| /* |
| * Copyright (C) 2006 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| package android.os; |
| |
| import static android.annotation.SystemApi.Client.MODULE_LIBRARIES; |
| |
| import android.annotation.ElapsedRealtimeLong; |
| import android.annotation.FlaggedApi; |
| import android.annotation.IntRange; |
| import android.annotation.NonNull; |
| import android.annotation.Nullable; |
| import android.annotation.SuppressLint; |
| import android.annotation.SystemApi; |
| import android.annotation.TestApi; |
| import android.annotation.UptimeMillisLong; |
| import android.compat.annotation.UnsupportedAppUsage; |
| import android.os.Build.VERSION_CODES; |
| import android.sysprop.MemoryProperties; |
| import android.system.ErrnoException; |
| import android.system.Os; |
| import android.system.OsConstants; |
| import android.system.StructPollfd; |
| import android.util.Pair; |
| import android.webkit.WebViewZygote; |
| |
| import com.android.internal.os.SomeArgs; |
| import com.android.internal.util.Preconditions; |
| import com.android.sdksandbox.flags.Flags; |
| |
| import dalvik.system.VMRuntime; |
| |
| import libcore.io.IoUtils; |
| |
| import java.io.FileDescriptor; |
| import java.io.IOException; |
| import java.util.Map; |
| import java.util.NoSuchElementException; |
| import java.util.concurrent.TimeoutException; |
| |
| /** |
| * Tools for managing OS processes. |
| */ |
| public class Process { |
| private static final String LOG_TAG = "Process"; |
| |
| /** |
| * An invalid UID value. |
| */ |
| public static final int INVALID_UID = -1; |
| |
| /** |
| * Defines the root UID. |
| */ |
| public static final int ROOT_UID = 0; |
| |
| /** |
| * Defines the UID/GID under which system code runs. |
| */ |
| public static final int SYSTEM_UID = 1000; |
| |
| /** |
| * Defines the UID/GID under which the telephony code runs. |
| */ |
| public static final int PHONE_UID = 1001; |
| |
| /** |
| * Defines the UID/GID for the user shell. |
| */ |
| public static final int SHELL_UID = 2000; |
| |
| /** |
| * Defines the UID/GID for the log group. |
| * @hide |
| */ |
| @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) |
| public static final int LOG_UID = 1007; |
| |
| /** |
| * Defines the UID/GID for the WIFI native processes like wificond, supplicant, hostapd, |
| * vendor HAL, etc. |
| */ |
| public static final int WIFI_UID = 1010; |
| |
| /** |
| * Defines the UID/GID for the mediaserver process. |
| * @hide |
| */ |
| @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) |
| public static final int MEDIA_UID = 1013; |
| |
| /** |
| * Defines the UID/GID for the DRM process. |
| * @hide |
| */ |
| @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) |
| public static final int DRM_UID = 1019; |
| |
| /** |
| * Defines the GID for the group that allows write access to the internal media storage. |
| * @hide |
| */ |
| public static final int SDCARD_RW_GID = 1015; |
| |
| /** |
| * Defines the UID/GID for the group that controls VPN services. |
| * @hide |
| */ |
| @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) |
| @SystemApi(client = MODULE_LIBRARIES) |
| public static final int VPN_UID = 1016; |
| |
| /** |
| * Defines the UID/GID for keystore. |
| * @hide |
| */ |
| public static final int KEYSTORE_UID = 1017; |
| |
| /** |
| * Defines the UID/GID for credstore. |
| * @hide |
| */ |
| public static final int CREDSTORE_UID = 1076; |
| |
| /** |
| * Defines the UID/GID for the NFC service process. |
| * @hide |
| */ |
| @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) |
| @TestApi |
| @SystemApi(client = MODULE_LIBRARIES) |
| public static final int NFC_UID = 1027; |
| |
| /** |
| * Defines the UID/GID for the clatd process. |
| * @hide |
| * */ |
| public static final int CLAT_UID = 1029; |
| |
| /** |
| * Defines the UID/GID for the Bluetooth service process. |
| */ |
| public static final int BLUETOOTH_UID = 1002; |
| |
| /** |
| * Defines the GID for the group that allows write access to the internal media storage. |
| * @hide |
| */ |
| public static final int MEDIA_RW_GID = 1023; |
| |
| /** |
| * Access to installed package details |
| * @hide |
| */ |
| public static final int PACKAGE_INFO_GID = 1032; |
| |
| /** |
| * Defines the UID/GID for the shared RELRO file updater process. |
| * @hide |
| */ |
| public static final int SHARED_RELRO_UID = 1037; |
| |
| /** |
| * Defines the UID/GID for the audioserver process. |
| * @hide |
| */ |
| public static final int AUDIOSERVER_UID = 1041; |
| |
| /** |
| * Defines the UID/GID for the cameraserver process |
| * @hide |
| */ |
| public static final int CAMERASERVER_UID = 1047; |
| |
| /** |
| * Defines the UID/GID for the tethering DNS resolver (currently dnsmasq). |
