BroadcastQueue.java revision 76e800928f46337a1b365b21bf752a44ffd1954d
1/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 *      http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server.am;
18
19import java.io.FileDescriptor;
20import java.io.PrintWriter;
21import java.text.SimpleDateFormat;
22import java.util.ArrayList;
23import java.util.Date;
24import java.util.Set;
25
26import android.app.ActivityManager;
27import android.app.AppGlobals;
28import android.app.AppOpsManager;
29import android.app.BroadcastOptions;
30import android.app.PendingIntent;
31import android.content.ComponentName;
32import android.content.IIntentReceiver;
33import android.content.IIntentSender;
34import android.content.Intent;
35import android.content.IntentSender;
36import android.content.pm.ActivityInfo;
37import android.content.pm.PackageManager;
38import android.content.pm.ResolveInfo;
39import android.os.Build;
40import android.os.Bundle;
41import android.os.Handler;
42import android.os.IBinder;
43import android.os.Looper;
44import android.os.Message;
45import android.os.Process;
46import android.os.RemoteException;
47import android.os.SystemClock;
48import android.os.UserHandle;
49import android.util.EventLog;
50import android.util.Slog;
51import android.util.TimeUtils;
52import com.android.server.DeviceIdleController;
53import com.android.server.LocalServices;
54
55import static com.android.server.am.ActivityManagerDebugConfig.*;
56
57/**
58 * BROADCASTS
59 *
60 * We keep two broadcast queues and associated bookkeeping, one for those at
61 * foreground priority, and one for normal (background-priority) broadcasts.
62 */
63public final class BroadcastQueue {
64    private static final String TAG = "BroadcastQueue";
65    private static final String TAG_MU = TAG + POSTFIX_MU;
66    private static final String TAG_BROADCAST = TAG + POSTFIX_BROADCAST;
67
68    static final int MAX_BROADCAST_HISTORY = ActivityManager.isLowRamDeviceStatic() ? 10 : 50;
69    static final int MAX_BROADCAST_SUMMARY_HISTORY
70            = ActivityManager.isLowRamDeviceStatic() ? 25 : 300;
71
72    final ActivityManagerService mService;
73
74    /**
75     * Recognizable moniker for this queue
76     */
77    final String mQueueName;
78
79    /**
80     * Timeout period for this queue's broadcasts
81     */
82    final long mTimeoutPeriod;
83
84    /**
85     * If true, we can delay broadcasts while waiting services to finish in the previous
86     * receiver's process.
87     */
88    final boolean mDelayBehindServices;
89
90    /**
91     * Lists of all active broadcasts that are to be executed immediately
92     * (without waiting for another broadcast to finish).  Currently this only
93     * contains broadcasts to registered receivers, to avoid spinning up
94     * a bunch of processes to execute IntentReceiver components.  Background-
95     * and foreground-priority broadcasts are queued separately.
96     */
97    final ArrayList<BroadcastRecord> mParallelBroadcasts = new ArrayList<>();
98
99    /**
100     * List of all active broadcasts that are to be executed one at a time.
101     * The object at the top of the list is the currently activity broadcasts;
102     * those after it are waiting for the top to finish.  As with parallel
103     * broadcasts, separate background- and foreground-priority queues are
104     * maintained.
105     */
106    final ArrayList<BroadcastRecord> mOrderedBroadcasts = new ArrayList<>();
107
108    /**
109     * Historical data of past broadcasts, for debugging.  This is a ring buffer
110     * whose last element is at mHistoryNext.
111     */
112    final BroadcastRecord[] mBroadcastHistory = new BroadcastRecord[MAX_BROADCAST_HISTORY];
113    int mHistoryNext = 0;
114
115    /**
116     * Summary of historical data of past broadcasts, for debugging.  This is a
117     * ring buffer whose last element is at mSummaryHistoryNext.
118     */
119    final Intent[] mBroadcastSummaryHistory = new Intent[MAX_BROADCAST_SUMMARY_HISTORY];
120    int mSummaryHistoryNext = 0;
121
122    /**
123     * Various milestone timestamps of entries in the mBroadcastSummaryHistory ring
124     * buffer, also tracked via the mSummaryHistoryNext index.  These are all in wall
125     * clock time, not elapsed.
126     */
127    final long[] mSummaryHistoryEnqueueTime = new  long[MAX_BROADCAST_SUMMARY_HISTORY];
128    final long[] mSummaryHistoryDispatchTime = new  long[MAX_BROADCAST_SUMMARY_HISTORY];
129    final long[] mSummaryHistoryFinishTime = new  long[MAX_BROADCAST_SUMMARY_HISTORY];
130
131    /**
132     * Set when we current have a BROADCAST_INTENT_MSG in flight.
133     */
134    boolean mBroadcastsScheduled = false;
135
136    /**
137     * True if we have a pending unexpired BROADCAST_TIMEOUT_MSG posted to our handler.
138     */
139    boolean mPendingBroadcastTimeoutMessage;
140
141    /**
142     * Intent broadcasts that we have tried to start, but are
143     * waiting for the application's process to be created.  We only
144     * need one per scheduling class (instead of a list) because we always
145     * process broadcasts one at a time, so no others can be started while
146     * waiting for this one.
147     */
148    BroadcastRecord mPendingBroadcast = null;
149
150    /**
151     * The receiver index that is pending, to restart the broadcast if needed.
152     */
153    int mPendingBroadcastRecvIndex;
154
155    static final int BROADCAST_INTENT_MSG = ActivityManagerService.FIRST_BROADCAST_QUEUE_MSG;
156    static final int BROADCAST_TIMEOUT_MSG = ActivityManagerService.FIRST_BROADCAST_QUEUE_MSG + 1;
157    static final int SCHEDULE_TEMP_WHITELIST_MSG
158            = ActivityManagerService.FIRST_BROADCAST_QUEUE_MSG + 2;
159
160    final BroadcastHandler mHandler;
161
162    private final class BroadcastHandler extends Handler {
163        public BroadcastHandler(Looper looper) {
164            super(looper, null, true);
165        }
166
167        @Override
168        public void handleMessage(Message msg) {
169            switch (msg.what) {
170                case BROADCAST_INTENT_MSG: {
171                    if (DEBUG_BROADCAST) Slog.v(
172                            TAG_BROADCAST, "Received BROADCAST_INTENT_MSG");
173                    processNextBroadcast(true);
174                } break;
175                case BROADCAST_TIMEOUT_MSG: {
176                    synchronized (mService) {
177                        broadcastTimeoutLocked(true);
178                    }
179                } break;
180                case SCHEDULE_TEMP_WHITELIST_MSG: {
181                    DeviceIdleController.LocalService dic = mService.mLocalDeviceIdleController;
182                    if (dic != null) {
183                        dic.addPowerSaveTempWhitelistAppDirect(UserHandle.getAppId(msg.arg1),
184                                msg.arg2, true, (String)msg.obj);
185                    }
186                } break;
187            }
188        }
189    }
190
191    private final class AppNotResponding implements Runnable {
192        private final ProcessRecord mApp;
193        private final String mAnnotation;
194
195        public AppNotResponding(ProcessRecord app, String annotation) {
196            mApp = app;
197            mAnnotation = annotation;
198        }
199
200        @Override
201        public void run() {
202            mService.appNotResponding(mApp, null, null, false, mAnnotation);
203        }
204    }
205
206    BroadcastQueue(ActivityManagerService service, Handler handler,
207            String name, long timeoutPeriod, boolean allowDelayBehindServices) {
208        mService = service;
209        mHandler = new BroadcastHandler(handler.getLooper());
210        mQueueName = name;
211        mTimeoutPeriod = timeoutPeriod;
212        mDelayBehindServices = allowDelayBehindServices;
213    }
214
215    public boolean isPendingBroadcastProcessLocked(int pid) {
216        return mPendingBroadcast != null && mPendingBroadcast.curApp.pid == pid;
217    }
218
219    public void enqueueParallelBroadcastLocked(BroadcastRecord r) {
220        mParallelBroadcasts.add(r);
221        r.enqueueClockTime = System.currentTimeMillis();
222    }
223
224    public void enqueueOrderedBroadcastLocked(BroadcastRecord r) {
225        mOrderedBroadcasts.add(r);
226        r.enqueueClockTime = System.currentTimeMillis();
227    }
228
229    public final boolean replaceParallelBroadcastLocked(BroadcastRecord r) {
230        for (int i = mParallelBroadcasts.size() - 1; i >= 0; i--) {
231            if (r.intent.filterEquals(mParallelBroadcasts.get(i).intent)) {
232                if (DEBUG_BROADCAST) Slog.v(TAG_BROADCAST,
233                        "***** DROPPING PARALLEL ["
234                + mQueueName + "]: " + r.intent);
235                mParallelBroadcasts.set(i, r);
236                return true;
237            }
238        }
239        return false;
240    }
241
242    public final boolean replaceOrderedBroadcastLocked(BroadcastRecord r) {
243        for (int i = mOrderedBroadcasts.size() - 1; i > 0; i--) {
244            if (r.intent.filterEquals(mOrderedBroadcasts.get(i).intent)) {
245                if (DEBUG_BROADCAST) Slog.v(TAG_BROADCAST,
246                        "***** DROPPING ORDERED ["
247                        + mQueueName + "]: " + r.intent);
248                mOrderedBroadcasts.set(i, r);
249                return true;
250            }
251        }
252        return false;
253    }
254
255    private final void processCurBroadcastLocked(BroadcastRecord r,
256            ProcessRecord app) throws RemoteException {
257        if (DEBUG_BROADCAST)  Slog.v(TAG_BROADCAST,
258                "Process cur broadcast " + r + " for app " + app);
259        if (app.thread == null) {
260            throw new RemoteException();
261        }
262        r.receiver = app.thread.asBinder();
263        r.curApp = app;
264        app.curReceiver = r;
265        app.forceProcessStateUpTo(ActivityManager.PROCESS_STATE_RECEIVER);
266        mService.updateLruProcessLocked(app, false, null);
267        mService.updateOomAdjLocked();
268
269        // Tell the application to launch this receiver.
