ActiveServices.java revision 365e4c38d58d38bb61d1fdd870346f2f594825fd
1/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 *      http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server.am;
18
19import java.io.FileDescriptor;
20import java.io.IOException;
21import java.io.PrintWriter;
22import java.util.ArrayList;
23import java.util.HashSet;
24import java.util.Iterator;
25import java.util.List;
26
27import android.os.Build;
28import android.os.DeadObjectException;
29import android.os.Handler;
30import android.os.Looper;
31import android.os.SystemProperties;
32import android.util.ArrayMap;
33import android.util.ArraySet;
34import com.android.internal.app.ProcessMap;
35import com.android.internal.app.ProcessStats;
36import com.android.internal.os.BatteryStatsImpl;
37import com.android.internal.os.TransferPipe;
38import com.android.server.am.ActivityManagerService.ItemMatcher;
39import com.android.server.am.ActivityManagerService.NeededUriGrants;
40
41import android.app.ActivityManager;
42import android.app.AppGlobals;
43import android.app.IApplicationThread;
44import android.app.IServiceConnection;
45import android.app.Notification;
46import android.app.PendingIntent;
47import android.app.Service;
48import android.content.ComponentName;
49import android.content.Context;
50import android.content.Intent;
51import android.content.pm.ApplicationInfo;
52import android.content.pm.PackageManager;
53import android.content.pm.ResolveInfo;
54import android.content.pm.ServiceInfo;
55import android.os.Binder;
56import android.os.IBinder;
57import android.os.Message;
58import android.os.Process;
59import android.os.RemoteException;
60import android.os.SystemClock;
61import android.os.UserHandle;
62import android.util.EventLog;
63import android.util.Slog;
64import android.util.SparseArray;
65import android.util.TimeUtils;
66
67public final class ActiveServices {
68    static final boolean DEBUG_SERVICE = ActivityManagerService.DEBUG_SERVICE;
69    static final boolean DEBUG_SERVICE_EXECUTING = ActivityManagerService.DEBUG_SERVICE_EXECUTING;
70    static final boolean DEBUG_DELAYED_SERVICE = ActivityManagerService.DEBUG_SERVICE;
71    static final boolean DEBUG_DELAYED_STARTS = DEBUG_DELAYED_SERVICE;
72    static final boolean DEBUG_MU = ActivityManagerService.DEBUG_MU;
73    static final String TAG = ActivityManagerService.TAG;
74    static final String TAG_MU = ActivityManagerService.TAG_MU;
75
76    // How long we wait for a service to finish executing.
77    static final int SERVICE_TIMEOUT = 20*1000;
78
79    // How long we wait for a service to finish executing.
80    static final int SERVICE_BACKGROUND_TIMEOUT = SERVICE_TIMEOUT * 10;
81
82    // How long a service needs to be running until restarting its process
83    // is no longer considered to be a relaunch of the service.
84    static final int SERVICE_RESTART_DURATION = 1*1000;
85
86    // How long a service needs to be running until it will start back at
87    // SERVICE_RESTART_DURATION after being killed.
88    static final int SERVICE_RESET_RUN_DURATION = 60*1000;
89
90    // Multiplying factor to increase restart duration time by, for each time
91    // a service is killed before it has run for SERVICE_RESET_RUN_DURATION.
92    static final int SERVICE_RESTART_DURATION_FACTOR = 4;
93
94    // The minimum amount of time between restarting services that we allow.
95    // That is, when multiple services are restarting, we won't allow each
96    // to restart less than this amount of time from the last one.
97    static final int SERVICE_MIN_RESTART_TIME_BETWEEN = 10*1000;
98
99    // Maximum amount of time for there to be no activity on a service before
100    // we consider it non-essential and allow its process to go on the
101    // LRU background list.
102    static final int MAX_SERVICE_INACTIVITY = 30*60*1000;
103
104    // How long we wait for a background started service to stop itself before
105    // allowing the next pending start to run.
106    static final int BG_START_TIMEOUT = 15*1000;
107
108    final ActivityManagerService mAm;
109
110    // Maximum number of services that we allow to start in the background
111    // at the same time.
112    final int mMaxStartingBackground;
113
114    final SparseArray<ServiceMap> mServiceMap = new SparseArray<ServiceMap>();
115
116    /**
117     * All currently bound service connections.  Keys are the IBinder of
118     * the client's IServiceConnection.
119     */
120    final ArrayMap<IBinder, ArrayList<ConnectionRecord>> mServiceConnections
121            = new ArrayMap<IBinder, ArrayList<ConnectionRecord>>();
122
123    /**
124     * List of services that we have been asked to start,
125     * but haven't yet been able to.  It is used to hold start requests
126     * while waiting for their corresponding application thread to get
127     * going.
128     */
129    final ArrayList<ServiceRecord> mPendingServices
130            = new ArrayList<ServiceRecord>();
131
132    /**
133     * List of services that are scheduled to restart following a crash.
134     */
135    final ArrayList<ServiceRecord> mRestartingServices
136            = new ArrayList<ServiceRecord>();
137
138    /**
139     * List of services that are in the process of being destroyed.
140     */
141    final ArrayList<ServiceRecord> mDestroyingServices
142            = new ArrayList<ServiceRecord>();
143
144    static final class DelayingProcess extends ArrayList<ServiceRecord> {
145        long timeoout;
146    }
147
148    /**
149     * Information about services for a single user.
150     */
151    class ServiceMap extends Handler {
152        final int mUserId;
153        final ArrayMap<ComponentName, ServiceRecord> mServicesByName
154                = new ArrayMap<ComponentName, ServiceRecord>();
155        final ArrayMap<Intent.FilterComparison, ServiceRecord> mServicesByIntent
156                = new ArrayMap<Intent.FilterComparison, ServiceRecord>();
157
158        final ArrayList<ServiceRecord> mDelayedStartList
159                = new ArrayList<ServiceRecord>();
160        /* XXX eventually I'd like to have this based on processes instead of services.
161         * That is, if we try to start two services in a row both running in the same
162         * process, this should be one entry in mStartingBackground for that one process
163         * that remains until all services in it are done.
164        final ArrayMap<ProcessRecord, DelayingProcess> mStartingBackgroundMap
165                = new ArrayMap<ProcessRecord, DelayingProcess>();
166        final ArrayList<DelayingProcess> mStartingProcessList
167                = new ArrayList<DelayingProcess>();
168        */
169
170        final ArrayList<ServiceRecord> mStartingBackground
171                = new ArrayList<ServiceRecord>();
172
173        static final int MSG_BG_START_TIMEOUT = 1;
174
175        ServiceMap(Looper looper, int userId) {
176            super(looper);
177            mUserId = userId;
178        }
179
180        @Override
181        public void handleMessage(Message msg) {
182            switch (msg.what) {
183                case MSG_BG_START_TIMEOUT: {
184                    synchronized (mAm) {
185                        rescheduleDelayedStarts();
186                    }
187                } break;
188            }
189        }
190
191        void ensureNotStartingBackground(ServiceRecord r) {
192            if (mStartingBackground.remove(r)) {
193                if (DEBUG_DELAYED_STARTS) Slog.v(TAG, "No longer background starting: " + r);
194                rescheduleDelayedStarts();
195            }
196            if (mDelayedStartList.remove(r)) {
197                if (DEBUG_DELAYED_STARTS) Slog.v(TAG, "No longer delaying start: " + r);
198            }
199        }
200
201        void rescheduleDelayedStarts() {
202            removeMessages(MSG_BG_START_TIMEOUT);
203            final long now = SystemClock.uptimeMillis();
204            for (int i=0, N=mStartingBackground.size(); i<N; i++) {
205                ServiceRecord r = mStartingBackground.get(i);
206                if (r.startingBgTimeout <= now) {
207                    Slog.i(TAG, "Waited long enough for: " + r);
208                    mStartingBackground.remove(i);
209                    N--;
210                    i--;
211                }
212            }
213            while (mDelayedStartList.size() > 0
214                    && mStartingBackground.size() < mMaxStartingBackground) {
215                ServiceRecord r = mDelayedStartList.remove(0);
216                if (DEBUG_DELAYED_STARTS) Slog.v(TAG, "REM FR DELAY LIST (exec next): " + r);
217                if (r.pendingStarts.size() <= 0) {
218                    Slog.w(TAG, "**** NO PENDING STARTS! " + r + " startReq=" + r.startRequested
219                            + " delayedStop=" + r.delayedStop);
220                }
221                if (DEBUG_DELAYED_SERVICE) {
222                    if (mDelayedStartList.size() > 0) {
223                        Slog.v(TAG, "Remaining delayed list:");
224                        for (int i=0; i<mDelayedStartList.size(); i++) {
225                            Slog.v(TAG, "  #" + i + ": " + mDelayedStartList.get(i));
226                        }
227                    }
228                }
229                r.delayed = false;
230                startServiceInnerLocked(this, r.pendingStarts.get(0).intent, r, false, true);
231            }
232            if (mStartingBackground.size() > 0) {
233                ServiceRecord next = mStartingBackground.get(0);
234                long when = next.startingBgTimeout > now ? next.startingBgTimeout : now;
235                if (DEBUG_DELAYED_SERVICE) Slog.v(TAG, "Top bg start is " + next
236                        + ", can delay others up to " + when);
237                Message msg = obtainMessage(MSG_BG_START_TIMEOUT);
238                sendMessageAtTime(msg, when);
239            }
240            if (mStartingBackground.size() < mMaxStartingBackground) {
241                mAm.backgroundServicesFinishedLocked(mUserId);
242            }
243        }
244    }
245
246    public ActiveServices(ActivityManagerService service) {
247        mAm = service;
248        int maxBg = 0;
249        try {
250            maxBg = Integer.parseInt(SystemProperties.get("ro.config.max_starting_bg", "0"));
251        } catch(RuntimeException e) {
252        }
253        mMaxStartingBackground = maxBg > 0
254                ? maxBg : ActivityManager.isLowRamDeviceStatic() ? 1 : 8;
255    }
256
257    ServiceRecord getServiceByName(ComponentName name, int callingUser) {
258        // TODO: Deal with global services
259        if (DEBUG_MU)
260            Slog.v(TAG_MU, "getServiceByName(" + name + "), callingUser = " + callingUser);
261        return getServiceMap(callingUser).mServicesByName.get(name);
262    }
263
264    boolean hasBackgroundServices(int callingUser) {
265        ServiceMap smap = mServiceMap.get(callingUser);
266        return smap != null ? smap.mStartingBackground.size() >= mMaxStartingBackground : false;
267    }
268
269    private ServiceMap getServiceMap(int callingUser) {
270        ServiceMap smap = mServiceMap.get(callingUser);
271        if (smap == null) {
272            smap = new ServiceMap(mAm.mHandler.getLooper(), callingUser);
273            mServiceMap.put(callingUser, smap);
274        }
275        return smap;
276    }
277
278    ArrayMap<ComponentName, ServiceRecord> getServices(int callingUser) {
279        return getServiceMap(callingUser).mServicesByName;
280    }
281
282    ComponentName startServiceLocked(IApplicationThread caller,
283            Intent service, String resolvedType,
284            int callingPid, int callingUid, int userId) {
285        if (DEBUG_DELAYED_STARTS) Slog.v(TAG, "startService: " + service
286                + " type=" + resolvedType + " args=" + service.getExtras());
287
288        final boolean callerFg;
289        if (caller != null) {
290            final ProcessRecord callerApp = mAm.getRecordForAppLocked(caller);
291            if (callerApp == null) {
292                throw new SecurityException(
293                        "Unable to find app for caller " + caller
294                        + " (pid=" + Binder.getCallingPid()
295                        + ") when starting service " + service);
296            }
297            callerFg = callerApp.setSchedGroup != Process.THREAD_GROUP_BG_NONINTERACTIVE;
298        } else {
299            callerFg = true;
300        }
301
302
303        ServiceLookupResult res =
304            retrieveServiceLocked(service, resolvedType,
305                    callingPid, callingUid, userId, true, callerFg);
306        if (res == null) {
307            return null;
308        }
309        if (res.record == null) {
310            return new ComponentName("!", res.permission != null
311                    ? res.permission : "private to package");
312        }
313
314        ServiceRecord r = res.record;
315
316        if (!mAm.getUserManagerLocked().exists(r.userId)) {
317            Slog.d(TAG, "Trying to start service with non-existent user! " + r.userId);
318            return null;
319        }
320
321        NeededUriGrants neededGrants = mAm.checkGrantUriPermissionFromIntentLocked(
322                callingUid, r.packageName, service, service.getFlags(), null, r.userId);
323        if (unscheduleServiceRestartLocked(r, callingUid, false)) {
324            if (DEBUG_SERVICE) Slog.v(TAG, "START SERVICE WHILE RESTART PENDING: " + r);
325        }
326        r.lastActivity = SystemClock.uptimeMillis();
327        r.startRequested = true;
328        r.delayedStop = false;
329        r.pendingStarts.add(new ServiceRecord.StartItem(r, false, r.makeNextStartId(),
330                service, neededGrants));
331
332        final ServiceMap smap = getServiceMap(r.userId);
333        boolean addToStarting = false;
334        if (!callerFg && r.app == null && mAm.mStartedUsers.get(r.userId) != null) {
335            ProcessRecord proc = mAm.getProcessRecordLocked(r.processName, r.appInfo.uid, false);
336            if (proc == null || proc.curProcState > ActivityManager.PROCESS_STATE_RECEIVER) {
337                // If this is not coming from a foreground caller, then we may want
338                // to delay the start if there are already other background services
339                // that are starting.  This is to avoid process start spam when lots
340                // of applications are all handling things like connectivity broadcasts.
341                // We only do this for cached processes, because otherwise an application
342                // can have assumptions about calling startService() for a service to run
343                // in its own process, and for that process to not be killed before the
344                // service is started.  This is especially the case for receivers, which
345                // may start a service in onReceive() to do some additional work and have
346                // initialized some global state as part of that.