| * @hide |
| */ |
| public static final int DNS_TETHER_UID = 1052; |
| |
| /** |
| * Defines the UID/GID for the WebView zygote process. |
| * @hide |
| */ |
| public static final int WEBVIEW_ZYGOTE_UID = 1053; |
| |
| /** |
| * Defines the UID used for resource tracking for OTA updates. |
| * @hide |
| */ |
| public static final int OTA_UPDATE_UID = 1061; |
| |
| /** |
| * Defines the UID used for statsd |
| * @hide |
| */ |
| public static final int STATSD_UID = 1066; |
| |
| /** |
| * Defines the UID used for incidentd. |
| * @hide |
| */ |
| public static final int INCIDENTD_UID = 1067; |
| |
| /** |
| * Defines the UID/GID for the Secure Element service process. |
| * @hide |
| */ |
| public static final int SE_UID = 1068; |
| |
| /** |
| * Defines the UID/GID for the NetworkStack app. |
| * @hide |
| */ |
| public static final int NETWORK_STACK_UID = 1073; |
| |
| /** |
| * Defines the UID/GID for fs-verity certificate ownership in keystore. |
| * @hide |
| */ |
| public static final int FSVERITY_CERT_UID = 1075; |
| |
| /** |
| * GID that gives access to USB OTG (unreliable) volumes on /mnt/media_rw/<vol name> |
| * @hide |
| */ |
| public static final int EXTERNAL_STORAGE_GID = 1077; |
| |
| /** |
| * GID that gives write access to app-private data directories on external |
| * storage (used on devices without sdcardfs only). |
| * @hide |
| */ |
| public static final int EXT_DATA_RW_GID = 1078; |
| |
| /** |
| * GID that gives write access to app-private OBB directories on external |
| * storage (used on devices without sdcardfs only). |
| * @hide |
| */ |
| public static final int EXT_OBB_RW_GID = 1079; |
| |
| /** |
| * Defines the UID/GID for the Uwb service process. |
| * @hide |
| */ |
| public static final int UWB_UID = 1083; |
| |
| /** |
| * Defines a virtual UID that is used to aggregate data related to SDK sandbox UIDs. |
| * {@see SdkSandboxManager} |
| * @hide |
| */ |
| @TestApi |
| public static final int SDK_SANDBOX_VIRTUAL_UID = 1090; |
| |
| /** |
| * GID that corresponds to the INTERNET permission. |
| * Must match the value of AID_INET. |
| * @hide |
| */ |
| public static final int INET_GID = 3003; |
| |
| /** {@hide} */ |
| public static final int NOBODY_UID = 9999; |
| |
| /** |
| * Defines the start of a range of UIDs (and GIDs), going from this |
| * number to {@link #LAST_APPLICATION_UID} that are reserved for assigning |
| * to applications. |
| */ |
| public static final int FIRST_APPLICATION_UID = 10000; |
| |
| /** |
| * Last of application-specific UIDs starting at |
| * {@link #FIRST_APPLICATION_UID}. |
| */ |
| public static final int LAST_APPLICATION_UID = 19999; |
| |
| /** |
| * Defines the start of a range of UIDs going from this number to |
| * {@link #LAST_SDK_SANDBOX_UID} that are reserved for assigning to |
| * sdk sandbox processes. There is a 1-1 mapping between a sdk sandbox |
| * process UID and the app that it belongs to, which can be computed by |
| * subtracting (FIRST_SDK_SANDBOX_UID - FIRST_APPLICATION_UID) from the |
| * uid of a sdk sandbox process. |
| * |
| * Note that there are no GIDs associated with these processes; storage |
| * attribution for them will be done using project IDs. |
| * @hide |
| */ |
| public static final int FIRST_SDK_SANDBOX_UID = 20000; |
| |
| /** |
| * Last UID that is used for sdk sandbox processes. |
| * @hide |
| */ |
| public static final int LAST_SDK_SANDBOX_UID = 29999; |
| |
| /** |
| * First uid used for fully isolated sandboxed processes spawned from an app zygote |
| * @hide |
| */ |
| @TestApi |
| public static final int FIRST_APP_ZYGOTE_ISOLATED_UID = 90000; |
| |
| /** |
| * Number of UIDs we allocate per application zygote |
| * @hide |
| */ |
| @TestApi |
| public static final int NUM_UIDS_PER_APP_ZYGOTE = 100; |
| |
| /** |
| * Last uid used for fully isolated sandboxed processes spawned from an app zygote |
| * @hide |
| */ |
| @TestApi |
| public static final int LAST_APP_ZYGOTE_ISOLATED_UID = 98999; |
| |
| /** |
| * First uid used for fully isolated sandboxed processes (with no permissions of their own) |
| * @hide |
| */ |
| @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) |
| @TestApi |
| public static final int FIRST_ISOLATED_UID = 99000; |
| |
| /** |
| * Last uid used for fully isolated sandboxed processes (with no permissions of their own) |
| * @hide |
| */ |
| @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) |
| @TestApi |
| public static final int LAST_ISOLATED_UID = 99999; |
| |
| /** |
| * Defines the gid shared by all applications running under the same profile. |
| * @hide |
| */ |
| public static final int SHARED_USER_GID = 9997; |
| |
| /** |
| * First gid for applications to share resources. Used when forward-locking |