270        r.intent.setComponent(r.curComponent);
271
272        boolean started = false;
273        try {
274            if (DEBUG_BROADCAST_LIGHT) Slog.v(TAG_BROADCAST,
275                    "Delivering to component " + r.curComponent
276                    + ": " + r);
277            mService.notifyPackageUse(r.intent.getComponent().getPackageName());
278            app.thread.scheduleReceiver(new Intent(r.intent), r.curReceiver,
279                    mService.compatibilityInfoForPackageLocked(r.curReceiver.applicationInfo),
280                    r.resultCode, r.resultData, r.resultExtras, r.ordered, r.userId,
281                    app.repProcState);
282            if (DEBUG_BROADCAST)  Slog.v(TAG_BROADCAST,
283                    "Process cur broadcast " + r + " DELIVERED for app " + app);
284            started = true;
285        } finally {
286            if (!started) {
287                if (DEBUG_BROADCAST)  Slog.v(TAG_BROADCAST,
288                        "Process cur broadcast " + r + ": NOT STARTED!");
289                r.receiver = null;
290                r.curApp = null;
291                app.curReceiver = null;
292            }
293        }
294    }
295
296    public boolean sendPendingBroadcastsLocked(ProcessRecord app) {
297        boolean didSomething = false;
298        final BroadcastRecord br = mPendingBroadcast;
299        if (br != null && br.curApp.pid == app.pid) {
300            try {
301                mPendingBroadcast = null;
302                processCurBroadcastLocked(br, app);
303                didSomething = true;
304            } catch (Exception e) {
305                Slog.w(TAG, "Exception in new application when starting receiver "
306                        + br.curComponent.flattenToShortString(), e);
307                logBroadcastReceiverDiscardLocked(br);
308                finishReceiverLocked(br, br.resultCode, br.resultData,
309                        br.resultExtras, br.resultAbort, false);
310                scheduleBroadcastsLocked();
311                // We need to reset the state if we failed to start the receiver.
312                br.state = BroadcastRecord.IDLE;
313                throw new RuntimeException(e.getMessage());
314            }
315        }
316        return didSomething;
317    }
318
319    public void skipPendingBroadcastLocked(int pid) {
320        final BroadcastRecord br = mPendingBroadcast;
321        if (br != null && br.curApp.pid == pid) {
322            br.state = BroadcastRecord.IDLE;
323            br.nextReceiver = mPendingBroadcastRecvIndex;
324            mPendingBroadcast = null;
325            scheduleBroadcastsLocked();
326        }
327    }
328
329    public void skipCurrentReceiverLocked(ProcessRecord app) {
330        BroadcastRecord r = null;
331        if (mOrderedBroadcasts.size() > 0) {
332            BroadcastRecord br = mOrderedBroadcasts.get(0);
333            if (br.curApp == app) {
334                r = br;
335            }
336        }
337        if (r == null && mPendingBroadcast != null && mPendingBroadcast.curApp == app) {
338            if (DEBUG_BROADCAST) Slog.v(TAG_BROADCAST,
339                    "[" + mQueueName + "] skip & discard pending app " + r);
340            r = mPendingBroadcast;
341        }
342
343        if (r != null) {
344            logBroadcastReceiverDiscardLocked(r);
345            finishReceiverLocked(r, r.resultCode, r.resultData,
346                    r.resultExtras, r.resultAbort, false);
347            scheduleBroadcastsLocked();
348        }
349    }
350
351    public void scheduleBroadcastsLocked() {
352        if (DEBUG_BROADCAST) Slog.v(TAG_BROADCAST, "Schedule broadcasts ["
353                + mQueueName + "]: current="
354                + mBroadcastsScheduled);
355
356        if (mBroadcastsScheduled) {
357            return;
358        }
359        mHandler.sendMessage(mHandler.obtainMessage(BROADCAST_INTENT_MSG, this));
360        mBroadcastsScheduled = true;
361    }
362
363    public BroadcastRecord getMatchingOrderedReceiver(IBinder receiver) {
364        if (mOrderedBroadcasts.size() > 0) {
365            final BroadcastRecord r = mOrderedBroadcasts.get(0);
366            if (r != null && r.receiver == receiver) {
367                return r;
368            }
369        }
370        return null;
371    }
372
373    public boolean finishReceiverLocked(BroadcastRecord r, int resultCode,
374            String resultData, Bundle resultExtras, boolean resultAbort, boolean waitForServices) {
375        final int state = r.state;
376        final ActivityInfo receiver = r.curReceiver;
377        r.state = BroadcastRecord.IDLE;
378        if (state == BroadcastRecord.IDLE) {
379            Slog.w(TAG, "finishReceiver [" + mQueueName + "] called but state is IDLE");
380        }
381        r.receiver = null;
382        r.intent.setComponent(null);
383        if (r.curApp != null && r.curApp.curReceiver == r) {
384            r.curApp.curReceiver = null;
385        }
386        if (r.curFilter != null) {
387            r.curFilter.receiverList.curBroadcast = null;
388        }
389        r.curFilter = null;
390        r.curReceiver = null;
391        r.curApp = null;
392        mPendingBroadcast = null;
393
394        r.resultCode = resultCode;
395        r.resultData = resultData;
396        r.resultExtras = resultExtras;
397        if (resultAbort && (r.intent.getFlags()&Intent.FLAG_RECEIVER_NO_ABORT) == 0) {
398            r.resultAbort = resultAbort;
399        } else {
400            r.resultAbort = false;
401        }
402
403        if (waitForServices && r.curComponent != null && r.queue.mDelayBehindServices
404                && r.queue.mOrderedBroadcasts.size() > 0
405                && r.queue.mOrderedBroadcasts.get(0) == r) {
406            ActivityInfo nextReceiver;
407            if (r.nextReceiver < r.receivers.size()) {
408                Object obj = r.receivers.get(r.nextReceiver);
409                nextReceiver = (obj instanceof ActivityInfo) ? (ActivityInfo)obj : null;
410            } else {
411                nextReceiver = null;
412            }
413            // Don't do this if the next receive is in the same process as the current one.
414            if (receiver == null || nextReceiver == null
415                    || receiver.applicationInfo.uid != nextReceiver.applicationInfo.uid
416                    || !receiver.processName.equals(nextReceiver.processName)) {
417                // In this case, we are ready to process the next receiver for the current broadcast,
418                // but are on a queue that would like to wait for services to finish before moving
419                // on.  If there are background services currently starting, then we will go into a
420                // special state where we hold off on continuing this broadcast until they are done.
421                if (mService.mServices.hasBackgroundServices(r.userId)) {
422                    Slog.i(TAG, "Delay finish: " + r.curComponent.flattenToShortString());
423                    r.state = BroadcastRecord.WAITING_SERVICES;
424                    return false;
425                }
426            }
427        }
428
429        r.curComponent = null;
430
431        // We will process the next receiver right now if this is finishing
432        // an app receiver (which is always asynchronous) or after we have
433        // come back from calling a receiver.