347                if (DEBUG_DELAYED_SERVICE) Slog.v(TAG, "Potential start delay of " + r + " in "
348                        + proc);
349                if (r.delayed) {
350                    // This service is already scheduled for a delayed start; just leave
351                    // it still waiting.
352                    if (DEBUG_DELAYED_STARTS) Slog.v(TAG, "Continuing to delay: " + r);
353                    return r.name;
354                }
355                if (smap.mStartingBackground.size() >= mMaxStartingBackground) {
356                    // Something else is starting, delay!
357                    Slog.i(TAG, "Delaying start of: " + r);
358                    smap.mDelayedStartList.add(r);
359                    r.delayed = true;
360                    return r.name;
361                }
362                if (DEBUG_DELAYED_STARTS) Slog.v(TAG, "Not delaying: " + r);
363                addToStarting = true;
364            } else if (proc.curProcState >= ActivityManager.PROCESS_STATE_SERVICE) {
365                // We slightly loosen when we will enqueue this new service as a background
366                // starting service we are waiting for, to also include processes that are
367                // currently running other services or receivers.
368                addToStarting = true;
369                if (DEBUG_DELAYED_STARTS) Slog.v(TAG, "Not delaying, but counting as bg: " + r);
370            } else if (DEBUG_DELAYED_STARTS) {
371                StringBuilder sb = new StringBuilder(128);
372                sb.append("Not potential delay (state=").append(proc.curProcState)
373                        .append(' ').append(proc.adjType);
374                String reason = proc.makeAdjReason();
375                if (reason != null) {
376                    sb.append(' ');
377                    sb.append(reason);
378                }
379                sb.append("): ");
380                sb.append(r.toString());
381                Slog.v(TAG, sb.toString());
382            }
383        } else if (DEBUG_DELAYED_STARTS) {
384            if (callerFg) {
385                Slog.v(TAG, "Not potential delay (callerFg=" + callerFg + " uid="
386                        + callingUid + " pid=" + callingPid + "): " + r);
387            } else if (r.app != null) {
388                Slog.v(TAG, "Not potential delay (cur app=" + r.app + "): " + r);
389            } else {
390                Slog.v(TAG, "Not potential delay (user " + r.userId + " not started): " + r);
391            }
392        }
393
394        return startServiceInnerLocked(smap, service, r, callerFg, addToStarting);
395    }
396
397    ComponentName startServiceInnerLocked(ServiceMap smap, Intent service,
398            ServiceRecord r, boolean callerFg, boolean addToStarting) {
399        ProcessStats.ServiceState stracker = r.getTracker();
400        if (stracker != null) {
401            stracker.setStarted(true, mAm.mProcessStats.getMemFactorLocked(), r.lastActivity);
402        }
403        r.callStart = false;
404        synchronized (r.stats.getBatteryStats()) {
405            r.stats.startRunningLocked();
406        }
407        String error = bringUpServiceLocked(r, service.getFlags(), callerFg, false);
408        if (error != null) {
409            return new ComponentName("!!", error);
410        }
411
412        if (r.startRequested && addToStarting) {
413            boolean first = smap.mStartingBackground.size() == 0;
414            smap.mStartingBackground.add(r);
415            r.startingBgTimeout = SystemClock.uptimeMillis() + BG_START_TIMEOUT;
416            if (DEBUG_DELAYED_SERVICE) {
417                RuntimeException here = new RuntimeException("here");
418                here.fillInStackTrace();
419                Slog.v(TAG, "Starting background (first=" + first + "): " + r, here);
420            } else if (DEBUG_DELAYED_STARTS) {
421                Slog.v(TAG, "Starting background (first=" + first + "): " + r);
422            }
423            if (first) {
424                smap.rescheduleDelayedStarts();
425            }
426        } else if (callerFg) {
427            smap.ensureNotStartingBackground(r);
428        }
429
430        return r.name;
431    }
432
433    private void stopServiceLocked(ServiceRecord service) {
434        if (service.delayed) {
435            // If service isn't actually running, but is is being held in the
436            // delayed list, then we need to keep it started but note that it
437            // should be stopped once no longer delayed.
438            if (DEBUG_DELAYED_STARTS) Slog.v(TAG, "Delaying stop of pending: " + service);
439            service.delayedStop = true;
440            return;
441        }
442        synchronized (service.stats.getBatteryStats()) {
443            service.stats.stopRunningLocked();
444        }
445        service.startRequested = false;
446        if (service.tracker != null) {
447            service.tracker.setStarted(false, mAm.mProcessStats.getMemFactorLocked(),
448                    SystemClock.uptimeMillis());
449        }
450        service.callStart = false;
451        bringDownServiceIfNeededLocked(service, false, false);
452    }
453
454    int stopServiceLocked(IApplicationThread caller, Intent service,
455            String resolvedType, int userId) {
456        if (DEBUG_SERVICE) Slog.v(TAG, "stopService: " + service
457                + " type=" + resolvedType);
458
459        final ProcessRecord callerApp = mAm.getRecordForAppLocked(caller);
460        if (caller != null && callerApp == null) {
461            throw new SecurityException(
462                    "Unable to find app for caller " + caller
463                    + " (pid=" + Binder.getCallingPid()
464                    + ") when stopping service " + service);
465        }
466
467        // If this service is active, make sure it is stopped.
468        ServiceLookupResult r = retrieveServiceLocked(service, resolvedType,
469                Binder.getCallingPid(), Binder.getCallingUid(), userId, false, false);
470        if (r != null) {
471            if (r.record != null) {
472                final long origId = Binder.clearCallingIdentity();
473                try {
474                    stopServiceLocked(r.record);
475                } finally {
476                    Binder.restoreCallingIdentity(origId);
477                }
478                return 1;
479            }
480            return -1;
481        }
482
483        return 0;
484    }
485
486    IBinder peekServiceLocked(Intent service, String resolvedType) {
487        ServiceLookupResult r = retrieveServiceLocked(service, resolvedType,
488                Binder.getCallingPid(), Binder.getCallingUid(),
489                UserHandle.getCallingUserId(), false, false);
490
491        IBinder ret = null;
492        if (r != null) {
493            // r.record is null if findServiceLocked() failed the caller permission check
494            if (r.record == null) {
495                throw new SecurityException(
496                        "Permission Denial: Accessing service " + r.record.name
497                        + " from pid=" + Binder.getCallingPid()
498                        + ", uid=" + Binder.getCallingUid()
499                        + " requires " + r.permission);
500            }
501            IntentBindRecord ib = r.record.bindings.get(r.record.intent);
502            if (ib != null) {
503                ret = ib.binder;
504            }
505        }
506
507        return ret;
508    }
509
510    boolean stopServiceTokenLocked(ComponentName className, IBinder token,
511            int startId) {
512        if (DEBUG_SERVICE) Slog.v(TAG, "stopServiceToken: " + className
513                + " " + token + " startId=" + startId);
514        ServiceRecord r = findServiceLocked(className, token, UserHandle.getCallingUserId());
515        if (r != null) {
516            if (startId >= 0) {
517                // Asked to only stop if done with all work.  Note that
518                // to avoid leaks, we will take this as dropping all
519                // start items up to and including this one.
520                ServiceRecord.StartItem si = r.findDeliveredStart(startId, false);
521                if (si != null) {
522                    while (r.deliveredStarts.size() > 0) {
523                        ServiceRecord.StartItem cur = r.deliveredStarts.remove(0);
524                        cur.removeUriPermissionsLocked();
525                        if (cur == si) {
526                            break;
527                        }
528                    }
529                }
530
531                if (r.getLastStartId() != startId) {
532                    return false;
533                }
534
535                if (r.deliveredStarts.size() > 0) {
536                    Slog.w(TAG, "stopServiceToken startId " + startId
537                            + " is last, but have " + r.deliveredStarts.size()
538                            + " remaining args");
539                }
540            }
541
542            synchronized (r.stats.getBatteryStats()) {
543                r.stats.stopRunningLocked();
544            }
545            r.startRequested = false;
546            if (r.tracker != null) {
547                r.tracker.setStarted(false, mAm.mProcessStats.getMemFactorLocked(),
548                        SystemClock.uptimeMillis());
549            }
550            r.callStart = false;
551            final long origId = Binder.clearCallingIdentity();
552            bringDownServiceIfNeededLocked(r, false, false);
553            Binder.restoreCallingIdentity(origId);
554            return true;
555        }
556        return false;
557    }
558
559    public void setServiceForegroundLocked(ComponentName className, IBinder token,
560            int id, Notification notification, boolean removeNotification) {
561        final int userId = UserHandle.getCallingUserId();
562        final long origId = Binder.clearCallingIdentity();
563        try {
564            ServiceRecord r = findServiceLocked(className, token, userId);
565            if (r != null) {
566                if (id != 0) {
567                    if (notification == null) {
568                        throw new IllegalArgumentException("null notification");
569                    }
570                    if (r.foregroundId != id) {
571                        r.cancelNotification();
572                        r.foregroundId = id;
573                    }
574                    notification.flags |= Notification.FLAG_FOREGROUND_SERVICE;
575                    r.foregroundNoti = notification;
576                    r.isForeground = true;
577                    r.postNotification();
578                    if (r.app != null) {
579                        updateServiceForegroundLocked(r.app, true);
580                    }
581                    getServiceMap(r.userId).ensureNotStartingBackground(r);
582                } else {
583                    if (r.isForeground) {
584                        r.isForeground = false;
585                        if (r.app != null) {
586                            mAm.updateLruProcessLocked(r.app, false, null);
587                            updateServiceForegroundLocked(r.app, true);
588                        }
589                    }
590                    if (removeNotification) {
591                        r.cancelNotification();
592                        r.foregroundId = 0;
593                        r.foregroundNoti = null;
594                    } else if (r.appInfo.targetSdkVersion >= Build.VERSION_CODES.L) {
595                        r.stripForegroundServiceFlagFromNotification();
596                    }
597                }
598            }
599        } finally {
600            Binder.restoreCallingIdentity(origId);
601        }
602    }
603
604    private void updateServiceForegroundLocked(ProcessRecord proc, boolean oomAdj) {
605        boolean anyForeground = false;
606        for (int i=proc.services.size()-1; i>=0; i--) {
607            ServiceRecord sr = proc.services.valueAt(i);
608            if (sr.isForeground) {
609                anyForeground = true;
610                break;
611            }
612        }
613        mAm.updateProcessForegroundLocked(proc, anyForeground, oomAdj);
614    }
615
616    public void updateServiceConnectionActivitiesLocked(ProcessRecord clientProc) {
617        ArraySet<ProcessRecord> updatedProcesses = null;
618        for (int i=0; i<clientProc.connections.size(); i++) {
619            final ConnectionRecord conn = clientProc.connections.valueAt(i);
620            final ProcessRecord proc = conn.binding.service.app;
621            if (proc == null || proc == clientProc) {
622                continue;
623            } else if (updatedProcesses == null) {
624                updatedProcesses = new ArraySet<>();
625            } else if (updatedProcesses.contains(proc)) {
626                continue;
627            }
628            updatedProcesses.add(proc);
629            updateServiceClientActivitiesLocked(proc, null, false);
630        }
631    }
632
633    private boolean updateServiceClientActivitiesLocked(ProcessRecord proc,
634            ConnectionRecord modCr, boolean updateLru) {
635        if (modCr != null && modCr.binding.client != null) {
636            if (modCr.binding.client.activities.size() <= 0) {
637                // This connection is from a client without activities, so adding
638                // and removing is not interesting.
639                return false;
640            }
641        }
642
643        boolean anyClientActivities = false;
644        for (int i=proc.services.size()-1; i>=0 && !anyClientActivities; i--) {
645            ServiceRecord sr = proc.services.valueAt(i);
646            for (int conni=sr.connections.size()-1; conni>=0 && !anyClientActivities; conni--) {
647                ArrayList<ConnectionRecord> clist = sr.connections.valueAt(conni);
648                for (int cri=clist.size()-1; cri>=0; cri--) {
649                    ConnectionRecord cr = clist.get(cri);
650                    if (cr.binding.client == null || cr.binding.client == proc) {
651                        // Binding to ourself is not interesting.
652                        continue;
653                    }
654                    if (cr.binding.client.activities.size() > 0) {
655                        anyClientActivities = true;
656                        break;
657                    }
658                }
659            }
660        }
661        if (anyClientActivities != proc.hasClientActivities) {
662            proc.hasClientActivities = anyClientActivities;
663            if (updateLru) {
664                mAm.updateLruProcessLocked(proc, anyClientActivities, null);
665            }
666            return true;
667        }
668        return false;
669    }
670
671    int bindServiceLocked(IApplicationThread caller, IBinder token,
672            Intent service, String resolvedType,
673            IServiceConnection connection, int flags, int userId) {
674        if (DEBUG_SERVICE) Slog.v(TAG, "bindService: " + service
675                + " type=" + resolvedType + " conn=" + connection.asBinder()
676                + " flags=0x" + Integer.toHexString(flags));
677        final ProcessRecord callerApp = mAm.getRecordForAppLocked(caller);
678        if (callerApp == null) {
679            throw new SecurityException(
680                    "Unable to find app for caller " + caller
681                    + " (pid=" + Binder.getCallingPid()
682                    + ") when binding service " + service);
683        }
684
685        ActivityRecord activity = null;
686        if (token != null) {
687            activity = ActivityRecord.isInStackLocked(token);
688            if (activity == null) {
689                Slog.w(TAG, "Binding with unknown activity: " + token);
690                return 0;
691            }
692        }
693
694        int clientLabel = 0;
695        PendingIntent clientIntent = null;
696
697        if (callerApp.info.uid == Process.SYSTEM_UID) {
698            // Hacky kind of thing -- allow system stuff to tell us
699            // what they are, so we can report this elsewhere for
700            // others to know why certain services are running.
