blob: 21cacd45dcb53516735aac79e56751b275d1e696 [file] [log] [blame]
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2006 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server;
18
Felipe Lemee348dc32018-11-05 12:35:29 -080019import static android.os.IServiceManager.DUMP_FLAG_PRIORITY_CRITICAL;
20import static android.os.IServiceManager.DUMP_FLAG_PRIORITY_HIGH;
21import static android.os.IServiceManager.DUMP_FLAG_PRIORITY_NORMAL;
22import static android.os.IServiceManager.DUMP_FLAG_PROTO;
23import static android.view.Display.DEFAULT_DISPLAY;
24
Felipe Leme3aad1be2019-05-31 11:43:12 -070025import static com.android.server.utils.TimingsTraceAndSlog.SYSTEM_SERVER_TIMING_TAG;
26
Felipe Leme658c8e42018-11-30 12:49:45 -080027import android.annotation.NonNull;
Felipe Leme83e8f242019-08-14 16:57:56 +000028import android.annotation.StringRes;
Jeff Brown6f357d32014-01-15 20:40:55 -080029import android.app.ActivityThread;
Andrei Oneaf965d152019-10-30 18:08:24 +000030import android.app.AppCompatCallbacks;
Adam Lesinskief2ea1f2013-12-05 16:48:06 -080031import android.app.INotificationManager;
Adam Lesinski0debc9a2014-07-16 19:09:13 -070032import android.app.usage.UsageStatsManagerInternal;
Joe Onoratof3c3c4f2010-10-21 11:09:02 -040033import android.content.ComponentName;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080034import android.content.ContentResolver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080035import android.content.Context;
Joe Onoratof3c3c4f2010-10-21 11:09:02 -040036import android.content.Intent;
Jeff Sharkeyb0613dc2018-02-27 14:38:04 -070037import android.content.pm.PackageItemInfo;
Matthew Xie1dd01eb32013-04-26 12:37:54 -070038import android.content.pm.PackageManager;
Joe Onoratodc565f42010-10-04 15:27:22 -040039import android.content.res.Configuration;
Alan Viverettee54d2452015-05-06 10:41:43 -070040import android.content.res.Resources.Theme;
Fyodor Kupolov7fcd6592017-12-15 11:56:36 -080041import android.database.sqlite.SQLiteCompatibilityWalFlags;
Makoto Onuki50e00c82018-08-07 15:57:13 -070042import android.database.sqlite.SQLiteGlobal;
Winson72dbe7e2019-04-29 14:55:30 -070043import android.hardware.display.DisplayManagerInternal;
Roshan Pius7e6f5f52019-06-27 14:14:40 -070044import android.net.ConnectivityModuleConnector;
Remi NGUYEN VAN310da6f2019-02-14 18:04:20 +090045import android.net.NetworkStackClient;
markchien0f63ca62019-09-30 14:40:57 +080046import android.net.TetheringManager;
Jeff Sharkeyd136e512016-03-09 22:30:56 -070047import android.os.BaseBundle;
Jeff Sharkey0a17db12016-11-04 11:23:46 -060048import android.os.Binder;
Jeff Sharkey55687722014-04-09 18:07:19 -070049import android.os.Build;
David Sehr1a885392019-11-27 16:24:06 -080050import android.os.Debug;
Jeff Sharkey48749fc2013-04-19 13:25:04 -070051import android.os.Environment;
Jeff Brown6f357d32014-01-15 20:40:55 -080052import android.os.FactoryTest;
Tao Bao4fd6c262016-01-19 14:22:24 -080053import android.os.FileUtils;
Joe Onorato1754d742016-11-21 17:51:35 -080054import android.os.IIncidentManager;
Jeff Hamilton35eef702010-06-09 15:45:18 -050055import android.os.Looper;
Alison Cichowlasf0afd8c2017-07-31 11:24:34 -040056import android.os.Message;
Fyodor Kupolova81b8c02017-11-13 15:51:03 -080057import android.os.Parcel;
Tao Bao4fd6c262016-01-19 14:22:24 -080058import android.os.PowerManager;
Narayan Kamath97780462017-02-06 20:24:08 +000059import android.os.Process;
Jeff Hamilton35eef702010-06-09 15:45:18 -050060import android.os.ServiceManager;
Brad Fitzpatrickc74a1b442010-09-10 16:03:29 -070061import android.os.StrictMode;
Jeff Hamilton35eef702010-06-09 15:45:18 -050062import android.os.SystemClock;
63import android.os.SystemProperties;
Amith Yamasanicd757062012-10-19 18:23:52 -070064import android.os.UserHandle;
Sudheer Shanka2250d562016-11-07 15:41:02 -080065import android.os.storage.IStorageManager;
Felipe Leme70bcf382019-01-24 14:55:03 -080066import android.provider.DeviceConfig;
Felipe Leme658c8e42018-11-30 12:49:45 -080067import android.provider.Settings;
Inseob Kimc1246e62018-11-08 13:13:54 +090068import android.sysprop.VoldProperties;
Felipe Leme658c8e42018-11-30 12:49:45 -080069import android.text.TextUtils;
Joe Onoratodc565f42010-10-04 15:27:22 -040070import android.util.DisplayMetrics;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080071import android.util.EventLog;
Joe Onorato8a9b2202010-02-26 18:56:32 -080072import android.util.Slog;
Brad Fitzpatrick5fdc0c72010-10-12 13:12:18 -070073import android.view.WindowManager;
Felipe Leme14ef4612019-02-07 12:24:38 -080074import android.view.contentcapture.ContentCaptureManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080075
Dan Morrille4d9a012013-03-28 18:10:43 -070076import com.android.internal.R;
Fyodor Kupolov8d3e82b2016-11-10 17:58:50 -080077import com.android.internal.logging.MetricsLogger;
Geoffrey Pitschaf759c52017-02-15 09:35:38 -050078import com.android.internal.notification.SystemNotificationChannels;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -070079import com.android.internal.os.BinderInternal;
Keun-young Parkd80e8942017-01-27 11:30:19 -080080import com.android.internal.util.ConcurrentUtils;
Tony Makb0d22622018-01-18 12:49:49 +000081import com.android.internal.util.EmergencyAffordanceManager;
Jeff Sharkeyd136e512016-03-09 22:30:56 -070082import com.android.internal.widget.ILockSettings;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -070083import com.android.server.am.ActivityManagerService;
Makoto Onukidf7e4812018-09-24 14:31:25 -070084import com.android.server.appbinding.AppBindingService;
Alex Salob81472f2018-12-12 14:44:28 -080085import com.android.server.attention.AttentionManagerService;
John Spurlock61560172015-02-06 19:46:04 -050086import com.android.server.audio.AudioService;
Ilya Matyukhine4675b32019-11-07 16:07:19 -080087import com.android.server.biometrics.AuthService;
Kevin Chyn352adfe2018-09-20 22:28:50 -070088import com.android.server.biometrics.BiometricService;
Felipe Lemee348dc32018-11-05 12:35:29 -080089import com.android.server.biometrics.face.FaceService;
90import com.android.server.biometrics.fingerprint.FingerprintService;
Kevin Chyn51676d22018-11-05 18:00:43 -080091import com.android.server.biometrics.iris.IrisService;
Tony Makb0d22622018-01-18 12:49:49 +000092import com.android.server.broadcastradio.BroadcastRadioService;
Wei Wanged7f5482017-02-21 11:35:10 -080093import com.android.server.camera.CameraServiceProxy;
Amith Yamasani30f8eb42013-11-06 14:54:50 -080094import com.android.server.clipboard.ClipboardService;
Andrei Oneacf109842019-07-17 19:03:10 +010095import com.android.server.compat.PlatformCompat;
atrost87488352019-10-10 19:27:31 +010096import com.android.server.compat.PlatformCompatNative;
Hugo Benichieab511b2016-09-09 09:23:47 +090097import com.android.server.connectivity.IpConnectivityMetrics;
Felipe Leme141864d2019-02-27 17:01:51 -080098import com.android.server.contentcapture.ContentCaptureManagerInternal;
Allen Hair1f556e32016-11-11 15:42:50 -080099import com.android.server.coverage.CoverageService;
Adam Lesinski2c8d67c2014-04-23 13:46:21 -0700100import com.android.server.devicepolicy.DevicePolicyManagerService;
Tony Makb0d22622018-01-18 12:49:49 +0000101import com.android.server.display.DisplayManagerService;
Christine Franks0ada2772019-02-25 13:54:57 -0800102import com.android.server.display.color.ColorDisplayService;
Jeff Browncef440f2012-09-25 18:58:48 -0700103import com.android.server.dreams.DreamManagerService;
Selim Cinek705442f2016-09-13 16:02:33 -0700104import com.android.server.emergency.EmergencyAffordanceService;
Peiyong Linfd71c202019-01-23 15:29:59 -0800105import com.android.server.gpu.GpuService;
Jungshik Jang0792d372014-04-23 17:57:26 +0900106import com.android.server.hdmi.HdmiControlService;
Joe Onoratoe21ab7e2018-12-18 15:00:25 -0800107import com.android.server.incident.IncidentCompanionService;
Jeff Brown6ec6f792012-04-17 16:52:41 -0700108import com.android.server.input.InputManagerService;
Yohei Yukawa603f4d02018-09-11 15:04:58 -0700109import com.android.server.inputmethod.InputMethodManagerService;
Tarandeep Singh07b318b2019-07-17 11:12:04 -0700110import com.android.server.inputmethod.InputMethodSystemProperty;
Yohei Yukawabae5bea2018-11-12 15:08:30 -0800111import com.android.server.inputmethod.MultiClientInputMethodManagerService;
Adam Lesinskief2ea1f2013-12-05 16:48:06 -0800112import com.android.server.lights.LightsService;
Jeff Sharkeyd136e512016-03-09 22:30:56 -0700113import com.android.server.media.MediaResourceMonitorService;
Jeff Brown69b07162013-11-07 00:30:16 -0800114import com.android.server.media.MediaRouterService;
RoboErik01fe6612014-02-13 14:19:04 -0800115import com.android.server.media.MediaSessionService;
Michael Wrightc39d47a2014-07-08 18:07:36 -0700116import com.android.server.media.projection.MediaProjectionManagerService;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700117import com.android.server.net.NetworkPolicyManagerService;
Jeff Sharkey75279902011-05-24 18:39:45 -0700118import com.android.server.net.NetworkStatsService;
Ricky Wai1a6e6672017-10-27 14:46:01 +0100119import com.android.server.net.watchlist.NetworkWatchlistService;
Adam Lesinskief2ea1f2013-12-05 16:48:06 -0800120import com.android.server.notification.NotificationManagerService;
Andrew Scull5d7027d2017-04-12 11:46:27 +0100121import com.android.server.oemlock.OemLockService;
MÃ¥rten Kongstad2e0d0f32016-06-02 09:35:31 +0200122import com.android.server.om.OverlayManagerService;
Nandana Duttd11850c2018-12-12 17:26:57 +0000123import com.android.server.os.BugreportManagerService;
Svet Ganov37e43272016-09-09 16:01:32 -0700124import com.android.server.os.DeviceIdentifiersPolicyService;
Jeff Sharkey7a96c392012-11-15 14:01:46 -0800125import com.android.server.os.SchedulingPolicyService;
Calin Juravle91d40f12017-03-15 18:38:57 -0700126import com.android.server.pm.BackgroundDexOptService;
Tony Makb0d22622018-01-18 12:49:49 +0000127import com.android.server.pm.CrossProfileAppsService;
Alan Stokesbe9ec972018-12-10 14:07:47 +0000128import com.android.server.pm.DynamicCodeLoggingService;
Jeff Brownf69c8122012-09-12 17:00:34 -0700129import com.android.server.pm.Installer;
Amith Yamasani4f582632014-02-19 14:31:52 -0800130import com.android.server.pm.LauncherAppsService;
Andreas Gampea8908752015-11-10 08:58:14 -0800131import com.android.server.pm.OtaDexoptService;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700132import com.android.server.pm.PackageManagerService;
Makoto Onuki6f7362d92016-03-04 13:39:41 -0800133import com.android.server.pm.ShortcutService;
Amith Yamasani258848d2012-08-10 17:06:33 -0700134import com.android.server.pm.UserManagerService;
Svet Ganovd8eb8b22019-04-05 18:52:08 -0700135import com.android.server.policy.PermissionPolicyService;
Wale Ogunwaleb699ce02016-07-18 12:05:30 -0700136import com.android.server.policy.PhoneWindowManager;
Eugene Susla4ab95112018-12-17 14:45:11 -0800137import com.android.server.policy.role.LegacyRoleResolutionPolicy;
Jeff Brown4f8ecd82012-06-18 18:29:13 -0700138import com.android.server.power.PowerManagerService;
139import com.android.server.power.ShutdownThread;
Wei Wangbad7c202018-11-01 11:57:39 -0700140import com.android.server.power.ThermalManagerService;
Kenny Rootf96836e2019-11-19 17:11:34 -0800141import com.android.server.recoverysystem.RecoverySystemService;
Amith Yamasanif20d6402014-05-24 15:34:37 -0700142import com.android.server.restrictions.RestrictionsManagerService;
Eugene Susla6d4922722018-11-08 16:25:28 -0800143import com.android.server.role.RoleManagerService;
Richard Uhlerb29f1452018-09-12 16:38:15 +0100144import com.android.server.rollback.RollbackManagerService;
Janis Danisevskis8ff1e192016-06-03 11:31:55 -0700145import com.android.server.security.KeyAttestationApplicationIdProviderService;
Robin Lee13935492017-03-23 15:28:37 +0000146import com.android.server.security.KeyChainSystemService;
Mathew Inwood4e2ed6a2018-11-26 15:31:16 +0000147import com.android.server.signedconfig.SignedConfigService;
Arunesh Mishraa772e5f2016-01-25 10:33:11 -0800148import com.android.server.soundtrigger.SoundTriggerService;
Adam Lesinskief2ea1f2013-12-05 16:48:06 -0800149import com.android.server.statusbar.StatusBarManagerService;
150import com.android.server.storage.DeviceStorageMonitorService;
Santos Cordon5d2c1e62014-11-21 15:20:15 -0800151import com.android.server.telecom.TelecomLoaderService;
William Hestera96d3d32018-12-19 13:14:51 -0800152import com.android.server.testharness.TestHarnessModeService;
Abodunrinwa Tokid32906c2018-01-18 04:34:44 -0800153import com.android.server.textclassifier.TextClassificationManagerService;
Yohei Yukawaeb1e8042018-09-12 14:02:00 -0700154import com.android.server.textservices.TextServicesManagerService;
Adrian Roos82142c22014-03-27 14:56:59 +0100155import com.android.server.trust.TrustManagerService;
Jae Seo39570912014-02-20 18:23:25 -0800156import com.android.server.tv.TvInputManagerService;
Fyodor Kupolov3235e0c2016-11-17 11:44:49 -0800157import com.android.server.tv.TvRemoteService;
Adam Lesinskief2ea1f2013-12-05 16:48:06 -0800158import com.android.server.twilight.TwilightService;
Wale Ogunwale6d50dcc2018-07-21 23:00:40 -0700159import com.android.server.uri.UriGrantsManagerService;
Adam Lesinski0debc9a2014-07-16 19:09:13 -0700160import com.android.server.usage.UsageStatsService;
Felipe Leme3aad1be2019-05-31 11:43:12 -0700161import com.android.server.utils.TimingsTraceAndSlog;
Ruben Brunkdd18a0b2015-12-04 16:16:31 -0800162import com.android.server.vr.VrManagerService;
Torne (Richard Coles)08cfaf62014-05-08 16:07:05 +0100163import com.android.server.webkit.WebViewUpdateService;
Felipe Lemee348dc32018-11-05 12:35:29 -0800164import com.android.server.wm.ActivityTaskManagerService;
Wale Ogunwale1f5e53d2018-11-05 05:12:46 -0800165import com.android.server.wm.WindowManagerGlobalLock;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700166import com.android.server.wm.WindowManagerService;
167
168import dalvik.system.VMRuntime;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700169
Alex Salob81472f2018-12-12 14:44:28 -0800170import com.google.android.startop.iorap.IorapForwardingService;
171
Tao Bao4fd6c262016-01-19 14:22:24 -0800172import java.io.File;
173import java.io.IOException;
Narayan Kamathbf882052015-08-11 15:40:34 +0100174import java.util.Locale;
Bob Leee5408332009-09-04 18:31:17 -0700175import java.util.Timer;
Fyodor Kupolov311b9fa2016-12-02 16:24:35 -0800176import java.util.concurrent.CountDownLatch;
Keun-young Parkd80e8942017-01-27 11:30:19 -0800177import java.util.concurrent.Future;
Bob Leee5408332009-09-04 18:31:17 -0700178
Jeff Brown6f357d32014-01-15 20:40:55 -0800179public final class SystemServer {
Christine Franksea7d71b2018-07-03 14:46:07 -0700180
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800181 private static final String TAG = "SystemServer";
Jeff Brown6f357d32014-01-15 20:40:55 -0800182
Ben Komalo553acf02011-09-19 14:25:28 -0700183 private static final String ENCRYPTING_STATE = "trigger_restart_min_framework";
Ben Komalo3573d402011-09-23 15:08:24 -0700184 private static final String ENCRYPTED_STATE = "1";
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800185
Jeff Brown6f357d32014-01-15 20:40:55 -0800186 private static final long SNAPSHOT_INTERVAL = 60 * 60 * 1000; // 1hr
187
188 // The earliest supported time. We pick one day into 1970, to
189 // give any timezone code room without going into negative time.
190 private static final long EARLIEST_SUPPORTED_TIME = 86400 * 1000;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800191
Makoto Onuki712886f2018-04-27 15:22:50 -0700192 private static final long SLOW_DISPATCH_THRESHOLD_MS = 100;
193 private static final long SLOW_DELIVERY_THRESHOLD_MS = 200;
194
Amith Yamasani817ec492013-12-20 13:27:30 -0800195 /*
196 * Implementation class names. TODO: Move them to a codegen class or load
197 * them from the build system somehow.
