-12-04 16:16:31 -08001081
Felipe Leme3aad1be2019-05-31 11:43:12 -07001082 t.traceBegin("StartInputManager");
Arthur Hung95b38a92018-07-20 18:56:12 +08001083 inputManager.setWindowManagerCallbacks(wm.getInputManagerCallback());
Jeff Browna9d131c2012-09-20 16:48:17 -07001084 inputManager.start();
Felipe Leme3aad1be2019-05-31 11:43:12 -07001085 t.traceEnd();
Jeff Browna9d131c2012-09-20 16:48:17 -07001086
Jeff Brown4ccb8232014-01-16 22:16:42 -08001087 // TODO: Use service dependencies instead.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001088 t.traceBegin("DisplayManagerWindowManagerAndInputReady");
Jeff Brown4ccb8232014-01-16 22:16:42 -08001089 mDisplayManagerService.windowManagerAndInputReady();
Felipe Leme3aad1be2019-05-31 11:43:12 -07001090 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001091
Hayden Gomes013a7f82019-05-14 09:30:39 -07001092 if (mFactoryTestMode == FactoryTest.FACTORY_TEST_LOW_LEVEL) {
David 'Digit' Turnere2a5e862011-01-17 00:32:33 +01001093 Slog.i(TAG, "No Bluetooth Service (factory test)");
Matthew Xie1dd01eb32013-04-26 12:37:54 -07001094 } else if (!context.getPackageManager().hasSystemFeature
Christine Franksea7d71b2018-07-03 14:46:07 -07001095 (PackageManager.FEATURE_BLUETOOTH)) {
Matthew Xie1dd01eb32013-04-26 12:37:54 -07001096 Slog.i(TAG, "No Bluetooth Service (Bluetooth Hardware Not Present)");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001097 } else {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001098 t.traceBegin("StartBluetoothService");
Miao Chou658bf2f2015-06-26 17:14:35 -07001099 mSystemServiceManager.startService(BluetoothService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001100 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001101 }
Pavel Zhamaitsiak02b3e6b2016-02-03 10:39:44 -08001102
Felipe Leme3aad1be2019-05-31 11:43:12 -07001103 t.traceBegin("IpConnectivityMetrics");
Hugo Benichieab511b2016-09-09 09:23:47 +09001104 mSystemServiceManager.startService(IpConnectivityMetrics.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001105 t.traceEnd();
Hugo Benichieab511b2016-09-09 09:23:47 +09001106
Felipe Leme3aad1be2019-05-31 11:43:12 -07001107 t.traceBegin("NetworkWatchlistService");
Ricky Wai1a6e6672017-10-27 14:46:01 +01001108 mSystemServiceManager.startService(NetworkWatchlistService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001109 t.traceEnd();
Ricky Wai1a6e6672017-10-27 14:46:01 +01001110
Felipe Leme3aad1be2019-05-31 11:43:12 -07001111 t.traceBegin("PinnerService");
Philip Cuadra7bd0fdd2016-04-28 15:26:49 -07001112 mSystemServiceManager.startService(PinnerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001113 t.traceEnd();
Mathew Inwood4e2ed6a2018-11-26 15:31:16 +00001114
Felipe Leme3aad1be2019-05-31 11:43:12 -07001115 t.traceBegin("IorapForwardingService");
Igor Murashkin4de1e162018-11-26 10:33:17 -08001116 mSystemServiceManager.startService(IorapForwardingService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001117 t.traceEnd();
Igor Murashkin4de1e162018-11-26 10:33:17 -08001118
Felipe Leme3aad1be2019-05-31 11:43:12 -07001119 t.traceBegin("SignedConfigService");
Mathew Inwood4e2ed6a2018-11-26 15:31:16 +00001120 SignedConfigService.registerUpdateReceiver(mSystemContext);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001121 t.traceEnd();
Andrei Oneacf109842019-07-17 19:03:10 +01001122
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001123 } catch (RuntimeException e) {
Dianne Hackborn661cd522011-08-22 00:26:20 -07001124 Slog.e("System", "******************************************");
1125 Slog.e("System", "************ Failure starting core service", e);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001126 }
1127
Rene Mayrhofer7d6c8e52018-11-28 11:32:40 -08001128 // Before things start rolling, be sure we have decided whether
1129 // we are in safe mode.
1130 final boolean safeMode = wm.detectSafeMode();
1131 if (safeMode) {
1132 // If yes, immediately turn on the global setting for airplane mode.
1133 // Note that this does not send broadcasts at this stage because
1134 // subsystems are not yet up. We will send broadcasts later to ensure
1135 // all listeners have the chance to react with special handling.
1136 Settings.Global.putInt(context.getContentResolver(),
1137 Settings.Global.AIRPLANE_MODE_ON, 1);
1138 }
1139
Joe Onorato089de882010-04-12 08:18:45 -07001140 StatusBarManagerService statusBar = null;
Adam Lesinskief2ea1f2013-12-05 16:48:06 -08001141 INotificationManager notification = null;
Bai Taoa58a8752010-07-13 15:32:16 +08001142 CountryDetectorService countryDetector = null;
Jim Miller4f93c582016-01-27 19:05:43 -08001143 ILockSettings lockSettings = null;
Jeff Brown69b07162013-11-07 00:30:16 -08001144 MediaRouterService mediaRouter = null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001145
Dianne Hackborn661cd522011-08-22 00:26:20 -07001146 // Bring up services needed for UI.
Jeff Brown6f357d32014-01-15 20:40:55 -08001147 if (mFactoryTestMode != FactoryTest.FACTORY_TEST_LOW_LEVEL) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001148 t.traceBegin("StartInputMethodManagerLifecycle");
Yohei Yukawa6048d892018-12-25 09:57:31 -08001149 if (InputMethodSystemProperty.MULTI_CLIENT_IME_ENABLED) {
Yohei Yukawabae5bea2018-11-12 15:08:30 -08001150 mSystemServiceManager.startService(
1151 MultiClientInputMethodManagerService.Lifecycle.class);
1152 } else {
1153 mSystemServiceManager.startService(InputMethodManagerService.Lifecycle.class);
1154 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001155 t.traceEnd();
Dianne Hackborn661cd522011-08-22 00:26:20 -07001156
Felipe Leme3aad1be2019-05-31 11:43:12 -07001157 t.traceBegin("StartAccessibilityManagerService");
dcashman4e3f5d32014-11-25 15:33:26 -08001158 try {
Rhed Jao8a39cef2018-07-18 11:43:33 +08001159 mSystemServiceManager.startService(ACCESSIBILITY_MANAGER_SERVICE_CLASS);
dcashman4e3f5d32014-11-25 15:33:26 -08001160 } catch (Throwable e) {
1161 reportWtf("starting Accessibility Manager", e);
Dianne Hackborn661cd522011-08-22 00:26:20 -07001162 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001163 t.traceEnd();
Dianne Hackborn661cd522011-08-22 00:26:20 -07001164 }
1165
Felipe Leme3aad1be2019-05-31 11:43:12 -07001166 t.traceBegin("MakeDisplayReady");
Dianne Hackborn661cd522011-08-22 00:26:20 -07001167 try {
1168 wm.displayReady();
1169 } catch (Throwable e) {
1170 reportWtf("making display ready", e);
1171 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001172 t.traceEnd();
Dianne Hackborn8795b602011-08-25 13:30:53 -07001173
Jeff Brown6f357d32014-01-15 20:40:55 -08001174 if (mFactoryTestMode != FactoryTest.FACTORY_TEST_LOW_LEVEL) {
Narayan Kamath1c888f62017-10-30 14:35:15 +00001175 if (!"0".equals(SystemProperties.get("system_init.startmountservice"))) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001176 t.traceBegin("StartStorageManagerService");
Kenny Root51a573c2012-05-17 13:30:28 -07001177 try {
1178 /*
Sudheer Shanka2250d562016-11-07 15:41:02 -08001179 * NotificationManagerService is dependant on StorageManagerService,
1180 * (for media / usb notifications) so we must start StorageManagerService first.