701            try {
702                clientIntent = service.getParcelableExtra(Intent.EXTRA_CLIENT_INTENT);
703            } catch (RuntimeException e) {
704            }
705            if (clientIntent != null) {
706                clientLabel = service.getIntExtra(Intent.EXTRA_CLIENT_LABEL, 0);
707                if (clientLabel != 0) {
708                    // There are no useful extras in the intent, trash them.
709                    // System code calling with this stuff just needs to know
710                    // this will happen.
711                    service = service.cloneFilter();
712                }
713            }
714        }
715
716        if ((flags&Context.BIND_TREAT_LIKE_ACTIVITY) != 0) {
717            mAm.enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS,
718                    "BIND_TREAT_LIKE_ACTIVITY");
719        }
720
721        final boolean callerFg = callerApp.setSchedGroup != Process.THREAD_GROUP_BG_NONINTERACTIVE;
722
723        ServiceLookupResult res =
724            retrieveServiceLocked(service, resolvedType,
725                    Binder.getCallingPid(), Binder.getCallingUid(), userId, true, callerFg);
726        if (res == null) {
727            return 0;
728        }
729        if (res.record == null) {
730            return -1;
731        }
732        ServiceRecord s = res.record;
733
734        final long origId = Binder.clearCallingIdentity();
735
736        try {
737            if (unscheduleServiceRestartLocked(s, callerApp.info.uid, false)) {
738                if (DEBUG_SERVICE) Slog.v(TAG, "BIND SERVICE WHILE RESTART PENDING: "
739                        + s);
740            }
741
742            if ((flags&Context.BIND_AUTO_CREATE) != 0) {
743                s.lastActivity = SystemClock.uptimeMillis();
744                if (!s.hasAutoCreateConnections()) {
745                    // This is the first binding, let the tracker know.
746                    ProcessStats.ServiceState stracker = s.getTracker();
747                    if (stracker != null) {
748                        stracker.setBound(true, mAm.mProcessStats.getMemFactorLocked(),
749                                s.lastActivity);
750                    }
751                }
752            }
753
754            AppBindRecord b = s.retrieveAppBindingLocked(service, callerApp);
755            ConnectionRecord c = new ConnectionRecord(b, activity,
756                    connection, flags, clientLabel, clientIntent);
757
758            IBinder binder = connection.asBinder();
759            ArrayList<ConnectionRecord> clist = s.connections.get(binder);
760            if (clist == null) {
761                clist = new ArrayList<ConnectionRecord>();
762                s.connections.put(binder, clist);
763            }
764            clist.add(c);
765            b.connections.add(c);
766            if (activity != null) {
767                if (activity.connections == null) {
768                    activity.connections = new HashSet<ConnectionRecord>();
769                }
770                activity.connections.add(c);
771            }
772            b.client.connections.add(c);
773            if ((c.flags&Context.BIND_ABOVE_CLIENT) != 0) {
774                b.client.hasAboveClient = true;
775            }
776            if (s.app != null) {
777                updateServiceClientActivitiesLocked(s.app, c, true);
778            }
779            clist = mServiceConnections.get(binder);
780            if (clist == null) {
781                clist = new ArrayList<ConnectionRecord>();
782                mServiceConnections.put(binder, clist);
783            }
784            clist.add(c);
785
786            if ((flags&Context.BIND_AUTO_CREATE) != 0) {
787                s.lastActivity = SystemClock.uptimeMillis();
788                if (bringUpServiceLocked(s, service.getFlags(), callerFg, false) != null) {
789                    return 0;
790                }
791            }
792
793            if (s.app != null) {
794                if ((flags&Context.BIND_TREAT_LIKE_ACTIVITY) != 0) {
795                    s.app.treatLikeActivity = true;
796                }
797                // This could have made the service more important.
798                mAm.updateLruProcessLocked(s.app, s.app.hasClientActivities
799                        || s.app.treatLikeActivity, b.client);
800                mAm.updateOomAdjLocked(s.app);
801            }
802
803            if (DEBUG_SERVICE) Slog.v(TAG, "Bind " + s + " with " + b
804                    + ": received=" + b.intent.received
805                    + " apps=" + b.intent.apps.size()
806                    + " doRebind=" + b.intent.doRebind);
807
808            if (s.app != null && b.intent.received) {
809                // Service is already running, so we can immediately
810                // publish the connection.
811                try {
812                    c.conn.connected(s.name, b.intent.binder);
813                } catch (Exception e) {
814                    Slog.w(TAG, "Failure sending service " + s.shortName
815                            + " to connection " + c.conn.asBinder()
816                            + " (in " + c.binding.client.processName + ")", e);
817                }
818
819                // If this is the first app connected back to this binding,
820                // and the service had previously asked to be told when
821                // rebound, then do so.
822                if (b.intent.apps.size() == 1 && b.intent.doRebind) {
823                    requestServiceBindingLocked(s, b.intent, callerFg, true);
824                }
825            } else if (!b.intent.requested) {
826                requestServiceBindingLocked(s, b.intent, callerFg, false);
827            }
828
829            getServiceMap(s.userId).ensureNotStartingBackground(s);
830
831        } finally {
832            Binder.restoreCallingIdentity(origId);
833        }
834
835        return 1;
836    }
837
838    void publishServiceLocked(ServiceRecord r, Intent intent, IBinder service) {
839        final long origId = Binder.clearCallingIdentity();
840        try {
841            if (DEBUG_SERVICE) Slog.v(TAG, "PUBLISHING " + r
842                    + " " + intent + ": " + service);
843            if (r != null) {
844                Intent.FilterComparison filter
845                        = new Intent.FilterComparison(intent);
846                IntentBindRecord b = r.bindings.get(filter);
847                if (b != null && !b.received) {
848                    b.binder = service;
849                    b.requested = true;
850                    b.received = true;
851                    for (int conni=r.connections.size()-1; conni>=0; conni--) {
852                        ArrayList<ConnectionRecord> clist = r.connections.valueAt(conni);
853                        for (int i=0; i<clist.size(); i++) {
854                            ConnectionRecord c = clist.get(i);
855                            if (!filter.equals(c.binding.intent.intent)) {
856                                if (DEBUG_SERVICE) Slog.v(
857                                        TAG, "Not publishing to: " + c);
858                                if (DEBUG_SERVICE) Slog.v(
859                                        TAG, "Bound intent: " + c.binding.intent.intent);
860                                if (DEBUG_SERVICE) Slog.v(
861                                        TAG, "Published intent: " + intent);
862                                continue;
863                            }
864                            if (DEBUG_SERVICE) Slog.v(TAG, "Publishing to: " + c);
865                            try {
866                                c.conn.connected(r.name, service);
867                            } catch (Exception e) {
868                                Slog.w(TAG, "Failure sending service " + r.name +
869                                      " to connection " + c.conn.asBinder() +
870                                      " (in " + c.binding.client.processName + ")", e);
871                            }
872                        }
873                    }
874                }
875
876                serviceDoneExecutingLocked(r, mDestroyingServices.contains(r), false);
877            }
878        } finally {
879            Binder.restoreCallingIdentity(origId);
880        }
881    }
882
883    boolean unbindServiceLocked(IServiceConnection connection) {
884        IBinder binder = connection.asBinder();
885        if (DEBUG_SERVICE) Slog.v(TAG, "unbindService: conn=" + binder);
886        ArrayList<ConnectionRecord> clist = mServiceConnections.get(binder);
887        if (clist == null) {
888            Slog.w(TAG, "Unbind failed: could not find connection for "
889                  + connection.asBinder());
890            return false;
891        }
892
893        final long origId = Binder.clearCallingIdentity();
894        try {
895            while (clist.size() > 0) {
896                ConnectionRecord r = clist.get(0);
897                removeConnectionLocked(r, null, null);
898
899                if (r.binding.service.app != null) {
900                    // This could have made the service less important.
901                    if ((r.flags&Context.BIND_TREAT_LIKE_ACTIVITY) != 0) {
902                        r.binding.service.app.treatLikeActivity = true;
903                        mAm.updateLruProcessLocked(r.binding.service.app,
904                                r.binding.service.app.hasClientActivities
905                                || r.binding.service.app.treatLikeActivity, null);
906                    }
907                    mAm.updateOomAdjLocked(r.binding.service.app);
908                }
909            }
910        } finally {
911            Binder.restoreCallingIdentity(origId);
912        }
913
914        return true;
915    }
916
917    void unbindFinishedLocked(ServiceRecord r, Intent intent, boolean doRebind) {
918        final long origId = Binder.clearCallingIdentity();
919        try {
920            if (r != null) {
921                Intent.FilterComparison filter
922                        = new Intent.FilterComparison(intent);
923                IntentBindRecord b = r.bindings.get(filter);
924                if (DEBUG_SERVICE) Slog.v(TAG, "unbindFinished in " + r
925                        + " at " + b + ": apps="
926                        + (b != null ? b.apps.size() : 0));
927
928                boolean inDestroying = mDestroyingServices.contains(r);
929                if (b != null) {
930                    if (b.apps.size() > 0 && !inDestroying) {
931                        // Applications have already bound since the last
932                        // unbind, so just rebind right here.
933                        boolean inFg = false;
934                        for (int i=b.apps.size()-1; i>=0; i--) {
935                            ProcessRecord client = b.apps.valueAt(i).client;
936                            if (client != null && client.setSchedGroup
937                                    != Process.THREAD_GROUP_BG_NONINTERACTIVE) {
938                                inFg = true;
939                                break;
940                            }
941                        }
942                        requestServiceBindingLocked(r, b, inFg, true);
943                    } else {
944                        // Note to tell the service the next time there is
945                        // a new client.
946                        b.doRebind = true;
947                    }
948                }
949
950                serviceDoneExecutingLocked(r, inDestroying, false);
951            }
952        } finally {
953            Binder.restoreCallingIdentity(origId);
954        }
955    }
956
957    private final ServiceRecord findServiceLocked(ComponentName name,
958            IBinder token, int userId) {
959        ServiceRecord r = getServiceByName(name, userId);
960        return r == token ? r : null;
961    }
962
963    private final class ServiceLookupResult {
964        final ServiceRecord record;
965        final String permission;
966
967        ServiceLookupResult(ServiceRecord _record, String _permission) {
968            record = _record;
969            permission = _permission;
970        }
971    }
972
973    private class ServiceRestarter implements Runnable {
974        private ServiceRecord mService;
975
976        void setService(ServiceRecord service) {
977            mService = service;
978        }
979
980        public void run() {
981            synchronized(mAm) {
982                performServiceRestartLocked(mService);
983            }
984        }
985    }
986
987    private ServiceLookupResult retrieveServiceLocked(Intent service,
988            String resolvedType, int callingPid, int callingUid, int userId,
989            boolean createIfNeeded, boolean callingFromFg) {
990        ServiceRecord r = null;
991        if (DEBUG_SERVICE) Slog.v(TAG, "retrieveServiceLocked: " + service
992                + " type=" + resolvedType + " callingUid=" + callingUid);
993
994        userId = mAm.handleIncomingUser(callingPid, callingUid, userId,
995                false, ActivityManagerService.ALLOW_NON_FULL_IN_PROFILE, "service", null);
996
997        ServiceMap smap = getServiceMap(userId);
998        final ComponentName comp = service.getComponent();
999        if (comp != null) {
1000            r = smap.mServicesByName.get(comp);
1001        }
1002        if (r == null) {
1003            Intent.FilterComparison filter = new Intent.FilterComparison(service);
1004            r = smap.mServicesByIntent.get(filter);
1005        }
1006        if (r == null) {
1007            try {
1008                ResolveInfo rInfo =
1009                    AppGlobals.getPackageManager().resolveService(
1010                                service, resolvedType,
1011                                ActivityManagerService.STOCK_PM_FLAGS, userId);
1012                ServiceInfo sInfo =
1013                    rInfo != null ? rInfo.serviceInfo : null;
1014                if (sInfo == null) {
1015                    Slog.w(TAG, "Unable to start service " + service + " U=" + userId +
1016                          ": not found");
1017                    return null;
1018                }
1019                ComponentName name = new ComponentName(
1020                        sInfo.applicationInfo.packageName, sInfo.name);
1021                if (userId > 0) {
1022                    if (mAm.isSingleton(sInfo.processName, sInfo.applicationInfo,
1023                            sInfo.name, sInfo.flags)
1024                            && mAm.isValidSingletonCall(callingUid, sInfo.applicationInfo.uid)) {
1025                        userId = 0;
1026                        smap = getServiceMap(0);
1027                    }
1028                    sInfo = new ServiceInfo(sInfo);
1029                    sInfo.applicationInfo = mAm.getAppInfoForUser(sInfo.applicationInfo, userId);
1030                }
1031                r = smap.mServicesByName.get(name);
1032                if (r == null && createIfNeeded) {
1033                    Intent.FilterComparison filter
1034                            = new Intent.FilterComparison(service.cloneFilter());
1035                    ServiceRestarter res = new ServiceRestarter();
1036                    BatteryStatsImpl.Uid.Pkg.Serv ss = null;
1037                    BatteryStatsImpl stats = mAm.mBatteryStatsService.getActiveStatistics();
1038                    synchronized (stats) {
1039                        ss = stats.getServiceStatsLocked(
1040                                sInfo.applicationInfo.uid, sInfo.packageName,
1041                                sInfo.name);
1042                    }
1043                    r = new ServiceRecord(mAm, ss, name, filter, sInfo, callingFromFg, res);
1044                    res.setService(r);
1045                    smap.mServicesByName.put(name, r);
1046                    smap.mServicesByIntent.put(filter, r);
1047
1048                    // Make sure this component isn't in the pending list.
1049                    for (int i=mPendingServices.size()-1; i>=0; i--) {
1050                        ServiceRecord pr = mPendingServices.get(i);
1051                        if (pr.serviceInfo.applicationInfo.uid == sInfo.applicationInfo.uid
1052                                && pr.name.equals(name)) {
1053                            mPendingServices.remove(i);
1054                        }
1055                    }
1056                }
1057            } catch (RemoteException ex) {
1058                // pm is in same process, this will never happen.
