/* * Copyright (C) 2011 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.android.server.pm; import static android.content.pm.PackageManager.COMPONENT_ENABLED_STATE_DEFAULT; import static android.content.pm.PackageManager.COMPONENT_ENABLED_STATE_DISABLED; import static android.content.pm.PackageManager.COMPONENT_ENABLED_STATE_DISABLED_UNTIL_USED; import static android.content.pm.PackageManager.COMPONENT_ENABLED_STATE_DISABLED_USER; import static android.content.pm.PackageManager.COMPONENT_ENABLED_STATE_ENABLED; import static android.Manifest.permission.READ_EXTERNAL_STORAGE; import static android.os.Process.SYSTEM_UID; import static android.os.Process.PACKAGE_INFO_GID; import android.content.IntentFilter; import android.content.pm.ActivityInfo; import android.content.pm.ResolveInfo; import android.net.Uri; import android.os.Binder; import android.os.Build; import android.os.Environment; import android.os.FileUtils; import android.os.PatternMatcher; import android.os.Process; import android.os.UserHandle; import android.os.UserManager; import android.util.LogPrinter; import com.android.internal.util.FastXmlSerializer; import com.android.internal.util.JournaledFile; import com.android.internal.util.XmlUtils; import com.android.server.pm.PackageManagerService.DumpState; import java.util.Collection; import org.xmlpull.v1.XmlPullParser; import org.xmlpull.v1.XmlPullParserException; import org.xmlpull.v1.XmlSerializer; import android.content.ComponentName; import android.content.Context; import android.content.Intent; import android.content.pm.ApplicationInfo; import android.content.pm.ComponentInfo; import android.content.pm.PackageCleanItem; import android.content.pm.PackageManager; import android.content.pm.PackageParser; import android.content.pm.PermissionInfo; import android.content.pm.Signature; import android.content.pm.UserInfo; import android.content.pm.PackageUserState; import android.content.pm.VerifierDeviceIdentity; import android.util.ArrayMap; import android.util.ArraySet; import android.util.Log; import android.util.Slog; import android.util.SparseArray; import android.util.Xml; import java.io.BufferedOutputStream; import java.io.File; import java.io.FileInputStream; import java.io.FileOutputStream; import java.io.IOException; import java.io.PrintWriter; import java.text.SimpleDateFormat; import java.util.ArrayList; import java.util.Arrays; import java.util.Date; import java.util.Iterator; import java.util.List; import java.util.Map; import java.util.Objects; import java.util.Set; import java.util.Map.Entry; import libcore.io.IoUtils; /** * Holds information about dynamic settings. */ final class Settings { private static final String TAG = "PackageSettings"; /** * Current version of the package database. Set it to the latest version in * the {@link DatabaseVersion} class below to ensure the database upgrade * doesn't happen repeatedly. *

* Note that care should be taken to make sure all database upgrades are * idempotent. */ private static final int CURRENT_DATABASE_VERSION = DatabaseVersion.SIGNATURE_MALFORMED_RECOVER; /** * This class contains constants that can be referred to from upgrade code. * Insert constant values here that describe the upgrade reason. The version * code must be monotonically increasing. */ public static class DatabaseVersion { /** * The initial version of the database. */ public static final int FIRST_VERSION = 1; /** * Migrating the Signature array from the entire certificate chain to * just the signing certificate. */ public static final int SIGNATURE_END_ENTITY = 2; /** * There was a window of time in * {@link android.os.Build.VERSION_CODES#LOLLIPOP} where we persisted * certificates after potentially mutating them. To switch back to the * original untouched certificates, we need to force a collection pass. */ public static final int SIGNATURE_MALFORMED_RECOVER = 3; } private static final boolean DEBUG_STOPPED = false; private static final boolean DEBUG_MU = false; private static final String TAG_READ_EXTERNAL_STORAGE = "read-external-storage"; private static final String ATTR_ENFORCEMENT = "enforcement"; private static final String TAG_ITEM = "item"; private static final String TAG_DISABLED_COMPONENTS = "disabled-components"; private static final String TAG_ENABLED_COMPONENTS = "enabled-components"; private static final String TAG_PACKAGE_RESTRICTIONS = "package-restrictions"; private static final String TAG_PACKAGE = "pkg"; private static final String TAG_PERSISTENT_PREFERRED_ACTIVITIES = "persistent-preferred-activities"; static final String TAG_CROSS_PROFILE_INTENT_FILTERS = "crossProfile-intent-filters"; private static final String ATTR_NAME = "name"; private static final String ATTR_USER = "user"; private static final String ATTR_CODE = "code"; private static final String ATTR_NOT_LAUNCHED = "nl"; private static final String ATTR_ENABLED = "enabled"; private static final String ATTR_ENABLED_CALLER = "enabledCaller"; private static final String ATTR_STOPPED = "stopped"; // Legacy, here for reading older versions of the package-restrictions. private static final String ATTR_BLOCKED = "blocked"; // New name for the above attribute. private static final String ATTR_HIDDEN = "hidden"; private static final String ATTR_INSTALLED = "inst"; private static final String ATTR_BLOCK_UNINSTALL = "blockUninstall"; private final File mSettingsFilename; private final File mBackupSettingsFilename; private final File mPackageListFilename; private final File mStoppedPackagesFilename; private final File mBackupStoppedPackagesFilename; final ArrayMap mPackages = new ArrayMap(); // List of replaced system applications private final ArrayMap mDisabledSysPackages = new ArrayMap(); private static int mFirstAvailableUid = 0; // These are the last platform API version we were using for // the apps installed on internal and external storage. It is // used to grant newer permissions one time during a system upgrade. int mInternalSdkPlatform; int mExternalSdkPlatform; /** * The current database version for apps on internal storage. This is * used to upgrade the format of the packages.xml database not necessarily * tied to an SDK version. */ int mInternalDatabaseVersion; int mExternalDatabaseVersion; /** * Last known value of {@link Build#FINGERPRINT}. Used to determine when an * system update has occurred, meaning we need to clear code caches. */ String mFingerprint; Boolean mReadExternalStorageEnforced; /** Device identity for the purpose of package verification. */ private VerifierDeviceIdentity mVerifierDeviceIdentity; // The user's preferred activities associated with particular intent // filters. final SparseArray mPreferredActivities = new SparseArray(); // The persistent preferred activities of the user's profile/device owner // associated with particular intent filters. final SparseArray mPersistentPreferredActivities = new SparseArray(); // For every user, it is used to find to which other users the intent can be forwarded. final SparseArray mCrossProfileIntentResolvers = new SparseArray(); final ArrayMap mSharedUsers = new ArrayMap(); private final ArrayList mUserIds = new ArrayList(); private final SparseArray mOtherUserIds = new SparseArray(); // For reading/writing settings file. private final ArrayList mPastSignatures = new ArrayList(); // Mapping from permission names to info about them. final ArrayMap mPermissions = new ArrayMap(); // Mapping from permission tree names to info about them. final ArrayMap mPermissionTrees = new ArrayMap(); // Packages that have been uninstalled and still need their external // storage data deleted. final ArrayList mPackagesToBeCleaned = new ArrayList(); // Packages that have been renamed since they were first installed. // Keys are the new names of the packages, values are the original // names. The packages appear everwhere else under their original // names. final ArrayMap mRenamedPackages = new ArrayMap(); final StringBuilder mReadMessages = new StringBuilder(); /** * Used to track packages that have a shared user ID that hasn't been read * in yet. *

* TODO: make this just a local variable that is passed in during package * scanning to make it less confusing. */ private final ArrayList mPendingPackages = new ArrayList(); private final File mSystemDir; public final KeySetManagerService mKeySetManagerService = new KeySetManagerService(mPackages); Settings(Context context) { this(context, Environment.getDataDirectory()); } Settings(Context context, File dataDir) { mSystemDir = new File(dataDir, "system"); mSystemDir.mkdirs(); FileUtils.setPermissions(mSystemDir.toString(), FileUtils.S_IRWXU|FileUtils.S_IRWXG |FileUtils.S_IROTH|FileUtils.S_IXOTH, -1, -1); mSettingsFilename = new File(mSystemDir, "packages.xml"); mBackupSettingsFilename = new File(mSystemDir, "packages-backup.xml"); mPackageListFilename = new File(mSystemDir, "packages.list"); FileUtils.setPermissions(mPackageListFilename, 0640, SYSTEM_UID, PACKAGE_INFO_GID); // Deprecated: Needed for migration mStoppedPackagesFilename = new File(mSystemDir, "packages-stopped.xml"); mBackupStoppedPackagesFilename = new File(mSystemDir, "packages-stopped-backup.xml"); } PackageSetting getPackageLPw(PackageParser.Package pkg, PackageSetting origPackage, String realName, SharedUserSetting sharedUser, File codePath, File resourcePath, String legacyNativeLibraryPathString, String primaryCpuAbi, String secondaryCpuAbi, int pkgFlags, UserHandle user, boolean add) { final String name = pkg.packageName; PackageSetting p = getPackageLPw(name, origPackage, realName, sharedUser, codePath, resourcePath, legacyNativeLibraryPathString, primaryCpuAbi, secondaryCpuAbi, pkg.mVersionCode, pkgFlags, user, add, true /* allowInstall */); return p; } PackageSetting peekPackageLPr(String name) { return mPackages.get(name); } void setInstallStatus(String pkgName, int status) { PackageSetting p = mPackages.get(pkgName); if(p != null) { if(p.getInstallStatus() != status) { p.setInstallStatus(status); } } } void setInstallerPackageName(String pkgName, String installerPkgName) { PackageSetting p = mPackages.get(pkgName); if(p != null) { p.setInstallerPackageName(installerPkgName); } } SharedUserSetting getSharedUserLPw(String name, int pkgFlags, boolean create) { SharedUserSetting s = mSharedUsers.get(name); if (s == null) { if (!create) { return null; } s = new SharedUserSetting(name, pkgFlags); s.userId = newUserIdLPw(s); Log.i(PackageManagerService.TAG, "New shared user " + name + ": id=" + s.userId); // < 0 means we couldn't assign a userid; fall out and return // s, which is currently null if (s.userId >= 0) { mSharedUsers.put(name, s); } } return s; } Collection getAllSharedUsersLPw() { return mSharedUsers.values(); } boolean disableSystemPackageLPw(String name) { final PackageSetting p = mPackages.get(name); if(p == null) { Log.w(PackageManagerService.TAG, "Package:"+name+" is not an installed package"); return false; } final PackageSetting dp = mDisabledSysPackages.get(name); // always make sure the system package code and resource paths dont change if (dp == null) { if((p.pkg != null) && (p.pkg.applicationInfo != null)) { p.pkg.applicationInfo.flags |= ApplicationInfo.FLAG_UPDATED_SYSTEM_APP; } mDisabledSysPackages.put(name, p); // a little trick... when we install the new package, we don't // want to modify the existing PackageSetting for the built-in // version. so at this point we need a new PackageSetting that // is okay to muck with. PackageSetting newp = new PackageSetting(p); replacePackageLPw(name, newp); return true; } return false; } PackageSetting enableSystemPackageLPw(String name) { PackageSetting p = mDisabledSysPackages.get(name); if(p == null) { Log.w(PackageManagerService.TAG, "Package:"+name+" is not disabled"); return null; } // Reset flag in ApplicationInfo object if((p.pkg != null) && (p.pkg.applicationInfo != null)) { p.pkg.applicationInfo.flags &= ~ApplicationInfo.FLAG_UPDATED_SYSTEM_APP; } PackageSetting ret = addPackageLPw(name, p.realName, p.codePath, p.resourcePath, p.legacyNativeLibraryPathString, p.primaryCpuAbiString, p.secondaryCpuAbiString, p.secondaryCpuAbiString, p.appId, p.versionCode, p.pkgFlags); mDisabledSysPackages.remove(name); return ret; } boolean isDisabledSystemPackageLPr(String name) { return mDisabledSysPackages.containsKey(name); } void removeDisabledSystemPackageLPw(String name) { mDisabledSysPackages.remove(name); } PackageSetting addPackageLPw(String name, String realName, File codePath, File resourcePath, String legacyNativeLibraryPathString, String primaryCpuAbiString, String secondaryCpuAbiString, String cpuAbiOverrideString, int uid, int vc, int pkgFlags) { PackageSetting p = mPackages.get(name); if (p != null) { if (p.appId == uid) { return p; } PackageManagerService.reportSettingsProblem(Log.ERROR, "Adding duplicate package, keeping first: " + name); return null; } p = new PackageSetting(name, realName, codePath, resourcePath, legacyNativeLibraryPathString, primaryCpuAbiString, secondaryCpuAbiString, cpuAbiOverrideString, vc, pkgFlags); p.appId = uid; if (addUserIdLPw(uid, p, name)) { mPackages.put(name, p); return p; } return null; } SharedUserSetting addSharedUserLPw(String name, int