| * is enabled but all UserHandles need to be able to read the resources. |
| * @hide |
| */ |
| public static final int FIRST_SHARED_APPLICATION_GID = 50000; |
| |
| /** |
| * Last gid for applications to share resources. Used when forward-locking |
| * is enabled but all UserHandles need to be able to read the resources. |
| * @hide |
| */ |
| public static final int LAST_SHARED_APPLICATION_GID = 59999; |
| |
| /** {@hide} */ |
| public static final int FIRST_APPLICATION_CACHE_GID = 20000; |
| /** {@hide} */ |
| public static final int LAST_APPLICATION_CACHE_GID = 29999; |
| |
| /** |
| * An invalid PID value. |
| */ |
| public static final int INVALID_PID = -1; |
| |
| /** |
| * Standard priority of application threads. |
| * Use with {@link #setThreadPriority(int)} and |
| * {@link #setThreadPriority(int, int)}, <b>not</b> with the normal |
| * {@link java.lang.Thread} class. |
| */ |
| public static final int THREAD_PRIORITY_DEFAULT = 0; |
| |
| /* |
| * *************************************** |
| * ** Keep in sync with utils/threads.h ** |
| * *************************************** |
| */ |
| |
| /** |
| * Lowest available thread priority. Only for those who really, really |
| * don't want to run if anything else is happening. |
| * Use with {@link #setThreadPriority(int)} and |
| * {@link #setThreadPriority(int, int)}, <b>not</b> with the normal |
| * {@link java.lang.Thread} class. |
| */ |
| public static final int THREAD_PRIORITY_LOWEST = 19; |
| |
| /** |
| * Standard priority background threads. This gives your thread a slightly |
| * lower than normal priority, so that it will have less chance of impacting |
| * the responsiveness of the user interface. |
| * Use with {@link #setThreadPriority(int)} and |
| * {@link #setThreadPriority(int, int)}, <b>not</b> with the normal |
| * {@link java.lang.Thread} class. |
| */ |
| public static final int THREAD_PRIORITY_BACKGROUND = 10; |
| |
| /** |
| * Standard priority of threads that are currently running a user interface |
| * that the user is interacting with. Applications can not normally |
| * change to this priority; the system will automatically adjust your |
| * application threads as the user moves through the UI. |
| * Use with {@link #setThreadPriority(int)} and |
| * {@link #setThreadPriority(int, int)}, <b>not</b> with the normal |
| * {@link java.lang.Thread} class. |
| */ |
| public static final int THREAD_PRIORITY_FOREGROUND = -2; |
| |
| /** |
| * Standard priority of system display threads, involved in updating |
| * the user interface. Applications can not |
| * normally change to this priority. |
| * Use with {@link #setThreadPriority(int)} and |
| * {@link #setThreadPriority(int, int)}, <b>not</b> with the normal |
| * {@link java.lang.Thread} class. |
| */ |
| public static final int THREAD_PRIORITY_DISPLAY = -4; |
| |
| /** |
| * Standard priority of the most important display threads, for compositing |
| * the screen and retrieving input events. Applications can not normally |
| * change to this priority. |
| * Use with {@link #setThreadPriority(int)} and |
| * {@link #setThreadPriority(int, int)}, <b>not</b> with the normal |
| * {@link java.lang.Thread} class. |
| */ |
| public static final int THREAD_PRIORITY_URGENT_DISPLAY = -8; |
| |
| /** |
| * Standard priority of video threads. Applications can not normally |
| * change to this priority. |
| * Use with {@link #setThreadPriority(int)} and |
| * {@link #setThreadPriority(int, int)}, <b>not</b> with the normal |
| * {@link java.lang.Thread} class. |
| */ |
| public static final int THREAD_PRIORITY_VIDEO = -10; |
| |
| /** |
| * Priority we boost main thread and RT of top app to. |
| * @hide |
| */ |
| public static final int THREAD_PRIORITY_TOP_APP_BOOST = -10; |
| |
| /** |
| * Standard priority of audio threads. Applications can not normally |
| * change to this priority. |
| * Use with {@link #setThreadPriority(int)} and |
| * {@link #setThreadPriority(int, int)}, <b>not</b> with the normal |
| * {@link java.lang.Thread} class. |
| */ |
| public static final int THREAD_PRIORITY_AUDIO = -16; |
| |
| /** |
| * Standard priority of the most important audio threads. |
| * Applications can not normally change to this priority. |
| * Use with {@link #setThreadPriority(int)} and |
| * {@link #setThreadPriority(int, int)}, <b>not</b> with the normal |
| * {@link java.lang.Thread} class. |
| */ |
| public static final int THREAD_PRIORITY_URGENT_AUDIO = -19; |
| |
| /** |
| * Minimum increment to make a priority more favorable. |
| */ |
| public static final int THREAD_PRIORITY_MORE_FAVORABLE = -1; |
| |
| /** |
| * Minimum increment to make a priority less favorable. |
| */ |
| public static final int THREAD_PRIORITY_LESS_FAVORABLE = +1; |
| |
| /** |