Kenny Root51a573c2012-05-17 13:30:28 -07001181 */
Sudheer Shanka2250d562016-11-07 15:41:02 -08001182 mSystemServiceManager.startService(STORAGE_MANAGER_SERVICE_CLASS);
1183 storageManager = IStorageManager.Stub.asInterface(
Jeff Sharkey56e62932015-03-21 20:41:00 -07001184 ServiceManager.getService("mount"));
Kenny Root51a573c2012-05-17 13:30:28 -07001185 } catch (Throwable e) {
Jeff Sharkeye8cece92017-01-04 11:33:33 -07001186 reportWtf("starting StorageManagerService", e);
1187 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001188 t.traceEnd();
Jeff Sharkeye8cece92017-01-04 11:33:33 -07001189
Felipe Leme3aad1be2019-05-31 11:43:12 -07001190 t.traceBegin("StartStorageStatsService");
Jeff Sharkeye8cece92017-01-04 11:33:33 -07001191 try {
1192 mSystemServiceManager.startService(STORAGE_STATS_SERVICE_CLASS);
1193 } catch (Throwable e) {
1194 reportWtf("starting StorageStatsService", e);
Kenny Root51a573c2012-05-17 13:30:28 -07001195 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001196 t.traceEnd();
Kenny Root51a573c2012-05-17 13:30:28 -07001197 }
padarshrada45412014-11-05 16:54:50 +05301198 }
Kenny Root51a573c2012-05-17 13:30:28 -07001199
Adam Lesinski05199e82015-03-19 14:37:11 -07001200 // We start this here so that we update our configuration to set watch or television
1201 // as appropriate.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001202 t.traceBegin("StartUiModeManager");
Adam Lesinski05199e82015-03-19 14:37:11 -07001203 mSystemServiceManager.startService(UiModeManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001204 t.traceEnd();
Adam Lesinski05199e82015-03-19 14:37:11 -07001205
David Brazdil89c80bb2016-06-02 15:31:30 +01001206 if (!mOnlyCore) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001207 t.traceBegin("UpdatePackagesIfNeeded");
David Brazdil89c80bb2016-06-02 15:31:30 +01001208 try {
Zimuzo2a050392019-05-09 12:51:33 +01001209 Watchdog.getInstance().pauseWatchingCurrentThread("dexopt");
David Brazdil89c80bb2016-06-02 15:31:30 +01001210 mPackageManagerService.updatePackagesIfNeeded();
1211 } catch (Throwable e) {
1212 reportWtf("update packages", e);
Zimuzo2a050392019-05-09 12:51:33 +01001213 } finally {
1214 Watchdog.getInstance().resumeWatchingCurrentThread("dexopt");
David Brazdil89c80bb2016-06-02 15:31:30 +01001215 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001216 t.traceEnd();
David Brazdilf5c444f2016-03-30 11:45:52 +01001217 }
David Brazdilf5c444f2016-03-30 11:45:52 +01001218
Felipe Leme3aad1be2019-05-31 11:43:12 -07001219 t.traceBegin("PerformFstrimIfNeeded");
padarshrada45412014-11-05 16:54:50 +05301220 try {
Nicolas Geoffray27c07372015-11-05 16:54:09 +00001221 mPackageManagerService.performFstrimIfNeeded();
padarshrada45412014-11-05 16:54:50 +05301222 } catch (Throwable e) {
Nicolas Geoffray27c07372015-11-05 16:54:09 +00001223 reportWtf("performing fstrim", e);
padarshrada45412014-11-05 16:54:50 +05301224 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001225 t.traceEnd();
padarshrada45412014-11-05 16:54:50 +05301226
padarshrada45412014-11-05 16:54:50 +05301227 if (mFactoryTestMode != FactoryTest.FACTORY_TEST_LOW_LEVEL) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001228 t.traceBegin("StartLockSettingsService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001229 try {
1230 mSystemServiceManager.startService(LOCK_SETTINGS_SERVICE_CLASS);
1231 lockSettings = ILockSettings.Stub.asInterface(
Christine Franksea7d71b2018-07-03 14:46:07 -07001232 ServiceManager.getService("lock_settings"));
Narayan Kamath1c888f62017-10-30 14:35:15 +00001233 } catch (Throwable e) {
1234 reportWtf("starting LockSettingsService service", e);
1235 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001236 t.traceEnd();
Dan Morrille4d9a012013-03-28 18:10:43 -07001237
Narayan Kamath1c888f62017-10-30 14:35:15 +00001238 final boolean hasPdb = !SystemProperties.get(PERSISTENT_DATA_BLOCK_PROP).equals("");
David Andersona032a2b2019-02-07 14:07:23 -08001239 final boolean hasGsi = SystemProperties.getInt(GSI_RUNNING_PROP, 0) > 0;
1240 if (hasPdb && !hasGsi) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001241 t.traceBegin("StartPersistentDataBlock");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001242 mSystemServiceManager.startService(PersistentDataBlockService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001243 t.traceEnd();
Amith Yamasani52c489c2012-03-28 11:42:42 -07001244 }
1245
Felipe Leme3aad1be2019-05-31 11:43:12 -07001246 t.traceBegin("StartTestHarnessMode");
William Hester87ac4ea2019-05-06 16:23:47 -07001247 mSystemServiceManager.startService(TestHarnessModeService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001248 t.traceEnd();
William Hester87ac4ea2019-05-06 16:23:47 -07001249
Narayan Kamath1c888f62017-10-30 14:35:15 +00001250 if (hasPdb || OemLockService.isHalPresent()) {
1251 // Implementation depends on pdb or the OemLock HAL
Felipe Leme3aad1be2019-05-31 11:43:12 -07001252 t.traceBegin("StartOemLockService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001253 mSystemServiceManager.startService(OemLockService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001254 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001255 }
1256
Felipe Leme3aad1be2019-05-31 11:43:12 -07001257 t.traceBegin("StartDeviceIdleController");
Makoto Onuki52c24b32019-08-23 10:18:28 -07001258 mSystemServiceManager.startService(DEVICE_IDLE_CONTROLLER_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001259 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001260
1261 // Always start the Device Policy Manager, so that the API is compatible with
1262 // API8.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001263 t.traceBegin("StartDevicePolicyManager");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001264 mSystemServiceManager.startService(DevicePolicyManagerService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001265 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001266
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001267 if (!isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001268 t.traceBegin("StartStatusBarManagerService");
Dan Morrille4d9a012013-03-28 18:10:43 -07001269 try {
Dan Morrille4d9a012013-03-28 18:10:43 -07001270 statusBar = new StatusBarManagerService(context, wm);
1271 ServiceManager.addService(Context.STATUS_BAR_SERVICE, statusBar);
1272 } catch (Throwable e) {
1273 reportWtf("starting StatusBarManagerService", e);
1274 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001275 t.traceEnd();
Dianne Hackbornd6847842010-01-12 18:14:19 -08001276 }
1277
Felipe Leme3aad1be2019-05-31 11:43:12 -07001278 startContentCaptureService(context, t);
1279 startAttentionService(context, t);
Felipe Leme927fbf02018-11-12 17:27:23 -08001280
Felipe Leme3aad1be2019-05-31 11:43:12 -07001281 startSystemCaptionsManagerService(context, t);
Robert Berry835123d2019-03-18 16:33:42 -04001282
Sunny Goyal54e91342018-11-14 11:59:02 -08001283 // App prediction manager service
Felipe Leme83e8f242019-08-14 16:57:56 +00001284 if (deviceHasConfigString(context, R.string.config_defaultAppPredictionService)) {
1285 t.traceBegin("StartAppPredictionService");
1286 mSystemServiceManager.startService(APP_PREDICTION_MANAGER_SERVICE_CLASS);
1287 t.traceEnd();
1288 } else {
1289 Slog.d(TAG, "AppPredictionService not defined by OEM");
1290 }
Sunny Goyal54e91342018-11-14 11:59:02 -08001291
Winson Chung3fb0f252019-01-08 17:41:55 -08001292 // Content suggestions manager service
Felipe Leme83e8f242019-08-14 16:57:56 +00001293 if (deviceHasConfigString(context, R.string.config_defaultContentSuggestionsService)) {
1294 t.traceBegin("StartContentSuggestionsService");
1295 mSystemServiceManager.startService(CONTENT_SUGGESTIONS_SERVICE_CLASS);
1296 t.traceEnd();
1297 } else {
1298 Slog.d(TAG, "ContentSuggestionsService not defined by OEM");
1299 }
Winson Chung3fb0f252019-01-08 17:41:55 -08001300
Roshan Pius7e6f5f52019-06-27 14:14:40 -07001301 t.traceBegin("InitConnectivityModuleConnector");
1302 try {
1303 ConnectivityModuleConnector.getInstance().init(context);
1304 } catch (Throwable e) {
1305 reportWtf("initializing ConnectivityModuleConnector", e);
1306 }
1307 t.traceEnd();
1308
Felipe Leme3aad1be2019-05-31 11:43:12 -07001309 t.traceBegin("InitNetworkStackClient");
Remi NGUYEN VAN389443c2019-03-15 08:21:27 +09001310 try {
1311 NetworkStackClient.getInstance().init();
1312 } catch (Throwable e) {
1313 reportWtf("initializing NetworkStackClient", e);
1314 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001315 t.traceEnd();
Remi NGUYEN VAN389443c2019-03-15 08:21:27 +09001316
Felipe Leme3aad1be2019-05-31 11:43:12 -07001317 t.traceBegin("StartNetworkManagementService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001318 try {
1319 networkManagement = NetworkManagementService.create(context);
1320 ServiceManager.addService(Context.NETWORKMANAGEMENT_SERVICE, networkManagement);
1321 } catch (Throwable e) {
1322 reportWtf("starting NetworkManagement Service", e);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001323 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001324 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001325
Chalard Jean8c141bd2018-12-04 20:20:56 +09001326
Felipe Leme3aad1be2019-05-31 11:43:12 -07001327 t.traceBegin("StartIpSecService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001328 try {
1329 ipSecService = IpSecService.create(context);
1330 ServiceManager.addService(Context.IPSEC_SERVICE, ipSecService);
1331 } catch (Throwable e) {
1332 reportWtf("starting IpSec Service", e);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001333 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001334 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001335
Felipe Leme3aad1be2019-05-31 11:43:12 -07001336 t.traceBegin("StartTextServicesManager");
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001337 mSystemServiceManager.startService(TextServicesManagerService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001338 t.traceEnd();
San Mehatd1df8ac2010-01-26 06:17:26 -08001339
Abodunrinwa Tokid32906c2018-01-18 04:34:44 -08001340 if (!disableSystemTextClassifier) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001341 t.traceBegin("StartTextClassificationManagerService");
Christine Franksea7d71b2018-07-03 14:46:07 -07001342 mSystemServiceManager
1343 .startService(TextClassificationManagerService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001344 t.traceEnd();
Abodunrinwa Tokid32906c2018-01-18 04:34:44 -08001345 }
1346
Felipe Leme3aad1be2019-05-31 11:43:12 -07001347 t.traceBegin("StartNetworkScoreService");