uid, int pkgFlags) { SharedUserSetting s = mSharedUsers.get(name); if (s != null) { if (s.userId == uid) { return s; } PackageManagerService.reportSettingsProblem(Log.ERROR, "Adding duplicate shared user, keeping first: " + name); return null; } s = new SharedUserSetting(name, pkgFlags); s.userId = uid; if (addUserIdLPw(uid, s, name)) { mSharedUsers.put(name, s); return s; } return null; } void pruneSharedUsersLPw() { ArrayList removeStage = new ArrayList(); for (Map.Entry entry : mSharedUsers.entrySet()) { final SharedUserSetting sus = entry.getValue(); if (sus == null || sus.packages.size() == 0) { removeStage.add(entry.getKey()); } } for (int i = 0; i < removeStage.size(); i++) { mSharedUsers.remove(removeStage.get(i)); } } // Transfer ownership of permissions from one package to another. void transferPermissionsLPw(String origPkg, String newPkg) { // Transfer ownership of permissions to the new package. for (int i=0; i<2; i++) { ArrayMap permissions = i == 0 ? mPermissionTrees : mPermissions; for (BasePermission bp : permissions.values()) { if (origPkg.equals(bp.sourcePackage)) { if (PackageManagerService.DEBUG_UPGRADE) Log.v(PackageManagerService.TAG, "Moving permission " + bp.name + " from pkg " + bp.sourcePackage + " to " + newPkg); bp.sourcePackage = newPkg; bp.packageSetting = null; bp.perm = null; if (bp.pendingInfo != null) { bp.pendingInfo.packageName = newPkg; } bp.uid = 0; bp.gids = null; } } } } private PackageSetting getPackageLPw(String name, PackageSetting origPackage, String realName, SharedUserSetting sharedUser, File codePath, File resourcePath, String legacyNativeLibraryPathString, String primaryCpuAbiString, String secondaryCpuAbiString, int vc, int pkgFlags, UserHandle installUser, boolean add, boolean allowInstall) { PackageSetting p = mPackages.get(name); UserManagerService userManager = UserManagerService.getInstance(); if (p != null) { p.primaryCpuAbiString = primaryCpuAbiString; p.secondaryCpuAbiString = secondaryCpuAbiString; if (!p.codePath.equals(codePath)) { // Check to see if its a disabled system app if ((p.pkgFlags & ApplicationInfo.FLAG_SYSTEM) != 0) { // This is an updated system app with versions in both system // and data partition. Just let the most recent version // take precedence. Slog.w(PackageManagerService.TAG, "Trying to update system app code path from " + p.codePathString + " to " + codePath.toString()); } else { // Just a change in the code path is not an issue, but // let's log a message about it. Slog.i(PackageManagerService.TAG, "Package " + name + " codePath changed from " + p.codePath + " to " + codePath + "; Retaining data and using new"); /* * Since we've changed paths, we need to prefer the new * native library path over the one stored in the * package settings since we might have moved from * internal to external storage or vice versa. */ p.legacyNativeLibraryPathString = legacyNativeLibraryPathString; } } if (p.sharedUser != sharedUser) { PackageManagerService.reportSettingsProblem(Log.WARN, "Package " + name + " shared user changed from " + (p.sharedUser != null ? p.sharedUser.name : "") + " to " + (sharedUser != null ? sharedUser.name : "") + "; replacing with new"); p = null; } else { // If what we are scanning is a system (and possibly privileged) package, // then make it so, regardless of whether it was previously installed only // in the data partition. final int sysPrivFlags = pkgFlags & (ApplicationInfo.FLAG_SYSTEM | ApplicationInfo.FLAG_PRIVILEGED); p.pkgFlags |= sysPrivFlags; } } if (p == null) { if (origPackage != null) { // We are consuming the data from an existing package. p = new PackageSetting(origPackage.name, name, codePath, resourcePath, legacyNativeLibraryPathString, primaryCpuAbiString, secondaryCpuAbiString, null /* cpuAbiOverrideString */, vc, pkgFlags); if (PackageManagerService.DEBUG_UPGRADE) Log.v(PackageManagerService.TAG, "Package " + name + " is adopting original package " + origPackage.name); // Note that we will retain the new package's signature so // that we can keep its data. PackageSignatures s = p.signatures; p.copyFrom(origPackage); p.signatures = s; p.sharedUser = origPackage.sharedUser; p.appId = origPackage.appId; p.origPackage = origPackage; mRenamedPackages.put(name, origPackage.name); name = origPackage.name; // Update new package state. p.setTimeStamp(codePath.lastModified()); } else { p = new PackageSetting(name, realName, codePath, resourcePath, legacyNativeLibraryPathString, primaryCpuAbiString, secondaryCpuAbiString, null /* cpuAbiOverrideString */, vc, pkgFlags); p.setTimeStamp(codePath.lastModified()); p.sharedUser = sharedUser; // If this is not a system app, it starts out stopped. if ((pkgFlags&ApplicationInfo.FLAG_SYSTEM) == 0) { if (DEBUG_STOPPED) { RuntimeException e = new RuntimeException("here"); e.fillInStackTrace(); Slog.i(PackageManagerService.TAG, "Stopping package " + name, e); } List users = getAllUsers(); final int installUserId = installUser != null ? installUser.getIdentifier() : 0; if (users != null && allowInstall) { for (UserInfo user : users) { // By default we consider this app to be installed // for the user if no user has been specified (which // means to leave it at its original value, and the // original default value is true), or we are being // asked to install for all users, or this is the // user we are installing for. final boolean installed = installUser == null || (installUserId == UserHandle.USER_ALL && !isAdbInstallDisallowed(userManager, user.id)) || installUserId == user.id; p.setUserState(user.id, COMPONENT_ENABLED_STATE_DEFAULT, installed, true, // stopped, true, // notLaunched false, // hidden null, null, null, false // blockUninstall ); writePackageRestrictionsLPr(user.id); } } } if (sharedUser != null) { p.appId = sharedUser.userId; } else { // Clone the setting here for disabled system packages PackageSetting dis = mDisabledSysPackages.get(name); if (dis != null) { // For disabled packages a new setting is created // from the existing user id. This still has to be // added to list of user id's // Copy signatures from previous setting if (dis.signatures.mSignatures != null) { p.signatures.mSignatures = dis.signatures.mSignatures.clone(); } p.appId = dis.appId; // Clone permissions p.grantedPermissions = new ArraySet(dis.grantedPermissions); // Clone component info List users = getAllUsers(); if (users != null) { for (UserInfo user : users) { int userId = user.id; p.setDisabledComponentsCopy( dis.getDisabledComponents(userId), userId); p.setEnabledComponentsCopy( dis.getEnabledComponents(userId), userId); } } // Add new setting to list of user ids addUserIdLPw(p.appId, p, name); } else { // Assign new user id p.appId = newUserIdLPw(p); } } } if (p.appId < 0) { PackageManagerService.reportSettingsProblem(Log.WARN, "Package " + name + " could not be assigned a valid uid"); return null; } if (add) { // Finish adding new package by adding it and updating shared // user preferences addPackageSettingLPw(p, name, sharedUser); } } else { if (installUser != null && allowInstall) { // The caller has explicitly specified the user they want this // package installed for, and the package already exists. // Make sure it conforms to the new request. List users = getAllUsers(); if (users != null) { for (UserInfo user : users) { if ((installUser.getIdentifier() == UserHandle.USER_ALL && !isAdbInstallDisallowed(userManager, user.id)) || installUser.getIdentifier() == user.id) { boolean installed = p.getInstalled(user.id); if (!installed) { p.setInstalled(true, user.id); writePackageRestrictionsLPr(user.id); } } } } } } return p; } boolean isAdbInstallDisallowed(UserManagerService userManager, int userId) { return userManager.hasUserRestriction(UserManager.DISALLOW_DEBUGGING_FEATURES, userId); } void insertPackageSettingLPw(PackageSetting p, PackageParser.Package pkg) { p.pkg = pkg; // pkg.mSetEnabled = p.getEnabled(userId); // pkg.mSetStopped = p.getStopped(userId); final String codePath = pkg.applicationInfo.getCodePath(); final String resourcePath = pkg.applicationInfo.getResourcePath(); final String legacyNativeLibraryPath = pkg.applicationInfo.nativeLibraryRootDir; // Update code path if needed if (!Objects.equals(codePath, p.codePathString)) { Slog.w(PackageManagerService.TAG, "Code path for pkg : " + p.pkg.packageName + " changing from " + p.codePathString + " to " + codePath); p.codePath = new File(codePath); p.codePathString = codePath; } //Update resource path if needed if (!Objects.equals(resourcePath, p.resourcePathString)) { Slog.w(PackageManagerService.TAG, "Resource path for pkg : " + p.pkg.packageName + " changing from " + p.resourcePathString + " to " + resourcePath); p.resourcePath = new File(resourcePath); p.resourcePathString = resourcePath; } // Update the native library paths if needed if (!Objects.equals(legacyNativeLibraryPath, p.legacyNativeLibraryPathString)) { p.legacyNativeLibraryPathString = legacyNativeLibraryPath; } // Update the required Cpu Abi p.primaryCpuAbiString = pkg.applicationInfo.primaryCpuAbi; p.secondaryCpuAbiString = pkg.applicationInfo.secondaryCpuAbi; p.cpuAbiOverrideString = pkg.cpuAbiOverride; // Update version code if needed if (pkg.mVersionCode != p.versionCode) { p.versionCode = pkg.mVersionCode; } // Update signatures if needed. if (p.signatures.mSignatures == null) { p.signatures.assignSignatures(pkg.mSignatures); } // Update flags if needed. if (pkg.applicationInfo.flags != p.pkgFlags) { p.pkgFlags = pkg.applicationInfo.flags; } // If this app defines a shared user id initialize // the shared user signatures as well. if (p.sharedUser != null && p.sharedUser.signatures.mSignatures == null) { p.sharedUser.signatures.assignSignatures(pkg.mSignatures); } addPackageSettingLPw(p, pkg.packageName, p.sharedUser); } // Utility method that adds a PackageSetting to mPackages and // completes updating the shared user attributes private void addPackageSettingLPw(PackageSetting p, String name, SharedUserSetting sharedUser) { mPackages.put(name, p); if (sharedUser != null) { if (p.sharedUser != null && p.sharedUser != sharedUser) { PackageManagerService.reportSettingsProblem(Log.ERROR, "Package " + p.name + " was user " + p.sharedUser + " but is now " + sharedUser + "; I am not changing its files so it will probably fail!"); p.sharedUser.removePackage(p); } else if (p.appId != sharedUser.userId) { PackageManagerService.reportSettingsProblem(Log.ERROR, "Package " + p.name + " was user id " + p.appId + " but is now user " + sharedUser + " with id " + sharedUser.userId + "; I am not changing its files so it will probably fail!"); } sharedUser.addPackage(p); p.sharedUser = sharedUser; p.appId = sharedUser.userId; } } /* * Update the shared user setting when a package using * specifying the shared user id is removed. The gids * associated with each permission of the deleted package * are removed from the shared user's gid list only if its * not in use by other permissions of packages in the * shared user setting. */ void updateSharedUserPermsLPw(PackageSetting deletedPs, int[] globalGids) { if ((deletedPs == null) || (deletedPs.pkg == null)) { Slog.i(PackageManagerService.TAG, "Trying to update info for null package. Just ignoring"); return; } // No sharedUserId if (deletedPs.sharedUser == null) { return; } SharedUserSetting sus = deletedPs.sharedUser; // Update permissions for (String eachPerm : deletedPs.pkg.requestedPermissions) { boolean used = false; if (!sus.grantedPermissions.contains(eachPerm)) { continue; } for (PackageSetting pkg:sus.packages) { if (pkg.pkg != null && !pkg.pkg.packageName.equals(deletedPs.pkg.packageName) && pkg.pkg.requestedPermissions.contains(eachPerm)) { used = true; break; } } if (!used) { // can safely delete this permission from list sus.grantedPermissions.remove(eachPerm); } } // Update gids int newGids[] = globalGids; for (String eachPerm : sus.grantedPermissions) { BasePermission bp = mPermissions.get(eachPerm); if (bp != null) { newGids = PackageManagerService.appendInts(newGids, bp.gids); } } sus.gids = newGids; } int removePackageLPw(String name) { final PackageSetting p = mPackages.get(name); if (p != null) { mPackages.remove(name); if (p.sharedUser != null) { p.sharedUser.removePackage(p); if (p.sharedUser.packages.size() == 0) { mSharedUsers.remove(p.sharedUser.name); removeUserIdLPw(p.sharedUser.userId); return p.sharedUser.userId; } } else { removeUserIdLPw(p.appId); return p.appId; } } return -1; } private void replacePackageLPw(String name, PackageSetting newp) { final PackageSetting p = mPackages.get(name); if (p != null) { if (p.sharedUser != null) { p.sharedUser.removePackage(p); p.sharedUser.addPackage(newp); } else { replaceUserIdLPw(p.appId, newp); } } mPackages.put(name, newp); } private boolean addUserIdLPw(int uid, Object obj, Object name) { if (uid > Process.LAST_APPLICATION_UID) { return false; } if (uid >= Process.FIRST_APPLICATION_UID) { int N = mUserIds.size(); final int index = uid - Process.FIRST_APPLICATION_UID; while (index >= N) { mUserIds.add(null); N++; } if (mUserIds.get(index) != null) { PackageManagerService.reportSettingsProblem(Log.ERROR, "Adding duplicate user id: " + uid + " name=" + name); return