| * Default scheduling policy |
| * @hide |
| */ |
| public static final int SCHED_OTHER = 0; |
| |
| /** |
| * First-In First-Out scheduling policy |
| * @hide |
| */ |
| public static final int SCHED_FIFO = 1; |
| |
| /** |
| * Round-Robin scheduling policy |
| * @hide |
| */ |
| public static final int SCHED_RR = 2; |
| |
| /** |
| * Batch scheduling policy |
| * @hide |
| */ |
| public static final int SCHED_BATCH = 3; |
| |
| /** |
| * Idle scheduling policy |
| * @hide |
| */ |
| public static final int SCHED_IDLE = 5; |
| |
| /** |
| * Reset scheduler choice on fork. |
| * @hide |
| */ |
| public static final int SCHED_RESET_ON_FORK = 0x40000000; |
| |
| // Keep in sync with SP_* constants of enum type SchedPolicy |
| // declared in system/core/include/cutils/sched_policy.h, |
| // except THREAD_GROUP_DEFAULT does not correspond to any SP_* value. |
| |
| /** |
| * Default thread group - |
| * has meaning with setProcessGroup() only, cannot be used with setThreadGroup(). |
| * When used with setProcessGroup(), the group of each thread in the process |
| * is conditionally changed based on that thread's current priority, as follows: |
| * threads with priority numerically less than THREAD_PRIORITY_BACKGROUND |
| * are moved to foreground thread group. All other threads are left unchanged. |
| * @hide |
| */ |
| public static final int THREAD_GROUP_DEFAULT = -1; |
| |
| /** |
| * Background thread group - All threads in |
| * this group are scheduled with a reduced share of the CPU. |
| * Value is same as constant SP_BACKGROUND of enum SchedPolicy. |
| * @hide |
| */ |
| public static final int THREAD_GROUP_BACKGROUND = 0; |
| |
| /** |
| * Foreground thread group - All threads in |
| * this group are scheduled with a normal share of the CPU. |
| * Value is same as constant SP_FOREGROUND of enum SchedPolicy. |
| * Not used at this level. |
| * @hide |
| **/ |
| private static final int THREAD_GROUP_FOREGROUND = 1; |
| |
| /** |
| * System thread group. |
| * @hide |
| **/ |
| public static final int THREAD_GROUP_SYSTEM = 2; |
| |
| /** |
| * Application audio thread group. |
| * @hide |
| **/ |
| public static final int THREAD_GROUP_AUDIO_APP = 3; |
| |
| /** |
| * System audio thread group. |
| * @hide |
| **/ |
| public static final int THREAD_GROUP_AUDIO_SYS = 4; |
| |
| /** |
| * Thread group for top foreground app. |
| * @hide |
| **/ |
| public static final int THREAD_GROUP_TOP_APP = 5; |
| |
| /** |
| * Thread group for RT app. |
| * @hide |
| **/ |
| public static final int THREAD_GROUP_RT_APP = 6; |
| |
| /** |
| * Thread group for bound foreground services that should |
| * have additional CPU restrictions during screen off |
| * @hide |
| **/ |
| public static final int THREAD_GROUP_RESTRICTED = 7; |
| |
| /** @hide */ |
| public static final int SIGNAL_DEFAULT = 0; |
| public static final int SIGNAL_QUIT = 3; |
| public static final int SIGNAL_KILL = 9; |
| public static final int SIGNAL_USR1 = 10; |
| |
| /** |
| * When the process started and ActivityThread.handleBindApplication() was executed. |
| */ |
| private static long sStartElapsedRealtime; |
| |
| /** |
| * When the process started and ActivityThread.handleBindApplication() was executed. |
| */ |
| private static long sStartUptimeMillis; |
| |
| /** |
| * When the activity manager was about to ask zygote to fork. |
| */ |
| private static long sStartRequestedElapsedRealtime; |
| |
| /** |
| * When the activity manager was about to ask zygote to fork. |
| */ |
| private static long sStartRequestedUptimeMillis; |
| |
| private static final int PIDFD_UNKNOWN = 0; |
| private static final int PIDFD_SUPPORTED = 1; |
| private static final int PIDFD_UNSUPPORTED = 2; |
| |
| /** |
| * Whether or not the underlying OS supports pidfd |
| */ |
| private static int sPidFdSupported = PIDFD_UNKNOWN; |
| |
| /** |
| * Value used to indicate that there is no special information about an application launch. App |
| * launches with this policy will occur through the primary or secondary Zygote with no special |
| * treatment. |
| * |
| * @hide |
| */ |
| public static final int ZYGOTE_POLICY_FLAG_EMPTY = 0; |
| |
| /** |
| * Flag used to indicate that an application launch is user-visible and latency sensitive. Any |
| * launch with this policy will use a Unspecialized App Process Pool if the target Zygote |
| * supports it. |
| * |
| * @hide |
| */ |
| public static final int ZYGOTE_POLICY_FLAG_LATENCY_SENSITIVE = 1 << 0; |
| |
| /** |
| * Flag used to indicate that the launch is one in a series of app launches that will be |
| * performed in quick succession. For future use. |
| * |
| * @hide |
| */ |
| public static final int ZYGOTE_POLICY_FLAG_BATCH_LAUNCH = 1 << 1; |
| |
| /** |