Mehdi Alizadehce2d9632018-03-28 17:34:24 -07001348 mSystemServiceManager.startService(NetworkScoreService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001349 t.traceEnd();
vandwalle7c3606c2014-03-31 19:12:07 -07001350
Felipe Leme3aad1be2019-05-31 11:43:12 -07001351 t.traceBegin("StartNetworkStatsService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001352 try {
1353 networkStats = NetworkStatsService.create(context, networkManagement);
1354 ServiceManager.addService(Context.NETWORK_STATS_SERVICE, networkStats);
1355 } catch (Throwable e) {
1356 reportWtf("starting NetworkStats Service", e);
1357 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001358 t.traceEnd();
Dan Morrille4d9a012013-03-28 18:10:43 -07001359
Felipe Leme3aad1be2019-05-31 11:43:12 -07001360 t.traceBegin("StartNetworkPolicyManagerService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001361 try {
Jeff Sharkeye0c29952018-02-20 17:24:55 -07001362 networkPolicy = new NetworkPolicyManagerService(context, mActivityManagerService,
1363 networkManagement);
Narayan Kamath1c888f62017-10-30 14:35:15 +00001364 ServiceManager.addService(Context.NETWORK_POLICY_SERVICE, networkPolicy);
1365 } catch (Throwable e) {
1366 reportWtf("starting NetworkPolicy Service", e);
1367 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001368 t.traceEnd();
Dan Morrille4d9a012013-03-28 18:10:43 -07001369
Roshan Piusc0bd9452019-01-28 10:03:07 -08001370 if (context.getPackageManager().hasSystemFeature(
Roshan Piusc0bd9452019-01-28 10:03:07 -08001371 PackageManager.FEATURE_LOWPAN)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001372 t.traceBegin("StartLowpan");
Roshan Piusc0bd9452019-01-28 10:03:07 -08001373 mSystemServiceManager.startService(LOWPAN_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001374 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001375 }
Lorenzo Colittif9ff2c92014-05-21 16:32:11 -07001376
Narayan Kamath1c888f62017-10-30 14:35:15 +00001377 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_ETHERNET) ||
Christine Franksea7d71b2018-07-03 14:46:07 -07001378 mPackageManager.hasSystemFeature(PackageManager.FEATURE_USB_HOST)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001379 t.traceBegin("StartEthernet");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001380 mSystemServiceManager.startService(ETHERNET_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001381 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001382 }
1383
Felipe Leme3aad1be2019-05-31 11:43:12 -07001384 t.traceBegin("StartConnectivityService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001385 try {
1386 connectivity = new ConnectivityService(
Christine Franksea7d71b2018-07-03 14:46:07 -07001387 context, networkManagement, networkStats, networkPolicy);
Narayan Kamath1c888f62017-10-30 14:35:15 +00001388 ServiceManager.addService(Context.CONNECTIVITY_SERVICE, connectivity,
Christine Franksea7d71b2018-07-03 14:46:07 -07001389 /* allowIsolated= */ false,
1390 DUMP_FLAG_PRIORITY_HIGH | DUMP_FLAG_PRIORITY_NORMAL);
Narayan Kamath1c888f62017-10-30 14:35:15 +00001391 networkPolicy.bindConnectivityManager(connectivity);
1392 } catch (Throwable e) {
1393 reportWtf("starting Connectivity Service", e);
satok988323c2011-06-22 16:38:13 +09001394 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001395 t.traceEnd();
satok988323c2011-06-22 16:38:13 +09001396
Felipe Leme3aad1be2019-05-31 11:43:12 -07001397 t.traceBegin("StartNsdService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001398 try {
1399 serviceDiscovery = NsdService.create(context);
1400 ServiceManager.addService(
Christine Franksea7d71b2018-07-03 14:46:07 -07001401 Context.NSD_SERVICE, serviceDiscovery);
Narayan Kamath1c888f62017-10-30 14:35:15 +00001402 } catch (Throwable e) {
1403 reportWtf("starting Service Discovery Service", e);
Christopher Tate8662cab52012-02-23 14:59:36 -08001404 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001405 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001406
Felipe Leme3aad1be2019-05-31 11:43:12 -07001407 t.traceBegin("StartSystemUpdateManagerService");
Tao Bao07342dc2017-01-24 15:08:21 -08001408 try {
1409 ServiceManager.addService(Context.SYSTEM_UPDATE_SERVICE,
1410 new SystemUpdateManagerService(context));
1411 } catch (Throwable e) {
1412 reportWtf("starting SystemUpdateManagerService", e);
1413 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001414 t.traceEnd();
Tao Bao07342dc2017-01-24 15:08:21 -08001415
Felipe Leme3aad1be2019-05-31 11:43:12 -07001416 t.traceBegin("StartUpdateLockService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001417 try {
1418 ServiceManager.addService(Context.UPDATE_LOCK_SERVICE,
Christine Franksea7d71b2018-07-03 14:46:07 -07001419 new UpdateLockService(context));
Narayan Kamath1c888f62017-10-30 14:35:15 +00001420 } catch (Throwable e) {
1421 reportWtf("starting UpdateLockService", e);
1422 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001423 t.traceEnd();
Christopher Tate8662cab52012-02-23 14:59:36 -08001424
Felipe Leme3aad1be2019-05-31 11:43:12 -07001425 t.traceBegin("StartNotificationManager");
Jeff Brown6f357d32014-01-15 20:40:55 -08001426 mSystemServiceManager.startService(NotificationManagerService.class);
Rubin Xu897750a2019-04-30 17:15:03 +01001427 SystemNotificationChannels.removeDeprecated(context);
Geoffrey Pitschaf759c52017-02-15 09:35:38 -05001428 SystemNotificationChannels.createAll(context);
Adam Lesinskief2ea1f2013-12-05 16:48:06 -08001429 notification = INotificationManager.Stub.asInterface(
1430 ServiceManager.getService(Context.NOTIFICATION_SERVICE));
Felipe Leme3aad1be2019-05-31 11:43:12 -07001431 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001432
Felipe Leme3aad1be2019-05-31 11:43:12 -07001433 t.traceBegin("StartDeviceMonitor");
Jeff Brown6f357d32014-01-15 20:40:55 -08001434 mSystemServiceManager.startService(DeviceStorageMonitorService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001435 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001436
Felipe Leme3aad1be2019-05-31 11:43:12 -07001437 t.traceBegin("StartLocationManagerService");
Soonil Nagarkar141417a2019-10-28 11:12:48 -07001438 mSystemServiceManager.startService(LocationManagerService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001439 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001440
Felipe Leme3aad1be2019-05-31 11:43:12 -07001441 t.traceBegin("StartCountryDetectorService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001442 try {
1443 countryDetector = new CountryDetectorService(context);
1444 ServiceManager.addService(Context.COUNTRY_DETECTOR, countryDetector);
1445 } catch (Throwable e) {
1446 reportWtf("starting Country Detector", e);
1447 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001448 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001449
Neil Fullerbef7e802019-06-27 15:01:01 +01001450 t.traceBegin("StartTimeDetectorService");
1451 try {
1452 mSystemServiceManager.startService(TIME_DETECTOR_SERVICE_CLASS);
1453 } catch (Throwable e) {
1454 reportWtf("starting StartTimeDetectorService service", e);
Neil Fuller7fb88c32018-06-19 12:53:47 +01001455 }
Neil Fullerbef7e802019-06-27 15:01:01 +01001456 t.traceEnd();
Neil Fuller7fb88c32018-06-19 12:53:47 +01001457
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001458 if (!isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001459 t.traceBegin("StartSearchManagerService");
Dan Morrille4d9a012013-03-28 18:10:43 -07001460 try {
Jeff Sharkey4175be22016-01-09 14:57:45 -07001461 mSystemServiceManager.startService(SEARCH_MANAGER_SERVICE_CLASS);
Dan Morrille4d9a012013-03-28 18:10:43 -07001462 } catch (Throwable e) {
1463 reportWtf("starting Search Service", e);
1464 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001465 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001466 }
1467
Narayan Kamath1c888f62017-10-30 14:35:15 +00001468 if (context.getResources().getBoolean(R.bool.config_enableWallpaperService)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001469 t.traceBegin("StartWallpaperManagerService");
Jeff Sharkey1cab76a2016-04-12 18:23:31 -06001470 mSystemServiceManager.startService(WALLPAPER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001471 t.traceEnd();
Felipe Leme34a861a2019-08-05 16:00:12 -07001472 } else {
1473 Slog.i(TAG, "Wallpaper service disabled by config");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001474 }
1475
Felipe Leme3aad1be2019-05-31 11:43:12 -07001476 t.traceBegin("StartAudioService");
paulhsia0a1b3222018-11-08 18:15:46 +08001477 if (!isArc) {
1478 mSystemServiceManager.startService(AudioService.Lifecycle.class);
1479 } else {
1480 String className = context.getResources()
1481 .getString(R.string.config_deviceSpecificAudioService);
1482 try {
1483 mSystemServiceManager.startService(className + "$Lifecycle");
1484 } catch (Throwable e) {
1485 reportWtf("starting " + className, e);
1486 }
1487 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001488 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001489
Tomasz Wasilczyk05392d62017-07-10 19:33:22 -07001490 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_BROADCAST_RADIO)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001491 t.traceBegin("StartBroadcastRadioService");
Tomasz Wasilczyk6b4b6462017-07-19 10:52:28 -07001492 mSystemServiceManager.startService(BroadcastRadioService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001493 t.traceEnd();
Tomasz Wasilczyk347192e2017-04-04 11:13:44 -07001494 }
1495
Felipe Leme3aad1be2019-05-31 11:43:12 -07001496 t.traceBegin("StartDockObserver");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001497 mSystemServiceManager.startService(DockObserver.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001498 t.traceEnd();
Bryce Leebc58f592015-09-25 16:43:01 -07001499
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001500 if (isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001501 t.traceBegin("StartThermalObserver");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001502 mSystemServiceManager.startService(THERMAL_OBSERVER_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001503 t.traceEnd();
Dan Murphyc9f4eaf2009-08-12 15:15:43 -05001504 }
1505
Felipe Leme3aad1be2019-05-31 11:43:12 -07001506 t.traceBegin("StartWiredAccessoryManager");
John Spurlockb4f01b92015-03-24 12:40:15 -04001507 try {
John Spurlockb4f01b92015-03-24 12:40:15 -04001508 // Listen for wired headset changes
1509 inputManager.setWiredAccessoryCallbacks(
1510 new WiredAccessoryManager(context, inputManager));
1511 } catch (Throwable e) {
1512 reportWtf("starting WiredAccessoryManager", e);