434        return state == BroadcastRecord.APP_RECEIVE
435                || state == BroadcastRecord.CALL_DONE_RECEIVE;
436    }
437
438    public void backgroundServicesFinishedLocked(int userId) {
439        if (mOrderedBroadcasts.size() > 0) {
440            BroadcastRecord br = mOrderedBroadcasts.get(0);
441            if (br.userId == userId && br.state == BroadcastRecord.WAITING_SERVICES) {
442                Slog.i(TAG, "Resuming delayed broadcast");
443                br.curComponent = null;
444                br.state = BroadcastRecord.IDLE;
445                processNextBroadcast(false);
446            }
447        }
448    }
449
450    private static void performReceiveLocked(ProcessRecord app, IIntentReceiver receiver,
451            Intent intent, int resultCode, String data, Bundle extras,
452            boolean ordered, boolean sticky, int sendingUser) throws RemoteException {
453        // Send the intent to the receiver asynchronously using one-way binder calls.
454        if (app != null) {
455            if (app.thread != null) {
456                // If we have an app thread, do the call through that so it is
457                // correctly ordered with other one-way calls.
458                app.thread.scheduleRegisteredReceiver(receiver, intent, resultCode,
459                        data, extras, ordered, sticky, sendingUser, app.repProcState);
460            } else {
461                // Application has died. Receiver doesn't exist.
462                throw new RemoteException("app.thread must not be null");
463            }
464        } else {
465            receiver.performReceive(intent, resultCode, data, extras, ordered,
466                    sticky, sendingUser);
467        }
468    }
469
470    private void deliverToRegisteredReceiverLocked(BroadcastRecord r,
471            BroadcastFilter filter, boolean ordered) {
472        boolean skip = false;
473        if (filter.requiredPermission != null) {
474            int perm = mService.checkComponentPermission(filter.requiredPermission,
475                    r.callingPid, r.callingUid, -1, true);
476            if (perm != PackageManager.PERMISSION_GRANTED) {
477                Slog.w(TAG, "Permission Denial: broadcasting "
478                        + r.intent.toString()
479                        + " from " + r.callerPackage + " (pid="
480                        + r.callingPid + ", uid=" + r.callingUid + ")"
481                        + " requires " + filter.requiredPermission
482                        + " due to registered receiver " + filter);
483                skip = true;
484            } else {
485                final int opCode = AppOpsManager.permissionToOpCode(filter.requiredPermission);
486                if (opCode != AppOpsManager.OP_NONE
487                        && mService.mAppOpsService.noteOperation(opCode, r.callingUid,
488                                r.callerPackage) != AppOpsManager.MODE_ALLOWED) {
489                    Slog.w(TAG, "Appop Denial: broadcasting "
490                            + r.intent.toString()
491                            + " from " + r.callerPackage + " (pid="
492                            + r.callingPid + ", uid=" + r.callingUid + ")"
493                            + " requires appop " + AppOpsManager.permissionToOp(
494                                    filter.requiredPermission)
495                            + " due to registered receiver " + filter);
496                    skip = true;
497                }
498            }
499        }
500        if (!skip && r.requiredPermissions != null && r.requiredPermissions.length > 0) {
501            for (int i = 0; i < r.requiredPermissions.length; i++) {
502                String requiredPermission = r.requiredPermissions[i];
503                int perm = mService.checkComponentPermission(requiredPermission,
504                        filter.receiverList.pid, filter.receiverList.uid, -1, true);
505                if (perm != PackageManager.PERMISSION_GRANTED) {
506                    Slog.w(TAG, "Permission Denial: receiving "
507                            + r.intent.toString()
508                            + " to " + filter.receiverList.app
509                            + " (pid=" + filter.receiverList.pid
510                            + ", uid=" + filter.receiverList.uid + ")"
511                            + " requires " + requiredPermission
512                            + " due to sender " + r.callerPackage
513                            + " (uid " + r.callingUid + ")");
514                    skip = true;
515                    break;
516                }
517                int appOp = AppOpsManager.permissionToOpCode(requiredPermission);
518                if (appOp != AppOpsManager.OP_NONE && appOp != r.appOp
519                        && mService.mAppOpsService.noteOperation(appOp,
520                        filter.receiverList.uid, filter.packageName)
521                        != AppOpsManager.MODE_ALLOWED) {
522                    Slog.w(TAG, "Appop Denial: receiving "
523                            + r.intent.toString()
524                            + " to " + filter.receiverList.app
525                            + " (pid=" + filter.receiverList.pid
526                            + ", uid=" + filter.receiverList.uid + ")"
527                            + " requires appop " + AppOpsManager.permissionToOp(
528                            requiredPermission)
529                            + " due to sender " + r.callerPackage
530                            + " (uid " + r.callingUid + ")");
531                    skip = true;
532                    break;
533                }
534            }
535        }
536        if (!skip && (r.requiredPermissions == null || r.requiredPermissions.length == 0)) {
537            int perm = mService.checkComponentPermission(null,
538                    filter.receiverList.pid, filter.receiverList.uid, -1, true);
539            if (perm != PackageManager.PERMISSION_GRANTED) {
540                Slog.w(TAG, "Permission Denial: security check failed when receiving "
541                        + r.intent.toString()
542                        + " to " + filter.receiverList.app
543                        + " (pid=" + filter.receiverList.pid
544                        + ", uid=" + filter.receiverList.uid + ")"
545                        + " due to sender " + r.callerPackage
546                        + " (uid " + r.callingUid + ")");
547                skip = true;
548            }
549        }
550        if (!skip && r.appOp != AppOpsManager.OP_NONE
551                && mService.mAppOpsService.noteOperation(r.appOp,
552                filter.receiverList.uid, filter.packageName)
553                != AppOpsManager.MODE_ALLOWED) {
554            Slog.w(TAG, "Appop Denial: receiving "
555                    + r.intent.toString()
556                    + " to " + filter.receiverList.app
557                    + " (pid=" + filter.receiverList.pid
558                    + ", uid=" + filter.receiverList.uid + ")"
559                    + " requires appop " + AppOpsManager.opToName(r.appOp)
560                    + " due to sender " + r.callerPackage
561                    + " (uid " + r.callingUid + ")");
562            skip = true;
563        }
564        if (!skip) {
565            final int allowed = mService.checkAllowBackgroundLocked(filter.receiverList.uid,
566                    filter.packageName, -1);
567            if (allowed == ActivityManager.APP_START_MODE_DISABLED) {
568                Slog.w(TAG, "Background execution not allowed: receiving "
569                        + r.intent
570                        + " to " + filter.receiverList.app
571                        + " (pid=" + filter.receiverList.pid
572                        + ", uid=" + filter.receiverList.uid + ")");
573                skip = true;
574            }
575        }
576
577        if (!mService.mIntentFirewall.checkBroadcast(r.intent, r.callingUid,
578                r.callingPid, r.resolvedType, filter.receiverList.uid)) {
579            return;
580        }
581
582        if (filter.receiverList.app == null || filter.receiverList.app.crashing) {
583            Slog.w(TAG, "Skipping deliver [" + mQueueName + "] " + r
584                    + " to " + filter.receiverList + ": process crashing");
585            skip = true;
586        }
587
588        if (!skip) {
589            // If permissions need a review before any of the app components can run, we drop
590            // the broadcast and if the calling app is in the foreground and the broadcast is
591            // explicit we launch the review UI passing it a pending intent to send the skipped
592            // broadcast.
593            if (Build.PERMISSIONS_REVIEW_REQUIRED) {
594                if (!requestStartTargetPermissionsReviewIfNeededLocked(r, filter.packageName,
595                        filter.owningUserId)) {
596                    return;
597                }
598            }
599
600            // If this is not being sent as an ordered broadcast, then we
601            // don't want to touch the fields that keep track of the current
602            // state of ordered broadcasts.
603            if (ordered) {
604                r.receiver = filter.receiverList.receiver.asBinder();
605                r.curFilter = filter;
606                filter.receiverList.curBroadcast = r;
607                r.state = BroadcastRecord.CALL_IN_RECEIVE;
608                if (filter.receiverList.app != null) {
609                    // Bump hosting application to no longer be in background
610                    // scheduling class.  Note that we can't do that if there
611                    // isn't an app...  but we can only be in that case for
612                    // things that directly call the IActivityManager API, which
613                    // are already core system stuff so don't matter for this.