1059            }
1060        }
1061        if (r != null) {
1062            if (mAm.checkComponentPermission(r.permission,
1063                    callingPid, callingUid, r.appInfo.uid, r.exported)
1064                    != PackageManager.PERMISSION_GRANTED) {
1065                if (!r.exported) {
1066                    Slog.w(TAG, "Permission Denial: Accessing service " + r.name
1067                            + " from pid=" + callingPid
1068                            + ", uid=" + callingUid
1069                            + " that is not exported from uid " + r.appInfo.uid);
1070                    return new ServiceLookupResult(null, "not exported from uid "
1071                            + r.appInfo.uid);
1072                }
1073                Slog.w(TAG, "Permission Denial: Accessing service " + r.name
1074                        + " from pid=" + callingPid
1075                        + ", uid=" + callingUid
1076                        + " requires " + r.permission);
1077                return new ServiceLookupResult(null, r.permission);
1078            }
1079            if (!mAm.mIntentFirewall.checkService(r.name, service, callingUid, callingPid,
1080                    resolvedType, r.appInfo)) {
1081                return null;
1082            }
1083            return new ServiceLookupResult(r, null);
1084        }
1085        return null;
1086    }
1087
1088    private final void bumpServiceExecutingLocked(ServiceRecord r, boolean fg, String why) {
1089        if (DEBUG_SERVICE) Slog.v(TAG, ">>> EXECUTING "
1090                + why + " of " + r + " in app " + r.app);
1091        else if (DEBUG_SERVICE_EXECUTING) Slog.v(TAG, ">>> EXECUTING "
1092                + why + " of " + r.shortName);
1093        long now = SystemClock.uptimeMillis();
1094        if (r.executeNesting == 0) {
1095            r.executeFg = fg;
1096            ProcessStats.ServiceState stracker = r.getTracker();
1097            if (stracker != null) {
1098                stracker.setExecuting(true, mAm.mProcessStats.getMemFactorLocked(), now);
1099            }
1100            if (r.app != null) {
1101                r.app.executingServices.add(r);
1102                r.app.execServicesFg |= fg;
1103                if (r.app.executingServices.size() == 1) {
1104                    scheduleServiceTimeoutLocked(r.app);
1105                }
1106            }
1107        } else if (r.app != null && fg && !r.app.execServicesFg) {
1108            r.app.execServicesFg = true;
1109            scheduleServiceTimeoutLocked(r.app);
1110        }
1111        r.executeFg |= fg;
1112        r.executeNesting++;
1113        r.executingStart = now;
1114    }
1115
1116    private final boolean requestServiceBindingLocked(ServiceRecord r,
1117            IntentBindRecord i, boolean execInFg, boolean rebind) {
1118        if (r.app == null || r.app.thread == null) {
1119            // If service is not currently running, can't yet bind.
1120            return false;
1121        }
1122        if ((!i.requested || rebind) && i.apps.size() > 0) {
1123            try {
1124                bumpServiceExecutingLocked(r, execInFg, "bind");
1125                r.app.forceProcessStateUpTo(ActivityManager.PROCESS_STATE_SERVICE);
1126                r.app.thread.scheduleBindService(r, i.intent.getIntent(), rebind,
1127                        r.app.repProcState);
1128                if (!rebind) {
1129                    i.requested = true;
1130                }
1131                i.hasBound = true;
1132                i.doRebind = false;
1133            } catch (RemoteException e) {
1134                if (DEBUG_SERVICE) Slog.v(TAG, "Crashed while binding " + r);
1135                return false;
1136            }
1137        }
1138        return true;
1139    }
1140
1141    private final boolean scheduleServiceRestartLocked(ServiceRecord r,
1142            boolean allowCancel) {
1143        boolean canceled = false;
1144
1145        ServiceMap smap = getServiceMap(r.userId);
1146        if (smap.mServicesByName.get(r.name) != r) {
1147            ServiceRecord cur = smap.mServicesByName.get(r.name);
1148            Slog.wtf(TAG, "Attempting to schedule restart of " + r
1149                    + " when found in map: " + cur);
1150            return false;
1151        }
1152
1153        final long now = SystemClock.uptimeMillis();
1154
1155        if ((r.serviceInfo.applicationInfo.flags
1156                &ApplicationInfo.FLAG_PERSISTENT) == 0) {
1157            long minDuration = SERVICE_RESTART_DURATION;
1158            long resetTime = SERVICE_RESET_RUN_DURATION;
1159
1160            // Any delivered but not yet finished starts should be put back
1161            // on the pending list.
1162            final int N = r.deliveredStarts.size();
1163            if (N > 0) {
1164                for (int i=N-1; i>=0; i--) {
1165                    ServiceRecord.StartItem si = r.deliveredStarts.get(i);
1166                    si.removeUriPermissionsLocked();
1167                    if (si.intent == null) {
1168                        // We'll generate this again if needed.
1169                    } else if (!allowCancel || (si.deliveryCount < ServiceRecord.MAX_DELIVERY_COUNT
1170                            && si.doneExecutingCount < ServiceRecord.MAX_DONE_EXECUTING_COUNT)) {
1171                        r.pendingStarts.add(0, si);
1172                        long dur = SystemClock.uptimeMillis() - si.deliveredTime;
1173                        dur *= 2;
1174                        if (minDuration < dur) minDuration = dur;
1175                        if (resetTime < dur) resetTime = dur;
1176                    } else {
1177                        Slog.w(TAG, "Canceling start item " + si.intent + " in service "
1178                                + r.name);
1179                        canceled = true;
1180                    }
1181                }
1182                r.deliveredStarts.clear();
1183            }
1184
1185            r.totalRestartCount++;
1186            if (r.restartDelay == 0) {
1187                r.restartCount++;
1188                r.restartDelay = minDuration;
1189            } else {
1190                // If it has been a "reasonably long time" since the service
1191                // was started, then reset our restart duration back to
1192                // the beginning, so we don't infinitely increase the duration
1193                // on a service that just occasionally gets killed (which is
1194                // a normal case, due to process being killed to reclaim memory).
1195                if (now > (r.restartTime+resetTime)) {
1196                    r.restartCount = 1;
1197                    r.restartDelay = minDuration;
1198                } else {
1199                    r.restartDelay *= SERVICE_RESTART_DURATION_FACTOR;
1200                    if (r.restartDelay < minDuration) {
1201                        r.restartDelay = minDuration;
1202                    }
1203                }
1204            }
1205
1206            r.nextRestartTime = now + r.restartDelay;
1207
1208            // Make sure that we don't end up restarting a bunch of services
1209            // all at the same time.
1210            boolean repeat;
1211            do {
1212                repeat = false;
1213                for (int i=mRestartingServices.size()-1; i>=0; i--) {
1214                    ServiceRecord r2 = mRestartingServices.get(i);
1215                    if (r2 != r && r.nextRestartTime
1216                            >= (r2.nextRestartTime-SERVICE_MIN_RESTART_TIME_BETWEEN)
1217                            && r.nextRestartTime
1218                            < (r2.nextRestartTime+SERVICE_MIN_RESTART_TIME_BETWEEN)) {
1219                        r.nextRestartTime = r2.nextRestartTime + SERVICE_MIN_RESTART_TIME_BETWEEN;
1220                        r.restartDelay = r.nextRestartTime - now;
1221                        repeat = true;
1222                        break;
1223                    }
1224                }
1225            } while (repeat);
1226
1227        } else {
1228            // Persistent processes are immediately restarted, so there is no
1229            // reason to hold of on restarting their services.
1230            r.totalRestartCount++;
1231            r.restartCount = 0;
1232            r.restartDelay = 0;
1233            r.nextRestartTime = now;
1234        }
1235
1236        if (!mRestartingServices.contains(r)) {
1237            r.createdFromFg = false;
1238            mRestartingServices.add(r);
1239            r.makeRestarting(mAm.mProcessStats.getMemFactorLocked(), now);
1240        }
1241
1242        r.cancelNotification();
1243
1244        mAm.mHandler.removeCallbacks(r.restarter);
1245        mAm.mHandler.postAtTime(r.restarter, r.nextRestartTime);
1246        r.nextRestartTime = SystemClock.uptimeMillis() + r.restartDelay;
1247        Slog.w(TAG, "Scheduling restart of crashed service "
1248                + r.shortName + " in " + r.restartDelay + "ms");
1249        EventLog.writeEvent(EventLogTags.AM_SCHEDULE_SERVICE_RESTART,
1250                r.userId, r.shortName, r.restartDelay);
1251
1252        return canceled;
1253    }
1254
1255    final void performServiceRestartLocked(ServiceRecord r) {
1256        if (!mRestartingServices.contains(r)) {
1257            return;
1258        }
1259        bringUpServiceLocked(r, r.intent.getIntent().getFlags(), r.createdFromFg, true);
1260    }
1261
1262    private final boolean unscheduleServiceRestartLocked(ServiceRecord r, int callingUid,
1263            boolean force) {
1264        if (!force && r.restartDelay == 0) {
1265            return false;
1266        }
1267        // Remove from the restarting list; if the service is currently on the
1268        // restarting list, or the call is coming from another app, then this
1269        // service has become of much more interest so we reset the restart interval.
1270        boolean removed = mRestartingServices.remove(r);
1271        if (removed || callingUid != r.appInfo.uid) {
1272            r.resetRestartCounter();
1273        }
1274        if (removed) {
1275            clearRestartingIfNeededLocked(r);
1276        }
1277        mAm.mHandler.removeCallbacks(r.restarter);
1278        return true;
1279    }
1280
1281    private void clearRestartingIfNeededLocked(ServiceRecord r) {
1282        if (r.restartTracker != null) {
1283            // If this is the last restarting record with this tracker, then clear
1284            // the tracker's restarting state.
1285            boolean stillTracking = false;
1286            for (int i=mRestartingServices.size()-1; i>=0; i--) {
1287                if (mRestartingServices.get(i).restartTracker == r.restartTracker) {
1288                    stillTracking = true;
1289                    break;
1290                }
1291            }
1292            if (!stillTracking) {
1293                r.restartTracker.setRestarting(false, mAm.mProcessStats.getMemFactorLocked(),
1294                        SystemClock.uptimeMillis());
1295                r.restartTracker = null;
1296            }
1297        }
1298    }
1299
1300    private final String bringUpServiceLocked(ServiceRecord r,
1301            int intentFlags, boolean execInFg, boolean whileRestarting) {
1302        //Slog.i(TAG, "Bring up service:");
1303        //r.dump("  ");
1304
1305        if (r.app != null && r.app.thread != null) {
1306            sendServiceArgsLocked(r, execInFg, false);
1307            return null;
1308        }
1309
1310        if (!whileRestarting && r.restartDelay > 0) {
1311            // If waiting for a restart, then do nothing.
1312            return null;
1313        }
1314
1315        if (DEBUG_SERVICE) Slog.v(TAG, "Bringing up " + r + " " + r.intent);
1316
1317        // We are now bringing the service up, so no longer in the
1318        // restarting state.
1319        if (mRestartingServices.remove(r)) {
1320            clearRestartingIfNeededLocked(r);
1321        }
1322
1323        // Make sure this service is no longer considered delayed, we are starting it now.
1324        if (r.delayed) {
1325            if (DEBUG_DELAYED_STARTS) Slog.v(TAG, "REM FR DELAY LIST (bring up): " + r);
1326            getServiceMap(r.userId).mDelayedStartList.remove(r);
1327            r.delayed = false;
1328        }
1329
1330        // Make sure that the user who owns this service is started.  If not,
1331        // we don't want to allow it to run.
1332        if (mAm.mStartedUsers.get(r.userId) == null) {
1333            String msg = "Unable to launch app "
1334                    + r.appInfo.packageName + "/"
1335                    + r.appInfo.uid + " for service "
1336                    + r.intent.getIntent() + ": user " + r.userId + " is stopped";
1337            Slog.w(TAG, msg);
1338            bringDownServiceLocked(r);
1339            return msg;
1340        }
1341
1342        // Service is now being launched, its package can't be stopped.
1343        try {
1344            AppGlobals.getPackageManager().setPackageStoppedState(
1345                    r.packageName, false, r.userId);
1346        } catch (RemoteException e) {
1347        } catch (IllegalArgumentException e) {
1348            Slog.w(TAG, "Failed trying to unstop package "
1349                    + r.packageName + ": " + e);
1350        }
1351
1352        final boolean isolated = (r.serviceInfo.flags&ServiceInfo.FLAG_ISOLATED_PROCESS) != 0;
1353        final String procName = r.processName;
1354        ProcessRecord app;
1355
1356        if (!isolated) {
1357            app = mAm.getProcessRecordLocked(procName, r.appInfo.uid, false);
1358            if (DEBUG_MU) Slog.v(TAG_MU, "bringUpServiceLocked: appInfo.uid=" + r.appInfo.uid
1359                        + " app=" + app);
1360            if (app != null && app.thread != null) {
1361                try {
1362                    app.addPackage(r.appInfo.packageName, r.appInfo.versionCode, mAm.mProcessStats);
1363                    realStartServiceLocked(r, app, execInFg);
1364                    return null;
1365                } catch (RemoteException e) {
1366                    Slog.w(TAG, "Exception when starting service " + r.shortName, e);
1367                }
1368
1369                // If a dead object exception was thrown -- fall through to
1370                // restart the application.
1371            }
1372        } else {
1373            // If this service runs in an isolated process, then each time
1374            // we call startProcessLocked() we will get a new isolated
1375            // process, starting another process if we are currently waiting
1376            // for a previous process to come up.  To deal with this, we store
1377            // in the service any current isolated process it is running in or
1378            // waiting to have come up.
1379            app = r.isolatedProc;
1380        }
1381
1382        // Not running -- get it started, and enqueue this service record
1383        // to be executed when the app comes up.