| * Flag used to indicate that the current launch event is for a system process. All system |
| * processes are equally important, so none of them should be prioritized over the others. |
| * |
| * @hide |
| */ |
| public static final int ZYGOTE_POLICY_FLAG_SYSTEM_PROCESS = 1 << 2; |
| |
| /** |
| * State associated with the zygote process. |
| * @hide |
| */ |
| public static final ZygoteProcess ZYGOTE_PROCESS = new ZygoteProcess(); |
| |
| |
| /** |
| * The process name set via {@link #setArgV0(String)}. |
| */ |
| private static String sArgV0; |
| |
| /** |
| * Start a new process. |
| * |
| * <p>If processes are enabled, a new process is created and the |
| * static main() function of a <var>processClass</var> is executed there. |
| * The process will continue running after this function returns. |
| * |
| * <p>If processes are not enabled, a new thread in the caller's |
| * process is created and main() of <var>processClass</var> called there. |
| * |
| * <p>The niceName parameter, if not an empty string, is a custom name to |
| * give to the process instead of using processClass. This allows you to |
| * make easily identifyable processes even if you are using the same base |
| * <var>processClass</var> to start them. |
| * |
| * When invokeWith is not null, the process will be started as a fresh app |
| * and not a zygote fork. Note that this is only allowed for uid 0 or when |
| * runtimeFlags contains DEBUG_ENABLE_DEBUGGER. |
| * |
| * @param processClass The class to use as the process's main entry |
| * point. |
| * @param niceName A more readable name to use for the process. |
| * @param uid The user-id under which the process will run. |
| * @param gid The group-id under which the process will run. |
| * @param gids Additional group-ids associated with the process. |
| * @param runtimeFlags Additional flags for the runtime. |
| * @param targetSdkVersion The target SDK version for the app. |
| * @param seInfo null-ok SELinux information for the new process. |
| * @param abi non-null the ABI this app should be started with. |
| * @param instructionSet null-ok the instruction set to use. |
| * @param appDataDir null-ok the data directory of the app. |
| * @param invokeWith null-ok the command to invoke with. |
| * @param packageName null-ok the name of the package this process belongs to. |
| * @param zygotePolicyFlags Flags used to determine how to launch the application |
| * @param isTopApp whether the process starts for high priority application. |
| * @param disabledCompatChanges null-ok list of disabled compat changes for the process being |
| * started. |
| * @param pkgDataInfoMap Map from related package names to private data directory |
| * volume UUID and inode number. |
| * @param whitelistedDataInfoMap Map from allowlisted package names to private data directory |
| * volume UUID and inode number. |
| * @param bindMountAppsData whether zygote needs to mount CE and DE data. |
| * @param bindMountAppStorageDirs whether zygote needs to mount Android/obb and Android/data. |
| * @param zygoteArgs Additional arguments to supply to the zygote process. |
| * @return An object that describes the result of the attempt to start the process. |
| * @throws RuntimeException on fatal start failure |
| * |
| * {@hide} |
| */ |
| public static ProcessStartResult start(@NonNull final String processClass, |
| @Nullable final String niceName, |
| int uid, int gid, @Nullable int[] gids, |
| int runtimeFlags, |
| int mountExternal, |
| int targetSdkVersion, |
| @Nullable String seInfo, |
| @NonNull String abi, |
| @Nullable String instructionSet, |
| @Nullable String appDataDir, |
| @Nullable String invokeWith, |
| @Nullable String packageName, |
| int zygotePolicyFlags, |
| boolean isTopApp, |
| @Nullable long[] disabledCompatChanges, |
| @Nullable Map<String, Pair<String, Long>> |
| pkgDataInfoMap, |
| @Nullable Map<String, Pair<String, Long>> |
| whitelistedDataInfoMap, |
| boolean bindMountAppsData, |
| boolean bindMountAppStorageDirs, |
| boolean bindMountSystemOverrides, |
| @Nullable String[] zygoteArgs) { |
| return ZYGOTE_PROCESS.start(processClass, niceName, uid, gid, gids, |
| runtimeFlags, mountExternal, targetSdkVersion, seInfo, |
| abi, instructionSet, appDataDir, invokeWith, packageName, |
| zygotePolicyFlags, isTopApp, disabledCompatChanges, |
| pkgDataInfoMap, whitelistedDataInfoMap, bindMountAppsData, |
| bindMountAppStorageDirs, bindMountSystemOverrides, zygoteArgs); |
| } |
| |
| /** @hide */ |
| public static ProcessStartResult startWebView(@NonNull final String processClass, |
| @Nullable final String niceName, |
| int uid, int gid, @Nullable int[] gids, |
| int runtimeFlags, |
| int mountExternal, |
| int targetSdkVersion, |
| @Nullable String seInfo, |