614                    r.curApp = filter.receiverList.app;
615                    filter.receiverList.app.curReceiver = r;
616                    mService.updateOomAdjLocked(r.curApp);
617                }
618            }
619            try {
620                if (DEBUG_BROADCAST_LIGHT) Slog.i(TAG_BROADCAST,
621                        "Delivering to " + filter + " : " + r);
622                performReceiveLocked(filter.receiverList.app, filter.receiverList.receiver,
623                        new Intent(r.intent), r.resultCode, r.resultData,
624                        r.resultExtras, r.ordered, r.initialSticky, r.userId);
625                if (ordered) {
626                    r.state = BroadcastRecord.CALL_DONE_RECEIVE;
627                }
628            } catch (RemoteException e) {
629                Slog.w(TAG, "Failure sending broadcast " + r.intent, e);
630                if (ordered) {
631                    r.receiver = null;
632                    r.curFilter = null;
633                    filter.receiverList.curBroadcast = null;
634                    if (filter.receiverList.app != null) {
635                        filter.receiverList.app.curReceiver = null;
636                    }
637                }
638            }
639        }
640    }
641
642    private boolean requestStartTargetPermissionsReviewIfNeededLocked(
643            BroadcastRecord receiverRecord, String receivingPackageName,
644            final int receivingUserId) {
645        if (!mService.getPackageManagerInternalLocked().isPermissionsReviewRequired(
646                receivingPackageName, receivingUserId)) {
647            return true;
648        }
649
650        final boolean callerForeground = receiverRecord.callerApp != null
651                ? receiverRecord.callerApp.setSchedGroup != Process.THREAD_GROUP_BG_NONINTERACTIVE
652                : true;
653
654        // Show a permission review UI only for explicit broadcast from a foreground app
655        if (callerForeground && receiverRecord.intent.getComponent() != null) {
656            IIntentSender target = mService.getIntentSenderLocked(
657                    ActivityManager.INTENT_SENDER_BROADCAST, receiverRecord.callerPackage,
658                    receiverRecord.callingUid, receiverRecord.userId, null, null, 0,
659                    new Intent[]{receiverRecord.intent},
660                    new String[]{receiverRecord.intent.resolveType(mService.mContext
661                            .getContentResolver())},
662                    PendingIntent.FLAG_CANCEL_CURRENT | PendingIntent.FLAG_ONE_SHOT
663                            | PendingIntent.FLAG_IMMUTABLE, null);
664
665            final Intent intent = new Intent(Intent.ACTION_REVIEW_PERMISSIONS);
666            intent.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK
667                    | Intent.FLAG_ACTIVITY_EXCLUDE_FROM_RECENTS);
668            intent.putExtra(Intent.EXTRA_PACKAGE_NAME, receivingPackageName);
669            intent.putExtra(Intent.EXTRA_INTENT, new IntentSender(target));
670
671            if (DEBUG_PERMISSIONS_REVIEW) {
672                Slog.i(TAG, "u" + receivingUserId + " Launching permission review for package "
673                        + receivingPackageName);
674            }
675
676            mHandler.post(new Runnable() {
677                @Override
678                public void run() {
679                    mService.mContext.startActivityAsUser(intent, new UserHandle(receivingUserId));
680                }
681            });
682        } else {
683            Slog.w(TAG, "u" + receivingUserId + " Receiving a broadcast in package"
684                    + receivingPackageName + " requires a permissions review");
685        }
686
687        return false;
688    }
689
690    final void scheduleTempWhitelistLocked(int uid, long duration, BroadcastRecord r) {
691        if (duration > Integer.MAX_VALUE) {
692            duration = Integer.MAX_VALUE;
693        }
694        // XXX ideally we should pause the broadcast until everything behind this is done,
695        // or else we will likely start dispatching the broadcast before we have opened
696        // access to the app (there is a lot of asynchronicity behind this).  It is probably
697        // not that big a deal, however, because the main purpose here is to allow apps
698        // to hold wake locks, and they will be able to acquire their wake lock immediately
699        // it just won't be enabled until we get through this work.
700        StringBuilder b = new StringBuilder();
701        b.append("broadcast:");
702        UserHandle.formatUid(b, r.callingUid);
703        b.append(":");
704        if (r.intent.getAction() != null) {
705            b.append(r.intent.getAction());
706        } else if (r.intent.getComponent() != null) {
707            b.append(r.intent.getComponent().flattenToShortString());
708        } else if (r.intent.getData() != null) {
709            b.append(r.intent.getData());
710        }
711        mHandler.obtainMessage(SCHEDULE_TEMP_WHITELIST_MSG, uid, (int)duration, b.toString())
712                .sendToTarget();
713    }
714
715    final void processNextBroadcast(boolean fromMsg) {
716        synchronized(mService) {
717            BroadcastRecord r;
718
719            if (DEBUG_BROADCAST) Slog.v(TAG_BROADCAST, "processNextBroadcast ["
720                    + mQueueName + "]: "
721                    + mParallelBroadcasts.size() + " broadcasts, "
722                    + mOrderedBroadcasts.size() + " ordered broadcasts");
723
724            mService.updateCpuStats();
725
726            if (fromMsg) {
727                mBroadcastsScheduled = false;
728            }
729
730            // First, deliver any non-serialized broadcasts right away.
731            while (mParallelBroadcasts.size() > 0) {
732                r = mParallelBroadcasts.remove(0);
733                r.dispatchTime = SystemClock.uptimeMillis();
734                r.dispatchClockTime = System.currentTimeMillis();
735                final int N = r.receivers.size();
736                if (DEBUG_BROADCAST_LIGHT) Slog.v(TAG_BROADCAST, "Processing parallel broadcast ["
737                        + mQueueName + "] " + r);
738                for (int i=0; i<N; i++) {
739                    Object target = r.receivers.get(i);
740                    if (DEBUG_BROADCAST)  Slog.v(TAG_BROADCAST,
741                            "Delivering non-ordered on [" + mQueueName + "] to registered "
742                            + target + ": " + r);
743                    deliverToRegisteredReceiverLocked(r, (BroadcastFilter)target, false);
744                }
745                addBroadcastToHistoryLocked(r);
746                if (DEBUG_BROADCAST_LIGHT) Slog.v(TAG_BROADCAST, "Done with parallel broadcast ["
747                        + mQueueName + "] " + r);
748            }
749
750            // Now take care of the next serialized one...
751
752            // If we are waiting for a process to come up to handle the next
753            // broadcast, then do nothing at this point.  Just in case, we
754            // check that the process we're waiting for still exists.
755            if (mPendingBroadcast != null) {
756                if (DEBUG_BROADCAST_LIGHT) Slog.v(TAG_BROADCAST,
757                        "processNextBroadcast [" + mQueueName + "]: waiting for "
758                        + mPendingBroadcast.curApp);
759
760                boolean isDead;
761                synchronized (mService.mPidsSelfLocked) {
762                    ProcessRecord proc = mService.mPidsSelfLocked.get(mPendingBroadcast.curApp.pid);
763                    isDead = proc == null || proc.crashing;
764                }
765                if (!isDead) {
766                    // It's still alive, so keep waiting
767                    return;
768                } else {
769                    Slog.w(TAG, "pending app  ["
770                            + mQueueName + "]" + mPendingBroadcast.curApp
771                            + " died before responding to broadcast");
772                    mPendingBroadcast.state = BroadcastRecord.IDLE;
773                    mPendingBroadcast.nextReceiver = mPendingBroadcastRecvIndex;
774                    mPendingBroadcast = null;
775                }
776            }
777
778            boolean looped = false;
779
780            do {
781                if (mOrderedBroadcasts.size() == 0) {
782                    // No more broadcasts pending, so all done!
783                    mService.scheduleAppGcsLocked();
784                    if (looped) {
785                        // If we had finished the last ordered broadcast, then
786                        // make sure all processes have correct oom and sched
787                        // adjustments.
788                        mService.updateOomAdjLocked();
789                    }
790                    return;
791                }
792                r = mOrderedBroadcasts.get(0);
793                boolean forceReceive = false;
794
795                // Ensure that even if something goes awry with the timeout
796                // detection, we catch "hung" broadcasts here, discard them,
797                // and continue to make progress.
798                //
799                // This is only done if the system is ready so that PRE_BOOT_COMPLETED
800                // receivers don't get executed with timeouts. They're intended for
801                // one time heavy lifting after system upgrades and can take
802                // significant amounts of time.
803                int numReceivers = (r.receivers != null) ? r.receivers.size() : 0;
804                if (mService.mProcessesReady && r.dispatchTime > 0) {
805                    long now = SystemClock.uptimeMillis();
806                    if ((numReceivers > 0) &&
807                            (now > r.dispatchTime + (2*mTimeoutPeriod*numReceivers))) {
808                        Slog.w(TAG, "Hung broadcast ["
809                                + mQueueName + "] discarded after timeout failure:"
810                                + " now=" + now
811                                + " dispatchTime=" + r.dispatchTime
812                                + " startTime=" + r.receiverTime
813                                + " intent=" + r.intent
814                                + " numReceivers=" + numReceivers
815                                + " nextReceiver=" + r.nextReceiver
816                                + " state=" + r.state);
817                        broadcastTimeoutLocked(false); // forcibly finish this broadcast
818                        forceReceive = true;
819                        r.state = BroadcastRecord.IDLE;
820                    }
821                }
822
823                if (r.state != BroadcastRecord.IDLE) {
824                    if (DEBUG_BROADCAST) Slog.d(TAG_BROADCAST,
825                            "processNextBroadcast("
826                            + mQueueName + ") called when not idle (state="
827                            + r.state + ")");
828                    return;
829                }
830
831                if (r.receivers == null || r.nextReceiver >= numReceivers
832                        || r.resultAbort || forceReceive) {
833                    // No more receivers for this broadcast!  Send the final
834                    // result if requested...