Praveen Bharathi21e941b2010-10-06 15:23:14 -05001513 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001514 t.traceEnd();
Praveen Bharathi21e941b2010-10-06 15:23:14 -05001515
Narayan Kamath1c888f62017-10-30 14:35:15 +00001516 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_MIDI)) {
1517 // Start MIDI Manager service
Felipe Leme3aad1be2019-05-31 11:43:12 -07001518 t.traceBegin("StartMidiManager");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001519 mSystemServiceManager.startService(MIDI_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001520 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001521 }
Mike Lockwood5781cd52015-03-27 13:23:41 -07001522
Kenny Root4673a1d12018-12-05 12:20:02 +09001523 // Start ADB Debugging Service
Felipe Leme3aad1be2019-05-31 11:43:12 -07001524 t.traceBegin("StartAdbService");
Kenny Root4673a1d12018-12-05 12:20:02 +09001525 try {
1526 mSystemServiceManager.startService(ADB_SERVICE_CLASS);
1527 } catch (Throwable e) {
1528 Slog.e(TAG, "Failure starting AdbService");
1529 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001530 t.traceEnd();
Kenny Root4673a1d12018-12-05 12:20:02 +09001531
Narayan Kamath1c888f62017-10-30 14:35:15 +00001532 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_USB_HOST)
Christine Franksea7d71b2018-07-03 14:46:07 -07001533 || mPackageManager.hasSystemFeature(
1534 PackageManager.FEATURE_USB_ACCESSORY)
1535 || isEmulator) {
Narayan Kamath1c888f62017-10-30 14:35:15 +00001536 // Manage USB host and device support
Felipe Leme3aad1be2019-05-31 11:43:12 -07001537 t.traceBegin("StartUsbService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001538 mSystemServiceManager.startService(USB_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001539 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001540 }
Mike Lockwood57c798a2010-06-23 17:36:36 -04001541
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001542 if (!isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001543 t.traceBegin("StartSerialService");
Polina Bondarenkof8754ac2016-02-12 20:38:23 +01001544 try {
Narayan Kamath1c888f62017-10-30 14:35:15 +00001545 // Serial port support
1546 serial = new SerialService(context);
1547 ServiceManager.addService(Context.SERIAL_SERVICE, serial);
Polina Bondarenkof8754ac2016-02-12 20:38:23 +01001548 } catch (Throwable e) {
Narayan Kamath1c888f62017-10-30 14:35:15 +00001549 Slog.e(TAG, "Failure starting SerialService", e);
Polina Bondarenkof8754ac2016-02-12 20:38:23 +01001550 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001551 t.traceEnd();
Mike Lockwoodb01e8bf2011-08-29 20:11:07 -04001552 }
1553
Felipe Leme3aad1be2019-05-31 11:43:12 -07001554 t.traceBegin("StartHardwarePropertiesManagerService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001555 try {
1556 hardwarePropertiesService = new HardwarePropertiesManagerService(context);
1557 ServiceManager.addService(Context.HARDWARE_PROPERTIES_SERVICE,
Christine Franksea7d71b2018-07-03 14:46:07 -07001558 hardwarePropertiesService);
Narayan Kamath1c888f62017-10-30 14:35:15 +00001559 } catch (Throwable e) {
1560 Slog.e(TAG, "Failure starting HardwarePropertiesManagerService", e);
1561 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001562 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001563
Felipe Leme3aad1be2019-05-31 11:43:12 -07001564 t.traceBegin("StartTwilightService");
Jeff Brown6f357d32014-01-15 20:40:55 -08001565 mSystemServiceManager.startService(TwilightService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001566 t.traceEnd();
Jeff Brown2416e092012-08-21 22:12:20 -07001567
Felipe Leme3aad1be2019-05-31 11:43:12 -07001568 t.traceBegin("StartColorDisplay");
Christine Franks17a9bc82018-12-10 10:19:02 -08001569 mSystemServiceManager.startService(ColorDisplayService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001570 t.traceEnd();
Justin Klaassen911e8892016-06-21 18:24:24 -07001571
Makoto Onuki792de8d2019-07-16 16:19:01 -07001572 // TODO(aml-jobscheduler): Think about how to do it properly.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001573 t.traceBegin("StartJobScheduler");
Makoto Onuki792de8d2019-07-16 16:19:01 -07001574 mSystemServiceManager.startService(JOB_SCHEDULER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001575 t.traceEnd();
Christopher Tatefa380e92014-05-19 13:46:29 -07001576
Felipe Leme3aad1be2019-05-31 11:43:12 -07001577 t.traceBegin("StartSoundTrigger");
Arunesh Mishraa772e5f2016-01-25 10:33:11 -08001578 mSystemServiceManager.startService(SoundTriggerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001579 t.traceEnd();
Arunesh Mishraa772e5f2016-01-25 10:33:11 -08001580
Felipe Leme3aad1be2019-05-31 11:43:12 -07001581 t.traceBegin("StartTrustManager");
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001582 mSystemServiceManager.startService(TrustManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001583 t.traceEnd();
Jaikumar Ganesh7d0548d2010-10-18 15:29:09 -07001584
Narayan Kamath1c888f62017-10-30 14:35:15 +00001585 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_BACKUP)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001586 t.traceBegin("StartBackupManager");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001587 mSystemServiceManager.startService(BACKUP_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001588 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001589 }
1590
1591 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_APP_WIDGETS)
Christine Franksea7d71b2018-07-03 14:46:07 -07001592 || context.getResources().getBoolean(R.bool.config_enableAppWidgetService)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001593 t.traceBegin("StartAppWidgetService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001594 mSystemServiceManager.startService(APPWIDGET_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001595 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001596 }
1597
Philip P. Moltmann5d894502019-01-17 10:31:00 -08001598 // Grants default permissions and defines roles
Felipe Leme3aad1be2019-05-31 11:43:12 -07001599 t.traceBegin("StartRoleManagerService");
Philip P. Moltmann5d894502019-01-17 10:31:00 -08001600 mSystemServiceManager.startService(new RoleManagerService(
1601 mSystemContext, new LegacyRoleResolutionPolicy(mSystemContext)));
Felipe Leme3aad1be2019-05-31 11:43:12 -07001602 t.traceEnd();
Philip P. Moltmann5d894502019-01-17 10:31:00 -08001603
Narayan Kamath1c888f62017-10-30 14:35:15 +00001604 // We need to always start this service, regardless of whether the
1605 // FEATURE_VOICE_RECOGNIZERS feature is set, because it needs to take care
1606 // of initializing various settings. It will internally modify its behavior
1607 // based on that feature.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001608 t.traceBegin("StartVoiceRecognitionManager");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001609 mSystemServiceManager.startService(VOICE_RECOGNITION_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001610 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001611
1612 if (GestureLauncherService.isGestureLauncherEnabled(context.getResources())) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001613 t.traceBegin("StartGestureLauncher");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001614 mSystemServiceManager.startService(GestureLauncherService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001615 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001616 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001617 t.traceBegin("StartSensorNotification");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001618 mSystemServiceManager.startService(SensorNotificationService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001619 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001620
Felipe Leme3aad1be2019-05-31 11:43:12 -07001621 t.traceBegin("StartContextHubSystemService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001622 mSystemServiceManager.startService(ContextHubSystemService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001623 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001624
Felipe Leme3aad1be2019-05-31 11:43:12 -07001625 t.traceBegin("StartDiskStatsService");
Nick Pelly038cabe2010-09-23 16:12:11 -07001626 try {
Dan Egnor621bc542010-03-25 16:20:14 -07001627 ServiceManager.addService("diskstats", new DiskStatsService(context));
1628 } catch (Throwable e) {
Dianne Hackborn661cd522011-08-22 00:26:20 -07001629 reportWtf("starting DiskStats Service", e);
Dan Egnor621bc542010-03-25 16:20:14 -07001630 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001631 t.traceEnd();
Sen Hubde75702010-05-28 01:54:03 -07001632
Felipe Leme3aad1be2019-05-31 11:43:12 -07001633 t.traceBegin("RuntimeService");
Neil Fullerab0b81e2018-11-20 19:37:22 +00001634 try {
1635 ServiceManager.addService("runtime", new RuntimeService(context));
1636 } catch (Throwable e) {
1637 reportWtf("starting RuntimeService", e);
1638 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001639 t.traceEnd();
Neil Fullerab0b81e2018-11-20 19:37:22 +00001640
Neil Fullercd1a1092017-09-13 21:59:59 +01001641 // timezone.RulesManagerService will prevent a device starting up if the chain of trust
1642 // required for safe time zone updates might be broken. RuleManagerService cannot do
1643 // this check when mOnlyCore == true, so we don't enable the service in this case.
1644 // This service requires that JobSchedulerService is already started when it starts.
1645 final boolean startRulesManagerService =
1646 !mOnlyCore && context.getResources().getBoolean(
1647 R.bool.config_enableUpdateableTimeZoneRules);
1648 if (startRulesManagerService) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001649 t.traceBegin("StartTimeZoneRulesManagerService");
Neil Fullercd1a1092017-09-13 21:59:59 +01001650 mSystemServiceManager.startService(TIME_ZONE_RULES_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001651 t.traceEnd();
Neil Fullercd1a1092017-09-13 21:59:59 +01001652 }
1653
Steve Paik117fcb02018-09-13 09:43:54 -07001654 if (!isWatch && !disableNetworkTime) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001655 t.traceBegin("StartNetworkTimeUpdateService");
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001656 try {
Neil Fullerbef7e802019-06-27 15:01:01 +01001657 networkTimeUpdater = new NetworkTimeUpdateServiceImpl(context);
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001658 ServiceManager.addService("network_time_update_service", networkTimeUpdater);
1659 } catch (Throwable e) {
1660 reportWtf("starting NetworkTimeUpdate service", e);
1661 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001662 t.traceEnd();
