blob: 39d840f95f864607fe1cca53ee0050a69a0d02e0 [file] [log] [blame]
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2006 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server;
18
Felipe Lemee348dc32018-11-05 12:35:29 -080019import static android.os.IServiceManager.DUMP_FLAG_PRIORITY_CRITICAL;
20import static android.os.IServiceManager.DUMP_FLAG_PRIORITY_HIGH;
21import static android.os.IServiceManager.DUMP_FLAG_PRIORITY_NORMAL;
22import static android.os.IServiceManager.DUMP_FLAG_PROTO;
23import static android.view.Display.DEFAULT_DISPLAY;
24
Felipe Leme3aad1be2019-05-31 11:43:12 -070025import static com.android.server.utils.TimingsTraceAndSlog.SYSTEM_SERVER_TIMING_TAG;
26
Felipe Leme658c8e42018-11-30 12:49:45 -080027import android.annotation.NonNull;
Felipe Leme83e8f242019-08-14 16:57:56 +000028import android.annotation.StringRes;
Jeff Brown6f357d32014-01-15 20:40:55 -080029import android.app.ActivityThread;
Andrei Oneaf965d152019-10-30 18:08:24 +000030import android.app.AppCompatCallbacks;
Adam Lesinskief2ea1f2013-12-05 16:48:06 -080031import android.app.INotificationManager;
Adam Lesinski0debc9a2014-07-16 19:09:13 -070032import android.app.usage.UsageStatsManagerInternal;
Joe Onoratof3c3c4f2010-10-21 11:09:02 -040033import android.content.ComponentName;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080034import android.content.ContentResolver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080035import android.content.Context;
Joe Onoratof3c3c4f2010-10-21 11:09:02 -040036import android.content.Intent;
Jeff Sharkeyb0613dc2018-02-27 14:38:04 -070037import android.content.pm.PackageItemInfo;
Matthew Xie1dd01eb32013-04-26 12:37:54 -070038import android.content.pm.PackageManager;
Joe Onoratodc565f42010-10-04 15:27:22 -040039import android.content.res.Configuration;
Alan Viverettee54d2452015-05-06 10:41:43 -070040import android.content.res.Resources.Theme;
Fyodor Kupolov7fcd6592017-12-15 11:56:36 -080041import android.database.sqlite.SQLiteCompatibilityWalFlags;
Makoto Onuki50e00c82018-08-07 15:57:13 -070042import android.database.sqlite.SQLiteGlobal;
Winson72dbe7e2019-04-29 14:55:30 -070043import android.hardware.display.DisplayManagerInternal;
Roshan Pius7e6f5f52019-06-27 14:14:40 -070044import android.net.ConnectivityModuleConnector;
Remi NGUYEN VAN310da6f2019-02-14 18:04:20 +090045import android.net.NetworkStackClient;
Roshan Pius6f5338d2019-06-14 14:37:14 -070046import android.net.wifi.WifiStackClient;
Jeff Sharkeyd136e512016-03-09 22:30:56 -070047import android.os.BaseBundle;
Jeff Sharkey0a17db12016-11-04 11:23:46 -060048import android.os.Binder;
Jeff Sharkey55687722014-04-09 18:07:19 -070049import android.os.Build;
Jeff Sharkey48749fc2013-04-19 13:25:04 -070050import android.os.Environment;
Jeff Brown6f357d32014-01-15 20:40:55 -080051import android.os.FactoryTest;
Tao Bao4fd6c262016-01-19 14:22:24 -080052import android.os.FileUtils;
Joe Onorato1754d742016-11-21 17:51:35 -080053import android.os.IIncidentManager;
Jeff Hamilton35eef702010-06-09 15:45:18 -050054import android.os.Looper;
Alison Cichowlasf0afd8c2017-07-31 11:24:34 -040055import android.os.Message;
Fyodor Kupolova81b8c02017-11-13 15:51:03 -080056import android.os.Parcel;
Tao Bao4fd6c262016-01-19 14:22:24 -080057import android.os.PowerManager;
Narayan Kamath97780462017-02-06 20:24:08 +000058import android.os.Process;
Jeff Hamilton35eef702010-06-09 15:45:18 -050059import android.os.ServiceManager;
Brad Fitzpatrickc74a1b442010-09-10 16:03:29 -070060import android.os.StrictMode;
Jeff Hamilton35eef702010-06-09 15:45:18 -050061import android.os.SystemClock;
62import android.os.SystemProperties;
Amith Yamasanicd757062012-10-19 18:23:52 -070063import android.os.UserHandle;
Sudheer Shanka2250d562016-11-07 15:41:02 -080064import android.os.storage.IStorageManager;
Felipe Leme70bcf382019-01-24 14:55:03 -080065import android.provider.DeviceConfig;
Felipe Leme658c8e42018-11-30 12:49:45 -080066import android.provider.Settings;
Inseob Kimc1246e62018-11-08 13:13:54 +090067import android.sysprop.VoldProperties;
Felipe Leme658c8e42018-11-30 12:49:45 -080068import android.text.TextUtils;
Joe Onoratodc565f42010-10-04 15:27:22 -040069import android.util.DisplayMetrics;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080070import android.util.EventLog;
Joe Onorato8a9b2202010-02-26 18:56:32 -080071import android.util.Slog;
Brad Fitzpatrick5fdc0c72010-10-12 13:12:18 -070072import android.view.WindowManager;
Felipe Leme14ef4612019-02-07 12:24:38 -080073import android.view.contentcapture.ContentCaptureManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080074
Dan Morrille4d9a012013-03-28 18:10:43 -070075import com.android.internal.R;
Fyodor Kupolov8d3e82b2016-11-10 17:58:50 -080076import com.android.internal.logging.MetricsLogger;
Geoffrey Pitschaf759c52017-02-15 09:35:38 -050077import com.android.internal.notification.SystemNotificationChannels;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -070078import com.android.internal.os.BinderInternal;
Keun-young Parkd80e8942017-01-27 11:30:19 -080079import com.android.internal.util.ConcurrentUtils;
Tony Makb0d22622018-01-18 12:49:49 +000080import com.android.internal.util.EmergencyAffordanceManager;
Jeff Sharkeyd136e512016-03-09 22:30:56 -070081import com.android.internal.widget.ILockSettings;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -070082import com.android.server.am.ActivityManagerService;
Makoto Onukidf7e4812018-09-24 14:31:25 -070083import com.android.server.appbinding.AppBindingService;
Alex Salob81472f2018-12-12 14:44:28 -080084import com.android.server.attention.AttentionManagerService;
John Spurlock61560172015-02-06 19:46:04 -050085import com.android.server.audio.AudioService;
Ilya Matyukhine4675b32019-11-07 16:07:19 -080086import com.android.server.biometrics.AuthService;
Kevin Chyn352adfe2018-09-20 22:28:50 -070087import com.android.server.biometrics.BiometricService;
Felipe Lemee348dc32018-11-05 12:35:29 -080088import com.android.server.biometrics.face.FaceService;
89import com.android.server.biometrics.fingerprint.FingerprintService;
Kevin Chyn51676d22018-11-05 18:00:43 -080090import com.android.server.biometrics.iris.IrisService;
Tony Makb0d22622018-01-18 12:49:49 +000091import com.android.server.broadcastradio.BroadcastRadioService;
Wei Wanged7f5482017-02-21 11:35:10 -080092import com.android.server.camera.CameraServiceProxy;
Amith Yamasani30f8eb42013-11-06 14:54:50 -080093import com.android.server.clipboard.ClipboardService;
Andrei Oneacf109842019-07-17 19:03:10 +010094import com.android.server.compat.PlatformCompat;
atrost87488352019-10-10 19:27:31 +010095import com.android.server.compat.PlatformCompatNative;
Hugo Benichieab511b2016-09-09 09:23:47 +090096import com.android.server.connectivity.IpConnectivityMetrics;
Felipe Leme141864d2019-02-27 17:01:51 -080097import com.android.server.contentcapture.ContentCaptureManagerInternal;
Allen Hair1f556e32016-11-11 15:42:50 -080098import com.android.server.coverage.CoverageService;
Adam Lesinski2c8d67c2014-04-23 13:46:21 -070099import com.android.server.devicepolicy.DevicePolicyManagerService;
Tony Makb0d22622018-01-18 12:49:49 +0000100import com.android.server.display.DisplayManagerService;
Christine Franks0ada2772019-02-25 13:54:57 -0800101import com.android.server.display.color.ColorDisplayService;
Jeff Browncef440f2012-09-25 18:58:48 -0700102import com.android.server.dreams.DreamManagerService;
Selim Cinek705442f2016-09-13 16:02:33 -0700103import com.android.server.emergency.EmergencyAffordanceService;
Peiyong Linfd71c202019-01-23 15:29:59 -0800104import com.android.server.gpu.GpuService;
Jungshik Jang0792d372014-04-23 17:57:26 +0900105import com.android.server.hdmi.HdmiControlService;
Joe Onoratoe21ab7e2018-12-18 15:00:25 -0800106import com.android.server.incident.IncidentCompanionService;
Jeff Brown6ec6f792012-04-17 16:52:41 -0700107import com.android.server.input.InputManagerService;
Yohei Yukawa603f4d02018-09-11 15:04:58 -0700108import com.android.server.inputmethod.InputMethodManagerService;
Tarandeep Singh07b318b2019-07-17 11:12:04 -0700109import com.android.server.inputmethod.InputMethodSystemProperty;
Yohei Yukawabae5bea2018-11-12 15:08:30 -0800110import com.android.server.inputmethod.MultiClientInputMethodManagerService;
Adam Lesinskief2ea1f2013-12-05 16:48:06 -0800111import com.android.server.lights.LightsService;
Jeff Sharkeyd136e512016-03-09 22:30:56 -0700112import com.android.server.media.MediaResourceMonitorService;
Jeff Brown69b07162013-11-07 00:30:16 -0800113import com.android.server.media.MediaRouterService;
RoboErik01fe6612014-02-13 14:19:04 -0800114import com.android.server.media.MediaSessionService;
Michael Wrightc39d47a2014-07-08 18:07:36 -0700115import com.android.server.media.projection.MediaProjectionManagerService;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700116import com.android.server.net.NetworkPolicyManagerService;
Jeff Sharkey75279902011-05-24 18:39:45 -0700117import com.android.server.net.NetworkStatsService;
Ricky Wai1a6e6672017-10-27 14:46:01 +0100118import com.android.server.net.watchlist.NetworkWatchlistService;
Adam Lesinskief2ea1f2013-12-05 16:48:06 -0800119import com.android.server.notification.NotificationManagerService;
Andrew Scull5d7027d2017-04-12 11:46:27 +0100120import com.android.server.oemlock.OemLockService;
MÃ¥rten Kongstad2e0d0f32016-06-02 09:35:31 +0200121import com.android.server.om.OverlayManagerService;
Nandana Duttd11850c2018-12-12 17:26:57 +0000122import com.android.server.os.BugreportManagerService;
Svet Ganov37e43272016-09-09 16:01:32 -0700123import com.android.server.os.DeviceIdentifiersPolicyService;
Jeff Sharkey7a96c392012-11-15 14:01:46 -0800124import com.android.server.os.SchedulingPolicyService;
Calin Juravle91d40f12017-03-15 18:38:57 -0700125import com.android.server.pm.BackgroundDexOptService;
Tony Makb0d22622018-01-18 12:49:49 +0000126import com.android.server.pm.CrossProfileAppsService;
Alan Stokesbe9ec972018-12-10 14:07:47 +0000127import com.android.server.pm.DynamicCodeLoggingService;
Jeff Brownf69c8122012-09-12 17:00:34 -0700128import com.android.server.pm.Installer;
Amith Yamasani4f582632014-02-19 14:31:52 -0800129import com.android.server.pm.LauncherAppsService;
Andreas Gampea8908752015-11-10 08:58:14 -0800130import com.android.server.pm.OtaDexoptService;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700131import com.android.server.pm.PackageManagerService;
Makoto Onuki6f7362d92016-03-04 13:39:41 -0800132import com.android.server.pm.ShortcutService;
Amith Yamasani258848d2012-08-10 17:06:33 -0700133import com.android.server.pm.UserManagerService;
Svet Ganovd8eb8b22019-04-05 18:52:08 -0700134import com.android.server.policy.PermissionPolicyService;
Wale Ogunwaleb699ce02016-07-18 12:05:30 -0700135import com.android.server.policy.PhoneWindowManager;
Eugene Susla4ab95112018-12-17 14:45:11 -0800136import com.android.server.policy.role.LegacyRoleResolutionPolicy;
Jeff Brown4f8ecd82012-06-18 18:29:13 -0700137import com.android.server.power.PowerManagerService;
138import com.android.server.power.ShutdownThread;
Wei Wangbad7c202018-11-01 11:57:39 -0700139import com.android.server.power.ThermalManagerService;
Kenny Rootf96836e2019-11-19 17:11:34 -0800140import com.android.server.recoverysystem.RecoverySystemService;
Amith Yamasanif20d6402014-05-24 15:34:37 -0700141import com.android.server.restrictions.RestrictionsManagerService;
Eugene Susla6d4922722018-11-08 16:25:28 -0800142import com.android.server.role.RoleManagerService;
Richard Uhlerb29f1452018-09-12 16:38:15 +0100143import com.android.server.rollback.RollbackManagerService;
Janis Danisevskis8ff1e192016-06-03 11:31:55 -0700144import com.android.server.security.KeyAttestationApplicationIdProviderService;
Robin Lee13935492017-03-23 15:28:37 +0000145import com.android.server.security.KeyChainSystemService;
Mathew Inwood4e2ed6a2018-11-26 15:31:16 +0000146import com.android.server.signedconfig.SignedConfigService;
Arunesh Mishraa772e5f2016-01-25 10:33:11 -0800147import com.android.server.soundtrigger.SoundTriggerService;
Adam Lesinskief2ea1f2013-12-05 16:48:06 -0800148import com.android.server.statusbar.StatusBarManagerService;
149import com.android.server.storage.DeviceStorageMonitorService;
Santos Cordon5d2c1e62014-11-21 15:20:15 -0800150import com.android.server.telecom.TelecomLoaderService;
William Hestera96d3d32018-12-19 13:14:51 -0800151import com.android.server.testharness.TestHarnessModeService;
Abodunrinwa Tokid32906c2018-01-18 04:34:44 -0800152import com.android.server.textclassifier.TextClassificationManagerService;
Yohei Yukawaeb1e8042018-09-12 14:02:00 -0700153import com.android.server.textservices.TextServicesManagerService;
Adrian Roos82142c22014-03-27 14:56:59 +0100154import com.android.server.trust.TrustManagerService;
Jae Seo39570912014-02-20 18:23:25 -0800155import com.android.server.tv.TvInputManagerService;
Fyodor Kupolov3235e0c2016-11-17 11:44:49 -0800156import com.android.server.tv.TvRemoteService;
Adam Lesinskief2ea1f2013-12-05 16:48:06 -0800157import com.android.server.twilight.TwilightService;
Wale Ogunwale6d50dcc2018-07-21 23:00:40 -0700158import com.android.server.uri.UriGrantsManagerService;
Adam Lesinski0debc9a2014-07-16 19:09:13 -0700159import com.android.server.usage.UsageStatsService;
Felipe Leme3aad1be2019-05-31 11:43:12 -0700160import com.android.server.utils.TimingsTraceAndSlog;
Ruben Brunkdd18a0b2015-12-04 16:16:31 -0800161import com.android.server.vr.VrManagerService;
Torne (Richard Coles)08cfaf62014-05-08 16:07:05 +0100162import com.android.server.webkit.WebViewUpdateService;
Felipe Lemee348dc32018-11-05 12:35:29 -0800163import com.android.server.wm.ActivityTaskManagerService;
Wale Ogunwale1f5e53d2018-11-05 05:12:46 -0800164import com.android.server.wm.WindowManagerGlobalLock;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700165import com.android.server.wm.WindowManagerService;
166
167import dalvik.system.VMRuntime;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700168
Alex Salob81472f2018-12-12 14:44:28 -0800169import com.google.android.startop.iorap.IorapForwardingService;
170
Tao Bao4fd6c262016-01-19 14:22:24 -0800171import java.io.File;
172import java.io.IOException;
Narayan Kamathbf882052015-08-11 15:40:34 +0100173import java.util.Locale;
Bob Leee5408332009-09-04 18:31:17 -0700174import java.util.Timer;
Fyodor Kupolov311b9fa2016-12-02 16:24:35 -0800175import java.util.concurrent.CountDownLatch;
Keun-young Parkd80e8942017-01-27 11:30:19 -0800176import java.util.concurrent.Future;
Bob Leee5408332009-09-04 18:31:17 -0700177
Jeff Brown6f357d32014-01-15 20:40:55 -0800178public final class SystemServer {
Christine Franksea7d71b2018-07-03 14:46:07 -0700179
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800180 private static final String TAG = "SystemServer";
Jeff Brown6f357d32014-01-15 20:40:55 -0800181
Ben Komalo553acf02011-09-19 14:25:28 -0700182 private static final String ENCRYPTING_STATE = "trigger_restart_min_framework";
Ben Komalo3573d402011-09-23 15:08:24 -0700183 private static final String ENCRYPTED_STATE = "1";
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800184
Jeff Brown6f357d32014-01-15 20:40:55 -0800185 private static final long SNAPSHOT_INTERVAL = 60 * 60 * 1000; // 1hr
186
187 // The earliest supported time. We pick one day into 1970, to
188 // give any timezone code room without going into negative time.
189 private static final long EARLIEST_SUPPORTED_TIME = 86400 * 1000;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800190
Makoto Onuki712886f2018-04-27 15:22:50 -0700191 private static final long SLOW_DISPATCH_THRESHOLD_MS = 100;
192 private static final long SLOW_DELIVERY_THRESHOLD_MS = 200;
193
Amith Yamasani817ec492013-12-20 13:27:30 -0800194 /*
195 * Implementation class names. TODO: Move them to a codegen class or load
196 * them from the build system somehow.