| @NonNull String abi, |
| @Nullable String instructionSet, |
| @Nullable String appDataDir, |
| @Nullable String invokeWith, |
| @Nullable String packageName, |
| @Nullable long[] disabledCompatChanges, |
| @Nullable String[] zygoteArgs) { |
| // Webview zygote can't access app private data files, so doesn't need to know its data |
| // info. |
| return WebViewZygote.getProcess().start(processClass, niceName, uid, gid, gids, |
| runtimeFlags, mountExternal, targetSdkVersion, seInfo, |
| abi, instructionSet, appDataDir, invokeWith, packageName, |
| /*zygotePolicyFlags=*/ ZYGOTE_POLICY_FLAG_EMPTY, /*isTopApp=*/ false, |
| disabledCompatChanges, /* pkgDataInfoMap */ null, |
| /* whitelistedDataInfoMap */ null, /* bindMountAppsData */ false, |
| /* bindMountAppStorageDirs */ false, /* bindMountSyspropOverrides */ false, zygoteArgs); |
| } |
| |
| /** |
| * Returns elapsed milliseconds of the time this process has run. |
| * @return Returns the number of milliseconds this process has return. |
| */ |
| public static final native long getElapsedCpuTime(); |
| |
| /** |
| * Return the {@link SystemClock#elapsedRealtime()} at which this process was started, |
| * but before any of the application code was executed. |
| */ |
| @ElapsedRealtimeLong |
| public static long getStartElapsedRealtime() { |
| return sStartElapsedRealtime; |
| } |
| |
| /** |
| * Return the {@link SystemClock#uptimeMillis()} at which this process was started, |
| * but before any of the application code was executed. |
| */ |
| @UptimeMillisLong |
| public static long getStartUptimeMillis() { |
| return sStartUptimeMillis; |
| } |
| |
| /** |
| * Return the {@link SystemClock#elapsedRealtime()} at which the system was about to |
| * start this process. i.e. before a zygote fork. |
| * |
| * <p>More precisely, the system may start app processes before there's a start request, |
| * in order to reduce the process start up latency, in which case this is set when the system |
| * decides to "specialize" the process into a requested app. |
| */ |
| @ElapsedRealtimeLong |
| public static long getStartRequestedElapsedRealtime() { |
| return sStartRequestedElapsedRealtime; |
| } |
| |
| /** |
| * Return the {@link SystemClock#uptimeMillis()} at which the system was about to |
| * start this process. i.e. before a zygote fork. |
| * |
| * <p>More precisely, the system may start app processes before there's a start request, |
| * in order to reduce the process start up latency, in which case this is set when the system |
| * decides to "specialize" the process into a requested app. |
| */ |
| @UptimeMillisLong |
| public static long getStartRequestedUptimeMillis() { |
| return sStartRequestedUptimeMillis; |
| } |
| |
| /** @hide */ |
| public static final void setStartTimes(long elapsedRealtime, long uptimeMillis, |
| long startRequestedElapsedRealtime, long startRequestedUptime) { |
| sStartElapsedRealtime = elapsedRealtime; |
| sStartUptimeMillis = uptimeMillis; |
| sStartRequestedElapsedRealtime = startRequestedElapsedRealtime; |
| sStartRequestedUptimeMillis = startRequestedUptime; |
| } |
| |
| /** |
| * Returns true if the current process is a 64-bit runtime. |
| */ |
| @android.ravenwood.annotation.RavenwoodReplace |
| public static final boolean is64Bit() { |
| return VMRuntime.getRuntime().is64Bit(); |
| } |
| |
| /** @hide */ |
| public static final boolean is64Bit$ravenwood() { |
| return "amd64".equals(System.getProperty("os.arch")); |
| } |
| |
| private static volatile ThreadLocal<SomeArgs> sIdentity$ravenwood; |
| |
| /** @hide */ |
| @android.ravenwood.annotation.RavenwoodKeep |
| public static void init$ravenwood(final int uid, final int pid) { |
| sIdentity$ravenwood = ThreadLocal.withInitial(() -> { |
| final SomeArgs args = SomeArgs.obtain(); |
| args.argi1 = uid; |
| args.argi2 = pid; |
| args.argi3 = Long.hashCode(Thread.currentThread().getId()); |
| args.argi4 = THREAD_PRIORITY_DEFAULT; |
| args.arg1 = Boolean.TRUE; // backgroundOk |
| return args; |
| }); |
| } |
| |
| /** @hide */ |
| @android.ravenwood.annotation.RavenwoodKeep |
| public static void reset$ravenwood() { |
| sIdentity$ravenwood = null; |
| } |
| |
| /** |
| * Returns the identifier of this process, which can be used with |
| * {@link #killProcess} and {@link #sendSignal}. |
| */ |
| @android.ravenwood.annotation.RavenwoodReplace |
| public static final int myPid() { |
| return Os.getpid(); |
| } |
| |
| /** @hide */ |
| public static final int myPid$ravenwood() { |
| return Preconditions.requireNonNullViaRavenwoodRule(sIdentity$ravenwood).get().argi2; |
| } |
| |
| /** |
| * Returns the identifier of this process' parent. |
| * @hide |
| */ |
| @UnsupportedAppUsage(trackingBug = 171962076) |
| public static final int myPpid() { |