835                    if (r.resultTo != null) {
836                        try {
837                            if (DEBUG_BROADCAST) Slog.i(TAG_BROADCAST,
838                                    "Finishing broadcast [" + mQueueName + "] "
839                                    + r.intent.getAction() + " app=" + r.callerApp);
840                            performReceiveLocked(r.callerApp, r.resultTo,
841                                new Intent(r.intent), r.resultCode,
842                                r.resultData, r.resultExtras, false, false, r.userId);
843                            // Set this to null so that the reference
844                            // (local and remote) isn't kept in the mBroadcastHistory.
845                            r.resultTo = null;
846                        } catch (RemoteException e) {
847                            r.resultTo = null;
848                            Slog.w(TAG, "Failure ["
849                                    + mQueueName + "] sending broadcast result of "
850                                    + r.intent, e);
851                        }
852                    }
853
854                    if (DEBUG_BROADCAST) Slog.v(TAG_BROADCAST, "Cancelling BROADCAST_TIMEOUT_MSG");
855                    cancelBroadcastTimeoutLocked();
856
857                    if (DEBUG_BROADCAST_LIGHT) Slog.v(TAG_BROADCAST,
858                            "Finished with ordered broadcast " + r);
859
860                    // ... and on to the next...
861                    addBroadcastToHistoryLocked(r);
862                    mOrderedBroadcasts.remove(0);
863                    r = null;
864                    looped = true;
865                    continue;
866                }
867            } while (r == null);
868
869            // Get the next receiver...
870            int recIdx = r.nextReceiver++;
871
872            // Keep track of when this receiver started, and make sure there
873            // is a timeout message pending to kill it if need be.
874            r.receiverTime = SystemClock.uptimeMillis();
875            if (recIdx == 0) {
876                r.dispatchTime = r.receiverTime;
877                r.dispatchClockTime = System.currentTimeMillis();
878                if (DEBUG_BROADCAST_LIGHT) Slog.v(TAG_BROADCAST, "Processing ordered broadcast ["
879                        + mQueueName + "] " + r);
880            }
881            if (! mPendingBroadcastTimeoutMessage) {
882                long timeoutTime = r.receiverTime + mTimeoutPeriod;
883                if (DEBUG_BROADCAST) Slog.v(TAG_BROADCAST,
884                        "Submitting BROADCAST_TIMEOUT_MSG ["
885                        + mQueueName + "] for " + r + " at " + timeoutTime);
886                setBroadcastTimeoutLocked(timeoutTime);
887            }
888
889            final BroadcastOptions brOptions = r.options;
890            final Object nextReceiver = r.receivers.get(recIdx);
891
892            if (nextReceiver instanceof BroadcastFilter) {
893                // Simple case: this is a registered receiver who gets
894                // a direct call.
895                BroadcastFilter filter = (BroadcastFilter)nextReceiver;
896                if (DEBUG_BROADCAST)  Slog.v(TAG_BROADCAST,
897                        "Delivering ordered ["
898                        + mQueueName + "] to registered "
899                        + filter + ": " + r);
900                deliverToRegisteredReceiverLocked(r, filter, r.ordered);
901                if (r.receiver == null || !r.ordered) {
902                    // The receiver has already finished, so schedule to
903                    // process the next one.
904                    if (DEBUG_BROADCAST) Slog.v(TAG_BROADCAST, "Quick finishing ["
905                            + mQueueName + "]: ordered="
906                            + r.ordered + " receiver=" + r.receiver);
907                    r.state = BroadcastRecord.IDLE;
908                    scheduleBroadcastsLocked();
909                } else {
910                    if (brOptions != null && brOptions.getTemporaryAppWhitelistDuration() > 0) {
911                        scheduleTempWhitelistLocked(filter.owningUid,
912                                brOptions.getTemporaryAppWhitelistDuration(), r);
913                    }
914                }
915                return;
916            }
917
918            // Hard case: need to instantiate the receiver, possibly
919            // starting its application process to host it.
920
921            ResolveInfo info =
922                (ResolveInfo)nextReceiver;
923            ComponentName component = new ComponentName(
924                    info.activityInfo.applicationInfo.packageName,
925                    info.activityInfo.name);
926
927            boolean skip = false;
928            int perm = mService.checkComponentPermission(info.activityInfo.permission,
929                    r.callingPid, r.callingUid, info.activityInfo.applicationInfo.uid,
930                    info.activityInfo.exported);
931            if (perm != PackageManager.PERMISSION_GRANTED) {
932                if (!info.activityInfo.exported) {
933                    Slog.w(TAG, "Permission Denial: broadcasting "
934                            + r.intent.toString()
935                            + " from " + r.callerPackage + " (pid=" + r.callingPid
936                            + ", uid=" + r.callingUid + ")"
937                            + " is not exported from uid " + info.activityInfo.applicationInfo.uid
938                            + " due to receiver " + component.flattenToShortString());
939                } else {
940                    Slog.w(TAG, "Permission Denial: broadcasting "
941                            + r.intent.toString()
942                            + " from " + r.callerPackage + " (pid=" + r.callingPid
943                            + ", uid=" + r.callingUid + ")"
944                            + " requires " + info.activityInfo.permission
945                            + " due to receiver " + component.flattenToShortString());
946                }
947                skip = true;
948            } else if (info.activityInfo.permission != null) {
949                final int opCode = AppOpsManager.permissionToOpCode(info.activityInfo.permission);
950                if (opCode != AppOpsManager.OP_NONE
951                        && mService.mAppOpsService.noteOperation(opCode, r.callingUid,
952                                r.callerPackage) != AppOpsManager.MODE_ALLOWED) {
953                    Slog.w(TAG, "Appop Denial: broadcasting "
954                            + r.intent.toString()
955                            + " from " + r.callerPackage + " (pid="
956                            + r.callingPid + ", uid=" + r.callingUid + ")"
957                            + " requires appop " + AppOpsManager.permissionToOp(
958                                    info.activityInfo.permission)
959                            + " due to registered receiver "
960                            + component.flattenToShortString());
961                    skip = true;
962                }
963            }
964            if (!skip && info.activityInfo.applicationInfo.uid != Process.SYSTEM_UID &&
965                r.requiredPermissions != null && r.requiredPermissions.length > 0) {
966                for (int i = 0; i < r.requiredPermissions.length; i++) {
967                    String requiredPermission = r.requiredPermissions[i];
968                    try {
969                        perm = AppGlobals.getPackageManager().