197 */
198 private static final String BACKUP_MANAGER_SERVICE_CLASS =
Annie Meng384230f2018-11-28 10:58:08 +0000199 "com.android.server.backup.BackupManagerService$Lifecycle";
Amith Yamasani817ec492013-12-20 13:27:30 -0800200 private static final String APPWIDGET_SERVICE_CLASS =
201 "com.android.server.appwidget.AppWidgetService";
Dianne Hackborn91097de2014-04-04 18:02:06 -0700202 private static final String VOICE_RECOGNITION_MANAGER_SERVICE_CLASS =
203 "com.android.server.voiceinteraction.VoiceInteractionManagerService";
Amith Yamasani817ec492013-12-20 13:27:30 -0800204 private static final String PRINT_MANAGER_SERVICE_CLASS =
205 "com.android.server.print.PrintManagerService";
Eugene Susla6ed45d82017-01-22 13:52:51 -0800206 private static final String COMPANION_DEVICE_MANAGER_SERVICE_CLASS =
Eugene Susla0d3dd122017-04-18 10:56:37 -0700207 "com.android.server.companion.CompanionDeviceManagerService";
Tej Singhc53ac0a2019-09-20 16:29:13 -0700208 private static final String STATS_COMPANION_SERVICE_LIFECYCLE_CLASS =
209 "com.android.server.stats.StatsCompanionService$Lifecycle";
Adam Lesinski2cb6c602014-02-14 17:19:56 -0800210 private static final String USB_SERVICE_CLASS =
211 "com.android.server.usb.UsbService$Lifecycle";
Mike Lockwood5781cd52015-03-27 13:23:41 -0700212 private static final String MIDI_SERVICE_CLASS =
213 "com.android.server.midi.MidiService$Lifecycle";
Adam Lesinskif542a332014-02-19 12:29:58 -0800214 private static final String WIFI_SERVICE_CLASS =
215 "com.android.server.wifi.WifiService";
Etan Cohen04133272016-10-26 11:22:06 -0700216 private static final String WIFI_AWARE_SERVICE_CLASS =
217 "com.android.server.wifi.aware.WifiAwareService";
Adam Lesinskif542a332014-02-19 12:29:58 -0800218 private static final String WIFI_P2P_SERVICE_CLASS =
219 "com.android.server.wifi.p2p.WifiP2pService";
Robert Quattlebaum87a71042017-05-15 15:45:20 -0700220 private static final String LOWPAN_SERVICE_CLASS =
221 "com.android.server.lowpan.LowpanService";
Lorenzo Colittif9ff2c92014-05-21 16:32:11 -0700222 private static final String ETHERNET_SERVICE_CLASS =
223 "com.android.server.ethernet.EthernetService";
Christopher Tate7060b042014-06-09 19:50:00 -0700224 private static final String JOB_SCHEDULER_SERVICE_CLASS =
225 "com.android.server.job.JobSchedulerService";
Jim Miller4f93c582016-01-27 19:05:43 -0800226 private static final String LOCK_SETTINGS_SERVICE_CLASS =
Andrew Scull507d11c2017-05-03 17:19:01 +0100227 "com.android.server.locksettings.LockSettingsService$Lifecycle";
Sudheer Shanka2250d562016-11-07 15:41:02 -0800228 private static final String STORAGE_MANAGER_SERVICE_CLASS =
229 "com.android.server.StorageManagerService$Lifecycle";
Jeff Sharkeye8cece92017-01-04 11:33:33 -0700230 private static final String STORAGE_STATS_SERVICE_CLASS =
231 "com.android.server.usage.StorageStatsService$Lifecycle";
Jeff Sharkey4175be22016-01-09 14:57:45 -0700232 private static final String SEARCH_MANAGER_SERVICE_CLASS =
233 "com.android.server.search.SearchManagerService$Lifecycle";
Wei Liud699cf82016-03-25 16:32:10 -0700234 private static final String THERMAL_OBSERVER_CLASS =
235 "com.google.android.clockwork.ThermalObserver";
Calvin On5555bcc2017-02-21 16:41:43 -0800236 private static final String WEAR_CONNECTIVITY_SERVICE_CLASS =
Calvin On3cda1cf2018-02-14 13:57:07 -0800237 "com.android.clockwork.connectivity.WearConnectivityService";
Damien Bargiacchiae4cb672018-05-30 13:28:15 -0700238 private static final String WEAR_POWER_SERVICE_CLASS =
239 "com.android.clockwork.power.WearPowerService";
Chris Phoenixbc839a32017-10-21 14:46:15 -0700240 private static final String WEAR_SIDEKICK_SERVICE_CLASS =
241 "com.google.android.clockwork.sidekick.SidekickService";
Julius D'souza069f46c2017-03-22 13:27:00 -0700242 private static final String WEAR_DISPLAY_SERVICE_CLASS =
243 "com.google.android.clockwork.display.WearDisplayService";
Ivan Podogovf9973822017-05-11 15:51:34 +0100244 private static final String WEAR_LEFTY_SERVICE_CLASS =
245 "com.google.android.clockwork.lefty.WearLeftyService";
Damien Bargiacchi2d92eeb2016-04-07 14:01:03 -0700246 private static final String WEAR_TIME_SERVICE_CLASS =
247 "com.google.android.clockwork.time.WearTimeService";
Michael Kwan01ad0aa2018-02-28 15:19:04 -0800248 private static final String WEAR_GLOBAL_ACTIONS_SERVICE_CLASS =
249 "com.android.clockwork.globalactions.GlobalActionsService";
Jeff Sharkey1cab76a2016-04-12 18:23:31 -0600250 private static final String ACCOUNT_SERVICE_CLASS =
251 "com.android.server.accounts.AccountManagerService$Lifecycle";
Jeff Sharkeya3ebfec2016-04-04 08:58:04 -0600252 private static final String CONTENT_SERVICE_CLASS =
253 "com.android.server.content.ContentService$Lifecycle";
Jeff Sharkey1cab76a2016-04-12 18:23:31 -0600254 private static final String WALLPAPER_SERVICE_CLASS =
255 "com.android.server.wallpaper.WallpaperManagerService$Lifecycle";
Felipe Leme5381aa42016-10-13 09:02:32 -0700256 private static final String AUTO_FILL_MANAGER_SERVICE_CLASS =
Svet Ganov2f8fb1f2017-03-13 00:21:04 -0700257 "com.android.server.autofill.AutofillManagerService";
Felipe Leme749b8892018-12-03 16:30:30 -0800258 private static final String CONTENT_CAPTURE_MANAGER_SERVICE_CLASS =
259 "com.android.server.contentcapture.ContentCaptureManagerService";
Robert Berry835123d2019-03-18 16:33:42 -0400260 private static final String SYSTEM_CAPTIONS_MANAGER_SERVICE_CLASS =
261 "com.android.server.systemcaptions.SystemCaptionsManagerService";
Neil Fuller328532a2017-03-16 18:32:21 +0000262 private static final String TIME_ZONE_RULES_MANAGER_SERVICE_CLASS =
263 "com.android.server.timezone.RulesManagerService$Lifecycle";
Nick Felker1bfe59d2017-10-12 13:27:02 -0700264 private static final String IOT_SERVICE_CLASS =
Ralph Nathan090c2c32018-04-19 22:19:03 -0700265 "com.android.things.server.IoTSystemService";
Jason Monk8f5f7ff2017-10-17 14:12:42 -0400266 private static final String SLICE_MANAGER_SERVICE_CLASS =
267 "com.android.server.slice.SliceManagerService$Lifecycle";
Steve Paik94292a32018-01-26 17:16:53 -0800268 private static final String CAR_SERVICE_HELPER_SERVICE_CLASS =
269 "com.android.internal.car.CarServiceHelperService";
Neil Fullerfeeee682018-05-30 14:35:24 +0100270 private static final String TIME_DETECTOR_SERVICE_CLASS =
271 "com.android.server.timedetector.TimeDetectorService$Lifecycle";
Rhed Jao8a39cef2018-07-18 11:43:33 +0800272 private static final String ACCESSIBILITY_MANAGER_SERVICE_CLASS =
273 "com.android.server.accessibility.AccessibilityManagerService$Lifecycle";
Kenny Rootf74bfde2018-01-18 15:42:48 -0800274 private static final String ADB_SERVICE_CLASS =
275 "com.android.server.adb.AdbService$Lifecycle";
Sunny Goyal54e91342018-11-14 11:59:02 -0800276 private static final String APP_PREDICTION_MANAGER_SERVICE_CLASS =
277 "com.android.server.appprediction.AppPredictionManagerService";
Winson Chung3fb0f252019-01-08 17:41:55 -0800278 private static final String CONTENT_SUGGESTIONS_SERVICE_CLASS =
279 "com.android.server.contentsuggestions.ContentSuggestionsManagerService";
Makoto Onuki52c24b32019-08-23 10:18:28 -0700280 private static final String DEVICE_IDLE_CONTROLLER_CLASS =
281 "com.android.server.DeviceIdleController";
Sudheer Shankaf5b36962019-10-04 16:16:13 -0700282 private static final String BLOB_STORE_MANAGER_SERVICE_CLASS =
283 "com.android.server.blob.BlobStoreManagerService";
Terry Wangecc0d1b2019-10-17 17:05:18 -0700284 private static final String APP_SEARCH_MANAGER_SERVICE_CLASS =
285 "com.android.server.appsearch.AppSearchManagerService";
Andres Morales68d4acd2014-07-01 19:40:41 -0700286 private static final String PERSISTENT_DATA_BLOCK_PROP = "ro.frp.pst";
Amith Yamasani817ec492013-12-20 13:27:30 -0800287
Tao Bao4fd6c262016-01-19 14:22:24 -0800288 private static final String UNCRYPT_PACKAGE_FILE = "/cache/recovery/uncrypt_file";
289 private static final String BLOCK_MAP_FILE = "/cache/recovery/block.map";
290
David Andersona032a2b2019-02-07 14:07:23 -0800291 private static final String GSI_RUNNING_PROP = "ro.gsid.image_running";
292
Tim Murrayeef4a3d2016-04-19 14:14:20 -0700293 // maximum number of binder threads used for system_server
294 // will be higher than the system default
295 private static final int sMaxBinderThreads = 31;
296
Alan Viveretteba398ea2015-12-16 15:28:23 -0500297 /**
Christine Franksea7d71b2018-07-03 14:46:07 -0700298 * Default theme used by the system context. This is used to style system-provided dialogs, such
299 * as the Power Off dialog, and other visual content.
Alan Viveretteba398ea2015-12-16 15:28:23 -0500300 */
301 private static final int DEFAULT_SYSTEM_THEME =
Michael Kwan9c7274c2016-06-13 12:48:55 -0700302 com.android.internal.R.style.Theme_DeviceDefault_System;
Alan Viveretteba398ea2015-12-16 15:28:23 -0500303
Jeff Brown6f357d32014-01-15 20:40:55 -0800304 private final int mFactoryTestMode;
305 private Timer mProfilerSnapshotTimer;
306
307 private Context mSystemContext;
308 private SystemServiceManager mSystemServiceManager;
309
Jeff Brown4ccb8232014-01-16 22:16:42 -0800310 // TODO: remove all of these references by improving dependency resolution and boot phases
Jeff Brown4ccb8232014-01-16 22:16:42 -0800311 private PowerManagerService mPowerManagerService;
312 private ActivityManagerService mActivityManagerService;
Wale Ogunwale1f5e53d2018-11-05 05:12:46 -0800313 private WindowManagerGlobalLock mWindowManagerGlobalLock;
Gustav Sennton6258dcd2015-10-30 19:25:37 +0000314 private WebViewUpdateService mWebViewUpdateService;
Jeff Brown4ccb8232014-01-16 22:16:42 -0800315 private DisplayManagerService mDisplayManagerService;
Jeff Brown2c43c332014-06-12 22:38:59 -0700316 private PackageManagerService mPackageManagerService;
317 private PackageManager mPackageManager;
Jeff Brown6f357d32014-01-15 20:40:55 -0800318 private ContentResolver mContentResolver;
Jeff Sharkey1cab76a2016-04-12 18:23:31 -0600319 private EntropyMixer mEntropyMixer;
Jeff Brown6f357d32014-01-15 20:40:55 -0800320
Jeff Brown2c43c332014-06-12 22:38:59 -0700321 private boolean mOnlyCore;
322 private boolean mFirstBoot;
Makoto Onukib4739d92019-02-15 15:22:04 -0800323 private final int mStartCount;
Fyodor Kupolov6733e6c2017-01-06 18:27:05 -0800324 private final boolean mRuntimeRestart;
Makoto Onukie8edbcf2018-03-02 16:49:29 -0800325 private final long mRuntimeStartElapsedTime;
326 private final long mRuntimeStartUptime;
Jeff Brown2c43c332014-06-12 22:38:59 -0700327
Keun-young Park9b73a542017-02-01 12:09:58 -0800328 private static final String START_SENSOR_SERVICE = "StartSensorService";
Yifan Hong26b421f2017-03-10 13:41:11 -0800329 private static final String START_HIDL_SERVICES = "StartHidlServices";
330
Makoto Onukib4739d92019-02-15 15:22:04 -0800331 private static final String SYSPROP_START_COUNT = "sys.system_server.start_count";
332 private static final String SYSPROP_START_ELAPSED = "sys.system_server.start_elapsed";
333 private static final String SYSPROP_START_UPTIME = "sys.system_server.start_uptime";
Yifan Hong26b421f2017-03-10 13:41:11 -0800334
Keun-young Park9b73a542017-02-01 12:09:58 -0800335 private Future<?> mSensorServiceStart;
Narayan Kamath97780462017-02-06 20:24:08 +0000336 private Future<?> mZygotePreload;
337
Jeff Brown6f357d32014-01-15 20:40:55 -0800338 /**
Keun-young Park9b73a542017-02-01 12:09:58 -0800339 * Start the sensor service. This is a blocking call and can take time.
Jeff Brown6f357d32014-01-15 20:40:55 -0800340 */
Svet Ganovb9d71a62015-04-30 10:38:13 -0700341 private static native void startSensorService();
Jeff Brown6f357d32014-01-15 20:40:55 -0800342
343 /**
Christine Franksea7d71b2018-07-03 14:46:07 -0700344 * Start all HIDL services that are run inside the system server. This may take some time.
Yifan Hong26b421f2017-03-10 13:41:11 -0800345 */
346 private static native void startHidlServices();
347
348 /**
Ryan Savitskicfdc1512018-12-14 16:20:52 +0000349 * Mark this process' heap as profileable. Only for debug builds.
350 */
351 private static native void initZygoteChildHeapProfiling();
352
353 /**
Jeff Brown6f357d32014-01-15 20:40:55 -0800354 * The main entry point from zygote.
355 */
356 public static void main(String[] args) {
357 new SystemServer().run();
358 }
359
360 public SystemServer() {
Jeff Brown2c43c332014-06-12 22:38:59 -0700361 // Check for factory test mode.
Jeff Brown6f357d32014-01-15 20:40:55 -0800362 mFactoryTestMode = FactoryTest.getMode();
Makoto Onukie8edbcf2018-03-02 16:49:29 -0800363
Makoto Onukib4739d92019-02-15 15:22:04 -0800364 // Record process start information.
365 // Note SYSPROP_START_COUNT will increment by *2* on a FDE device when it fully boots;
366 // one for the password screen, second for the actual boot.
367 mStartCount = SystemProperties.getInt(SYSPROP_START_COUNT, 0) + 1;
Makoto Onukie8edbcf2018-03-02 16:49:29 -0800368 mRuntimeStartElapsedTime = SystemClock.elapsedRealtime();
369 mRuntimeStartUptime = SystemClock.uptimeMillis();
Makoto Onukib4739d92019-02-15 15:22:04 -0800370
371 // Remember if it's runtime restart(when sys.boot_completed is already set) or reboot
372 // We don't use "mStartCount > 1" here because it'll be wrong on a FDE device.
373 // TODO: mRuntimeRestart will *not* be set to true if the proccess crashes before
374 // sys.boot_completed is set. Fix it.
375 mRuntimeRestart = "1".equals(SystemProperties.get("sys.boot_completed"));
Jeff Brown6f357d32014-01-15 20:40:55 -0800376 }
377
378 private void run() {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700379 TimingsTraceAndSlog t = new TimingsTraceAndSlog();
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900380 try {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700381 t.traceBegin("InitBeforeStartServices");
Makoto Onukib4739d92019-02-15 15:22:04 -0800382
383 // Record the process start information in sys props.
384 SystemProperties.set(SYSPROP_START_COUNT, String.valueOf(mStartCount));
385 SystemProperties.set(SYSPROP_START_ELAPSED, String.valueOf(mRuntimeStartElapsedTime));
386 SystemProperties.set(SYSPROP_START_UPTIME, String.valueOf(mRuntimeStartUptime));
387
388 EventLog.writeEvent(EventLogTags.SYSTEM_SERVER_START,
389 mStartCount, mRuntimeStartUptime, mRuntimeStartElapsedTime);
390
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900391 // If a device's clock is before 1970 (before 0), a lot of
392 // APIs crash dealing with negative numbers, notably
393 // java.io.File#setLastModified, so instead we fake it and
394 // hope that time from cell towers or NTP fixes it shortly.
395 if (System.currentTimeMillis() < EARLIEST_SUPPORTED_TIME) {
396 Slog.w(TAG, "System clock is before 1970; setting to 1970.");
397 SystemClock.setCurrentTimeMillis(EARLIEST_SUPPORTED_TIME);
398 }
Jeff Brown6f357d32014-01-15 20:40:55 -0800399
Przemyslaw Szczepaniakfbe00fa2017-07-28 13:21:48 +0000400 //
401 // Default the timezone property to GMT if not set.
402 //
Christine Franksea7d71b2018-07-03 14:46:07 -0700403 String timezoneProperty = SystemProperties.get("persist.sys.timezone");
Przemyslaw Szczepaniakfbe00fa2017-07-28 13:21:48 +0000404 if (timezoneProperty == null || timezoneProperty.isEmpty()) {
405 Slog.w(TAG, "Timezone not set; setting to GMT.");
406 SystemProperties.set("persist.sys.timezone", "GMT");
407 }
408
Yasuhiro Matsudaebf94652015-09-02 22:48:13 +0900409 // If the system has "persist.sys.language" and friends set, replace them with
410 // "persist.sys.locale". Note that the default locale at this point is calculated
411 // using the "-Duser.locale" command line flag. That flag is usually populated by
412 // AndroidRuntime using the same set of system properties, but only the system_server
413 // and system apps are allowed to set them.
414 //
415 // NOTE: Most changes made here will need an equivalent change to
416 // core/jni/AndroidRuntime.cpp
417 if (!SystemProperties.get("persist.sys.language").isEmpty()) {
418 final String languageTag = Locale.getDefault().toLanguageTag();
Narayan Kamathbf882052015-08-11 15:40:34 +0100419
Yasuhiro Matsudaebf94652015-09-02 22:48:13 +0900420 SystemProperties.set("persist.sys.locale", languageTag);
421 SystemProperties.set("persist.sys.language", "");
422 SystemProperties.set("persist.sys.country", "");
423 SystemProperties.set("persist.sys.localevar", "");
424 }
Narayan Kamathbf882052015-08-11 15:40:34 +0100425
Jeff Sharkey0a17db12016-11-04 11:23:46 -0600426 // The system server should never make non-oneway calls
427 Binder.setWarnOnBlocking(true);
Jeff Sharkeyb0613dc2018-02-27 14:38:04 -0700428 // The system server should always load safe labels
Philip P. Moltmann20dd4312018-10-08 16:56:49 -0700429 PackageItemInfo.forceSafeLabels();
Makoto Onuki50e00c82018-08-07 15:57:13 -0700430
431 // Default to FULL within the system server.
432 SQLiteGlobal.sDefaultSyncMode = SQLiteGlobal.SYNC_MODE_FULL;
433
Fyodor Kupolov7fcd6592017-12-15 11:56:36 -0800434 // Deactivate SQLiteCompatibilityWalFlags until settings provider is initialized
435 SQLiteCompatibilityWalFlags.init(null);
Jeff Sharkey0a17db12016-11-04 11:23:46 -0600436
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900437 // Here we go!
438 Slog.i(TAG, "Entered the Android system server!");
Fyodor Kupolov6733e6c2017-01-06 18:27:05 -0800439 int uptimeMillis = (int) SystemClock.elapsedRealtime();
Fyodor Kupolov8d3e82b2016-11-10 17:58:50 -0800440 EventLog.writeEvent(EventLogTags.BOOT_PROGRESS_SYSTEM_RUN, uptimeMillis);
Fyodor Kupolov4ba91b92017-01-20 18:12:35 -0800441 if (!mRuntimeRestart) {
Fyodor Kupolov6733e6c2017-01-06 18:27:05 -0800442 MetricsLogger.histogram(null, "boot_system_server_init", uptimeMillis);
Fyodor Kupolov3235e0c2016-11-17 11:44:49 -0800443 }
Jeff Brown6f357d32014-01-15 20:40:55 -0800444
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900445 // In case the runtime switched since last boot (such as when
446 // the old runtime was removed in an OTA), set the system
Eugene Suslad0999242019-11-04 10:08:13 -0800447 // property so that it is in sync. We can't do this in
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900448 // libnativehelper's JniInvocation::Init code where we already
449 // had to fallback to a different runtime because it is
450 // running as root and we need to be the system user to set
451 // the property. http://b/11463182
452 SystemProperties.set("persist.sys.dalvik.vm.lib.2", VMRuntime.getRuntime().vmLibrary());
Jeff Brown6f357d32014-01-15 20:40:55 -0800453
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900454 // Mmmmmm... more memory!
455 VMRuntime.getRuntime().clearGrowthLimit();
Jeff Brown6f357d32014-01-15 20:40:55 -0800456
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900457 // The system server has to run all of the time, so it needs to be
458 // as efficient as possible with its memory usage.
459 VMRuntime.getRuntime().setTargetHeapUtilization(0.8f);
Jeff Brown6f357d32014-01-15 20:40:55 -0800460
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900461 // Some devices rely on runtime fingerprint generation, so make sure
462 // we've defined it before booting further.
463 Build.ensureFingerprintProperty();
Jeff Sharkey55687722014-04-09 18:07:19 -0700464
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900465 // Within the system server, it is an error to access Environment paths without
466 // explicitly specifying a user.
467 Environment.setUserRequired(true);
Jeff Brown6f357d32014-01-15 20:40:55 -0800468
Jeff Sharkeyd136e512016-03-09 22:30:56 -0700469 // Within the system server, any incoming Bundles should be defused
470 // to avoid throwing BadParcelableException.
471 BaseBundle.setShouldDefuse(true);
472
Fyodor Kupolova81b8c02017-11-13 15:51:03 -0800473 // Within the system server, when parceling exceptions, include the stack trace
474 Parcel.setStackTraceParceling(true);
475
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900476 // Ensure binder calls into the system always run at foreground priority.
477 BinderInternal.disableBackgroundScheduling(true);
Jeff Brown6f357d32014-01-15 20:40:55 -0800478
Tim Murrayeef4a3d2016-04-19 14:14:20 -0700479 // Increase the number of binder threads in system_server
480 BinderInternal.setMaxThreads(sMaxBinderThreads);
481
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900482 // Prepare the main looper thread (this thread).
483 android.os.Process.setThreadPriority(
Christine Franksea7d71b2018-07-03 14:46:07 -0700484 android.os.Process.THREAD_PRIORITY_FOREGROUND);
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900485 android.os.Process.setCanSelfBackground(false);
486 Looper.prepareMainLooper();
Makoto Onuki712886f2018-04-27 15:22:50 -0700487 Looper.getMainLooper().setSlowLogThresholdMs(
488 SLOW_DISPATCH_THRESHOLD_MS, SLOW_DELIVERY_THRESHOLD_MS);
Jeff Brown6f357d32014-01-15 20:40:55 -0800489
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900490 // Initialize native services.
491 System.loadLibrary("android_servers");
Jeff Brown6f357d32014-01-15 20:40:55 -0800492
Ryan Savitskicfdc1512018-12-14 16:20:52 +0000493 // Debug builds - allow heap profiling.
494 if (Build.IS_DEBUGGABLE) {
495 initZygoteChildHeapProfiling();
496 }
497
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900498 // Check whether we failed to shut down last time we tried.
499 // This call may not return.
500 performPendingShutdown();
Jeff Brown6f357d32014-01-15 20:40:55 -0800501
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900502 // Initialize the system context.
503 createSystemContext();
Jeff Brown6f357d32014-01-15 20:40:55 -0800504
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900505 // Create the system service manager.
506 mSystemServiceManager = new SystemServiceManager(mSystemContext);
Makoto Onukie8edbcf2018-03-02 16:49:29 -0800507 mSystemServiceManager.setStartInfo(mRuntimeRestart,
508 mRuntimeStartElapsedTime, mRuntimeStartUptime);
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900509 LocalServices.addService(SystemServiceManager.class, mSystemServiceManager);
Fyodor Kupolove29a5a12016-12-16 16:14:17 -0800510 // Prepare the thread pool for init tasks that can be parallelized
Felipe Leme29f1ae92019-10-03 15:38:43 -0700511 SystemServerInitThreadPool.start();
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900512 } finally {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700513 t.traceEnd(); // InitBeforeStartServices
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900514 }
Jeff Brown6f357d32014-01-15 20:40:55 -0800515
516 // Start services.