Amith Yamasani6734b9f2010-09-13 16:24:08 -07001663 }
John Grossmanc1576732012-02-01 15:23:33 -08001664
Felipe Leme3aad1be2019-05-31 11:43:12 -07001665 t.traceBegin("CertBlacklister");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001666 try {
1667 CertBlacklister blacklister = new CertBlacklister(context);
1668 } catch (Throwable e) {
1669 reportWtf("starting CertBlacklister", e);
Geremy Condra3d33c262012-05-06 18:32:19 -07001670 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001671 t.traceEnd();
Jim Miller5ecd8112013-01-09 18:50:26 -08001672
Narayan Kamath1c888f62017-10-30 14:35:15 +00001673 if (EmergencyAffordanceManager.ENABLED) {
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08001674 // EmergencyMode service
Felipe Leme3aad1be2019-05-31 11:43:12 -07001675 t.traceBegin("StartEmergencyAffordanceService");
Selim Cinek705442f2016-09-13 16:02:33 -07001676 mSystemServiceManager.startService(EmergencyAffordanceService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001677 t.traceEnd();
Selim Cinek705442f2016-09-13 16:02:33 -07001678 }
1679
Narayan Kamath1c888f62017-10-30 14:35:15 +00001680 // Dreams (interactive idle-time views, a/k/a screen savers, and doze mode)
Felipe Leme3aad1be2019-05-31 11:43:12 -07001681 t.traceBegin("StartDreamManager");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001682 mSystemServiceManager.startService(DreamManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001683 t.traceEnd();
Svetoslavb3038ec2013-02-13 14:39:30 -08001684
Felipe Leme3aad1be2019-05-31 11:43:12 -07001685 t.traceBegin("AddGraphicsStatsService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001686 ServiceManager.addService(GraphicsStatsService.GRAPHICS_STATS_SERVICE,
Christine Franksea7d71b2018-07-03 14:46:07 -07001687 new GraphicsStatsService(context));
Felipe Leme3aad1be2019-05-31 11:43:12 -07001688 t.traceEnd();
John Reckedc524c2015-03-18 15:24:33 -07001689
Narayan Kamath1c888f62017-10-30 14:35:15 +00001690 if (CoverageService.ENABLED) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001691 t.traceBegin("AddCoverageService");
Allen Hair1f556e32016-11-11 15:42:50 -08001692 ServiceManager.addService(CoverageService.COVERAGE_SERVICE, new CoverageService());
Felipe Leme3aad1be2019-05-31 11:43:12 -07001693 t.traceEnd();
Allen Hair1f556e32016-11-11 15:42:50 -08001694 }
1695
Jeff Brown2c43c332014-06-12 22:38:59 -07001696 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_PRINTING)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001697 t.traceBegin("StartPrintManager");
Jeff Brown2c43c332014-06-12 22:38:59 -07001698 mSystemServiceManager.startService(PRINT_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001699 t.traceEnd();
Svetoslav Ganov4b9a4d12013-06-11 15:20:06 -07001700 }
Jeff Brown69b07162013-11-07 00:30:16 -08001701
Eugene Susla7c3eef22017-03-10 14:25:58 -08001702 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_COMPANION_DEVICE_SETUP)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001703 t.traceBegin("StartCompanionDeviceManager");
Eugene Susla7c3eef22017-03-10 14:25:58 -08001704 mSystemServiceManager.startService(COMPANION_DEVICE_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001705 t.traceEnd();
Eugene Susla7c3eef22017-03-10 14:25:58 -08001706 }
Eugene Susla6ed45d82017-01-22 13:52:51 -08001707
Felipe Leme3aad1be2019-05-31 11:43:12 -07001708 t.traceBegin("StartRestrictionManager");
Jeff Brown2c43c332014-06-12 22:38:59 -07001709 mSystemServiceManager.startService(RestrictionsManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001710 t.traceEnd();
Amith Yamasanif20d6402014-05-24 15:34:37 -07001711
Felipe Leme3aad1be2019-05-31 11:43:12 -07001712 t.traceBegin("StartMediaSessionService");
Jeff Brown2c43c332014-06-12 22:38:59 -07001713 mSystemServiceManager.startService(MediaSessionService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001714 t.traceEnd();
RoboErik01fe6612014-02-13 14:19:04 -08001715
Yuncheol Heoa0c4a062014-07-10 20:49:27 +09001716 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_HDMI_CEC)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001717 t.traceBegin("StartHdmiControlService");
Yuncheol Heoa0c4a062014-07-10 20:49:27 +09001718 mSystemServiceManager.startService(HdmiControlService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001719 t.traceEnd();
Yuncheol Heoa0c4a062014-07-10 20:49:27 +09001720 }
Jungshik Jang0792d372014-04-23 17:57:26 +09001721
Conrad Chen558acf92017-04-05 17:31:01 -07001722 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_LIVE_TV)
1723 || mPackageManager.hasSystemFeature(PackageManager.FEATURE_LEANBACK)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001724 t.traceBegin("StartTvInputManager");
Dongwon Kang0fdcb742014-07-24 16:28:35 +09001725 mSystemServiceManager.startService(TvInputManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001726 t.traceEnd();
Dongwon Kang0fdcb742014-07-24 16:28:35 +09001727 }
Jae Seo39570912014-02-20 18:23:25 -08001728
Dongwon Kangd8b81b32016-03-23 18:04:19 -07001729 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_PICTURE_IN_PICTURE)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001730 t.traceBegin("StartMediaResourceMonitor");
Dongwon Kangd8b81b32016-03-23 18:04:19 -07001731 mSystemServiceManager.startService(MediaResourceMonitorService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001732 t.traceEnd();
Dongwon Kangd8b81b32016-03-23 18:04:19 -07001733 }
Dongwon Kang2034a4c2015-12-14 21:57:34 +09001734
Sujith Ramakrishnanb5b86c12016-01-28 16:53:16 -08001735 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_LEANBACK)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001736 t.traceBegin("StartTvRemoteService");
Sujith Ramakrishnanb5b86c12016-01-28 16:53:16 -08001737 mSystemServiceManager.startService(TvRemoteService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001738 t.traceEnd();
Sujith Ramakrishnanb5b86c12016-01-28 16:53:16 -08001739 }
1740
Felipe Leme3aad1be2019-05-31 11:43:12 -07001741 t.traceBegin("StartMediaRouterService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001742 try {
1743 mediaRouter = new MediaRouterService(context);
1744 ServiceManager.addService(Context.MEDIA_ROUTER_SERVICE, mediaRouter);
1745 } catch (Throwable e) {
1746 reportWtf("starting MediaRouterService", e);
1747 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001748 t.traceEnd();
Adrian Roos82142c22014-03-27 14:56:59 +01001749
Kevin Chyna24e9fd2018-08-27 12:39:17 -07001750 final boolean hasFeatureFace
1751 = mPackageManager.hasSystemFeature(PackageManager.FEATURE_FACE);
Kevin Chyn51676d22018-11-05 18:00:43 -08001752 final boolean hasFeatureIris
1753 = mPackageManager.hasSystemFeature(PackageManager.FEATURE_IRIS);
Kevin Chyna24e9fd2018-08-27 12:39:17 -07001754 final boolean hasFeatureFingerprint
1755 = mPackageManager.hasSystemFeature(PackageManager.FEATURE_FINGERPRINT);
1756
1757 if (hasFeatureFace) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001758 t.traceBegin("StartFaceSensor");
Gilad Brettercb51b8b2018-03-22 17:04:51 +02001759 mSystemServiceManager.startService(FaceService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001760 t.traceEnd();
Gilad Brettercb51b8b2018-03-22 17:04:51 +02001761 }
1762
Kevin Chyn51676d22018-11-05 18:00:43 -08001763 if (hasFeatureIris) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001764 t.traceBegin("StartIrisSensor");
Kevin Chyn51676d22018-11-05 18:00:43 -08001765 mSystemServiceManager.startService(IrisService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001766 t.traceEnd();
Kevin Chyn51676d22018-11-05 18:00:43 -08001767 }
1768
Kevin Chyna24e9fd2018-08-27 12:39:17 -07001769 if (hasFeatureFingerprint) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001770 t.traceBegin("StartFingerprintSensor");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001771 mSystemServiceManager.startService(FingerprintService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001772 t.traceEnd();
Jeff Brown69b07162013-11-07 00:30:16 -08001773 }
Narayan Kamath1c888f62017-10-30 14:35:15 +00001774
Kevin Chyn51676d22018-11-05 18:00:43 -08001775 if (hasFeatureFace || hasFeatureIris || hasFeatureFingerprint) {
Kevin Chyna24e9fd2018-08-27 12:39:17 -07001776 // Start this service after all biometric services.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001777 t.traceBegin("StartBiometricService");
Kevin Chyn352adfe2018-09-20 22:28:50 -07001778 mSystemServiceManager.startService(BiometricService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001779 t.traceEnd();
Ilya Matyukhine4675b32019-11-07 16:07:19 -08001780
1781 t.traceBegin("StartAuthService");
1782 mSystemServiceManager.startService(AuthService.class);
1783 t.traceEnd();
Kevin Chyna24e9fd2018-08-27 12:39:17 -07001784 }
1785
Ilya Matyukhine4675b32019-11-07 16:07:19 -08001786
Felipe Leme3aad1be2019-05-31 11:43:12 -07001787 t.traceBegin("StartBackgroundDexOptService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001788 try {
1789 BackgroundDexOptService.schedule(context);
1790 } catch (Throwable e) {
1791 reportWtf("starting StartBackgroundDexOptService", e);
1792 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001793 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001794
Michael Kwan7f70fc72018-07-20 16:12:19 -07001795 if (!isWatch) {
Alan Stokesbe9ec972018-12-10 14:07:47 +00001796 // We don't run this on watches as there are no plans to use the data logged
1797 // on watch devices.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001798 t.traceBegin("StartDynamicCodeLoggingService");
Alan Stokesbe9ec972018-12-10 14:07:47 +00001799 try {
1800 DynamicCodeLoggingService.schedule(context);
1801 } catch (Throwable e) {
1802 reportWtf("starting DynamicCodeLoggingService", e);
1803 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001804 t.traceEnd();
Alan Stokesbe9ec972018-12-10 14:07:47 +00001805 }
1806
1807 if (!isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001808 t.traceBegin("StartPruneInstantAppsJobService");
Michael Kwan7f70fc72018-07-20 16:12:19 -07001809 try {
1810 PruneInstantAppsJobService.schedule(context);
1811 } catch (Throwable e) {
1812 reportWtf("StartPruneInstantAppsJobService", e);
1813 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001814 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001815 }
Narayan Kamath1c888f62017-10-30 14:35:15 +00001816
Makoto Onuki55046222016-03-08 10:49:47 -08001817 // LauncherAppsService uses ShortcutService.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001818 t.traceBegin("StartShortcutServiceLifecycle");
Makoto Onuki55046222016-03-08 10:49:47 -08001819 mSystemServiceManager.startService(ShortcutService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001820 t.traceEnd();