198 */
199 private static final String BACKUP_MANAGER_SERVICE_CLASS =
Annie Meng384230f2018-11-28 10:58:08 +0000200 "com.android.server.backup.BackupManagerService$Lifecycle";
Amith Yamasani817ec492013-12-20 13:27:30 -0800201 private static final String APPWIDGET_SERVICE_CLASS =
202 "com.android.server.appwidget.AppWidgetService";
Dianne Hackborn91097de2014-04-04 18:02:06 -0700203 private static final String VOICE_RECOGNITION_MANAGER_SERVICE_CLASS =
204 "com.android.server.voiceinteraction.VoiceInteractionManagerService";
Amith Yamasani817ec492013-12-20 13:27:30 -0800205 private static final String PRINT_MANAGER_SERVICE_CLASS =
206 "com.android.server.print.PrintManagerService";
Eugene Susla6ed45d82017-01-22 13:52:51 -0800207 private static final String COMPANION_DEVICE_MANAGER_SERVICE_CLASS =
Eugene Susla0d3dd122017-04-18 10:56:37 -0700208 "com.android.server.companion.CompanionDeviceManagerService";
Tej Singhc53ac0a2019-09-20 16:29:13 -0700209 private static final String STATS_COMPANION_SERVICE_LIFECYCLE_CLASS =
210 "com.android.server.stats.StatsCompanionService$Lifecycle";
Adam Lesinski2cb6c602014-02-14 17:19:56 -0800211 private static final String USB_SERVICE_CLASS =
212 "com.android.server.usb.UsbService$Lifecycle";
Mike Lockwood5781cd52015-03-27 13:23:41 -0700213 private static final String MIDI_SERVICE_CLASS =
214 "com.android.server.midi.MidiService$Lifecycle";
Adam Lesinskif542a332014-02-19 12:29:58 -0800215 private static final String WIFI_SERVICE_CLASS =
216 "com.android.server.wifi.WifiService";
Etan Cohen04133272016-10-26 11:22:06 -0700217 private static final String WIFI_AWARE_SERVICE_CLASS =
218 "com.android.server.wifi.aware.WifiAwareService";
Adam Lesinskif542a332014-02-19 12:29:58 -0800219 private static final String WIFI_P2P_SERVICE_CLASS =
220 "com.android.server.wifi.p2p.WifiP2pService";
Robert Quattlebaum87a71042017-05-15 15:45:20 -0700221 private static final String LOWPAN_SERVICE_CLASS =
222 "com.android.server.lowpan.LowpanService";
Lorenzo Colittif9ff2c92014-05-21 16:32:11 -0700223 private static final String ETHERNET_SERVICE_CLASS =
224 "com.android.server.ethernet.EthernetService";
Christopher Tate7060b042014-06-09 19:50:00 -0700225 private static final String JOB_SCHEDULER_SERVICE_CLASS =
226 "com.android.server.job.JobSchedulerService";
Jim Miller4f93c582016-01-27 19:05:43 -0800227 private static final String LOCK_SETTINGS_SERVICE_CLASS =
Andrew Scull507d11c2017-05-03 17:19:01 +0100228 "com.android.server.locksettings.LockSettingsService$Lifecycle";
Sudheer Shanka2250d562016-11-07 15:41:02 -0800229 private static final String STORAGE_MANAGER_SERVICE_CLASS =
230 "com.android.server.StorageManagerService$Lifecycle";
Jeff Sharkeye8cece92017-01-04 11:33:33 -0700231 private static final String STORAGE_STATS_SERVICE_CLASS =
232 "com.android.server.usage.StorageStatsService$Lifecycle";
Jeff Sharkey4175be22016-01-09 14:57:45 -0700233 private static final String SEARCH_MANAGER_SERVICE_CLASS =
234 "com.android.server.search.SearchManagerService$Lifecycle";
Wei Liud699cf82016-03-25 16:32:10 -0700235 private static final String THERMAL_OBSERVER_CLASS =
236 "com.google.android.clockwork.ThermalObserver";
Calvin On5555bcc2017-02-21 16:41:43 -0800237 private static final String WEAR_CONNECTIVITY_SERVICE_CLASS =
Calvin On3cda1cf2018-02-14 13:57:07 -0800238 "com.android.clockwork.connectivity.WearConnectivityService";
Damien Bargiacchiae4cb672018-05-30 13:28:15 -0700239 private static final String WEAR_POWER_SERVICE_CLASS =
240 "com.android.clockwork.power.WearPowerService";
Chris Phoenixbc839a32017-10-21 14:46:15 -0700241 private static final String WEAR_SIDEKICK_SERVICE_CLASS =
242 "com.google.android.clockwork.sidekick.SidekickService";
Julius D'souza069f46c2017-03-22 13:27:00 -0700243 private static final String WEAR_DISPLAY_SERVICE_CLASS =
244 "com.google.android.clockwork.display.WearDisplayService";
Ivan Podogovf9973822017-05-11 15:51:34 +0100245 private static final String WEAR_LEFTY_SERVICE_CLASS =
246 "com.google.android.clockwork.lefty.WearLeftyService";
Damien Bargiacchi2d92eeb2016-04-07 14:01:03 -0700247 private static final String WEAR_TIME_SERVICE_CLASS =
248 "com.google.android.clockwork.time.WearTimeService";
Michael Kwan01ad0aa2018-02-28 15:19:04 -0800249 private static final String WEAR_GLOBAL_ACTIONS_SERVICE_CLASS =
250 "com.android.clockwork.globalactions.GlobalActionsService";
Jeff Sharkey1cab76a2016-04-12 18:23:31 -0600251 private static final String ACCOUNT_SERVICE_CLASS =
252 "com.android.server.accounts.AccountManagerService$Lifecycle";
Jeff Sharkeya3ebfec2016-04-04 08:58:04 -0600253 private static final String CONTENT_SERVICE_CLASS =
254 "com.android.server.content.ContentService$Lifecycle";
Jeff Sharkey1cab76a2016-04-12 18:23:31 -0600255 private static final String WALLPAPER_SERVICE_CLASS =
256 "com.android.server.wallpaper.WallpaperManagerService$Lifecycle";
Felipe Leme5381aa42016-10-13 09:02:32 -0700257 private static final String AUTO_FILL_MANAGER_SERVICE_CLASS =
Svet Ganov2f8fb1f2017-03-13 00:21:04 -0700258 "com.android.server.autofill.AutofillManagerService";
Felipe Leme749b8892018-12-03 16:30:30 -0800259 private static final String CONTENT_CAPTURE_MANAGER_SERVICE_CLASS =
260 "com.android.server.contentcapture.ContentCaptureManagerService";
Robert Berry835123d2019-03-18 16:33:42 -0400261 private static final String SYSTEM_CAPTIONS_MANAGER_SERVICE_CLASS =
262 "com.android.server.systemcaptions.SystemCaptionsManagerService";
Neil Fuller328532a2017-03-16 18:32:21 +0000263 private static final String TIME_ZONE_RULES_MANAGER_SERVICE_CLASS =
264 "com.android.server.timezone.RulesManagerService$Lifecycle";
Nick Felker1bfe59d2017-10-12 13:27:02 -0700265 private static final String IOT_SERVICE_CLASS =
Ralph Nathan090c2c32018-04-19 22:19:03 -0700266 "com.android.things.server.IoTSystemService";
Jason Monk8f5f7ff2017-10-17 14:12:42 -0400267 private static final String SLICE_MANAGER_SERVICE_CLASS =
268 "com.android.server.slice.SliceManagerService$Lifecycle";
Steve Paik94292a32018-01-26 17:16:53 -0800269 private static final String CAR_SERVICE_HELPER_SERVICE_CLASS =
270 "com.android.internal.car.CarServiceHelperService";
Neil Fullerfeeee682018-05-30 14:35:24 +0100271 private static final String TIME_DETECTOR_SERVICE_CLASS =
272 "com.android.server.timedetector.TimeDetectorService$Lifecycle";
Neil Fuller3e3b5402019-11-07 15:35:05 +0000273 private static final String TIME_ZONE_DETECTOR_SERVICE_CLASS =
274 "com.android.server.timezonedetector.TimeZoneDetectorService$Lifecycle";
Rhed Jao8a39cef2018-07-18 11:43:33 +0800275 private static final String ACCESSIBILITY_MANAGER_SERVICE_CLASS =
276 "com.android.server.accessibility.AccessibilityManagerService$Lifecycle";
Kenny Rootf74bfde2018-01-18 15:42:48 -0800277 private static final String ADB_SERVICE_CLASS =
278 "com.android.server.adb.AdbService$Lifecycle";
Sunny Goyal54e91342018-11-14 11:59:02 -0800279 private static final String APP_PREDICTION_MANAGER_SERVICE_CLASS =
280 "com.android.server.appprediction.AppPredictionManagerService";
Winson Chung3fb0f252019-01-08 17:41:55 -0800281 private static final String CONTENT_SUGGESTIONS_SERVICE_CLASS =
282 "com.android.server.contentsuggestions.ContentSuggestionsManagerService";
Makoto Onuki52c24b32019-08-23 10:18:28 -0700283 private static final String DEVICE_IDLE_CONTROLLER_CLASS =
284 "com.android.server.DeviceIdleController";
Sudheer Shankaf5b36962019-10-04 16:16:13 -0700285 private static final String BLOB_STORE_MANAGER_SERVICE_CLASS =
286 "com.android.server.blob.BlobStoreManagerService";
Terry Wangecc0d1b2019-10-17 17:05:18 -0700287 private static final String APP_SEARCH_MANAGER_SERVICE_CLASS =
288 "com.android.server.appsearch.AppSearchManagerService";
Andres Morales68d4acd2014-07-01 19:40:41 -0700289 private static final String PERSISTENT_DATA_BLOCK_PROP = "ro.frp.pst";
Amith Yamasani817ec492013-12-20 13:27:30 -0800290
Tao Bao4fd6c262016-01-19 14:22:24 -0800291 private static final String UNCRYPT_PACKAGE_FILE = "/cache/recovery/uncrypt_file";
292 private static final String BLOCK_MAP_FILE = "/cache/recovery/block.map";
293
David Andersona032a2b2019-02-07 14:07:23 -0800294 private static final String GSI_RUNNING_PROP = "ro.gsid.image_running";
295
Tim Murrayeef4a3d2016-04-19 14:14:20 -0700296 // maximum number of binder threads used for system_server
297 // will be higher than the system default
298 private static final int sMaxBinderThreads = 31;
299
Alan Viveretteba398ea2015-12-16 15:28:23 -0500300 /**
Christine Franksea7d71b2018-07-03 14:46:07 -0700301 * Default theme used by the system context. This is used to style system-provided dialogs, such
302 * as the Power Off dialog, and other visual content.
Alan Viveretteba398ea2015-12-16 15:28:23 -0500303 */
304 private static final int DEFAULT_SYSTEM_THEME =
Michael Kwan9c7274c2016-06-13 12:48:55 -0700305 com.android.internal.R.style.Theme_DeviceDefault_System;
Alan Viveretteba398ea2015-12-16 15:28:23 -0500306
Jeff Brown6f357d32014-01-15 20:40:55 -0800307 private final int mFactoryTestMode;
308 private Timer mProfilerSnapshotTimer;
309
310 private Context mSystemContext;
311 private SystemServiceManager mSystemServiceManager;
312
Jeff Brown4ccb8232014-01-16 22:16:42 -0800313 // TODO: remove all of these references by improving dependency resolution and boot phases
Jeff Brown4ccb8232014-01-16 22:16:42 -0800314 private PowerManagerService mPowerManagerService;
315 private ActivityManagerService mActivityManagerService;
Wale Ogunwale1f5e53d2018-11-05 05:12:46 -0800316 private WindowManagerGlobalLock mWindowManagerGlobalLock;
Gustav Sennton6258dcd2015-10-30 19:25:37 +0000317 private WebViewUpdateService mWebViewUpdateService;
Jeff Brown4ccb8232014-01-16 22:16:42 -0800318 private DisplayManagerService mDisplayManagerService;
Jeff Brown2c43c332014-06-12 22:38:59 -0700319 private PackageManagerService mPackageManagerService;
320 private PackageManager mPackageManager;
Jeff Brown6f357d32014-01-15 20:40:55 -0800321 private ContentResolver mContentResolver;
Jeff Sharkey1cab76a2016-04-12 18:23:31 -0600322 private EntropyMixer mEntropyMixer;
Jeff Brown6f357d32014-01-15 20:40:55 -0800323
Jeff Brown2c43c332014-06-12 22:38:59 -0700324 private boolean mOnlyCore;
325 private boolean mFirstBoot;
Makoto Onukib4739d92019-02-15 15:22:04 -0800326 private final int mStartCount;
Fyodor Kupolov6733e6c2017-01-06 18:27:05 -0800327 private final boolean mRuntimeRestart;
Makoto Onukie8edbcf2018-03-02 16:49:29 -0800328 private final long mRuntimeStartElapsedTime;
329 private final long mRuntimeStartUptime;
Jeff Brown2c43c332014-06-12 22:38:59 -0700330
Keun-young Park9b73a542017-02-01 12:09:58 -0800331 private static final String START_SENSOR_SERVICE = "StartSensorService";
Yifan Hong26b421f2017-03-10 13:41:11 -0800332 private static final String START_HIDL_SERVICES = "StartHidlServices";
333
Makoto Onukib4739d92019-02-15 15:22:04 -0800334 private static final String SYSPROP_START_COUNT = "sys.system_server.start_count";
335 private static final String SYSPROP_START_ELAPSED = "sys.system_server.start_elapsed";
336 private static final String SYSPROP_START_UPTIME = "sys.system_server.start_uptime";
Yifan Hong26b421f2017-03-10 13:41:11 -0800337
Keun-young Park9b73a542017-02-01 12:09:58 -0800338 private Future<?> mSensorServiceStart;
Narayan Kamath97780462017-02-06 20:24:08 +0000339 private Future<?> mZygotePreload;
340
Jeff Brown6f357d32014-01-15 20:40:55 -0800341 /**
Keun-young Park9b73a542017-02-01 12:09:58 -0800342 * Start the sensor service. This is a blocking call and can take time.
Jeff Brown6f357d32014-01-15 20:40:55 -0800343 */
Svet Ganovb9d71a62015-04-30 10:38:13 -0700344 private static native void startSensorService();
Jeff Brown6f357d32014-01-15 20:40:55 -0800345
346 /**
Christine Franksea7d71b2018-07-03 14:46:07 -0700347 * Start all HIDL services that are run inside the system server. This may take some time.
Yifan Hong26b421f2017-03-10 13:41:11 -0800348 */
349 private static native void startHidlServices();
350
351 /**
Ryan Savitskicfdc1512018-12-14 16:20:52 +0000352 * Mark this process' heap as profileable. Only for debug builds.
353 */
354 private static native void initZygoteChildHeapProfiling();
355
356 /**
Jeff Brown6f357d32014-01-15 20:40:55 -0800357 * The main entry point from zygote.
358 */
359 public static void main(String[] args) {
360 new SystemServer().run();
361 }
362
363 public SystemServer() {
Jeff Brown2c43c332014-06-12 22:38:59 -0700364 // Check for factory test mode.
Jeff Brown6f357d32014-01-15 20:40:55 -0800365 mFactoryTestMode = FactoryTest.getMode();
Makoto Onukie8edbcf2018-03-02 16:49:29 -0800366
Makoto Onukib4739d92019-02-15 15:22:04 -0800367 // Record process start information.
368 // Note SYSPROP_START_COUNT will increment by *2* on a FDE device when it fully boots;
369 // one for the password screen, second for the actual boot.
370 mStartCount = SystemProperties.getInt(SYSPROP_START_COUNT, 0) + 1;
Makoto Onukie8edbcf2018-03-02 16:49:29 -0800371 mRuntimeStartElapsedTime = SystemClock.elapsedRealtime();
372 mRuntimeStartUptime = SystemClock.uptimeMillis();
Makoto Onukib4739d92019-02-15 15:22:04 -0800373
374 // Remember if it's runtime restart(when sys.boot_completed is already set) or reboot
375 // We don't use "mStartCount > 1" here because it'll be wrong on a FDE device.
376 // TODO: mRuntimeRestart will *not* be set to true if the proccess crashes before
377 // sys.boot_completed is set. Fix it.
378 mRuntimeRestart = "1".equals(SystemProperties.get("sys.boot_completed"));
Jeff Brown6f357d32014-01-15 20:40:55 -0800379 }
380
381 private void run() {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700382 TimingsTraceAndSlog t = new TimingsTraceAndSlog();
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900383 try {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700384 t.traceBegin("InitBeforeStartServices");
Makoto Onukib4739d92019-02-15 15:22:04 -0800385
386 // Record the process start information in sys props.
387 SystemProperties.set(SYSPROP_START_COUNT, String.valueOf(mStartCount));
388 SystemProperties.set(SYSPROP_START_ELAPSED, String.valueOf(mRuntimeStartElapsedTime));
389 SystemProperties.set(SYSPROP_START_UPTIME, String.valueOf(mRuntimeStartUptime));
390
391 EventLog.writeEvent(EventLogTags.SYSTEM_SERVER_START,
392 mStartCount, mRuntimeStartUptime, mRuntimeStartElapsedTime);
393
Przemyslaw Szczepaniakfbe00fa2017-07-28 13:21:48 +0000394 //
395 // Default the timezone property to GMT if not set.
396 //
Christine Franksea7d71b2018-07-03 14:46:07 -0700397 String timezoneProperty = SystemProperties.get("persist.sys.timezone");
Przemyslaw Szczepaniakfbe00fa2017-07-28 13:21:48 +0000398 if (timezoneProperty == null || timezoneProperty.isEmpty()) {
399 Slog.w(TAG, "Timezone not set; setting to GMT.");
400 SystemProperties.set("persist.sys.timezone", "GMT");
401 }
402
Yasuhiro Matsudaebf94652015-09-02 22:48:13 +0900403 // If the system has "persist.sys.language" and friends set, replace them with
404 // "persist.sys.locale". Note that the default locale at this point is calculated
405 // using the "-Duser.locale" command line flag. That flag is usually populated by
406 // AndroidRuntime using the same set of system properties, but only the system_server
407 // and system apps are allowed to set them.
408 //
409 // NOTE: Most changes made here will need an equivalent change to
410 // core/jni/AndroidRuntime.cpp
411 if (!SystemProperties.get("persist.sys.language").isEmpty()) {
412 final String languageTag = Locale.getDefault().toLanguageTag();
Narayan Kamathbf882052015-08-11 15:40:34 +0100413
Yasuhiro Matsudaebf94652015-09-02 22:48:13 +0900414 SystemProperties.set("persist.sys.locale", languageTag);
415 SystemProperties.set("persist.sys.language", "");
416 SystemProperties.set("persist.sys.country", "");
417 SystemProperties.set("persist.sys.localevar", "");
418 }
Narayan Kamathbf882052015-08-11 15:40:34 +0100419
Jeff Sharkey0a17db12016-11-04 11:23:46 -0600420 // The system server should never make non-oneway calls
421 Binder.setWarnOnBlocking(true);
Jeff Sharkeyb0613dc2018-02-27 14:38:04 -0700422 // The system server should always load safe labels
Philip P. Moltmann20dd4312018-10-08 16:56:49 -0700423 PackageItemInfo.forceSafeLabels();
Makoto Onuki50e00c82018-08-07 15:57:13 -0700424
425 // Default to FULL within the system server.
426 SQLiteGlobal.sDefaultSyncMode = SQLiteGlobal.SYNC_MODE_FULL;
427
Fyodor Kupolov7fcd6592017-12-15 11:56:36 -0800428 // Deactivate SQLiteCompatibilityWalFlags until settings provider is initialized
429 SQLiteCompatibilityWalFlags.init(null);
Jeff Sharkey0a17db12016-11-04 11:23:46 -0600430
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900431 // Here we go!
432 Slog.i(TAG, "Entered the Android system server!");
Fyodor Kupolov6733e6c2017-01-06 18:27:05 -0800433 int uptimeMillis = (int) SystemClock.elapsedRealtime();
Fyodor Kupolov8d3e82b2016-11-10 17:58:50 -0800434 EventLog.writeEvent(EventLogTags.BOOT_PROGRESS_SYSTEM_RUN, uptimeMillis);
Fyodor Kupolov4ba91b92017-01-20 18:12:35 -0800435 if (!mRuntimeRestart) {
Fyodor Kupolov6733e6c2017-01-06 18:27:05 -0800436 MetricsLogger.histogram(null, "boot_system_server_init", uptimeMillis);
Fyodor Kupolov3235e0c2016-11-17 11:44:49 -0800437 }
Jeff Brown6f357d32014-01-15 20:40:55 -0800438
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900439 // In case the runtime switched since last boot (such as when
440 // the old runtime was removed in an OTA), set the system
Eugene Suslad0999242019-11-04 10:08:13 -0800441 // property so that it is in sync. We can't do this in
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900442 // libnativehelper's JniInvocation::Init code where we already
443 // had to fallback to a different runtime because it is
444 // running as root and we need to be the system user to set
445 // the property. http://b/11463182
446 SystemProperties.set("persist.sys.dalvik.vm.lib.2", VMRuntime.getRuntime().vmLibrary());
Jeff Brown6f357d32014-01-15 20:40:55 -0800447
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900448 // Mmmmmm... more memory!
449 VMRuntime.getRuntime().clearGrowthLimit();
Jeff Brown6f357d32014-01-15 20:40:55 -0800450
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900451 // Some devices rely on runtime fingerprint generation, so make sure
452 // we've defined it before booting further.
453 Build.ensureFingerprintProperty();
Jeff Sharkey55687722014-04-09 18:07:19 -0700454
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900455 // Within the system server, it is an error to access Environment paths without
456 // explicitly specifying a user.
457 Environment.setUserRequired(true);
Jeff Brown6f357d32014-01-15 20:40:55 -0800458
Jeff Sharkeyd136e512016-03-09 22:30:56 -0700459 // Within the system server, any incoming Bundles should be defused
460 // to avoid throwing BadParcelableException.
461 BaseBundle.setShouldDefuse(true);
462
Fyodor Kupolova81b8c02017-11-13 15:51:03 -0800463 // Within the system server, when parceling exceptions, include the stack trace
464 Parcel.setStackTraceParceling(true);
465
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900466 // Ensure binder calls into the system always run at foreground priority.
467 BinderInternal.disableBackgroundScheduling(true);
Jeff Brown6f357d32014-01-15 20:40:55 -0800468
Tim Murrayeef4a3d2016-04-19 14:14:20 -0700469 // Increase the number of binder threads in system_server
470 BinderInternal.setMaxThreads(sMaxBinderThreads);
471
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900472 // Prepare the main looper thread (this thread).
473 android.os.Process.setThreadPriority(
Christine Franksea7d71b2018-07-03 14:46:07 -0700474 android.os.Process.THREAD_PRIORITY_FOREGROUND);
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900475 android.os.Process.setCanSelfBackground(false);
476 Looper.prepareMainLooper();
Makoto Onuki712886f2018-04-27 15:22:50 -0700477 Looper.getMainLooper().setSlowLogThresholdMs(
478 SLOW_DISPATCH_THRESHOLD_MS, SLOW_DELIVERY_THRESHOLD_MS);
Jeff Brown6f357d32014-01-15 20:40:55 -0800479
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900480 // Initialize native services.
481 System.loadLibrary("android_servers");
Jeff Brown6f357d32014-01-15 20:40:55 -0800482
Ryan Savitskicfdc1512018-12-14 16:20:52 +0000483 // Debug builds - allow heap profiling.
484 if (Build.IS_DEBUGGABLE) {
485 initZygoteChildHeapProfiling();
486 }
487
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900488 // Check whether we failed to shut down last time we tried.
489 // This call may not return.
490 performPendingShutdown();
Jeff Brown6f357d32014-01-15 20:40:55 -0800491
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900492 // Initialize the system context.
493 createSystemContext();
Jeff Brown6f357d32014-01-15 20:40:55 -0800494
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900495 // Create the system service manager.
496 mSystemServiceManager = new SystemServiceManager(mSystemContext);
Makoto Onukie8edbcf2018-03-02 16:49:29 -0800497 mSystemServiceManager.setStartInfo(mRuntimeRestart,
498 mRuntimeStartElapsedTime, mRuntimeStartUptime);
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900499 LocalServices.addService(SystemServiceManager.class, mSystemServiceManager);
Fyodor Kupolove29a5a12016-12-16 16:14:17 -0800500 // Prepare the thread pool for init tasks that can be parallelized
Felipe Leme29f1ae92019-10-03 15:38:43 -0700501 SystemServerInitThreadPool.start();
David Sehr1a885392019-11-27 16:24:06 -0800502 // Attach JVMTI agent if this is a debuggable build and the system property is set.
503 if (Build.IS_DEBUGGABLE) {
504 // Property is of the form "library_path=parameters".
505 String jvmtiAgent = SystemProperties.get("persist.sys.dalvik.jvmtiagent");
506 if (!jvmtiAgent.isEmpty()) {
507 int equalIndex = jvmtiAgent.indexOf('=');
508 String libraryPath = jvmtiAgent.substring(0, equalIndex);
509 String parameterList =
510 jvmtiAgent.substring(equalIndex + 1, jvmtiAgent.length());
511 // Attach the agent.
512 try {
513 Debug.attachJvmtiAgent(libraryPath, parameterList, null);
514 } catch (Exception e) {
515 Slog.e("System", "*************************************************");
516 Slog.e("System", "********** Failed to load jvmti plugin: " + jvmtiAgent);
517 }
518 }
519 }
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900520 } finally {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700521 t.traceEnd(); // InitBeforeStartServices
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900522 }
Jeff Brown6f357d32014-01-15 20:40:55 -0800523
524 // Start services.