517 try {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700518 t.traceBegin("StartServices");
519 startBootstrapServices(t);
520 startCoreServices(t);
521 startOtherServices(t);
Fyodor Kupolovcd824ef2017-02-07 11:25:14 -0800522 SystemServerInitThreadPool.shutdown();
Jeff Brown2c43c332014-06-12 22:38:59 -0700523 } catch (Throwable ex) {
Jeff Brown6f357d32014-01-15 20:40:55 -0800524 Slog.e("System", "******************************************");
525 Slog.e("System", "************ Failure starting system services", ex);
526 throw ex;
Yasuhiro Matsuda1ab43d52015-06-30 17:07:32 +0900527 } finally {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700528 t.traceEnd(); // StartServices
Jeff Brown6f357d32014-01-15 20:40:55 -0800529 }
530
Jeff Sharkey89182982017-11-01 19:02:56 -0600531 StrictMode.initVmDefaults(null);
532
Fyodor Kupolov4ba91b92017-01-20 18:12:35 -0800533 if (!mRuntimeRestart && !isFirstBootOrUpgrade()) {
Fyodor Kupolov24e12dc2017-01-17 12:20:36 -0800534 int uptimeMillis = (int) SystemClock.elapsedRealtime();
535 MetricsLogger.histogram(null, "boot_system_server_ready", uptimeMillis);
536 final int MAX_UPTIME_MILLIS = 60 * 1000;
537 if (uptimeMillis > MAX_UPTIME_MILLIS) {
Keun-young Park9b73a542017-02-01 12:09:58 -0800538 Slog.wtf(SYSTEM_SERVER_TIMING_TAG,
Fyodor Kupolov24e12dc2017-01-17 12:20:36 -0800539 "SystemServer init took too long. uptimeMillis=" + uptimeMillis);
540 }
Fyodor Kupolov6733e6c2017-01-06 18:27:05 -0800541 }
Jeff Brown6f357d32014-01-15 20:40:55 -0800542
Andreas Gampee697a4f2018-10-09 10:40:52 -0700543 // Diagnostic to ensure that the system is in a base healthy state. Done here as a common
544 // non-zygote process.
545 if (!VMRuntime.hasBootImageSpaces()) {
546 Slog.wtf(TAG, "Runtime is not running with a boot image!");
547 }
548
Jeff Brown6f357d32014-01-15 20:40:55 -0800549 // Loop forever.
550 Looper.loop();
551 throw new RuntimeException("Main thread loop unexpectedly exited");
552 }
553
Fyodor Kupolov4ba91b92017-01-20 18:12:35 -0800554 private boolean isFirstBootOrUpgrade() {
Svet Ganovd8eb8b22019-04-05 18:52:08 -0700555 return mPackageManagerService.isFirstBoot() || mPackageManagerService.isDeviceUpgrading();
Fyodor Kupolov4ba91b92017-01-20 18:12:35 -0800556 }
557
Jeff Brown6f357d32014-01-15 20:40:55 -0800558 private void reportWtf(String msg, Throwable e) {
Dianne Hackborn661cd522011-08-22 00:26:20 -0700559 Slog.w(TAG, "***********************************************");
Dianne Hackborn8d051722014-10-01 14:59:58 -0700560 Slog.wtf(TAG, "BOOT FAILURE " + msg, e);
Dianne Hackborn661cd522011-08-22 00:26:20 -0700561 }
562
Jeff Brown6f357d32014-01-15 20:40:55 -0800563 private void performPendingShutdown() {
564 final String shutdownAction = SystemProperties.get(
565 ShutdownThread.SHUTDOWN_ACTION_PROPERTY, "");
566 if (shutdownAction != null && shutdownAction.length() > 0) {
567 boolean reboot = (shutdownAction.charAt(0) == '1');
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800568
Jeff Brown6f357d32014-01-15 20:40:55 -0800569 final String reason;
570 if (shutdownAction.length() > 1) {
571 reason = shutdownAction.substring(1, shutdownAction.length());
572 } else {
573 reason = null;
Kenny Rootf547d672010-09-22 10:36:48 -0700574 }
Jeff Brown6f357d32014-01-15 20:40:55 -0800575
Tao Bao4fd6c262016-01-19 14:22:24 -0800576 // If it's a pending reboot into recovery to apply an update,
577 // always make sure uncrypt gets executed properly when needed.
578 // If '/cache/recovery/block.map' hasn't been created, stop the
579 // reboot which will fail for sure, and get a chance to capture a
Tao Baoe8a403d2015-12-31 07:44:55 -0800580 // bugreport when that's still feasible. (Bug: 26444951)
Tianjie Xu3a66fc42017-06-09 15:50:14 -0700581 if (reason != null && reason.startsWith(PowerManager.REBOOT_RECOVERY_UPDATE)) {
Tao Bao4fd6c262016-01-19 14:22:24 -0800582 File packageFile = new File(UNCRYPT_PACKAGE_FILE);
583 if (packageFile.exists()) {
584 String filename = null;
585 try {
586 filename = FileUtils.readTextFile(packageFile, 0, null);
587 } catch (IOException e) {
588 Slog.e(TAG, "Error reading uncrypt package file", e);
589 }
590
591 if (filename != null && filename.startsWith("/data")) {
592 if (!new File(BLOCK_MAP_FILE).exists()) {
593 Slog.e(TAG, "Can't find block map file, uncrypt failed or " +
Christine Franksea7d71b2018-07-03 14:46:07 -0700594 "unexpected runtime restart?");
Tao Bao4fd6c262016-01-19 14:22:24 -0800595 return;
596 }
597 }
598 }
599 }
Alison Cichowlasf0afd8c2017-07-31 11:24:34 -0400600 Runnable runnable = new Runnable() {
601 @Override
602 public void run() {
603 synchronized (this) {
604 ShutdownThread.rebootOrShutdown(null, reboot, reason);
605 }
606 }
607 };
608
609 // ShutdownThread must run on a looper capable of displaying the UI.
610 Message msg = Message.obtain(UiThread.getHandler(), runnable);
611 msg.setAsynchronous(true);
612 UiThread.getHandler().sendMessage(msg);
613
Kenny Rootf547d672010-09-22 10:36:48 -0700614 }
Jeff Brown6f357d32014-01-15 20:40:55 -0800615 }
Kenny Rootf547d672010-09-22 10:36:48 -0700616
Jeff Brown6f357d32014-01-15 20:40:55 -0800617 private void createSystemContext() {
618 ActivityThread activityThread = ActivityThread.systemMain();
619 mSystemContext = activityThread.getSystemContext();
Alan Viveretteba398ea2015-12-16 15:28:23 -0500620 mSystemContext.setTheme(DEFAULT_SYSTEM_THEME);
Adam Lesinskia82b6262017-03-21 16:56:17 -0700621
622 final Context systemUiContext = activityThread.getSystemUiContext();
623 systemUiContext.setTheme(DEFAULT_SYSTEM_THEME);
Jeff Brown6f357d32014-01-15 20:40:55 -0800624 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800625
Jeff Brown2c43c332014-06-12 22:38:59 -0700626 /**
Christine Franksea7d71b2018-07-03 14:46:07 -0700627 * Starts the small tangle of critical services that are needed to get the system off the
628 * ground. These services have complex mutual dependencies which is why we initialize them all
629 * in one place here. Unless your service is also entwined in these dependencies, it should be
630 * initialized in one of the other functions.
Jeff Brown2c43c332014-06-12 22:38:59 -0700631 */
Felipe Leme3aad1be2019-05-31 11:43:12 -0700632 private void startBootstrapServices(@NonNull TimingsTraceAndSlog t) {
Felipe Leme137e7812019-06-10 11:38:05 -0700633 t.traceBegin("startBootstrapServices");
634
Zimuzob065b152019-04-16 13:33:01 +0100635 // Start the watchdog as early as possible so we can crash the system server
636 // if we deadlock during early boot
Felipe Leme3aad1be2019-05-31 11:43:12 -0700637 t.traceBegin("StartWatchdog");
Zimuzob065b152019-04-16 13:33:01 +0100638 final Watchdog watchdog = Watchdog.getInstance();
639 watchdog.start();
Felipe Leme3aad1be2019-05-31 11:43:12 -0700640 t.traceEnd();
Zimuzob065b152019-04-16 13:33:01 +0100641
Fyodor Kupolovb76e0fd2017-01-30 13:28:25 -0800642 Slog.i(TAG, "Reading configuration...");
643 final String TAG_SYSTEM_CONFIG = "ReadingSystemConfig";
Felipe Leme3aad1be2019-05-31 11:43:12 -0700644 t.traceBegin(TAG_SYSTEM_CONFIG);
Felipe Lemeb68b7692019-10-09 10:43:03 -0700645 SystemServerInitThreadPool.submit(SystemConfig::getInstance, TAG_SYSTEM_CONFIG);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700646 t.traceEnd();
Fyodor Kupolovb76e0fd2017-01-30 13:28:25 -0800647
atrostde54a8ac2019-08-15 16:53:01 +0100648 // Platform compat service is used by ActivityManagerService, PackageManagerService, and
649 // possibly others in the future. b/135010838.
650 t.traceBegin("PlatformCompat");
atrost87488352019-10-10 19:27:31 +0100651 PlatformCompat platformCompat = new PlatformCompat(mSystemContext);
652 ServiceManager.addService(Context.PLATFORM_COMPAT_SERVICE, platformCompat);
653 ServiceManager.addService(Context.PLATFORM_COMPAT_NATIVE_SERVICE,
654 new PlatformCompatNative(platformCompat));
Andrei Oneaf965d152019-10-30 18:08:24 +0000655 AppCompatCallbacks.install(new long[0]);
atrostde54a8ac2019-08-15 16:53:01 +0100656 t.traceEnd();
657
Jeff Brown6f357d32014-01-15 20:40:55 -0800658 // Wait for installd to finish starting up so that it has a chance to
659 // create critical directories such as /data/user with the appropriate
660 // permissions. We need this to complete before we initialize other services.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700661 t.traceBegin("StartInstaller");
Narayan Kamath76a748e2014-11-10 14:23:41 +0000662 Installer installer = mSystemServiceManager.startService(Installer.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700663 t.traceEnd();
Jeff Brown6f357d32014-01-15 20:40:55 -0800664
Svet Ganov37e43272016-09-09 16:01:32 -0700665 // In some cases after launching an app we need to access device identifiers,
666 // therefore register the device identifier policy before the activity manager.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700667 t.traceBegin("DeviceIdentifiersPolicyService");
Svet Ganov37e43272016-09-09 16:01:32 -0700668 mSystemServiceManager.startService(DeviceIdentifiersPolicyService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700669 t.traceEnd();
Svet Ganov37e43272016-09-09 16:01:32 -0700670
Wale Ogunwale6d50dcc2018-07-21 23:00:40 -0700671 // Uri Grants Manager.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700672 t.traceBegin("UriGrantsManagerService");
Wale Ogunwale6d50dcc2018-07-21 23:00:40 -0700673 mSystemServiceManager.startService(UriGrantsManagerService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700674 t.traceEnd();
Wale Ogunwale6d50dcc2018-07-21 23:00:40 -0700675
Jeff Brown6f357d32014-01-15 20:40:55 -0800676 // Activity manager runs the show.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700677 t.traceBegin("StartActivityManager");
Wale Ogunwale16e505a2018-05-07 15:00:49 -0700678 // TODO: Might need to move after migration to WM.
679 ActivityTaskManagerService atm = mSystemServiceManager.startService(
680 ActivityTaskManagerService.Lifecycle.class).getService();
Wale Ogunwale9e4f3e02018-05-17 09:35:39 -0700681 mActivityManagerService = ActivityManagerService.Lifecycle.startService(
682 mSystemServiceManager, atm);
Dianne Hackborn91097de2014-04-04 18:02:06 -0700683 mActivityManagerService.setSystemServiceManager(mSystemServiceManager);
Narayan Kamath76a748e2014-11-10 14:23:41 +0000684 mActivityManagerService.setInstaller(installer);
Wale Ogunwale1f5e53d2018-11-05 05:12:46 -0800685 mWindowManagerGlobalLock = atm.getGlobalLock();
Felipe Leme3aad1be2019-05-31 11:43:12 -0700686 t.traceEnd();
Jeff Brown4ccb8232014-01-16 22:16:42 -0800687
Jeff Brown2c43c332014-06-12 22:38:59 -0700688 // Power manager needs to be started early because other services need it.
689 // Native daemons may be watching for it to be registered so it must be ready
690 // to handle incoming binder calls immediately (including being able to verify
691 // the permissions for those calls).
Felipe Leme3aad1be2019-05-31 11:43:12 -0700692 t.traceBegin("StartPowerManager");
Jeff Brown2c43c332014-06-12 22:38:59 -0700693 mPowerManagerService = mSystemServiceManager.startService(PowerManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700694 t.traceEnd();
Jeff Brown2c43c332014-06-12 22:38:59 -0700695
Felipe Leme3aad1be2019-05-31 11:43:12 -0700696 t.traceBegin("StartThermalManager");
Wei Wangbad7c202018-11-01 11:57:39 -0700697 mSystemServiceManager.startService(ThermalManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700698 t.traceEnd();
Wei Wangbad7c202018-11-01 11:57:39 -0700699
Jeff Brown2c43c332014-06-12 22:38:59 -0700700 // Now that the power manager has been started, let the activity manager
701 // initialize power management features.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700702 t.traceBegin("InitPowerManagement");
Jeff Brown2c43c332014-06-12 22:38:59 -0700703 mActivityManagerService.initPowerManagement();
Felipe Leme3aad1be2019-05-31 11:43:12 -0700704 t.traceEnd();
Jeff Brown2c43c332014-06-12 22:38:59 -0700705
Jeff Sharkeyfe6f85c2017-01-20 10:42:57 -0700706 // Bring up recovery system in case a rescue party needs a reboot
Felipe Leme3aad1be2019-05-31 11:43:12 -0700707 t.traceBegin("StartRecoverySystemService");
Kenny Root96690bc2019-11-15 10:20:59 -0800708 mSystemServiceManager.startService(RecoverySystemService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700709 t.traceEnd();
Jeff Sharkeyfe6f85c2017-01-20 10:42:57 -0700710
711 // Now that we have the bare essentials of the OS up and running, take
712 // note that we just booted, which might send out a rescue party if
713 // we're stuck in a runtime restart loop.
714 RescueParty.noteBoot(mSystemContext);
715
Jeff Brown5d6443b2015-04-10 20:15:01 -0700716 // Manages LEDs and display backlight so we need it to bring up the display.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700717 t.traceBegin("StartLightsService");
Jeff Brown5d6443b2015-04-10 20:15:01 -0700718 mSystemServiceManager.startService(LightsService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700719 t.traceEnd();
Jeff Brown5d6443b2015-04-10 20:15:01 -0700720
Felipe Leme3aad1be2019-05-31 11:43:12 -0700721 t.traceBegin("StartSidekickService");
Chris Phoenixbc839a32017-10-21 14:46:15 -0700722 // Package manager isn't started yet; need to use SysProp not hardware feature
723 if (SystemProperties.getBoolean("config.enable_sidekick_graphics", false)) {
724 mSystemServiceManager.startService(WEAR_SIDEKICK_SERVICE_CLASS);
725 }
Felipe Leme3aad1be2019-05-31 11:43:12 -0700726 t.traceEnd();
Chris Phoenixbc839a32017-10-21 14:46:15 -0700727
Jeff Brown4ccb8232014-01-16 22:16:42 -0800728 // Display manager is needed to provide display metrics before package manager
729 // starts up.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700730 t.traceBegin("StartDisplayManager");
Jeff Brown4ccb8232014-01-16 22:16:42 -0800731 mDisplayManagerService = mSystemServiceManager.startService(DisplayManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700732 t.traceEnd();
Jeff Brown2c43c332014-06-12 22:38:59 -0700733
734 // We need the default display before we can initialize the package manager.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700735 t.traceBegin("WaitForDisplay");
Felipe Leme137e7812019-06-10 11:38:05 -0700736 mSystemServiceManager.startBootPhase(t, SystemService.PHASE_WAIT_FOR_DEFAULT_DISPLAY);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700737 t.traceEnd();
Jeff Brown2c43c332014-06-12 22:38:59 -0700738
739 // Only run "core" apps if we're encrypting the device.
Inseob Kimc1246e62018-11-08 13:13:54 +0900740 String cryptState = VoldProperties.decrypt().orElse("");
Jeff Brown2c43c332014-06-12 22:38:59 -0700741 if (ENCRYPTING_STATE.equals(cryptState)) {
742 Slog.w(TAG, "Detected encryption in progress - only parsing core apps");
743 mOnlyCore = true;
744 } else if (ENCRYPTED_STATE.equals(cryptState)) {
745 Slog.w(TAG, "Device encrypted - only parsing core apps");
746 mOnlyCore = true;
747 }
748
749 // Start the package manager.
Fyodor Kupolov6733e6c2017-01-06 18:27:05 -0800750 if (!mRuntimeRestart) {
751 MetricsLogger.histogram(null, "boot_package_manager_init_start",
752 (int) SystemClock.elapsedRealtime());
753 }
Zimuzoe5cc6ab2019-06-14 11:47:45 +0100754
Felipe Leme3aad1be2019-05-31 11:43:12 -0700755 t.traceBegin("StartPackageManagerService");
Zimuzoe5cc6ab2019-06-14 11:47:45 +0100756 try {
757 Watchdog.getInstance().pauseWatchingCurrentThread("packagemanagermain");
758 mPackageManagerService = PackageManagerService.main(mSystemContext, installer,
759 mFactoryTestMode != FactoryTest.FACTORY_TEST_OFF, mOnlyCore);
760 } finally {
761 Watchdog.getInstance().resumeWatchingCurrentThread("packagemanagermain");
762 }
763
Jeff Brown2c43c332014-06-12 22:38:59 -0700764 mFirstBoot = mPackageManagerService.isFirstBoot();
765 mPackageManager = mSystemContext.getPackageManager();
Felipe Leme3aad1be2019-05-31 11:43:12 -0700766 t.traceEnd();
Fyodor Kupolov4ba91b92017-01-20 18:12:35 -0800767 if (!mRuntimeRestart && !isFirstBootOrUpgrade()) {
Fyodor Kupolov6733e6c2017-01-06 18:27:05 -0800768 MetricsLogger.histogram(null, "boot_package_manager_init_ready",
769 (int) SystemClock.elapsedRealtime());
770 }
Andreas Gampeabcbe2f2016-02-26 11:25:36 -0800771 // Manages A/B OTA dexopting. This is a bootstrap service as we need it to rename
772 // A/B artifacts after boot, before anything else might touch/need them.
773 // Note: this isn't needed during decryption (we don't have /data anyways).
774 if (!mOnlyCore) {
775 boolean disableOtaDexopt = SystemProperties.getBoolean("config.disable_otadexopt",
776 false);
777 if (!disableOtaDexopt) {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700778 t.traceBegin("StartOtaDexOptService");
Andreas Gampeabcbe2f2016-02-26 11:25:36 -0800779 try {
Zimuzof3c46142019-05-31 12:46:12 +0100780 Watchdog.getInstance().pauseWatchingCurrentThread("moveab");
Andreas Gampeabcbe2f2016-02-26 11:25:36 -0800781 OtaDexoptService.main(mSystemContext, mPackageManagerService);
782 } catch (Throwable e) {
783 reportWtf("starting OtaDexOptService", e);
784 } finally {
Zimuzof3c46142019-05-31 12:46:12 +0100785 Watchdog.getInstance().resumeWatchingCurrentThread("moveab");
Felipe Leme3aad1be2019-05-31 11:43:12 -0700786 t.traceEnd();
Andreas Gampeabcbe2f2016-02-26 11:25:36 -0800787 }
788 }
789 }
790
Felipe Leme3aad1be2019-05-31 11:43:12 -0700791 t.traceBegin("StartUserManagerService");
Amith Yamasanid04aaa32016-06-13 12:09:36 -0700792 mSystemServiceManager.startService(UserManagerService.LifeCycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700793 t.traceEnd();
Adam Lesinski3c153512014-07-23 17:34:34 -0700794
Jeff Brown2c43c332014-06-12 22:38:59 -0700795 // Initialize attribute cache used to cache resources from packages.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700796 t.traceBegin("InitAttributerCache");
Jeff Brown2c43c332014-06-12 22:38:59 -0700797 AttributeCache.init(mSystemContext);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700798 t.traceEnd();
Jeff Brown2c43c332014-06-12 22:38:59 -0700799
800 // Set up the Application instance for the system process and get started.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700801 t.traceBegin("SetSystemProcess");
Jeff Brown2c43c332014-06-12 22:38:59 -0700802 mActivityManagerService.setSystemProcess();
Felipe Leme3aad1be2019-05-31 11:43:12 -0700803 t.traceEnd();
Svet Ganovb9d71a62015-04-30 10:38:13 -0700804
Zimuzob065b152019-04-16 13:33:01 +0100805 // Complete the watchdog setup with an ActivityManager instance and listen for reboots
806 // Do this only after the ActivityManagerService is properly started as a system process
Felipe Leme3aad1be2019-05-31 11:43:12 -0700807 t.traceBegin("InitWatchdog");
Zimuzob065b152019-04-16 13:33:01 +0100808 watchdog.init(mSystemContext, mActivityManagerService);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700809 t.traceEnd();
Zimuzob065b152019-04-16 13:33:01 +0100810
Joel Fernandes2d314e12017-04-04 16:32:15 -0700811 // DisplayManagerService needs to setup android.display scheduling related policies
812 // since setSystemProcess() would have overridden policies due to setProcessGroup
813 mDisplayManagerService.setupSchedulerPolicies();
814
MÃ¥rten Kongstad2e0d0f32016-06-02 09:35:31 +0200815 // Manages Overlay packages
Felipe Leme3aad1be2019-05-31 11:43:12 -0700816 t.traceBegin("StartOverlayManagerService");
MÃ¥rten Kongstad77b53b22019-10-01 08:29:21 +0200817 mSystemServiceManager.startService(new OverlayManagerService(mSystemContext));
Felipe Leme3aad1be2019-05-31 11:43:12 -0700818 t.traceEnd();
MÃ¥rten Kongstad2e0d0f32016-06-02 09:35:31 +0200819
Felipe Leme3aad1be2019-05-31 11:43:12 -0700820 t.traceBegin("StartSensorPrivacyService");
Chad Brubaker90f391f2018-10-19 10:26:19 -0700821 mSystemServiceManager.startService(new SensorPrivacyService(mSystemContext));
Felipe Leme3aad1be2019-05-31 11:43:12 -0700822 t.traceEnd();
Chad Brubaker90f391f2018-10-19 10:26:19 -0700823
Winson72dbe7e2019-04-29 14:55:30 -0700824 if (SystemProperties.getInt("persist.sys.displayinset.top", 0) > 0) {
825 // DisplayManager needs the overlay immediately.