Amith Yamasani4f582632014-02-19 14:31:52 -08001821
Felipe Leme3aad1be2019-05-31 11:43:12 -07001822 t.traceBegin("StartLauncherAppsService");
Jeff Brown2c43c332014-06-12 22:38:59 -07001823 mSystemServiceManager.startService(LauncherAppsService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001824 t.traceEnd();
Tony Mak1b708e62017-10-12 10:59:11 +01001825
Felipe Leme3aad1be2019-05-31 11:43:12 -07001826 t.traceBegin("StartCrossProfileAppsService");
Tony Mak1b708e62017-10-12 10:59:11 +01001827 mSystemServiceManager.startService(CrossProfileAppsService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001828 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001829 }
1830
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001831 if (!isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001832 t.traceBegin("StartMediaProjectionManager");
Michael Wrightc39d47a2014-07-08 18:07:36 -07001833 mSystemServiceManager.startService(MediaProjectionManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001834 t.traceEnd();
Michael Wrightc39d47a2014-07-08 18:07:36 -07001835 }
1836
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001837 if (isWatch) {
Damien Bargiacchiae4cb672018-05-30 13:28:15 -07001838 // Must be started before services that depend it, e.g. WearConnectivityService
Felipe Leme3aad1be2019-05-31 11:43:12 -07001839 t.traceBegin("StartWearPowerService");
Damien Bargiacchiae4cb672018-05-30 13:28:15 -07001840 mSystemServiceManager.startService(WEAR_POWER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001841 t.traceEnd();
Damien Bargiacchiae4cb672018-05-30 13:28:15 -07001842
Felipe Leme3aad1be2019-05-31 11:43:12 -07001843 t.traceBegin("StartWearConnectivityService");
Calvin On5555bcc2017-02-21 16:41:43 -08001844 mSystemServiceManager.startService(WEAR_CONNECTIVITY_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001845 t.traceEnd();
Zach Johnsonb82f3b02017-01-16 15:15:25 -08001846
Felipe Leme3aad1be2019-05-31 11:43:12 -07001847 t.traceBegin("StartWearDisplayService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001848 mSystemServiceManager.startService(WEAR_DISPLAY_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001849 t.traceEnd();
Damien Bargiacchiae4cb672018-05-30 13:28:15 -07001850
Felipe Leme3aad1be2019-05-31 11:43:12 -07001851 t.traceBegin("StartWearTimeService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001852 mSystemServiceManager.startService(WEAR_TIME_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001853 t.traceEnd();
Ivan Podogovf9973822017-05-11 15:51:34 +01001854
Narayan Kamath1c888f62017-10-30 14:35:15 +00001855 if (enableLeftyService) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001856 t.traceBegin("StartWearLeftyService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001857 mSystemServiceManager.startService(WEAR_LEFTY_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001858 t.traceEnd();
Vitalii Tomkiv4887e672016-07-21 15:58:24 -07001859 }
Michael Kwan01ad0aa2018-02-28 15:19:04 -08001860
Felipe Leme3aad1be2019-05-31 11:43:12 -07001861 t.traceBegin("StartWearGlobalActionsService");
Michael Kwan01ad0aa2018-02-28 15:19:04 -08001862 mSystemServiceManager.startService(WEAR_GLOBAL_ACTIONS_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001863 t.traceEnd();
Wei Liu48d3b632016-03-29 15:26:48 -07001864 }
1865
Abhijit Adsule95862c52019-10-11 18:24:41 -07001866 if (!mPackageManager.hasSystemFeature(PackageManager.FEATURE_SLICES_DISABLED)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001867 t.traceBegin("StartSliceManagerService");
Jason Monk8f5f7ff2017-10-17 14:12:42 -04001868 mSystemServiceManager.startService(SLICE_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001869 t.traceEnd();
Jason Monk8f5f7ff2017-10-17 14:12:42 -04001870 }
1871
Eino-Ville Talvalae91012b2017-07-10 15:27:24 -07001872 if (!disableCameraService) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001873 t.traceBegin("StartCameraServiceProxy");
Eino-Ville Talvalae91012b2017-07-10 15:27:24 -07001874 mSystemServiceManager.startService(CameraServiceProxy.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001875 t.traceEnd();
Eino-Ville Talvalae91012b2017-07-10 15:27:24 -07001876 }
1877
Nick Felker1bfe59d2017-10-12 13:27:02 -07001878 if (context.getPackageManager().hasSystemFeature(PackageManager.FEATURE_EMBEDDED)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001879 t.traceBegin("StartIoTSystemService");
Nick Felker1bfe59d2017-10-12 13:27:02 -07001880 mSystemServiceManager.startService(IOT_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001881 t.traceEnd();
Nick Felker1bfe59d2017-10-12 13:27:02 -07001882 }
1883
Max Biresffac7722017-10-23 22:59:10 +00001884 // Statsd helper
Felipe Leme3aad1be2019-05-31 11:43:12 -07001885 t.traceBegin("StartStatsCompanionService");
Tej Singhc53ac0a2019-09-20 16:29:13 -07001886 mSystemServiceManager.startService(STATS_COMPANION_SERVICE_LIFECYCLE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001887 t.traceEnd();
Max Biresffac7722017-10-23 22:59:10 +00001888
Joe Onoratoe21ab7e2018-12-18 15:00:25 -08001889 // Incidentd and dumpstated helper
Felipe Leme3aad1be2019-05-31 11:43:12 -07001890 t.traceBegin("StartIncidentCompanionService");
Joe Onoratoe21ab7e2018-12-18 15:00:25 -08001891 mSystemServiceManager.startService(IncidentCompanionService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001892 t.traceEnd();
Joe Onoratoe21ab7e2018-12-18 15:00:25 -08001893
Patrick Baumann876a7332019-06-28 10:28:22 -07001894 if (safeMode) {
1895 mActivityManagerService.enterSafeMode();
1896 }
1897
Ye Wend97e1fd2014-07-24 12:56:45 -07001898 // MMS service broker
Felipe Leme3aad1be2019-05-31 11:43:12 -07001899 t.traceBegin("StartMmsService");
Ye Wend97e1fd2014-07-24 12:56:45 -07001900 mmsService = mSystemServiceManager.startService(MmsServiceBroker.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001901 t.traceEnd();
Ye Wend97e1fd2014-07-24 12:56:45 -07001902
Svet Ganov43574b02017-04-12 09:25:20 -07001903 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_AUTOFILL)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001904 t.traceBegin("StartAutoFillService");
Svet Ganov43574b02017-04-12 09:25:20 -07001905 mSystemServiceManager.startService(AUTO_FILL_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001906 t.traceEnd();
Svet Ganov43574b02017-04-12 09:25:20 -07001907 }
Felipe Leme5381aa42016-10-13 09:02:32 -07001908
Felipe Lemec7436342019-04-10 17:45:12 -07001909 // NOTE: ClipboardService depends on ContentCapture and Autofill
Felipe Leme3aad1be2019-05-31 11:43:12 -07001910 t.traceBegin("StartClipboardService");
Felipe Lemec7436342019-04-10 17:45:12 -07001911 mSystemServiceManager.startService(ClipboardService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001912 t.traceEnd();
Felipe Lemec7436342019-04-10 17:45:12 -07001913
Sudheer Shankaf5b36962019-10-04 16:16:13 -07001914 t.traceBegin("StartBlobStoreManagerService");
1915 mSystemServiceManager.startService(BLOB_STORE_MANAGER_SERVICE_CLASS);
1916 t.traceEnd();
1917
Felipe Leme3aad1be2019-05-31 11:43:12 -07001918 t.traceBegin("AppServiceManager");
Makoto Onukidf7e4812018-09-24 14:31:25 -07001919 mSystemServiceManager.startService(AppBindingService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001920 t.traceEnd();
Makoto Onukidf7e4812018-09-24 14:31:25 -07001921
Dianne Hackborn6af0d502009-09-28 13:25:46 -07001922 // It is now time to start up the app processes...
Joe Onorato30275482009-07-08 17:09:14 -07001923
Felipe Leme3aad1be2019-05-31 11:43:12 -07001924 t.traceBegin("MakeVibratorServiceReady");
Jeff Brown7f6c2312012-04-13 20:38:38 -07001925 try {
1926 vibrator.systemReady();
1927 } catch (Throwable e) {
1928 reportWtf("making Vibrator Service ready", e);
1929 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001930 t.traceEnd();
Jeff Brown7f6c2312012-04-13 20:38:38 -07001931
Felipe Leme3aad1be2019-05-31 11:43:12 -07001932 t.traceBegin("MakeLockSettingsServiceReady");
Dan Morrille4d9a012013-03-28 18:10:43 -07001933 if (lockSettings != null) {
1934 try {
1935 lockSettings.systemReady();
1936 } catch (Throwable e) {
1937 reportWtf("making Lock Settings Service ready", e);
1938 }
Felipe Ramosf35df5b2012-09-18 18:26:27 -03001939 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001940 t.traceEnd();
Felipe Ramosf35df5b2012-09-18 18:26:27 -03001941
Amith Yamasani817ec492013-12-20 13:27:30 -08001942 // Needed by DevicePolicyManager for initialization
Felipe Leme3aad1be2019-05-31 11:43:12 -07001943 t.traceBegin("StartBootPhaseLockSettingsReady");
Felipe Leme137e7812019-06-10 11:38:05 -07001944 mSystemServiceManager.startBootPhase(t, SystemService.PHASE_LOCK_SETTINGS_READY);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001945 t.traceEnd();
Dianne Hackbornd6847842010-01-12 18:14:19 -08001946
Felipe Leme3aad1be2019-05-31 11:43:12 -07001947 t.traceBegin("StartBootPhaseSystemServicesReady");
Felipe Leme137e7812019-06-10 11:38:05 -07001948 mSystemServiceManager.startBootPhase(t, SystemService.PHASE_SYSTEM_SERVICES_READY);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001949 t.traceEnd();
Joe Onorato30275482009-07-08 17:09:14 -07001950
Felipe Leme3aad1be2019-05-31 11:43:12 -07001951 t.traceBegin("MakeWindowManagerServiceReady");
Dianne Hackborn661cd522011-08-22 00:26:20 -07001952 try {
1953 wm.systemReady();
1954 } catch (Throwable e) {
1955 reportWtf("making Window Manager Service ready", e);
1956 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001957 t.traceEnd();
Joe Onoratodc565f42010-10-04 15:27:22 -04001958
Jeff Brownb09abc12011-01-13 21:08:27 -08001959 if (safeMode) {
Jeff Brown4ccb8232014-01-16 22:16:42 -08001960 mActivityManagerService.showSafeModeOverlay();
Jeff Brownb09abc12011-01-13 21:08:27 -08001961 }
1962
Joe Onoratodc565f42010-10-04 15:27:22 -04001963 // Update the configuration for this context by hand, because we're going
1964 // to start using it before the config change done in wm.systemReady() will
1965 // propagate to it.
Andrii Kulian5406e7a2016-10-21 11:55:23 -07001966 final Configuration config = wm.computeNewConfiguration(DEFAULT_DISPLAY);
Joe Onoratodc565f42010-10-04 15:27:22 -04001967 DisplayMetrics metrics = new DisplayMetrics();
Christine Franksea7d71b2018-07-03 14:46:07 -07001968 WindowManager w = (WindowManager) context.getSystemService(Context.WINDOW_SERVICE);
Joe Onoratodc565f42010-10-04 15:27:22 -04001969 w.getDefaultDisplay().getMetrics(metrics);
1970 context.getResources().updateConfiguration(config, metrics);
1971
Alan Viverette395cd012015-08-11 17:27:04 -04001972 // The system context's theme may be configuration-dependent.