| return Os.getppid(); |
| } |
| |
| /** |
| * Returns the identifier of the calling thread, which be used with |
| * {@link #setThreadPriority(int, int)}. |
| */ |
| @android.ravenwood.annotation.RavenwoodReplace |
| public static final int myTid() { |
| return Os.gettid(); |
| } |
| |
| /** @hide */ |
| public static final int myTid$ravenwood() { |
| return Preconditions.requireNonNullViaRavenwoodRule(sIdentity$ravenwood).get().argi3; |
| } |
| |
| /** |
| * Returns the identifier of this process's uid. This is the kernel uid |
| * that the process is running under, which is the identity of its |
| * app-specific sandbox. It is different from {@link #myUserHandle} in that |
| * a uid identifies a specific app sandbox in a specific user. |
| */ |
| @android.ravenwood.annotation.RavenwoodReplace |
| public static final int myUid() { |
| return Os.getuid(); |
| } |
| |
| /** @hide */ |
| public static final int myUid$ravenwood() { |
| return Preconditions.requireNonNullViaRavenwoodRule(sIdentity$ravenwood).get().argi1; |
| } |
| |
| /** |
| * Returns this process's user handle. This is the |
| * user the process is running under. It is distinct from |
| * {@link #myUid()} in that a particular user will have multiple |
| * distinct apps running under it each with their own uid. |
| */ |
| @android.ravenwood.annotation.RavenwoodKeep |
| public static UserHandle myUserHandle() { |
| return UserHandle.of(UserHandle.getUserId(myUid())); |
| } |
| |
| /** |
| * Returns whether the given uid belongs to a system core component or not. |
| * @hide |
| */ |
| @android.ravenwood.annotation.RavenwoodKeep |
| public static boolean isCoreUid(int uid) { |
| return UserHandle.isCore(uid); |
| } |
| |
| /** |
| * Returns whether the given uid belongs to an application. |
| * @param uid A kernel uid. |
| * @return Whether the uid corresponds to an application sandbox running in |
| * a specific user. |
| */ |
| @android.ravenwood.annotation.RavenwoodKeep |
| public static boolean isApplicationUid(int uid) { |
| return UserHandle.isApp(uid); |
| } |
| |
| /** |
| * Returns whether the current process is in an isolated sandbox. |
| */ |
| @android.ravenwood.annotation.RavenwoodKeep |
| public static final boolean isIsolated() { |
| return isIsolated(myUid()); |
| } |
| |
| /** |
| * @deprecated Use {@link #isIsolatedUid(int)} instead. |
| * {@hide} |
| */ |
| @Deprecated |
| @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.TIRAMISU, |
| publicAlternatives = "Use {@link #isIsolatedUid(int)} instead.") |
| @android.ravenwood.annotation.RavenwoodKeep |
| public static final boolean isIsolated(int uid) { |
| return isIsolatedUid(uid); |
| } |
| |
| /** |
| * Returns whether the process with the given {@code uid} is an isolated sandbox. |
| */ |
| @android.ravenwood.annotation.RavenwoodKeep |
| public static final boolean isIsolatedUid(int uid) { |
| uid = UserHandle.getAppId(uid); |
| return (uid >= FIRST_ISOLATED_UID && uid <= LAST_ISOLATED_UID) |
| || (uid >= FIRST_APP_ZYGOTE_ISOLATED_UID && uid <= LAST_APP_ZYGOTE_ISOLATED_UID); |
| } |
| |
| /** |
| * Returns whether the provided UID belongs to an sdk sandbox process |
| * @see android.app.sdksandbox.SdkSandboxManager |
| */ |
| @SuppressLint("UnflaggedApi") // promoting from @SystemApi. |
| @android.ravenwood.annotation.RavenwoodKeep |
| public static final boolean isSdkSandboxUid(int uid) { |
| uid = UserHandle.getAppId(uid); |
| return (uid >= FIRST_SDK_SANDBOX_UID && uid <= LAST_SDK_SANDBOX_UID); |
| } |
| |
| /** |
| * Returns the app uid corresponding to an sdk sandbox uid. |
| * @see android.app.sdksandbox.SdkSandboxManager |
| * |
| * @param uid the sdk sandbox uid |
| * @return the app uid for the given sdk sandbox uid |
| * |
| * @throws IllegalArgumentException if input is not an sdk sandbox uid |
| */ |
| @SuppressLint("UnflaggedApi") // promoting from @SystemApi. |
| @android.ravenwood.annotation.RavenwoodKeep |
| public static final int getAppUidForSdkSandboxUid(int uid) { |
| if (!isSdkSandboxUid(uid)) { |
| throw new IllegalArgumentException("Input UID is not an SDK sandbox UID"); |
| } |
| return uid - (FIRST_SDK_SANDBOX_UID - FIRST_APPLICATION_UID); |
| } |
| |
| /** |
| * |
| * Returns the sdk sandbox process corresponding to an app process. |
| * |
| * @hide |
| */ |
| @SystemApi(client = MODULE_LIBRARIES) |
| @TestApi |
| @android.ravenwood.annotation.RavenwoodKeep |
| // TODO(b/318651609): Deprecate once Process#getSdkSandboxUidForAppUid is rolled out to 100% |
| public static final int toSdkSandboxUid(int uid) { |
| return uid + (FIRST_SDK_SANDBOX_UID - FIRST_APPLICATION_UID); |
| } |
| |
| /** |
| * Returns the sdk sandbox uid corresponding to an app uid. |
| * @see android.app.sdksandbox.SdkSandboxManager |