826 mActivityManagerService.updateSystemUiContext();
827 LocalServices.getService(DisplayManagerInternal.class).onOverlayChanged();
828 }
829
Svet Ganovb9d71a62015-04-30 10:38:13 -0700830 // The sensor service needs access to package manager service, app ops
831 // service, and permissions service, therefore we start it after them.
Keun-young Park9b73a542017-02-01 12:09:58 -0800832 // Start sensor service in a separate thread. Completion should be checked
833 // before using it.
Felipe Lemeb68b7692019-10-09 10:43:03 -0700834 mSensorServiceStart = SystemServerInitThreadPool.submit(() -> {
Felipe Leme137e7812019-06-10 11:38:05 -0700835 TimingsTraceAndSlog traceLog = TimingsTraceAndSlog.newAsyncLog();
Keun-young Park9b73a542017-02-01 12:09:58 -0800836 traceLog.traceBegin(START_SENSOR_SERVICE);
837 startSensorService();
838 traceLog.traceEnd();
839 }, START_SENSOR_SERVICE);
Felipe Leme137e7812019-06-10 11:38:05 -0700840
841 t.traceEnd(); // startBootstrapServices
Jeff Brown6f357d32014-01-15 20:40:55 -0800842 }
843
Jeff Brown2c43c332014-06-12 22:38:59 -0700844 /**
845 * Starts some essential services that are not tangled up in the bootstrap process.
846 */
Felipe Leme3aad1be2019-05-31 11:43:12 -0700847 private void startCoreServices(@NonNull TimingsTraceAndSlog t) {
Felipe Leme137e7812019-06-10 11:38:05 -0700848 t.traceBegin("startCoreServices");
849
Felipe Leme3aad1be2019-05-31 11:43:12 -0700850 t.traceBegin("StartBatteryService");
Jeff Brown21392762014-06-13 19:00:36 -0700851 // Tracks the battery level. Requires LightService.
852 mSystemServiceManager.startService(BatteryService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700853 t.traceEnd();
Adam Lesinski0debc9a2014-07-16 19:09:13 -0700854
855 // Tracks application usage stats.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700856 t.traceBegin("StartUsageService");
Adam Lesinski0debc9a2014-07-16 19:09:13 -0700857 mSystemServiceManager.startService(UsageStatsService.class);
858 mActivityManagerService.setUsageStatsManager(
859 LocalServices.getService(UsageStatsManagerInternal.class));
Felipe Leme3aad1be2019-05-31 11:43:12 -0700860 t.traceEnd();
Torne (Richard Coles)4dbeb352014-07-29 19:14:24 +0100861
862 // Tracks whether the updatable WebView is in a ready state and watches for update installs.
Torne (Richard Coles)ff937ac2017-10-02 17:09:32 -0400863 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_WEBVIEW)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -0700864 t.traceBegin("StartWebViewUpdateService");
Torne (Richard Coles)ff937ac2017-10-02 17:09:32 -0400865 mWebViewUpdateService = mSystemServiceManager.startService(WebViewUpdateService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700866 t.traceEnd();
Torne (Richard Coles)ff937ac2017-10-02 17:09:32 -0400867 }
Fyodor Kupolovca348512018-01-10 18:05:53 -0800868
Marcin Oczeretkoc80c81a2018-08-30 20:15:52 +0100869 // Tracks and caches the device state.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700870 t.traceBegin("StartCachedDeviceStateService");
Marcin Oczeretkoc80c81a2018-08-30 20:15:52 +0100871 mSystemServiceManager.startService(CachedDeviceStateService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700872 t.traceEnd();
Marcin Oczeretkoc80c81a2018-08-30 20:15:52 +0100873
Fyodor Kupolovca348512018-01-10 18:05:53 -0800874 // Tracks cpu time spent in binder calls
Felipe Leme3aad1be2019-05-31 11:43:12 -0700875 t.traceBegin("StartBinderCallsStatsService");
Olivier Gaillard1d7f6152018-07-03 13:57:58 +0100876 mSystemServiceManager.startService(BinderCallsStatsService.LifeCycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700877 t.traceEnd();
Marcin Oczeretkod8cc8592018-08-22 16:07:36 +0100878
879 // Tracks time spent in handling messages in handlers.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700880 t.traceBegin("StartLooperStatsService");
Marcin Oczeretkod8cc8592018-08-22 16:07:36 +0100881 mSystemServiceManager.startService(LooperStatsService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700882 t.traceEnd();
Richard Uhlerb29f1452018-09-12 16:38:15 +0100883
884 // Manages apk rollbacks.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700885 t.traceBegin("StartRollbackManagerService");
Richard Uhlere95d0552018-12-27 15:03:41 +0000886 mSystemServiceManager.startService(RollbackManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700887 t.traceEnd();
Nandana Duttd11850c2018-12-12 17:26:57 +0000888
889 // Service to capture bugreports.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700890 t.traceBegin("StartBugreportManagerService");
Nandana Duttd11850c2018-12-12 17:26:57 +0000891 mSystemServiceManager.startService(BugreportManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700892 t.traceEnd();
Peiyong Linfd71c202019-01-23 15:29:59 -0800893
894 // Serivce for GPU and GPU driver.
Felipe Leme3aad1be2019-05-31 11:43:12 -0700895 t.traceBegin("GpuService");
Peiyong Linfd71c202019-01-23 15:29:59 -0800896 mSystemServiceManager.startService(GpuService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700897 t.traceEnd();
Felipe Leme137e7812019-06-10 11:38:05 -0700898
899 t.traceEnd(); // startCoreServices
Jeff Brown2c43c332014-06-12 22:38:59 -0700900 }
901
902 /**
Christine Franksea7d71b2018-07-03 14:46:07 -0700903 * Starts a miscellaneous grab bag of stuff that has yet to be refactored and organized.
Jeff Brown2c43c332014-06-12 22:38:59 -0700904 */
Felipe Leme3aad1be2019-05-31 11:43:12 -0700905 private void startOtherServices(@NonNull TimingsTraceAndSlog t) {
Felipe Leme137e7812019-06-10 11:38:05 -0700906 t.traceBegin("startOtherServices");
907
Jeff Brown6f357d32014-01-15 20:40:55 -0800908 final Context context = mSystemContext;
Jeff Brown7f6c2312012-04-13 20:38:38 -0700909 VibratorService vibrator = null;
Po-Chien Hsueh4e908c22019-03-07 11:57:17 +0800910 DynamicSystemService dynamicSystem = null;
Sudheer Shanka2250d562016-11-07 15:41:02 -0800911 IStorageManager storageManager = null;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700912 NetworkManagementService networkManagement = null;
Nathan Haroldb7282172017-09-11 19:50:19 -0700913 IpSecService ipSecService = null;
Jeff Sharkey75279902011-05-24 18:39:45 -0700914 NetworkStatsService networkStats = null;
Jeff Sharkeya4620792011-05-20 15:29:23 -0700915 NetworkPolicyManagerService networkPolicy = null;
Mike Lockwood0f79b542009-08-14 14:18:49 -0400916 ConnectivityService connectivity = null;
Christine Franksea7d71b2018-07-03 14:46:07 -0700917 NsdService serviceDiscovery = null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800918 WindowManagerService wm = null;
Mike Lockwoodb01e8bf2011-08-29 20:11:07 -0400919 SerialService serial = null;
Amith Yamasani6734b9f2010-09-13 16:24:08 -0700920 NetworkTimeUpdateService networkTimeUpdater = null;
Jeff Brown6ec6f792012-04-17 16:52:41 -0700921 InputManagerService inputManager = null;
Wink Savillea12a7b32012-09-20 10:09:45 -0700922 TelephonyRegistry telephonyRegistry = null;
Erik Gilling51e95df2013-06-26 11:06:51 -0700923 ConsumerIrService consumerIr = null;
Ye Wend97e1fd2014-07-24 12:56:45 -0700924 MmsServiceBroker mmsService = null;
Polina Bondarenkof8754ac2016-02-12 20:38:23 +0100925 HardwarePropertiesManagerService hardwarePropertiesService = null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800926
Abodunrinwa Tokid32906c2018-01-18 04:34:44 -0800927 boolean disableSystemTextClassifier = SystemProperties.getBoolean(
928 "config.disable_systemtextclassifier", false);
Felipe Leme29397ce2018-11-16 17:30:36 -0800929
Steve Paik117fcb02018-09-13 09:43:54 -0700930 boolean disableNetworkTime = SystemProperties.getBoolean("config.disable_networktime",
931 false);
Ivan Podogov8adaec02016-09-14 18:14:31 +0100932 boolean disableCameraService = SystemProperties.getBoolean("config.disable_cameraservice",
933 false);
Ivan Podogovf9973822017-05-11 15:51:34 +0100934 boolean enableLeftyService = SystemProperties.getBoolean("config.enable_lefty", false);
Wei Liu09de4192016-09-07 13:33:49 -0700935
Colin Cross039deed2017-02-18 20:05:47 +0000936 boolean isEmulator = SystemProperties.get("ro.kernel.qemu").equals("1");
937
Erik Wolsheimer640734f2018-01-29 13:57:44 -0800938 boolean isWatch = context.getPackageManager().hasSystemFeature(
939 PackageManager.FEATURE_WATCH);
940
paulhsia0a1b3222018-11-08 18:15:46 +0800941 boolean isArc = context.getPackageManager().hasSystemFeature(
942 "org.chromium.arc");
943
Rick Yiub2875922018-09-12 11:07:25 +0000944 boolean enableVrService = context.getPackageManager().hasSystemFeature(
945 PackageManager.FEATURE_VR_MODE_HIGH_PERFORMANCE);
946
Jeff Sharkeyfe6f85c2017-01-20 10:42:57 -0700947 // For debugging RescueParty
948 if (Build.IS_DEBUGGABLE && SystemProperties.getBoolean("debug.crash_system", false)) {
949 throw new RuntimeException();
950 }
951
Dan Morrille4d9a012013-03-28 18:10:43 -0700952 try {
Narayan Kamath97780462017-02-06 20:24:08 +0000953 final String SECONDARY_ZYGOTE_PRELOAD = "SecondaryZygotePreload";
954 // We start the preload ~1s before the webview factory preparation, to
955 // ensure that it completes before the 32 bit relro process is forked
956 // from the zygote. In the event that it takes too long, the webview
957 // RELRO process will block, but it will do so without holding any locks.
Felipe Lemeb68b7692019-10-09 10:43:03 -0700958 mZygotePreload = SystemServerInitThreadPool.submit(() -> {
Narayan Kamath97780462017-02-06 20:24:08 +0000959 try {
960 Slog.i(TAG, SECONDARY_ZYGOTE_PRELOAD);
Felipe Leme137e7812019-06-10 11:38:05 -0700961 TimingsTraceAndSlog traceLog = TimingsTraceAndSlog.newAsyncLog();
Narayan Kamath97780462017-02-06 20:24:08 +0000962 traceLog.traceBegin(SECONDARY_ZYGOTE_PRELOAD);
Chris Wailesefce9292019-01-11 13:19:20 -0800963 if (!Process.ZYGOTE_PROCESS.preloadDefault(Build.SUPPORTED_32_BIT_ABIS[0])) {
Narayan Kamath97780462017-02-06 20:24:08 +0000964 Slog.e(TAG, "Unable to preload default resources");
965 }
966 traceLog.traceEnd();
967 } catch (Exception ex) {
968 Slog.e(TAG, "Exception preloading default resources", ex);
969 }
970 }, SECONDARY_ZYGOTE_PRELOAD);
971
Felipe Leme3aad1be2019-05-31 11:43:12 -0700972 t.traceBegin("StartKeyAttestationApplicationIdProviderService");
Janis Danisevskis8ff1e192016-06-03 11:31:55 -0700973 ServiceManager.addService("sec_key_att_app_id_provider",
974 new KeyAttestationApplicationIdProviderService(context));
Felipe Leme3aad1be2019-05-31 11:43:12 -0700975 t.traceEnd();
Janis Danisevskis8ff1e192016-06-03 11:31:55 -0700976
Felipe Leme3aad1be2019-05-31 11:43:12 -0700977 t.traceBegin("StartKeyChainSystemService");
Robin Lee13935492017-03-23 15:28:37 +0000978 mSystemServiceManager.startService(KeyChainSystemService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700979 t.traceEnd();
Robin Lee13935492017-03-23 15:28:37 +0000980
Felipe Leme3aad1be2019-05-31 11:43:12 -0700981 t.traceBegin("StartSchedulingPolicyService");
Dianne Hackborn35f72be2013-09-16 10:57:39 -0700982 ServiceManager.addService("scheduling_policy", new SchedulingPolicyService());
Felipe Leme3aad1be2019-05-31 11:43:12 -0700983 t.traceEnd();
Glenn Kasten07b04652012-04-23 15:00:43 -0700984
Felipe Leme3aad1be2019-05-31 11:43:12 -0700985 t.traceBegin("StartTelecomLoaderService");
Santos Cordon5d2c1e62014-11-21 15:20:15 -0800986 mSystemServiceManager.startService(TelecomLoaderService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700987 t.traceEnd();
Santos Cordon5d2c1e62014-11-21 15:20:15 -0800988
Felipe Leme3aad1be2019-05-31 11:43:12 -0700989 t.traceBegin("StartTelephonyRegistry");
Jeff Brown2c43c332014-06-12 22:38:59 -0700990 telephonyRegistry = new TelephonyRegistry(context);
991 ServiceManager.addService("telephony.registry", telephonyRegistry);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700992 t.traceEnd();
Svetoslavb3038ec2013-02-13 14:39:30 -0800993
Felipe Leme3aad1be2019-05-31 11:43:12 -0700994 t.traceBegin("StartEntropyMixer");
Jeff Sharkey1cab76a2016-04-12 18:23:31 -0600995 mEntropyMixer = new EntropyMixer(context);
Felipe Leme3aad1be2019-05-31 11:43:12 -0700996 t.traceEnd();
Nick Kralevich79619dd2013-03-04 13:05:32 -0800997
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800998 mContentResolver = context.getContentResolver();
999
Fred Quintanae91ebe22009-09-29 20:44:30 -07001000 // The AccountManager must come before the ContentService
Felipe Leme3aad1be2019-05-31 11:43:12 -07001001 t.traceBegin("StartAccountManagerService");
Jeff Sharkey1cab76a2016-04-12 18:23:31 -06001002 mSystemServiceManager.startService(ACCOUNT_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001003 t.traceEnd();
Fred Quintana60307342009-03-24 22:48:12 -07001004
Felipe Leme3aad1be2019-05-31 11:43:12 -07001005 t.traceBegin("StartContentService");
Jeff Sharkeya3ebfec2016-04-04 08:58:04 -06001006 mSystemServiceManager.startService(CONTENT_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001007 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001008
Felipe Leme3aad1be2019-05-31 11:43:12 -07001009 t.traceBegin("InstallSystemProviders");
Jeff Brown4ccb8232014-01-16 22:16:42 -08001010 mActivityManagerService.installSystemProviders();
Fyodor Kupolov7fcd6592017-12-15 11:56:36 -08001011 // Now that SettingsProvider is ready, reactivate SQLiteCompatibilityWalFlags
1012 SQLiteCompatibilityWalFlags.reset();
Felipe Leme3aad1be2019-05-31 11:43:12 -07001013 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001014
Yohei Yukawab8bbdaf2018-03-14 18:04:52 -07001015 // Records errors and logs, for example wtf()
1016 // Currently this service indirectly depends on SettingsProvider so do this after
1017 // InstallSystemProviders.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001018 t.traceBegin("StartDropBoxManager");
Yohei Yukawab8bbdaf2018-03-14 18:04:52 -07001019 mSystemServiceManager.startService(DropBoxManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001020 t.traceEnd();
Yohei Yukawab8bbdaf2018-03-14 18:04:52 -07001021
Felipe Leme3aad1be2019-05-31 11:43:12 -07001022 t.traceBegin("StartVibratorService");
Jeff Brown7f6c2312012-04-13 20:38:38 -07001023 vibrator = new VibratorService(context);
1024 ServiceManager.addService("vibrator", vibrator);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001025 t.traceEnd();
The Android Open Source Project10592532009-03-18 17:39:46 -07001026
Felipe Leme3aad1be2019-05-31 11:43:12 -07001027 t.traceBegin("StartDynamicSystemService");
Po-Chien Hsueh4e908c22019-03-07 11:57:17 +08001028 dynamicSystem = new DynamicSystemService(context);
1029 ServiceManager.addService("dynamic_system", dynamicSystem);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001030 t.traceEnd();
Howard Chen0a947642019-01-07 14:10:44 +08001031
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001032 if (!isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001033 t.traceBegin("StartConsumerIrService");
Wei Liu09de4192016-09-07 13:33:49 -07001034 consumerIr = new ConsumerIrService(context);
1035 ServiceManager.addService(Context.CONSUMER_IR_SERVICE, consumerIr);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001036 t.traceEnd();
Wei Liu09de4192016-09-07 13:33:49 -07001037 }
Erik Gilling51e95df2013-06-26 11:06:51 -07001038
Felipe Leme3aad1be2019-05-31 11:43:12 -07001039 t.traceBegin("StartAlarmManagerService");
Suprabh Shukla6226c2f2018-08-22 18:15:04 -07001040 mSystemServiceManager.startService(new AlarmManagerService(context));
Felipe Leme3aad1be2019-05-31 11:43:12 -07001041 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001042
Felipe Leme3aad1be2019-05-31 11:43:12 -07001043 t.traceBegin("StartInputManagerService");
Jeff Brown4ccb8232014-01-16 22:16:42 -08001044 inputManager = new InputManagerService(context);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001045 t.traceEnd();
Jeff Browna9d131c2012-09-20 16:48:17 -07001046
Felipe Leme3aad1be2019-05-31 11:43:12 -07001047 t.traceBegin("StartWindowManagerService");
Keun-young Park9b73a542017-02-01 12:09:58 -08001048 // WMS needs sensor service ready
1049 ConcurrentUtils.waitForFutureNoInterrupt(mSensorServiceStart, START_SENSOR_SERVICE);
1050 mSensorServiceStart = null;
Yohei Yukawae24ed792018-08-28 19:10:32 -07001051 wm = WindowManagerService.main(context, inputManager, !mFirstBoot, mOnlyCore,
Yunfan Chenc2ff6cf2018-12-04 16:56:21 -08001052 new PhoneWindowManager(), mActivityManagerService.mActivityTaskManager);
Vishnu Naire9852f52017-10-11 18:09:55 -07001053 ServiceManager.addService(Context.WINDOW_SERVICE, wm, /* allowIsolated= */ false,
Vishnu Naire78b01a2017-10-26 10:11:54 -07001054 DUMP_FLAG_PRIORITY_CRITICAL | DUMP_FLAG_PROTO);
Vishnu Nair3764f4e2018-03-02 07:56:44 -08001055 ServiceManager.addService(Context.INPUT_SERVICE, inputManager,
1056 /* allowIsolated= */ false, DUMP_FLAG_PRIORITY_CRITICAL);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001057 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001058
Felipe Leme3aad1be2019-05-31 11:43:12 -07001059 t.traceBegin("SetWindowManagerService");
Bryce Leef19cbe22018-02-02 15:09:21 -08001060 mActivityManagerService.setWindowManager(wm);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001061 t.traceEnd();
Bryce Leef19cbe22018-02-02 15:09:21 -08001062
Felipe Leme3aad1be2019-05-31 11:43:12 -07001063 t.traceBegin("WindowManagerServiceOnInitReady");
Bryce Leef19cbe22018-02-02 15:09:21 -08001064 wm.onInitReady();
Felipe Leme3aad1be2019-05-31 11:43:12 -07001065 t.traceEnd();
Bryce Leef19cbe22018-02-02 15:09:21 -08001066
Yifan Hong604c12c2017-03-20 10:57:44 -07001067 // Start receiving calls from HIDL services. Start in in a separate thread
1068 // because it need to connect to SensorManager. This have to start
1069 // after START_SENSOR_SERVICE is done.