1973 final Theme systemTheme = context.getTheme();
1974 if (systemTheme.getChangingConfigurations() != 0) {
1975 systemTheme.rebase();
1976 }
1977
Felipe Leme3aad1be2019-05-31 11:43:12 -07001978 t.traceBegin("MakePowerManagerServiceReady");
Jeff Brownaa202a62012-08-21 22:14:26 -07001979 try {
Jeff Brown6f357d32014-01-15 20:40:55 -08001980 // TODO: use boot phase
Jeff Brown21392762014-06-13 19:00:36 -07001981 mPowerManagerService.systemReady(mActivityManagerService.getAppOpsService());
Jeff Brownaa202a62012-08-21 22:14:26 -07001982 } catch (Throwable e) {
1983 reportWtf("making Power Manager Service ready", e);
1984 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001985 t.traceEnd();
Jeff Brownaa202a62012-08-21 22:14:26 -07001986
Svet Ganov3c499ea2019-07-26 17:45:56 -07001987 // Permission policy service
1988 t.traceBegin("StartPermissionPolicyService");
1989 mSystemServiceManager.startService(PermissionPolicyService.class);
1990 t.traceEnd();
1991
Felipe Leme3aad1be2019-05-31 11:43:12 -07001992 t.traceBegin("MakePackageManagerServiceReady");
Fyodor Kupolovc56106a2017-10-06 17:02:21 -07001993 mPackageManagerService.systemReady();
Felipe Leme3aad1be2019-05-31 11:43:12 -07001994 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001995
Felipe Leme3aad1be2019-05-31 11:43:12 -07001996 t.traceBegin("MakeDisplayManagerServiceReady");
Jeff Brownbd6e1502012-08-28 03:27:37 -07001997 try {
Jeff Brown4ccb8232014-01-16 22:16:42 -08001998 // TODO: use boot phase and communicate these flags some other way
Jeff Brown2c43c332014-06-12 22:38:59 -07001999 mDisplayManagerService.systemReady(safeMode, mOnlyCore);
Jeff Brownbd6e1502012-08-28 03:27:37 -07002000 } catch (Throwable e) {
2001 reportWtf("making Display Manager Service ready", e);
2002 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002003 t.traceEnd();
Jeff Brownbd6e1502012-08-28 03:27:37 -07002004
joonyoung.cho2f30cc12015-04-08 13:56:34 +09002005 mSystemServiceManager.setSafeMode(safeMode);
2006
Daichi Hironoedfcb002017-10-10 17:22:58 +09002007 // Start device specific services
Felipe Leme3aad1be2019-05-31 11:43:12 -07002008 t.traceBegin("StartDeviceSpecificServices");
Daichi Hironoedfcb002017-10-10 17:22:58 +09002009 final String[] classes = mSystemContext.getResources().getStringArray(
2010 R.array.config_deviceSpecificSystemServices);
2011 for (final String className : classes) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07002012 t.traceBegin("StartDeviceSpecificServices " + className);
Daichi Hironoedfcb002017-10-10 17:22:58 +09002013 try {
2014 mSystemServiceManager.startService(className);
2015 } catch (Throwable e) {
2016 reportWtf("starting " + className, e);
2017 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002018 t.traceEnd();
Daichi Hironoedfcb002017-10-10 17:22:58 +09002019 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002020 t.traceEnd();
Daichi Hironoedfcb002017-10-10 17:22:58 +09002021
Felipe Leme3aad1be2019-05-31 11:43:12 -07002022 t.traceBegin("StartBootPhaseDeviceSpecificServicesReady");
Felipe Leme137e7812019-06-10 11:38:05 -07002023 mSystemServiceManager.startBootPhase(t, SystemService.PHASE_DEVICE_SPECIFIC_SERVICES_READY);
Felipe Leme3aad1be2019-05-31 11:43:12 -07002024 t.traceEnd();
Daichi Hironoedfcb002017-10-10 17:22:58 +09002025
Dianne Hackborna34f1ad2009-09-02 13:26:28 -07002026 // These are needed to propagate to the runnable below.
Jeff Sharkey350083e2011-06-29 10:45:16 -07002027 final NetworkManagementService networkManagementF = networkManagement;
Jeff Sharkey75279902011-05-24 18:39:45 -07002028 final NetworkStatsService networkStatsF = networkStats;
Jeff Sharkeya4620792011-05-20 15:29:23 -07002029 final NetworkPolicyManagerService networkPolicyF = networkPolicy;
Dianne Hackborna34f1ad2009-09-02 13:26:28 -07002030 final ConnectivityService connectivityF = connectivity;
Bai Taoa58a8752010-07-13 15:32:16 +08002031 final CountryDetectorService countryDetectorF = countryDetector;
Amith Yamasani6734b9f2010-09-13 16:24:08 -07002032 final NetworkTimeUpdateService networkTimeUpdaterF = networkTimeUpdater;
Jeff Brown6ec6f792012-04-17 16:52:41 -07002033 final InputManagerService inputManagerF = inputManager;
Wink Savillea12a7b32012-09-20 10:09:45 -07002034 final TelephonyRegistry telephonyRegistryF = telephonyRegistry;
Jeff Brown69b07162013-11-07 00:30:16 -08002035 final MediaRouterService mediaRouterF = mediaRouter;
Ye Wend97e1fd2014-07-24 12:56:45 -07002036 final MmsServiceBroker mmsServiceF = mmsService;
Nathan Haroldb7282172017-09-11 19:50:19 -07002037 final IpSecService ipSecServiceF = ipSecService;
Keun-young Park4136d2d2017-05-08 14:51:59 -07002038 final WindowManagerService windowManagerF = wm;
Doug Zongkerab5c49c2009-12-04 10:31:43 -08002039
Dianne Hackborna34f1ad2009-09-02 13:26:28 -07002040 // We now tell the activity manager it is okay to run third party
2041 // code. It will call back into us once it has gotten to the state
2042 // where third party code can really run (but before it has actually
2043 // started launching the initial applications), for us to complete our
2044 // initialization.
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002045 mActivityManagerService.systemReady(() -> {
2046 Slog.i(TAG, "Making services ready");
Felipe Leme3aad1be2019-05-31 11:43:12 -07002047 t.traceBegin("StartActivityManagerReadyPhase");
Felipe Leme137e7812019-06-10 11:38:05 -07002048 mSystemServiceManager.startBootPhase(t, SystemService.PHASE_ACTIVITY_MANAGER_READY);
Felipe Leme3aad1be2019-05-31 11:43:12 -07002049 t.traceEnd();
2050 t.traceBegin("StartObservingNativeCrashes");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002051 try {
2052 mActivityManagerService.startObservingNativeCrashes();
2053 } catch (Throwable e) {
2054 reportWtf("observing native crashes", e);
Dianne Hackborna34f1ad2009-09-02 13:26:28 -07002055 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002056 t.traceEnd();
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002057
Keun-young Parkd80e8942017-01-27 11:30:19 -08002058 // No dependency on Webview preparation in system server. But this should
Torne (Richard Coles)ff937ac2017-10-02 17:09:32 -04002059 // be completed before allowing 3rd party
Keun-young Parkd80e8942017-01-27 11:30:19 -08002060 final String WEBVIEW_PREPARATION = "WebViewFactoryPreparation";
2061 Future<?> webviewPrep = null;
Torne (Richard Coles)ff937ac2017-10-02 17:09:32 -04002062 if (!mOnlyCore && mWebViewUpdateService != null) {
Felipe Lemeb68b7692019-10-09 10:43:03 -07002063 webviewPrep = SystemServerInitThreadPool.submit(() -> {
Keun-young Parkd80e8942017-01-27 11:30:19 -08002064 Slog.i(TAG, WEBVIEW_PREPARATION);
Felipe Leme137e7812019-06-10 11:38:05 -07002065 TimingsTraceAndSlog traceLog = TimingsTraceAndSlog.newAsyncLog();
Keun-young Parkd80e8942017-01-27 11:30:19 -08002066 traceLog.traceBegin(WEBVIEW_PREPARATION);
Narayan Kamath97780462017-02-06 20:24:08 +00002067 ConcurrentUtils.waitForFutureNoInterrupt(mZygotePreload, "Zygote preload");
2068 mZygotePreload = null;
Keun-young Parkd80e8942017-01-27 11:30:19 -08002069 mWebViewUpdateService.prepareWebViewInSystemServer();
2070 traceLog.traceEnd();
2071 }, WEBVIEW_PREPARATION);
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002072 }
2073
Keun-young Park067cf3e2017-06-05 12:20:41 -07002074 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_AUTOMOTIVE)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07002075 t.traceBegin("StartCarServiceHelperService");
Steve Paik94292a32018-01-26 17:16:53 -08002076 mSystemServiceManager.startService(CAR_SERVICE_HELPER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07002077 t.traceEnd();
Keun-young Park067cf3e2017-06-05 12:20:41 -07002078 }
2079
Felipe Leme3aad1be2019-05-31 11:43:12 -07002080 t.traceBegin("StartSystemUI");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002081 try {
Keun-young Park4136d2d2017-05-08 14:51:59 -07002082 startSystemUi(context, windowManagerF);
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002083 } catch (Throwable e) {
2084 reportWtf("starting System UI", e);
2085 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002086 t.traceEnd();
Rene Mayrhofer7d6c8e52018-11-28 11:32:40 -08002087 // Enable airplane mode in safe mode. setAirplaneMode() cannot be called
2088 // earlier as it sends broadcasts to other services.
2089 // TODO: This may actually be too late if radio firmware already started leaking
2090 // RF before the respective services start. However, fixing this requires changes
2091 // to radio firmware and interfaces.
2092 if (safeMode) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07002093 t.traceBegin("EnableAirplaneModeInSafeMode");
Rene Mayrhofer7d6c8e52018-11-28 11:32:40 -08002094 try {
2095 connectivityF.setAirplaneMode(true);
2096 } catch (Throwable e) {
2097 reportWtf("enabling Airplane Mode during Safe Mode bootup", e);
2098 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002099 t.traceEnd();
Rene Mayrhofer7d6c8e52018-11-28 11:32:40 -08002100 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002101 t.traceBegin("MakeNetworkManagementServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002102 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002103 if (networkManagementF != null) {
2104 networkManagementF.systemReady();
2105 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002106 } catch (Throwable e) {
2107 reportWtf("making Network Managment Service ready", e);
2108 }
2109 CountDownLatch networkPolicyInitReadySignal = null;
2110 if (networkPolicyF != null) {
2111 networkPolicyInitReadySignal = networkPolicyF
2112 .networkScoreAndNetworkManagementServiceReady();
2113 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002114 t.traceEnd();
2115 t.traceBegin("MakeIpSecServiceReady");
Nathan Haroldb7282172017-09-11 19:50:19 -07002116 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002117 if (ipSecServiceF != null) {
2118 ipSecServiceF.systemReady();
2119 }
Nathan Haroldb7282172017-09-11 19:50:19 -07002120 } catch (Throwable e) {
2121 reportWtf("making IpSec Service ready", e);
2122 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002123 t.traceEnd();
2124 t.traceBegin("MakeNetworkStatsServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002125 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002126 if (networkStatsF != null) {
2127 networkStatsF.systemReady();
2128 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002129 } catch (Throwable e) {
2130 reportWtf("making Network Stats Service ready", e);
2131 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002132 t.traceEnd();
2133 t.traceBegin("MakeConnectivityServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002134 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002135 if (connectivityF != null) {
2136 connectivityF.systemReady();
2137 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002138 } catch (Throwable e) {
2139 reportWtf("making Connectivity Service ready", e);
2140 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002141 t.traceEnd();
2142 t.traceBegin("MakeNetworkPolicyServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002143 try {
2144 if (networkPolicyF != null) {
2145 networkPolicyF.systemReady(networkPolicyInitReadySignal);
2146 }
2147 } catch (Throwable e) {
2148 reportWtf("making Network Policy Service ready", e);
2149 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002150 t.traceEnd();
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002151
Fyodor Kupolovcd824ef2017-02-07 11:25:14 -08002152 // Wait for all packages to be prepared
2153 mPackageManagerService.waitForAppDataPrepared();
2154
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002155 // It is now okay to let the various system services start their
2156 // third party code...