525 try {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700526 t.traceBegin("StartServices");
527 startBootstrapServices(t);
528 startCoreServices(t);
529 startOtherServices(t);
Fyodor Kupolovcd824ef2017-02-07 11:25:14 -0800530 SystemServerInitThreadPool.shutdown();
Jeff Brown2c43c332014-06-12 22:38:59 -0700531 } catch (Throwable ex) {
Jeff Brown6f357d32014-01-15 20:40:55 -0800532 Slog.e("System", "******************************************");
533 Slog.e("System", "************ Failure starting system services", ex);
534 throw ex;
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900535 } finally {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700536 t.traceEnd(); // StartServices
Jeff Brown6f357d32014-01-15 20:40:55 -0800537 }
538
Jeff Sharkey89182982017-11-01 19:02:56 -0600539 StrictMode.initVmDefaults(null);
540
Fyodor Kupolov4ba91b92017-01-20 18:12:35 -0800541 if (!mRuntimeRestart && !isFirstBootOrUpgrade()) {
Fyodor Kupolov24e12dc2017-01-17 12:20:36 -0800542 int uptimeMillis = (int) SystemClock.elapsedRealtime();
543 MetricsLogger.histogram(null, "boot_system_server_ready", uptimeMillis);
544 final int MAX_UPTIME_MILLIS = 60 * 1000;
545 if (uptimeMillis > MAX_UPTIME_MILLIS) {
Keun-young Park9b73a542017-02-01 12:09:58 -0800546 Slog.wtf(SYSTEM_SERVER_TIMING_TAG,
Fyodor Kupolov24e12dc2017-01-17 12:20:36 -0800547 "SystemServer init took too long. uptimeMillis=" + uptimeMillis);
548 }
Fyodor Kupolov6733e6c2017-01-06 18:27:05 -0800549 }
Jeff Brown6f357d32014-01-15 20:40:55 -0800550
Andreas Gampee697a4f2018-10-09 10:40:52 -0700551 // Diagnostic to ensure that the system is in a base healthy state. Done here as a common
552 // non-zygote process.
553 if (!VMRuntime.hasBootImageSpaces()) {
554 Slog.wtf(TAG, "Runtime is not running with a boot image!");
555 }
556
Jeff Brown6f357d32014-01-15 20:40:55 -0800557 // Loop forever.
558 Looper.loop();
559 throw new RuntimeException("Main thread loop unexpectedly exited");
560 }
561
Fyodor Kupolov4ba91b92017-01-20 18:12:35 -0800562 private boolean isFirstBootOrUpgrade() {
Svet Ganovd8eb8b22019-04-05 18:52:08 -0700563 return mPackageManagerService.isFirstBoot() || mPackageManagerService.isDeviceUpgrading();
Fyodor Kupolov4ba91b92017-01-20 18:12:35 -0800564 }
565
Jeff Brown6f357d32014-01-15 20:40:55 -0800566 private void reportWtf(String msg, Throwable e) {
Dianne Hackborn661cd522011-08-22 00:26:20 -0700567 Slog.w(TAG, "***********************************************");
Dianne Hackborn8d051722014-10-01 14:59:58 -0700568 Slog.wtf(TAG, "BOOT FAILURE " + msg, e);
Dianne Hackborn661cd522011-08-22 00:26:20 -0700569 }
570
Jeff Brown6f357d32014-01-15 20:40:55 -0800571 private void performPendingShutdown() {
572 final String shutdownAction = SystemProperties.get(
573 ShutdownThread.SHUTDOWN_ACTION_PROPERTY, "");
574 if (shutdownAction != null && shutdownAction.length() > 0) {
575 boolean reboot = (shutdownAction.charAt(0) == '1');
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800576
Jeff Brown6f357d32014-01-15 20:40:55 -0800577 final String reason;
578 if (shutdownAction.length() > 1) {
579 reason = shutdownAction.substring(1, shutdownAction.length());
580 } else {
581 reason = null;
Kenny Rootf547d672010-09-22 10:36:48 -0700582 }
Jeff Brown6f357d32014-01-15 20:40:55 -0800583
Tao Bao4fd6c262016-01-19 14:22:24 -0800584 // If it's a pending reboot into recovery to apply an update,
585 // always make sure uncrypt gets executed properly when needed.
586 // If '/cache/recovery/block.map' hasn't been created, stop the
587 // reboot which will fail for sure, and get a chance to capture a
Tao Baoe8a403d2015-12-31 07:44:55 -0800588 // bugreport when that's still feasible. (Bug: 26444951)
Tianjie Xu3a66fc42017-06-09 15:50:14 -0700589 if (reason != null && reason.startsWith(PowerManager.REBOOT_RECOVERY_UPDATE)) {
Tao Bao4fd6c262016-01-19 14:22:24 -0800590 File packageFile = new File(UNCRYPT_PACKAGE_FILE);
591 if (packageFile.exists()) {
592 String filename = null;
593 try {
594 filename = FileUtils.readTextFile(packageFile, 0, null);
595 } catch (IOException e) {
596 Slog.e(TAG, "Error reading uncrypt package file", e);
597 }
598
599 if (filename != null && filename.startsWith("/data")) {
600 if (!new File(BLOCK_MAP_FILE).exists()) {
601 Slog.e(TAG, "Can't find block map file, uncrypt failed or " +
Christine Franksea7d71b2018-07-03 14:46:07 -0700602 "unexpected runtime restart?");
Tao Bao4fd6c262016-01-19 14:22:24 -0800603 return;
604 }
605 }
606 }
607 }
Alison Cichowlasf0afd8c2017-07-31 11:24:34 -0400608 Runnable runnable = new Runnable() {
609 @Override
610 public void run() {
611 synchronized (this) {
612 ShutdownThread.rebootOrShutdown(null, reboot, reason);
613 }
614 }
615 };
616
617 // ShutdownThread must run on a looper capable of displaying the UI.
618 Message msg = Message.obtain(UiThread.getHandler(), runnable);
619 msg.setAsynchronous(true);
620 UiThread.getHandler().sendMessage(msg);
621
Kenny Rootf547d672010-09-22 10:36:48 -0700622 }
Jeff Brown6f357d32014-01-15 20:40:55 -0800623 }
Kenny Rootf547d672010-09-22 10:36:48 -0700624
Jeff Brown6f357d32014-01-15 20:40:55 -0800625 private void createSystemContext() {
626 ActivityThread activityThread = ActivityThread.systemMain();
627 mSystemContext = activityThread.getSystemContext();
Alan Viveretteba398ea2015-12-16 15:28:23 -0500628 mSystemContext.setTheme(DEFAULT_SYSTEM_THEME);
Adam Lesinskia82b6262017-03-21 16:56:17 -0700629
630 final Context systemUiContext = activityThread.getSystemUiContext();
631 systemUiContext.setTheme(DEFAULT_SYSTEM_THEME);
Jeff Brown6f357d32014-01-15 20:40:55 -0800632 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800633
Jeff Brown2c43c332014-06-12 22:38:59 -0700634 /**
Christine Franksea7d71b2018-07-03 14:46:07 -0700635 * Starts the small tangle of critical services that are needed to get the system off the
636 * ground. These services have complex mutual dependencies which is why we initialize them all
637 * in one place here. Unless your service is also entwined in these dependencies, it should be
638 * initialized in one of the other functions.
Jeff Brown2c43c332014-06-12 22:38:59 -0700639 */
Felipe Leme3aad1be2019-05-31 11:43:12 -0700640 private void startBootstrapServices(@NonNull TimingsTraceAndSlog t) {
Felipe Leme137e7812019-06-10 11:38:05 -0700641 t.traceBegin("startBootstrapServices");
642
Zimuzob065b152019-04-16 13:33:01 +0100643 // Start the watchdog as early as possible so we can crash the system server
644 // if we deadlock during early boot
Felipe Leme3aad1be2019-05-31 11:43:12 -0700645 t.traceBegin("StartWatchdog");
Zimuzob065b152019-04-16 13:33:01 +0100646 final Watchdog watchdog = Watchdog.getInstance();
647 watchdog.start();
Felipe Leme3aad1be2019-05-31 11:43:12 -0700648 t.traceEnd();
Zimuzob065b152019-04-16 13:33:01 +0100649
Fyodor Kupolovb76e0fd2017-01-30 13:28:25 -0800650 Slog.i(TAG, "Reading configuration...");
651 final String TAG_SYSTEM_CONFIG = "ReadingSystemConfig";
Felipe Leme3aad1be2019-05-31 11:43:12 -0700652 t.traceBegin(TAG_SYSTEM_CONFIG);
Felipe Lemeb68b7692019-10-09 10:43:03 -0700653 SystemServerInitThreadPool.submit(SystemConfig::getInstance, TAG_SYSTEM_CONFIG);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700654 t.traceEnd();
Fyodor Kupolovb76e0fd2017-01-30 13:28:25 -0800655
atrostde54a8ac2019-08-15 16:53:01 +0100656 // Platform compat service is used by ActivityManagerService, PackageManagerService, and
657 // possibly others in the future. b/135010838.
658 t.traceBegin("PlatformCompat");
atrost87488352019-10-10 19:27:31 +0100659 PlatformCompat platformCompat = new PlatformCompat(mSystemContext);
660 ServiceManager.addService(Context.PLATFORM_COMPAT_SERVICE, platformCompat);
661 ServiceManager.addService(Context.PLATFORM_COMPAT_NATIVE_SERVICE,
662 new PlatformCompatNative(platformCompat));
Andrei Oneaf965d152019-10-30 18:08:24 +0000663 AppCompatCallbacks.install(new long[0]);
atrostde54a8ac2019-08-15 16:53:01 +0100664 t.traceEnd();
665
Jeff Brown6f357d32014-01-15 20:40:55 -0800666 // Wait for installd to finish starting up so that it has a chance to
667 // create critical directories such as /data/user with the appropriate
668 // permissions. We need this to complete before we initialize other services.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700669 t.traceBegin("StartInstaller");
Narayan Kamath76a748e2014-11-10 14:23:41 +0000670 Installer installer = mSystemServiceManager.startService(Installer.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700671 t.traceEnd();
Jeff Brown6f357d32014-01-15 20:40:55 -0800672
Svet Ganov37e43272016-09-09 16:01:32 -0700673 // In some cases after launching an app we need to access device identifiers,
674 // therefore register the device identifier policy before the activity manager.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700675 t.traceBegin("DeviceIdentifiersPolicyService");
Svet Ganov37e43272016-09-09 16:01:32 -0700676 mSystemServiceManager.startService(DeviceIdentifiersPolicyService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700677 t.traceEnd();
Svet Ganov37e43272016-09-09 16:01:32 -0700678
Wale Ogunwale6d50dcc2018-07-21 23:00:40 -0700679 // Uri Grants Manager.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700680 t.traceBegin("UriGrantsManagerService");
Wale Ogunwale6d50dcc2018-07-21 23:00:40 -0700681 mSystemServiceManager.startService(UriGrantsManagerService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700682 t.traceEnd();
Wale Ogunwale6d50dcc2018-07-21 23:00:40 -0700683
Jeff Brown6f357d32014-01-15 20:40:55 -0800684 // Activity manager runs the show.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700685 t.traceBegin("StartActivityManager");
Wale Ogunwale16e505a2018-05-07 15:00:49 -0700686 // TODO: Might need to move after migration to WM.
687 ActivityTaskManagerService atm = mSystemServiceManager.startService(
688 ActivityTaskManagerService.Lifecycle.class).getService();
Wale Ogunwale9e4f3e02018-05-17 09:35:39 -0700689 mActivityManagerService = ActivityManagerService.Lifecycle.startService(
690 mSystemServiceManager, atm);
Dianne Hackborn91097de2014-04-04 18:02:06 -0700691 mActivityManagerService.setSystemServiceManager(mSystemServiceManager);
Narayan Kamath76a748e2014-11-10 14:23:41 +0000692 mActivityManagerService.setInstaller(installer);
Wale Ogunwale1f5e53d2018-11-05 05:12:46 -0800693 mWindowManagerGlobalLock = atm.getGlobalLock();
Felipe Leme3aad1be2019-05-31 11:43:12 -0700694 t.traceEnd();
Jeff Brown4ccb8232014-01-16 22:16:42 -0800695
Jeff Brown2c43c332014-06-12 22:38:59 -0700696 // Power manager needs to be started early because other services need it.
697 // Native daemons may be watching for it to be registered so it must be ready
698 // to handle incoming binder calls immediately (including being able to verify
699 // the permissions for those calls).
Felipe Leme3aad1be2019-05-31 11:43:12 -0700700 t.traceBegin("StartPowerManager");
Jeff Brown2c43c332014-06-12 22:38:59 -0700701 mPowerManagerService = mSystemServiceManager.startService(PowerManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700702 t.traceEnd();
Jeff Brown2c43c332014-06-12 22:38:59 -0700703
Felipe Leme3aad1be2019-05-31 11:43:12 -0700704 t.traceBegin("StartThermalManager");
Wei Wangbad7c202018-11-01 11:57:39 -0700705 mSystemServiceManager.startService(ThermalManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700706 t.traceEnd();
Wei Wangbad7c202018-11-01 11:57:39 -0700707
Jeff Brown2c43c332014-06-12 22:38:59 -0700708 // Now that the power manager has been started, let the activity manager
709 // initialize power management features.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700710 t.traceBegin("InitPowerManagement");
Jeff Brown2c43c332014-06-12 22:38:59 -0700711 mActivityManagerService.initPowerManagement();
Felipe Leme3aad1be2019-05-31 11:43:12 -0700712 t.traceEnd();
Jeff Brown2c43c332014-06-12 22:38:59 -0700713
Jeff Sharkeyfe6f85c2017-01-20 10:42:57 -0700714 // Bring up recovery system in case a rescue party needs a reboot
Felipe Leme3aad1be2019-05-31 11:43:12 -0700715 t.traceBegin("StartRecoverySystemService");
Kenny Root96690bc2019-11-15 10:20:59 -0800716 mSystemServiceManager.startService(RecoverySystemService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700717 t.traceEnd();
Jeff Sharkeyfe6f85c2017-01-20 10:42:57 -0700718
719 // Now that we have the bare essentials of the OS up and running, take
720 // note that we just booted, which might send out a rescue party if
721 // we're stuck in a runtime restart loop.
722 RescueParty.noteBoot(mSystemContext);
723
Jeff Brown5d6443b2015-04-10 20:15:01 -0700724 // Manages LEDs and display backlight so we need it to bring up the display.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700725 t.traceBegin("StartLightsService");
Jeff Brown5d6443b2015-04-10 20:15:01 -0700726 mSystemServiceManager.startService(LightsService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700727 t.traceEnd();
Jeff Brown5d6443b2015-04-10 20:15:01 -0700728
Felipe Leme3aad1be2019-05-31 11:43:12 -0700729 t.traceBegin("StartSidekickService");
Chris Phoenixbc839a32017-10-21 14:46:15 -0700730 // Package manager isn't started yet; need to use SysProp not hardware feature
731 if (SystemProperties.getBoolean("config.enable_sidekick_graphics", false)) {
732 mSystemServiceManager.startService(WEAR_SIDEKICK_SERVICE_CLASS);
733 }
Felipe Leme3aad1be2019-05-31 11:43:12 -0700734 t.traceEnd();
Chris Phoenixbc839a32017-10-21 14:46:15 -0700735
Jeff Brown4ccb8232014-01-16 22:16:42 -0800736 // Display manager is needed to provide display metrics before package manager
737 // starts up.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700738 t.traceBegin("StartDisplayManager");
Jeff Brown4ccb8232014-01-16 22:16:42 -0800739 mDisplayManagerService = mSystemServiceManager.startService(DisplayManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700740 t.traceEnd();
Jeff Brown2c43c332014-06-12 22:38:59 -0700741
742 // We need the default display before we can initialize the package manager.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700743 t.traceBegin("WaitForDisplay");
Felipe Leme137e7812019-06-10 11:38:05 -0700744 mSystemServiceManager.startBootPhase(t, SystemService.PHASE_WAIT_FOR_DEFAULT_DISPLAY);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700745 t.traceEnd();
Jeff Brown2c43c332014-06-12 22:38:59 -0700746
747 // Only run "core" apps if we're encrypting the device.
Inseob Kimc1246e62018-11-08 13:13:54 +0900748 String cryptState = VoldProperties.decrypt().orElse("");
Jeff Brown2c43c332014-06-12 22:38:59 -0700749 if (ENCRYPTING_STATE.equals(cryptState)) {
750 Slog.w(TAG, "Detected encryption in progress - only parsing core apps");
751 mOnlyCore = true;
752 } else if (ENCRYPTED_STATE.equals(cryptState)) {
753 Slog.w(TAG, "Device encrypted - only parsing core apps");
754 mOnlyCore = true;
755 }
756
757 // Start the package manager.
Fyodor Kupolov6733e6c2017-01-06 18:27:05 -0800758 if (!mRuntimeRestart) {
759 MetricsLogger.histogram(null, "boot_package_manager_init_start",
760 (int) SystemClock.elapsedRealtime());
761 }
Zimuzoe5cc6ab2019-06-14 11:47:45 +0100762
Felipe Leme3aad1be2019-05-31 11:43:12 -0700763 t.traceBegin("StartPackageManagerService");
Zimuzoe5cc6ab2019-06-14 11:47:45 +0100764 try {
765 Watchdog.getInstance().pauseWatchingCurrentThread("packagemanagermain");
766 mPackageManagerService = PackageManagerService.main(mSystemContext, installer,
767 mFactoryTestMode != FactoryTest.FACTORY_TEST_OFF, mOnlyCore);
768 } finally {
769 Watchdog.getInstance().resumeWatchingCurrentThread("packagemanagermain");
770 }
771
Jeff Brown2c43c332014-06-12 22:38:59 -0700772 mFirstBoot = mPackageManagerService.isFirstBoot();
773 mPackageManager = mSystemContext.getPackageManager();
Felipe Leme3aad1be2019-05-31 11:43:12 -0700774 t.traceEnd();
Fyodor Kupolov4ba91b92017-01-20 18:12:35 -0800775 if (!mRuntimeRestart && !isFirstBootOrUpgrade()) {
Fyodor Kupolov6733e6c2017-01-06 18:27:05 -0800776 MetricsLogger.histogram(null, "boot_package_manager_init_ready",
777 (int) SystemClock.elapsedRealtime());
778 }
Andreas Gampeabcbe2f2016-02-26 11:25:36 -0800779 // Manages A/B OTA dexopting. This is a bootstrap service as we need it to rename
780 // A/B artifacts after boot, before anything else might touch/need them.
781 // Note: this isn't needed during decryption (we don't have /data anyways).
782 if (!mOnlyCore) {
783 boolean disableOtaDexopt = SystemProperties.getBoolean("config.disable_otadexopt",
784 false);
785 if (!disableOtaDexopt) {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700786 t.traceBegin("StartOtaDexOptService");
Andreas Gampeabcbe2f2016-02-26 11:25:36 -0800787 try {
Zimuzof3c46142019-05-31 12:46:12 +0100788 Watchdog.getInstance().pauseWatchingCurrentThread("moveab");
Andreas Gampeabcbe2f2016-02-26 11:25:36 -0800789 OtaDexoptService.main(mSystemContext, mPackageManagerService);
790 } catch (Throwable e) {
791 reportWtf("starting OtaDexOptService", e);
792 } finally {
Zimuzof3c46142019-05-31 12:46:12 +0100793 Watchdog.getInstance().resumeWatchingCurrentThread("moveab");
Felipe Leme3aad1be2019-05-31 11:43:12 -0700794 t.traceEnd();
Andreas Gampeabcbe2f2016-02-26 11:25:36 -0800795 }
796 }
797 }
798
Felipe Leme3aad1be2019-05-31 11:43:12 -0700799 t.traceBegin("StartUserManagerService");
Amith Yamasanid04aaa32016-06-13 12:09:36 -0700800 mSystemServiceManager.startService(UserManagerService.LifeCycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700801 t.traceEnd();
Adam Lesinski3c153512014-07-23 17:34:34 -0700802
Jeff Brown2c43c332014-06-12 22:38:59 -0700803 // Initialize attribute cache used to cache resources from packages.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700804 t.traceBegin("InitAttributerCache");
Jeff Brown2c43c332014-06-12 22:38:59 -0700805 AttributeCache.init(mSystemContext);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700806 t.traceEnd();
Jeff Brown2c43c332014-06-12 22:38:59 -0700807
808 // Set up the Application instance for the system process and get started.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700809 t.traceBegin("SetSystemProcess");
Jeff Brown2c43c332014-06-12 22:38:59 -0700810 mActivityManagerService.setSystemProcess();
Felipe Leme3aad1be2019-05-31 11:43:12 -0700811 t.traceEnd();
Svet Ganovb9d71a62015-04-30 10:38:13 -0700812
Zimuzob065b152019-04-16 13:33:01 +0100813 // Complete the watchdog setup with an ActivityManager instance and listen for reboots
814 // Do this only after the ActivityManagerService is properly started as a system process
Felipe Leme3aad1be2019-05-31 11:43:12 -0700815 t.traceBegin("InitWatchdog");
Zimuzob065b152019-04-16 13:33:01 +0100816 watchdog.init(mSystemContext, mActivityManagerService);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700817 t.traceEnd();
Zimuzob065b152019-04-16 13:33:01 +0100818
Joel Fernandes2d314e12017-04-04 16:32:15 -0700819 // DisplayManagerService needs to setup android.display scheduling related policies
820 // since setSystemProcess() would have overridden policies due to setProcessGroup
821 mDisplayManagerService.setupSchedulerPolicies();
822
MÃ¥rten Kongstad2e0d0f32016-06-02 09:35:31 +0200823 // Manages Overlay packages
Felipe Leme3aad1be2019-05-31 11:43:12 -0700824 t.traceBegin("StartOverlayManagerService");
MÃ¥rten Kongstad77b53b22019-10-01 08:29:21 +0200825 mSystemServiceManager.startService(new OverlayManagerService(mSystemContext));
Felipe Leme3aad1be2019-05-31 11:43:12 -0700826 t.traceEnd();
MÃ¥rten Kongstad2e0d0f32016-06-02 09:35:31 +0200827
Felipe Leme3aad1be2019-05-31 11:43:12 -0700828 t.traceBegin("StartSensorPrivacyService");
Chad Brubaker90f391f2018-10-19 10:26:19 -0700829 mSystemServiceManager.startService(new SensorPrivacyService(mSystemContext));
Felipe Leme3aad1be2019-05-31 11:43:12 -0700830 t.traceEnd();
Chad Brubaker90f391f2018-10-19 10:26:19 -0700831
Winson72dbe7e2019-04-29 14:55:30 -0700832 if (SystemProperties.getInt("persist.sys.displayinset.top", 0) > 0) {
833 // DisplayManager needs the overlay immediately.