false; } mUserIds.set(index, obj); } else { if (mOtherUserIds.get(uid) != null) { PackageManagerService.reportSettingsProblem(Log.ERROR, "Adding duplicate shared id: " + uid + " name=" + name); return false; } mOtherUserIds.put(uid, obj); } return true; } public Object getUserIdLPr(int uid) { if (uid >= Process.FIRST_APPLICATION_UID) { final int N = mUserIds.size(); final int index = uid - Process.FIRST_APPLICATION_UID; return index < N ? mUserIds.get(index) : null; } else { return mOtherUserIds.get(uid); } } private void removeUserIdLPw(int uid) { if (uid >= Process.FIRST_APPLICATION_UID) { final int N = mUserIds.size(); final int index = uid - Process.FIRST_APPLICATION_UID; if (index < N) mUserIds.set(index, null); } else { mOtherUserIds.remove(uid); } setFirstAvailableUid(uid+1); } private void replaceUserIdLPw(int uid, Object obj) { if (uid >= Process.FIRST_APPLICATION_UID) { final int N = mUserIds.size(); final int index = uid - Process.FIRST_APPLICATION_UID; if (index < N) mUserIds.set(index, obj); } else { mOtherUserIds.put(uid, obj); } } PreferredIntentResolver editPreferredActivitiesLPw(int userId) { PreferredIntentResolver pir = mPreferredActivities.get(userId); if (pir == null) { pir = new PreferredIntentResolver(); mPreferredActivities.put(userId, pir); } return pir; } PersistentPreferredIntentResolver editPersistentPreferredActivitiesLPw(int userId) { PersistentPreferredIntentResolver ppir = mPersistentPreferredActivities.get(userId); if (ppir == null) { ppir = new PersistentPreferredIntentResolver(); mPersistentPreferredActivities.put(userId, ppir); } return ppir; } CrossProfileIntentResolver editCrossProfileIntentResolverLPw(int userId) { CrossProfileIntentResolver cpir = mCrossProfileIntentResolvers.get(userId); if (cpir == null) { cpir = new CrossProfileIntentResolver(); mCrossProfileIntentResolvers.put(userId, cpir); } return cpir; } private File getUserPackagesStateFile(int userId) { return new File(Environment.getUserSystemDirectory(userId), "package-restrictions.xml"); } private File getUserPackagesStateBackupFile(int userId) { return new File(Environment.getUserSystemDirectory(userId), "package-restrictions-backup.xml"); } void writeAllUsersPackageRestrictionsLPr() { List users = getAllUsers(); if (users == null) return; for (UserInfo user : users) { writePackageRestrictionsLPr(user.id); } } void readAllUsersPackageRestrictionsLPr() { List users = getAllUsers(); if (users == null) { readPackageRestrictionsLPr(0); return; } for (UserInfo user : users) { readPackageRestrictionsLPr(user.id); } } /** * Returns whether the current database has is older than {@code version} * for apps on internal storage. */ public boolean isInternalDatabaseVersionOlderThan(int version) { return mInternalDatabaseVersion < version; } /** * Returns whether the current database has is older than {@code version} * for apps on external storage. */ public boolean isExternalDatabaseVersionOlderThan(int version) { return mExternalDatabaseVersion < version; } /** * Updates the database version for apps on internal storage. Called after * call the updates to the database format are done for apps on internal * storage after the initial start-up scan. */ public void updateInternalDatabaseVersion() { mInternalDatabaseVersion = CURRENT_DATABASE_VERSION; } /** * Updates the database version for apps on internal storage. Called after * call the updates to the database format are done for apps on internal * storage after the initial start-up scan. */ public void updateExternalDatabaseVersion() { mExternalDatabaseVersion = CURRENT_DATABASE_VERSION; } private void readPreferredActivitiesLPw(XmlPullParser parser, int userId) throws XmlPullParserException, IOException { int outerDepth = parser.getDepth(); int type; while ((type = parser.next()) != XmlPullParser.END_DOCUMENT && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) { if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) { continue; } String tagName = parser.getName(); if (tagName.equals(TAG_ITEM)) { PreferredActivity pa = new PreferredActivity(parser); if (pa.mPref.getParseError() == null) { editPreferredActivitiesLPw(userId).addFilter(pa); } else { PackageManagerService.reportSettingsProblem(Log.WARN, "Error in package manager settings: " + pa.mPref.getParseError() + " at " + parser.getPositionDescription()); } } else { PackageManagerService.reportSettingsProblem(Log.WARN, "Unknown element under : " + parser.getName()); XmlUtils.skipCurrentTag(parser); } } } private void readPersistentPreferredActivitiesLPw(XmlPullParser parser, int userId) throws XmlPullParserException, IOException { int outerDepth = parser.getDepth(); int type; while ((type = parser.next()) != XmlPullParser.END_DOCUMENT && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) { if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) { continue; } String tagName = parser.getName(); if (tagName.equals(TAG_ITEM)) { PersistentPreferredActivity ppa = new PersistentPreferredActivity(parser); editPersistentPreferredActivitiesLPw(userId).addFilter(ppa); } else { PackageManagerService.reportSettingsProblem(Log.WARN, "Unknown element under <" + TAG_PERSISTENT_PREFERRED_ACTIVITIES + ">: " + parser.getName()); XmlUtils.skipCurrentTag(parser); } } } private void readCrossProfileIntentFiltersLPw(XmlPullParser parser, int userId) throws XmlPullParserException, IOException { int outerDepth = parser.getDepth(); int type; while ((type = parser.next()) != XmlPullParser.END_DOCUMENT && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) { if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) { continue; } String tagName = parser.getName(); if (tagName.equals(TAG_ITEM)) { CrossProfileIntentFilter cpif = new CrossProfileIntentFilter(parser); editCrossProfileIntentResolverLPw(userId).addFilter(cpif); } else { String msg = "Unknown element under " + TAG_CROSS_PROFILE_INTENT_FILTERS + ": " + parser.getName(); PackageManagerService.reportSettingsProblem(Log.WARN, msg); XmlUtils.skipCurrentTag(parser); } } } void readPackageRestrictionsLPr(int userId) { if (DEBUG_MU) { Log.i(TAG, "Reading package restrictions for user=" + userId); } FileInputStream str = null; File userPackagesStateFile = getUserPackagesStateFile(userId); File backupFile = getUserPackagesStateBackupFile(userId); if (backupFile.exists()) { try { str = new FileInputStream(backupFile); mReadMessages.append("Reading from backup stopped packages file\n"); PackageManagerService.reportSettingsProblem(Log.INFO, "Need to read from backup stopped packages file"); if (userPackagesStateFile.exists()) { // If both the backup and normal file exist, we // ignore the normal one since it might have been // corrupted. Slog.w(PackageManagerService.TAG, "Cleaning up stopped packages file " + userPackagesStateFile); userPackagesStateFile.delete(); } } catch (java.io.IOException e) { // We'll try for the normal settings file. } } try { if (str == null) { if (!userPackagesStateFile.exists()) { mReadMessages.append("No stopped packages file found\n"); PackageManagerService.reportSettingsProblem(Log.INFO, "No stopped packages file; " + "assuming all started"); // At first boot, make sure no packages are stopped. // We usually want to have third party apps initialize // in the stopped state, but not at first boot. Also // consider all applications to be installed. for (PackageSetting pkg : mPackages.values()) { pkg.setUserState(userId, COMPONENT_ENABLED_STATE_DEFAULT, true, // installed false, // stopped false, // notLaunched false, // hidden null, null, null, false // blockUninstall ); } return; } str = new FileInputStream(userPackagesStateFile); } final XmlPullParser parser = Xml.newPullParser(); parser.setInput(str, null); int type; while ((type=parser.next()) != XmlPullParser.START_TAG && type != XmlPullParser.END_DOCUMENT) { ; } if (type != XmlPullParser.START_TAG) { mReadMessages.append("No start tag found in package restrictions file\n"); PackageManagerService.reportSettingsProblem(Log.WARN, "No start tag found in package manager stopped packages"); return; } int outerDepth = parser.getDepth(); PackageSetting ps = null; while ((type=parser.next()) != XmlPullParser.END_DOCUMENT && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) { if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) { continue; } String tagName = parser.getName(); if (tagName.equals(TAG_PACKAGE)) { String name = parser.getAttributeValue(null, ATTR_NAME); ps = mPackages.get(name); if (ps == null) { Slog.w(PackageManagerService.TAG, "No package known for stopped package: " + name); XmlUtils.skipCurrentTag(parser); continue; } final String enabledStr = parser.getAttributeValue(null, ATTR_ENABLED); final int enabled = enabledStr == null ? COMPONENT_ENABLED_STATE_DEFAULT : Integer.parseInt(enabledStr); final String enabledCaller = parser.getAttributeValue(null, ATTR_ENABLED_CALLER); final String installedStr = parser.getAttributeValue(null, ATTR_INSTALLED); final boolean installed = installedStr == null ? true : Boolean.parseBoolean(installedStr); final String stoppedStr = parser.getAttributeValue(null, ATTR_STOPPED); final boolean stopped = stoppedStr == null ? false : Boolean.parseBoolean(stoppedStr); // For backwards compatibility with the previous name of "blocked", which // now means hidden, read the old attribute as well. final String blockedStr = parser.getAttributeValue(null, ATTR_BLOCKED); boolean hidden = blockedStr == null ? false : Boolean.parseBoolean(blockedStr); final String hiddenStr = parser.getAttributeValue(null, ATTR_HIDDEN); hidden = hiddenStr == null ? hidden : Boolean.parseBoolean(hiddenStr); final String notLaunchedStr = parser.getAttributeValue(null, ATTR_NOT_LAUNCHED); final boolean notLaunched = stoppedStr == null ? false : Boolean.parseBoolean(notLaunchedStr); final String blockUninstallStr = parser.getAttributeValue(null, ATTR_BLOCK_UNINSTALL); final boolean blockUninstall = blockUninstallStr == null ? false : Boolean.parseBoolean(blockUninstallStr); ArraySet enabledComponents = null; ArraySet disabledComponents = null; int packageDepth = parser.getDepth(); while ((type=parser.next()) != XmlPullParser.END_DOCUMENT && (type != XmlPullParser.END_TAG || parser.getDepth() > packageDepth)) { if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) { continue; } tagName = parser.getName(); if (tagName.equals(TAG_ENABLED_COMPONENTS)) { enabledComponents = readComponentsLPr(parser); } else if (tagName.equals(TAG_DISABLED_COMPONENTS)) { disabledComponents = readComponentsLPr(parser); } } ps.setUserState(userId, enabled, installed, stopped, notLaunched, hidden, enabledCaller, enabledComponents, disabledComponents, blockUninstall); } else if (tagName.equals("preferred-activities")) { readPreferredActivitiesLPw(parser, userId); } else if (tagName.equals(TAG_PERSISTENT_PREFERRED_ACTIVITIES)) { readPersistentPreferredActivitiesLPw(parser, userId); } else if (tagName.equals(TAG_CROSS_PROFILE_INTENT_FILTERS)) { readCrossProfileIntentFiltersLPw(parser, userId); } else { Slog.w(PackageManagerService.TAG, "Unknown element under : " + parser.getName()); XmlUtils.skipCurrentTag(parser); } } str.close(); } catch (XmlPullParserException e) { mReadMessages.append("Error reading: " + e.toString()); PackageManagerService.reportSettingsProblem(Log.ERROR, "Error reading stopped packages: " + e); Slog.wtf(PackageManagerService.TAG, "Error reading package manager stopped packages", e); } catch (java.io.IOException e) { mReadMessages.append("Error reading: " + e.toString()); PackageManagerService.reportSettingsProblem(Log.ERROR, "Error reading settings: " + e); Slog.wtf(PackageManagerService.TAG, "Error reading package manager stopped packages", e); } } private ArraySet readComponentsLPr(XmlPullParser parser) throws IOException, XmlPullParserException { ArraySet components = null; int type; int outerDepth = parser.getDepth(); String tagName; while ((type = parser.next()) != XmlPullParser.END_DOCUMENT && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) { if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) { continue; } tagName = parser.getName(); if (tagName.equals(TAG_ITEM)) { String componentName = parser.getAttributeValue(null, ATTR_NAME); if (componentName != null) { if (components == null) { components = new ArraySet(); } components.add(componentName); } } } return components; } void writePreferredActivitiesLPr(XmlSerializer serializer, int userId, boolean full) throws IllegalArgumentException, IllegalStateException, IOException { serializer.startTag(null, "preferred-activities"); PreferredIntentResolver pir = mPreferredActivities.get(userId); if (pir != null) { for (final PreferredActivity pa : pir.filterSet()) { serializer.startTag(null, TAG_ITEM); pa.writeToXml(serializer, full); serializer.endTag(null, TAG_ITEM); } } serializer.endTag(null, "preferred-activities"); } void writePersistentPreferredActivitiesLPr(XmlSerializer serializer, int userId) throws IllegalArgumentException, IllegalStateException, IOException { serializer.startTag(null, TAG_PERSISTENT_PREFERRED_ACTIVITIES); PersistentPreferredIntentResolver ppir = mPersistentPreferredActivities.get(userId); if (ppir != null) { for (final