Felipe Leme3aad1be2019-05-31 11:43:12 -07002157 t.traceBegin("PhaseThirdPartyAppsCanStart");
Keun-young Park9b73a542017-02-01 12:09:58 -08002158 // confirm webview completion before starting 3rd party
2159 if (webviewPrep != null) {
2160 ConcurrentUtils.waitForFutureNoInterrupt(webviewPrep, WEBVIEW_PREPARATION);
2161 }
Felipe Leme137e7812019-06-10 11:38:05 -07002162 mSystemServiceManager.startBootPhase(t, SystemService.PHASE_THIRD_PARTY_APPS_CAN_START);
Felipe Leme3aad1be2019-05-31 11:43:12 -07002163 t.traceEnd();
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002164
Felipe Leme3aad1be2019-05-31 11:43:12 -07002165 t.traceBegin("StartNetworkStack");
Remi NGUYEN VANc7054c52019-03-12 11:50:22 +09002166 try {
Chalard Jeand74219b2019-04-01 13:04:07 +09002167 // Note : the network stack is creating on-demand objects that need to send
2168 // broadcasts, which means it currently depends on being started after
2169 // ActivityManagerService.mSystemReady and ActivityManagerService.mProcessesReady
2170 // are set to true. Be careful if moving this to a different place in the
2171 // startup sequence.
Roshan Pius7e6f5f52019-06-27 14:14:40 -07002172 NetworkStackClient.getInstance().start();
Remi NGUYEN VANc7054c52019-03-12 11:50:22 +09002173 } catch (Throwable e) {
2174 reportWtf("starting Network Stack", e);
2175 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002176 t.traceEnd();
Remi NGUYEN VANc7054c52019-03-12 11:50:22 +09002177
Roshan Pius6f5338d2019-06-14 14:37:14 -07002178 t.traceBegin("StartWifiStack");
2179 try {
2180 WifiStackClient.getInstance().start();
2181 } catch (Throwable e) {
2182 reportWtf("starting Wifi Stack", e);
2183 }
2184 t.traceEnd();
2185
Felipe Leme3aad1be2019-05-31 11:43:12 -07002186 t.traceBegin("MakeCountryDetectionServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002187 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002188 if (countryDetectorF != null) {
2189 countryDetectorF.systemRunning();
2190 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002191 } catch (Throwable e) {
2192 reportWtf("Notifying CountryDetectorService running", e);
2193 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002194 t.traceEnd();
2195 t.traceBegin("MakeNetworkTimeUpdateReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002196 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002197 if (networkTimeUpdaterF != null) {
2198 networkTimeUpdaterF.systemRunning();
2199 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002200 } catch (Throwable e) {
2201 reportWtf("Notifying NetworkTimeService running", e);
2202 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002203 t.traceEnd();
2204 t.traceBegin("MakeInputManagerServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002205 try {
2206 // TODO(BT) Pass parameter to input manager
Christine Franksea7d71b2018-07-03 14:46:07 -07002207 if (inputManagerF != null) {
2208 inputManagerF.systemRunning();
2209 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002210 } catch (Throwable e) {
2211 reportWtf("Notifying InputManagerService running", e);
2212 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002213 t.traceEnd();
2214 t.traceBegin("MakeTelephonyRegistryReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002215 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002216 if (telephonyRegistryF != null) {
2217 telephonyRegistryF.systemRunning();
2218 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002219 } catch (Throwable e) {
2220 reportWtf("Notifying TelephonyRegistry running", e);
2221 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002222 t.traceEnd();
2223 t.traceBegin("MakeMediaRouterServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002224 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002225 if (mediaRouterF != null) {
2226 mediaRouterF.systemRunning();
2227 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002228 } catch (Throwable e) {
2229 reportWtf("Notifying MediaRouterService running", e);
2230 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002231 t.traceEnd();
2232 t.traceBegin("MakeMmsServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002233 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002234 if (mmsServiceF != null) {
2235 mmsServiceF.systemRunning();
2236 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002237 } catch (Throwable e) {
2238 reportWtf("Notifying MmsService running", e);
2239 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002240 t.traceEnd();
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002241
Felipe Leme3aad1be2019-05-31 11:43:12 -07002242 t.traceBegin("IncidentDaemonReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002243 try {
2244 // TODO: Switch from checkService to getService once it's always
2245 // in the build and should reliably be there.
2246 final IIncidentManager incident = IIncidentManager.Stub.asInterface(
Yi Jinf32af482017-08-11 15:00:49 -07002247 ServiceManager.getService(Context.INCIDENT_SERVICE));
Christine Franksea7d71b2018-07-03 14:46:07 -07002248 if (incident != null) {
2249 incident.systemRunning();
2250 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002251 } catch (Throwable e) {
2252 reportWtf("Notifying incident daemon running", e);
2253 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002254 t.traceEnd();
2255 }, t);
Felipe Leme137e7812019-06-10 11:38:05 -07002256
2257 t.traceEnd(); // startOtherServices
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002258 }
Joe Onoratof3c3c4f2010-10-21 11:09:02 -04002259
Felipe Leme83e8f242019-08-14 16:57:56 +00002260 private boolean deviceHasConfigString(@NonNull Context context, @StringRes int resId) {
2261 String serviceName = context.getString(resId);
2262 return !TextUtils.isEmpty(serviceName);
2263 }
2264
Felipe Leme3aad1be2019-05-31 11:43:12 -07002265 private void startSystemCaptionsManagerService(@NonNull Context context,
2266 @NonNull TimingsTraceAndSlog t) {
Felipe Leme83e8f242019-08-14 16:57:56 +00002267 if (!deviceHasConfigString(context, R.string.config_defaultSystemCaptionsManagerService)) {
Robert Berry835123d2019-03-18 16:33:42 -04002268 Slog.d(TAG, "SystemCaptionsManagerService disabled because resource is not overlaid");
2269 return;
2270 }
2271
Felipe Leme3aad1be2019-05-31 11:43:12 -07002272 t.traceBegin("StartSystemCaptionsManagerService");
Robert Berry835123d2019-03-18 16:33:42 -04002273 mSystemServiceManager.startService(SYSTEM_CAPTIONS_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07002274 t.traceEnd();
Robert Berry835123d2019-03-18 16:33:42 -04002275 }
2276
Felipe Leme3aad1be2019-05-31 11:43:12 -07002277 private void startContentCaptureService(@NonNull Context context,
2278 @NonNull TimingsTraceAndSlog t) {
Felipe Leme14ef4612019-02-07 12:24:38 -08002279 // First check if it was explicitly enabled by DeviceConfig
Perumaal S70738732019-02-20 15:58:40 -08002280 boolean explicitlyEnabled = false;
Felipe Leme14ef4612019-02-07 12:24:38 -08002281 String settings = DeviceConfig.getProperty(DeviceConfig.NAMESPACE_CONTENT_CAPTURE,
2282 ContentCaptureManager.DEVICE_CONFIG_PROPERTY_SERVICE_EXPLICITLY_ENABLED);
2283 if (settings != null && !settings.equalsIgnoreCase("default")) {
Perumaal S70738732019-02-20 15:58:40 -08002284 explicitlyEnabled = Boolean.parseBoolean(settings);
2285 if (explicitlyEnabled) {
Felipe Leme70bcf382019-01-24 14:55:03 -08002286 Slog.d(TAG, "ContentCaptureService explicitly enabled by DeviceConfig");
Felipe Leme14ef4612019-02-07 12:24:38 -08002287 } else {
2288 Slog.d(TAG, "ContentCaptureService explicitly disabled by DeviceConfig");
Felipe Leme658c8e42018-11-30 12:49:45 -08002289 return;
Felipe Leme14ef4612019-02-07 12:24:38 -08002290 }
Felipe Leme658c8e42018-11-30 12:49:45 -08002291 }
Felipe Leme14ef4612019-02-07 12:24:38 -08002292
2293 // Then check if OEM overlaid the resource that defines the service.
Perumaal S70738732019-02-20 15:58:40 -08002294 if (!explicitlyEnabled) {
Felipe Leme83e8f242019-08-14 16:57:56 +00002295 if (!deviceHasConfigString(context, R.string.config_defaultContentCaptureService)) {
Felipe Leme14ef4612019-02-07 12:24:38 -08002296 Slog.d(TAG, "ContentCaptureService disabled because resource is not overlaid");
2297 return;
2298 }
2299 }
2300
Felipe Leme3aad1be2019-05-31 11:43:12 -07002301 t.traceBegin("StartContentCaptureService");
Felipe Leme749b8892018-12-03 16:30:30 -08002302 mSystemServiceManager.startService(CONTENT_CAPTURE_MANAGER_SERVICE_CLASS);
Felipe Leme141864d2019-02-27 17:01:51 -08002303
2304 ContentCaptureManagerInternal ccmi =
2305 LocalServices.getService(ContentCaptureManagerInternal.class);
2306 if (ccmi != null && mActivityManagerService != null) {
2307 mActivityManagerService.setContentCaptureManager(ccmi);
2308 }
2309
Felipe Leme3aad1be2019-05-31 11:43:12 -07002310 t.traceEnd();
Felipe Leme658c8e42018-11-30 12:49:45 -08002311 }
2312
Felipe Leme3aad1be2019-05-31 11:43:12 -07002313 private void startAttentionService(@NonNull Context context, @NonNull TimingsTraceAndSlog t) {
Alex Salo7a6e3a62019-02-27 15:08:15 -08002314 if (!AttentionManagerService.isServiceConfigured(context)) {
2315 Slog.d(TAG, "AttentionService is not configured on this device");
2316 return;
2317 }
2318
Felipe Leme3aad1be2019-05-31 11:43:12 -07002319 t.traceBegin("StartAttentionManagerService");
Alex Salo7a6e3a62019-02-27 15:08:15 -08002320 mSystemServiceManager.startService(AttentionManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07002321 t.traceEnd();
Alex Salo7a6e3a62019-02-27 15:08:15 -08002322 }
2323
Robert Berry835123d2019-03-18 16:33:42 -04002324 private static void startSystemUi(Context context, WindowManagerService windowManager) {
Joe Onoratof3c3c4f2010-10-21 11:09:02 -04002325 Intent intent = new Intent();
2326 intent.setComponent(new ComponentName("com.android.systemui",
Christine Franksea7d71b2018-07-03 14:46:07 -07002327 "com.android.systemui.SystemUIService"));
Jeff Sharkey2f3e3532015-12-21 14:16:43 -07002328 intent.addFlags(Intent.FLAG_DEBUG_TRIAGED_MISSING);
Dianne Hackborn40e9f292012-11-27 19:12:23 -08002329 //Slog.d(TAG, "Starting service: " + intent);
Xiaohui Chen70f6c382015-04-28 14:21:43 -07002330 context.startServiceAsUser(intent, UserHandle.SYSTEM);
Keun-young Park4136d2d2017-05-08 14:51:59 -07002331 windowManager.onSystemUiStarted();
Joe Onoratof3c3c4f2010-10-21 11:09:02 -04002332 }
Nicolas Geoffray27c07372015-11-05 16:54:09 +00002333}