834 mActivityManagerService.updateSystemUiContext();
835 LocalServices.getService(DisplayManagerInternal.class).onOverlayChanged();
836 }
837
Svet Ganovb9d71a62015-04-30 10:38:13 -0700838 // The sensor service needs access to package manager service, app ops
839 // service, and permissions service, therefore we start it after them.
Keun-young Park9b73a542017-02-01 12:09:58 -0800840 // Start sensor service in a separate thread. Completion should be checked
841 // before using it.
Felipe Lemeb68b7692019-10-09 10:43:03 -0700842 mSensorServiceStart = SystemServerInitThreadPool.submit(() -> {
Felipe Leme137e7812019-06-10 11:38:05 -0700843 TimingsTraceAndSlog traceLog = TimingsTraceAndSlog.newAsyncLog();
Keun-young Park9b73a542017-02-01 12:09:58 -0800844 traceLog.traceBegin(START_SENSOR_SERVICE);
845 startSensorService();
846 traceLog.traceEnd();
847 }, START_SENSOR_SERVICE);
Felipe Leme137e7812019-06-10 11:38:05 -0700848
849 t.traceEnd(); // startBootstrapServices
Jeff Brown6f357d32014-01-15 20:40:55 -0800850 }
851
Jeff Brown2c43c332014-06-12 22:38:59 -0700852 /**
853 * Starts some essential services that are not tangled up in the bootstrap process.
854 */
Felipe Leme3aad1be2019-05-31 11:43:12 -0700855 private void startCoreServices(@NonNull TimingsTraceAndSlog t) {
Felipe Leme137e7812019-06-10 11:38:05 -0700856 t.traceBegin("startCoreServices");
857
Felipe Leme3aad1be2019-05-31 11:43:12 -0700858 t.traceBegin("StartBatteryService");
Jeff Brown21392762014-06-13 19:00:36 -0700859 // Tracks the battery level. Requires LightService.
860 mSystemServiceManager.startService(BatteryService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700861 t.traceEnd();
Adam Lesinski0debc9a2014-07-16 19:09:13 -0700862
863 // Tracks application usage stats.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700864 t.traceBegin("StartUsageService");
Adam Lesinski0debc9a2014-07-16 19:09:13 -0700865 mSystemServiceManager.startService(UsageStatsService.class);
866 mActivityManagerService.setUsageStatsManager(
867 LocalServices.getService(UsageStatsManagerInternal.class));
Felipe Leme3aad1be2019-05-31 11:43:12 -0700868 t.traceEnd();
Torne (Richard Coles)4dbeb352014-07-29 19:14:24 +0100869
870 // Tracks whether the updatable WebView is in a ready state and watches for update installs.
Torne (Richard Coles)ff937ac2017-10-02 17:09:32 -0400871 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_WEBVIEW)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700872 t.traceBegin("StartWebViewUpdateService");
Torne (Richard Coles)ff937ac2017-10-02 17:09:32 -0400873 mWebViewUpdateService = mSystemServiceManager.startService(WebViewUpdateService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700874 t.traceEnd();
Torne (Richard Coles)ff937ac2017-10-02 17:09:32 -0400875 }
Fyodor Kupolovca348512018-01-10 18:05:53 -0800876
Marcin Oczeretkoc80c81a2018-08-30 20:15:52 +0100877 // Tracks and caches the device state.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700878 t.traceBegin("StartCachedDeviceStateService");
Marcin Oczeretkoc80c81a2018-08-30 20:15:52 +0100879 mSystemServiceManager.startService(CachedDeviceStateService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700880 t.traceEnd();
Marcin Oczeretkoc80c81a2018-08-30 20:15:52 +0100881
Fyodor Kupolovca348512018-01-10 18:05:53 -0800882 // Tracks cpu time spent in binder calls
Felipe Leme3aad1be2019-05-31 11:43:12 -0700883 t.traceBegin("StartBinderCallsStatsService");
Olivier Gaillard1d7f6152018-07-03 13:57:58 +0100884 mSystemServiceManager.startService(BinderCallsStatsService.LifeCycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700885 t.traceEnd();
Marcin Oczeretkod8cc8592018-08-22 16:07:36 +0100886
887 // Tracks time spent in handling messages in handlers.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700888 t.traceBegin("StartLooperStatsService");
Marcin Oczeretkod8cc8592018-08-22 16:07:36 +0100889 mSystemServiceManager.startService(LooperStatsService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700890 t.traceEnd();
Richard Uhlerb29f1452018-09-12 16:38:15 +0100891
892 // Manages apk rollbacks.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700893 t.traceBegin("StartRollbackManagerService");
Richard Uhlere95d0552018-12-27 15:03:41 +0000894 mSystemServiceManager.startService(RollbackManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700895 t.traceEnd();
Nandana Duttd11850c2018-12-12 17:26:57 +0000896
897 // Service to capture bugreports.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700898 t.traceBegin("StartBugreportManagerService");
Nandana Duttd11850c2018-12-12 17:26:57 +0000899 mSystemServiceManager.startService(BugreportManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700900 t.traceEnd();
Peiyong Linfd71c202019-01-23 15:29:59 -0800901
902 // Serivce for GPU and GPU driver.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700903 t.traceBegin("GpuService");
Peiyong Linfd71c202019-01-23 15:29:59 -0800904 mSystemServiceManager.startService(GpuService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700905 t.traceEnd();
Felipe Leme137e7812019-06-10 11:38:05 -0700906
907 t.traceEnd(); // startCoreServices
Jeff Brown2c43c332014-06-12 22:38:59 -0700908 }
909
910 /**
Christine Franksea7d71b2018-07-03 14:46:07 -0700911 * Starts a miscellaneous grab bag of stuff that has yet to be refactored and organized.
Jeff Brown2c43c332014-06-12 22:38:59 -0700912 */
Felipe Leme3aad1be2019-05-31 11:43:12 -0700913 private void startOtherServices(@NonNull TimingsTraceAndSlog t) {
Felipe Leme137e7812019-06-10 11:38:05 -0700914 t.traceBegin("startOtherServices");
915
Jeff Brown6f357d32014-01-15 20:40:55 -0800916 final Context context = mSystemContext;
Jeff Brown7f6c2312012-04-13 20:38:38 -0700917 VibratorService vibrator = null;
Po-Chien Hsueh4e908c22019-03-07 11:57:17 +0800918 DynamicSystemService dynamicSystem = null;
Sudheer Shanka2250d562016-11-07 15:41:02 -0800919 IStorageManager storageManager = null;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700920 NetworkManagementService networkManagement = null;
Nathan Haroldb7282172017-09-11 19:50:19 -0700921 IpSecService ipSecService = null;
Jeff Sharkey75279902011-05-24 18:39:45 -0700922 NetworkStatsService networkStats = null;
Jeff Sharkeya4620792011-05-20 15:29:23 -0700923 NetworkPolicyManagerService networkPolicy = null;
Mike Lockwood0f79b542009-08-14 14:18:49 -0400924 ConnectivityService connectivity = null;
Christine Franksea7d71b2018-07-03 14:46:07 -0700925 NsdService serviceDiscovery = null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800926 WindowManagerService wm = null;
Mike Lockwoodb01e8bf2011-08-29 20:11:07 -0400927 SerialService serial = null;
Amith Yamasani6734b9f2010-09-13 16:24:08 -0700928 NetworkTimeUpdateService networkTimeUpdater = null;
Jeff Brown6ec6f792012-04-17 16:52:41 -0700929 InputManagerService inputManager = null;
Wink Savillea12a7b32012-09-20 10:09:45 -0700930 TelephonyRegistry telephonyRegistry = null;
Erik Gilling51e95df2013-06-26 11:06:51 -0700931 ConsumerIrService consumerIr = null;
Ye Wend97e1fd2014-07-24 12:56:45 -0700932 MmsServiceBroker mmsService = null;
Polina Bondarenkof8754ac2016-02-12 20:38:23 +0100933 HardwarePropertiesManagerService hardwarePropertiesService = null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800934
Abodunrinwa Tokid32906c2018-01-18 04:34:44 -0800935 boolean disableSystemTextClassifier = SystemProperties.getBoolean(
936 "config.disable_systemtextclassifier", false);
Felipe Leme29397ce2018-11-16 17:30:36 -0800937
Steve Paik117fcb02018-09-13 09:43:54 -0700938 boolean disableNetworkTime = SystemProperties.getBoolean("config.disable_networktime",
939 false);
Ivan Podogov8adaec02016-09-14 18:14:31 +0100940 boolean disableCameraService = SystemProperties.getBoolean("config.disable_cameraservice",
941 false);
Ivan Podogovf9973822017-05-11 15:51:34 +0100942 boolean enableLeftyService = SystemProperties.getBoolean("config.enable_lefty", false);
Wei Liu09de4192016-09-07 13:33:49 -0700943
Colin Cross039deed2017-02-18 20:05:47 +0000944 boolean isEmulator = SystemProperties.get("ro.kernel.qemu").equals("1");
945
Erik Wolsheimer640734f2018-01-29 13:57:44 -0800946 boolean isWatch = context.getPackageManager().hasSystemFeature(
947 PackageManager.FEATURE_WATCH);
948
paulhsia0a1b3222018-11-08 18:15:46 +0800949 boolean isArc = context.getPackageManager().hasSystemFeature(
950 "org.chromium.arc");
951
Rick Yiub2875922018-09-12 11:07:25 +0000952 boolean enableVrService = context.getPackageManager().hasSystemFeature(
953 PackageManager.FEATURE_VR_MODE_HIGH_PERFORMANCE);
954
Jeff Sharkeyfe6f85c2017-01-20 10:42:57 -0700955 // For debugging RescueParty
956 if (Build.IS_DEBUGGABLE && SystemProperties.getBoolean("debug.crash_system", false)) {
957 throw new RuntimeException();
958 }
959
Dan Morrille4d9a012013-03-28 18:10:43 -0700960 try {
Narayan Kamath97780462017-02-06 20:24:08 +0000961 final String SECONDARY_ZYGOTE_PRELOAD = "SecondaryZygotePreload";
962 // We start the preload ~1s before the webview factory preparation, to
963 // ensure that it completes before the 32 bit relro process is forked
964 // from the zygote. In the event that it takes too long, the webview
965 // RELRO process will block, but it will do so without holding any locks.
Felipe Lemeb68b7692019-10-09 10:43:03 -0700966 mZygotePreload = SystemServerInitThreadPool.submit(() -> {
Narayan Kamath97780462017-02-06 20:24:08 +0000967 try {
968 Slog.i(TAG, SECONDARY_ZYGOTE_PRELOAD);
Felipe Leme137e7812019-06-10 11:38:05 -0700969 TimingsTraceAndSlog traceLog = TimingsTraceAndSlog.newAsyncLog();
Narayan Kamath97780462017-02-06 20:24:08 +0000970 traceLog.traceBegin(SECONDARY_ZYGOTE_PRELOAD);
Chris Wailesefce9292019-01-11 13:19:20 -0800971 if (!Process.ZYGOTE_PROCESS.preloadDefault(Build.SUPPORTED_32_BIT_ABIS[0])) {
Narayan Kamath97780462017-02-06 20:24:08 +0000972 Slog.e(TAG, "Unable to preload default resources");
973 }
974 traceLog.traceEnd();
975 } catch (Exception ex) {
976 Slog.e(TAG, "Exception preloading default resources", ex);
977 }
978 }, SECONDARY_ZYGOTE_PRELOAD);
979
Felipe Leme3aad1be2019-05-31 11:43:12 -0700980 t.traceBegin("StartKeyAttestationApplicationIdProviderService");
Janis Danisevskis8ff1e192016-06-03 11:31:55 -0700981 ServiceManager.addService("sec_key_att_app_id_provider",
982 new KeyAttestationApplicationIdProviderService(context));
Felipe Leme3aad1be2019-05-31 11:43:12 -0700983 t.traceEnd();
Janis Danisevskis8ff1e192016-06-03 11:31:55 -0700984
Felipe Leme3aad1be2019-05-31 11:43:12 -0700985 t.traceBegin("StartKeyChainSystemService");
Robin Lee13935492017-03-23 15:28:37 +0000986 mSystemServiceManager.startService(KeyChainSystemService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700987 t.traceEnd();
Robin Lee13935492017-03-23 15:28:37 +0000988
Felipe Leme3aad1be2019-05-31 11:43:12 -0700989 t.traceBegin("StartSchedulingPolicyService");
Dianne Hackborn35f72be2013-09-16 10:57:39 -0700990 ServiceManager.addService("scheduling_policy", new SchedulingPolicyService());
Felipe Leme3aad1be2019-05-31 11:43:12 -0700991 t.traceEnd();
Glenn Kasten07b04652012-04-23 15:00:43 -0700992
Felipe Leme3aad1be2019-05-31 11:43:12 -0700993 t.traceBegin("StartTelecomLoaderService");
Santos Cordon5d2c1e62014-11-21 15:20:15 -0800994 mSystemServiceManager.startService(TelecomLoaderService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700995 t.traceEnd();
Santos Cordon5d2c1e62014-11-21 15:20:15 -0800996
Felipe Leme3aad1be2019-05-31 11:43:12 -0700997 t.traceBegin("StartTelephonyRegistry");
Jeff Brown2c43c332014-06-12 22:38:59 -0700998 telephonyRegistry = new TelephonyRegistry(context);
999 ServiceManager.addService("telephony.registry", telephonyRegistry);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001000 t.traceEnd();
Svetoslavb3038ec2013-02-13 14:39:30 -08001001
Felipe Leme3aad1be2019-05-31 11:43:12 -07001002 t.traceBegin("StartEntropyMixer");
Jeff Sharkey1cab76a2016-04-12 18:23:31 -06001003 mEntropyMixer = new EntropyMixer(context);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001004 t.traceEnd();
Nick Kralevich79619dd2013-03-04 13:05:32 -08001005
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001006 mContentResolver = context.getContentResolver();
1007
Fred Quintanae91ebe22009-09-29 20:44:30 -07001008 // The AccountManager must come before the ContentService
Felipe Leme3aad1be2019-05-31 11:43:12 -07001009 t.traceBegin("StartAccountManagerService");
Jeff Sharkey1cab76a2016-04-12 18:23:31 -06001010 mSystemServiceManager.startService(ACCOUNT_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001011 t.traceEnd();
Fred Quintana60307342009-03-24 22:48:12 -07001012
Felipe Leme3aad1be2019-05-31 11:43:12 -07001013 t.traceBegin("StartContentService");
Jeff Sharkeya3ebfec2016-04-04 08:58:04 -06001014 mSystemServiceManager.startService(CONTENT_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001015 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001016
Felipe Leme3aad1be2019-05-31 11:43:12 -07001017 t.traceBegin("InstallSystemProviders");
Jeff Brown4ccb8232014-01-16 22:16:42 -08001018 mActivityManagerService.installSystemProviders();
Fyodor Kupolov7fcd6592017-12-15 11:56:36 -08001019 // Now that SettingsProvider is ready, reactivate SQLiteCompatibilityWalFlags
1020 SQLiteCompatibilityWalFlags.reset();
Felipe Leme3aad1be2019-05-31 11:43:12 -07001021 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001022
Yohei Yukawab8bbdaf2018-03-14 18:04:52 -07001023 // Records errors and logs, for example wtf()
1024 // Currently this service indirectly depends on SettingsProvider so do this after
1025 // InstallSystemProviders.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001026 t.traceBegin("StartDropBoxManager");
Yohei Yukawab8bbdaf2018-03-14 18:04:52 -07001027 mSystemServiceManager.startService(DropBoxManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001028 t.traceEnd();
Yohei Yukawab8bbdaf2018-03-14 18:04:52 -07001029
Felipe Leme3aad1be2019-05-31 11:43:12 -07001030 t.traceBegin("StartVibratorService");
Jeff Brown7f6c2312012-04-13 20:38:38 -07001031 vibrator = new VibratorService(context);
1032 ServiceManager.addService("vibrator", vibrator);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001033 t.traceEnd();
The Android Open Source Project10592532009-03-18 17:39:46 -07001034
Felipe Leme3aad1be2019-05-31 11:43:12 -07001035 t.traceBegin("StartDynamicSystemService");
Po-Chien Hsueh4e908c22019-03-07 11:57:17 +08001036 dynamicSystem = new DynamicSystemService(context);
1037 ServiceManager.addService("dynamic_system", dynamicSystem);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001038 t.traceEnd();
Howard Chen0a947642019-01-07 14:10:44 +08001039
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001040 if (!isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001041 t.traceBegin("StartConsumerIrService");
Wei Liu09de4192016-09-07 13:33:49 -07001042 consumerIr = new ConsumerIrService(context);
1043 ServiceManager.addService(Context.CONSUMER_IR_SERVICE, consumerIr);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001044 t.traceEnd();
Wei Liu09de4192016-09-07 13:33:49 -07001045 }
Erik Gilling51e95df2013-06-26 11:06:51 -07001046
Felipe Leme3aad1be2019-05-31 11:43:12 -07001047 t.traceBegin("StartAlarmManagerService");
Suprabh Shukla6226c2f2018-08-22 18:15:04 -07001048 mSystemServiceManager.startService(new AlarmManagerService(context));
Felipe Leme3aad1be2019-05-31 11:43:12 -07001049 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001050
Felipe Leme3aad1be2019-05-31 11:43:12 -07001051 t.traceBegin("StartInputManagerService");
Jeff Brown4ccb8232014-01-16 22:16:42 -08001052 inputManager = new InputManagerService(context);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001053 t.traceEnd();
Jeff Browna9d131c2012-09-20 16:48:17 -07001054
Felipe Leme3aad1be2019-05-31 11:43:12 -07001055 t.traceBegin("StartWindowManagerService");
Keun-young Park9b73a542017-02-01 12:09:58 -08001056 // WMS needs sensor service ready
1057 ConcurrentUtils.waitForFutureNoInterrupt(mSensorServiceStart, START_SENSOR_SERVICE);
1058 mSensorServiceStart = null;
Yohei Yukawae24ed792018-08-28 19:10:32 -07001059 wm = WindowManagerService.main(context, inputManager, !mFirstBoot, mOnlyCore,
Yunfan Chenc2ff6cf2018-12-04 16:56:21 -08001060 new PhoneWindowManager(), mActivityManagerService.mActivityTaskManager);
Vishnu Naire9852f52017-10-11 18:09:55 -07001061 ServiceManager.addService(Context.WINDOW_SERVICE, wm, /* allowIsolated= */ false,
Vishnu Naire78b01a2017-10-26 10:11:54 -07001062 DUMP_FLAG_PRIORITY_CRITICAL | DUMP_FLAG_PROTO);
Vishnu Nair3764f4e2018-03-02 07:56:44 -08001063 ServiceManager.addService(Context.INPUT_SERVICE, inputManager,
1064 /* allowIsolated= */ false, DUMP_FLAG_PRIORITY_CRITICAL);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001065 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001066
Felipe Leme3aad1be2019-05-31 11:43:12 -07001067 t.traceBegin("SetWindowManagerService");
Bryce Leef19cbe22018-02-02 15:09:21 -08001068 mActivityManagerService.setWindowManager(wm);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001069 t.traceEnd();
Bryce Leef19cbe22018-02-02 15:09:21 -08001070
Felipe Leme3aad1be2019-05-31 11:43:12 -07001071 t.traceBegin("WindowManagerServiceOnInitReady");
Bryce Leef19cbe22018-02-02 15:09:21 -08001072 wm.onInitReady();
Felipe Leme3aad1be2019-05-31 11:43:12 -07001073 t.traceEnd();
Bryce Leef19cbe22018-02-02 15:09:21 -08001074
Yifan Hong604c12c2017-03-20 10:57:44 -07001075 // Start receiving calls from HIDL services. Start in in a separate thread
1076 // because it need to connect to SensorManager. This have to start
1077 // after START_SENSOR_SERVICE is done.