Felipe Lemeb68b7692019-10-09 10:43:03 -07001070 SystemServerInitThreadPool.submit(() -> {
Felipe Leme137e7812019-06-10 11:38:05 -07001071 TimingsTraceAndSlog traceLog = TimingsTraceAndSlog.newAsyncLog();
Roger 1 Jönsson341b2c12017-05-17 14:21:55 +02001072 traceLog.traceBegin(START_HIDL_SERVICES);
Yifan Hong604c12c2017-03-20 10:57:44 -07001073 startHidlServices();
Roger 1 Jönsson341b2c12017-05-17 14:21:55 +02001074 traceLog.traceEnd();
Yifan Hong604c12c2017-03-20 10:57:44 -07001075 }, START_HIDL_SERVICES);
1076
Rick Yiub2875922018-09-12 11:07:25 +00001077 if (!isWatch && enableVrService) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001078 t.traceBegin("StartVrManagerService");
Wei Liuef89d212016-09-19 15:10:33 -07001079 mSystemServiceManager.startService(VrManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001080 t.traceEnd();
Wei Liuef89d212016-09-19 15:10:33 -07001081 }
Ruben Brunkdd18a0b2015-12-04 16:16:31 -08001082
Felipe Leme3aad1be2019-05-31 11:43:12 -07001083 t.traceBegin("StartInputManager");
Arthur Hung95b38a92018-07-20 18:56:12 +08001084 inputManager.setWindowManagerCallbacks(wm.getInputManagerCallback());
Jeff Browna9d131c2012-09-20 16:48:17 -07001085 inputManager.start();
Felipe Leme3aad1be2019-05-31 11:43:12 -07001086 t.traceEnd();
Jeff Browna9d131c2012-09-20 16:48:17 -07001087
Jeff Brown4ccb8232014-01-16 22:16:42 -08001088 // TODO: Use service dependencies instead.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001089 t.traceBegin("DisplayManagerWindowManagerAndInputReady");
Jeff Brown4ccb8232014-01-16 22:16:42 -08001090 mDisplayManagerService.windowManagerAndInputReady();
Felipe Leme3aad1be2019-05-31 11:43:12 -07001091 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001092
Hayden Gomes013a7f82019-05-14 09:30:39 -07001093 if (mFactoryTestMode == FactoryTest.FACTORY_TEST_LOW_LEVEL) {
David 'Digit' Turnere2a5e862011-01-17 00:32:33 +01001094 Slog.i(TAG, "No Bluetooth Service (factory test)");
Matthew Xie1dd01eb32013-04-26 12:37:54 -07001095 } else if (!context.getPackageManager().hasSystemFeature
Christine Franksea7d71b2018-07-03 14:46:07 -07001096 (PackageManager.FEATURE_BLUETOOTH)) {
Matthew Xie1dd01eb32013-04-26 12:37:54 -07001097 Slog.i(TAG, "No Bluetooth Service (Bluetooth Hardware Not Present)");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001098 } else {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001099 t.traceBegin("StartBluetoothService");
Miao Chou658bf2f2015-06-26 17:14:35 -07001100 mSystemServiceManager.startService(BluetoothService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001101 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001102 }
Pavel Zhamaitsiak02b3e6b2016-02-03 10:39:44 -08001103
Felipe Leme3aad1be2019-05-31 11:43:12 -07001104 t.traceBegin("IpConnectivityMetrics");
Hugo Benichieab511b2016-09-09 09:23:47 +09001105 mSystemServiceManager.startService(IpConnectivityMetrics.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001106 t.traceEnd();
Hugo Benichieab511b2016-09-09 09:23:47 +09001107
Felipe Leme3aad1be2019-05-31 11:43:12 -07001108 t.traceBegin("NetworkWatchlistService");
Ricky Wai1a6e6672017-10-27 14:46:01 +01001109 mSystemServiceManager.startService(NetworkWatchlistService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001110 t.traceEnd();
Ricky Wai1a6e6672017-10-27 14:46:01 +01001111
Felipe Leme3aad1be2019-05-31 11:43:12 -07001112 t.traceBegin("PinnerService");
Philip Cuadra7bd0fdd2016-04-28 15:26:49 -07001113 mSystemServiceManager.startService(PinnerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001114 t.traceEnd();
Mathew Inwood4e2ed6a2018-11-26 15:31:16 +00001115
Felipe Leme3aad1be2019-05-31 11:43:12 -07001116 t.traceBegin("IorapForwardingService");
Igor Murashkin4de1e162018-11-26 10:33:17 -08001117 mSystemServiceManager.startService(IorapForwardingService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001118 t.traceEnd();
Igor Murashkin4de1e162018-11-26 10:33:17 -08001119
Felipe Leme3aad1be2019-05-31 11:43:12 -07001120 t.traceBegin("SignedConfigService");
Mathew Inwood4e2ed6a2018-11-26 15:31:16 +00001121 SignedConfigService.registerUpdateReceiver(mSystemContext);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001122 t.traceEnd();
Andrei Oneacf109842019-07-17 19:03:10 +01001123
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001124 } catch (RuntimeException e) {
Dianne Hackborn661cd522011-08-22 00:26:20 -07001125 Slog.e("System", "******************************************");
1126 Slog.e("System", "************ Failure starting core service", e);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001127 }
1128
Rene Mayrhofer7d6c8e52018-11-28 11:32:40 -08001129 // Before things start rolling, be sure we have decided whether
1130 // we are in safe mode.
1131 final boolean safeMode = wm.detectSafeMode();
1132 if (safeMode) {
1133 // If yes, immediately turn on the global setting for airplane mode.
1134 // Note that this does not send broadcasts at this stage because
1135 // subsystems are not yet up. We will send broadcasts later to ensure
1136 // all listeners have the chance to react with special handling.
1137 Settings.Global.putInt(context.getContentResolver(),
1138 Settings.Global.AIRPLANE_MODE_ON, 1);
1139 }
1140
Joe Onorato089de882010-04-12 08:18:45 -07001141 StatusBarManagerService statusBar = null;
Adam Lesinskief2ea1f2013-12-05 16:48:06 -08001142 INotificationManager notification = null;
Bai Taoa58a8752010-07-13 15:32:16 +08001143 CountryDetectorService countryDetector = null;
Jim Miller4f93c582016-01-27 19:05:43 -08001144 ILockSettings lockSettings = null;
Jeff Brown69b07162013-11-07 00:30:16 -08001145 MediaRouterService mediaRouter = null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001146
Dianne Hackborn661cd522011-08-22 00:26:20 -07001147 // Bring up services needed for UI.
Jeff Brown6f357d32014-01-15 20:40:55 -08001148 if (mFactoryTestMode != FactoryTest.FACTORY_TEST_LOW_LEVEL) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001149 t.traceBegin("StartInputMethodManagerLifecycle");
Yohei Yukawa6048d892018-12-25 09:57:31 -08001150 if (InputMethodSystemProperty.MULTI_CLIENT_IME_ENABLED) {
Yohei Yukawabae5bea2018-11-12 15:08:30 -08001151 mSystemServiceManager.startService(
1152 MultiClientInputMethodManagerService.Lifecycle.class);
1153 } else {
1154 mSystemServiceManager.startService(InputMethodManagerService.Lifecycle.class);
1155 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001156 t.traceEnd();
Dianne Hackborn661cd522011-08-22 00:26:20 -07001157
Felipe Leme3aad1be2019-05-31 11:43:12 -07001158 t.traceBegin("StartAccessibilityManagerService");
dcashman4e3f5d32014-11-25 15:33:26 -08001159 try {
Rhed Jao8a39cef2018-07-18 11:43:33 +08001160 mSystemServiceManager.startService(ACCESSIBILITY_MANAGER_SERVICE_CLASS);
dcashman4e3f5d32014-11-25 15:33:26 -08001161 } catch (Throwable e) {
1162 reportWtf("starting Accessibility Manager", e);
Dianne Hackborn661cd522011-08-22 00:26:20 -07001163 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001164 t.traceEnd();
Dianne Hackborn661cd522011-08-22 00:26:20 -07001165 }
1166
Felipe Leme3aad1be2019-05-31 11:43:12 -07001167 t.traceBegin("MakeDisplayReady");
Dianne Hackborn661cd522011-08-22 00:26:20 -07001168 try {
1169 wm.displayReady();
1170 } catch (Throwable e) {
1171 reportWtf("making display ready", e);
1172 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001173 t.traceEnd();
Dianne Hackborn8795b602011-08-25 13:30:53 -07001174
Jeff Brown6f357d32014-01-15 20:40:55 -08001175 if (mFactoryTestMode != FactoryTest.FACTORY_TEST_LOW_LEVEL) {
Narayan Kamath1c888f62017-10-30 14:35:15 +00001176 if (!"0".equals(SystemProperties.get("system_init.startmountservice"))) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001177 t.traceBegin("StartStorageManagerService");
Kenny Root51a573c2012-05-17 13:30:28 -07001178 try {
1179 /*
Sudheer Shanka2250d562016-11-07 15:41:02 -08001180 * NotificationManagerService is dependant on StorageManagerService,
1181 * (for media / usb notifications) so we must start StorageManagerService first.
Kenny Root51a573c2012-05-17 13:30:28 -07001182 */
Sudheer Shanka2250d562016-11-07 15:41:02 -08001183 mSystemServiceManager.startService(STORAGE_MANAGER_SERVICE_CLASS);
1184 storageManager = IStorageManager.Stub.asInterface(
Jeff Sharkey56e62932015-03-21 20:41:00 -07001185 ServiceManager.getService("mount"));
Kenny Root51a573c2012-05-17 13:30:28 -07001186 } catch (Throwable e) {
Jeff Sharkeye8cece92017-01-04 11:33:33 -07001187 reportWtf("starting StorageManagerService", e);
1188 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001189 t.traceEnd();
Jeff Sharkeye8cece92017-01-04 11:33:33 -07001190
Felipe Leme3aad1be2019-05-31 11:43:12 -07001191 t.traceBegin("StartStorageStatsService");
Jeff Sharkeye8cece92017-01-04 11:33:33 -07001192 try {
1193 mSystemServiceManager.startService(STORAGE_STATS_SERVICE_CLASS);
1194 } catch (Throwable e) {
1195 reportWtf("starting StorageStatsService", e);
Kenny Root51a573c2012-05-17 13:30:28 -07001196 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001197 t.traceEnd();
Kenny Root51a573c2012-05-17 13:30:28 -07001198 }
padarshrada45412014-11-05 16:54:50 +05301199 }
Kenny Root51a573c2012-05-17 13:30:28 -07001200
Adam Lesinski05199e82015-03-19 14:37:11 -07001201 // We start this here so that we update our configuration to set watch or television
1202 // as appropriate.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001203 t.traceBegin("StartUiModeManager");
Adam Lesinski05199e82015-03-19 14:37:11 -07001204 mSystemServiceManager.startService(UiModeManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001205 t.traceEnd();
Adam Lesinski05199e82015-03-19 14:37:11 -07001206
David Brazdil89c80bb2016-06-02 15:31:30 +01001207 if (!mOnlyCore) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001208 t.traceBegin("UpdatePackagesIfNeeded");
David Brazdil89c80bb2016-06-02 15:31:30 +01001209 try {
Zimuzo2a050392019-05-09 12:51:33 +01001210 Watchdog.getInstance().pauseWatchingCurrentThread("dexopt");
David Brazdil89c80bb2016-06-02 15:31:30 +01001211 mPackageManagerService.updatePackagesIfNeeded();
1212 } catch (Throwable e) {
1213 reportWtf("update packages", e);
Zimuzo2a050392019-05-09 12:51:33 +01001214 } finally {
1215 Watchdog.getInstance().resumeWatchingCurrentThread("dexopt");
David Brazdil89c80bb2016-06-02 15:31:30 +01001216 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001217 t.traceEnd();
David Brazdilf5c444f2016-03-30 11:45:52 +01001218 }
David Brazdilf5c444f2016-03-30 11:45:52 +01001219
Felipe Leme3aad1be2019-05-31 11:43:12 -07001220 t.traceBegin("PerformFstrimIfNeeded");
padarshrada45412014-11-05 16:54:50 +05301221 try {
Nicolas Geoffray27c07372015-11-05 16:54:09 +00001222 mPackageManagerService.performFstrimIfNeeded();
padarshrada45412014-11-05 16:54:50 +05301223 } catch (Throwable e) {
Nicolas Geoffray27c07372015-11-05 16:54:09 +00001224 reportWtf("performing fstrim", e);
padarshrada45412014-11-05 16:54:50 +05301225 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001226 t.traceEnd();
padarshrada45412014-11-05 16:54:50 +05301227
padarshrada45412014-11-05 16:54:50 +05301228 if (mFactoryTestMode != FactoryTest.FACTORY_TEST_LOW_LEVEL) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001229 t.traceBegin("StartLockSettingsService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001230 try {
1231 mSystemServiceManager.startService(LOCK_SETTINGS_SERVICE_CLASS);
1232 lockSettings = ILockSettings.Stub.asInterface(
Christine Franksea7d71b2018-07-03 14:46:07 -07001233 ServiceManager.getService("lock_settings"));
Narayan Kamath1c888f62017-10-30 14:35:15 +00001234 } catch (Throwable e) {
1235 reportWtf("starting LockSettingsService service", e);
1236 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001237 t.traceEnd();
Dan Morrille4d9a012013-03-28 18:10:43 -07001238
Narayan Kamath1c888f62017-10-30 14:35:15 +00001239 final boolean hasPdb = !SystemProperties.get(PERSISTENT_DATA_BLOCK_PROP).equals("");
David Andersona032a2b2019-02-07 14:07:23 -08001240 final boolean hasGsi = SystemProperties.getInt(GSI_RUNNING_PROP, 0) > 0;
1241 if (hasPdb && !hasGsi) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001242 t.traceBegin("StartPersistentDataBlock");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001243 mSystemServiceManager.startService(PersistentDataBlockService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001244 t.traceEnd();
Amith Yamasani52c489c2012-03-28 11:42:42 -07001245 }
1246
Felipe Leme3aad1be2019-05-31 11:43:12 -07001247 t.traceBegin("StartTestHarnessMode");
William Hester87ac4ea2019-05-06 16:23:47 -07001248 mSystemServiceManager.startService(TestHarnessModeService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001249 t.traceEnd();
William Hester87ac4ea2019-05-06 16:23:47 -07001250
Narayan Kamath1c888f62017-10-30 14:35:15 +00001251 if (hasPdb || OemLockService.isHalPresent()) {
1252 // Implementation depends on pdb or the OemLock HAL
Felipe Leme3aad1be2019-05-31 11:43:12 -07001253 t.traceBegin("StartOemLockService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001254 mSystemServiceManager.startService(OemLockService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001255 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001256 }
1257
Felipe Leme3aad1be2019-05-31 11:43:12 -07001258 t.traceBegin("StartDeviceIdleController");
Makoto Onuki52c24b32019-08-23 10:18:28 -07001259 mSystemServiceManager.startService(DEVICE_IDLE_CONTROLLER_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001260 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001261
1262 // Always start the Device Policy Manager, so that the API is compatible with
1263 // API8.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001264 t.traceBegin("StartDevicePolicyManager");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001265 mSystemServiceManager.startService(DevicePolicyManagerService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001266 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001267
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001268 if (!isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001269 t.traceBegin("StartStatusBarManagerService");
Dan Morrille4d9a012013-03-28 18:10:43 -07001270 try {
Dan Morrille4d9a012013-03-28 18:10:43 -07001271 statusBar = new StatusBarManagerService(context, wm);
1272 ServiceManager.addService(Context.STATUS_BAR_SERVICE, statusBar);
1273 } catch (Throwable e) {
1274 reportWtf("starting StatusBarManagerService", e);
1275 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001276 t.traceEnd();
Dianne Hackbornd6847842010-01-12 18:14:19 -08001277 }
1278
Felipe Leme3aad1be2019-05-31 11:43:12 -07001279 startContentCaptureService(context, t);
1280 startAttentionService(context, t);
Felipe Leme927fbf02018-11-12 17:27:23 -08001281
Felipe Leme3aad1be2019-05-31 11:43:12 -07001282 startSystemCaptionsManagerService(context, t);
Robert Berry835123d2019-03-18 16:33:42 -04001283
Sunny Goyal54e91342018-11-14 11:59:02 -08001284 // App prediction manager service
Felipe Leme83e8f242019-08-14 16:57:56 +00001285 if (deviceHasConfigString(context, R.string.config_defaultAppPredictionService)) {
1286 t.traceBegin("StartAppPredictionService");
1287 mSystemServiceManager.startService(APP_PREDICTION_MANAGER_SERVICE_CLASS);
1288 t.traceEnd();
1289 } else {
1290 Slog.d(TAG, "AppPredictionService not defined by OEM");
1291 }
Sunny Goyal54e91342018-11-14 11:59:02 -08001292
Winson Chung3fb0f252019-01-08 17:41:55 -08001293 // Content suggestions manager service
Felipe Leme83e8f242019-08-14 16:57:56 +00001294 if (deviceHasConfigString(context, R.string.config_defaultContentSuggestionsService)) {
1295 t.traceBegin("StartContentSuggestionsService");
1296 mSystemServiceManager.startService(CONTENT_SUGGESTIONS_SERVICE_CLASS);
1297 t.traceEnd();
1298 } else {
1299 Slog.d(TAG, "ContentSuggestionsService not defined by OEM");
1300 }
Winson Chung3fb0f252019-01-08 17:41:55 -08001301
Roshan Pius7e6f5f52019-06-27 14:14:40 -07001302 t.traceBegin("InitConnectivityModuleConnector");
1303 try {
1304 ConnectivityModuleConnector.getInstance().init(context);
1305 } catch (Throwable e) {
1306 reportWtf("initializing ConnectivityModuleConnector", e);
1307 }
1308 t.traceEnd();
1309
Felipe Leme3aad1be2019-05-31 11:43:12 -07001310 t.traceBegin("InitNetworkStackClient");
Remi NGUYEN VAN389443c2019-03-15 08:21:27 +09001311 try {
1312 NetworkStackClient.getInstance().init();
1313 } catch (Throwable e) {
1314 reportWtf("initializing NetworkStackClient", e);
1315 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001316 t.traceEnd();
Remi NGUYEN VAN389443c2019-03-15 08:21:27 +09001317
Felipe Leme3aad1be2019-05-31 11:43:12 -07001318 t.traceBegin("StartNetworkManagementService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001319 try {
1320 networkManagement = NetworkManagementService.create(context);
1321 ServiceManager.addService(Context.NETWORKMANAGEMENT_SERVICE, networkManagement);
1322 } catch (Throwable e) {
1323 reportWtf("starting NetworkManagement Service", e);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001324 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001325 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001326
Chalard Jean8c141bd2018-12-04 20:20:56 +09001327
Felipe Leme3aad1be2019-05-31 11:43:12 -07001328 t.traceBegin("StartIpSecService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001329 try {
1330 ipSecService = IpSecService.create(context);
1331 ServiceManager.addService(Context.IPSEC_SERVICE, ipSecService);
1332 } catch (Throwable e) {
1333 reportWtf("starting IpSec Service", e);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001334 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001335 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001336
Felipe Leme3aad1be2019-05-31 11:43:12 -07001337 t.traceBegin("StartTextServicesManager");
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001338 mSystemServiceManager.startService(TextServicesManagerService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001339 t.traceEnd();
San Mehatd1df8ac2010-01-26 06:17:26 -08001340
Abodunrinwa Tokid32906c2018-01-18 04:34:44 -08001341 if (!disableSystemTextClassifier) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001342 t.traceBegin("StartTextClassificationManagerService");
Christine Franksea7d71b2018-07-03 14:46:07 -07001343 mSystemServiceManager
1344 .startService(TextClassificationManagerService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001345 t.traceEnd();
Abodunrinwa Tokid32906c2018-01-18 04:34:44 -08001346 }
1347
Felipe Leme3aad1be2019-05-31 11:43:12 -07001348 t.traceBegin("StartNetworkScoreService");
Mehdi Alizadehce2d9632018-03-28 17:34:24 -07001349 mSystemServiceManager.startService(NetworkScoreService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001350 t.traceEnd();
vandwalle7c3606c2014-03-31 19:12:07 -07001351
Felipe Leme3aad1be2019-05-31 11:43:12 -07001352 t.traceBegin("StartNetworkStatsService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001353 try {
1354 networkStats = NetworkStatsService.create(context, networkManagement);
1355 ServiceManager.addService(Context.NETWORK_STATS_SERVICE, networkStats);
1356 } catch (Throwable e) {
1357 reportWtf("starting NetworkStats Service", e);
1358 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001359 t.traceEnd();
Dan Morrille4d9a012013-03-28 18:10:43 -07001360