1384        if (app == null) {
1385            if ((app=mAm.startProcessLocked(procName, r.appInfo, true, intentFlags,
1386                    "service", r.name, false, isolated, false)) == null) {
1387                String msg = "Unable to launch app "
1388                        + r.appInfo.packageName + "/"
1389                        + r.appInfo.uid + " for service "
1390                        + r.intent.getIntent() + ": process is bad";
1391                Slog.w(TAG, msg);
1392                bringDownServiceLocked(r);
1393                return msg;
1394            }
1395            if (isolated) {
1396                r.isolatedProc = app;
1397            }
1398        }
1399
1400        if (!mPendingServices.contains(r)) {
1401            mPendingServices.add(r);
1402        }
1403
1404        if (r.delayedStop) {
1405            // Oh and hey we've already been asked to stop!
1406            r.delayedStop = false;
1407            if (r.startRequested) {
1408                if (DEBUG_DELAYED_STARTS) Slog.v(TAG, "Applying delayed stop (in bring up): " + r);
1409                stopServiceLocked(r);
1410            }
1411        }
1412
1413        return null;
1414    }
1415
1416    private final void requestServiceBindingsLocked(ServiceRecord r, boolean execInFg) {
1417        for (int i=r.bindings.size()-1; i>=0; i--) {
1418            IntentBindRecord ibr = r.bindings.valueAt(i);
1419            if (!requestServiceBindingLocked(r, ibr, execInFg, false)) {
1420                break;
1421            }
1422        }
1423    }
1424
1425    private final void realStartServiceLocked(ServiceRecord r,
1426            ProcessRecord app, boolean execInFg) throws RemoteException {
1427        if (app.thread == null) {
1428            throw new RemoteException();
1429        }
1430        if (DEBUG_MU)
1431            Slog.v(TAG_MU, "realStartServiceLocked, ServiceRecord.uid = " + r.appInfo.uid
1432                    + ", ProcessRecord.uid = " + app.uid);
1433        r.app = app;
1434        r.restartTime = r.lastActivity = SystemClock.uptimeMillis();
1435
1436        app.services.add(r);
1437        bumpServiceExecutingLocked(r, execInFg, "create");
1438        mAm.updateLruProcessLocked(app, false, null);
1439        mAm.updateOomAdjLocked();
1440
1441        boolean created = false;
1442        try {
1443            String nameTerm;
1444            int lastPeriod = r.shortName.lastIndexOf('.');
1445            nameTerm = lastPeriod >= 0 ? r.shortName.substring(lastPeriod) : r.shortName;
1446            EventLogTags.writeAmCreateService(
1447                    r.userId, System.identityHashCode(r), nameTerm, r.app.uid, r.app.pid);
1448            synchronized (r.stats.getBatteryStats()) {
1449                r.stats.startLaunchedLocked();
1450            }
1451            mAm.ensurePackageDexOpt(r.serviceInfo.packageName);
1452            app.forceProcessStateUpTo(ActivityManager.PROCESS_STATE_SERVICE);
1453            app.thread.scheduleCreateService(r, r.serviceInfo,
1454                    mAm.compatibilityInfoForPackageLocked(r.serviceInfo.applicationInfo),
1455                    app.repProcState);
1456            r.postNotification();
1457            created = true;
1458        } catch (DeadObjectException e) {
1459            Slog.w(TAG, "Application dead when creating service " + r);
1460            mAm.appDiedLocked(app);
1461        } finally {
1462            if (!created) {
1463                app.services.remove(r);
1464                r.app = null;
1465                scheduleServiceRestartLocked(r, false);
1466            }
1467        }
1468
1469        requestServiceBindingsLocked(r, execInFg);
1470
1471        updateServiceClientActivitiesLocked(app, null, true);
1472
1473        // If the service is in the started state, and there are no
1474        // pending arguments, then fake up one so its onStartCommand() will
1475        // be called.
1476        if (r.startRequested && r.callStart && r.pendingStarts.size() == 0) {
1477            r.pendingStarts.add(new ServiceRecord.StartItem(r, false, r.makeNextStartId(),
1478                    null, null));
1479        }
1480
1481        sendServiceArgsLocked(r, execInFg, true);
1482
1483        if (r.delayed) {
1484            if (DEBUG_DELAYED_STARTS) Slog.v(TAG, "REM FR DELAY LIST (new proc): " + r);
1485            getServiceMap(r.userId).mDelayedStartList.remove(r);
1486            r.delayed = false;
1487        }
1488
1489        if (r.delayedStop) {
1490            // Oh and hey we've already been asked to stop!
1491            r.delayedStop = false;
1492            if (r.startRequested) {
1493                if (DEBUG_DELAYED_STARTS) Slog.v(TAG, "Applying delayed stop (from start): " + r);
1494                stopServiceLocked(r);
1495            }
1496        }
1497    }
1498
1499    private final void sendServiceArgsLocked(ServiceRecord r, boolean execInFg,
1500            boolean oomAdjusted) {
1501        final int N = r.pendingStarts.size();
1502        if (N == 0) {
1503            return;
1504        }
1505
1506        while (r.pendingStarts.size() > 0) {
1507            try {
1508                ServiceRecord.StartItem si = r.pendingStarts.remove(0);
1509                if (DEBUG_SERVICE) Slog.v(TAG, "Sending arguments to: "
1510                        + r + " " + r.intent + " args=" + si.intent);
1511                if (si.intent == null && N > 1) {
1512                    // If somehow we got a dummy null intent in the middle,
1513                    // then skip it.  DO NOT skip a null intent when it is
1514                    // the only one in the list -- this is to support the
1515                    // onStartCommand(null) case.
1516                    continue;
1517                }
1518                si.deliveredTime = SystemClock.uptimeMillis();
1519                r.deliveredStarts.add(si);
1520                si.deliveryCount++;
1521                if (si.neededGrants != null) {
1522                    mAm.grantUriPermissionUncheckedFromIntentLocked(si.neededGrants,
1523                            si.getUriPermissionsLocked());
1524                }
1525                bumpServiceExecutingLocked(r, execInFg, "start");
1526                if (!oomAdjusted) {
1527                    oomAdjusted = true;
1528                    mAm.updateOomAdjLocked(r.app);
1529                }
1530                int flags = 0;
1531                if (si.deliveryCount > 1) {
1532                    flags |= Service.START_FLAG_RETRY;
1533                }
1534                if (si.doneExecutingCount > 0) {
1535                    flags |= Service.START_FLAG_REDELIVERY;
1536                }
1537                r.app.thread.scheduleServiceArgs(r, si.taskRemoved, si.id, flags, si.intent);
1538            } catch (RemoteException e) {
1539                // Remote process gone...  we'll let the normal cleanup take
1540                // care of this.
1541                if (DEBUG_SERVICE) Slog.v(TAG, "Crashed while scheduling start: " + r);
1542                break;
1543            } catch (Exception e) {
1544                Slog.w(TAG, "Unexpected exception", e);
1545                break;
1546            }
1547        }
1548    }
1549
1550    private final boolean isServiceNeeded(ServiceRecord r, boolean knowConn, boolean hasConn) {
1551        // Are we still explicitly being asked to run?
1552        if (r.startRequested) {
1553            return true;
1554        }
1555
1556        // Is someone still bound to us keepign us running?
1557        if (!knowConn) {
1558            hasConn = r.hasAutoCreateConnections();
1559        }
1560        if (hasConn) {
1561            return true;
1562        }
1563
1564        return false;
1565    }
1566
1567    private final void bringDownServiceIfNeededLocked(ServiceRecord r, boolean knowConn,
1568            boolean hasConn) {
1569        //Slog.i(TAG, "Bring down service:");
1570        //r.dump("  ");
1571
1572        if (isServiceNeeded(r, knowConn, hasConn)) {
1573            return;
1574        }
1575
1576        // Are we in the process of launching?
1577        if (mPendingServices.contains(r)) {
1578            return;
1579        }
1580
1581        bringDownServiceLocked(r);
1582    }
1583
1584    private final void bringDownServiceLocked(ServiceRecord r) {
1585        //Slog.i(TAG, "Bring down service:");
1586        //r.dump("  ");
1587
1588        // Report to all of the connections that the service is no longer
1589        // available.
1590        for (int conni=r.connections.size()-1; conni>=0; conni--) {
1591            ArrayList<ConnectionRecord> c = r.connections.valueAt(conni);
1592            for (int i=0; i<c.size(); i++) {
1593                ConnectionRecord cr = c.get(i);
1594                // There is still a connection to the service that is
1595                // being brought down.  Mark it as dead.
1596                cr.serviceDead = true;
1597                try {
1598                    cr.conn.connected(r.name, null);
1599                } catch (Exception e) {
1600                    Slog.w(TAG, "Failure disconnecting service " + r.name +
1601                          " to connection " + c.get(i).conn.asBinder() +
1602                          " (in " + c.get(i).binding.client.processName + ")", e);
1603                }
1604            }
1605        }
1606
1607        // Tell the service that it has been unbound.
1608        if (r.app != null && r.app.thread != null) {
1609            for (int i=r.bindings.size()-1; i>=0; i--) {
1610                IntentBindRecord ibr = r.bindings.valueAt(i);
1611                if (DEBUG_SERVICE) Slog.v(TAG, "Bringing down binding " + ibr
1612                        + ": hasBound=" + ibr.hasBound);
1613                if (ibr.hasBound) {
1614                    try {
1615                        bumpServiceExecutingLocked(r, false, "bring down unbind");
1616                        mAm.updateOomAdjLocked(r.app);
1617                        ibr.hasBound = false;
1618                        r.app.thread.scheduleUnbindService(r,
1619                                ibr.intent.getIntent());
1620                    } catch (Exception e) {
1621                        Slog.w(TAG, "Exception when unbinding service "
1622                                + r.shortName, e);
1623                        serviceProcessGoneLocked(r);
1624                    }
1625                }
1626            }
1627        }
1628
1629        if (DEBUG_SERVICE) Slog.v(TAG, "Bringing down " + r + " " + r.intent);
1630        EventLogTags.writeAmDestroyService(
1631                r.userId, System.identityHashCode(r), (r.app != null) ? r.app.pid : -1);
1632
1633        final ServiceMap smap = getServiceMap(r.userId);
1634        smap.mServicesByName.remove(r.name);
1635        smap.mServicesByIntent.remove(r.intent);
1636        r.totalRestartCount = 0;
1637        unscheduleServiceRestartLocked(r, 0, true);
1638
1639        // Also make sure it is not on the pending list.
1640        for (int i=mPendingServices.size()-1; i>=0; i--) {
1641            if (mPendingServices.get(i) == r) {
1642                mPendingServices.remove(i);
1643                if (DEBUG_SERVICE) Slog.v(TAG, "Removed pending: " + r);
1644            }
1645        }
1646
1647        r.cancelNotification();
1648        r.isForeground = false;
1649        r.foregroundId = 0;
1650        r.foregroundNoti = null;
1651
1652        // Clear start entries.
1653        r.clearDeliveredStartsLocked();
1654        r.pendingStarts.clear();
1655
1656        if (r.app != null) {
1657            synchronized (r.stats.getBatteryStats()) {
1658                r.stats.stopLaunchedLocked();
1659            }
1660            r.app.services.remove(r);
1661            if (r.app.thread != null) {
1662                updateServiceForegroundLocked(r.app, false);
1663                try {
1664                    bumpServiceExecutingLocked(r, false, "destroy");
1665                    mDestroyingServices.add(r);
1666                    mAm.updateOomAdjLocked(r.app);
1667                    r.app.thread.scheduleStopService(r);
1668                } catch (Exception e) {
1669                    Slog.w(TAG, "Exception when destroying service "
1670                            + r.shortName, e);
1671                    serviceProcessGoneLocked(r);
1672                }
1673            } else {
1674                if (DEBUG_SERVICE) Slog.v(
1675                    TAG, "Removed service that has no process: " + r);
1676            }
1677        } else {
1678            if (DEBUG_SERVICE) Slog.v(
1679                TAG, "Removed service that is not running: " + r);
1680        }
1681
1682        if (r.bindings.size() > 0) {
1683            r.bindings.clear();
1684        }
1685
1686        if (r.restarter instanceof ServiceRestarter) {
1687           ((ServiceRestarter)r.restarter).setService(null);
1688        }
1689
1690        int memFactor = mAm.mProcessStats.getMemFactorLocked();
1691        long now = SystemClock.uptimeMillis();
1692        if (r.tracker != null) {
1693            r.tracker.setStarted(false, memFactor, now);
1694            r.tracker.setBound(false, memFactor, now);
1695            if (r.executeNesting == 0) {
1696                r.tracker.clearCurrentOwner(r, false);
1697                r.tracker = null;
1698            }
1699        }
1700
1701        smap.ensureNotStartingBackground(r);
1702    }
1703
1704    void removeConnectionLocked(
1705        ConnectionRecord c, ProcessRecord skipApp, ActivityRecord skipAct) {
1706        IBinder binder = c.conn.asBinder();
1707        AppBindRecord b = c.binding;
1708        ServiceRecord s = b.service;
1709        ArrayList<ConnectionRecord> clist = s.connections.get(binder);
1710        if (clist != null) {
1711            clist.remove(c);
1712            if (clist.size() == 0) {
1713                s.connections.remove(binder);
1714            }
1715        }
1716        b.connections.remove(c);
1717        if (c.activity != null && c.activity != skipAct) {
1718            if (c.activity.connections != null) {
1719                c.activity.connections.remove(c);
1720            }
1721        }
1722        if (b.client != skipApp) {
1723            b.client.connections.remove(c);
1724            if ((c.flags&Context.BIND_ABOVE_CLIENT) != 0) {
1725                b.client.updateHasAboveClientLocked();
1726            }
1727            if (s.app != null) {
1728                updateServiceClientActivitiesLocked(s.app, c, true);
1729            }
1730        }
1731        clist = mServiceConnections.get(binder);
1732        if (clist != null) {
1733            clist.remove(c);
1734            if (clist.size() == 0) {
1735                mServiceConnections.remove(binder);
1736            }
1737        }
1738
1739        if (b.connections.size() == 0) {
1740            b.intent.apps.remove(b.client);
1741        }
1742
1743        if (!c.serviceDead) {
1744            if (DEBUG_SERVICE) Slog.v(TAG, "Disconnecting binding " + b.intent
1745                    + ": shouldUnbind=" + b.intent.hasBound);
1746            if (s.app != null && s.app.thread != null && b.intent.apps.size() == 0
1747                    && b.intent.hasBound) {
1748                try {
1749                    bumpServiceExecutingLocked(s, false, "unbind");
1750                    if (b.client != s.app && (c.flags&Context.BIND_WAIVE_PRIORITY) == 0
1751                            && s.app.setProcState <= ActivityManager.PROCESS_STATE_RECEIVER) {
1752                        // If this service's process is not already in the cached list,
1753                        // then update it in the LRU list here because this may be causing
1754                        // it to go down there and we want it to start out near the top.