Felipe Lemeb68b7692019-10-09 10:43:03 -07001078 SystemServerInitThreadPool.submit(() -> {
Felipe Leme137e7812019-06-10 11:38:05 -07001079 TimingsTraceAndSlog traceLog = TimingsTraceAndSlog.newAsyncLog();
Roger 1 Jönsson341b2c12017-05-17 14:21:55 +02001080 traceLog.traceBegin(START_HIDL_SERVICES);
Yifan Hong604c12c2017-03-20 10:57:44 -07001081 startHidlServices();
Roger 1 Jönsson341b2c12017-05-17 14:21:55 +02001082 traceLog.traceEnd();
Yifan Hong604c12c2017-03-20 10:57:44 -07001083 }, START_HIDL_SERVICES);
1084
Rick Yiub2875922018-09-12 11:07:25 +00001085 if (!isWatch && enableVrService) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001086 t.traceBegin("StartVrManagerService");
Wei Liuef89d212016-09-19 15:10:33 -07001087 mSystemServiceManager.startService(VrManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001088 t.traceEnd();
Wei Liuef89d212016-09-19 15:10:33 -07001089 }
Ruben Brunkdd18a0b2015-12-04 16:16:31 -08001090
Felipe Leme3aad1be2019-05-31 11:43:12 -07001091 t.traceBegin("StartInputManager");
Arthur Hung95b38a92018-07-20 18:56:12 +08001092 inputManager.setWindowManagerCallbacks(wm.getInputManagerCallback());
Jeff Browna9d131c2012-09-20 16:48:17 -07001093 inputManager.start();
Felipe Leme3aad1be2019-05-31 11:43:12 -07001094 t.traceEnd();
Jeff Browna9d131c2012-09-20 16:48:17 -07001095
Jeff Brown4ccb8232014-01-16 22:16:42 -08001096 // TODO: Use service dependencies instead.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001097 t.traceBegin("DisplayManagerWindowManagerAndInputReady");
Jeff Brown4ccb8232014-01-16 22:16:42 -08001098 mDisplayManagerService.windowManagerAndInputReady();
Felipe Leme3aad1be2019-05-31 11:43:12 -07001099 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001100
Hayden Gomes013a7f82019-05-14 09:30:39 -07001101 if (mFactoryTestMode == FactoryTest.FACTORY_TEST_LOW_LEVEL) {
David 'Digit' Turnere2a5e862011-01-17 00:32:33 +01001102 Slog.i(TAG, "No Bluetooth Service (factory test)");
Matthew Xie1dd01eb32013-04-26 12:37:54 -07001103 } else if (!context.getPackageManager().hasSystemFeature
Christine Franksea7d71b2018-07-03 14:46:07 -07001104 (PackageManager.FEATURE_BLUETOOTH)) {
Matthew Xie1dd01eb32013-04-26 12:37:54 -07001105 Slog.i(TAG, "No Bluetooth Service (Bluetooth Hardware Not Present)");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001106 } else {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001107 t.traceBegin("StartBluetoothService");
Miao Chou658bf2f2015-06-26 17:14:35 -07001108 mSystemServiceManager.startService(BluetoothService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001109 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001110 }
Pavel Zhamaitsiak02b3e6b2016-02-03 10:39:44 -08001111
Felipe Leme3aad1be2019-05-31 11:43:12 -07001112 t.traceBegin("IpConnectivityMetrics");
Hugo Benichieab511b2016-09-09 09:23:47 +09001113 mSystemServiceManager.startService(IpConnectivityMetrics.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001114 t.traceEnd();
Hugo Benichieab511b2016-09-09 09:23:47 +09001115
Felipe Leme3aad1be2019-05-31 11:43:12 -07001116 t.traceBegin("NetworkWatchlistService");
Ricky Wai1a6e6672017-10-27 14:46:01 +01001117 mSystemServiceManager.startService(NetworkWatchlistService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001118 t.traceEnd();
Ricky Wai1a6e6672017-10-27 14:46:01 +01001119
Felipe Leme3aad1be2019-05-31 11:43:12 -07001120 t.traceBegin("PinnerService");
Philip Cuadra7bd0fdd2016-04-28 15:26:49 -07001121 mSystemServiceManager.startService(PinnerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001122 t.traceEnd();
Mathew Inwood4e2ed6a2018-11-26 15:31:16 +00001123
Felipe Leme3aad1be2019-05-31 11:43:12 -07001124 t.traceBegin("IorapForwardingService");
Igor Murashkin4de1e162018-11-26 10:33:17 -08001125 mSystemServiceManager.startService(IorapForwardingService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001126 t.traceEnd();
Igor Murashkin4de1e162018-11-26 10:33:17 -08001127
Felipe Leme3aad1be2019-05-31 11:43:12 -07001128 t.traceBegin("SignedConfigService");
Mathew Inwood4e2ed6a2018-11-26 15:31:16 +00001129 SignedConfigService.registerUpdateReceiver(mSystemContext);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001130 t.traceEnd();
Andrei Oneacf109842019-07-17 19:03:10 +01001131
Yohei Yukawa1382da32019-11-27 10:08:20 -08001132 } catch (Throwable e) {
Dianne Hackborn661cd522011-08-22 00:26:20 -07001133 Slog.e("System", "******************************************");
Yohei Yukawa1382da32019-11-27 10:08:20 -08001134 Slog.e("System", "************ Failure starting core service");
1135 throw e;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001136 }
1137
Rene Mayrhofer7d6c8e52018-11-28 11:32:40 -08001138 // Before things start rolling, be sure we have decided whether
1139 // we are in safe mode.
1140 final boolean safeMode = wm.detectSafeMode();
1141 if (safeMode) {
1142 // If yes, immediately turn on the global setting for airplane mode.
1143 // Note that this does not send broadcasts at this stage because
1144 // subsystems are not yet up. We will send broadcasts later to ensure
1145 // all listeners have the chance to react with special handling.
1146 Settings.Global.putInt(context.getContentResolver(),
1147 Settings.Global.AIRPLANE_MODE_ON, 1);
1148 }
1149
Joe Onorato089de882010-04-12 08:18:45 -07001150 StatusBarManagerService statusBar = null;
Adam Lesinskief2ea1f2013-12-05 16:48:06 -08001151 INotificationManager notification = null;
Bai Taoa58a8752010-07-13 15:32:16 +08001152 CountryDetectorService countryDetector = null;
Jim Miller4f93c582016-01-27 19:05:43 -08001153 ILockSettings lockSettings = null;
Jeff Brown69b07162013-11-07 00:30:16 -08001154 MediaRouterService mediaRouter = null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001155
Dianne Hackborn661cd522011-08-22 00:26:20 -07001156 // Bring up services needed for UI.
Jeff Brown6f357d32014-01-15 20:40:55 -08001157 if (mFactoryTestMode != FactoryTest.FACTORY_TEST_LOW_LEVEL) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001158 t.traceBegin("StartInputMethodManagerLifecycle");
Yohei Yukawa6048d892018-12-25 09:57:31 -08001159 if (InputMethodSystemProperty.MULTI_CLIENT_IME_ENABLED) {
Yohei Yukawabae5bea2018-11-12 15:08:30 -08001160 mSystemServiceManager.startService(
1161 MultiClientInputMethodManagerService.Lifecycle.class);
1162 } else {
1163 mSystemServiceManager.startService(InputMethodManagerService.Lifecycle.class);
1164 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001165 t.traceEnd();
Dianne Hackborn661cd522011-08-22 00:26:20 -07001166
Felipe Leme3aad1be2019-05-31 11:43:12 -07001167 t.traceBegin("StartAccessibilityManagerService");
dcashman4e3f5d32014-11-25 15:33:26 -08001168 try {
Rhed Jao8a39cef2018-07-18 11:43:33 +08001169 mSystemServiceManager.startService(ACCESSIBILITY_MANAGER_SERVICE_CLASS);
dcashman4e3f5d32014-11-25 15:33:26 -08001170 } catch (Throwable e) {
1171 reportWtf("starting Accessibility Manager", e);
Dianne Hackborn661cd522011-08-22 00:26:20 -07001172 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001173 t.traceEnd();
Dianne Hackborn661cd522011-08-22 00:26:20 -07001174 }
1175
Felipe Leme3aad1be2019-05-31 11:43:12 -07001176 t.traceBegin("MakeDisplayReady");
Dianne Hackborn661cd522011-08-22 00:26:20 -07001177 try {
1178 wm.displayReady();
1179 } catch (Throwable e) {
1180 reportWtf("making display ready", e);
1181 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001182 t.traceEnd();
Dianne Hackborn8795b602011-08-25 13:30:53 -07001183
Jeff Brown6f357d32014-01-15 20:40:55 -08001184 if (mFactoryTestMode != FactoryTest.FACTORY_TEST_LOW_LEVEL) {
Narayan Kamath1c888f62017-10-30 14:35:15 +00001185 if (!"0".equals(SystemProperties.get("system_init.startmountservice"))) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001186 t.traceBegin("StartStorageManagerService");
Kenny Root51a573c2012-05-17 13:30:28 -07001187 try {
1188 /*
Sudheer Shanka2250d562016-11-07 15:41:02 -08001189 * NotificationManagerService is dependant on StorageManagerService,
1190 * (for media / usb notifications) so we must start StorageManagerService first.
Kenny Root51a573c2012-05-17 13:30:28 -07001191 */
Sudheer Shanka2250d562016-11-07 15:41:02 -08001192 mSystemServiceManager.startService(STORAGE_MANAGER_SERVICE_CLASS);
1193 storageManager = IStorageManager.Stub.asInterface(
Jeff Sharkey56e62932015-03-21 20:41:00 -07001194 ServiceManager.getService("mount"));
Kenny Root51a573c2012-05-17 13:30:28 -07001195 } catch (Throwable e) {
Jeff Sharkeye8cece92017-01-04 11:33:33 -07001196 reportWtf("starting StorageManagerService", e);
1197 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001198 t.traceEnd();
Jeff Sharkeye8cece92017-01-04 11:33:33 -07001199
Felipe Leme3aad1be2019-05-31 11:43:12 -07001200 t.traceBegin("StartStorageStatsService");
Jeff Sharkeye8cece92017-01-04 11:33:33 -07001201 try {
1202 mSystemServiceManager.startService(STORAGE_STATS_SERVICE_CLASS);
1203 } catch (Throwable e) {
1204 reportWtf("starting StorageStatsService", e);
Kenny Root51a573c2012-05-17 13:30:28 -07001205 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001206 t.traceEnd();
Kenny Root51a573c2012-05-17 13:30:28 -07001207 }
padarshrada45412014-11-05 16:54:50 +05301208 }
Kenny Root51a573c2012-05-17 13:30:28 -07001209
Adam Lesinski05199e82015-03-19 14:37:11 -07001210 // We start this here so that we update our configuration to set watch or television
1211 // as appropriate.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001212 t.traceBegin("StartUiModeManager");
Adam Lesinski05199e82015-03-19 14:37:11 -07001213 mSystemServiceManager.startService(UiModeManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001214 t.traceEnd();
Adam Lesinski05199e82015-03-19 14:37:11 -07001215
David Brazdil89c80bb2016-06-02 15:31:30 +01001216 if (!mOnlyCore) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001217 t.traceBegin("UpdatePackagesIfNeeded");
David Brazdil89c80bb2016-06-02 15:31:30 +01001218 try {
Zimuzo2a050392019-05-09 12:51:33 +01001219 Watchdog.getInstance().pauseWatchingCurrentThread("dexopt");
David Brazdil89c80bb2016-06-02 15:31:30 +01001220 mPackageManagerService.updatePackagesIfNeeded();
1221 } catch (Throwable e) {
1222 reportWtf("update packages", e);
Zimuzo2a050392019-05-09 12:51:33 +01001223 } finally {
1224 Watchdog.getInstance().resumeWatchingCurrentThread("dexopt");
David Brazdil89c80bb2016-06-02 15:31:30 +01001225 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001226 t.traceEnd();
David Brazdilf5c444f2016-03-30 11:45:52 +01001227 }
David Brazdilf5c444f2016-03-30 11:45:52 +01001228
Felipe Leme3aad1be2019-05-31 11:43:12 -07001229 t.traceBegin("PerformFstrimIfNeeded");
padarshrada45412014-11-05 16:54:50 +05301230 try {
Nicolas Geoffray27c07372015-11-05 16:54:09 +00001231 mPackageManagerService.performFstrimIfNeeded();
padarshrada45412014-11-05 16:54:50 +05301232 } catch (Throwable e) {
Nicolas Geoffray27c07372015-11-05 16:54:09 +00001233 reportWtf("performing fstrim", e);
padarshrada45412014-11-05 16:54:50 +05301234 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001235 t.traceEnd();
padarshrada45412014-11-05 16:54:50 +05301236
padarshrada45412014-11-05 16:54:50 +05301237 if (mFactoryTestMode != FactoryTest.FACTORY_TEST_LOW_LEVEL) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001238 t.traceBegin("StartLockSettingsService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001239 try {
1240 mSystemServiceManager.startService(LOCK_SETTINGS_SERVICE_CLASS);
1241 lockSettings = ILockSettings.Stub.asInterface(
Christine Franksea7d71b2018-07-03 14:46:07 -07001242 ServiceManager.getService("lock_settings"));
Narayan Kamath1c888f62017-10-30 14:35:15 +00001243 } catch (Throwable e) {
1244 reportWtf("starting LockSettingsService service", e);
1245 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001246 t.traceEnd();
Dan Morrille4d9a012013-03-28 18:10:43 -07001247
Narayan Kamath1c888f62017-10-30 14:35:15 +00001248 final boolean hasPdb = !SystemProperties.get(PERSISTENT_DATA_BLOCK_PROP).equals("");
David Andersona032a2b2019-02-07 14:07:23 -08001249 final boolean hasGsi = SystemProperties.getInt(GSI_RUNNING_PROP, 0) > 0;
1250 if (hasPdb && !hasGsi) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001251 t.traceBegin("StartPersistentDataBlock");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001252 mSystemServiceManager.startService(PersistentDataBlockService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001253 t.traceEnd();
Amith Yamasani52c489c2012-03-28 11:42:42 -07001254 }
1255
Felipe Leme3aad1be2019-05-31 11:43:12 -07001256 t.traceBegin("StartTestHarnessMode");
William Hester87ac4ea2019-05-06 16:23:47 -07001257 mSystemServiceManager.startService(TestHarnessModeService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001258 t.traceEnd();
William Hester87ac4ea2019-05-06 16:23:47 -07001259
Narayan Kamath1c888f62017-10-30 14:35:15 +00001260 if (hasPdb || OemLockService.isHalPresent()) {
1261 // Implementation depends on pdb or the OemLock HAL
Felipe Leme3aad1be2019-05-31 11:43:12 -07001262 t.traceBegin("StartOemLockService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001263 mSystemServiceManager.startService(OemLockService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001264 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001265 }
1266
Felipe Leme3aad1be2019-05-31 11:43:12 -07001267 t.traceBegin("StartDeviceIdleController");
Makoto Onuki52c24b32019-08-23 10:18:28 -07001268 mSystemServiceManager.startService(DEVICE_IDLE_CONTROLLER_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001269 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001270
1271 // Always start the Device Policy Manager, so that the API is compatible with
1272 // API8.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001273 t.traceBegin("StartDevicePolicyManager");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001274 mSystemServiceManager.startService(DevicePolicyManagerService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001275 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001276
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001277 if (!isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001278 t.traceBegin("StartStatusBarManagerService");
Dan Morrille4d9a012013-03-28 18:10:43 -07001279 try {
Dan Morrille4d9a012013-03-28 18:10:43 -07001280 statusBar = new StatusBarManagerService(context, wm);
1281 ServiceManager.addService(Context.STATUS_BAR_SERVICE, statusBar);
1282 } catch (Throwable e) {
1283 reportWtf("starting StatusBarManagerService", e);
1284 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001285 t.traceEnd();
Dianne Hackbornd6847842010-01-12 18:14:19 -08001286 }
1287
Felipe Leme3aad1be2019-05-31 11:43:12 -07001288 startContentCaptureService(context, t);
1289 startAttentionService(context, t);
Felipe Leme927fbf02018-11-12 17:27:23 -08001290
Felipe Leme3aad1be2019-05-31 11:43:12 -07001291 startSystemCaptionsManagerService(context, t);
Robert Berry835123d2019-03-18 16:33:42 -04001292
Sunny Goyal54e91342018-11-14 11:59:02 -08001293 // App prediction manager service
Felipe Leme83e8f242019-08-14 16:57:56 +00001294 if (deviceHasConfigString(context, R.string.config_defaultAppPredictionService)) {
1295 t.traceBegin("StartAppPredictionService");
1296 mSystemServiceManager.startService(APP_PREDICTION_MANAGER_SERVICE_CLASS);
1297 t.traceEnd();
1298 } else {
1299 Slog.d(TAG, "AppPredictionService not defined by OEM");
1300 }
Sunny Goyal54e91342018-11-14 11:59:02 -08001301
Winson Chung3fb0f252019-01-08 17:41:55 -08001302 // Content suggestions manager service
Felipe Leme83e8f242019-08-14 16:57:56 +00001303 if (deviceHasConfigString(context, R.string.config_defaultContentSuggestionsService)) {
1304 t.traceBegin("StartContentSuggestionsService");
1305 mSystemServiceManager.startService(CONTENT_SUGGESTIONS_SERVICE_CLASS);
1306 t.traceEnd();
1307 } else {
1308 Slog.d(TAG, "ContentSuggestionsService not defined by OEM");
1309 }
Winson Chung3fb0f252019-01-08 17:41:55 -08001310
Roshan Pius7e6f5f52019-06-27 14:14:40 -07001311 t.traceBegin("InitConnectivityModuleConnector");
1312 try {
1313 ConnectivityModuleConnector.getInstance().init(context);
1314 } catch (Throwable e) {
1315 reportWtf("initializing ConnectivityModuleConnector", e);
1316 }
1317 t.traceEnd();
1318
Felipe Leme3aad1be2019-05-31 11:43:12 -07001319 t.traceBegin("InitNetworkStackClient");
Remi NGUYEN VAN389443c2019-03-15 08:21:27 +09001320 try {
1321 NetworkStackClient.getInstance().init();
1322 } catch (Throwable e) {
1323 reportWtf("initializing NetworkStackClient", e);
1324 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001325 t.traceEnd();
Remi NGUYEN VAN389443c2019-03-15 08:21:27 +09001326
Felipe Leme3aad1be2019-05-31 11:43:12 -07001327 t.traceBegin("StartNetworkManagementService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001328 try {
1329 networkManagement = NetworkManagementService.create(context);
1330 ServiceManager.addService(Context.NETWORKMANAGEMENT_SERVICE, networkManagement);
1331 } catch (Throwable e) {
1332 reportWtf("starting NetworkManagement Service", e);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001333 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001334 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001335
Chalard Jean8c141bd2018-12-04 20:20:56 +09001336
Felipe Leme3aad1be2019-05-31 11:43:12 -07001337 t.traceBegin("StartIpSecService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001338 try {
1339 ipSecService = IpSecService.create(context);
1340 ServiceManager.addService(Context.IPSEC_SERVICE, ipSecService);
1341 } catch (Throwable e) {
1342 reportWtf("starting IpSec Service", e);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001343 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001344 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001345
Felipe Leme3aad1be2019-05-31 11:43:12 -07001346 t.traceBegin("StartTextServicesManager");
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001347 mSystemServiceManager.startService(TextServicesManagerService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001348 t.traceEnd();
San Mehatd1df8ac2010-01-26 06:17:26 -08001349
Abodunrinwa Tokid32906c2018-01-18 04:34:44 -08001350 if (!disableSystemTextClassifier) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001351 t.traceBegin("StartTextClassificationManagerService");
Christine Franksea7d71b2018-07-03 14:46:07 -07001352 mSystemServiceManager
1353 .startService(TextClassificationManagerService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001354 t.traceEnd();
Abodunrinwa Tokid32906c2018-01-18 04:34:44 -08001355 }
1356
Felipe Leme3aad1be2019-05-31 11:43:12 -07001357 t.traceBegin("StartNetworkScoreService");
Mehdi Alizadehce2d9632018-03-28 17:34:24 -07001358 mSystemServiceManager.startService(NetworkScoreService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001359 t.traceEnd();
vandwalle7c3606c2014-03-31 19:12:07 -07001360
Felipe Leme3aad1be2019-05-31 11:43:12 -07001361 t.traceBegin("StartNetworkStatsService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001362 try {
1363 networkStats = NetworkStatsService.create(context, networkManagement);
1364 ServiceManager.addService(Context.NETWORK_STATS_SERVICE, networkStats);
1365 } catch (Throwable e) {
1366 reportWtf("starting NetworkStats Service", e);
1367 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001368 t.traceEnd();
Dan Morrille4d9a012013-03-28 18:10:43 -07001369
Felipe Leme3aad1be2019-05-31 11:43:12 -07001370 t.traceBegin("StartNetworkPolicyManagerService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001371 try {
Jeff Sharkeye0c29952018-02-20 17:24:55 -07001372 networkPolicy = new NetworkPolicyManagerService(context, mActivityManagerService,
1373 networkManagement);
Narayan Kamath1c888f62017-10-30 14:35:15 +00001374 ServiceManager.addService(Context.NETWORK_POLICY_SERVICE, networkPolicy);
1375 } catch (Throwable e) {
1376 reportWtf("starting NetworkPolicy Service", e);
1377 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001378 t.traceEnd();
Dan Morrille4d9a012013-03-28 18:10:43 -07001379
Roshan Piusc0bd9452019-01-28 10:03:07 -08001380 if (context.getPackageManager().hasSystemFeature(
Roshan Piusac76d482019-11-19 06:45:41 -08001381 PackageManager.FEATURE_WIFI)) {
1382 // Wifi Service must be started first for wifi-related services.