Felipe Leme3aad1be2019-05-31 11:43:12 -07001361 t.traceBegin("StartNetworkPolicyManagerService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001362 try {
Jeff Sharkeye0c29952018-02-20 17:24:55 -07001363 networkPolicy = new NetworkPolicyManagerService(context, mActivityManagerService,
1364 networkManagement);
Narayan Kamath1c888f62017-10-30 14:35:15 +00001365 ServiceManager.addService(Context.NETWORK_POLICY_SERVICE, networkPolicy);
1366 } catch (Throwable e) {
1367 reportWtf("starting NetworkPolicy Service", e);
1368 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001369 t.traceEnd();
Dan Morrille4d9a012013-03-28 18:10:43 -07001370
Roshan Piusc0bd9452019-01-28 10:03:07 -08001371 if (context.getPackageManager().hasSystemFeature(
Roshan Piusc0bd9452019-01-28 10:03:07 -08001372 PackageManager.FEATURE_LOWPAN)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001373 t.traceBegin("StartLowpan");
Roshan Piusc0bd9452019-01-28 10:03:07 -08001374 mSystemServiceManager.startService(LOWPAN_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001375 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001376 }
Lorenzo Colittif9ff2c92014-05-21 16:32:11 -07001377
Narayan Kamath1c888f62017-10-30 14:35:15 +00001378 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_ETHERNET) ||
Christine Franksea7d71b2018-07-03 14:46:07 -07001379 mPackageManager.hasSystemFeature(PackageManager.FEATURE_USB_HOST)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001380 t.traceBegin("StartEthernet");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001381 mSystemServiceManager.startService(ETHERNET_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001382 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001383 }
1384
Felipe Leme3aad1be2019-05-31 11:43:12 -07001385 t.traceBegin("StartConnectivityService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001386 try {
1387 connectivity = new ConnectivityService(
Christine Franksea7d71b2018-07-03 14:46:07 -07001388 context, networkManagement, networkStats, networkPolicy);
Narayan Kamath1c888f62017-10-30 14:35:15 +00001389 ServiceManager.addService(Context.CONNECTIVITY_SERVICE, connectivity,
Christine Franksea7d71b2018-07-03 14:46:07 -07001390 /* allowIsolated= */ false,
1391 DUMP_FLAG_PRIORITY_HIGH | DUMP_FLAG_PRIORITY_NORMAL);
Narayan Kamath1c888f62017-10-30 14:35:15 +00001392 networkPolicy.bindConnectivityManager(connectivity);
1393 } catch (Throwable e) {
1394 reportWtf("starting Connectivity Service", e);
satok988323c2011-06-22 16:38:13 +09001395 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001396 t.traceEnd();
satok988323c2011-06-22 16:38:13 +09001397
Felipe Leme3aad1be2019-05-31 11:43:12 -07001398 t.traceBegin("StartNsdService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001399 try {
1400 serviceDiscovery = NsdService.create(context);
1401 ServiceManager.addService(
Christine Franksea7d71b2018-07-03 14:46:07 -07001402 Context.NSD_SERVICE, serviceDiscovery);
Narayan Kamath1c888f62017-10-30 14:35:15 +00001403 } catch (Throwable e) {
1404 reportWtf("starting Service Discovery Service", e);
Christopher Tate8662cab52012-02-23 14:59:36 -08001405 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001406 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001407
Felipe Leme3aad1be2019-05-31 11:43:12 -07001408 t.traceBegin("StartSystemUpdateManagerService");
Tao Bao07342dc2017-01-24 15:08:21 -08001409 try {
1410 ServiceManager.addService(Context.SYSTEM_UPDATE_SERVICE,
1411 new SystemUpdateManagerService(context));
1412 } catch (Throwable e) {
1413 reportWtf("starting SystemUpdateManagerService", e);
1414 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001415 t.traceEnd();
Tao Bao07342dc2017-01-24 15:08:21 -08001416
Felipe Leme3aad1be2019-05-31 11:43:12 -07001417 t.traceBegin("StartUpdateLockService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001418 try {
1419 ServiceManager.addService(Context.UPDATE_LOCK_SERVICE,
Christine Franksea7d71b2018-07-03 14:46:07 -07001420 new UpdateLockService(context));
Narayan Kamath1c888f62017-10-30 14:35:15 +00001421 } catch (Throwable e) {
1422 reportWtf("starting UpdateLockService", e);
1423 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001424 t.traceEnd();
Christopher Tate8662cab52012-02-23 14:59:36 -08001425
Felipe Leme3aad1be2019-05-31 11:43:12 -07001426 t.traceBegin("StartNotificationManager");
Jeff Brown6f357d32014-01-15 20:40:55 -08001427 mSystemServiceManager.startService(NotificationManagerService.class);
Rubin Xu897750a2019-04-30 17:15:03 +01001428 SystemNotificationChannels.removeDeprecated(context);
Geoffrey Pitschaf759c52017-02-15 09:35:38 -05001429 SystemNotificationChannels.createAll(context);
Adam Lesinskief2ea1f2013-12-05 16:48:06 -08001430 notification = INotificationManager.Stub.asInterface(
1431 ServiceManager.getService(Context.NOTIFICATION_SERVICE));
Felipe Leme3aad1be2019-05-31 11:43:12 -07001432 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001433
Felipe Leme3aad1be2019-05-31 11:43:12 -07001434 t.traceBegin("StartDeviceMonitor");
Jeff Brown6f357d32014-01-15 20:40:55 -08001435 mSystemServiceManager.startService(DeviceStorageMonitorService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001436 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001437
Felipe Leme3aad1be2019-05-31 11:43:12 -07001438 t.traceBegin("StartLocationManagerService");
Soonil Nagarkar141417a2019-10-28 11:12:48 -07001439 mSystemServiceManager.startService(LocationManagerService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001440 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001441
Felipe Leme3aad1be2019-05-31 11:43:12 -07001442 t.traceBegin("StartCountryDetectorService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001443 try {
1444 countryDetector = new CountryDetectorService(context);
1445 ServiceManager.addService(Context.COUNTRY_DETECTOR, countryDetector);
1446 } catch (Throwable e) {
1447 reportWtf("starting Country Detector", e);
1448 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001449 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001450
Neil Fullerbef7e802019-06-27 15:01:01 +01001451 t.traceBegin("StartTimeDetectorService");
1452 try {
1453 mSystemServiceManager.startService(TIME_DETECTOR_SERVICE_CLASS);
1454 } catch (Throwable e) {
1455 reportWtf("starting StartTimeDetectorService service", e);
Neil Fuller7fb88c32018-06-19 12:53:47 +01001456 }
Neil Fullerbef7e802019-06-27 15:01:01 +01001457 t.traceEnd();
Neil Fuller7fb88c32018-06-19 12:53:47 +01001458
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001459 if (!isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001460 t.traceBegin("StartSearchManagerService");
Dan Morrille4d9a012013-03-28 18:10:43 -07001461 try {
Jeff Sharkey4175be22016-01-09 14:57:45 -07001462 mSystemServiceManager.startService(SEARCH_MANAGER_SERVICE_CLASS);
Dan Morrille4d9a012013-03-28 18:10:43 -07001463 } catch (Throwable e) {
1464 reportWtf("starting Search Service", e);
1465 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001466 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001467 }
1468
Narayan Kamath1c888f62017-10-30 14:35:15 +00001469 if (context.getResources().getBoolean(R.bool.config_enableWallpaperService)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001470 t.traceBegin("StartWallpaperManagerService");
Jeff Sharkey1cab76a2016-04-12 18:23:31 -06001471 mSystemServiceManager.startService(WALLPAPER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001472 t.traceEnd();
Felipe Leme34a861a2019-08-05 16:00:12 -07001473 } else {
1474 Slog.i(TAG, "Wallpaper service disabled by config");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001475 }
1476
Felipe Leme3aad1be2019-05-31 11:43:12 -07001477 t.traceBegin("StartAudioService");
paulhsia0a1b3222018-11-08 18:15:46 +08001478 if (!isArc) {
1479 mSystemServiceManager.startService(AudioService.Lifecycle.class);
1480 } else {
1481 String className = context.getResources()
1482 .getString(R.string.config_deviceSpecificAudioService);
1483 try {
1484 mSystemServiceManager.startService(className + "$Lifecycle");
1485 } catch (Throwable e) {
1486 reportWtf("starting " + className, e);
1487 }
1488 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001489 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001490
Tomasz Wasilczyk05392d62017-07-10 19:33:22 -07001491 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_BROADCAST_RADIO)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001492 t.traceBegin("StartBroadcastRadioService");
Tomasz Wasilczyk6b4b6462017-07-19 10:52:28 -07001493 mSystemServiceManager.startService(BroadcastRadioService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001494 t.traceEnd();
Tomasz Wasilczyk347192e2017-04-04 11:13:44 -07001495 }
1496
Felipe Leme3aad1be2019-05-31 11:43:12 -07001497 t.traceBegin("StartDockObserver");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001498 mSystemServiceManager.startService(DockObserver.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001499 t.traceEnd();
Bryce Leebc58f592015-09-25 16:43:01 -07001500
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001501 if (isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001502 t.traceBegin("StartThermalObserver");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001503 mSystemServiceManager.startService(THERMAL_OBSERVER_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001504 t.traceEnd();
Dan Murphyc9f4eaf2009-08-12 15:15:43 -05001505 }
1506
Felipe Leme3aad1be2019-05-31 11:43:12 -07001507 t.traceBegin("StartWiredAccessoryManager");
John Spurlockb4f01b92015-03-24 12:40:15 -04001508 try {
John Spurlockb4f01b92015-03-24 12:40:15 -04001509 // Listen for wired headset changes
1510 inputManager.setWiredAccessoryCallbacks(
1511 new WiredAccessoryManager(context, inputManager));
1512 } catch (Throwable e) {
1513 reportWtf("starting WiredAccessoryManager", e);
Praveen Bharathi21e941b2010-10-06 15:23:14 -05001514 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001515 t.traceEnd();
Praveen Bharathi21e941b2010-10-06 15:23:14 -05001516
Narayan Kamath1c888f62017-10-30 14:35:15 +00001517 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_MIDI)) {
1518 // Start MIDI Manager service
Felipe Leme3aad1be2019-05-31 11:43:12 -07001519 t.traceBegin("StartMidiManager");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001520 mSystemServiceManager.startService(MIDI_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001521 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001522 }
Mike Lockwood5781cd52015-03-27 13:23:41 -07001523
Kenny Root4673a1d12018-12-05 12:20:02 +09001524 // Start ADB Debugging Service
Felipe Leme3aad1be2019-05-31 11:43:12 -07001525 t.traceBegin("StartAdbService");
Kenny Root4673a1d12018-12-05 12:20:02 +09001526 try {
1527 mSystemServiceManager.startService(ADB_SERVICE_CLASS);
1528 } catch (Throwable e) {
1529 Slog.e(TAG, "Failure starting AdbService");
1530 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001531 t.traceEnd();
Kenny Root4673a1d12018-12-05 12:20:02 +09001532
Narayan Kamath1c888f62017-10-30 14:35:15 +00001533 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_USB_HOST)
Christine Franksea7d71b2018-07-03 14:46:07 -07001534 || mPackageManager.hasSystemFeature(
1535 PackageManager.FEATURE_USB_ACCESSORY)
1536 || isEmulator) {
Narayan Kamath1c888f62017-10-30 14:35:15 +00001537 // Manage USB host and device support
Felipe Leme3aad1be2019-05-31 11:43:12 -07001538 t.traceBegin("StartUsbService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001539 mSystemServiceManager.startService(USB_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001540 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001541 }
Mike Lockwood57c798a2010-06-23 17:36:36 -04001542
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001543 if (!isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001544 t.traceBegin("StartSerialService");
Polina Bondarenkof8754ac2016-02-12 20:38:23 +01001545 try {
Narayan Kamath1c888f62017-10-30 14:35:15 +00001546 // Serial port support
1547 serial = new SerialService(context);
1548 ServiceManager.addService(Context.SERIAL_SERVICE, serial);
Polina Bondarenkof8754ac2016-02-12 20:38:23 +01001549 } catch (Throwable e) {
Narayan Kamath1c888f62017-10-30 14:35:15 +00001550 Slog.e(TAG, "Failure starting SerialService", e);
Polina Bondarenkof8754ac2016-02-12 20:38:23 +01001551 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001552 t.traceEnd();
Mike Lockwoodb01e8bf2011-08-29 20:11:07 -04001553 }
1554
Felipe Leme3aad1be2019-05-31 11:43:12 -07001555 t.traceBegin("StartHardwarePropertiesManagerService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001556 try {
1557 hardwarePropertiesService = new HardwarePropertiesManagerService(context);
1558 ServiceManager.addService(Context.HARDWARE_PROPERTIES_SERVICE,
Christine Franksea7d71b2018-07-03 14:46:07 -07001559 hardwarePropertiesService);
Narayan Kamath1c888f62017-10-30 14:35:15 +00001560 } catch (Throwable e) {
1561 Slog.e(TAG, "Failure starting HardwarePropertiesManagerService", e);
1562 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001563 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001564
Felipe Leme3aad1be2019-05-31 11:43:12 -07001565 t.traceBegin("StartTwilightService");
Jeff Brown6f357d32014-01-15 20:40:55 -08001566 mSystemServiceManager.startService(TwilightService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001567 t.traceEnd();
Jeff Brown2416e092012-08-21 22:12:20 -07001568
Felipe Leme3aad1be2019-05-31 11:43:12 -07001569 t.traceBegin("StartColorDisplay");
Christine Franks17a9bc82018-12-10 10:19:02 -08001570 mSystemServiceManager.startService(ColorDisplayService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001571 t.traceEnd();
Justin Klaassen911e8892016-06-21 18:24:24 -07001572
Makoto Onuki792de8d2019-07-16 16:19:01 -07001573 // TODO(aml-jobscheduler): Think about how to do it properly.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001574 t.traceBegin("StartJobScheduler");
Makoto Onuki792de8d2019-07-16 16:19:01 -07001575 mSystemServiceManager.startService(JOB_SCHEDULER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001576 t.traceEnd();
Christopher Tatefa380e92014-05-19 13:46:29 -07001577
Felipe Leme3aad1be2019-05-31 11:43:12 -07001578 t.traceBegin("StartSoundTrigger");
Arunesh Mishraa772e5f2016-01-25 10:33:11 -08001579 mSystemServiceManager.startService(SoundTriggerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001580 t.traceEnd();
Arunesh Mishraa772e5f2016-01-25 10:33:11 -08001581
Felipe Leme3aad1be2019-05-31 11:43:12 -07001582 t.traceBegin("StartTrustManager");
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001583 mSystemServiceManager.startService(TrustManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001584 t.traceEnd();
Jaikumar Ganesh7d0548d2010-10-18 15:29:09 -07001585
Narayan Kamath1c888f62017-10-30 14:35:15 +00001586 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_BACKUP)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001587 t.traceBegin("StartBackupManager");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001588 mSystemServiceManager.startService(BACKUP_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001589 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001590 }
1591
1592 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_APP_WIDGETS)
Christine Franksea7d71b2018-07-03 14:46:07 -07001593 || context.getResources().getBoolean(R.bool.config_enableAppWidgetService)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001594 t.traceBegin("StartAppWidgetService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001595 mSystemServiceManager.startService(APPWIDGET_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001596 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001597 }
1598
Philip P. Moltmann5d894502019-01-17 10:31:00 -08001599 // Grants default permissions and defines roles
Felipe Leme3aad1be2019-05-31 11:43:12 -07001600 t.traceBegin("StartRoleManagerService");
Philip P. Moltmann5d894502019-01-17 10:31:00 -08001601 mSystemServiceManager.startService(new RoleManagerService(
1602 mSystemContext, new LegacyRoleResolutionPolicy(mSystemContext)));
Felipe Leme3aad1be2019-05-31 11:43:12 -07001603 t.traceEnd();
Philip P. Moltmann5d894502019-01-17 10:31:00 -08001604
Narayan Kamath1c888f62017-10-30 14:35:15 +00001605 // We need to always start this service, regardless of whether the
1606 // FEATURE_VOICE_RECOGNIZERS feature is set, because it needs to take care
1607 // of initializing various settings. It will internally modify its behavior
1608 // based on that feature.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001609 t.traceBegin("StartVoiceRecognitionManager");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001610 mSystemServiceManager.startService(VOICE_RECOGNITION_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001611 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001612
1613 if (GestureLauncherService.isGestureLauncherEnabled(context.getResources())) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001614 t.traceBegin("StartGestureLauncher");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001615 mSystemServiceManager.startService(GestureLauncherService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001616 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001617 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001618 t.traceBegin("StartSensorNotification");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001619 mSystemServiceManager.startService(SensorNotificationService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001620 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001621
Felipe Leme3aad1be2019-05-31 11:43:12 -07001622 t.traceBegin("StartContextHubSystemService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001623 mSystemServiceManager.startService(ContextHubSystemService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001624 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001625
Felipe Leme3aad1be2019-05-31 11:43:12 -07001626 t.traceBegin("StartDiskStatsService");
Nick Pelly038cabe2010-09-23 16:12:11 -07001627 try {
Dan Egnor621bc542010-03-25 16:20:14 -07001628 ServiceManager.addService("diskstats", new DiskStatsService(context));
1629 } catch (Throwable e) {
Dianne Hackborn661cd522011-08-22 00:26:20 -07001630 reportWtf("starting DiskStats Service", e);
Dan Egnor621bc542010-03-25 16:20:14 -07001631 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001632 t.traceEnd();
Sen Hubde75702010-05-28 01:54:03 -07001633
Felipe Leme3aad1be2019-05-31 11:43:12 -07001634 t.traceBegin("RuntimeService");
Neil Fullerab0b81e2018-11-20 19:37:22 +00001635 try {
1636 ServiceManager.addService("runtime", new RuntimeService(context));
1637 } catch (Throwable e) {
1638 reportWtf("starting RuntimeService", e);
1639 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001640 t.traceEnd();
Neil Fullerab0b81e2018-11-20 19:37:22 +00001641
Neil Fullercd1a1092017-09-13 21:59:59 +01001642 // timezone.RulesManagerService will prevent a device starting up if the chain of trust
1643 // required for safe time zone updates might be broken. RuleManagerService cannot do
1644 // this check when mOnlyCore == true, so we don't enable the service in this case.
1645 // This service requires that JobSchedulerService is already started when it starts.