970                                checkPermission(requiredPermission,
971                                        info.activityInfo.applicationInfo.packageName,
972                                        UserHandle
973                                                .getUserId(info.activityInfo.applicationInfo.uid));
974                    } catch (RemoteException e) {
975                        perm = PackageManager.PERMISSION_DENIED;
976                    }
977                    if (perm != PackageManager.PERMISSION_GRANTED) {
978                        Slog.w(TAG, "Permission Denial: receiving "
979                                + r.intent + " to "
980                                + component.flattenToShortString()
981                                + " requires " + requiredPermission
982                                + " due to sender " + r.callerPackage
983                                + " (uid " + r.callingUid + ")");
984                        skip = true;
985                        break;
986                    }
987                    int appOp = AppOpsManager.permissionToOpCode(requiredPermission);
988                    if (appOp != AppOpsManager.OP_NONE && appOp != r.appOp
989                            && mService.mAppOpsService.noteOperation(appOp,
990                            info.activityInfo.applicationInfo.uid, info.activityInfo.packageName)
991                            != AppOpsManager.MODE_ALLOWED) {
992                        Slog.w(TAG, "Appop Denial: receiving "
993                                + r.intent + " to "
994                                + component.flattenToShortString()
995                                + " requires appop " + AppOpsManager.permissionToOp(
996                                requiredPermission)
997                                + " due to sender " + r.callerPackage
998                                + " (uid " + r.callingUid + ")");
999                        skip = true;
1000                        break;
1001                    }
1002                }
1003            }
1004            if (!skip && r.appOp != AppOpsManager.OP_NONE
1005                    && mService.mAppOpsService.noteOperation(r.appOp,
1006                    info.activityInfo.applicationInfo.uid, info.activityInfo.packageName)
1007                    != AppOpsManager.MODE_ALLOWED) {
1008                Slog.w(TAG, "Appop Denial: receiving "
1009                        + r.intent + " to "
1010                        + component.flattenToShortString()
1011                        + " requires appop " + AppOpsManager.opToName(r.appOp)
1012                        + " due to sender " + r.callerPackage
1013                        + " (uid " + r.callingUid + ")");
1014                skip = true;
1015            }
1016            if (!skip) {
1017                skip = !mService.mIntentFirewall.checkBroadcast(r.intent, r.callingUid,
1018                        r.callingPid, r.resolvedType, info.activityInfo.applicationInfo.uid);
1019            }
1020            boolean isSingleton = false;
1021            try {
1022                isSingleton = mService.isSingleton(info.activityInfo.processName,
1023                        info.activityInfo.applicationInfo,
1024                        info.activityInfo.name, info.activityInfo.flags);
1025            } catch (SecurityException e) {
1026                Slog.w(TAG, e.getMessage());
1027                skip = true;
1028            }
1029            if ((info.activityInfo.flags&ActivityInfo.FLAG_SINGLE_USER) != 0) {
1030                if (ActivityManager.checkUidPermission(
1031                        android.Manifest.permission.INTERACT_ACROSS_USERS,
1032                        info.activityInfo.applicationInfo.uid)
1033                                != PackageManager.PERMISSION_GRANTED) {
1034                    Slog.w(TAG, "Permission Denial: Receiver " + component.flattenToShortString()
1035                            + " requests FLAG_SINGLE_USER, but app does not hold "
1036                            + android.Manifest.permission.INTERACT_ACROSS_USERS);
1037                    skip = true;
1038                }
1039            }
1040            if (r.curApp != null && r.curApp.crashing) {
1041                // If the target process is crashing, just skip it.
1042                Slog.w(TAG, "Skipping deliver ordered [" + mQueueName + "] " + r
1043                        + " to " + r.curApp + ": process crashing");
1044                skip = true;
1045            }
1046            if (!skip) {
1047                boolean isAvailable = false;
1048                try {
1049                    isAvailable = AppGlobals.getPackageManager().isPackageAvailable(
1050                            info.activityInfo.packageName,
1051                            UserHandle.getUserId(info.activityInfo.applicationInfo.uid));
1052                } catch (Exception e) {
1053                    // all such failures mean we skip this receiver
1054                    Slog.w(TAG, "Exception getting recipient info for "
1055                            + info.activityInfo.packageName, e);
1056                }
1057                if (!isAvailable) {
1058                    if (DEBUG_BROADCAST) Slog.v(TAG_BROADCAST,
1059                            "Skipping delivery to " + info.activityInfo.packageName + " / "
1060                            + info.activityInfo.applicationInfo.uid
1061                            + " : package no longer available");
1062                    skip = true;
1063                }
1064            }
1065
1066            // If permissions need a review before any of the app components can run, we drop
1067            // the broadcast and if the calling app is in the foreground and the broadcast is
1068            // explicit we launch the review UI passing it a pending intent to send the skipped
1069            // broadcast.
1070            if (Build.PERMISSIONS_REVIEW_REQUIRED && !skip) {
1071                if (!requestStartTargetPermissionsReviewIfNeededLocked(r,
1072                        info.activityInfo.packageName, UserHandle.getUserId(
1073                                info.activityInfo.applicationInfo.uid))) {
1074                    skip = true;
1075                }
1076            }
1077
1078            // This is safe to do even if we are skipping the broadcast, and we need
1079            // this information now to evaluate whether it is going to be allowed to run.
1080            final int receiverUid = info.activityInfo.applicationInfo.uid;
1081            // If it's a singleton, it needs to be the same app or a special app
1082            if (r.callingUid != Process.SYSTEM_UID && isSingleton
1083                    && mService.isValidSingletonCall(r.callingUid, receiverUid)) {
1084                info.activityInfo = mService.getActivityInfoForUser(info.activityInfo, 0);
1085            }
1086            String targetProcess = info.activityInfo.processName;
1087            ProcessRecord app = mService.getProcessRecordLocked(targetProcess,
1088                    info.activityInfo.applicationInfo.uid, false);
1089
1090            if (!skip) {
1091                final int allowed = mService.checkAllowBackgroundLocked(
1092                        info.activityInfo.applicationInfo.uid, info.activityInfo.packageName, -1);
1093                if (allowed != ActivityManager.APP_START_MODE_NORMAL) {
1094                    // We won't allow this receiver to be launched if the app has been
1095                    // completely disabled from launches, or it is delayed and the broadcast
1096                    // was not explicitly sent to it and this would result in a new process
1097                    // for it being created.
1098                    if (allowed == ActivityManager.APP_START_MODE_DISABLED) {
1099                        Slog.w(TAG, "Background execution disabled: receiving "
1100                                + r.intent + " to "
1101                                + component.flattenToShortString());
1102                        skip = true;
1103                    }
1104                    if (((r.intent.getFlags()&Intent.FLAG_RECEIVER_EXCLUDE_BACKGROUND) != 0)
1105                            || (r.intent.getComponent() == null
1106                                && r.intent.getPackage() == null && app == null
1107                                && ((r.intent.getFlags()
1108                                        & Intent.FLAG_RECEIVER_INCLUDE_BACKGROUND) == 0))) {
1109                        Slog.w(TAG, "Background execution not allowed: receiving "
1110                                + r.intent + " to "
1111                                + component.flattenToShortString());
1112                        skip = true;
1113                    }
1114                }
1115            }
1116
1117            if (skip) {
1118                if (DEBUG_BROADCAST)  Slog.v(TAG_BROADCAST,
1119                        "Skipping delivery of ordered [" + mQueueName + "] "
1120                        + r + " for whatever reason");
1121                r.receiver = null;
1122                r.curFilter = null;
1123                r.state = BroadcastRecord.IDLE;
1124                scheduleBroadcastsLocked();
1125                return;
1126            }
1127
1128            r.state = BroadcastRecord.APP_RECEIVE;
1129            r.curComponent = component;
1130            r.curReceiver = info.activityInfo;
1131            if (DEBUG_MU && r.callingUid > UserHandle.PER_USER_RANGE) {
1132                Slog.v(TAG_MU, "Updated broadcast record activity info for secondary user, "
1133                        + info.activityInfo + ", callingUid = " + r.callingUid + ", uid = "
1134                        + info.activityInfo.applicationInfo.uid);
1135            }
1136
1137            if (brOptions != null && brOptions.getTemporaryAppWhitelistDuration() > 0) {
1138                scheduleTempWhitelistLocked(receiverUid,
1139                        brOptions.getTemporaryAppWhitelistDuration(), r);
1140            }
1141
1142            // Broadcast is being executed, its package can't be stopped.
1143            try {
1144                AppGlobals.getPackageManager().setPackageStoppedState(
1145                        r.curComponent.getPackageName(), false, UserHandle.getUserId(r.callingUid));
1146            } catch (RemoteException e) {
1147            } catch (IllegalArgumentException e) {
1148                Slog.w(TAG, "Failed trying to unstop package "
1149                        + r.curComponent.getPackageName() + ": " + e);
1150            }
1151
1152            // Is this receiver's application already running?
1153            if (app != null && app.thread != null) {
1154                try {
1155                    app.addPackage(info.activityInfo.packageName,
1156                            info.activityInfo.applicationInfo.versionCode, mService.mProcessStats);
1157                    processCurBroadcastLocked(r, app);
1158                    return;
1159                } catch (RemoteException e) {
1160                    Slog.w(TAG, "Exception when sending broadcast to "
1161                          + r.curComponent, e);
1162                } catch (RuntimeException e) {
1163                    Slog.wtf(TAG, "Failed sending broadcast to "
1164                            + r.curComponent + " with " + r.intent, e);
1165                    // If some unexpected exception happened, just skip
1166                    // this broadcast.  At this point we are not in the call
1167                    // from a client, so throwing an exception out from here
1168                    // will crash the entire system instead of just whoever
1169                    // sent the broadcast.
1170                    logBroadcastReceiverDiscardLocked(r);
1171                    finishReceiverLocked(r, r.resultCode, r.resultData,
1172                            r.resultExtras, r.resultAbort, false);
1173                    scheduleBroadcastsLocked();
1174                    // We need to reset the state if we failed to start the receiver.
1175                    r.state = BroadcastRecord.IDLE;
1176                    return;
1177                }
1178
1179                // If a dead object exception was thrown -- fall through to
1180                // restart the application.