1383 t.traceBegin("StartWifi");
1384 mSystemServiceManager.startService(WIFI_SERVICE_CLASS);
1385 t.traceEnd();
1386 t.traceBegin("StartWifiScanning");
1387 mSystemServiceManager.startService(
1388 "com.android.server.wifi.scanner.WifiScanningService");
1389 t.traceEnd();
1390 }
1391
1392 if (context.getPackageManager().hasSystemFeature(
1393 PackageManager.FEATURE_WIFI_RTT)) {
1394 t.traceBegin("StartRttService");
1395 mSystemServiceManager.startService(
1396 "com.android.server.wifi.rtt.RttService");
1397 t.traceEnd();
1398 }
1399
1400 if (context.getPackageManager().hasSystemFeature(
1401 PackageManager.FEATURE_WIFI_AWARE)) {
1402 t.traceBegin("StartWifiAware");
1403 mSystemServiceManager.startService(WIFI_AWARE_SERVICE_CLASS);
1404 t.traceEnd();
1405 }
1406
1407 if (context.getPackageManager().hasSystemFeature(
1408 PackageManager.FEATURE_WIFI_DIRECT)) {
1409 t.traceBegin("StartWifiP2P");
1410 mSystemServiceManager.startService(WIFI_P2P_SERVICE_CLASS);
1411 t.traceEnd();
1412 }
1413
1414 if (context.getPackageManager().hasSystemFeature(
Roshan Piusc0bd9452019-01-28 10:03:07 -08001415 PackageManager.FEATURE_LOWPAN)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001416 t.traceBegin("StartLowpan");
Roshan Piusc0bd9452019-01-28 10:03:07 -08001417 mSystemServiceManager.startService(LOWPAN_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001418 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001419 }
Lorenzo Colittif9ff2c92014-05-21 16:32:11 -07001420
Narayan Kamath1c888f62017-10-30 14:35:15 +00001421 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_ETHERNET) ||
Christine Franksea7d71b2018-07-03 14:46:07 -07001422 mPackageManager.hasSystemFeature(PackageManager.FEATURE_USB_HOST)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001423 t.traceBegin("StartEthernet");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001424 mSystemServiceManager.startService(ETHERNET_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001425 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001426 }
1427
Felipe Leme3aad1be2019-05-31 11:43:12 -07001428 t.traceBegin("StartConnectivityService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001429 try {
1430 connectivity = new ConnectivityService(
Christine Franksea7d71b2018-07-03 14:46:07 -07001431 context, networkManagement, networkStats, networkPolicy);
Narayan Kamath1c888f62017-10-30 14:35:15 +00001432 ServiceManager.addService(Context.CONNECTIVITY_SERVICE, connectivity,
Christine Franksea7d71b2018-07-03 14:46:07 -07001433 /* allowIsolated= */ false,
1434 DUMP_FLAG_PRIORITY_HIGH | DUMP_FLAG_PRIORITY_NORMAL);
Narayan Kamath1c888f62017-10-30 14:35:15 +00001435 networkPolicy.bindConnectivityManager(connectivity);
1436 } catch (Throwable e) {
1437 reportWtf("starting Connectivity Service", e);
satok988323c2011-06-22 16:38:13 +09001438 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001439 t.traceEnd();
satok988323c2011-06-22 16:38:13 +09001440
Felipe Leme3aad1be2019-05-31 11:43:12 -07001441 t.traceBegin("StartNsdService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001442 try {
1443 serviceDiscovery = NsdService.create(context);
1444 ServiceManager.addService(
Christine Franksea7d71b2018-07-03 14:46:07 -07001445 Context.NSD_SERVICE, serviceDiscovery);
Narayan Kamath1c888f62017-10-30 14:35:15 +00001446 } catch (Throwable e) {
1447 reportWtf("starting Service Discovery Service", e);
Christopher Tate8662cab52012-02-23 14:59:36 -08001448 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001449 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001450
Felipe Leme3aad1be2019-05-31 11:43:12 -07001451 t.traceBegin("StartSystemUpdateManagerService");
Tao Bao07342dc2017-01-24 15:08:21 -08001452 try {
1453 ServiceManager.addService(Context.SYSTEM_UPDATE_SERVICE,
1454 new SystemUpdateManagerService(context));
1455 } catch (Throwable e) {
1456 reportWtf("starting SystemUpdateManagerService", e);
1457 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001458 t.traceEnd();
Tao Bao07342dc2017-01-24 15:08:21 -08001459
Felipe Leme3aad1be2019-05-31 11:43:12 -07001460 t.traceBegin("StartUpdateLockService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001461 try {
1462 ServiceManager.addService(Context.UPDATE_LOCK_SERVICE,
Christine Franksea7d71b2018-07-03 14:46:07 -07001463 new UpdateLockService(context));
Narayan Kamath1c888f62017-10-30 14:35:15 +00001464 } catch (Throwable e) {
1465 reportWtf("starting UpdateLockService", e);
1466 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001467 t.traceEnd();
Christopher Tate8662cab52012-02-23 14:59:36 -08001468
Felipe Leme3aad1be2019-05-31 11:43:12 -07001469 t.traceBegin("StartNotificationManager");
Jeff Brown6f357d32014-01-15 20:40:55 -08001470 mSystemServiceManager.startService(NotificationManagerService.class);
Rubin Xu897750a2019-04-30 17:15:03 +01001471 SystemNotificationChannels.removeDeprecated(context);
Geoffrey Pitschaf759c52017-02-15 09:35:38 -05001472 SystemNotificationChannels.createAll(context);
Adam Lesinskief2ea1f2013-12-05 16:48:06 -08001473 notification = INotificationManager.Stub.asInterface(
1474 ServiceManager.getService(Context.NOTIFICATION_SERVICE));
Felipe Leme3aad1be2019-05-31 11:43:12 -07001475 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001476
Felipe Leme3aad1be2019-05-31 11:43:12 -07001477 t.traceBegin("StartDeviceMonitor");
Jeff Brown6f357d32014-01-15 20:40:55 -08001478 mSystemServiceManager.startService(DeviceStorageMonitorService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001479 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001480
Felipe Leme3aad1be2019-05-31 11:43:12 -07001481 t.traceBegin("StartLocationManagerService");
Soonil Nagarkar141417a2019-10-28 11:12:48 -07001482 mSystemServiceManager.startService(LocationManagerService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001483 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001484
Felipe Leme3aad1be2019-05-31 11:43:12 -07001485 t.traceBegin("StartCountryDetectorService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001486 try {
1487 countryDetector = new CountryDetectorService(context);
1488 ServiceManager.addService(Context.COUNTRY_DETECTOR, countryDetector);
1489 } catch (Throwable e) {
1490 reportWtf("starting Country Detector", e);
1491 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001492 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001493
Neil Fullerbef7e802019-06-27 15:01:01 +01001494 t.traceBegin("StartTimeDetectorService");
1495 try {
1496 mSystemServiceManager.startService(TIME_DETECTOR_SERVICE_CLASS);
1497 } catch (Throwable e) {
1498 reportWtf("starting StartTimeDetectorService service", e);
Neil Fuller7fb88c32018-06-19 12:53:47 +01001499 }
Neil Fullerbef7e802019-06-27 15:01:01 +01001500 t.traceEnd();
Neil Fuller7fb88c32018-06-19 12:53:47 +01001501
Neil Fuller3e3b5402019-11-07 15:35:05 +00001502 t.traceBegin("StartTimeZoneDetectorService");
1503 try {
1504 mSystemServiceManager.startService(TIME_ZONE_DETECTOR_SERVICE_CLASS);
1505 } catch (Throwable e) {
1506 reportWtf("starting StartTimeZoneDetectorService service", e);
1507 }
1508 t.traceEnd();
1509
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001510 if (!isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001511 t.traceBegin("StartSearchManagerService");
Dan Morrille4d9a012013-03-28 18:10:43 -07001512 try {
Jeff Sharkey4175be22016-01-09 14:57:45 -07001513 mSystemServiceManager.startService(SEARCH_MANAGER_SERVICE_CLASS);
Dan Morrille4d9a012013-03-28 18:10:43 -07001514 } catch (Throwable e) {
1515 reportWtf("starting Search Service", e);
1516 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001517 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001518 }
1519
Narayan Kamath1c888f62017-10-30 14:35:15 +00001520 if (context.getResources().getBoolean(R.bool.config_enableWallpaperService)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001521 t.traceBegin("StartWallpaperManagerService");
Jeff Sharkey1cab76a2016-04-12 18:23:31 -06001522 mSystemServiceManager.startService(WALLPAPER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001523 t.traceEnd();
Felipe Leme34a861a2019-08-05 16:00:12 -07001524 } else {
1525 Slog.i(TAG, "Wallpaper service disabled by config");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001526 }
1527
Felipe Leme3aad1be2019-05-31 11:43:12 -07001528 t.traceBegin("StartAudioService");
paulhsia0a1b3222018-11-08 18:15:46 +08001529 if (!isArc) {
1530 mSystemServiceManager.startService(AudioService.Lifecycle.class);
1531 } else {
1532 String className = context.getResources()
1533 .getString(R.string.config_deviceSpecificAudioService);
1534 try {
1535 mSystemServiceManager.startService(className + "$Lifecycle");
1536 } catch (Throwable e) {
1537 reportWtf("starting " + className, e);
1538 }
1539 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001540 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001541
Tomasz Wasilczyk05392d62017-07-10 19:33:22 -07001542 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_BROADCAST_RADIO)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001543 t.traceBegin("StartBroadcastRadioService");
Tomasz Wasilczyk6b4b6462017-07-19 10:52:28 -07001544 mSystemServiceManager.startService(BroadcastRadioService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001545 t.traceEnd();
Tomasz Wasilczyk347192e2017-04-04 11:13:44 -07001546 }
1547
Felipe Leme3aad1be2019-05-31 11:43:12 -07001548 t.traceBegin("StartDockObserver");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001549 mSystemServiceManager.startService(DockObserver.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001550 t.traceEnd();
Bryce Leebc58f592015-09-25 16:43:01 -07001551
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001552 if (isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001553 t.traceBegin("StartThermalObserver");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001554 mSystemServiceManager.startService(THERMAL_OBSERVER_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001555 t.traceEnd();
Dan Murphyc9f4eaf2009-08-12 15:15:43 -05001556 }
1557
Felipe Leme3aad1be2019-05-31 11:43:12 -07001558 t.traceBegin("StartWiredAccessoryManager");
John Spurlockb4f01b92015-03-24 12:40:15 -04001559 try {
John Spurlockb4f01b92015-03-24 12:40:15 -04001560 // Listen for wired headset changes
1561 inputManager.setWiredAccessoryCallbacks(
1562 new WiredAccessoryManager(context, inputManager));
1563 } catch (Throwable e) {
1564 reportWtf("starting WiredAccessoryManager", e);
Praveen Bharathi21e941b2010-10-06 15:23:14 -05001565 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001566 t.traceEnd();
Praveen Bharathi21e941b2010-10-06 15:23:14 -05001567
Narayan Kamath1c888f62017-10-30 14:35:15 +00001568 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_MIDI)) {
1569 // Start MIDI Manager service
Felipe Leme3aad1be2019-05-31 11:43:12 -07001570 t.traceBegin("StartMidiManager");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001571 mSystemServiceManager.startService(MIDI_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001572 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001573 }
Mike Lockwood5781cd52015-03-27 13:23:41 -07001574
Kenny Root4673a1d12018-12-05 12:20:02 +09001575 // Start ADB Debugging Service
Felipe Leme3aad1be2019-05-31 11:43:12 -07001576 t.traceBegin("StartAdbService");
Kenny Root4673a1d12018-12-05 12:20:02 +09001577 try {
1578 mSystemServiceManager.startService(ADB_SERVICE_CLASS);
1579 } catch (Throwable e) {
1580 Slog.e(TAG, "Failure starting AdbService");
1581 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001582 t.traceEnd();
Kenny Root4673a1d12018-12-05 12:20:02 +09001583
Narayan Kamath1c888f62017-10-30 14:35:15 +00001584 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_USB_HOST)
Christine Franksea7d71b2018-07-03 14:46:07 -07001585 || mPackageManager.hasSystemFeature(
1586 PackageManager.FEATURE_USB_ACCESSORY)
1587 || isEmulator) {
Narayan Kamath1c888f62017-10-30 14:35:15 +00001588 // Manage USB host and device support
Felipe Leme3aad1be2019-05-31 11:43:12 -07001589 t.traceBegin("StartUsbService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001590 mSystemServiceManager.startService(USB_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001591 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001592 }
Mike Lockwood57c798a2010-06-23 17:36:36 -04001593
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001594 if (!isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001595 t.traceBegin("StartSerialService");
Polina Bondarenkof8754ac2016-02-12 20:38:23 +01001596 try {
Narayan Kamath1c888f62017-10-30 14:35:15 +00001597 // Serial port support
1598 serial = new SerialService(context);
1599 ServiceManager.addService(Context.SERIAL_SERVICE, serial);
Polina Bondarenkof8754ac2016-02-12 20:38:23 +01001600 } catch (Throwable e) {
Narayan Kamath1c888f62017-10-30 14:35:15 +00001601 Slog.e(TAG, "Failure starting SerialService", e);
Polina Bondarenkof8754ac2016-02-12 20:38:23 +01001602 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001603 t.traceEnd();
Mike Lockwoodb01e8bf2011-08-29 20:11:07 -04001604 }
1605
Felipe Leme3aad1be2019-05-31 11:43:12 -07001606 t.traceBegin("StartHardwarePropertiesManagerService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001607 try {
1608 hardwarePropertiesService = new HardwarePropertiesManagerService(context);
1609 ServiceManager.addService(Context.HARDWARE_PROPERTIES_SERVICE,
Christine Franksea7d71b2018-07-03 14:46:07 -07001610 hardwarePropertiesService);
Narayan Kamath1c888f62017-10-30 14:35:15 +00001611 } catch (Throwable e) {
1612 Slog.e(TAG, "Failure starting HardwarePropertiesManagerService", e);
1613 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001614 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001615
Felipe Leme3aad1be2019-05-31 11:43:12 -07001616 t.traceBegin("StartTwilightService");
Jeff Brown6f357d32014-01-15 20:40:55 -08001617 mSystemServiceManager.startService(TwilightService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001618 t.traceEnd();
Jeff Brown2416e092012-08-21 22:12:20 -07001619
Felipe Leme3aad1be2019-05-31 11:43:12 -07001620 t.traceBegin("StartColorDisplay");
Christine Franks17a9bc82018-12-10 10:19:02 -08001621 mSystemServiceManager.startService(ColorDisplayService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001622 t.traceEnd();
Justin Klaassen911e8892016-06-21 18:24:24 -07001623
Makoto Onuki792de8d2019-07-16 16:19:01 -07001624 // TODO(aml-jobscheduler): Think about how to do it properly.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001625 t.traceBegin("StartJobScheduler");
Makoto Onuki792de8d2019-07-16 16:19:01 -07001626 mSystemServiceManager.startService(JOB_SCHEDULER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001627 t.traceEnd();
Christopher Tatefa380e92014-05-19 13:46:29 -07001628
Felipe Leme3aad1be2019-05-31 11:43:12 -07001629 t.traceBegin("StartSoundTrigger");
Arunesh Mishraa772e5f2016-01-25 10:33:11 -08001630 mSystemServiceManager.startService(SoundTriggerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001631 t.traceEnd();
Arunesh Mishraa772e5f2016-01-25 10:33:11 -08001632
Felipe Leme3aad1be2019-05-31 11:43:12 -07001633 t.traceBegin("StartTrustManager");
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001634 mSystemServiceManager.startService(TrustManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001635 t.traceEnd();
Jaikumar Ganesh7d0548d2010-10-18 15:29:09 -07001636
Narayan Kamath1c888f62017-10-30 14:35:15 +00001637 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_BACKUP)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001638 t.traceBegin("StartBackupManager");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001639 mSystemServiceManager.startService(BACKUP_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001640 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001641 }
1642
1643 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_APP_WIDGETS)
Christine Franksea7d71b2018-07-03 14:46:07 -07001644 || context.getResources().getBoolean(R.bool.config_enableAppWidgetService)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001645 t.traceBegin("StartAppWidgetService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001646 mSystemServiceManager.startService(APPWIDGET_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001647 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001648 }
1649
Philip P. Moltmann5d894502019-01-17 10:31:00 -08001650 // Grants default permissions and defines roles
Felipe Leme3aad1be2019-05-31 11:43:12 -07001651 t.traceBegin("StartRoleManagerService");
Philip P. Moltmann5d894502019-01-17 10:31:00 -08001652 mSystemServiceManager.startService(new RoleManagerService(
1653 mSystemContext, new LegacyRoleResolutionPolicy(mSystemContext)));
Felipe Leme3aad1be2019-05-31 11:43:12 -07001654 t.traceEnd();
Philip P. Moltmann5d894502019-01-17 10:31:00 -08001655
Narayan Kamath1c888f62017-10-30 14:35:15 +00001656 // We need to always start this service, regardless of whether the
1657 // FEATURE_VOICE_RECOGNIZERS feature is set, because it needs to take care
1658 // of initializing various settings. It will internally modify its behavior
1659 // based on that feature.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001660 t.traceBegin("StartVoiceRecognitionManager");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001661 mSystemServiceManager.startService(VOICE_RECOGNITION_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001662 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001663
1664 if (GestureLauncherService.isGestureLauncherEnabled(context.getResources())) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001665 t.traceBegin("StartGestureLauncher");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001666 mSystemServiceManager.startService(GestureLauncherService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001667 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001668 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001669 t.traceBegin("StartSensorNotification");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001670 mSystemServiceManager.startService(SensorNotificationService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001671 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001672
Felipe Leme3aad1be2019-05-31 11:43:12 -07001673 t.traceBegin("StartContextHubSystemService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001674 mSystemServiceManager.startService(ContextHubSystemService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001675 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001676
Felipe Leme3aad1be2019-05-31 11:43:12 -07001677 t.traceBegin("StartDiskStatsService");
Nick Pelly038cabe2010-09-23 16:12:11 -07001678 try {
Dan Egnor621bc542010-03-25 16:20:14 -07001679 ServiceManager.addService("diskstats", new DiskStatsService(context));
1680 } catch (Throwable e) {
Dianne Hackborn661cd522011-08-22 00:26:20 -07001681 reportWtf("starting DiskStats Service", e);
Dan Egnor621bc542010-03-25 16:20:14 -07001682 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001683 t.traceEnd();
Sen Hubde75702010-05-28 01:54:03 -07001684
Felipe Leme3aad1be2019-05-31 11:43:12 -07001685 t.traceBegin("RuntimeService");
Neil Fullerab0b81e2018-11-20 19:37:22 +00001686 try {
1687 ServiceManager.addService("runtime", new RuntimeService(context));
1688 } catch (Throwable e) {
1689 reportWtf("starting RuntimeService", e);
1690 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001691 t.traceEnd();
Neil Fullerab0b81e2018-11-20 19:37:22 +00001692
Neil Fullercd1a1092017-09-13 21:59:59 +01001693 // timezone.RulesManagerService will prevent a device starting up if the chain of trust
1694 // required for safe time zone updates might be broken. RuleManagerService cannot do
1695 // this check when mOnlyCore == true, so we don't enable the service in this case.
1696 // This service requires that JobSchedulerService is already started when it starts.