1646 final boolean startRulesManagerService =
1647 !mOnlyCore && context.getResources().getBoolean(
1648 R.bool.config_enableUpdateableTimeZoneRules);
1649 if (startRulesManagerService) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001650 t.traceBegin("StartTimeZoneRulesManagerService");
Neil Fullercd1a1092017-09-13 21:59:59 +01001651 mSystemServiceManager.startService(TIME_ZONE_RULES_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001652 t.traceEnd();
Neil Fullercd1a1092017-09-13 21:59:59 +01001653 }
1654
Steve Paik117fcb02018-09-13 09:43:54 -07001655 if (!isWatch && !disableNetworkTime) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001656 t.traceBegin("StartNetworkTimeUpdateService");
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001657 try {
Neil Fullerbef7e802019-06-27 15:01:01 +01001658 networkTimeUpdater = new NetworkTimeUpdateServiceImpl(context);
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001659 ServiceManager.addService("network_time_update_service", networkTimeUpdater);
1660 } catch (Throwable e) {
1661 reportWtf("starting NetworkTimeUpdate service", e);
1662 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001663 t.traceEnd();
Amith Yamasani6734b9f2010-09-13 16:24:08 -07001664 }
John Grossmanc1576732012-02-01 15:23:33 -08001665
Felipe Leme3aad1be2019-05-31 11:43:12 -07001666 t.traceBegin("CertBlacklister");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001667 try {
1668 CertBlacklister blacklister = new CertBlacklister(context);
1669 } catch (Throwable e) {
1670 reportWtf("starting CertBlacklister", e);
Geremy Condra3d33c262012-05-06 18:32:19 -07001671 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001672 t.traceEnd();
Jim Miller5ecd8112013-01-09 18:50:26 -08001673
Narayan Kamath1c888f62017-10-30 14:35:15 +00001674 if (EmergencyAffordanceManager.ENABLED) {
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08001675 // EmergencyMode service
Felipe Leme3aad1be2019-05-31 11:43:12 -07001676 t.traceBegin("StartEmergencyAffordanceService");
Selim Cinek705442f2016-09-13 16:02:33 -07001677 mSystemServiceManager.startService(EmergencyAffordanceService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001678 t.traceEnd();
Selim Cinek705442f2016-09-13 16:02:33 -07001679 }
1680
Narayan Kamath1c888f62017-10-30 14:35:15 +00001681 // Dreams (interactive idle-time views, a/k/a screen savers, and doze mode)
Felipe Leme3aad1be2019-05-31 11:43:12 -07001682 t.traceBegin("StartDreamManager");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001683 mSystemServiceManager.startService(DreamManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001684 t.traceEnd();
Svetoslavb3038ec2013-02-13 14:39:30 -08001685
Felipe Leme3aad1be2019-05-31 11:43:12 -07001686 t.traceBegin("AddGraphicsStatsService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001687 ServiceManager.addService(GraphicsStatsService.GRAPHICS_STATS_SERVICE,
Christine Franksea7d71b2018-07-03 14:46:07 -07001688 new GraphicsStatsService(context));
Felipe Leme3aad1be2019-05-31 11:43:12 -07001689 t.traceEnd();
John Reckedc524c2015-03-18 15:24:33 -07001690
Narayan Kamath1c888f62017-10-30 14:35:15 +00001691 if (CoverageService.ENABLED) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001692 t.traceBegin("AddCoverageService");
Allen Hair1f556e32016-11-11 15:42:50 -08001693 ServiceManager.addService(CoverageService.COVERAGE_SERVICE, new CoverageService());
Felipe Leme3aad1be2019-05-31 11:43:12 -07001694 t.traceEnd();
Allen Hair1f556e32016-11-11 15:42:50 -08001695 }
1696
Jeff Brown2c43c332014-06-12 22:38:59 -07001697 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_PRINTING)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001698 t.traceBegin("StartPrintManager");
Jeff Brown2c43c332014-06-12 22:38:59 -07001699 mSystemServiceManager.startService(PRINT_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001700 t.traceEnd();
Svetoslav Ganov4b9a4d12013-06-11 15:20:06 -07001701 }
Jeff Brown69b07162013-11-07 00:30:16 -08001702
Eugene Susla7c3eef22017-03-10 14:25:58 -08001703 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_COMPANION_DEVICE_SETUP)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001704 t.traceBegin("StartCompanionDeviceManager");
Eugene Susla7c3eef22017-03-10 14:25:58 -08001705 mSystemServiceManager.startService(COMPANION_DEVICE_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001706 t.traceEnd();
Eugene Susla7c3eef22017-03-10 14:25:58 -08001707 }
Eugene Susla6ed45d82017-01-22 13:52:51 -08001708
Felipe Leme3aad1be2019-05-31 11:43:12 -07001709 t.traceBegin("StartRestrictionManager");
Jeff Brown2c43c332014-06-12 22:38:59 -07001710 mSystemServiceManager.startService(RestrictionsManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001711 t.traceEnd();
Amith Yamasanif20d6402014-05-24 15:34:37 -07001712
Felipe Leme3aad1be2019-05-31 11:43:12 -07001713 t.traceBegin("StartMediaSessionService");
Jeff Brown2c43c332014-06-12 22:38:59 -07001714 mSystemServiceManager.startService(MediaSessionService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001715 t.traceEnd();
RoboErik01fe6612014-02-13 14:19:04 -08001716
Yuncheol Heoa0c4a062014-07-10 20:49:27 +09001717 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_HDMI_CEC)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001718 t.traceBegin("StartHdmiControlService");
Yuncheol Heoa0c4a062014-07-10 20:49:27 +09001719 mSystemServiceManager.startService(HdmiControlService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001720 t.traceEnd();
Yuncheol Heoa0c4a062014-07-10 20:49:27 +09001721 }
Jungshik Jang0792d372014-04-23 17:57:26 +09001722
Conrad Chen558acf92017-04-05 17:31:01 -07001723 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_LIVE_TV)
1724 || mPackageManager.hasSystemFeature(PackageManager.FEATURE_LEANBACK)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001725 t.traceBegin("StartTvInputManager");
Dongwon Kang0fdcb742014-07-24 16:28:35 +09001726 mSystemServiceManager.startService(TvInputManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001727 t.traceEnd();
Dongwon Kang0fdcb742014-07-24 16:28:35 +09001728 }
Jae Seo39570912014-02-20 18:23:25 -08001729
Dongwon Kangd8b81b32016-03-23 18:04:19 -07001730 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_PICTURE_IN_PICTURE)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001731 t.traceBegin("StartMediaResourceMonitor");
Dongwon Kangd8b81b32016-03-23 18:04:19 -07001732 mSystemServiceManager.startService(MediaResourceMonitorService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001733 t.traceEnd();
Dongwon Kangd8b81b32016-03-23 18:04:19 -07001734 }
Dongwon Kang2034a4c2015-12-14 21:57:34 +09001735
Sujith Ramakrishnanb5b86c12016-01-28 16:53:16 -08001736 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_LEANBACK)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001737 t.traceBegin("StartTvRemoteService");
Sujith Ramakrishnanb5b86c12016-01-28 16:53:16 -08001738 mSystemServiceManager.startService(TvRemoteService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001739 t.traceEnd();
Sujith Ramakrishnanb5b86c12016-01-28 16:53:16 -08001740 }
1741
Felipe Leme3aad1be2019-05-31 11:43:12 -07001742 t.traceBegin("StartMediaRouterService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001743 try {
1744 mediaRouter = new MediaRouterService(context);
1745 ServiceManager.addService(Context.MEDIA_ROUTER_SERVICE, mediaRouter);
1746 } catch (Throwable e) {
1747 reportWtf("starting MediaRouterService", e);
1748 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001749 t.traceEnd();
Adrian Roos82142c22014-03-27 14:56:59 +01001750
Kevin Chyna24e9fd2018-08-27 12:39:17 -07001751 final boolean hasFeatureFace
1752 = mPackageManager.hasSystemFeature(PackageManager.FEATURE_FACE);
Kevin Chyn51676d22018-11-05 18:00:43 -08001753 final boolean hasFeatureIris
1754 = mPackageManager.hasSystemFeature(PackageManager.FEATURE_IRIS);
Kevin Chyna24e9fd2018-08-27 12:39:17 -07001755 final boolean hasFeatureFingerprint
1756 = mPackageManager.hasSystemFeature(PackageManager.FEATURE_FINGERPRINT);
1757
1758 if (hasFeatureFace) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001759 t.traceBegin("StartFaceSensor");
Gilad Brettercb51b8b2018-03-22 17:04:51 +02001760 mSystemServiceManager.startService(FaceService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001761 t.traceEnd();
Gilad Brettercb51b8b2018-03-22 17:04:51 +02001762 }
1763
Kevin Chyn51676d22018-11-05 18:00:43 -08001764 if (hasFeatureIris) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001765 t.traceBegin("StartIrisSensor");
Kevin Chyn51676d22018-11-05 18:00:43 -08001766 mSystemServiceManager.startService(IrisService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001767 t.traceEnd();
Kevin Chyn51676d22018-11-05 18:00:43 -08001768 }
1769
Kevin Chyna24e9fd2018-08-27 12:39:17 -07001770 if (hasFeatureFingerprint) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001771 t.traceBegin("StartFingerprintSensor");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001772 mSystemServiceManager.startService(FingerprintService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001773 t.traceEnd();
Jeff Brown69b07162013-11-07 00:30:16 -08001774 }
Narayan Kamath1c888f62017-10-30 14:35:15 +00001775
Kevin Chyn51676d22018-11-05 18:00:43 -08001776 if (hasFeatureFace || hasFeatureIris || hasFeatureFingerprint) {
Kevin Chyna24e9fd2018-08-27 12:39:17 -07001777 // Start this service after all biometric services.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001778 t.traceBegin("StartBiometricService");
Kevin Chyn352adfe2018-09-20 22:28:50 -07001779 mSystemServiceManager.startService(BiometricService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001780 t.traceEnd();
Ilya Matyukhine4675b32019-11-07 16:07:19 -08001781
1782 t.traceBegin("StartAuthService");
1783 mSystemServiceManager.startService(AuthService.class);
1784 t.traceEnd();
Kevin Chyna24e9fd2018-08-27 12:39:17 -07001785 }
1786
Ilya Matyukhine4675b32019-11-07 16:07:19 -08001787
Felipe Leme3aad1be2019-05-31 11:43:12 -07001788 t.traceBegin("StartBackgroundDexOptService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001789 try {
1790 BackgroundDexOptService.schedule(context);
1791 } catch (Throwable e) {
1792 reportWtf("starting StartBackgroundDexOptService", e);
1793 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001794 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001795
Michael Kwan7f70fc72018-07-20 16:12:19 -07001796 if (!isWatch) {
Alan Stokesbe9ec972018-12-10 14:07:47 +00001797 // We don't run this on watches as there are no plans to use the data logged
1798 // on watch devices.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001799 t.traceBegin("StartDynamicCodeLoggingService");
Alan Stokesbe9ec972018-12-10 14:07:47 +00001800 try {
1801 DynamicCodeLoggingService.schedule(context);
1802 } catch (Throwable e) {
1803 reportWtf("starting DynamicCodeLoggingService", e);
1804 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001805 t.traceEnd();
Alan Stokesbe9ec972018-12-10 14:07:47 +00001806 }
1807
1808 if (!isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001809 t.traceBegin("StartPruneInstantAppsJobService");
Michael Kwan7f70fc72018-07-20 16:12:19 -07001810 try {
1811 PruneInstantAppsJobService.schedule(context);
1812 } catch (Throwable e) {
1813 reportWtf("StartPruneInstantAppsJobService", e);
1814 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001815 t.traceEnd();
Narayan Kamath1c888f62017-10-30 14:35:15 +00001816 }
Narayan Kamath1c888f62017-10-30 14:35:15 +00001817
Makoto Onuki55046222016-03-08 10:49:47 -08001818 // LauncherAppsService uses ShortcutService.
Felipe Leme3aad1be2019-05-31 11:43:12 -07001819 t.traceBegin("StartShortcutServiceLifecycle");
Makoto Onuki55046222016-03-08 10:49:47 -08001820 mSystemServiceManager.startService(ShortcutService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001821 t.traceEnd();
Amith Yamasani4f582632014-02-19 14:31:52 -08001822
Felipe Leme3aad1be2019-05-31 11:43:12 -07001823 t.traceBegin("StartLauncherAppsService");
Jeff Brown2c43c332014-06-12 22:38:59 -07001824 mSystemServiceManager.startService(LauncherAppsService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001825 t.traceEnd();
Tony Mak1b708e62017-10-12 10:59:11 +01001826
Felipe Leme3aad1be2019-05-31 11:43:12 -07001827 t.traceBegin("StartCrossProfileAppsService");
Tony Mak1b708e62017-10-12 10:59:11 +01001828 mSystemServiceManager.startService(CrossProfileAppsService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001829 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001830 }
1831
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001832 if (!isWatch) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001833 t.traceBegin("StartMediaProjectionManager");
Michael Wrightc39d47a2014-07-08 18:07:36 -07001834 mSystemServiceManager.startService(MediaProjectionManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001835 t.traceEnd();
Michael Wrightc39d47a2014-07-08 18:07:36 -07001836 }
1837
Erik Wolsheimer640734f2018-01-29 13:57:44 -08001838 if (isWatch) {
Damien Bargiacchiae4cb672018-05-30 13:28:15 -07001839 // Must be started before services that depend it, e.g. WearConnectivityService
Felipe Leme3aad1be2019-05-31 11:43:12 -07001840 t.traceBegin("StartWearPowerService");
Damien Bargiacchiae4cb672018-05-30 13:28:15 -07001841 mSystemServiceManager.startService(WEAR_POWER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001842 t.traceEnd();
Damien Bargiacchiae4cb672018-05-30 13:28:15 -07001843
Felipe Leme3aad1be2019-05-31 11:43:12 -07001844 t.traceBegin("StartWearConnectivityService");
Calvin On5555bcc2017-02-21 16:41:43 -08001845 mSystemServiceManager.startService(WEAR_CONNECTIVITY_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001846 t.traceEnd();
Zach Johnsonb82f3b02017-01-16 15:15:25 -08001847
Felipe Leme3aad1be2019-05-31 11:43:12 -07001848 t.traceBegin("StartWearDisplayService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001849 mSystemServiceManager.startService(WEAR_DISPLAY_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001850 t.traceEnd();
Damien Bargiacchiae4cb672018-05-30 13:28:15 -07001851
Felipe Leme3aad1be2019-05-31 11:43:12 -07001852 t.traceBegin("StartWearTimeService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001853 mSystemServiceManager.startService(WEAR_TIME_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001854 t.traceEnd();
Ivan Podogovf9973822017-05-11 15:51:34 +01001855
Narayan Kamath1c888f62017-10-30 14:35:15 +00001856 if (enableLeftyService) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001857 t.traceBegin("StartWearLeftyService");
Narayan Kamath1c888f62017-10-30 14:35:15 +00001858 mSystemServiceManager.startService(WEAR_LEFTY_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001859 t.traceEnd();
Vitalii Tomkiv4887e672016-07-21 15:58:24 -07001860 }
Michael Kwan01ad0aa2018-02-28 15:19:04 -08001861
Felipe Leme3aad1be2019-05-31 11:43:12 -07001862 t.traceBegin("StartWearGlobalActionsService");
Michael Kwan01ad0aa2018-02-28 15:19:04 -08001863 mSystemServiceManager.startService(WEAR_GLOBAL_ACTIONS_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001864 t.traceEnd();
Wei Liu48d3b632016-03-29 15:26:48 -07001865 }
1866
Abhijit Adsule95862c52019-10-11 18:24:41 -07001867 if (!mPackageManager.hasSystemFeature(PackageManager.FEATURE_SLICES_DISABLED)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001868 t.traceBegin("StartSliceManagerService");
Jason Monk8f5f7ff2017-10-17 14:12:42 -04001869 mSystemServiceManager.startService(SLICE_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001870 t.traceEnd();
Jason Monk8f5f7ff2017-10-17 14:12:42 -04001871 }
1872
Eino-Ville Talvalae91012b2017-07-10 15:27:24 -07001873 if (!disableCameraService) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001874 t.traceBegin("StartCameraServiceProxy");
Eino-Ville Talvalae91012b2017-07-10 15:27:24 -07001875 mSystemServiceManager.startService(CameraServiceProxy.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001876 t.traceEnd();
Eino-Ville Talvalae91012b2017-07-10 15:27:24 -07001877 }
1878
Nick Felker1bfe59d2017-10-12 13:27:02 -07001879 if (context.getPackageManager().hasSystemFeature(PackageManager.FEATURE_EMBEDDED)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001880 t.traceBegin("StartIoTSystemService");
Nick Felker1bfe59d2017-10-12 13:27:02 -07001881 mSystemServiceManager.startService(IOT_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001882 t.traceEnd();
Nick Felker1bfe59d2017-10-12 13:27:02 -07001883 }
1884
Max Biresffac7722017-10-23 22:59:10 +00001885 // Statsd helper
Felipe Leme3aad1be2019-05-31 11:43:12 -07001886 t.traceBegin("StartStatsCompanionService");
Tej Singhc53ac0a2019-09-20 16:29:13 -07001887 mSystemServiceManager.startService(STATS_COMPANION_SERVICE_LIFECYCLE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001888 t.traceEnd();
Max Biresffac7722017-10-23 22:59:10 +00001889
Joe Onoratoe21ab7e2018-12-18 15:00:25 -08001890 // Incidentd and dumpstated helper
Felipe Leme3aad1be2019-05-31 11:43:12 -07001891 t.traceBegin("StartIncidentCompanionService");
Joe Onoratoe21ab7e2018-12-18 15:00:25 -08001892 mSystemServiceManager.startService(IncidentCompanionService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001893 t.traceEnd();
Joe Onoratoe21ab7e2018-12-18 15:00:25 -08001894
Patrick Baumann876a7332019-06-28 10:28:22 -07001895 if (safeMode) {
1896 mActivityManagerService.enterSafeMode();
1897 }
1898
Ye Wend97e1fd2014-07-24 12:56:45 -07001899 // MMS service broker
Felipe Leme3aad1be2019-05-31 11:43:12 -07001900 t.traceBegin("StartMmsService");
Ye Wend97e1fd2014-07-24 12:56:45 -07001901 mmsService = mSystemServiceManager.startService(MmsServiceBroker.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001902 t.traceEnd();
Ye Wend97e1fd2014-07-24 12:56:45 -07001903
Svet Ganov43574b02017-04-12 09:25:20 -07001904 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_AUTOFILL)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07001905 t.traceBegin("StartAutoFillService");
Svet Ganov43574b02017-04-12 09:25:20 -07001906 mSystemServiceManager.startService(AUTO_FILL_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001907 t.traceEnd();
Svet Ganov43574b02017-04-12 09:25:20 -07001908 }
Felipe Leme5381aa42016-10-13 09:02:32 -07001909
Felipe Lemec7436342019-04-10 17:45:12 -07001910 // NOTE: ClipboardService depends on ContentCapture and Autofill
Felipe Leme3aad1be2019-05-31 11:43:12 -07001911 t.traceBegin("StartClipboardService");
Felipe Lemec7436342019-04-10 17:45:12 -07001912 mSystemServiceManager.startService(ClipboardService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001913 t.traceEnd();
Felipe Lemec7436342019-04-10 17:45:12 -07001914
Sudheer Shankaf5b36962019-10-04 16:16:13 -07001915 t.traceBegin("StartBlobStoreManagerService");
1916 mSystemServiceManager.startService(BLOB_STORE_MANAGER_SERVICE_CLASS);
1917 t.traceEnd();
1918
Felipe Leme3aad1be2019-05-31 11:43:12 -07001919 t.traceBegin("AppServiceManager");
Makoto Onukidf7e4812018-09-24 14:31:25 -07001920 mSystemServiceManager.startService(AppBindingService.Lifecycle.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001921 t.traceEnd();
Makoto Onukidf7e4812018-09-24 14:31:25 -07001922
Dianne Hackborn6af0d502009-09-28 13:25:46 -07001923 // It is now time to start up the app processes...
Joe Onorato30275482009-07-08 17:09:14 -07001924
Felipe Leme3aad1be2019-05-31 11:43:12 -07001925 t.traceBegin("MakeVibratorServiceReady");
Jeff Brown7f6c2312012-04-13 20:38:38 -07001926 try {
1927 vibrator.systemReady();
1928 } catch (Throwable e) {
1929 reportWtf("making Vibrator Service ready", e);
1930 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001931 t.traceEnd();
Jeff Brown7f6c2312012-04-13 20:38:38 -07001932
Felipe Leme3aad1be2019-05-31 11:43:12 -07001933 t.traceBegin("MakeLockSettingsServiceReady");
Dan Morrille4d9a012013-03-28 18:10:43 -07001934 if (lockSettings != null) {
1935 try {
1936 lockSettings.systemReady();
1937 } catch (Throwable e) {
1938 reportWtf("making Lock Settings Service ready", e);
1939 }
Felipe Ramosf35df5b2012-09-18 18:26:27 -03001940 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001941 t.traceEnd();
Felipe Ramosf35df5b2012-09-18 18:26:27 -03001942
Amith Yamasani817ec492013-12-20 13:27:30 -08001943 // Needed by DevicePolicyManager for initialization
Felipe Leme3aad1be2019-05-31 11:43:12 -07001944 t.traceBegin("StartBootPhaseLockSettingsReady");
Felipe Leme137e7812019-06-10 11:38:05 -07001945 mSystemServiceManager.startBootPhase(t, SystemService.PHASE_LOCK_SETTINGS_READY);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001946 t.traceEnd();
Dianne Hackbornd6847842010-01-12 18:14:19 -08001947
Felipe Leme3aad1be2019-05-31 11:43:12 -07001948 t.traceBegin("StartBootPhaseSystemServicesReady");
Felipe Leme137e7812019-06-10 11:38:05 -07001949 mSystemServiceManager.startBootPhase(t, SystemService.PHASE_SYSTEM_SERVICES_READY);
Felipe Leme3aad1be2019-05-31 11:43:12 -07001950 t.traceEnd();
Joe Onorato30275482009-07-08 17:09:14 -07001951
Felipe Leme3aad1be2019-05-31 11:43:12 -07001952 t.traceBegin("MakeWindowManagerServiceReady");
Dianne Hackborn661cd522011-08-22 00:26:20 -07001953 try {
1954 wm.systemReady();
1955 } catch (Throwable e) {
1956 reportWtf("making Window Manager Service ready", e);
1957 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001958 t.traceEnd();
Joe Onoratodc565f42010-10-04 15:27:22 -04001959
Jeff Brownb09abc12011-01-13 21:08:27 -08001960 if (safeMode) {
Jeff Brown4ccb8232014-01-16 22:16:42 -08001961 mActivityManagerService.showSafeModeOverlay();
Jeff Brownb09abc12011-01-13 21:08:27 -08001962 }
1963
Joe Onoratodc565f42010-10-04 15:27:22 -04001964 // Update the configuration for this context by hand, because we're going
1965 // to start using it before the config change done in wm.systemReady() will
1966 // propagate to it.
Andrii Kulian5406e7a2016-10-21 11:55:23 -07001967 final Configuration config = wm.computeNewConfiguration(DEFAULT_DISPLAY);
Joe Onoratodc565f42010-10-04 15:27:22 -04001968 DisplayMetrics metrics = new DisplayMetrics();
Christine Franksea7d71b2018-07-03 14:46:07 -07001969 WindowManager w = (WindowManager) context.getSystemService(Context.WINDOW_SERVICE);
Joe Onoratodc565f42010-10-04 15:27:22 -04001970 w.getDefaultDisplay().getMetrics(metrics);
1971 context.getResources().updateConfiguration(config, metrics);
1972
Alan Viverette395cd012015-08-11 17:27:04 -04001973 // The system context's theme may be configuration-dependent.
1974 final Theme systemTheme = context.getTheme();
1975 if (systemTheme.getChangingConfigurations() != 0) {
1976 systemTheme.rebase();
1977 }
1978
Felipe Leme3aad1be2019-05-31 11:43:12 -07001979 t.traceBegin("MakePowerManagerServiceReady");
Jeff Brownaa202a62012-08-21 22:14:26 -07001980 try {
Jeff Brown6f357d32014-01-15 20:40:55 -08001981 // TODO: use boot phase
Jeff Brown21392762014-06-13 19:00:36 -07001982 mPowerManagerService.systemReady(mActivityManagerService.getAppOpsService());
Jeff Brownaa202a62012-08-21 22:14:26 -07001983 } catch (Throwable e) {
1984 reportWtf("making Power Manager Service ready", e);
1985 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07001986 t.traceEnd();
Jeff Brownaa202a62012-08-21 22:14:26 -07001987
Svet Ganov3c499ea2019-07-26 17:45:56 -07001988 // Permission policy service
1989 t.traceBegin("StartPermissionPolicyService");
1990 mSystemServiceManager.startService(PermissionPolicyService.class);
1991 t.traceEnd();
1992
Felipe Leme3aad1be2019-05-31 11:43:12 -07001993 t.traceBegin("MakePackageManagerServiceReady");
Fyodor Kupolovc56106a2017-10-06 17:02:21 -07001994 mPackageManagerService.systemReady();
Felipe Leme3aad1be2019-05-31 11:43:12 -07001995 t.traceEnd();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001996
Felipe Leme3aad1be2019-05-31 11:43:12 -07001997 t.traceBegin("MakeDisplayManagerServiceReady");
Jeff Brownbd6e1502012-08-28 03:27:37 -07001998 try {
Jeff Brown4ccb8232014-01-16 22:16:42 -08001999 // TODO: use boot phase and communicate these flags some other way
Jeff Brown2c43c332014-06-12 22:38:59 -07002000 mDisplayManagerService.systemReady(safeMode, mOnlyCore);
Jeff Brownbd6e1502012-08-28 03:27:37 -07002001 } catch (Throwable e) {
2002 reportWtf("making Display Manager Service ready", e);
2003 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002004 t.traceEnd();
Jeff Brownbd6e1502012-08-28 03:27:37 -07002005
joonyoung.cho2f30cc12015-04-08 13:56:34 +09002006 mSystemServiceManager.setSafeMode(safeMode);
2007
Daichi Hironoedfcb002017-10-10 17:22:58 +09002008 // Start device specific services
Felipe Leme3aad1be2019-05-31 11:43:12 -07002009 t.traceBegin("StartDeviceSpecificServices");
Daichi Hironoedfcb002017-10-10 17:22:58 +09002010 final String[] classes = mSystemContext.getResources().getStringArray(
2011 R.array.config_deviceSpecificSystemServices);
2012 for (final String className : classes) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07002013 t.traceBegin("StartDeviceSpecificServices " + className);
Daichi Hironoedfcb002017-10-10 17:22:58 +09002014 try {
2015 mSystemServiceManager.startService(className);
2016 } catch (Throwable e) {
2017 reportWtf("starting " + className, e);
2018 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002019 t.traceEnd();
Daichi Hironoedfcb002017-10-10 17:22:58 +09002020 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002021 t.traceEnd();
Daichi Hironoedfcb002017-10-10 17:22:58 +09002022
Felipe Leme3aad1be2019-05-31 11:43:12 -07002023 t.traceBegin("StartBootPhaseDeviceSpecificServicesReady");
Felipe Leme137e7812019-06-10 11:38:05 -07002024 mSystemServiceManager.startBootPhase(t, SystemService.PHASE_DEVICE_SPECIFIC_SERVICES_READY);
Felipe Leme3aad1be2019-05-31 11:43:12 -07002025 t.traceEnd();
Daichi Hironoedfcb002017-10-10 17:22:58 +09002026
Terry Wangecc0d1b2019-10-17 17:05:18 -07002027 t.traceBegin("AppSearchManagerService");
2028 mSystemServiceManager.startService(APP_SEARCH_MANAGER_SERVICE_CLASS);
2029 t.traceEnd();
2030
Dianne Hackborna34f1ad2009-09-02 13:26:28 -07002031 // These are needed to propagate to the runnable below.