1181            }
1182
1183            // Not running -- get it started, to be executed when the app comes up.
1184            if (DEBUG_BROADCAST)  Slog.v(TAG_BROADCAST,
1185                    "Need to start app ["
1186                    + mQueueName + "] " + targetProcess + " for broadcast " + r);
1187            if ((r.curApp=mService.startProcessLocked(targetProcess,
1188                    info.activityInfo.applicationInfo, true,
1189                    r.intent.getFlags() | Intent.FLAG_FROM_BACKGROUND,
1190                    "broadcast", r.curComponent,
1191                    (r.intent.getFlags()&Intent.FLAG_RECEIVER_BOOT_UPGRADE) != 0, false, false))
1192                            == null) {
1193                // Ah, this recipient is unavailable.  Finish it if necessary,
1194                // and mark the broadcast record as ready for the next.
1195                Slog.w(TAG, "Unable to launch app "
1196                        + info.activityInfo.applicationInfo.packageName + "/"
1197                        + info.activityInfo.applicationInfo.uid + " for broadcast "
1198                        + r.intent + ": process is bad");
1199                logBroadcastReceiverDiscardLocked(r);
1200                finishReceiverLocked(r, r.resultCode, r.resultData,
1201                        r.resultExtras, r.resultAbort, false);
1202                scheduleBroadcastsLocked();
1203                r.state = BroadcastRecord.IDLE;
1204                return;
1205            }
1206
1207            mPendingBroadcast = r;
1208            mPendingBroadcastRecvIndex = recIdx;
1209        }
1210    }
1211
1212    final void setBroadcastTimeoutLocked(long timeoutTime) {
1213        if (! mPendingBroadcastTimeoutMessage) {
1214            Message msg = mHandler.obtainMessage(BROADCAST_TIMEOUT_MSG, this);
1215            mHandler.sendMessageAtTime(msg, timeoutTime);
1216            mPendingBroadcastTimeoutMessage = true;
1217        }
1218    }
1219
1220    final void cancelBroadcastTimeoutLocked() {
1221        if (mPendingBroadcastTimeoutMessage) {
1222            mHandler.removeMessages(BROADCAST_TIMEOUT_MSG, this);
1223            mPendingBroadcastTimeoutMessage = false;
1224        }
1225    }
1226
1227    final void broadcastTimeoutLocked(boolean fromMsg) {
1228        if (fromMsg) {
1229            mPendingBroadcastTimeoutMessage = false;
1230        }
1231
1232        if (mOrderedBroadcasts.size() == 0) {
1233            return;
1234        }
1235
1236        long now = SystemClock.uptimeMillis();
1237        BroadcastRecord r = mOrderedBroadcasts.get(0);
1238        if (fromMsg) {
1239            if (mService.mDidDexOpt) {
1240                // Delay timeouts until dexopt finishes.
1241                mService.mDidDexOpt = false;
1242                long timeoutTime = SystemClock.uptimeMillis() + mTimeoutPeriod;
1243                setBroadcastTimeoutLocked(timeoutTime);
1244                return;
1245            }
1246            if (!mService.mProcessesReady) {
1247                // Only process broadcast timeouts if the system is ready. That way
1248                // PRE_BOOT_COMPLETED broadcasts can't timeout as they are intended
1249                // to do heavy lifting for system up.
1250                return;
1251            }
1252
1253            long timeoutTime = r.receiverTime + mTimeoutPeriod;
1254            if (timeoutTime > now) {
1255                // We can observe premature timeouts because we do not cancel and reset the
1256                // broadcast timeout message after each receiver finishes.  Instead, we set up
1257                // an initial timeout then kick it down the road a little further as needed
1258                // when it expires.
1259                if (DEBUG_BROADCAST) Slog.v(TAG_BROADCAST,
1260                        "Premature timeout ["
1261                        + mQueueName + "] @ " + now + ": resetting BROADCAST_TIMEOUT_MSG for "
1262                        + timeoutTime);
1263                setBroadcastTimeoutLocked(timeoutTime);
1264                return;
1265            }
1266        }
1267
1268        BroadcastRecord br = mOrderedBroadcasts.get(0);
1269        if (br.state == BroadcastRecord.WAITING_SERVICES) {
1270            // In this case the broadcast had already finished, but we had decided to wait
1271            // for started services to finish as well before going on.  So if we have actually
1272            // waited long enough time timeout the broadcast, let's give up on the whole thing
1273            // and just move on to the next.
1274            Slog.i(TAG, "Waited long enough for: " + (br.curComponent != null
1275                    ? br.curComponent.flattenToShortString() : "(null)"));
1276            br.curComponent = null;
1277            br.state = BroadcastRecord.IDLE;
1278            processNextBroadcast(false);
1279            return;
1280        }
1281
1282        Slog.w(TAG, "Timeout of broadcast " + r + " - receiver=" + r. receiver
1283                + ", started " + (now - r.receiverTime) + "ms ago");
1284        r.receiverTime = now;
1285        r.anrCount++;
1286
1287        // Current receiver has passed its expiration date.
1288        if (r.nextReceiver <= 0) {
1289            Slog.w(TAG, "Timeout on receiver with nextReceiver <= 0");
1290            return;
1291        }
1292
1293        ProcessRecord app = null;
1294        String anrMessage = null;
1295
1296        Object curReceiver = r.receivers.get(r.nextReceiver-1);
1297        Slog.w(TAG, "Receiver during timeout: " + curReceiver);
1298        logBroadcastReceiverDiscardLocked(r);
1299        if (curReceiver instanceof BroadcastFilter) {
1300            BroadcastFilter bf = (BroadcastFilter)curReceiver;
1301            if (bf.receiverList.pid != 0
1302                    && bf.receiverList.pid != ActivityManagerService.MY_PID) {
1303                synchronized (mService.mPidsSelfLocked) {
1304                    app = mService.mPidsSelfLocked.get(
1305                            bf.receiverList.pid);
1306                }
1307            }
1308        } else {
1309            app = r.curApp;
1310        }
1311
1312        if (app != null) {
1313            anrMessage = "Broadcast of " + r.intent.toString();
1314        }
1315
1316        if (mPendingBroadcast == r) {
1317            mPendingBroadcast = null;
1318        }
1319
1320        // Move on to the next receiver.
1321        finishReceiverLocked(r, r.resultCode, r.resultData,
1322                r.resultExtras, r.resultAbort, false);
1323        scheduleBroadcastsLocked();
1324
1325        if (anrMessage != null) {
1326            // Post the ANR to the handler since we do not want to process ANRs while
1327            // potentially holding our lock.
1328            mHandler.post(new AppNotResponding(app, anrMessage));
1329        }
1330    }
1331
1332    private final int ringAdvance(int x, final int increment, final int ringSize) {
1333        x += increment;
1334        if (x < 0) return (ringSize - 1);
1335        else if (x >= ringSize) return 0;
1336        else return x;
1337    }
1338
1339    private final void addBroadcastToHistoryLocked(BroadcastRecord r) {
1340        if (r.callingUid < 0) {
1341            // This was from a registerReceiver() call; ignore it.