1697 final boolean startRulesManagerService =
1698 !mOnlyCore && context.getResources().getBoolean(
1699 R.bool.config_enableUpdateableTimeZoneRules);
1700 if (startRulesManagerService) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001701 t.traceBegin("StartTimeZoneRulesManagerService");
Neil Fullercd1a1092017-09-13 21:59:59 +01001702 mSystemServiceManager.startService(TIME_ZONE_RULES_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001703 t.traceEnd();
Neil Fullercd1a1092017-09-13 21:59:59 +01001704 }
1705
Steve Paik117fcb02018-09-13 09:43:54 -07001706 if (!isWatch && !disableNetworkTime) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001707 t.traceBegin("StartNetworkTimeUpdateService");
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001708 try {
Neil Fullerbef7e802019-06-27 15:01:01 +01001709 networkTimeUpdater = new NetworkTimeUpdateServiceImpl(context);
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001710 ServiceManager.addService("network_time_update_service", networkTimeUpdater);
1711 } catch (Throwable e) {
1712 reportWtf("starting NetworkTimeUpdate service", e);
1713 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001714 t.traceEnd();
Amith Yamasani6734b9f2010-09-13 16:24:08 -07001715 }
John Grossmanc1576732012-02-01 15:23:33 -08001716
Felipe Leme3aad1be2019-05-31 11:43:12 -07001717 t.traceBegin("CertBlacklister");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001718 try {
1719 CertBlacklister blacklister = new CertBlacklister(context);
1720 } catch (Throwable e) {
1721 reportWtf("starting CertBlacklister", e);
Geremy Condra3d33c262012-05-06 18:32:19 -07001722 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001723 t.traceEnd();
Jim Miller5ecd8112013-01-09 18:50:26 -08001724
Narayan Kamath1c888f62017-10-30 14:35:15 +00001725 if (EmergencyAffordanceManager.ENABLED) {
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08001726 // EmergencyMode service
Felipe Leme3aad1be2019-05-31 11:43:12 -07001727 t.traceBegin("StartEmergencyAffordanceService");
Selim Cinek705442f2016-09-13 16:02:33 -07001728 mSystemServiceManager.startService(EmergencyAffordanceService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001729 t.traceEnd();
Selim Cinek705442f2016-09-13 16:02:33 -07001730 }
1731
Narayan Kamath1c888f62017-10-30 14:35:15 +00001732 // Dreams (interactive idle-time views, a/k/a screen savers, and doze mode)
Felipe Leme3aad1be2019-05-31 11:43:12 -07001733 t.traceBegin("StartDreamManager");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001734 mSystemServiceManager.startService(DreamManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001735 t.traceEnd();
Svetoslavb3038ec2013-02-13 14:39:30 -08001736
Felipe Leme3aad1be2019-05-31 11:43:12 -07001737 t.traceBegin("AddGraphicsStatsService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001738 ServiceManager.addService(GraphicsStatsService.GRAPHICS_STATS_SERVICE,
Christine Franksea7d71b2018-07-03 14:46:07 -07001739 new GraphicsStatsService(context));
Felipe Leme3aad1be2019-05-31 11:43:12 -07001740 t.traceEnd();
John Reckedc524c2015-03-18 15:24:33 -07001741
Narayan Kamath1c888f62017-10-30 14:35:15 +00001742 if (CoverageService.ENABLED) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001743 t.traceBegin("AddCoverageService");
Allen Hair1f556e32016-11-11 15:42:50 -08001744 ServiceManager.addService(CoverageService.COVERAGE_SERVICE, new CoverageService());
Felipe Leme3aad1be2019-05-31 11:43:12 -07001745 t.traceEnd();
Allen Hair1f556e32016-11-11 15:42:50 -08001746 }
1747
Jeff Brown2c43c332014-06-12 22:38:59 -07001748 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_PRINTING)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001749 t.traceBegin("StartPrintManager");
Jeff Brown2c43c332014-06-12 22:38:59 -07001750 mSystemServiceManager.startService(PRINT_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001751 t.traceEnd();
Svetoslav Ganov4b9a4d12013-06-11 15:20:06 -07001752 }
Jeff Brown69b07162013-11-07 00:30:16 -08001753
Eugene Susla7c3eef22017-03-10 14:25:58 -08001754 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_COMPANION_DEVICE_SETUP)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001755 t.traceBegin("StartCompanionDeviceManager");
Eugene Susla7c3eef22017-03-10 14:25:58 -08001756 mSystemServiceManager.startService(COMPANION_DEVICE_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001757 t.traceEnd();
Eugene Susla7c3eef22017-03-10 14:25:58 -08001758 }
Eugene Susla6ed45d82017-01-22 13:52:51 -08001759
Felipe Leme3aad1be2019-05-31 11:43:12 -07001760 t.traceBegin("StartRestrictionManager");
Jeff Brown2c43c332014-06-12 22:38:59 -07001761 mSystemServiceManager.startService(RestrictionsManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001762 t.traceEnd();
Amith Yamasanif20d6402014-05-24 15:34:37 -07001763
Felipe Leme3aad1be2019-05-31 11:43:12 -07001764 t.traceBegin("StartMediaSessionService");
Jeff Brown2c43c332014-06-12 22:38:59 -07001765 mSystemServiceManager.startService(MediaSessionService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001766 t.traceEnd();
RoboErik01fe6612014-02-13 14:19:04 -08001767
Yuncheol Heoa0c4a062014-07-10 20:49:27 +09001768 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_HDMI_CEC)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001769 t.traceBegin("StartHdmiControlService");
Yuncheol Heoa0c4a062014-07-10 20:49:27 +09001770 mSystemServiceManager.startService(HdmiControlService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001771 t.traceEnd();
Yuncheol Heoa0c4a062014-07-10 20:49:27 +09001772 }
Jungshik Jang0792d372014-04-23 17:57:26 +09001773
Conrad Chen558acf92017-04-05 17:31:01 -07001774 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_LIVE_TV)
1775 || mPackageManager.hasSystemFeature(PackageManager.FEATURE_LEANBACK)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001776 t.traceBegin("StartTvInputManager");
Dongwon Kang0fdcb742014-07-24 16:28:35 +09001777 mSystemServiceManager.startService(TvInputManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001778 t.traceEnd();
Dongwon Kang0fdcb742014-07-24 16:28:35 +09001779 }
Jae Seo39570912014-02-20 18:23:25 -08001780
Dongwon Kangd8b81b32016-03-23 18:04:19 -07001781 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_PICTURE_IN_PICTURE)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001782 t.traceBegin("StartMediaResourceMonitor");
Dongwon Kangd8b81b32016-03-23 18:04:19 -07001783 mSystemServiceManager.startService(MediaResourceMonitorService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001784 t.traceEnd();
Dongwon Kangd8b81b32016-03-23 18:04:19 -07001785 }
Dongwon Kang2034a4c2015-12-14 21:57:34 +09001786
Sujith Ramakrishnanb5b86c12016-01-28 16:53:16 -08001787 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_LEANBACK)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001788 t.traceBegin("StartTvRemoteService");
Sujith Ramakrishnanb5b86c12016-01-28 16:53:16 -08001789 mSystemServiceManager.startService(TvRemoteService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001790 t.traceEnd();
Sujith Ramakrishnanb5b86c12016-01-28 16:53:16 -08001791 }
1792
Felipe Leme3aad1be2019-05-31 11:43:12 -07001793 t.traceBegin("StartMediaRouterService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001794 try {
1795 mediaRouter = new MediaRouterService(context);
1796 ServiceManager.addService(Context.MEDIA_ROUTER_SERVICE, mediaRouter);
1797 } catch (Throwable e) {
1798 reportWtf("starting MediaRouterService", e);
1799 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001800 t.traceEnd();
Adrian Roos82142c22014-03-27 14:56:59 +01001801
Kevin Chyna24e9fd2018-08-27 12:39:17 -07001802 final boolean hasFeatureFace
1803 = mPackageManager.hasSystemFeature(PackageManager.FEATURE_FACE);
Kevin Chyn51676d22018-11-05 18:00:43 -08001804 final boolean hasFeatureIris
1805 = mPackageManager.hasSystemFeature(PackageManager.FEATURE_IRIS);
Kevin Chyna24e9fd2018-08-27 12:39:17 -07001806 final boolean hasFeatureFingerprint
1807 = mPackageManager.hasSystemFeature(PackageManager.FEATURE_FINGERPRINT);
1808
1809 if (hasFeatureFace) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001810 t.traceBegin("StartFaceSensor");
Gilad Brettercb51b8b2018-03-22 17:04:51 +02001811 mSystemServiceManager.startService(FaceService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001812 t.traceEnd();
Gilad Brettercb51b8b2018-03-22 17:04:51 +02001813 }
1814
Kevin Chyn51676d22018-11-05 18:00:43 -08001815 if (hasFeatureIris) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001816 t.traceBegin("StartIrisSensor");
Kevin Chyn51676d22018-11-05 18:00:43 -08001817 mSystemServiceManager.startService(IrisService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001818 t.traceEnd();
Kevin Chyn51676d22018-11-05 18:00:43 -08001819 }
1820
Kevin Chyna24e9fd2018-08-27 12:39:17 -07001821 if (hasFeatureFingerprint) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001822 t.traceBegin("StartFingerprintSensor");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001823 mSystemServiceManager.startService(FingerprintService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001824 t.traceEnd();
Jeff Brown69b07162013-11-07 00:30:16 -08001825 }
Narayan Kamath1c888f62017-10-30 14:35:15 +00001826
Kevin Chyn51676d22018-11-05 18:00:43 -08001827 if (hasFeatureFace || hasFeatureIris || hasFeatureFingerprint) {
Kevin Chyna24e9fd2018-08-27 12:39:17 -07001828 // Start this service after all biometric services.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001829 t.traceBegin("StartBiometricService");
Kevin Chyn352adfe2018-09-20 22:28:50 -07001830 mSystemServiceManager.startService(BiometricService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001831 t.traceEnd();
Ilya Matyukhine4675b32019-11-07 16:07:19 -08001832
1833 t.traceBegin("StartAuthService");
1834 mSystemServiceManager.startService(AuthService.class);
1835 t.traceEnd();
Kevin Chyna24e9fd2018-08-27 12:39:17 -07001836 }
1837
Ilya Matyukhine4675b32019-11-07 16:07:19 -08001838
Felipe Leme3aad1be2019-05-31 11:43:12 -07001839 t.traceBegin("StartBackgroundDexOptService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001840 try {
1841 BackgroundDexOptService.schedule(context);
1842 } catch (Throwable e) {
1843 reportWtf("starting StartBackgroundDexOptService", e);
1844 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001845 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001846
Michael Kwan7f70fc72018-07-20 16:12:19 -07001847 if (!isWatch) {
Alan Stokesbe9ec972018-12-10 14:07:47 +00001848 // We don't run this on watches as there are no plans to use the data logged
1849 // on watch devices.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001850 t.traceBegin("StartDynamicCodeLoggingService");
Alan Stokesbe9ec972018-12-10 14:07:47 +00001851 try {
1852 DynamicCodeLoggingService.schedule(context);
1853 } catch (Throwable e) {
1854 reportWtf("starting DynamicCodeLoggingService", e);
1855 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001856 t.traceEnd();
Alan Stokesbe9ec972018-12-10 14:07:47 +00001857 }
1858
1859 if (!isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001860 t.traceBegin("StartPruneInstantAppsJobService");
Michael Kwan7f70fc72018-07-20 16:12:19 -07001861 try {
1862 PruneInstantAppsJobService.schedule(context);
1863 } catch (Throwable e) {
1864 reportWtf("StartPruneInstantAppsJobService", e);
1865 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001866 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001867 }
Narayan Kamath1c888f62017-10-30 14:35:15 +00001868
Makoto Onuki55046222016-03-08 10:49:47 -08001869 // LauncherAppsService uses ShortcutService.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001870 t.traceBegin("StartShortcutServiceLifecycle");
Makoto Onuki55046222016-03-08 10:49:47 -08001871 mSystemServiceManager.startService(ShortcutService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001872 t.traceEnd();
Amith Yamasani4f582632014-02-19 14:31:52 -08001873
Felipe Leme3aad1be2019-05-31 11:43:12 -07001874 t.traceBegin("StartLauncherAppsService");
Jeff Brown2c43c332014-06-12 22:38:59 -07001875 mSystemServiceManager.startService(LauncherAppsService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001876 t.traceEnd();
Tony Mak1b708e62017-10-12 10:59:11 +01001877
Felipe Leme3aad1be2019-05-31 11:43:12 -07001878 t.traceBegin("StartCrossProfileAppsService");
Tony Mak1b708e62017-10-12 10:59:11 +01001879 mSystemServiceManager.startService(CrossProfileAppsService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001880 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001881 }
1882
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001883 if (!isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001884 t.traceBegin("StartMediaProjectionManager");
Michael Wrightc39d47a2014-07-08 18:07:36 -07001885 mSystemServiceManager.startService(MediaProjectionManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001886 t.traceEnd();
Michael Wrightc39d47a2014-07-08 18:07:36 -07001887 }
1888
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001889 if (isWatch) {
Damien Bargiacchiae4cb672018-05-30 13:28:15 -07001890 // Must be started before services that depend it, e.g. WearConnectivityService
Felipe Leme3aad1be2019-05-31 11:43:12 -07001891 t.traceBegin("StartWearPowerService");
Damien Bargiacchiae4cb672018-05-30 13:28:15 -07001892 mSystemServiceManager.startService(WEAR_POWER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001893 t.traceEnd();
Damien Bargiacchiae4cb672018-05-30 13:28:15 -07001894
Felipe Leme3aad1be2019-05-31 11:43:12 -07001895 t.traceBegin("StartWearConnectivityService");
Calvin On5555bcc2017-02-21 16:41:43 -08001896 mSystemServiceManager.startService(WEAR_CONNECTIVITY_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001897 t.traceEnd();
Zach Johnsonb82f3b02017-01-16 15:15:25 -08001898
Felipe Leme3aad1be2019-05-31 11:43:12 -07001899 t.traceBegin("StartWearDisplayService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001900 mSystemServiceManager.startService(WEAR_DISPLAY_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001901 t.traceEnd();
Damien Bargiacchiae4cb672018-05-30 13:28:15 -07001902
Felipe Leme3aad1be2019-05-31 11:43:12 -07001903 t.traceBegin("StartWearTimeService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001904 mSystemServiceManager.startService(WEAR_TIME_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001905 t.traceEnd();
Ivan Podogovf9973822017-05-11 15:51:34 +01001906
Narayan Kamath1c888f62017-10-30 14:35:15 +00001907 if (enableLeftyService) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001908 t.traceBegin("StartWearLeftyService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001909 mSystemServiceManager.startService(WEAR_LEFTY_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001910 t.traceEnd();
Vitalii Tomkiv4887e672016-07-21 15:58:24 -07001911 }
Michael Kwan01ad0aa2018-02-28 15:19:04 -08001912
Felipe Leme3aad1be2019-05-31 11:43:12 -07001913 t.traceBegin("StartWearGlobalActionsService");
Michael Kwan01ad0aa2018-02-28 15:19:04 -08001914 mSystemServiceManager.startService(WEAR_GLOBAL_ACTIONS_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001915 t.traceEnd();
Wei Liu48d3b632016-03-29 15:26:48 -07001916 }
1917
Abhijit Adsule95862c52019-10-11 18:24:41 -07001918 if (!mPackageManager.hasSystemFeature(PackageManager.FEATURE_SLICES_DISABLED)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001919 t.traceBegin("StartSliceManagerService");
Jason Monk8f5f7ff2017-10-17 14:12:42 -04001920 mSystemServiceManager.startService(SLICE_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001921 t.traceEnd();
Jason Monk8f5f7ff2017-10-17 14:12:42 -04001922 }
1923
Eino-Ville Talvalae91012b2017-07-10 15:27:24 -07001924 if (!disableCameraService) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001925 t.traceBegin("StartCameraServiceProxy");
Eino-Ville Talvalae91012b2017-07-10 15:27:24 -07001926 mSystemServiceManager.startService(CameraServiceProxy.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001927 t.traceEnd();
Eino-Ville Talvalae91012b2017-07-10 15:27:24 -07001928 }
1929
Nick Felker1bfe59d2017-10-12 13:27:02 -07001930 if (context.getPackageManager().hasSystemFeature(PackageManager.FEATURE_EMBEDDED)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001931 t.traceBegin("StartIoTSystemService");
Nick Felker1bfe59d2017-10-12 13:27:02 -07001932 mSystemServiceManager.startService(IOT_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001933 t.traceEnd();
Nick Felker1bfe59d2017-10-12 13:27:02 -07001934 }
1935
Max Biresffac7722017-10-23 22:59:10 +00001936 // Statsd helper
Felipe Leme3aad1be2019-05-31 11:43:12 -07001937 t.traceBegin("StartStatsCompanionService");
Tej Singhc53ac0a2019-09-20 16:29:13 -07001938 mSystemServiceManager.startService(STATS_COMPANION_SERVICE_LIFECYCLE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001939 t.traceEnd();
Max Biresffac7722017-10-23 22:59:10 +00001940
Joe Onoratoe21ab7e2018-12-18 15:00:25 -08001941 // Incidentd and dumpstated helper
Felipe Leme3aad1be2019-05-31 11:43:12 -07001942 t.traceBegin("StartIncidentCompanionService");
Joe Onoratoe21ab7e2018-12-18 15:00:25 -08001943 mSystemServiceManager.startService(IncidentCompanionService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001944 t.traceEnd();
Joe Onoratoe21ab7e2018-12-18 15:00:25 -08001945
Patrick Baumann876a7332019-06-28 10:28:22 -07001946 if (safeMode) {
1947 mActivityManagerService.enterSafeMode();
1948 }
1949
Ye Wend97e1fd2014-07-24 12:56:45 -07001950 // MMS service broker
Felipe Leme3aad1be2019-05-31 11:43:12 -07001951 t.traceBegin("StartMmsService");
Ye Wend97e1fd2014-07-24 12:56:45 -07001952 mmsService = mSystemServiceManager.startService(MmsServiceBroker.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001953 t.traceEnd();
Ye Wend97e1fd2014-07-24 12:56:45 -07001954
Svet Ganov43574b02017-04-12 09:25:20 -07001955 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_AUTOFILL)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001956 t.traceBegin("StartAutoFillService");
Svet Ganov43574b02017-04-12 09:25:20 -07001957 mSystemServiceManager.startService(AUTO_FILL_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001958 t.traceEnd();
Svet Ganov43574b02017-04-12 09:25:20 -07001959 }
Felipe Leme5381aa42016-10-13 09:02:32 -07001960
Felipe Lemec7436342019-04-10 17:45:12 -07001961 // NOTE: ClipboardService depends on ContentCapture and Autofill
Felipe Leme3aad1be2019-05-31 11:43:12 -07001962 t.traceBegin("StartClipboardService");
Felipe Lemec7436342019-04-10 17:45:12 -07001963 mSystemServiceManager.startService(ClipboardService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001964 t.traceEnd();
Felipe Lemec7436342019-04-10 17:45:12 -07001965
Sudheer Shankaf5b36962019-10-04 16:16:13 -07001966 t.traceBegin("StartBlobStoreManagerService");
1967 mSystemServiceManager.startService(BLOB_STORE_MANAGER_SERVICE_CLASS);
1968 t.traceEnd();
1969
Felipe Leme3aad1be2019-05-31 11:43:12 -07001970 t.traceBegin("AppServiceManager");
Makoto Onukidf7e4812018-09-24 14:31:25 -07001971 mSystemServiceManager.startService(AppBindingService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001972 t.traceEnd();
Makoto Onukidf7e4812018-09-24 14:31:25 -07001973
Dianne Hackborn6af0d502009-09-28 13:25:46 -07001974 // It is now time to start up the app processes...
Joe Onorato30275482009-07-08 17:09:14 -07001975
Felipe Leme3aad1be2019-05-31 11:43:12 -07001976 t.traceBegin("MakeVibratorServiceReady");
Jeff Brown7f6c2312012-04-13 20:38:38 -07001977 try {
1978 vibrator.systemReady();
1979 } catch (Throwable e) {
1980 reportWtf("making Vibrator Service ready", e);
1981 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001982 t.traceEnd();
Jeff Brown7f6c2312012-04-13 20:38:38 -07001983
Felipe Leme3aad1be2019-05-31 11:43:12 -07001984 t.traceBegin("MakeLockSettingsServiceReady");
Dan Morrille4d9a012013-03-28 18:10:43 -07001985 if (lockSettings != null) {
1986 try {
1987 lockSettings.systemReady();
1988 } catch (Throwable e) {
1989 reportWtf("making Lock Settings Service ready", e);
1990 }
Felipe Ramosf35df5b2012-09-18 18:26:27 -03001991 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001992 t.traceEnd();
Felipe Ramosf35df5b2012-09-18 18:26:27 -03001993
Amith Yamasani817ec492013-12-20 13:27:30 -08001994 // Needed by DevicePolicyManager for initialization
Felipe Leme3aad1be2019-05-31 11:43:12 -07001995 t.traceBegin("StartBootPhaseLockSettingsReady");
Felipe Leme137e7812019-06-10 11:38:05 -07001996 mSystemServiceManager.startBootPhase(t, SystemService.PHASE_LOCK_SETTINGS_READY);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001997 t.traceEnd();
Dianne Hackbornd6847842010-01-12 18:14:19 -08001998
Felipe Leme3aad1be2019-05-31 11:43:12 -07001999 t.traceBegin("StartBootPhaseSystemServicesReady");
Felipe Leme137e7812019-06-10 11:38:05 -07002000 mSystemServiceManager.startBootPhase(t, SystemService.PHASE_SYSTEM_SERVICES_READY);
Felipe Leme3aad1be2019-05-31 11:43:12 -07002001 t.traceEnd();
Joe Onorato30275482009-07-08 17:09:14 -07002002
Felipe Leme3aad1be2019-05-31 11:43:12 -07002003 t.traceBegin("MakeWindowManagerServiceReady");
Dianne Hackborn661cd522011-08-22 00:26:20 -07002004 try {
2005 wm.systemReady();
2006 } catch (Throwable e) {
2007 reportWtf("making Window Manager Service ready", e);
2008 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002009 t.traceEnd();
Joe Onoratodc565f42010-10-04 15:27:22 -04002010
Jeff Brownb09abc12011-01-13 21:08:27 -08002011 if (safeMode) {
Jeff Brown4ccb8232014-01-16 22:16:42 -08002012 mActivityManagerService.showSafeModeOverlay();
Jeff Brownb09abc12011-01-13 21:08:27 -08002013 }
2014
Joe Onoratodc565f42010-10-04 15:27:22 -04002015 // Update the configuration for this context by hand, because we're going
2016 // to start using it before the config change done in wm.systemReady() will
2017 // propagate to it.
Andrii Kulian5406e7a2016-10-21 11:55:23 -07002018 final Configuration config = wm.computeNewConfiguration(DEFAULT_DISPLAY);
Joe Onoratodc565f42010-10-04 15:27:22 -04002019 DisplayMetrics metrics = new DisplayMetrics();
Christine Franksea7d71b2018-07-03 14:46:07 -07002020 WindowManager w = (WindowManager) context.getSystemService(Context.WINDOW_SERVICE);
Joe Onoratodc565f42010-10-04 15:27:22 -04002021 w.getDefaultDisplay().getMetrics(metrics);
2022 context.getResources().updateConfiguration(config, metrics);
2023
Alan Viverette395cd012015-08-11 17:27:04 -04002024 // The system context's theme may be configuration-dependent.