PersistentPreferredActivity ppa : ppir.filterSet()) { serializer.startTag(null, TAG_ITEM); ppa.writeToXml(serializer); serializer.endTag(null, TAG_ITEM); } } serializer.endTag(null, TAG_PERSISTENT_PREFERRED_ACTIVITIES); } void writeCrossProfileIntentFiltersLPr(XmlSerializer serializer, int userId) throws IllegalArgumentException, IllegalStateException, IOException { serializer.startTag(null, TAG_CROSS_PROFILE_INTENT_FILTERS); CrossProfileIntentResolver cpir = mCrossProfileIntentResolvers.get(userId); if (cpir != null) { for (final CrossProfileIntentFilter cpif : cpir.filterSet()) { serializer.startTag(null, TAG_ITEM); cpif.writeToXml(serializer); serializer.endTag(null, TAG_ITEM); } } serializer.endTag(null, TAG_CROSS_PROFILE_INTENT_FILTERS); } void writePackageRestrictionsLPr(int userId) { if (DEBUG_MU) { Log.i(TAG, "Writing package restrictions for user=" + userId); } // Keep the old stopped packages around until we know the new ones have // been successfully written. File userPackagesStateFile = getUserPackagesStateFile(userId); File backupFile = getUserPackagesStateBackupFile(userId); new File(userPackagesStateFile.getParent()).mkdirs(); if (userPackagesStateFile.exists()) { // Presence of backup settings file indicates that we failed // to persist packages earlier. So preserve the older // backup for future reference since the current packages // might have been corrupted. if (!backupFile.exists()) { if (!userPackagesStateFile.renameTo(backupFile)) { Slog.wtf(PackageManagerService.TAG, "Unable to backup user packages state file, " + "current changes will be lost at reboot"); return; } } else { userPackagesStateFile.delete(); Slog.w(PackageManagerService.TAG, "Preserving older stopped packages backup"); } } try { final FileOutputStream fstr = new FileOutputStream(userPackagesStateFile); final BufferedOutputStream str = new BufferedOutputStream(fstr); final XmlSerializer serializer = new FastXmlSerializer(); serializer.setOutput(str, "utf-8"); serializer.startDocument(null, true); serializer.setFeature("http://xmlpull.org/v1/doc/features.html#indent-output", true); serializer.startTag(null, TAG_PACKAGE_RESTRICTIONS); for (final PackageSetting pkg : mPackages.values()) { PackageUserState ustate = pkg.readUserState(userId); if (ustate.stopped || ustate.notLaunched || !ustate.installed || ustate.enabled != COMPONENT_ENABLED_STATE_DEFAULT || ustate.hidden || (ustate.enabledComponents != null && ustate.enabledComponents.size() > 0) || (ustate.disabledComponents != null && ustate.disabledComponents.size() > 0) || ustate.blockUninstall) { serializer.startTag(null, TAG_PACKAGE); serializer.attribute(null, ATTR_NAME, pkg.name); if (DEBUG_MU) Log.i(TAG, " pkg=" + pkg.name + ", state=" + ustate.enabled); if (!ustate.installed) { serializer.attribute(null, ATTR_INSTALLED, "false"); } if (ustate.stopped) { serializer.attribute(null, ATTR_STOPPED, "true"); } if (ustate.notLaunched) { serializer.attribute(null, ATTR_NOT_LAUNCHED, "true"); } if (ustate.hidden) { serializer.attribute(null, ATTR_HIDDEN, "true"); } if (ustate.blockUninstall) { serializer.attribute(null, ATTR_BLOCK_UNINSTALL, "true"); } if (ustate.enabled != COMPONENT_ENABLED_STATE_DEFAULT) { serializer.attribute(null, ATTR_ENABLED, Integer.toString(ustate.enabled)); if (ustate.lastDisableAppCaller != null) { serializer.attribute(null, ATTR_ENABLED_CALLER, ustate.lastDisableAppCaller); } } if (ustate.enabledComponents != null && ustate.enabledComponents.size() > 0) { serializer.startTag(null, TAG_ENABLED_COMPONENTS); for (final String name : ustate.enabledComponents) { serializer.startTag(null, TAG_ITEM); serializer.attribute(null, ATTR_NAME, name); serializer.endTag(null, TAG_ITEM); } serializer.endTag(null, TAG_ENABLED_COMPONENTS); } if (ustate.disabledComponents != null && ustate.disabledComponents.size() > 0) { serializer.startTag(null, TAG_DISABLED_COMPONENTS); for (final String name : ustate.disabledComponents) { serializer.startTag(null, TAG_ITEM); serializer.attribute(null, ATTR_NAME, name); serializer.endTag(null, TAG_ITEM); } serializer.endTag(null, TAG_DISABLED_COMPONENTS); } serializer.endTag(null, TAG_PACKAGE); } } writePreferredActivitiesLPr(serializer, userId, true); writePersistentPreferredActivitiesLPr(serializer, userId); writeCrossProfileIntentFiltersLPr(serializer, userId); serializer.endTag(null, TAG_PACKAGE_RESTRICTIONS); serializer.endDocument(); str.flush(); FileUtils.sync(fstr); str.close(); // New settings successfully written, old ones are no longer // needed. backupFile.delete(); FileUtils.setPermissions(userPackagesStateFile.toString(), FileUtils.S_IRUSR|FileUtils.S_IWUSR |FileUtils.S_IRGRP|FileUtils.S_IWGRP, -1, -1); // Done, all is good! return; } catch(java.io.IOException e) { Slog.wtf(PackageManagerService.TAG, "Unable to write package manager user packages state, " + " current changes will be lost at reboot", e); } // Clean up partially written files if (userPackagesStateFile.exists()) { if (!userPackagesStateFile.delete()) { Log.i(PackageManagerService.TAG, "Failed to clean up mangled file: " + mStoppedPackagesFilename); } } } // Note: assumed "stopped" field is already cleared in all packages. // Legacy reader, used to read in the old file format after an upgrade. Not used after that. void readStoppedLPw() { FileInputStream str = null; if (mBackupStoppedPackagesFilename.exists()) { try { str = new FileInputStream(mBackupStoppedPackagesFilename); mReadMessages.append("Reading from backup stopped packages file\n"); PackageManagerService.reportSettingsProblem(Log.INFO, "Need to read from backup stopped packages file"); if (mSettingsFilename.exists()) { // If both the backup and normal file exist, we // ignore the normal one since it might have been // corrupted. Slog.w(PackageManagerService.TAG, "Cleaning up stopped packages file " + mStoppedPackagesFilename); mStoppedPackagesFilename.delete(); } } catch (java.io.IOException e) { // We'll try for the normal settings file. } } try { if (str == null) { if (!mStoppedPackagesFilename.exists()) { mReadMessages.append("No stopped packages file found\n"); PackageManagerService.reportSettingsProblem(Log.INFO, "No stopped packages file file; assuming all started"); // At first boot, make sure no packages are stopped. // We usually want to have third party apps initialize // in the stopped state, but not at first boot. for (PackageSetting pkg : mPackages.values()) { pkg.setStopped(false, 0); pkg.setNotLaunched(false, 0); } return; } str = new FileInputStream(mStoppedPackagesFilename); } final XmlPullParser parser = Xml.newPullParser(); parser.setInput(str, null); int type; while ((type=parser.next()) != XmlPullParser.START_TAG && type != XmlPullParser.END_DOCUMENT) { ; } if (type != XmlPullParser.START_TAG) { mReadMessages.append("No start tag found in stopped packages file\n"); PackageManagerService.reportSettingsProblem(Log.WARN, "No start tag found in package manager stopped packages"); return; } int outerDepth = parser.getDepth(); while ((type=parser.next()) != XmlPullParser.END_DOCUMENT && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) { if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) { continue; } String tagName = parser.getName(); if (tagName.equals(TAG_PACKAGE)) { String name = parser.getAttributeValue(null, ATTR_NAME); PackageSetting ps = mPackages.get(name); if (ps != null) { ps.setStopped(true, 0); if ("1".equals(parser.getAttributeValue(null, ATTR_NOT_LAUNCHED))) { ps.setNotLaunched(true, 0); } } else { Slog.w(PackageManagerService.TAG, "No package known for stopped package: " + name); } XmlUtils.skipCurrentTag(parser); } else { Slog.w(PackageManagerService.TAG, "Unknown element under : " + parser.getName()); XmlUtils.skipCurrentTag(parser); } } str.close(); } catch (XmlPullParserException e) { mReadMessages.append("Error reading: " + e.toString()); PackageManagerService.reportSettingsProblem(Log.ERROR, "Error reading stopped packages: " + e); Slog.wtf(PackageManagerService.TAG, "Error reading package manager stopped packages", e); } catch (java.io.IOException e) { mReadMessages.append("Error reading: " + e.toString()); PackageManagerService.reportSettingsProblem(Log.ERROR, "Error reading settings: " + e); Slog.wtf(PackageManagerService.TAG, "Error reading package manager stopped packages", e); } } void writeLPr() { //Debug.startMethodTracing("/data/system/packageprof", 8 * 1024 * 1024); // Keep the old settings around until we know the new ones have // been successfully written. if (mSettingsFilename.exists()) { // Presence of backup settings file indicates that we failed // to persist settings earlier. So preserve the older // backup for future reference since the current settings // might have been corrupted. if (!mBackupSettingsFilename.exists()) { if (!mSettingsFilename.renameTo(mBackupSettingsFilename)) { Slog.wtf(PackageManagerService.TAG, "Unable to backup package manager settings, " + " current changes will be lost at reboot"); return; } } else { mSettingsFilename.delete(); Slog.w(PackageManagerService.TAG, "Preserving older settings backup"); } } mPastSignatures.clear(); try { FileOutputStream fstr = new FileOutputStream(mSettingsFilename); BufferedOutputStream str = new BufferedOutputStream(fstr); //XmlSerializer serializer = XmlUtils.serializerInstance(); XmlSerializer serializer = new FastXmlSerializer(); serializer.setOutput(str, "utf-8"); serializer.startDocument(null, true); serializer.setFeature("http://xmlpull.org/v1/doc/features.html#indent-output", true); serializer.startTag(null, "packages"); serializer.startTag(null, "last-platform-version"); serializer.attribute(null, "internal", Integer.toString(mInternalSdkPlatform)); serializer.attribute(null, "external", Integer.toString(mExternalSdkPlatform)); serializer.attribute(null, "fingerprint", mFingerprint); serializer.endTag(null, "last-platform-version"); serializer.startTag(null, "database-version"); serializer.attribute(null, "internal", Integer.toString(mInternalDatabaseVersion)); serializer.attribute(null, "external", Integer.toString(mExternalDatabaseVersion)); serializer.endTag(null, "database-version"); if (mVerifierDeviceIdentity != null) { serializer.startTag(null, "verifier"); serializer.attribute(null, "device", mVerifierDeviceIdentity.toString()); serializer.endTag(null, "verifier"); } if (mReadExternalStorageEnforced != null) { serializer.startTag(null, TAG_READ_EXTERNAL_STORAGE); serializer.attribute( null, ATTR_ENFORCEMENT, mReadExternalStorageEnforced ? "1" : "0"); serializer.endTag(null, TAG_READ_EXTERNAL_STORAGE); } serializer.startTag(null, "permission-trees"); for (BasePermission bp : mPermissionTrees.values()) { writePermissionLPr(serializer, bp); } serializer.endTag(null, "permission-trees"); serializer.startTag(null, "permissions"); for (BasePermission bp : mPermissions.values()) { writePermissionLPr(serializer, bp); } serializer.endTag(null, "permissions"); for (final PackageSetting pkg : mPackages.values()) { writePackageLPr(serializer, pkg); } for (final PackageSetting pkg : mDisabledSysPackages.values()) { writeDisabledSysPackageLPr(serializer, pkg); } for (final SharedUserSetting usr : mSharedUsers.values()) { serializer.startTag(null, "shared-user"); serializer.attribute(null, ATTR_NAME, usr.name); serializer.attribute(null, "userId", Integer.toString(usr.userId)); usr.signatures.writeXml(serializer, "sigs", mPastSignatures); serializer.startTag(null, "perms"); for (String name : usr.grantedPermissions) { serializer.startTag(null, TAG_ITEM); serializer.attribute(null, ATTR_NAME, name); serializer.endTag(null, TAG_ITEM); } serializer.endTag(null, "perms"); serializer.endTag(null, "shared-user"); } if (mPackagesToBeCleaned.size() > 0) { for (PackageCleanItem item : mPackagesToBeCleaned) { final String userStr = Integer.toString(item.userId); serializer.startTag(null, "cleaning-package"); serializer.attribute(null, ATTR_NAME, item.packageName); serializer.attribute(null, ATTR_CODE, item.andCode ? "true" : "false"); serializer.attribute(null, ATTR_USER, userStr); serializer.endTag(null, "cleaning-package"); } } if (mRenamedPackages.size() > 0) { for (Map.Entry e : mRenamedPackages.entrySet()) { serializer.startTag(null, "renamed-package"); serializer.attribute(null, "new", e.getKey()); serializer.attribute(null, "old", e.getValue()); serializer.endTag(null, "renamed-package"); } } mKeySetManagerService.writeKeySetManagerServiceLPr(serializer); serializer.endTag(null, "packages"); serializer.endDocument(); str.flush(); FileUtils.sync(fstr); str.close(); // New settings successfully written, old ones are no longer // needed. mBackupSettingsFilename.delete(); FileUtils.setPermissions(mSettingsFilename.toString(), FileUtils.S_IRUSR|FileUtils.S_IWUSR |FileUtils.S_IRGRP|FileUtils.S_IWGRP, -1, -1); // Write package list file now, use a JournaledFile. File tempFile = new File(mPackageListFilename.getAbsolutePath() + ".tmp"); JournaledFile journal = new JournaledFile(mPackageListFilename, tempFile); final File writeTarget = journal.chooseForWrite(); fstr = new FileOutputStream(writeTarget); str = new BufferedOutputStream(fstr); try { FileUtils.setPermissions(fstr.getFD(), 0640, SYSTEM_UID, PACKAGE_INFO_GID); StringBuilder