1755                        mAm.updateLruProcessLocked(s.app, false, null);
1756                    }
1757                    mAm.updateOomAdjLocked(s.app);
1758                    b.intent.hasBound = false;
1759                    // Assume the client doesn't want to know about a rebind;
1760                    // we will deal with that later if it asks for one.
1761                    b.intent.doRebind = false;
1762                    s.app.thread.scheduleUnbindService(s, b.intent.intent.getIntent());
1763                } catch (Exception e) {
1764                    Slog.w(TAG, "Exception when unbinding service " + s.shortName, e);
1765                    serviceProcessGoneLocked(s);
1766                }
1767            }
1768
1769            if ((c.flags&Context.BIND_AUTO_CREATE) != 0) {
1770                boolean hasAutoCreate = s.hasAutoCreateConnections();
1771                if (!hasAutoCreate) {
1772                    if (s.tracker != null) {
1773                        s.tracker.setBound(false, mAm.mProcessStats.getMemFactorLocked(),
1774                                SystemClock.uptimeMillis());
1775                    }
1776                }
1777                bringDownServiceIfNeededLocked(s, true, hasAutoCreate);
1778            }
1779        }
1780    }
1781
1782    void serviceDoneExecutingLocked(ServiceRecord r, int type, int startId, int res) {
1783        boolean inDestroying = mDestroyingServices.contains(r);
1784        if (r != null) {
1785            if (type == 1) {
1786                // This is a call from a service start...  take care of
1787                // book-keeping.
1788                r.callStart = true;
1789                switch (res) {
1790                    case Service.START_STICKY_COMPATIBILITY:
1791                    case Service.START_STICKY: {
1792                        // We are done with the associated start arguments.
1793                        r.findDeliveredStart(startId, true);
1794                        // Don't stop if killed.
1795                        r.stopIfKilled = false;
1796                        break;
1797                    }
1798                    case Service.START_NOT_STICKY: {
1799                        // We are done with the associated start arguments.
1800                        r.findDeliveredStart(startId, true);
1801                        if (r.getLastStartId() == startId) {
1802                            // There is no more work, and this service
1803                            // doesn't want to hang around if killed.
1804                            r.stopIfKilled = true;
1805                        }
1806                        break;
1807                    }
1808                    case Service.START_REDELIVER_INTENT: {
1809                        // We'll keep this item until they explicitly
1810                        // call stop for it, but keep track of the fact
1811                        // that it was delivered.
1812                        ServiceRecord.StartItem si = r.findDeliveredStart(startId, false);
1813                        if (si != null) {
1814                            si.deliveryCount = 0;
1815                            si.doneExecutingCount++;
1816                            // Don't stop if killed.
1817                            r.stopIfKilled = true;
1818                        }
1819                        break;
1820                    }
1821                    case Service.START_TASK_REMOVED_COMPLETE: {
1822                        // Special processing for onTaskRemoved().  Don't
1823                        // impact normal onStartCommand() processing.
1824                        r.findDeliveredStart(startId, true);
1825                        break;
1826                    }
1827                    default:
1828                        throw new IllegalArgumentException(
1829                                "Unknown service start result: " + res);
1830                }
1831                if (res == Service.START_STICKY_COMPATIBILITY) {
1832                    r.callStart = false;
1833                }
1834            }
1835            final long origId = Binder.clearCallingIdentity();
1836            serviceDoneExecutingLocked(r, inDestroying, inDestroying);
1837            Binder.restoreCallingIdentity(origId);
1838        } else {
1839            Slog.w(TAG, "Done executing unknown service from pid "
1840                    + Binder.getCallingPid());
1841        }
1842    }
1843
1844    private void serviceProcessGoneLocked(ServiceRecord r) {
1845        if (r.tracker != null) {
1846            int memFactor = mAm.mProcessStats.getMemFactorLocked();
1847            long now = SystemClock.uptimeMillis();
1848            r.tracker.setExecuting(false, memFactor, now);
1849            r.tracker.setBound(false, memFactor, now);
1850            r.tracker.setStarted(false, memFactor, now);
1851        }
1852        serviceDoneExecutingLocked(r, true, true);
1853    }
1854
1855    private void serviceDoneExecutingLocked(ServiceRecord r, boolean inDestroying,
1856            boolean finishing) {
1857        if (DEBUG_SERVICE) Slog.v(TAG, "<<< DONE EXECUTING " + r
1858                + ": nesting=" + r.executeNesting
1859                + ", inDestroying=" + inDestroying + ", app=" + r.app);
1860        else if (DEBUG_SERVICE_EXECUTING) Slog.v(TAG, "<<< DONE EXECUTING " + r.shortName);
1861        r.executeNesting--;
1862        if (r.executeNesting <= 0) {
1863            if (r.app != null) {
1864                if (DEBUG_SERVICE) Slog.v(TAG,
1865                        "Nesting at 0 of " + r.shortName);
1866                r.app.execServicesFg = false;
1867                r.app.executingServices.remove(r);
1868                if (r.app.executingServices.size() == 0) {
1869                    if (DEBUG_SERVICE || DEBUG_SERVICE_EXECUTING) Slog.v(TAG,
1870                            "No more executingServices of " + r.shortName);
1871                    mAm.mHandler.removeMessages(ActivityManagerService.SERVICE_TIMEOUT_MSG, r.app);
1872                } else if (r.executeFg) {
1873                    // Need to re-evaluate whether the app still needs to be in the foreground.
1874                    for (int i=r.app.executingServices.size()-1; i>=0; i--) {
1875                        if (r.app.executingServices.valueAt(i).executeFg) {
1876                            r.app.execServicesFg = true;
1877                            break;
1878                        }
1879                    }
1880                }
1881                if (inDestroying) {
1882                    if (DEBUG_SERVICE) Slog.v(TAG,
1883                            "doneExecuting remove destroying " + r);
1884                    mDestroyingServices.remove(r);
1885                    r.bindings.clear();
1886                }
1887                mAm.updateOomAdjLocked(r.app);
1888            }
1889            r.executeFg = false;
1890            if (r.tracker != null) {
1891                r.tracker.setExecuting(false, mAm.mProcessStats.getMemFactorLocked(),
1892                        SystemClock.uptimeMillis());
1893                if (finishing) {
1894                    r.tracker.clearCurrentOwner(r, false);
1895                    r.tracker = null;
1896                }
1897            }
1898            if (finishing) {
1899                if (r.app != null && !r.app.persistent) {
1900                    r.app.services.remove(r);
1901                }
1902                r.app = null;
1903            }
1904        }
1905    }
1906
1907    boolean attachApplicationLocked(ProcessRecord proc, String processName) throws Exception {
1908        boolean didSomething = false;
1909        // Collect any services that are waiting for this process to come up.
1910        if (mPendingServices.size() > 0) {
1911            ServiceRecord sr = null;
1912            try {
1913                for (int i=0; i<mPendingServices.size(); i++) {
1914                    sr = mPendingServices.get(i);
1915                    if (proc != sr.isolatedProc && (proc.uid != sr.appInfo.uid
1916                            || !processName.equals(sr.processName))) {
1917                        continue;
1918                    }
1919
1920                    mPendingServices.remove(i);
1921                    i--;
1922                    proc.addPackage(sr.appInfo.packageName, sr.appInfo.versionCode,
1923                            mAm.mProcessStats);
1924                    realStartServiceLocked(sr, proc, sr.createdFromFg);
1925                    didSomething = true;
1926                }
1927            } catch (Exception e) {
1928                Slog.w(TAG, "Exception in new application when starting service "
1929                        + sr.shortName, e);
1930                throw e;
1931            }
1932        }
1933        // Also, if there are any services that are waiting to restart and
1934        // would run in this process, now is a good time to start them.  It would
1935        // be weird to bring up the process but arbitrarily not let the services
1936        // run at this point just because their restart time hasn't come up.
1937        if (mRestartingServices.size() > 0) {
1938            ServiceRecord sr = null;
1939            for (int i=0; i<mRestartingServices.size(); i++) {
1940                sr = mRestartingServices.get(i);
1941                if (proc != sr.isolatedProc && (proc.uid != sr.appInfo.uid
1942                        || !processName.equals(sr.processName))) {
1943                    continue;
1944                }
1945                mAm.mHandler.removeCallbacks(sr.restarter);
1946                mAm.mHandler.post(sr.restarter);
1947            }
1948        }
1949        return didSomething;
1950    }
1951
1952    void processStartTimedOutLocked(ProcessRecord proc) {
1953        for (int i=0; i<mPendingServices.size(); i++) {
1954            ServiceRecord sr = mPendingServices.get(i);
1955            if ((proc.uid == sr.appInfo.uid
1956                    && proc.processName.equals(sr.processName))
1957                    || sr.isolatedProc == proc) {
1958                Slog.w(TAG, "Forcing bringing down service: " + sr);
1959                sr.isolatedProc = null;
1960                mPendingServices.remove(i);
1961                i--;
1962                bringDownServiceLocked(sr);
1963            }
1964        }
1965    }
1966
1967    private boolean collectForceStopServicesLocked(String name, int userId,
1968            boolean evenPersistent, boolean doit,
1969            ArrayMap<ComponentName, ServiceRecord> services,
1970            ArrayList<ServiceRecord> result) {
1971        boolean didSomething = false;
1972        for (int i=0; i<services.size(); i++) {
1973            ServiceRecord service = services.valueAt(i);
1974            if ((name == null || service.packageName.equals(name))
1975                    && (service.app == null || evenPersistent || !service.app.persistent)) {
1976                if (!doit) {
1977                    return true;
1978                }
1979                didSomething = true;
1980                Slog.i(TAG, "  Force stopping service " + service);
1981                if (service.app != null) {
1982                    service.app.removed = true;
1983                    if (!service.app.persistent) {
1984                        service.app.services.remove(service);
1985                    }
1986                }
1987                service.app = null;
1988                service.isolatedProc = null;
1989                result.add(service);
1990            }
1991        }
1992        return didSomething;
1993    }
1994
1995    boolean forceStopLocked(String name, int userId, boolean evenPersistent, boolean doit) {
1996        boolean didSomething = false;
1997        ArrayList<ServiceRecord> services = new ArrayList<ServiceRecord>();
1998        if (userId == UserHandle.USER_ALL) {
1999            for (int i=0; i<mServiceMap.size(); i++) {
2000                didSomething |= collectForceStopServicesLocked(name, userId, evenPersistent,
2001                        doit, mServiceMap.valueAt(i).mServicesByName, services);
2002                if (!doit && didSomething) {
2003                    return true;
2004                }
2005            }
2006        } else {
2007            ServiceMap smap = mServiceMap.get(userId);
2008            if (smap != null) {
2009                ArrayMap<ComponentName, ServiceRecord> items = smap.mServicesByName;
2010                didSomething = collectForceStopServicesLocked(name, userId, evenPersistent,
2011                        doit, items, services);
2012            }
2013        }
2014
2015        int N = services.size();
2016        for (int i=0; i<N; i++) {
2017            bringDownServiceLocked(services.get(i));
2018        }
2019        return didSomething;
2020    }
2021
2022    void cleanUpRemovedTaskLocked(TaskRecord tr, ComponentName component, Intent baseIntent) {
2023        ArrayList<ServiceRecord> services = new ArrayList<ServiceRecord>();
2024        ArrayMap<ComponentName, ServiceRecord> alls = getServices(tr.userId);
2025        for (int i=0; i<alls.size(); i++) {
2026            ServiceRecord sr = alls.valueAt(i);
2027            if (sr.packageName.equals(component.getPackageName())) {
2028                services.add(sr);
2029            }
2030        }
2031
2032        // Take care of any running services associated with the app.
2033        for (int i=0; i<services.size(); i++) {
2034            ServiceRecord sr = services.get(i);
2035            if (sr.startRequested) {
2036                if ((sr.serviceInfo.flags&ServiceInfo.FLAG_STOP_WITH_TASK) != 0) {
2037                    Slog.i(TAG, "Stopping service " + sr.shortName + ": remove task");
2038                    stopServiceLocked(sr);
2039                } else {
2040                    sr.pendingStarts.add(new ServiceRecord.StartItem(sr, true,
2041                            sr.makeNextStartId(), baseIntent, null));
2042                    if (sr.app != null && sr.app.thread != null) {
2043                        // We always run in the foreground, since this is called as
2044                        // part of the "remove task" UI operation.
2045                        sendServiceArgsLocked(sr, true, false);
2046                    }
2047                }
2048            }
2049        }
2050    }
2051
2052    final void killServicesLocked(ProcessRecord app, boolean allowRestart) {
2053        // Report disconnected services.
2054        if (false) {
2055            // XXX we are letting the client link to the service for
2056            // death notifications.