2025 final Theme systemTheme = context.getTheme();
2026 if (systemTheme.getChangingConfigurations() != 0) {
2027 systemTheme.rebase();
2028 }
2029
Felipe Leme3aad1be2019-05-31 11:43:12 -07002030 t.traceBegin("MakePowerManagerServiceReady");
Jeff Brownaa202a62012-08-21 22:14:26 -07002031 try {
Jeff Brown6f357d32014-01-15 20:40:55 -08002032 // TODO: use boot phase
Jeff Brown21392762014-06-13 19:00:36 -07002033 mPowerManagerService.systemReady(mActivityManagerService.getAppOpsService());
Jeff Brownaa202a62012-08-21 22:14:26 -07002034 } catch (Throwable e) {
2035 reportWtf("making Power Manager Service ready", e);
2036 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002037 t.traceEnd();
Jeff Brownaa202a62012-08-21 22:14:26 -07002038
Svet Ganov3c499ea2019-07-26 17:45:56 -07002039 // Permission policy service
2040 t.traceBegin("StartPermissionPolicyService");
2041 mSystemServiceManager.startService(PermissionPolicyService.class);
2042 t.traceEnd();
2043
Felipe Leme3aad1be2019-05-31 11:43:12 -07002044 t.traceBegin("MakePackageManagerServiceReady");
Fyodor Kupolovc56106a2017-10-06 17:02:21 -07002045 mPackageManagerService.systemReady();
Felipe Leme3aad1be2019-05-31 11:43:12 -07002046 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002047
Felipe Leme3aad1be2019-05-31 11:43:12 -07002048 t.traceBegin("MakeDisplayManagerServiceReady");
Jeff Brownbd6e1502012-08-28 03:27:37 -07002049 try {
Jeff Brown4ccb8232014-01-16 22:16:42 -08002050 // TODO: use boot phase and communicate these flags some other way
Jeff Brown2c43c332014-06-12 22:38:59 -07002051 mDisplayManagerService.systemReady(safeMode, mOnlyCore);
Jeff Brownbd6e1502012-08-28 03:27:37 -07002052 } catch (Throwable e) {
2053 reportWtf("making Display Manager Service ready", e);
2054 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002055 t.traceEnd();
Jeff Brownbd6e1502012-08-28 03:27:37 -07002056
joonyoung.cho2f30cc12015-04-08 13:56:34 +09002057 mSystemServiceManager.setSafeMode(safeMode);
2058
Daichi Hironoedfcb002017-10-10 17:22:58 +09002059 // Start device specific services
Felipe Leme3aad1be2019-05-31 11:43:12 -07002060 t.traceBegin("StartDeviceSpecificServices");
Daichi Hironoedfcb002017-10-10 17:22:58 +09002061 final String[] classes = mSystemContext.getResources().getStringArray(
2062 R.array.config_deviceSpecificSystemServices);
2063 for (final String className : classes) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07002064 t.traceBegin("StartDeviceSpecificServices " + className);
Daichi Hironoedfcb002017-10-10 17:22:58 +09002065 try {
2066 mSystemServiceManager.startService(className);
2067 } catch (Throwable e) {
2068 reportWtf("starting " + className, e);
2069 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002070 t.traceEnd();
Daichi Hironoedfcb002017-10-10 17:22:58 +09002071 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002072 t.traceEnd();
Daichi Hironoedfcb002017-10-10 17:22:58 +09002073
Felipe Leme3aad1be2019-05-31 11:43:12 -07002074 t.traceBegin("StartBootPhaseDeviceSpecificServicesReady");
Felipe Leme137e7812019-06-10 11:38:05 -07002075 mSystemServiceManager.startBootPhase(t, SystemService.PHASE_DEVICE_SPECIFIC_SERVICES_READY);
Felipe Leme3aad1be2019-05-31 11:43:12 -07002076 t.traceEnd();
Daichi Hironoedfcb002017-10-10 17:22:58 +09002077
Terry Wangecc0d1b2019-10-17 17:05:18 -07002078 t.traceBegin("AppSearchManagerService");
2079 mSystemServiceManager.startService(APP_SEARCH_MANAGER_SERVICE_CLASS);
2080 t.traceEnd();
2081
Dianne Hackborna34f1ad2009-09-02 13:26:28 -07002082 // These are needed to propagate to the runnable below.
Jeff Sharkey350083e2011-06-29 10:45:16 -07002083 final NetworkManagementService networkManagementF = networkManagement;
Jeff Sharkey75279902011-05-24 18:39:45 -07002084 final NetworkStatsService networkStatsF = networkStats;
Jeff Sharkeya4620792011-05-20 15:29:23 -07002085 final NetworkPolicyManagerService networkPolicyF = networkPolicy;
Dianne Hackborna34f1ad2009-09-02 13:26:28 -07002086 final ConnectivityService connectivityF = connectivity;
Bai Taoa58a8752010-07-13 15:32:16 +08002087 final CountryDetectorService countryDetectorF = countryDetector;
Amith Yamasani6734b9f2010-09-13 16:24:08 -07002088 final NetworkTimeUpdateService networkTimeUpdaterF = networkTimeUpdater;
Jeff Brown6ec6f792012-04-17 16:52:41 -07002089 final InputManagerService inputManagerF = inputManager;
Wink Savillea12a7b32012-09-20 10:09:45 -07002090 final TelephonyRegistry telephonyRegistryF = telephonyRegistry;
Jeff Brown69b07162013-11-07 00:30:16 -08002091 final MediaRouterService mediaRouterF = mediaRouter;
Ye Wend97e1fd2014-07-24 12:56:45 -07002092 final MmsServiceBroker mmsServiceF = mmsService;
Nathan Haroldb7282172017-09-11 19:50:19 -07002093 final IpSecService ipSecServiceF = ipSecService;
Keun-young Park4136d2d2017-05-08 14:51:59 -07002094 final WindowManagerService windowManagerF = wm;
Doug Zongkerab5c49c2009-12-04 10:31:43 -08002095
Dianne Hackborna34f1ad2009-09-02 13:26:28 -07002096 // We now tell the activity manager it is okay to run third party
2097 // code. It will call back into us once it has gotten to the state
2098 // where third party code can really run (but before it has actually
2099 // started launching the initial applications), for us to complete our
2100 // initialization.
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002101 mActivityManagerService.systemReady(() -> {
2102 Slog.i(TAG, "Making services ready");
Felipe Leme3aad1be2019-05-31 11:43:12 -07002103 t.traceBegin("StartActivityManagerReadyPhase");
Felipe Leme137e7812019-06-10 11:38:05 -07002104 mSystemServiceManager.startBootPhase(t, SystemService.PHASE_ACTIVITY_MANAGER_READY);
Felipe Leme3aad1be2019-05-31 11:43:12 -07002105 t.traceEnd();
2106 t.traceBegin("StartObservingNativeCrashes");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002107 try {
2108 mActivityManagerService.startObservingNativeCrashes();
2109 } catch (Throwable e) {
2110 reportWtf("observing native crashes", e);
Dianne Hackborna34f1ad2009-09-02 13:26:28 -07002111 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002112 t.traceEnd();
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002113
Keun-young Parkd80e8942017-01-27 11:30:19 -08002114 // No dependency on Webview preparation in system server. But this should
Torne (Richard Coles)ff937ac2017-10-02 17:09:32 -04002115 // be completed before allowing 3rd party
Keun-young Parkd80e8942017-01-27 11:30:19 -08002116 final String WEBVIEW_PREPARATION = "WebViewFactoryPreparation";
2117 Future<?> webviewPrep = null;
Torne (Richard Coles)ff937ac2017-10-02 17:09:32 -04002118 if (!mOnlyCore && mWebViewUpdateService != null) {
Felipe Lemeb68b7692019-10-09 10:43:03 -07002119 webviewPrep = SystemServerInitThreadPool.submit(() -> {
Keun-young Parkd80e8942017-01-27 11:30:19 -08002120 Slog.i(TAG, WEBVIEW_PREPARATION);
Felipe Leme137e7812019-06-10 11:38:05 -07002121 TimingsTraceAndSlog traceLog = TimingsTraceAndSlog.newAsyncLog();
Keun-young Parkd80e8942017-01-27 11:30:19 -08002122 traceLog.traceBegin(WEBVIEW_PREPARATION);
Narayan Kamath97780462017-02-06 20:24:08 +00002123 ConcurrentUtils.waitForFutureNoInterrupt(mZygotePreload, "Zygote preload");
2124 mZygotePreload = null;
Keun-young Parkd80e8942017-01-27 11:30:19 -08002125 mWebViewUpdateService.prepareWebViewInSystemServer();
2126 traceLog.traceEnd();
2127 }, WEBVIEW_PREPARATION);
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002128 }
2129
Keun-young Park067cf3e2017-06-05 12:20:41 -07002130 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_AUTOMOTIVE)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07002131 t.traceBegin("StartCarServiceHelperService");
Steve Paik94292a32018-01-26 17:16:53 -08002132 mSystemServiceManager.startService(CAR_SERVICE_HELPER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07002133 t.traceEnd();
Keun-young Park067cf3e2017-06-05 12:20:41 -07002134 }
2135
Felipe Leme3aad1be2019-05-31 11:43:12 -07002136 t.traceBegin("StartSystemUI");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002137 try {
Keun-young Park4136d2d2017-05-08 14:51:59 -07002138 startSystemUi(context, windowManagerF);
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002139 } catch (Throwable e) {
2140 reportWtf("starting System UI", e);
2141 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002142 t.traceEnd();
Rene Mayrhofer7d6c8e52018-11-28 11:32:40 -08002143 // Enable airplane mode in safe mode. setAirplaneMode() cannot be called
2144 // earlier as it sends broadcasts to other services.
2145 // TODO: This may actually be too late if radio firmware already started leaking
2146 // RF before the respective services start. However, fixing this requires changes
2147 // to radio firmware and interfaces.
2148 if (safeMode) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07002149 t.traceBegin("EnableAirplaneModeInSafeMode");
Rene Mayrhofer7d6c8e52018-11-28 11:32:40 -08002150 try {
2151 connectivityF.setAirplaneMode(true);
2152 } catch (Throwable e) {
2153 reportWtf("enabling Airplane Mode during Safe Mode bootup", e);
2154 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002155 t.traceEnd();
Rene Mayrhofer7d6c8e52018-11-28 11:32:40 -08002156 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002157 t.traceBegin("MakeNetworkManagementServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002158 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002159 if (networkManagementF != null) {
2160 networkManagementF.systemReady();
2161 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002162 } catch (Throwable e) {
2163 reportWtf("making Network Managment Service ready", e);
2164 }
2165 CountDownLatch networkPolicyInitReadySignal = null;
2166 if (networkPolicyF != null) {
2167 networkPolicyInitReadySignal = networkPolicyF
2168 .networkScoreAndNetworkManagementServiceReady();
2169 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002170 t.traceEnd();
2171 t.traceBegin("MakeIpSecServiceReady");
Nathan Haroldb7282172017-09-11 19:50:19 -07002172 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002173 if (ipSecServiceF != null) {
2174 ipSecServiceF.systemReady();
2175 }
Nathan Haroldb7282172017-09-11 19:50:19 -07002176 } catch (Throwable e) {
2177 reportWtf("making IpSec Service ready", e);
2178 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002179 t.traceEnd();
2180 t.traceBegin("MakeNetworkStatsServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002181 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002182 if (networkStatsF != null) {
2183 networkStatsF.systemReady();
2184 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002185 } catch (Throwable e) {
2186 reportWtf("making Network Stats Service ready", e);
2187 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002188 t.traceEnd();
2189 t.traceBegin("MakeConnectivityServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002190 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002191 if (connectivityF != null) {
2192 connectivityF.systemReady();
2193 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002194 } catch (Throwable e) {
2195 reportWtf("making Connectivity Service ready", e);
2196 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002197 t.traceEnd();
2198 t.traceBegin("MakeNetworkPolicyServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002199 try {
2200 if (networkPolicyF != null) {
2201 networkPolicyF.systemReady(networkPolicyInitReadySignal);
2202 }
2203 } catch (Throwable e) {
2204 reportWtf("making Network Policy Service ready", e);
2205 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002206 t.traceEnd();
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002207
Fyodor Kupolovcd824ef2017-02-07 11:25:14 -08002208 // Wait for all packages to be prepared
2209 mPackageManagerService.waitForAppDataPrepared();
2210
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002211 // It is now okay to let the various system services start their
2212 // third party code...
Felipe Leme3aad1be2019-05-31 11:43:12 -07002213 t.traceBegin("PhaseThirdPartyAppsCanStart");
Keun-young Park9b73a542017-02-01 12:09:58 -08002214 // confirm webview completion before starting 3rd party
2215 if (webviewPrep != null) {
2216 ConcurrentUtils.waitForFutureNoInterrupt(webviewPrep, WEBVIEW_PREPARATION);
2217 }
Felipe Leme137e7812019-06-10 11:38:05 -07002218 mSystemServiceManager.startBootPhase(t, SystemService.PHASE_THIRD_PARTY_APPS_CAN_START);
Felipe Leme3aad1be2019-05-31 11:43:12 -07002219 t.traceEnd();
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002220
Felipe Leme3aad1be2019-05-31 11:43:12 -07002221 t.traceBegin("StartNetworkStack");
Remi NGUYEN VANc7054c52019-03-12 11:50:22 +09002222 try {
Chalard Jeand74219b2019-04-01 13:04:07 +09002223 // Note : the network stack is creating on-demand objects that need to send
2224 // broadcasts, which means it currently depends on being started after
2225 // ActivityManagerService.mSystemReady and ActivityManagerService.mProcessesReady
2226 // are set to true. Be careful if moving this to a different place in the
2227 // startup sequence.
Roshan Pius7e6f5f52019-06-27 14:14:40 -07002228 NetworkStackClient.getInstance().start();
Remi NGUYEN VANc7054c52019-03-12 11:50:22 +09002229 } catch (Throwable e) {
2230 reportWtf("starting Network Stack", e);
2231 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002232 t.traceEnd();
Remi NGUYEN VANc7054c52019-03-12 11:50:22 +09002233
markchien0f63ca62019-09-30 14:40:57 +08002234 t.traceBegin("StartTethering");
2235 try {
2236 // Tethering must start after ConnectivityService and NetworkStack.
2237 TetheringManager.getInstance().start();
2238 } catch (Throwable e) {
2239 reportWtf("starting Tethering", e);
2240 }
2241 t.traceEnd();
2242
Felipe Leme3aad1be2019-05-31 11:43:12 -07002243 t.traceBegin("MakeCountryDetectionServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002244 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002245 if (countryDetectorF != null) {
2246 countryDetectorF.systemRunning();
2247 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002248 } catch (Throwable e) {
2249 reportWtf("Notifying CountryDetectorService running", e);
2250 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002251 t.traceEnd();
2252 t.traceBegin("MakeNetworkTimeUpdateReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002253 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002254 if (networkTimeUpdaterF != null) {
2255 networkTimeUpdaterF.systemRunning();
2256 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002257 } catch (Throwable e) {
2258 reportWtf("Notifying NetworkTimeService running", e);
2259 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002260 t.traceEnd();
2261 t.traceBegin("MakeInputManagerServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002262 try {
2263 // TODO(BT) Pass parameter to input manager
Christine Franksea7d71b2018-07-03 14:46:07 -07002264 if (inputManagerF != null) {
2265 inputManagerF.systemRunning();
2266 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002267 } catch (Throwable e) {
2268 reportWtf("Notifying InputManagerService running", e);
2269 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002270 t.traceEnd();
2271 t.traceBegin("MakeTelephonyRegistryReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002272 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002273 if (telephonyRegistryF != null) {
2274 telephonyRegistryF.systemRunning();
2275 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002276 } catch (Throwable e) {
2277 reportWtf("Notifying TelephonyRegistry running", e);
2278 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002279 t.traceEnd();
2280 t.traceBegin("MakeMediaRouterServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002281 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002282 if (mediaRouterF != null) {
2283 mediaRouterF.systemRunning();
2284 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002285 } catch (Throwable e) {
2286 reportWtf("Notifying MediaRouterService running", e);
2287 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002288 t.traceEnd();
2289 t.traceBegin("MakeMmsServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002290 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002291 if (mmsServiceF != null) {
2292 mmsServiceF.systemRunning();
2293 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002294 } catch (Throwable e) {
2295 reportWtf("Notifying MmsService running", e);
2296 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002297 t.traceEnd();
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002298
Felipe Leme3aad1be2019-05-31 11:43:12 -07002299 t.traceBegin("IncidentDaemonReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002300 try {
2301 // TODO: Switch from checkService to getService once it's always
2302 // in the build and should reliably be there.
2303 final IIncidentManager incident = IIncidentManager.Stub.asInterface(
Yi Jinf32af482017-08-11 15:00:49 -07002304 ServiceManager.getService(Context.INCIDENT_SERVICE));
Christine Franksea7d71b2018-07-03 14:46:07 -07002305 if (incident != null) {
2306 incident.systemRunning();
2307 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002308 } catch (Throwable e) {
2309 reportWtf("Notifying incident daemon running", e);
2310 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002311 t.traceEnd();
2312 }, t);
Felipe Leme137e7812019-06-10 11:38:05 -07002313
2314 t.traceEnd(); // startOtherServices
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002315 }
Joe Onoratof3c3c4f2010-10-21 11:09:02 -04002316
Felipe Leme83e8f242019-08-14 16:57:56 +00002317 private boolean deviceHasConfigString(@NonNull Context context, @StringRes int resId) {
2318 String serviceName = context.getString(resId);
2319 return !TextUtils.isEmpty(serviceName);
2320 }
2321
Felipe Leme3aad1be2019-05-31 11:43:12 -07002322 private void startSystemCaptionsManagerService(@NonNull Context context,
2323 @NonNull TimingsTraceAndSlog t) {
Felipe Leme83e8f242019-08-14 16:57:56 +00002324 if (!deviceHasConfigString(context, R.string.config_defaultSystemCaptionsManagerService)) {
Robert Berry835123d2019-03-18 16:33:42 -04002325 Slog.d(TAG, "SystemCaptionsManagerService disabled because resource is not overlaid");
2326 return;
2327 }
2328
Felipe Leme3aad1be2019-05-31 11:43:12 -07002329 t.traceBegin("StartSystemCaptionsManagerService");
Robert Berry835123d2019-03-18 16:33:42 -04002330 mSystemServiceManager.startService(SYSTEM_CAPTIONS_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07002331 t.traceEnd();
Robert Berry835123d2019-03-18 16:33:42 -04002332 }
2333
Felipe Leme3aad1be2019-05-31 11:43:12 -07002334 private void startContentCaptureService(@NonNull Context context,
2335 @NonNull TimingsTraceAndSlog t) {
Felipe Leme14ef4612019-02-07 12:24:38 -08002336 // First check if it was explicitly enabled by DeviceConfig
Perumaal S70738732019-02-20 15:58:40 -08002337 boolean explicitlyEnabled = false;
Felipe Leme14ef4612019-02-07 12:24:38 -08002338 String settings = DeviceConfig.getProperty(DeviceConfig.NAMESPACE_CONTENT_CAPTURE,
2339 ContentCaptureManager.DEVICE_CONFIG_PROPERTY_SERVICE_EXPLICITLY_ENABLED);
2340 if (settings != null && !settings.equalsIgnoreCase("default")) {
Perumaal S70738732019-02-20 15:58:40 -08002341 explicitlyEnabled = Boolean.parseBoolean(settings);
2342 if (explicitlyEnabled) {
Felipe Leme70bcf382019-01-24 14:55:03 -08002343 Slog.d(TAG, "ContentCaptureService explicitly enabled by DeviceConfig");
Felipe Leme14ef4612019-02-07 12:24:38 -08002344 } else {
2345 Slog.d(TAG, "ContentCaptureService explicitly disabled by DeviceConfig");
Felipe Leme658c8e42018-11-30 12:49:45 -08002346 return;
Felipe Leme14ef4612019-02-07 12:24:38 -08002347 }
Felipe Leme658c8e42018-11-30 12:49:45 -08002348 }
Felipe Leme14ef4612019-02-07 12:24:38 -08002349
2350 // Then check if OEM overlaid the resource that defines the service.
Perumaal S70738732019-02-20 15:58:40 -08002351 if (!explicitlyEnabled) {
Felipe Leme83e8f242019-08-14 16:57:56 +00002352 if (!deviceHasConfigString(context, R.string.config_defaultContentCaptureService)) {
Felipe Leme14ef4612019-02-07 12:24:38 -08002353 Slog.d(TAG, "ContentCaptureService disabled because resource is not overlaid");
2354 return;
2355 }
2356 }
2357
Felipe Leme3aad1be2019-05-31 11:43:12 -07002358 t.traceBegin("StartContentCaptureService");
Felipe Leme749b8892018-12-03 16:30:30 -08002359 mSystemServiceManager.startService(CONTENT_CAPTURE_MANAGER_SERVICE_CLASS);
Felipe Leme141864d2019-02-27 17:01:51 -08002360
2361 ContentCaptureManagerInternal ccmi =
2362 LocalServices.getService(ContentCaptureManagerInternal.class);
2363 if (ccmi != null && mActivityManagerService != null) {
2364 mActivityManagerService.setContentCaptureManager(ccmi);
2365 }
2366
Felipe Leme3aad1be2019-05-31 11:43:12 -07002367 t.traceEnd();
Felipe Leme658c8e42018-11-30 12:49:45 -08002368 }
2369
Felipe Leme3aad1be2019-05-31 11:43:12 -07002370 private void startAttentionService(@NonNull Context context, @NonNull TimingsTraceAndSlog t) {
Alex Salo7a6e3a62019-02-27 15:08:15 -08002371 if (!AttentionManagerService.isServiceConfigured(context)) {
2372 Slog.d(TAG, "AttentionService is not configured on this device");
2373 return;
2374 }
2375
Felipe Leme3aad1be2019-05-31 11:43:12 -07002376 t.traceBegin("StartAttentionManagerService");
Alex Salo7a6e3a62019-02-27 15:08:15 -08002377 mSystemServiceManager.startService(AttentionManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07002378 t.traceEnd();
Alex Salo7a6e3a62019-02-27 15:08:15 -08002379 }
2380
Robert Berry835123d2019-03-18 16:33:42 -04002381 private static void startSystemUi(Context context, WindowManagerService windowManager) {
Joe Onoratof3c3c4f2010-10-21 11:09:02 -04002382 Intent intent = new Intent();
2383 intent.setComponent(new ComponentName("com.android.systemui",
Christine Franksea7d71b2018-07-03 14:46:07 -07002384 "com.android.systemui.SystemUIService"));
Jeff Sharkey2f3e3532015-12-21 14:16:43 -07002385 intent.addFlags(Intent.FLAG_DEBUG_TRIAGED_MISSING);
Dianne Hackborn40e9f292012-11-27 19:12:23 -08002386 //Slog.d(TAG, "Starting service: " + intent);
Xiaohui Chen70f6c382015-04-28 14:21:43 -07002387 context.startServiceAsUser(intent, UserHandle.SYSTEM);
Keun-young Park4136d2d2017-05-08 14:51:59 -07002388 windowManager.onSystemUiStarted();
Joe Onoratof3c3c4f2010-10-21 11:09:02 -04002389 }
Nicolas Geoffray27c07372015-11-05 16:54:09 +00002390}