1342            return;
1343        }
1344        r.finishTime = SystemClock.uptimeMillis();
1345
1346        mBroadcastHistory[mHistoryNext] = r;
1347        mHistoryNext = ringAdvance(mHistoryNext, 1, MAX_BROADCAST_HISTORY);
1348
1349        mBroadcastSummaryHistory[mSummaryHistoryNext] = r.intent;
1350        mSummaryHistoryEnqueueTime[mSummaryHistoryNext] = r.enqueueClockTime;
1351        mSummaryHistoryDispatchTime[mSummaryHistoryNext] = r.dispatchClockTime;
1352        mSummaryHistoryFinishTime[mSummaryHistoryNext] = System.currentTimeMillis();
1353        mSummaryHistoryNext = ringAdvance(mSummaryHistoryNext, 1, MAX_BROADCAST_SUMMARY_HISTORY);
1354    }
1355
1356    boolean cleanupDisabledPackageReceiversLocked(
1357            String packageName, Set<String> filterByClasses, int userId, boolean doit) {
1358        boolean didSomething = false;
1359        for (int i = mParallelBroadcasts.size() - 1; i >= 0; i--) {
1360            didSomething |= mParallelBroadcasts.get(i).cleanupDisabledPackageReceiversLocked(
1361                    packageName, filterByClasses, userId, doit);
1362            if (!doit && didSomething) {
1363                return true;
1364            }
1365        }
1366
1367        for (int i = mOrderedBroadcasts.size() - 1; i >= 0; i--) {
1368            didSomething |= mOrderedBroadcasts.get(i).cleanupDisabledPackageReceiversLocked(
1369                    packageName, filterByClasses, userId, doit);
1370            if (!doit && didSomething) {
1371                return true;
1372            }
1373        }
1374
1375        return didSomething;
1376    }
1377
1378    final void logBroadcastReceiverDiscardLocked(BroadcastRecord r) {
1379        final int logIndex = r.nextReceiver - 1;
1380        if (logIndex >= 0 && logIndex < r.receivers.size()) {
1381            Object curReceiver = r.receivers.get(logIndex);
1382            if (curReceiver instanceof BroadcastFilter) {
1383                BroadcastFilter bf = (BroadcastFilter) curReceiver;
1384                EventLog.writeEvent(EventLogTags.AM_BROADCAST_DISCARD_FILTER,
1385                        bf.owningUserId, System.identityHashCode(r),
1386                        r.intent.getAction(), logIndex, System.identityHashCode(bf));
1387            } else {
1388                ResolveInfo ri = (ResolveInfo) curReceiver;
1389                EventLog.writeEvent(EventLogTags.AM_BROADCAST_DISCARD_APP,
1390                        UserHandle.getUserId(ri.activityInfo.applicationInfo.uid),
1391                        System.identityHashCode(r), r.intent.getAction(), logIndex, ri.toString());
1392            }
1393        } else {
1394            if (logIndex < 0) Slog.w(TAG,
1395                    "Discarding broadcast before first receiver is invoked: " + r);
1396            EventLog.writeEvent(EventLogTags.AM_BROADCAST_DISCARD_APP,
1397                    -1, System.identityHashCode(r),
1398                    r.intent.getAction(),
1399                    r.nextReceiver,
1400                    "NONE");
1401        }
1402    }
1403
1404    final boolean dumpLocked(FileDescriptor fd, PrintWriter pw, String[] args,
1405            int opti, boolean dumpAll, String dumpPackage, boolean needSep) {
1406        SimpleDateFormat sdf = new SimpleDateFormat("yyyy-MM-dd HH:mm:ss");
1407        if (mParallelBroadcasts.size() > 0 || mOrderedBroadcasts.size() > 0
1408                || mPendingBroadcast != null) {
1409            boolean printed = false;
1410            for (int i = mParallelBroadcasts.size() - 1; i >= 0; i--) {
1411                BroadcastRecord br = mParallelBroadcasts.get(i);
1412                if (dumpPackage != null && !dumpPackage.equals(br.callerPackage)) {
1413                    continue;
1414                }
1415                if (!printed) {
1416                    if (needSep) {
1417                        pw.println();
1418                    }
1419                    needSep = true;
1420                    printed = true;
1421                    pw.println("  Active broadcasts [" + mQueueName + "]:");
1422                }
1423                pw.println("  Active Broadcast " + mQueueName + " #" + i + ":");
1424                br.dump(pw, "    ", sdf);
1425            }
1426            printed = false;
1427            needSep = true;
1428            for (int i = mOrderedBroadcasts.size() - 1; i >= 0; i--) {
1429                BroadcastRecord br = mOrderedBroadcasts.get(i);
1430                if (dumpPackage != null && !dumpPackage.equals(br.callerPackage)) {
1431                    continue;
1432                }
1433                if (!printed) {
1434                    if (needSep) {
1435                        pw.println();
1436                    }
1437                    needSep = true;
1438                    printed = true;
1439                    pw.println("  Active ordered broadcasts [" + mQueueName + "]:");
1440                }
1441                pw.println("  Active Ordered Broadcast " + mQueueName + " #" + i + ":");
1442                mOrderedBroadcasts.get(i).dump(pw, "    ", sdf);
1443            }
1444            if (dumpPackage == null || (mPendingBroadcast != null
1445                    && dumpPackage.equals(mPendingBroadcast.callerPackage))) {
1446                if (needSep) {
1447                    pw.println();
1448                }
1449                pw.println("  Pending broadcast [" + mQueueName + "]:");
1450                if (mPendingBroadcast != null) {
1451                    mPendingBroadcast.dump(pw, "    ", sdf);
1452                } else {
1453                    pw.println("    (null)");
1454                }
1455                needSep = true;
1456            }
1457        }
1458
1459        int i;
1460        boolean printed = false;
1461
1462        i = -1;
1463        int lastIndex = mHistoryNext;
1464        int ringIndex = lastIndex;
1465        do {
1466            // increasing index = more recent entry, and we want to print the most
1467            // recent first and work backwards, so we roll through the ring backwards.
1468            ringIndex = ringAdvance(ringIndex, -1, MAX_BROADCAST_HISTORY);
1469            BroadcastRecord r = mBroadcastHistory[ringIndex];
1470            if (r == null) {
1471                continue;
1472            }
1473
1474            i++; // genuine record of some sort even if we're filtering it out
1475            if (dumpPackage != null && !dumpPackage.equals(r.callerPackage)) {
1476                continue;
1477            }
1478            if (!printed) {
1479                if (needSep) {
1480                    pw.println();
1481                }
1482                needSep = true;
1483                pw.println("  Historical broadcasts [" + mQueueName + "]:");
1484                printed = true;
1485            }
1486            if (dumpAll) {
1487                pw.print("  Historical Broadcast " + mQueueName + " #");
1488                        pw.print(i); pw.println(":");
1489                r.dump(pw, "    ", sdf);
1490            } else {
1491                pw.print("  #"); pw.print(i); pw.print(": "); pw.println(r);
1492                pw.print("    ");
1493                pw.println(r.intent.toShortString(false, true, true, false));
1494                if (r.targetComp != null && r.targetComp != r.intent.getComponent()) {
1495                    pw.print("    targetComp: "); pw.println(r.targetComp.toShortString());
1496                }
1497                Bundle bundle = r.intent.getExtras();
1498                if (bundle != null) {
1499                    pw.print("    extras: "); pw.println(bundle.toString());
1500                }
1501            }
1502        } while (ringIndex != lastIndex);
1503
1504        if (dumpPackage == null) {
1505            lastIndex = ringIndex = mSummaryHistoryNext;
1506            if (dumpAll) {
1507                printed = false;
1508                i = -1;
1509            } else {
1510                // roll over the 'i' full dumps that have already been issued
1511                for (int j = i;
1512                        j > 0 && ringIndex != lastIndex;) {
1513                    ringIndex = ringAdvance(ringIndex, -1, MAX_BROADCAST_SUMMARY_HISTORY);
1514                    BroadcastRecord r = mBroadcastHistory[ringIndex];
1515                    if (r == null) {
1516                        continue;
1517                    }
1518                    j--;
1519                }
1520            }
1521            // done skipping; dump the remainder of the ring. 'i' is still the ordinal within
1522            // the overall broadcast history.
1523            do {
1524                ringIndex = ringAdvance(ringIndex, -1, MAX_BROADCAST_SUMMARY_HISTORY);
1525                Intent intent = mBroadcastSummaryHistory[ringIndex];
1526                if (intent == null) {
1527                    continue;
1528                }
1529                if (!printed) {
1530                    if (needSep) {
1531                        pw.println();
1532                    }
1533                    needSep = true;
1534                    pw.println("  Historical broadcasts summary [" + mQueueName + "]:");
1535                    printed = true;
1536                }
1537                if (!dumpAll && i >= 50) {
1538                    pw.println("  ...");
1539                    break;
1540                }
1541                i++;
1542                pw.print("  #"); pw.print(i); pw.print(": ");
1543                pw.println(intent.toShortString(false, true, true, false));
1544                pw.print("    ");
1545                TimeUtils.formatDuration(mSummaryHistoryDispatchTime[ringIndex]
1546                        - mSummaryHistoryEnqueueTime[ringIndex], pw);
1547                pw.print(" dispatch ");
1548                TimeUtils.formatDuration(mSummaryHistoryFinishTime[ringIndex]
1549                        - mSummaryHistoryDispatchTime[ringIndex], pw);
1550                pw.println(" finish");
1551                pw.print("    enq=");
1552                pw.print(sdf.format(new Date(mSummaryHistoryEnqueueTime[ringIndex])));
1553                pw.print(" disp=");
1554                pw.print(sdf.format(new Date(mSummaryHistoryDispatchTime[ringIndex])));
1555                pw.print(" fin=");
1556                pw.println(sdf.format(new Date(mSummaryHistoryFinishTime[ringIndex])));
1557                Bundle bundle = intent.getExtras();
1558                if (bundle != null) {
1559                    pw.print("    extras: "); pw.println(bundle.toString());
1560                }
1561            } while (ringIndex != lastIndex);
1562        }
1563
1564        return needSep;
1565    }
1566}
1567