2057            if (app.services.size() > 0) {
2058                Iterator<ServiceRecord> it = app.services.iterator();
2059                while (it.hasNext()) {
2060                    ServiceRecord r = it.next();
2061                    for (int conni=r.connections.size()-1; conni>=0; conni--) {
2062                        ArrayList<ConnectionRecord> cl = r.connections.valueAt(conni);
2063                        for (int i=0; i<cl.size(); i++) {
2064                            ConnectionRecord c = cl.get(i);
2065                            if (c.binding.client != app) {
2066                                try {
2067                                    //c.conn.connected(r.className, null);
2068                                } catch (Exception e) {
2069                                    // todo: this should be asynchronous!
2070                                    Slog.w(TAG, "Exception thrown disconnected servce "
2071                                          + r.shortName
2072                                          + " from app " + app.processName, e);
2073                                }
2074                            }
2075                        }
2076                    }
2077                }
2078            }
2079        }
2080
2081        // First clear app state from services.
2082        for (int i=app.services.size()-1; i>=0; i--) {
2083            ServiceRecord sr = app.services.valueAt(i);
2084            synchronized (sr.stats.getBatteryStats()) {
2085                sr.stats.stopLaunchedLocked();
2086            }
2087            if (sr.app != app && sr.app != null && !sr.app.persistent) {
2088                sr.app.services.remove(sr);
2089            }
2090            sr.app = null;
2091            sr.isolatedProc = null;
2092            sr.executeNesting = 0;
2093            sr.forceClearTracker();
2094            if (mDestroyingServices.remove(sr)) {
2095                if (DEBUG_SERVICE) Slog.v(TAG, "killServices remove destroying " + sr);
2096            }
2097
2098            final int numClients = sr.bindings.size();
2099            for (int bindingi=numClients-1; bindingi>=0; bindingi--) {
2100                IntentBindRecord b = sr.bindings.valueAt(bindingi);
2101                if (DEBUG_SERVICE) Slog.v(TAG, "Killing binding " + b
2102                        + ": shouldUnbind=" + b.hasBound);
2103                b.binder = null;
2104                b.requested = b.received = b.hasBound = false;
2105                // If this binding is coming from a cached process and is asking to keep
2106                // the service created, then we'll kill the cached process as well -- we
2107                // don't want to be thrashing around restarting processes that are only
2108                // there to be cached.
2109                for (int appi=b.apps.size()-1; appi>=0; appi--) {
2110                    final ProcessRecord proc = b.apps.keyAt(appi);
2111                    // If the process is already gone, skip it.
2112                    if (proc.killedByAm || proc.thread == null) {
2113                        continue;
2114                    }
2115                    // Only do this for processes that have an auto-create binding;
2116                    // otherwise the binding can be left, because it won't cause the
2117                    // service to restart.
2118                    final AppBindRecord abind = b.apps.valueAt(appi);
2119                    boolean hasCreate = false;
2120                    for (int conni=abind.connections.size()-1; conni>=0; conni--) {
2121                        ConnectionRecord conn = abind.connections.valueAt(conni);
2122                        if ((conn.flags&Context.BIND_AUTO_CREATE) != 0) {
2123                            hasCreate = true;
2124                            break;
2125                        }
2126                    }
2127                    if (!hasCreate) {
2128                        continue;
2129                    }
2130                    if (proc != null && !proc.persistent && proc.thread != null
2131                            && proc.pid != 0 && proc.pid != ActivityManagerService.MY_PID
2132                            && proc.setProcState >= ActivityManager.PROCESS_STATE_LAST_ACTIVITY) {
2133                        proc.kill("bound to service " + sr.name.flattenToShortString()
2134                                + " in dying proc " + (app != null ? app.processName : "??"), true);
2135                    }
2136                }
2137            }
2138        }
2139
2140        // Clean up any connections this application has to other services.
2141        for (int i=app.connections.size()-1; i>=0; i--) {
2142            ConnectionRecord r = app.connections.valueAt(i);
2143            removeConnectionLocked(r, app, null);
2144        }
2145        updateServiceConnectionActivitiesLocked(app);
2146        app.connections.clear();
2147
2148        ServiceMap smap = getServiceMap(app.userId);
2149
2150        // Now do remaining service cleanup.
2151        for (int i=app.services.size()-1; i>=0; i--) {
2152            ServiceRecord sr = app.services.valueAt(i);
2153
2154            // Unless the process is persistent, this process record is going away,
2155            // so make sure the service is cleaned out of it.
2156            if (!app.persistent) {
2157                app.services.removeAt(i);
2158            }
2159
2160            // Sanity check: if the service listed for the app is not one
2161            // we actually are maintaining, just let it drop.
2162            final ServiceRecord curRec = smap.mServicesByName.get(sr.name);
2163            if (curRec != sr) {
2164                if (curRec != null) {
2165                    Slog.wtf(TAG, "Service " + sr + " in process " + app
2166                            + " not same as in map: " + curRec);
2167                }
2168                continue;
2169            }
2170
2171            // Any services running in the application may need to be placed
2172            // back in the pending list.
2173            if (allowRestart && sr.crashCount >= 2 && (sr.serviceInfo.applicationInfo.flags
2174                    &ApplicationInfo.FLAG_PERSISTENT) == 0) {
2175                Slog.w(TAG, "Service crashed " + sr.crashCount
2176                        + " times, stopping: " + sr);
2177                EventLog.writeEvent(EventLogTags.AM_SERVICE_CRASHED_TOO_MUCH,
2178                        sr.userId, sr.crashCount, sr.shortName, app.pid);
2179                bringDownServiceLocked(sr);
2180            } else if (!allowRestart) {
2181                bringDownServiceLocked(sr);
2182            } else {
2183                boolean canceled = scheduleServiceRestartLocked(sr, true);
2184
2185                // Should the service remain running?  Note that in the
2186                // extreme case of so many attempts to deliver a command
2187                // that it failed we also will stop it here.
2188                if (sr.startRequested && (sr.stopIfKilled || canceled)) {
2189                    if (sr.pendingStarts.size() == 0) {
2190                        sr.startRequested = false;
2191                        if (sr.tracker != null) {
2192                            sr.tracker.setStarted(false, mAm.mProcessStats.getMemFactorLocked(),
2193                                    SystemClock.uptimeMillis());
2194                        }
2195                        if (!sr.hasAutoCreateConnections()) {
2196                            // Whoops, no reason to restart!
2197                            bringDownServiceLocked(sr);
2198                        }
2199                    }
2200                }
2201            }
2202        }
2203
2204        if (!allowRestart) {
2205            app.services.clear();
2206
2207            // Make sure there are no more restarting services for this process.
2208            for (int i=mRestartingServices.size()-1; i>=0; i--) {
2209                ServiceRecord r = mRestartingServices.get(i);
2210                if (r.processName.equals(app.processName) &&
2211                        r.serviceInfo.applicationInfo.uid == app.info.uid) {
2212                    mRestartingServices.remove(i);
2213                    clearRestartingIfNeededLocked(r);
2214                }
2215            }
2216            for (int i=mPendingServices.size()-1; i>=0; i--) {
2217                ServiceRecord r = mPendingServices.get(i);
2218                if (r.processName.equals(app.processName) &&
2219                        r.serviceInfo.applicationInfo.uid == app.info.uid) {
2220                    mPendingServices.remove(i);
2221                }
2222            }
2223        }
2224
2225        // Make sure we have no more records on the stopping list.
2226        int i = mDestroyingServices.size();
2227        while (i > 0) {
2228            i--;
2229            ServiceRecord sr = mDestroyingServices.get(i);
2230            if (sr.app == app) {
2231                sr.forceClearTracker();
2232                mDestroyingServices.remove(i);
2233                if (DEBUG_SERVICE) Slog.v(TAG, "killServices remove destroying " + sr);
2234            }
2235        }
2236
2237        app.executingServices.clear();
2238    }
2239
2240    ActivityManager.RunningServiceInfo makeRunningServiceInfoLocked(ServiceRecord r) {
2241        ActivityManager.RunningServiceInfo info =
2242            new ActivityManager.RunningServiceInfo();
2243        info.service = r.name;
2244        if (r.app != null) {
2245            info.pid = r.app.pid;
2246        }
2247        info.uid = r.appInfo.uid;
2248        info.process = r.processName;
2249        info.foreground = r.isForeground;
2250        info.activeSince = r.createTime;
2251        info.started = r.startRequested;
2252        info.clientCount = r.connections.size();
2253        info.crashCount = r.crashCount;
2254        info.lastActivityTime = r.lastActivity;
2255        if (r.isForeground) {
2256            info.flags |= ActivityManager.RunningServiceInfo.FLAG_FOREGROUND;
2257        }
2258        if (r.startRequested) {
2259            info.flags |= ActivityManager.RunningServiceInfo.FLAG_STARTED;
2260        }
2261        if (r.app != null && r.app.pid == ActivityManagerService.MY_PID) {
2262            info.flags |= ActivityManager.RunningServiceInfo.FLAG_SYSTEM_PROCESS;
2263        }
2264        if (r.app != null && r.app.persistent) {
2265            info.flags |= ActivityManager.RunningServiceInfo.FLAG_PERSISTENT_PROCESS;
2266        }
2267
2268        for (int conni=r.connections.size()-1; conni>=0; conni--) {
2269            ArrayList<ConnectionRecord> connl = r.connections.valueAt(conni);
2270            for (int i=0; i<connl.size(); i++) {
2271                ConnectionRecord conn = connl.get(i);
2272                if (conn.clientLabel != 0) {
2273                    info.clientPackage = conn.binding.client.info.packageName;
2274                    info.clientLabel = conn.clientLabel;
2275                    return info;
2276                }
2277            }
2278        }
2279        return info;
2280    }
2281
2282    List<ActivityManager.RunningServiceInfo> getRunningServiceInfoLocked(int maxNum,
2283            int flags) {
2284        ArrayList<ActivityManager.RunningServiceInfo> res
2285                = new ArrayList<ActivityManager.RunningServiceInfo>();
2286
2287        final int uid = Binder.getCallingUid();
2288        final long ident = Binder.clearCallingIdentity();
2289        try {
2290            if (ActivityManager.checkUidPermission(
2291                    android.Manifest.permission.INTERACT_ACROSS_USERS_FULL,
2292                    uid) == PackageManager.PERMISSION_GRANTED) {
2293                int[] users = mAm.getUsersLocked();
2294                for (int ui=0; ui<users.length && res.size() < maxNum; ui++) {
2295                    ArrayMap<ComponentName, ServiceRecord> alls = getServices(users[ui]);
2296                    for (int i=0; i<alls.size() && res.size() < maxNum; i++) {
2297                        ServiceRecord sr = alls.valueAt(i);
2298                        res.add(makeRunningServiceInfoLocked(sr));
2299                    }
2300                }
2301
2302                for (int i=0; i<mRestartingServices.size() && res.size() < maxNum; i++) {
2303                    ServiceRecord r = mRestartingServices.get(i);
2304                    ActivityManager.RunningServiceInfo info =
2305                            makeRunningServiceInfoLocked(r);
2306                    info.restarting = r.nextRestartTime;
2307                    res.add(info);
2308                }
2309            } else {
2310                int userId = UserHandle.getUserId(uid);
2311                ArrayMap<ComponentName, ServiceRecord> alls = getServices(userId);
2312                for (int i=0; i<alls.size() && res.size() < maxNum; i++) {
2313                    ServiceRecord sr = alls.valueAt(i);
2314                    res.add(makeRunningServiceInfoLocked(sr));
2315                }
2316
2317                for (int i=0; i<mRestartingServices.size() && res.size() < maxNum; i++) {
2318                    ServiceRecord r = mRestartingServices.get(i);
2319                    if (r.userId == userId) {
2320                        ActivityManager.RunningServiceInfo info =
2321                                makeRunningServiceInfoLocked(r);
2322                        info.restarting = r.nextRestartTime;
2323                        res.add(info);
2324                    }
2325                }
2326            }
2327        } finally {
2328            Binder.restoreCallingIdentity(ident);
2329        }
2330
2331        return res;
2332    }
2333
2334    public PendingIntent getRunningServiceControlPanelLocked(ComponentName name) {
2335        int userId = UserHandle.getUserId(Binder.getCallingUid());
2336        ServiceRecord r = getServiceByName(name, userId);
2337        if (r != null) {
2338            for (int conni=r.connections.size()-1; conni>=0; conni--) {
2339                ArrayList<ConnectionRecord> conn = r.connections.valueAt(conni);
2340                for (int i=0; i<conn.size(); i++) {
2341                    if (conn.get(i).clientIntent != null) {
2342                        return conn.get(i).clientIntent;
2343                    }
2344                }
2345            }
2346        }
2347        return null;
2348    }
2349
2350    void serviceTimeout(ProcessRecord proc) {
2351        String anrMessage = null;
2352
2353        synchronized(this) {
2354            if (proc.executingServices.size() == 0 || proc.thread == null) {
2355                return;
2356            }
2357            long maxTime = SystemClock.uptimeMillis() -
2358                    (proc.execServicesFg ? SERVICE_TIMEOUT : SERVICE_BACKGROUND_TIMEOUT);
2359            ServiceRecord timeout = null;
2360            long nextTime = 0;
2361            for (int i=proc.executingServices.size()-1; i>=0; i--) {
2362                ServiceRecord sr = proc.executingServices.valueAt(i);
2363                if (sr.executingStart < maxTime) {
2364                    timeout = sr;
2365                    break;
2366                }
2367                if (sr.executingStart > nextTime) {
2368                    nextTime = sr.executingStart;
2369                }
2370            }
2371            if (timeout != null && mAm.mLruProcesses.contains(proc)) {
2372                Slog.w(TAG, "Timeout executing service: " + timeout);
2373                anrMessage = "Executing service " + timeout.shortName;
2374            } else {
2375                Message msg = mAm.mHandler.obtainMessage(
2376                        ActivityManagerService.SERVICE_TIMEOUT_MSG);
2377                msg.obj = proc;
2378                mAm.mHandler.sendMessageAtTime(msg, proc.execServicesFg
2379                        ? (nextTime+SERVICE_TIMEOUT) : (nextTime + SERVICE_BACKGROUND_TIMEOUT));
2380            }
2381        }
2382
2383        if (anrMessage != null) {
2384            mAm.appNotResponding(proc, null, null, false, anrMessage);
2385        }
2386    }
2387
2388    void scheduleServiceTimeoutLocked(ProcessRecord proc) {
2389        if (proc.executingServices.size() == 0 || proc.thread == null) {
2390            return;
2391        }
2392        long now = SystemClock.uptimeMillis();
2393        Message msg = mAm.mHandler.obtainMessage(
2394                ActivityManagerService.SERVICE_TIMEOUT_MSG);
2395        msg.obj = proc;
2396        mAm.mHandler.sendMessageAtTime(msg,
2397                proc.execServicesFg ? (now+SERVICE_TIMEOUT) : (now+ SERVICE_BACKGROUND_TIMEOUT));
2398    }
2399
2400    /**
2401     * Prints a list of ServiceRecords (dumpsys activity services)
2402     */
2403    void dumpServicesLocked(FileDescriptor fd, PrintWriter pw, String[] args,
2404            int opti, boolean dumpAll, boolean dumpClient, String dumpPackage) {
2405        boolean needSep = false;
2406        boolean printedAnything = false;
2407
2408        ItemMatcher matcher = new ItemMatcher();
2409        matcher.build(args, opti);
2410
2411        pw.println("ACTIVITY MANAGER SERVICES (dumpsys activity services)");
2412        try {
2413            int[] users = mAm.getUsersLocked();
2414            for (int user : users) {
2415                ServiceMap smap = getServiceMap(user);
2416                boolean printed = false;
2417                if (smap.mServicesByName.size() > 0) {
2418                    long nowReal = SystemClock.elapsedRealtime();
2419                    needSep = false;
2420                    for (int si=0; si<smap.mServicesByName.size(); si++) {
2421                        ServiceRecord r = smap.mServicesByName.valueAt(si);
2422                        if (!matcher.match(r, r.name)) {
2423                            continue;
2424                        }
2425                        if (dumpPackage != null && !dumpPackage.equals(r.appInfo.packageName)) {
2426                            continue;
2427                        }
2428                        if (!printed) {
2429                            if (printedAnything) {
2430                                pw.println();
2431                            }
2432                            pw.println("  User " + user + " active services:");
2433                            printed = true;
2434                        }
2435                        printedAnything = true;
2436                        if (needSep) {
2437                            pw.println();
2438                        }
2439                        pw.print("  * ");
2440                        pw.println(r);
2441                        if (dumpAll) {
2442                            r.dump(pw, "    ");
2443                            needSep = true;
2444                        } else {
2445                            pw.print("    app=");
2446                            pw.println(r.app);
2447                            pw.print("    created=");
2448                            TimeUtils.formatDuration(r.createTime, nowReal, pw);
2449                            pw.print(" started=");
2450                            pw.print(r.startRequested);
2451                            pw.print(" connections=");
2452                            pw.println(r.connections.size());
2453                            if (r.connections.size() > 0) {
2454                                pw.println("    Connections:");
2455                                for (int conni=0; conni<r.connections.size(); conni++) {
2456                                    ArrayList<ConnectionRecord> clist = r.connections.valueAt(conni);
2457                                    for (int i = 0; i < clist.size(); i++) {
2458                                        ConnectionRecord conn = clist.get(i);
2459                                        pw.print("      ");
2460                                        pw.print(conn.binding.intent.intent.getIntent()
2461                                                .toShortString(false, false, false, false));
2462                                        pw.print(" -> ");
2463                                        ProcessRecord proc = conn.binding.client;
2464                                        pw.println(proc != null ? proc.toShortString() : "null");
2465                                    }
2466                                }
2467                            }
2468                        }
2469                        if (dumpClient && r.app != null && r.app.thread != null) {
2470                            pw.println("    Client:");
2471                            pw.flush();
2472                            try {
2473                                TransferPipe tp = new TransferPipe();
2474                                try {
2475                                    r.app.thread.dumpService(tp.getWriteFd().getFileDescriptor(),
2476                                            r, args);
2477                                    tp.setBufferPrefix("      ");
2478                                    // Short timeout, since blocking here can
2479                                    // deadlock with the application.