Jeff Sharkey350083e2011-06-29 10:45:16 -07002032 final NetworkManagementService networkManagementF = networkManagement;
Jeff Sharkey75279902011-05-24 18:39:45 -07002033 final NetworkStatsService networkStatsF = networkStats;
Jeff Sharkeya4620792011-05-20 15:29:23 -07002034 final NetworkPolicyManagerService networkPolicyF = networkPolicy;
Dianne Hackborna34f1ad2009-09-02 13:26:28 -07002035 final ConnectivityService connectivityF = connectivity;
Bai Taoa58a8752010-07-13 15:32:16 +08002036 final CountryDetectorService countryDetectorF = countryDetector;
Amith Yamasani6734b9f2010-09-13 16:24:08 -07002037 final NetworkTimeUpdateService networkTimeUpdaterF = networkTimeUpdater;
Jeff Brown6ec6f792012-04-17 16:52:41 -07002038 final InputManagerService inputManagerF = inputManager;
Wink Savillea12a7b32012-09-20 10:09:45 -07002039 final TelephonyRegistry telephonyRegistryF = telephonyRegistry;
Jeff Brown69b07162013-11-07 00:30:16 -08002040 final MediaRouterService mediaRouterF = mediaRouter;
Ye Wend97e1fd2014-07-24 12:56:45 -07002041 final MmsServiceBroker mmsServiceF = mmsService;
Nathan Haroldb7282172017-09-11 19:50:19 -07002042 final IpSecService ipSecServiceF = ipSecService;
Keun-young Park4136d2d2017-05-08 14:51:59 -07002043 final WindowManagerService windowManagerF = wm;
Doug Zongkerab5c49c2009-12-04 10:31:43 -08002044
Dianne Hackborna34f1ad2009-09-02 13:26:28 -07002045 // We now tell the activity manager it is okay to run third party
2046 // code. It will call back into us once it has gotten to the state
2047 // where third party code can really run (but before it has actually
2048 // started launching the initial applications), for us to complete our
2049 // initialization.
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002050 mActivityManagerService.systemReady(() -> {
2051 Slog.i(TAG, "Making services ready");
Felipe Leme3aad1be2019-05-31 11:43:12 -07002052 t.traceBegin("StartActivityManagerReadyPhase");
Felipe Leme137e7812019-06-10 11:38:05 -07002053 mSystemServiceManager.startBootPhase(t, SystemService.PHASE_ACTIVITY_MANAGER_READY);
Felipe Leme3aad1be2019-05-31 11:43:12 -07002054 t.traceEnd();
2055 t.traceBegin("StartObservingNativeCrashes");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002056 try {
2057 mActivityManagerService.startObservingNativeCrashes();
2058 } catch (Throwable e) {
2059 reportWtf("observing native crashes", e);
Dianne Hackborna34f1ad2009-09-02 13:26:28 -07002060 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002061 t.traceEnd();
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002062
Keun-young Parkd80e8942017-01-27 11:30:19 -08002063 // No dependency on Webview preparation in system server. But this should
Torne (Richard Coles)ff937ac2017-10-02 17:09:32 -04002064 // be completed before allowing 3rd party
Keun-young Parkd80e8942017-01-27 11:30:19 -08002065 final String WEBVIEW_PREPARATION = "WebViewFactoryPreparation";
2066 Future<?> webviewPrep = null;
Torne (Richard Coles)ff937ac2017-10-02 17:09:32 -04002067 if (!mOnlyCore && mWebViewUpdateService != null) {
Felipe Lemeb68b7692019-10-09 10:43:03 -07002068 webviewPrep = SystemServerInitThreadPool.submit(() -> {
Keun-young Parkd80e8942017-01-27 11:30:19 -08002069 Slog.i(TAG, WEBVIEW_PREPARATION);
Felipe Leme137e7812019-06-10 11:38:05 -07002070 TimingsTraceAndSlog traceLog = TimingsTraceAndSlog.newAsyncLog();
Keun-young Parkd80e8942017-01-27 11:30:19 -08002071 traceLog.traceBegin(WEBVIEW_PREPARATION);
Narayan Kamath97780462017-02-06 20:24:08 +00002072 ConcurrentUtils.waitForFutureNoInterrupt(mZygotePreload, "Zygote preload");
2073 mZygotePreload = null;
Keun-young Parkd80e8942017-01-27 11:30:19 -08002074 mWebViewUpdateService.prepareWebViewInSystemServer();
2075 traceLog.traceEnd();
2076 }, WEBVIEW_PREPARATION);
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002077 }
2078
Keun-young Park067cf3e2017-06-05 12:20:41 -07002079 if (mPackageManager.hasSystemFeature(PackageManager.FEATURE_AUTOMOTIVE)) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07002080 t.traceBegin("StartCarServiceHelperService");
Steve Paik94292a32018-01-26 17:16:53 -08002081 mSystemServiceManager.startService(CAR_SERVICE_HELPER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07002082 t.traceEnd();
Keun-young Park067cf3e2017-06-05 12:20:41 -07002083 }
2084
Felipe Leme3aad1be2019-05-31 11:43:12 -07002085 t.traceBegin("StartSystemUI");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002086 try {
Keun-young Park4136d2d2017-05-08 14:51:59 -07002087 startSystemUi(context, windowManagerF);
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002088 } catch (Throwable e) {
2089 reportWtf("starting System UI", e);
2090 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002091 t.traceEnd();
Rene Mayrhofer7d6c8e52018-11-28 11:32:40 -08002092 // Enable airplane mode in safe mode. setAirplaneMode() cannot be called
2093 // earlier as it sends broadcasts to other services.
2094 // TODO: This may actually be too late if radio firmware already started leaking
2095 // RF before the respective services start. However, fixing this requires changes
2096 // to radio firmware and interfaces.
2097 if (safeMode) {
Felipe Leme3aad1be2019-05-31 11:43:12 -07002098 t.traceBegin("EnableAirplaneModeInSafeMode");
Rene Mayrhofer7d6c8e52018-11-28 11:32:40 -08002099 try {
2100 connectivityF.setAirplaneMode(true);
2101 } catch (Throwable e) {
2102 reportWtf("enabling Airplane Mode during Safe Mode bootup", e);
2103 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002104 t.traceEnd();
Rene Mayrhofer7d6c8e52018-11-28 11:32:40 -08002105 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002106 t.traceBegin("MakeNetworkManagementServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002107 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002108 if (networkManagementF != null) {
2109 networkManagementF.systemReady();
2110 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002111 } catch (Throwable e) {
2112 reportWtf("making Network Managment Service ready", e);
2113 }
2114 CountDownLatch networkPolicyInitReadySignal = null;
2115 if (networkPolicyF != null) {
2116 networkPolicyInitReadySignal = networkPolicyF
2117 .networkScoreAndNetworkManagementServiceReady();
2118 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002119 t.traceEnd();
2120 t.traceBegin("MakeIpSecServiceReady");
Nathan Haroldb7282172017-09-11 19:50:19 -07002121 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002122 if (ipSecServiceF != null) {
2123 ipSecServiceF.systemReady();
2124 }
Nathan Haroldb7282172017-09-11 19:50:19 -07002125 } catch (Throwable e) {
2126 reportWtf("making IpSec Service ready", e);
2127 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002128 t.traceEnd();
2129 t.traceBegin("MakeNetworkStatsServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002130 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002131 if (networkStatsF != null) {
2132 networkStatsF.systemReady();
2133 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002134 } catch (Throwable e) {
2135 reportWtf("making Network Stats Service ready", e);
2136 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002137 t.traceEnd();
2138 t.traceBegin("MakeConnectivityServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002139 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002140 if (connectivityF != null) {
2141 connectivityF.systemReady();
2142 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002143 } catch (Throwable e) {
2144 reportWtf("making Connectivity Service ready", e);
2145 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002146 t.traceEnd();
2147 t.traceBegin("MakeNetworkPolicyServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002148 try {
2149 if (networkPolicyF != null) {
2150 networkPolicyF.systemReady(networkPolicyInitReadySignal);
2151 }
2152 } catch (Throwable e) {
2153 reportWtf("making Network Policy Service ready", e);
2154 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002155 t.traceEnd();
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002156
Fyodor Kupolovcd824ef2017-02-07 11:25:14 -08002157 // Wait for all packages to be prepared
2158 mPackageManagerService.waitForAppDataPrepared();
2159
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002160 // It is now okay to let the various system services start their
2161 // third party code...
Felipe Leme3aad1be2019-05-31 11:43:12 -07002162 t.traceBegin("PhaseThirdPartyAppsCanStart");
Keun-young Park9b73a542017-02-01 12:09:58 -08002163 // confirm webview completion before starting 3rd party
2164 if (webviewPrep != null) {
2165 ConcurrentUtils.waitForFutureNoInterrupt(webviewPrep, WEBVIEW_PREPARATION);
2166 }
Felipe Leme137e7812019-06-10 11:38:05 -07002167 mSystemServiceManager.startBootPhase(t, SystemService.PHASE_THIRD_PARTY_APPS_CAN_START);
Felipe Leme3aad1be2019-05-31 11:43:12 -07002168 t.traceEnd();
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002169
Felipe Leme3aad1be2019-05-31 11:43:12 -07002170 t.traceBegin("StartNetworkStack");
Remi NGUYEN VANc7054c52019-03-12 11:50:22 +09002171 try {
Chalard Jeand74219b2019-04-01 13:04:07 +09002172 // Note : the network stack is creating on-demand objects that need to send
2173 // broadcasts, which means it currently depends on being started after
2174 // ActivityManagerService.mSystemReady and ActivityManagerService.mProcessesReady
2175 // are set to true. Be careful if moving this to a different place in the
2176 // startup sequence.
Roshan Pius7e6f5f52019-06-27 14:14:40 -07002177 NetworkStackClient.getInstance().start();
Remi NGUYEN VANc7054c52019-03-12 11:50:22 +09002178 } catch (Throwable e) {
2179 reportWtf("starting Network Stack", e);
2180 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002181 t.traceEnd();
Remi NGUYEN VANc7054c52019-03-12 11:50:22 +09002182
Roshan Pius6f5338d2019-06-14 14:37:14 -07002183 t.traceBegin("StartWifiStack");
2184 try {
2185 WifiStackClient.getInstance().start();
2186 } catch (Throwable e) {
2187 reportWtf("starting Wifi Stack", e);
2188 }
2189 t.traceEnd();
2190
Felipe Leme3aad1be2019-05-31 11:43:12 -07002191 t.traceBegin("MakeCountryDetectionServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002192 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002193 if (countryDetectorF != null) {
2194 countryDetectorF.systemRunning();
2195 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002196 } catch (Throwable e) {
2197 reportWtf("Notifying CountryDetectorService running", e);
2198 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002199 t.traceEnd();
2200 t.traceBegin("MakeNetworkTimeUpdateReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002201 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002202 if (networkTimeUpdaterF != null) {
2203 networkTimeUpdaterF.systemRunning();
2204 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002205 } catch (Throwable e) {
2206 reportWtf("Notifying NetworkTimeService running", e);
2207 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002208 t.traceEnd();
2209 t.traceBegin("MakeInputManagerServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002210 try {
2211 // TODO(BT) Pass parameter to input manager
Christine Franksea7d71b2018-07-03 14:46:07 -07002212 if (inputManagerF != null) {
2213 inputManagerF.systemRunning();
2214 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002215 } catch (Throwable e) {
2216 reportWtf("Notifying InputManagerService running", e);
2217 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002218 t.traceEnd();
2219 t.traceBegin("MakeTelephonyRegistryReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002220 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002221 if (telephonyRegistryF != null) {
2222 telephonyRegistryF.systemRunning();
2223 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002224 } catch (Throwable e) {
2225 reportWtf("Notifying TelephonyRegistry running", e);
2226 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002227 t.traceEnd();
2228 t.traceBegin("MakeMediaRouterServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002229 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002230 if (mediaRouterF != null) {
2231 mediaRouterF.systemRunning();
2232 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002233 } catch (Throwable e) {
2234 reportWtf("Notifying MediaRouterService running", e);
2235 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002236 t.traceEnd();
2237 t.traceBegin("MakeMmsServiceReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002238 try {
Christine Franksea7d71b2018-07-03 14:46:07 -07002239 if (mmsServiceF != null) {
2240 mmsServiceF.systemRunning();
2241 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002242 } catch (Throwable e) {
2243 reportWtf("Notifying MmsService running", e);
2244 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002245 t.traceEnd();
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002246
Felipe Leme3aad1be2019-05-31 11:43:12 -07002247 t.traceBegin("IncidentDaemonReady");
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002248 try {
2249 // TODO: Switch from checkService to getService once it's always
2250 // in the build and should reliably be there.
2251 final IIncidentManager incident = IIncidentManager.Stub.asInterface(
Yi Jinf32af482017-08-11 15:00:49 -07002252 ServiceManager.getService(Context.INCIDENT_SERVICE));
Christine Franksea7d71b2018-07-03 14:46:07 -07002253 if (incident != null) {
2254 incident.systemRunning();
2255 }
Fyodor Kupolov6dd2ba22016-12-07 13:03:17 -08002256 } catch (Throwable e) {
2257 reportWtf("Notifying incident daemon running", e);
2258 }
Felipe Leme3aad1be2019-05-31 11:43:12 -07002259 t.traceEnd();
2260 }, t);
Felipe Leme137e7812019-06-10 11:38:05 -07002261
2262 t.traceEnd(); // startOtherServices
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002263 }
Joe Onoratof3c3c4f2010-10-21 11:09:02 -04002264
Felipe Leme83e8f242019-08-14 16:57:56 +00002265 private boolean deviceHasConfigString(@NonNull Context context, @StringRes int resId) {
2266 String serviceName = context.getString(resId);
2267 return !TextUtils.isEmpty(serviceName);
2268 }
2269
Felipe Leme3aad1be2019-05-31 11:43:12 -07002270 private void startSystemCaptionsManagerService(@NonNull Context context,
2271 @NonNull TimingsTraceAndSlog t) {
Felipe Leme83e8f242019-08-14 16:57:56 +00002272 if (!deviceHasConfigString(context, R.string.config_defaultSystemCaptionsManagerService)) {
Robert Berry835123d2019-03-18 16:33:42 -04002273 Slog.d(TAG, "SystemCaptionsManagerService disabled because resource is not overlaid");
2274 return;
2275 }
2276
Felipe Leme3aad1be2019-05-31 11:43:12 -07002277 t.traceBegin("StartSystemCaptionsManagerService");
Robert Berry835123d2019-03-18 16:33:42 -04002278 mSystemServiceManager.startService(SYSTEM_CAPTIONS_MANAGER_SERVICE_CLASS);
Felipe Leme3aad1be2019-05-31 11:43:12 -07002279 t.traceEnd();
Robert Berry835123d2019-03-18 16:33:42 -04002280 }
2281
Felipe Leme3aad1be2019-05-31 11:43:12 -07002282 private void startContentCaptureService(@NonNull Context context,
2283 @NonNull TimingsTraceAndSlog t) {
Felipe Leme14ef4612019-02-07 12:24:38 -08002284 // First check if it was explicitly enabled by DeviceConfig
Perumaal S70738732019-02-20 15:58:40 -08002285 boolean explicitlyEnabled = false;
Felipe Leme14ef4612019-02-07 12:24:38 -08002286 String settings = DeviceConfig.getProperty(DeviceConfig.NAMESPACE_CONTENT_CAPTURE,
2287 ContentCaptureManager.DEVICE_CONFIG_PROPERTY_SERVICE_EXPLICITLY_ENABLED);
2288 if (settings != null && !settings.equalsIgnoreCase("default")) {
Perumaal S70738732019-02-20 15:58:40 -08002289 explicitlyEnabled = Boolean.parseBoolean(settings);
2290 if (explicitlyEnabled) {
Felipe Leme70bcf382019-01-24 14:55:03 -08002291 Slog.d(TAG, "ContentCaptureService explicitly enabled by DeviceConfig");
Felipe Leme14ef4612019-02-07 12:24:38 -08002292 } else {
2293 Slog.d(TAG, "ContentCaptureService explicitly disabled by DeviceConfig");
Felipe Leme658c8e42018-11-30 12:49:45 -08002294 return;
Felipe Leme14ef4612019-02-07 12:24:38 -08002295 }
Felipe Leme658c8e42018-11-30 12:49:45 -08002296 }
Felipe Leme14ef4612019-02-07 12:24:38 -08002297
2298 // Then check if OEM overlaid the resource that defines the service.
Perumaal S70738732019-02-20 15:58:40 -08002299 if (!explicitlyEnabled) {
Felipe Leme83e8f242019-08-14 16:57:56 +00002300 if (!deviceHasConfigString(context, R.string.config_defaultContentCaptureService)) {
Felipe Leme14ef4612019-02-07 12:24:38 -08002301 Slog.d(TAG, "ContentCaptureService disabled because resource is not overlaid");
2302 return;
2303 }
2304 }
2305
Felipe Leme3aad1be2019-05-31 11:43:12 -07002306 t.traceBegin("StartContentCaptureService");
Felipe Leme749b8892018-12-03 16:30:30 -08002307 mSystemServiceManager.startService(CONTENT_CAPTURE_MANAGER_SERVICE_CLASS);
Felipe Leme141864d2019-02-27 17:01:51 -08002308
2309 ContentCaptureManagerInternal ccmi =
2310 LocalServices.getService(ContentCaptureManagerInternal.class);
2311 if (ccmi != null && mActivityManagerService != null) {
2312 mActivityManagerService.setContentCaptureManager(ccmi);
2313 }
2314
Felipe Leme3aad1be2019-05-31 11:43:12 -07002315 t.traceEnd();
Felipe Leme658c8e42018-11-30 12:49:45 -08002316 }
2317
Felipe Leme3aad1be2019-05-31 11:43:12 -07002318 private void startAttentionService(@NonNull Context context, @NonNull TimingsTraceAndSlog t) {
Alex Salo7a6e3a62019-02-27 15:08:15 -08002319 if (!AttentionManagerService.isServiceConfigured(context)) {
2320 Slog.d(TAG, "AttentionService is not configured on this device");
2321 return;
2322 }
2323
Felipe Leme3aad1be2019-05-31 11:43:12 -07002324 t.traceBegin("StartAttentionManagerService");
Alex Salo7a6e3a62019-02-27 15:08:15 -08002325 mSystemServiceManager.startService(AttentionManagerService.class);
Felipe Leme3aad1be2019-05-31 11:43:12 -07002326 t.traceEnd();
Alex Salo7a6e3a62019-02-27 15:08:15 -08002327 }
2328
Robert Berry835123d2019-03-18 16:33:42 -04002329 private static void startSystemUi(Context context, WindowManagerService windowManager) {
Joe Onoratof3c3c4f2010-10-21 11:09:02 -04002330 Intent intent = new Intent();
2331 intent.setComponent(new ComponentName("com.android.systemui",
Christine Franksea7d71b2018-07-03 14:46:07 -07002332 "com.android.systemui.SystemUIService"));
Jeff Sharkey2f3e3532015-12-21 14:16:43 -07002333 intent.addFlags(Intent.FLAG_DEBUG_TRIAGED_MISSING);
Dianne Hackborn40e9f292012-11-27 19:12:23 -08002334 //Slog.d(TAG, "Starting service: " + intent);
Xiaohui Chen70f6c382015-04-28 14:21:43 -07002335 context.startServiceAsUser(intent, UserHandle.SYSTEM);
Keun-young Park4136d2d2017-05-08 14:51:59 -07002336 windowManager.onSystemUiStarted();
Joe Onoratof3c3c4f2010-10-21 11:09:02 -04002337 }
Nicolas Geoffray27c07372015-11-05 16:54:09 +00002338}