sb = new StringBuilder(); for (final PackageSetting pkg : mPackages.values()) { if (pkg.pkg == null || pkg.pkg.applicationInfo == null) { Slog.w(TAG, "Skipping " + pkg + " due to missing metadata"); continue; } final ApplicationInfo ai = pkg.pkg.applicationInfo; final String dataPath = ai.dataDir; final boolean isDebug = (ai.flags & ApplicationInfo.FLAG_DEBUGGABLE) != 0; final int[] gids = pkg.getGids(); // Avoid any application that has a space in its path. if (dataPath.indexOf(" ") >= 0) continue; // we store on each line the following information for now: // // pkgName - package name // userId - application-specific user id // debugFlag - 0 or 1 if the package is debuggable. // dataPath - path to package's data path // seinfo - seinfo label for the app (assigned at install time) // gids - supplementary gids this app launches with // // NOTE: We prefer not to expose all ApplicationInfo flags for now. // // DO NOT MODIFY THIS FORMAT UNLESS YOU CAN ALSO MODIFY ITS USERS // FROM NATIVE CODE. AT THE MOMENT, LOOK AT THE FOLLOWING SOURCES: // system/core/run-as/run-as.c // system/core/sdcard/sdcard.c // external/libselinux/src/android.c:package_info_init() // sb.setLength(0); sb.append(ai.packageName); sb.append(" "); sb.append((int)ai.uid); sb.append(isDebug ? " 1 " : " 0 "); sb.append(dataPath); sb.append(" "); sb.append(ai.seinfo); sb.append(" "); if (gids != null && gids.length > 0) { sb.append(gids[0]); for (int i = 1; i < gids.length; i++) { sb.append(","); sb.append(gids[i]); } } else { sb.append("none"); } sb.append("\n"); str.write(sb.toString().getBytes()); } str.flush(); FileUtils.sync(fstr); str.close(); journal.commit(); } catch (Exception e) { Slog.wtf(TAG, "Failed to write packages.list", e); IoUtils.closeQuietly(str); journal.rollback(); } writeAllUsersPackageRestrictionsLPr(); return; } catch(XmlPullParserException e) { Slog.wtf(PackageManagerService.TAG, "Unable to write package manager settings, " + "current changes will be lost at reboot", e); } catch(java.io.IOException e) { Slog.wtf(PackageManagerService.TAG, "Unable to write package manager settings, " + "current changes will be lost at reboot", e); } // Clean up partially written files if (mSettingsFilename.exists()) { if (!mSettingsFilename.delete()) { Slog.wtf(PackageManagerService.TAG, "Failed to clean up mangled file: " + mSettingsFilename); } } //Debug.stopMethodTracing(); } void writeDisabledSysPackageLPr(XmlSerializer serializer, final PackageSetting pkg) throws java.io.IOException { serializer.startTag(null, "updated-package"); serializer.attribute(null, ATTR_NAME, pkg.name); if (pkg.realName != null) { serializer.attribute(null, "realName", pkg.realName); } serializer.attribute(null, "codePath", pkg.codePathString); serializer.attribute(null, "ft", Long.toHexString(pkg.timeStamp)); serializer.attribute(null, "it", Long.toHexString(pkg.firstInstallTime)); serializer.attribute(null, "ut", Long.toHexString(pkg.lastUpdateTime)); serializer.attribute(null, "version", String.valueOf(pkg.versionCode)); if (!pkg.resourcePathString.equals(pkg.codePathString)) { serializer.attribute(null, "resourcePath", pkg.resourcePathString); } if (pkg.legacyNativeLibraryPathString != null) { serializer.attribute(null, "nativeLibraryPath", pkg.legacyNativeLibraryPathString); } if (pkg.primaryCpuAbiString != null) { serializer.attribute(null, "primaryCpuAbi", pkg.primaryCpuAbiString); } if (pkg.secondaryCpuAbiString != null) { serializer.attribute(null, "secondaryCpuAbi", pkg.secondaryCpuAbiString); } if (pkg.cpuAbiOverrideString != null) { serializer.attribute(null, "cpuAbiOverride", pkg.cpuAbiOverrideString); } if (pkg.sharedUser == null) { serializer.attribute(null, "userId", Integer.toString(pkg.appId)); } else { serializer.attribute(null, "sharedUserId", Integer.toString(pkg.appId)); } serializer.startTag(null, "perms"); if (pkg.sharedUser == null) { // If this is a shared user, the permissions will // be written there. We still need to write an // empty permissions list so permissionsFixed will // be set. for (final String name : pkg.grantedPermissions) { BasePermission bp = mPermissions.get(name); if (bp != null) { // We only need to write signature or system permissions but // this wont // match the semantics of grantedPermissions. So write all // permissions. serializer.startTag(null, TAG_ITEM); serializer.attribute(null, ATTR_NAME, name); serializer.endTag(null, TAG_ITEM); } } } serializer.endTag(null, "perms"); serializer.endTag(null, "updated-package"); } void writePackageLPr(XmlSerializer serializer, final PackageSetting pkg) throws java.io.IOException { serializer.startTag(null, "package"); serializer.attribute(null, ATTR_NAME, pkg.name); if (pkg.realName != null) { serializer.attribute(null, "realName", pkg.realName); } serializer.attribute(null, "codePath", pkg.codePathString); if (!pkg.resourcePathString.equals(pkg.codePathString)) { serializer.attribute(null, "resourcePath", pkg.resourcePathString); } if (pkg.legacyNativeLibraryPathString != null) { serializer.attribute(null, "nativeLibraryPath", pkg.legacyNativeLibraryPathString); } if (pkg.primaryCpuAbiString != null) { serializer.attribute(null, "primaryCpuAbi", pkg.primaryCpuAbiString); } if (pkg.secondaryCpuAbiString != null) { serializer.attribute(null, "secondaryCpuAbi", pkg.secondaryCpuAbiString); } if (pkg.cpuAbiOverrideString != null) { serializer.attribute(null, "cpuAbiOverride", pkg.cpuAbiOverrideString); } serializer.attribute(null, "flags", Integer.toString(pkg.pkgFlags)); serializer.attribute(null, "ft", Long.toHexString(pkg.timeStamp)); serializer.attribute(null, "it", Long.toHexString(pkg.firstInstallTime)); serializer.attribute(null, "ut", Long.toHexString(pkg.lastUpdateTime)); serializer.attribute(null, "version", String.valueOf(pkg.versionCode)); if (pkg.sharedUser == null) { serializer.attribute(null, "userId", Integer.toString(pkg.appId)); } else { serializer.attribute(null, "sharedUserId", Integer.toString(pkg.appId)); } if (pkg.uidError) { serializer.attribute(null, "uidError", "true"); } if (pkg.installStatus == PackageSettingBase.PKG_INSTALL_INCOMPLETE) { serializer.attribute(null, "installStatus", "false"); } if (pkg.installerPackageName != null) { serializer.attribute(null, "installer", pkg.installerPackageName); } pkg.signatures.writeXml(serializer, "sigs", mPastSignatures); if ((pkg.pkgFlags & ApplicationInfo.FLAG_SYSTEM) == 0) { serializer.startTag(null, "perms"); if (pkg.sharedUser == null) { // If this is a shared user, the permissions will // be written there. We still need to write an // empty permissions list so permissionsFixed will // be set. for (final String name : pkg.grantedPermissions) { serializer.startTag(null, TAG_ITEM); serializer.attribute(null, ATTR_NAME, name); serializer.endTag(null, TAG_ITEM); } } serializer.endTag(null, "perms"); } writeSigningKeySetsLPr(serializer, pkg.keySetData); writeUpgradeKeySetsLPr(serializer, pkg.keySetData); writeKeySetAliasesLPr(serializer, pkg.keySetData); serializer.endTag(null, "package"); } void writeSigningKeySetsLPr(XmlSerializer serializer, PackageKeySetData data) throws IOException { if (data.getSigningKeySets() != null) { // Keep track of the original signing-keyset. // Must be recorded first, since it will be read first and wipe the // current signing-keysets for the package when set. long properSigningKeySet = data.getProperSigningKeySet(); serializer.startTag(null, "proper-signing-keyset"); serializer.attribute(null, "identifier", Long.toString(properSigningKeySet)); serializer.endTag(null, "proper-signing-keyset"); for (long id : data.getSigningKeySets()) { serializer.startTag(null, "signing-keyset"); serializer.attribute(null, "identifier", Long.toString(id)); serializer.endTag(null, "signing-keyset"); } } } void writeUpgradeKeySetsLPr(XmlSerializer serializer, PackageKeySetData data) throws IOException { if (data.isUsingUpgradeKeySets()) { for (long id : data.getUpgradeKeySets()) { serializer.startTag(null, "upgrade-keyset"); serializer.attribute(null, "identifier", Long.toString(id)); serializer.endTag(null, "upgrade-keyset"); } } } void writeKeySetAliasesLPr(XmlSerializer serializer, PackageKeySetData data) throws IOException { for (Map.Entry e: data.getAliases().entrySet()) { serializer.startTag(null, "defined-keyset"); serializer.attribute(null, "alias", e.getKey()); serializer.attribute(null, "identifier", Long.toString(e.getValue())); serializer.endTag(null, "defined-keyset"); } } void writePermissionLPr(XmlSerializer serializer, BasePermission bp) throws XmlPullParserException, java.io.IOException { if (bp.type != BasePermission.TYPE_BUILTIN && bp.sourcePackage != null) { serializer.startTag(null, TAG_ITEM); serializer.attribute(null, ATTR_NAME, bp.name); serializer.attribute(null, "package", bp.sourcePackage); if (bp.protectionLevel != PermissionInfo.PROTECTION_NORMAL) { serializer.attribute(null, "protection", Integer.toString(bp.protectionLevel)); } if (PackageManagerService.DEBUG_SETTINGS) Log.v(PackageManagerService.TAG, "Writing perm: name=" + bp.name + " type=" + bp.type); if (bp.type == BasePermission.TYPE_DYNAMIC) { final PermissionInfo pi = bp.perm != null ? bp.perm.info : bp.pendingInfo; if (pi != null) { serializer.attribute(null, "type", "dynamic"); if (pi.icon != 0) { serializer.attribute(null, "icon", Integer.toString(pi.icon)); } if (pi.nonLocalizedLabel != null) { serializer.attribute(null, "label", pi.nonLocalizedLabel.toString()); } } } serializer.endTag(null, TAG_ITEM); } } ArrayList getListOfIncompleteInstallPackagesLPr() { final ArraySet kList = new ArraySet(mPackages.keySet()); final Iterator its = kList.iterator(); final ArrayList ret = new ArrayList(); while (its.hasNext()) { final String key = its.next(); final PackageSetting ps = mPackages.get(key); if (ps.getInstallStatus() == PackageSettingBase.PKG_INSTALL_INCOMPLETE) { ret.add(ps); } } return ret; } void addPackageToCleanLPw(PackageCleanItem pkg) { if (!mPackagesToBeCleaned.contains(pkg)) { mPackagesToBeCleaned.add(pkg); } } boolean readLPw(PackageManagerService service, List users, int sdkVersion, boolean onlyCore) { FileInputStream str = null; if (mBackupSettingsFilename.exists()) { try { str = new FileInputStream(mBackupSettingsFilename); mReadMessages.append("Reading from backup settings file\n"); PackageManagerService.reportSettingsProblem(Log.INFO, "Need to read from backup settings file"); if (mSettingsFilename.exists()) { // If both the backup and settings file exist, we // ignore the settings since it might have been // corrupted. Slog.w(PackageManagerService.TAG, "Cleaning up settings file " + mSettingsFilename); mSettingsFilename.delete(); } } catch (java.io.IOException e) { // We'll try for the normal settings file. } } mPendingPackages.clear(); mPastSignatures.clear(); try { if (str == null) { if (!mSettingsFilename.exists()) { mReadMessages.append("No settings file found\n"); PackageManagerService.reportSettingsProblem(Log.INFO, "No settings file; creating initial state"); mInternalSdkPlatform = mExternalSdkPlatform = sdkVersion; mFingerprint = Build.FINGERPRINT; return false; } str = new FileInputStream(mSettingsFilename); } XmlPullParser parser = Xml.newPullParser(); parser.setInput(str, null); int type; while ((type = parser.next()) != XmlPullParser.START_TAG && type != XmlPullParser.END_DOCUMENT) { ; } if (type != XmlPullParser.START_TAG) { mReadMessages.append("No start tag found in settings file\n"); PackageManagerService.reportSettingsProblem(Log.WARN, "No start tag found in package manager settings"); Slog.wtf(PackageManagerService.TAG, "No start tag found in package manager settings"); return false; } int outerDepth = parser.getDepth(); while ((type = parser.next()) != XmlPullParser.END_DOCUMENT && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) { if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) { continue; } String tagName = parser.getName(); if (tagName.equals("package")) { readPackageLPw(parser); } else if (tagName.equals("permissions")) { readPermissionsLPw(mPermissions, parser); } else if (tagName.equals("permission-trees")) { readPermissionsLPw(mPermissionTrees, parser); } else if (tagName.equals("shared-user")) { readSharedUserLPw(parser); } else if (tagName.equals("preferred-packages")) { // no longer used. } else if (tagName.equals("preferred-activities")) { // Upgrading from old single-user implementation; // these are the preferred activities for user 0. readPreferredActivitiesLPw(parser, 0); } else if (tagName.equals(TAG_PERSISTENT_PREFERRED_ACTIVITIES)) { // TODO: check whether this is okay! as it is very // similar to how preferred-activities are treated readPersistentPreferredActivitiesLPw(parser, 0); } else if (tagName.equals(TAG_CROSS_PROFILE_INTENT_FILTERS)) { // TODO: check whether this is okay! as it is very // similar to how preferred-activities are treated readCrossProfileIntentFiltersLPw(parser, 0); } else if (tagName.equals("updated-package")) { readDisabledSysPackageLPw(parser); } else if (tagName.equals("cleaning-package")) { String name = parser.getAttributeValue(null, ATTR_NAME); String userStr = parser.getAttributeValue(null, ATTR_USER); String codeStr = parser.getAttributeValue(null, ATTR_CODE); if (name != null) { int userId = 0; boolean andCode = true; try { if (userStr != null) { userId = Integer.parseInt(userStr); } } catch (NumberFormatException e) { } if (codeStr != null) { andCode = Boolean.parseBoolean(codeStr); } addPackageToCleanLPw(new PackageCleanItem(userId, name, andCode)); } } else if (tagName.equals("renamed-package")) { String nname = parser.getAttributeValue(null, "new"); String oname = parser.getAttributeValue(null, "old"); if (nname != null && oname != null) { mRenamedPackages.put(nname, oname); } } else if (tagName.equals("last-platform-version")) { mInternalSdkPlatform = mExternalSdkPlatform = 0; try { String internal = parser.getAttributeValue(null, "internal"); if (internal != null) { mInternalSdkPlatform = Integer.parseInt(internal); } String external = parser.getAttributeValue(null, "external"); if (external != null) { mExternalSdkPlatform = Integer.parseInt(external); } } catch (NumberFormatException e) { } mFingerprint = parser.getAttributeValue(null, "fingerprint"); } else if (tagName.equals("database-version")) { mInternalDatabaseVersion = mExternalDatabaseVersion = 0; try { String internalDbVersionString = parser.getAttributeValue(null, "internal"); if (internalDbVersionString != null) { mInternalDatabaseVersion = Integer.parseInt(internalDbVersionString); } String externalDbVersionString = parser.getAttributeValue(null, "external"); if (externalDbVersionString != null) { mExternalDatabaseVersion = Integer.parseInt(externalDbVersionString); } } catch (NumberFormatException ignored) { } } else if (tagName.equals("verifier")) { final String deviceIdentity = parser.getAttributeValue(null, "device"); try { mVerifierDeviceIdentity = VerifierDeviceIdentity.parse(deviceIdentity); } catch (IllegalArgumentException e) { Slog.w(PackageManagerService.TAG, "Discard invalid verifier device id: " + e.getMessage()); } } else if (TAG_READ_EXTERNAL_STORAGE.equals(tagName)) { final String enforcement = parser.getAttributeValue(null, ATTR_ENFORCEMENT); mReadExternalStorageEnforced = "1".equals(enforcement); } else if (tagName.equals("keyset-settings")) { mKeySetManagerService.readKeySetsLPw(parser); } else { Slog.w(PackageManagerService.TAG, "Unknown element under : " + parser.getName()); XmlUtils.skipCurrentTag(parser); } } str.close(); } catch (XmlPullParserException e) { mReadMessages.append("Error reading: " + e.toString()); PackageManagerService.reportSettingsProblem(Log.ERROR, "Error reading settings: " + e); Slog.wtf(PackageManagerService.TAG, "Error reading package manager settings", e); } catch (java.io.IOException e) { mReadMessages.append("Error reading: " + e.toString()); PackageManagerService.reportSettingsProblem(Log.ERROR, "Error reading settings: " + e); Slog.wtf(PackageManagerService.TAG, "Error reading package manager settings", e); } final int N = mPendingPackages.size(); for (int i = 0; i < N; i++) { final PendingPackage pp = mPendingPackages.get(i); Object idObj = getUserIdLPr(pp.sharedId); if (idObj != null && idObj instanceof SharedUserSetting) { PackageSetting p = getPackageLPw(pp.name, null, pp.realName, (SharedUserSetting) idObj, pp.codePath, pp.resourcePath, pp.legacyNativeLibraryPathString, pp.primaryCpuAbiString, pp.secondaryCpuAbiString, pp.versionCode, pp.pkgFlags, null, true /* add */, false /* allowInstall */); if (p == null) { PackageManagerService.reportSettingsProblem(Log.WARN, "Unable to create application package for " + pp.name); continue; } p.copyFrom(pp); } else if (idObj != null) { String msg = "Bad package setting: package " + pp.name + " has shared uid " + pp.sharedId + " that is not a shared uid\n"; mReadMessages.append(msg); PackageManagerService.reportSettingsProblem(Log.ERROR, msg); } else { String msg = "Bad package setting: package " + pp.name + " has shared uid " + pp.sharedId + " that is not defined\n"; mReadMessages.append(msg); PackageManagerService.reportSettingsProblem(Log.ERROR, msg); } } mPendingPackages.clear(); if (mBackupStoppedPackagesFilename.exists() || mStoppedPackagesFilename.exists()) { // Read old file readStoppedLPw(); mBackupStoppedPackagesFilename.delete(); mStoppedPackagesFilename.delete(); // Migrate to new file format writePackageRestrictionsLPr(0); } else { if (users == null) { readPackageRestrictionsLPr(0); } else { for (UserInfo user : users) { readPackageRestrictionsLPr(user.id); } } } /* * Make sure all the updated system packages have their shared users * associated with them. */ final Iterator disabledIt = mDisabledSysPackages.values().iterator(); while (disabledIt.hasNext()) { final PackageSetting disabledPs = disabledIt.next(); final Object id = getUserIdLPr(disabledPs.appId); if (id != null && id instanceof SharedUserSetting) { disabledPs.sharedUser = (SharedUserSetting) id; } } mReadMessages.append("Read completed successfully: " + mPackages.size() + " packages, " + mSharedUsers.size() + " shared uids\n"); return true; } void readDefaultPreferredAppsLPw(PackageManagerService service, int userId) { // First pull data from any pre-installed apps. for (PackageSetting ps : mPackages.values()) { if ((ps.pkgFlags&ApplicationInfo.FLAG_SYSTEM) != 0 && ps.pkg != null && ps.pkg.preferredActivityFilters != null) { ArrayList intents = ps.pkg.preferredActivityFilters; for (int i=0; i ri = service.mActivities.queryIntent(intent, intent.getType(), flags, 0); if (PackageManagerService.DEBUG_PREFERRED) Log.d(TAG, "Queried " + intent + " results: " + ri); int systemMatch = 0; int thirdPartyMatch = 0; if (ri != null && ri.size() > 1) { boolean haveAct = false; ComponentName haveNonSys = null; ComponentName[] set = new ComponentName[ri.size()]; for (int i=0; i= thirdPartyMatch) { // Keep track of the best match we find of all third // party apps, for use later to determine if we actually // want to set a preferred app for this intent. if (PackageManagerService.DEBUG_PREFERRED) Log.d(TAG, "Result " + ai.packageName + "/" + ai.name + ": non-system!"); haveNonSys = set[i]; break; } } else if (cn.getPackageName().equals(ai.packageName) && cn.getClassName().equals(ai.name)) { if (PackageManagerService.DEBUG_PREFERRED) Log.d(TAG, "Result " + ai.packageName + "/" + ai.name + ": default!"); haveAct = true; systemMatch = ri.get(i).match; } else { if (PackageManagerService.DEBUG_PREFERRED) Log.d(TAG, "Result " + ai.packageName + "/" + ai.name + ": skipped"); } } if (haveNonSys != null && thirdPartyMatch < systemMatch) { // If we have a matching third party app, but its match is not as // good as the built-in system app, then we don't want to actually // consider it a match because presumably the built-in app is still // the thing we want users to see by default. haveNonSys = null; } if (haveAct && haveNonSys == null) { IntentFilter filter = new IntentFilter(); if (intent.getAction() != null) { filter.addAction(intent.getAction()); } if (intent.getCategories() != null) { for (String cat : intent.getCategories()) { filter.addCategory(cat); } } if ((flags&PackageManager.MATCH_DEFAULT_ONLY) != 0) { filter.addCategory(Intent.CATEGORY_DEFAULT); } if (scheme != null) { filter.addDataScheme(scheme); } if (ssp != null) { filter.addDataSchemeSpecificPart(ssp.getPath(), ssp.getType()); } if (auth != null) { filter.addDataAuthority(auth); } if (path != null) { filter.addDataPath(path); } if (intent.getType() != null) { try { filter.addDataType(intent.getType()); } catch (IntentFilter.MalformedMimeTypeException ex) { Slog.w(TAG, "Malformed mimetype " + intent.getType() + " for " + cn); } } PreferredActivity pa = new PreferredActivity(filter, systemMatch, set, cn, true); editPreferredActivitiesLPw(userId).addFilter(pa); } else if (haveNonSys == null) { StringBuilder sb = new StringBuilder(); sb.append("No component "); sb.append(cn.flattenToShortString()); sb.append(" found setting preferred "); sb.append(intent); sb.append("; possible matches are "); for (int i=0; i 0) sb.append(", "); sb.append(set[i].flattenToShortString()); } Slog.w(TAG, sb.toString()); } else { Slog.i(TAG, "Not setting preferred " + intent + "; found third party match " + haveNonSys.flattenToShortString()); } } else { Slog.w(TAG, "No potential matches found for " + intent + " while setting preferred " + cn.flattenToShortString()); } } private void readDefaultPreferredActivitiesLPw(PackageManagerService service, XmlPullParser parser, int userId) throws XmlPullParserException, IOException { int outerDepth = parser.getDepth(); int type; while ((type = parser.next()) != XmlPullParser.END_DOCUMENT && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) { if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) { continue; } String tagName = parser.getName(); if (tagName.equals(TAG_ITEM)) { PreferredActivity tmpPa = new PreferredActivity(parser); if (tmpPa.mPref.getParseError() == null) { applyDefaultPreferredActivityLPw(service, tmpPa, tmpPa.mPref.mComponent, userId); } else { PackageManagerService.reportSettingsProblem(Log.WARN, "Error in package manager settings: " + tmpPa.mPref.getParseError() + " at " + parser.getPositionDescription()); } } else { PackageManagerService.reportSettingsProblem(Log.WARN, "Unknown element under : " + parser.getName()); XmlUtils.skipCurrentTag(parser); } } } private int readInt(XmlPullParser parser, String ns, String name, int defValue) { String v = parser.getAttributeValue(ns, name); try { if (v == null) { return defValue; } return Integer.parseInt(v); } catch (NumberFormatException e) { PackageManagerService.reportSettingsProblem(Log.WARN, "Error in package manager settings: attribute " + name + " has bad integer value " + v + " at " + parser.getPositionDescription()); } return defValue; } private void readPermissionsLPw(ArrayMap out, XmlPullParser parser) throws IOException, XmlPullParserException { int outerDepth = parser.getDepth(); int type; while ((type = parser.next()) != XmlPullParser.END_DOCUMENT && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) { if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) { continue; } final String tagName = parser.getName(); if (tagName.equals(TAG_ITEM)) { final String name = parser.getAttributeValue(null, ATTR_NAME); final String sourcePackage = parser.getAttributeValue(null, "package"); final String ptype = parser.getAttributeValue(null, "type"); if (name != null && sourcePackage != null) { final boolean dynamic = "dynamic".equals(ptype); final BasePermission bp = new BasePermission(name, sourcePackage, dynamic ? BasePermission.TYPE_DYNAMIC : BasePermission.TYPE_NORMAL); bp.protectionLevel = readInt(parser, null, "protection", PermissionInfo.PROTECTION_NORMAL); bp.protectionLevel = PermissionInfo.fixProtectionLevel(bp.protectionLevel); if (dynamic) { PermissionInfo pi = new PermissionInfo(); pi.packageName = sourcePackage.intern(); pi.name = name.intern(); pi.icon = readInt(parser, null, "icon", 0); pi.nonLocalizedLabel = parser.getAttributeValue(null, "label"); pi.protectionLevel = bp.protectionLevel; bp.pendingInfo = pi; } out.put(bp.name, bp); } else { PackageManagerService.reportSettingsProblem(Log.WARN, "Error in package manager settings: permissions has" + " no name at " + parser.getPositionDescription()); } } else { PackageManagerService.reportSettingsProblem(Log.WARN, "Unknown element reading permissions: " + parser.getName() + " at " + parser.getPositionDescription()); } XmlUtils.skipCurrentTag(parser); } } private void readDisabledSysPackageLPw(XmlPullParser parser) throws XmlPullParserException, IOException { String name = parser.getAttributeValue(null, ATTR_NAME); String realName = parser.getAttributeValue(null, "realName"); String codePathStr = parser.getAttributeValue(null, "codePath"); String resourcePathStr = parser.getAttributeValue(null, "resourcePath"); String legacyCpuAbiStr = parser.getAttributeValue(null, "requiredCpuAbi"); String legacyNativeLibraryPathStr = parser.getAttributeValue(null, "nativeLibraryPath"); String primaryCpuAbiStr = parser.getAttributeValue(null, "primaryCpuAbi"); String secondaryCpuAbiStr = parser.getAttributeValue(null, "secondaryCpuAbi"); String cpuAbiOverrideStr = parser.getAttributeValue(null, "cpuAbiOverride"); if (primaryCpuAbiStr == null && legacyCpuAbiStr != null) { primaryCpuAbiStr = legacyCpuAbiStr; } if (resourcePathStr == null) { resourcePathStr = codePathStr; } String version = parser.getAttributeValue(null, "version"); int versionCode = 0; if (version != null) { try { versionCode = Integer.parseInt(version); } catch (NumberFormatException e) { } } int pkgFlags = 0; pkgFlags |= ApplicationInfo.FLAG_SYSTEM; final File codePathFile = new File(codePathStr); if (PackageManagerService.locationIsPrivileged(codePathFile)) { pkgFlags |= ApplicationInfo.FLAG_PRIVILEGED; } PackageSetting ps = new PackageSetting(name, realName, codePathFile, new File(resourcePathStr), legacyNativeLibraryPathStr, primaryCpuAbiStr, secondaryCpuAbiStr, cpuAbiOverrideStr, versionCode, pkgFlags); String timeStampStr = parser.getAttributeValue(null, "ft"); if (timeStampStr != null) { try { long timeStamp = Long.parseLong(timeStampStr, 16); ps.setTimeStamp(timeStamp); } catch (NumberFormatException e) { } } else { timeStampStr = parser.getAttributeValue(null, "ts"); if (timeStampStr != null) { try { long timeStamp = Long.parseLong(timeStampStr); ps.setTimeStamp(timeStamp); } catch (NumberFormatException e) { } } } timeStampStr = parser.getAttributeValue(null, "it"); if (timeStampStr != null) { try { ps.firstInstallTime = Long.parseLong(timeStampStr, 16); } catch (NumberFormatException e) { } } timeStampStr = parser.getAttributeValue(null, "ut"); if (timeStampStr != null) { try { ps.lastUpdateTime = Long.parseLong(timeStampStr, 16); } catch (NumberFormatException e) { } } String idStr = parser.getAttributeValue(null, "userId"); ps.appId = idStr != null ? Integer.parseInt(idStr) : 0; if (ps.appId <= 0) { String sharedIdStr = parser.getAttributeValue(null, "sharedUserId"); ps.appId = sharedIdStr != null ? Integer.parseInt(sharedIdStr) : 0; } int outerDepth = parser.getDepth(); int type; while ((type = parser.next()) != XmlPullParser.END_DOCUMENT && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) { if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) { continue; } String tagName = parser.getName(); if (tagName.equals("perms")) { readGrantedPermissionsLPw(parser, ps.grantedPermissions); } else { PackageManagerService.reportSettingsProblem(Log.WARN, "Unknown element under : " + parser.getName()); XmlUtils.skipCurrentTag(parser); } } mDisabledSysPackages.put(name, ps); } private void readPackageLPw(XmlPullParser parser) throws XmlPullParserException, IOException { String name = null; String realName = null; String idStr = null; String sharedIdStr = null; String codePathStr = null; String resourcePathStr = null; String legacyCpuAbiString = null; String legacyNativeLibraryPathStr = null; String primaryCpuAbiString = null; String secondaryCpuAbiString = null; String cpuAbiOverrideString = null; String systemStr = null; String installerPackageName = null; String uidError = null; int pkgFlags = 0; long timeStamp = 0; long firstInstallTime = 0; long lastUpdateTime = 0; PackageSettingBase packageSetting = null; String version = null; int versionCode = 0; try { name = parser.getAttributeValue(null, ATTR_NAME); realName = parser.getAttributeValue(null, "realName"); idStr = parser.getAttributeValue(null, "userId"); uidError = parser.getAttributeValue(null, "uidError"); sharedIdStr = parser.getAttributeValue(null, "sharedUserId"); codePathStr = parser.getAttributeValue(null, "codePath"); resourcePathStr = parser.getAttributeValue(null, "resourcePath"); legacyCpuAbiString = parser.getAttributeValue(null, "requiredCpuAbi"); legacyNativeLibraryPathStr = parser.getAttributeValue(null, "nativeLibraryPath"); primaryCpuAbiString = parser.getAttributeValue(null, "primaryCpuAbi"); secondaryCpuAbiString = parser.getAttributeValue(null, "secondaryCpuAbi"); cpuAbiOverrideString = parser.getAttributeValue(null, "cpuAbiOverride"); if (primaryCpuAbiString == null && legacyCpuAbiString != null) { primaryCpuAbiString = legacyCpuAbiString; } ; version = parser.getAttributeValue(null, "version"); if (version != null) { try { versionCode = Integer.parseInt(version); } catch (NumberFormatException e) { } } installerPackageName = parser.getAttributeValue(null, "installer"); systemStr = parser.getAttributeValue(null, "flags"); if (systemStr != null) { try { pkgFlags = Integer.parseInt(systemStr); } catch (NumberFormatException e) { } } else { // For backward compatibility systemStr = parser.getAttributeValue(null, "system"); if (systemStr != null) { pkgFlags |= ("true".equalsIgnoreCase(systemStr)) ? ApplicationInfo.FLAG_SYSTEM : 0; } else { // Old settings that don't specify system... just treat // them as system, good enough. pkgFlags |= ApplicationInfo.FLAG_SYSTEM; } } String timeStampStr = parser.getAttributeValue(null, "ft"); if (timeStampStr != null) { try { timeStamp = Long.parseLong(timeStampStr, 16); } catch (NumberFormatException e) { } } else { timeStampStr = parser.getAttributeValue(null, "ts"); if (timeStampStr != null) { try { timeStamp = Long.parseLong(timeStampStr); } catch (NumberFormatException e) { } } } timeStampStr = parser.getAttributeValue(null, "it"); if (timeStampStr != null) { try { firstInstallTime = Long.parseLong(timeStampStr, 16); } catch (NumberFormatException e) { } } timeStampStr = parser.getAttributeValue(null, "ut"); if (timeStampStr != null) { try { lastUpdateTime = Long.parseLong(timeStampStr, 16); } catch (NumberFormatException e) { } } if (PackageManagerService.DEBUG_SETTINGS) Log.v(PackageManagerService.TAG, "Reading package: " + name + " userId=" + idStr + " sharedUserId=" + sharedIdStr); int userId = idStr != null ? Integer.parseInt(idStr) : 0; if (resourcePathStr == null) { resourcePathStr = codePathStr; } if (realName != null) { realName = realName.intern(); } if (name == null) { PackageManagerService.reportSettingsProblem(Log.WARN, "Error in package manager settings: has no name at " + parser.getPositionDescription()); } else if (codePathStr == null) { PackageManagerService.reportSettingsProblem(Log.WARN, "Error in package manager settings: has no codePath at " + parser.getPositionDescription()); } else if (userId > 0) { packageSetting = addPackageLPw(name.intern(), realName, new File(codePathStr), new File(resourcePathStr), legacyNativeLibraryPathStr, primaryCpuAbiString, secondaryCpuAbiString, cpuAbiOverrideString, userId, versionCode, pkgFlags); if (PackageManagerService.DEBUG_SETTINGS) Log.i(PackageManagerService.TAG, "Reading package " + name + ": userId=" + userId + " pkg=" + packageSetting); if (packageSetting == null) { PackageManagerService.reportSettingsProblem(Log.ERROR, "Failure adding uid " + userId + " while parsing settings at " + parser.getPositionDescription()); } else { packageSetting.setTimeStamp(timeStamp); packageSetting.firstInstallTime = firstInstallTime; packageSetting.lastUpdateTime = lastUpdateTime; } } else if (sharedIdStr != null) { userId = sharedIdStr != null ? Integer.parseInt(sharedIdStr) : 0; if (userId > 0) { packageSetting = new PendingPackage(name.intern(), realName, new File( codePathStr), new File(resourcePathStr), legacyNativeLibraryPathStr, primaryCpuAbiString, secondaryCpuAbiString, cpuAbiOverrideString, userId, versionCode, pkgFlags); packageSetting.setTimeStamp(timeStamp); packageSetting.firstInstallTime = firstInstallTime; packageSetting.lastUpdateTime = lastUpdateTime; mPendingPackages.add((PendingPackage) packageSetting); if (PackageManagerService.DEBUG_SETTINGS) Log.i(PackageManagerService.TAG, "Reading package " + name + ": sharedUserId=" + userId + " pkg=" + packageSetting); } else { PackageManagerService.reportSettingsProblem(Log.WARN, "Error in package manager settings: package " + name + " has bad sharedId " + sharedIdStr + " at " + parser.getPositionDescription()); } } else { PackageManagerService.reportSettingsProblem(Log.WARN, "Error in package manager settings: package " + name + " has bad userId " + idStr + " at " + parser.getPositionDescription()); } } catch (NumberFormatException e) { PackageManagerService.reportSettingsProblem(Log.WARN, "Error in package manager settings: package " + name + " has bad userId " + idStr + " at " + parser.getPositionDescription()); } if (packageSetting != null) { packageSetting.uidError = "true".equals(uidError); packageSetting.installerPackageName = installerPackageName; packageSetting.legacyNativeLibraryPathString = legacyNativeLibraryPathStr; packageSetting.primaryCpuAbiString = primaryCpuAbiString; packageSetting.secondaryCpuAbiString = secondaryCpuAbiString; // Handle legacy string here for single-user mode final String enabledStr = parser.getAttributeValue(null, ATTR_ENABLED); if (enabledStr != null) { try { packageSetting.setEnabled(Integer.parseInt(enabledStr), 0 /* userId */, null); } catch (NumberFormatException e) { if (enabledStr.equalsIgnoreCase("true")) { packageSetting.setEnabled(COMPONENT_ENABLED_STATE_ENABLED, 0, null); } else if (enabledStr.equalsIgnoreCase("false")) { packageSetting.setEnabled(COMPONENT_ENABLED_STATE_DISABLED, 0, null); } else if (enabledStr.equalsIgnoreCase("default")) { packageSetting.setEnabled(COMPONENT_ENABLED_STATE_DEFAULT, 0, null); } else { PackageManagerService.reportSettingsProblem(Log.WARN, "Error in package manager settings: package " + name + " has bad enabled value: " + idStr + " at " + parser.getPositionDescription()); } } } else { packageSetting.setEnabled(COMPONENT_ENABLED_STATE_DEFAULT, 0, null); } final String installStatusStr = parser.getAttributeValue(null, "installStatus"); if (installStatusStr != null) { if (installStatusStr.equalsIgnoreCase("false")) { packageSetting.installStatus = PackageSettingBase.PKG_INSTALL_INCOMPLETE; } else { packageSetting.installStatus = PackageSettingBase.PKG_INSTALL_COMPLETE; } } int outerDepth = parser.getDepth(); int type; while ((type = parser.next()) != XmlPullParser.END_DOCUMENT && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) { if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) { continue; } String tagName = parser.getName(); // Legacy if (tagName.equals(TAG_DISABLED_COMPONENTS)) { readDisabledComponentsLPw(packageSetting, parser, 0); } else if (tagName.equals(TAG_ENABLED_COMPONENTS)) { readEnabledComponentsLPw(packageSetting, parser, 0); } else if (tagName.equals("sigs")) { packageSetting.signatures.readXml(parser, mPastSignatures); } else if (tagName.equals("perms")) { readGrantedPermissionsLPw(parser, packageSetting.grantedPermissions); packageSetting.permissionsFixed = true; } else if (tagName.equals("proper-signing-keyset")) { long id = Long.parseLong(parser.getAttributeValue(null, "identifier")); packageSetting.keySetData.setProperSigningKeySet(id); } else if (tagName.equals("signing-keyset")) { long id = Long.parseLong(parser.getAttributeValue(null, "identifier")); packageSetting.keySetData.addSigningKeySet(id); } else if (tagName.equals("upgrade-keyset")) { long id = Long.parseLong(parser.getAttributeValue(null, "identifier")); packageSetting.keySetData.addUpgradeKeySetById(id); } else if (tagName.equals("defined-keyset")) { long id = Long.parseLong(parser.getAttributeValue(null, "identifier")); String alias = parser.getAttributeValue(null, "alias"); packageSetting.keySetData.addDefinedKeySet(id, alias); } else { PackageManagerService.reportSettingsProblem(Log.WARN, "Unknown element under : " + parser.getName()); XmlUtils.skipCurrentTag(parser); } } } else { XmlUtils.skipCurrentTag(parser); } } private void readDisabledComponentsLPw(PackageSettingBase packageSetting, XmlPullParser parser, int userId) throws IOException, XmlPullParserException { int outerDepth = parser.getDepth(); int type; while ((type = parser.next()) != XmlPullParser.END_DOCUMENT && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) { if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) { continue; } String tagName = parser.getName(); if (tagName.equals(TAG_ITEM)) { String name = parser.getAttributeValue(null, ATTR_NAME); if (name != null) { packageSetting.addDisabledComponent(name.intern(), userId); } else { PackageManagerService.reportSettingsProblem(Log.WARN, "Error in package manager settings: has" + " no name at " + parser.getPositionDescription()); } } else { PackageManagerService.reportSettingsProblem(Log.WARN, "Unknown element under : " + parser.getName()); } XmlUtils.skipCurrentTag(parser); } } private void readEnabledComponentsLPw(PackageSettingBase packageSetting, XmlPullParser parser, int userId) throws IOException, XmlPullParserException { int outerDepth = parser.getDepth(); int type; while ((type = parser.next()) != XmlPullParser.END_DOCUMENT && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) { if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) { continue; } String tagName = parser.getName(); if (tagName.equals(TAG_ITEM)) { String name = parser.getAttributeValue(null, ATTR_NAME); if (name != null) { packageSetting.addEnabledComponent(name.intern(), userId); } else { PackageManagerService.reportSettingsProblem(Log.WARN, "Error in package manager settings: has" + " no name at " + parser.getPositionDescription()); } } else { PackageManagerService.reportSettingsProblem(Log.WARN, "Unknown element under : " + parser.getName()); } XmlUtils.skipCurrentTag(parser); } } private void readSharedUserLPw(XmlPullParser parser) throws XmlPullParserException,IOException { String name = null; String idStr = null; int pkgFlags = 0; SharedUserSetting su = null; try { name = parser.getAttributeValue(null, ATTR_NAME); idStr = parser.getAttributeValue(null, "userId"); int userId = idStr != null ? Integer.parseInt(idStr) : 0; if ("true".equals(parser.getAttributeValue(null, "system"))) { pkgFlags |= ApplicationInfo.FLAG_SYSTEM; } if (name == null) { PackageManagerService.reportSettingsProblem(Log.WARN, "Error in package manager settings: has no name at " + parser.getPositionDescription()); } else if (userId == 0) { PackageManagerService.reportSettingsProblem(Log.WARN, "Error in package manager settings: shared-user " + name + " has bad userId " + idStr + " at " + parser.getPositionDescription()); } else { if ((su = addSharedUserLPw(name.intern(), userId, pkgFlags)) == null) { PackageManagerService .reportSettingsProblem(Log.ERROR, "Occurred while parsing settings at " + parser.getPositionDescription()); } } } catch (NumberFormatException e) { PackageManagerService.reportSettingsProblem(Log.WARN, "Error in package manager settings: package " + name + " has bad userId " + idStr + " at " + parser.getPositionDescription()); } ; if (su != null) { int outerDepth = parser.getDepth(); int type; while ((type = parser.next()) != XmlPullParser.END_DOCUMENT && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) { if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) { continue; } String tagName = parser.getName(); if (tagName.equals("sigs")) { su.signatures.readXml(parser, mPastSignatures); } else if (tagName.equals("perms")) { readGrantedPermissionsLPw(parser, su.grantedPermissions); } else { PackageManagerService.reportSettingsProblem(Log.WARN, "Unknown element under : " + parser.getName()); XmlUtils.skipCurrentTag(parser); } } } else { XmlUtils.skipCurrentTag(parser); } } private void readGrantedPermissionsLPw(XmlPullParser parser, ArraySet outPerms) throws IOException, XmlPullParserException { int outerDepth = parser.getDepth(); int type; while ((type = parser.next()) != XmlPullParser.END_DOCUMENT && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) { if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) { continue; } String tagName = parser.getName(); if (tagName.equals(TAG_ITEM)) { String name = parser.getAttributeValue(null, ATTR_NAME); if (name != null) { outPerms.add(name.intern()); } else { PackageManagerService.reportSettingsProblem(Log.WARN, "Error in package manager settings: has" + " no name at " + parser.getPositionDescription()); } } else { PackageManagerService.reportSettingsProblem(Log.WARN, "Unknown element under : " + parser.getName()); } XmlUtils.skipCurrentTag(parser); } } void createNewUserLILPw(PackageManagerService service, Installer installer, int userHandle, File path) { path.mkdir(); FileUtils.setPermissions(path.toString(), FileUtils.S_IRWXU | FileUtils.S_IRWXG | FileUtils.S_IXOTH, -1, -1); for (PackageSetting ps : mPackages.values()) { if (ps.pkg == null || ps.pkg.applicationInfo == null) { continue; } // Only system apps are initially installed. ps.setInstalled((ps.pkgFlags&ApplicationInfo.FLAG_SYSTEM) != 0, userHandle); // Need to create a data directory for all apps under this user. installer.createUserData(ps.name, UserHandle.getUid(userHandle, ps.appId), userHandle, ps.pkg.applicationInfo.seinfo); } readDefaultPreferredAppsLPw(service, userHandle); writePackageRestrictionsLPr(userHandle); } void removeUserLPw(int userId) { Set> entries = mPackages.entrySet(); for (Entry entry : entries) { entry.getValue().removeUser(userId); } mPreferredActivities.remove(userId); File file = getUserPackagesStateFile(userId); file.delete(); file = getUserPackagesStateBackupFile(userId); file.delete(); removeCrossProfileIntentFiltersLPw(userId); } void removeCrossProfileIntentFiltersLPw(int userId) { synchronized (mCrossProfileIntentResolvers) { // userId is the source user if (mCrossProfileIntentResolvers.get(userId) != null) { mCrossProfileIntentResolvers.remove(userId); writePackageRestrictionsLPr(userId); } // userId is the target user int count = mCrossProfileIntentResolvers.size(); for (int i = 0; i < count; i++) { int sourceUserId = mCrossProfileIntentResolvers.keyAt(i); CrossProfileIntentResolver cpir = mCrossProfileIntentResolvers.get(sourceUserId); boolean needsWriting = false; ArraySet cpifs = new ArraySet(cpir.filterSet()); for (CrossProfileIntentFilter cpif : cpifs) { if (cpif.getTargetUserId() == userId) { needsWriting = true; cpir.removeFilter(cpif); } } if (needsWriting) { writePackageRestrictionsLPr(sourceUserId); } } } } // This should be called (at least) whenever an application is removed private void setFirstAvailableUid(int uid) { if (uid > mFirstAvailableUid) { mFirstAvailableUid = uid; } } // Returns -1 if we could not find an available UserId to assign private int newUserIdLPw(Object obj) { // Let's be stupidly inefficient for now... final int N = mUserIds.size(); for (int i = mFirstAvailableUid; i < N; i++) { if (mUserIds.get(i) == null) { mUserIds.set(i, obj); return Process.FIRST_APPLICATION_UID + i; } } // None left? if (N > (Process.LAST_APPLICATION_UID-Process.FIRST_APPLICATION_UID)) { return -1; } mUserIds.add(obj); return Process.FIRST_APPLICATION_UID + N; } public VerifierDeviceIdentity getVerifierDeviceIdentityLPw() { if (mVerifierDeviceIdentity == null) { mVerifierDeviceIdentity = VerifierDeviceIdentity.generate(); writeLPr(); } return mVerifierDeviceIdentity; } public PackageSetting getDisabledSystemPkgLPr(String name) { PackageSetting ps = mDisabledSysPackages.get(name); return ps; } private String compToString(ArraySet cmp) { return cmp != null ? Arrays.toString(cmp.toArray()) : "[]"; } boolean isEnabledLPr(ComponentInfo componentInfo, int flags, int userId) { if ((flags&PackageManager.GET_DISABLED_COMPONENTS) != 0) { return true; } final String pkgName = componentInfo.packageName; final PackageSetting packageSettings = mPackages.get(pkgName); if (PackageManagerService.DEBUG_SETTINGS) { Log.v(PackageManagerService.TAG, "isEnabledLock - packageName = " + componentInfo.packageName + " componentName = " + componentInfo.name); Log.v(PackageManagerService.TAG, "enabledComponents: " + compToString(packageSettings.getEnabledComponents(userId))); Log.v(PackageManagerService.TAG, "disabledComponents: " + compToString(packageSettings.getDisabledComponents(userId))); } if (packageSettings == null) { return false; } PackageUserState ustate = packageSettings.readUserState(userId); if ((flags&PackageManager.GET_DISABLED_UNTIL_USED_COMPONENTS) != 0) { if (ustate.enabled == COMPONENT_ENABLED_STATE_DISABLED_UNTIL_USED) { return true; } } if (ustate.enabled == COMPONENT_ENABLED_STATE_DISABLED || ustate.enabled == COMPONENT_ENABLED_STATE_DISABLED_USER || ustate.enabled == COMPONENT_ENABLED_STATE_DISABLED_UNTIL_USED || (packageSettings.pkg != null && !packageSettings.pkg.applicationInfo.enabled && ustate.enabled == COMPONENT_ENABLED_STATE_DEFAULT)) { return false; } if (ustate.enabledComponents != null && ustate.enabledComponents.contains(componentInfo.name)) { return true; } if (ustate.disabledComponents != null && ustate.disabledComponents.contains(componentInfo.name)) { return false; } return componentInfo.enabled; } String getInstallerPackageNameLPr(String packageName) { final PackageSetting pkg = mPackages.get(packageName); if (pkg == null) { throw new IllegalArgumentException("Unknown package: " + packageName); } return pkg.installerPackageName; } int getApplicationEnabledSettingLPr(String packageName, int userId) { final PackageSetting pkg = mPackages.get(packageName); if (pkg == null) { throw new IllegalArgumentException("Unknown package: " + packageName); } return pkg.getEnabled(userId); } int getComponentEnabledSettingLPr(ComponentName componentName, int userId) { final String packageName = componentName.getPackageName(); final PackageSetting pkg = mPackages.get(packageName); if (pkg == null) { throw new IllegalArgumentException("Unknown component: " + componentName); } final String classNameStr = componentName.getClassName(); return pkg.getCurrentEnabledStateLPr(classNameStr, userId); } boolean setPackageStoppedStateLPw(String packageName, boolean stopped, boolean allowedByPermission, int uid, int userId) { int appId = UserHandle.getAppId(uid); final PackageSetting pkgSetting = mPackages.get(packageName); if (pkgSetting == null) { throw new IllegalArgumentException("Unknown package: " + packageName); } if (!allowedByPermission && (appId != pkgSetting.appId)) { throw new SecurityException( "Permission Denial: attempt to change stopped state from pid=" + Binder.getCallingPid() + ", uid=" + uid + ", package uid=" + pkgSetting.appId); } if (DEBUG_STOPPED) { if (stopped) { RuntimeException e = new RuntimeException("here"); e.fillInStackTrace(); Slog.i(TAG, "Stopping package " + packageName, e); } } if (pkgSetting.getStopped(userId) != stopped) { pkgSetting.setStopped(stopped, userId); // pkgSetting.pkg.mSetStopped = stopped; if (pkgSetting.getNotLaunched(userId)) { if (pkgSetting.installerPackageName != null) { PackageManagerService.sendPackageBroadcast(Intent.ACTION_PACKAGE_FIRST_LAUNCH, pkgSetting.name, null, pkgSetting.installerPackageName, null, new int[] {userId}); } pkgSetting.setNotLaunched(false, userId); } return true; } return false; } private List getAllUsers() { long id = Binder.clearCallingIdentity(); try { return UserManagerService.getInstance().getUsers(false); } catch (NullPointerException npe) { // packagemanager not yet initialized } finally { Binder.restoreCallingIdentity(id); } return null; } static final void printFlags(PrintWriter pw, int val, Object[] spec) { pw.print("[ "); for (int i=0; i users) { if (checkinTag != null) { pw.print(checkinTag); pw.print(","); pw.print(ps.realName != null ? ps.realName : ps.name); pw.print(","); pw.print(ps.appId); pw.print(","); pw.print(ps.versionCode); pw.print(","); pw.print(ps.firstInstallTime); pw.print(","); pw.print(ps.lastUpdateTime); pw.print(","); pw.print(ps.installerPackageName != null ? ps.installerPackageName : "?"); pw.println(); if (ps.pkg != null) { pw.print(checkinTag); pw.print("-"); pw.print("splt,"); pw.print("base,"); pw.println(ps.pkg.baseRevisionCode); if (ps.pkg.splitNames != null) { for (int i = 0; i < ps.pkg.splitNames.length; i++) { pw.print(checkinTag); pw.print("-"); pw.print("splt,"); pw.print(ps.pkg.splitNames[i]); pw.print(","); pw.println(ps.pkg.splitRevisionCodes[i]); } } } for (UserInfo user : users) { pw.print(checkinTag); pw.print("-"); pw.print("usr"); pw.print(","); pw.print(user.id); pw.print(","); pw.print(ps.getInstalled(user.id) ? "I" : "i"); pw.print(ps.getHidden(user.id) ? "B" : "b"); pw.print(ps.getStopped(user.id) ? "S" : "s"); pw.print(ps.getNotLaunched(user.id) ? "l" : "L"); pw.print(","); pw.print(ps.getEnabled(user.id)); String lastDisabledAppCaller = ps.getLastDisabledAppCaller(user.id); pw.print(","); pw.print(lastDisabledAppCaller != null ? lastDisabledAppCaller : "?"); pw.println(); } return; } pw.print(prefix); pw.print("Package ["); pw.print(ps.realName != null ? ps.realName : ps.name); pw.print("] ("); pw.print(Integer.toHexString(System.identityHashCode(ps))); pw.println("):"); if (ps.realName != null) { pw.print(prefix); pw.print(" compat name="); pw.println(ps.name); } pw.print(prefix); pw.print(" userId="); pw.print(ps.appId); pw.print(" gids="); pw.println(PackageManagerService.arrayToString(ps.gids)); if (ps.sharedUser != null) { pw.print(prefix); pw.print(" sharedUser="); pw.println(ps.sharedUser); } pw.print(prefix); pw.print(" pkg="); pw.println(ps.pkg); pw.print(prefix); pw.print(" codePath="); pw.println(ps.codePathString); pw.print(prefix); pw.print(" resourcePath="); pw.println(ps.resourcePathString); pw.print(prefix); pw.print(" legacyNativeLibraryDir="); pw.println(ps.legacyNativeLibraryPathString); pw.print(prefix); pw.print(" primaryCpuAbi="); pw.println(ps.primaryCpuAbiString); pw.print(prefix); pw.print(" secondaryCpuAbi="); pw.println(ps.secondaryCpuAbiString); pw.print(prefix); pw.print(" versionCode="); pw.print(ps.versionCode); if (ps.pkg != null) { pw.print(" targetSdk="); pw.print(ps.pkg.applicationInfo.targetSdkVersion); } pw.println(); if (ps.pkg != null) { pw.print(prefix); pw.print(" versionName="); pw.println(ps.pkg.mVersionName); pw.print(prefix); pw.print(" splits="); dumpSplitNames(pw, ps.pkg); pw.println(); pw.print(prefix); pw.print(" applicationInfo="); pw.println(ps.pkg.applicationInfo.toString()); pw.print(prefix); pw.print(" flags="); printFlags(pw, ps.pkg.applicationInfo.flags, FLAG_DUMP_SPEC); pw.println(); pw.print(prefix); pw.print(" dataDir="); pw.println(ps.pkg.applicationInfo.dataDir); if (ps.pkg.mOperationPending) { pw.print(prefix); pw.println(" mOperationPending=true"); } pw.print(prefix); pw.print(" supportsScreens=["); boolean first = true; if ((ps.pkg.applicationInfo.flags & ApplicationInfo.FLAG_SUPPORTS_SMALL_SCREENS) != 0) { if (!first) pw.print(", "); first = false; pw.print("small"); } if ((ps.pkg.applicationInfo.flags & ApplicationInfo.FLAG_SUPPORTS_NORMAL_SCREENS) != 0) { if (!first) pw.print(", "); first = false; pw.print("medium"); } if ((ps.pkg.applicationInfo.flags & ApplicationInfo.FLAG_SUPPORTS_LARGE_SCREENS) != 0) { if (!first) pw.print(", "); first = false; pw.print("large"); } if ((ps.pkg.applicationInfo.flags & ApplicationInfo.FLAG_SUPPORTS_XLARGE_SCREENS) != 0) { if (!first) pw.print(", "); first = false; pw.print("xlarge"); } if ((ps.pkg.applicationInfo.flags & ApplicationInfo.FLAG_RESIZEABLE_FOR_SCREENS) != 0) { if (!first) pw.print(", "); first = false; pw.print("resizeable"); } if ((ps.pkg.applicationInfo.flags & ApplicationInfo.FLAG_SUPPORTS_SCREEN_DENSITIES) != 0) { if (!first) pw.print(", "); first = false; pw.print("anyDensity"); } pw.println("]"); if (ps.pkg.libraryNames != null && ps.pkg.libraryNames.size() > 0) { pw.print(prefix); pw.println(" libraries:"); for (int i=0; i 0) { pw.print(prefix); pw.println(" usesLibraries:"); for (int i=0; i 0) { pw.print(prefix); pw.println(" usesOptionalLibraries:"); for (int i=0; i 0) { pw.print(prefix); pw.println(" usesLibraryFiles:"); for (int i=0; i