2480                                    tp.go(fd, 2000);
2481                                } finally {
2482                                    tp.kill();
2483                                }
2484                            } catch (IOException e) {
2485                                pw.println("      Failure while dumping the service: " + e);
2486                            } catch (RemoteException e) {
2487                                pw.println("      Got a RemoteException while dumping the service");
2488                            }
2489                            needSep = true;
2490                        }
2491                    }
2492                    needSep |= printed;
2493                }
2494                printed = false;
2495                for (int si=0, SN=smap.mDelayedStartList.size(); si<SN; si++) {
2496                    ServiceRecord r = smap.mDelayedStartList.get(si);
2497                    if (!matcher.match(r, r.name)) {
2498                        continue;
2499                    }
2500                    if (dumpPackage != null && !dumpPackage.equals(r.appInfo.packageName)) {
2501                        continue;
2502                    }
2503                    if (!printed) {
2504                        if (printedAnything) {
2505                            pw.println();
2506                        }
2507                        pw.println("  User " + user + " delayed start services:");
2508                        printed = true;
2509                    }
2510                    printedAnything = true;
2511                    pw.print("  * Delayed start "); pw.println(r);
2512                }
2513                printed = false;
2514                for (int si=0, SN=smap.mStartingBackground.size(); si<SN; si++) {
2515                    ServiceRecord r = smap.mStartingBackground.get(si);
2516                    if (!matcher.match(r, r.name)) {
2517                        continue;
2518                    }
2519                    if (dumpPackage != null && !dumpPackage.equals(r.appInfo.packageName)) {
2520                        continue;
2521                    }
2522                    if (!printed) {
2523                        if (printedAnything) {
2524                            pw.println();
2525                        }
2526                        pw.println("  User " + user + " starting in background:");
2527                        printed = true;
2528                    }
2529                    printedAnything = true;
2530                    pw.print("  * Starting bg "); pw.println(r);
2531                }
2532            }
2533        } catch (Exception e) {
2534            Slog.w(TAG, "Exception in dumpServicesLocked", e);
2535        }
2536
2537        if (mPendingServices.size() > 0) {
2538            boolean printed = false;
2539            for (int i=0; i<mPendingServices.size(); i++) {
2540                ServiceRecord r = mPendingServices.get(i);
2541                if (!matcher.match(r, r.name)) {
2542                    continue;
2543                }
2544                if (dumpPackage != null && !dumpPackage.equals(r.appInfo.packageName)) {
2545                    continue;
2546                }
2547                printedAnything = true;
2548                if (!printed) {
2549                    if (needSep) pw.println();
2550                    needSep = true;
2551                    pw.println("  Pending services:");
2552                    printed = true;
2553                }
2554                pw.print("  * Pending "); pw.println(r);
2555                r.dump(pw, "    ");
2556            }
2557            needSep = true;
2558        }
2559
2560        if (mRestartingServices.size() > 0) {
2561            boolean printed = false;
2562            for (int i=0; i<mRestartingServices.size(); i++) {
2563                ServiceRecord r = mRestartingServices.get(i);
2564                if (!matcher.match(r, r.name)) {
2565                    continue;
2566                }
2567                if (dumpPackage != null && !dumpPackage.equals(r.appInfo.packageName)) {
2568                    continue;
2569                }
2570                printedAnything = true;
2571                if (!printed) {
2572                    if (needSep) pw.println();
2573                    needSep = true;
2574                    pw.println("  Restarting services:");
2575                    printed = true;
2576                }
2577                pw.print("  * Restarting "); pw.println(r);
2578                r.dump(pw, "    ");
2579            }
2580            needSep = true;
2581        }
2582
2583        if (mDestroyingServices.size() > 0) {
2584            boolean printed = false;
2585            for (int i=0; i< mDestroyingServices.size(); i++) {
2586                ServiceRecord r = mDestroyingServices.get(i);
2587                if (!matcher.match(r, r.name)) {
2588                    continue;
2589                }
2590                if (dumpPackage != null && !dumpPackage.equals(r.appInfo.packageName)) {
2591                    continue;
2592                }
2593                printedAnything = true;
2594                if (!printed) {
2595                    if (needSep) pw.println();
2596                    needSep = true;
2597                    pw.println("  Destroying services:");
2598                    printed = true;
2599                }
2600                pw.print("  * Destroy "); pw.println(r);
2601                r.dump(pw, "    ");
2602            }
2603            needSep = true;
2604        }
2605
2606        if (dumpAll) {
2607            boolean printed = false;
2608            for (int ic=0; ic<mServiceConnections.size(); ic++) {
2609                ArrayList<ConnectionRecord> r = mServiceConnections.valueAt(ic);
2610                for (int i=0; i<r.size(); i++) {
2611                    ConnectionRecord cr = r.get(i);
2612                    if (!matcher.match(cr.binding.service, cr.binding.service.name)) {
2613                        continue;
2614                    }
2615                    if (dumpPackage != null && (cr.binding.client == null
2616                            || !dumpPackage.equals(cr.binding.client.info.packageName))) {
2617                        continue;
2618                    }
2619                    printedAnything = true;
2620                    if (!printed) {
2621                        if (needSep) pw.println();
2622                        needSep = true;
2623                        pw.println("  Connection bindings to services:");
2624                        printed = true;
2625                    }
2626                    pw.print("  * "); pw.println(cr);
2627                    cr.dump(pw, "    ");
2628                }
2629            }
2630        }
2631
2632        if (!printedAnything) {
2633            pw.println("  (nothing)");
2634        }
2635    }
2636
2637    /**
2638     * There are three ways to call this:
2639     *  - no service specified: dump all the services
2640     *  - a flattened component name that matched an existing service was specified as the
2641     *    first arg: dump that one service
2642     *  - the first arg isn't the flattened component name of an existing service:
2643     *    dump all services whose component contains the first arg as a substring
2644     */
2645    protected boolean dumpService(FileDescriptor fd, PrintWriter pw, String name, String[] args,
2646            int opti, boolean dumpAll) {
2647        ArrayList<ServiceRecord> services = new ArrayList<ServiceRecord>();
2648
2649        synchronized (this) {
2650            int[] users = mAm.getUsersLocked();
2651            if ("all".equals(name)) {
2652                for (int user : users) {
2653                    ServiceMap smap = mServiceMap.get(user);
2654                    if (smap == null) {
2655                        continue;
2656                    }
2657                    ArrayMap<ComponentName, ServiceRecord> alls = smap.mServicesByName;
2658                    for (int i=0; i<alls.size(); i++) {
2659                        ServiceRecord r1 = alls.valueAt(i);
2660                        services.add(r1);
2661                    }
2662                }
2663            } else {
2664                ComponentName componentName = name != null
2665                        ? ComponentName.unflattenFromString(name) : null;
2666                int objectId = 0;
2667                if (componentName == null) {
2668                    // Not a '/' separated full component name; maybe an object ID?
2669                    try {
2670                        objectId = Integer.parseInt(name, 16);
2671                        name = null;
2672                        componentName = null;
2673                    } catch (RuntimeException e) {
2674                    }
2675                }
2676
2677                for (int user : users) {
2678                    ServiceMap smap = mServiceMap.get(user);
2679                    if (smap == null) {
2680                        continue;
2681                    }
2682                    ArrayMap<ComponentName, ServiceRecord> alls = smap.mServicesByName;
2683                    for (int i=0; i<alls.size(); i++) {
2684                        ServiceRecord r1 = alls.valueAt(i);
2685                        if (componentName != null) {
2686                            if (r1.name.equals(componentName)) {
2687                                services.add(r1);
2688                            }
2689                        } else if (name != null) {
2690                            if (r1.name.flattenToString().contains(name)) {
2691                                services.add(r1);
2692                            }
2693                        } else if (System.identityHashCode(r1) == objectId) {
2694                            services.add(r1);
2695                        }
2696                    }
2697                }
2698            }
2699        }
2700
2701        if (services.size() <= 0) {
2702            return false;
2703        }
2704
2705        boolean needSep = false;
2706        for (int i=0; i<services.size(); i++) {
2707            if (needSep) {
2708                pw.println();
2709            }
2710            needSep = true;
2711            dumpService("", fd, pw, services.get(i), args, dumpAll);
2712        }
2713        return true;
2714    }
2715
2716    /**
2717     * Invokes IApplicationThread.dumpService() on the thread of the specified service if
2718     * there is a thread associated with the service.
2719     */
2720    private void dumpService(String prefix, FileDescriptor fd, PrintWriter pw,
2721            final ServiceRecord r, String[] args, boolean dumpAll) {
2722        String innerPrefix = prefix + "  ";
2723        synchronized (this) {
2724            pw.print(prefix); pw.print("SERVICE ");
2725                    pw.print(r.shortName); pw.print(" ");
2726                    pw.print(Integer.toHexString(System.identityHashCode(r)));
2727                    pw.print(" pid=");
2728                    if (r.app != null) pw.println(r.app.pid);
2729                    else pw.println("(not running)");
2730            if (dumpAll) {
2731                r.dump(pw, innerPrefix);
2732            }
2733        }
2734        if (r.app != null && r.app.thread != null) {
2735            pw.print(prefix); pw.println("  Client:");
2736            pw.flush();
2737            try {
2738                TransferPipe tp = new TransferPipe();
2739                try {
2740                    r.app.thread.dumpService(tp.getWriteFd().getFileDescriptor(), r, args);
2741                    tp.setBufferPrefix(prefix + "    ");
2742                    tp.go(fd);
2743                } finally {
2744                    tp.kill();
2745                }
2746            } catch (IOException e) {
2747                pw.println(prefix + "    Failure while dumping the service: " + e);
2748            } catch (RemoteException e) {
2749                pw.println(prefix + "    Got a RemoteException while dumping the service");
2750            }
2751        }
2752    }
2753
2754}
2755