| * |
| * @param uid the app uid |
| * @return the sdk sandbox uid for the given app uid |
| * |
| * @throws IllegalArgumentException if input is not an app uid |
| */ |
| @FlaggedApi(Flags.FLAG_SDK_SANDBOX_UID_TO_APP_UID_API) |
| @android.ravenwood.annotation.RavenwoodKeep |
| public static final int getSdkSandboxUidForAppUid(int uid) { |
| if (!isApplicationUid(uid)) { |
| throw new IllegalArgumentException("Input UID is not an app UID"); |
| } |
| return uid + (FIRST_SDK_SANDBOX_UID - FIRST_APPLICATION_UID); |
| } |
| |
| /** |
| * Returns whether the current process is a sdk sandbox process. |
| */ |
| @android.ravenwood.annotation.RavenwoodKeep |
| public static final boolean isSdkSandbox() { |
| return isSdkSandboxUid(myUid()); |
| } |
| |
| /** |
| * Returns the UID assigned to a particular user name, or -1 if there is |
| * none. If the given string consists of only numbers, it is converted |
| * directly to a uid. |
| */ |
| public static final native int getUidForName(String name); |
| |
| /** |
| * Returns the GID assigned to a particular user name, or -1 if there is |
| * none. If the given string consists of only numbers, it is converted |
| * directly to a gid. |
| */ |
| public static final native int getGidForName(String name); |
| |
| /** |
| * Returns a uid for a currently running process. |
| * @param pid the process id |
| * @return the uid of the process, or -1 if the process is not running. |
| * @hide pending API council review |
| */ |
| @UnsupportedAppUsage |
| public static final int getUidForPid(int pid) { |
| String[] procStatusLabels = { "Uid:" }; |
| long[] procStatusValues = new long[1]; |
| procStatusValues[0] = -1; |
| Process.readProcLines("/proc/" + pid + "/status", procStatusLabels, procStatusValues); |
| return (int) procStatusValues[0]; |
| } |
| |
| /** |
| * Returns the parent process id for a currently running process. |
| * @param pid the process id |
| * @return the parent process id of the process, or -1 if the process is not running. |
| * @hide |
| */ |
| @UnsupportedAppUsage |
| public static final int getParentPid(int pid) { |
| String[] procStatusLabels = { "PPid:" }; |
| long[] procStatusValues = new long[1]; |
| procStatusValues[0] = -1; |
| Process.readProcLines("/proc/" + pid + "/status", procStatusLabels, procStatusValues); |
| return (int) procStatusValues[0]; |
| } |
| |
| /** |
| * Returns the thread group leader id for a currently running thread. |
| * @param tid the thread id |
| * @return the thread group leader id of the thread, or -1 if the thread is not running. |
| * This is same as what getpid(2) would return if called by tid. |
| * @hide |
| */ |
| public static final int getThreadGroupLeader(int tid) { |
| String[] procStatusLabels = { "Tgid:" }; |
| long[] procStatusValues = new long[1]; |
| procStatusValues[0] = -1; |
| Process.readProcLines("/proc/" + tid + "/status", procStatusLabels, procStatusValues); |
| return (int) procStatusValues[0]; |
| } |
| |
| /** |
| * Set the priority of a thread, based on Linux priorities. |
| * |
| * @param tid The identifier of the thread/process to change. |
| * @param priority A Linux priority level, from -20 for highest scheduling |
| * priority to 19 for lowest scheduling priority. |
| * |
| * @throws IllegalArgumentException Throws IllegalArgumentException if |
| * <var>tid</var> does not exist. |
| * @throws SecurityException Throws SecurityException if your process does |
| * not have permission to modify the given thread, or to use the given |
| * priority. |
| */ |
| @android.ravenwood.annotation.RavenwoodReplace |
| public static final native void setThreadPriority(int tid, |
| @IntRange(from = -20, to = THREAD_PRIORITY_LOWEST) int priority) |
| throws IllegalArgumentException, SecurityException; |
| |
| /** @hide */ |
| public static final void setThreadPriority$ravenwood(int tid, int priority) { |
| final SomeArgs args = |
| Preconditions.requireNonNullViaRavenwoodRule(sIdentity$ravenwood).get(); |
| if (args.argi3 == tid) { |
| boolean backgroundOk = (args.arg1 == Boolean.TRUE); |
| if (priority >= THREAD_PRIORITY_BACKGROUND && !backgroundOk) { |
| throw new IllegalArgumentException( |
| "Priority " + priority + " blocked by setCanSelfBackground()"); |
| } |
| args.argi4 = priority; |
| } else { |
| throw new UnsupportedOperationException( |
| "Cross-thread priority management not yet available in Ravenwood"); |
| } |
| } |
| |
| /** |
| * Call with 'false' to cause future calls to {@link #setThreadPriority(int)} to |
| * throw an exception if passed a background-level thread priority. This is only |
| * effective if the JNI layer is built with GUARD_THREAD_PRIORITY defined to 1. |
| * |
| * @hide |
| */ |
| @android.ravenwood.annotation.RavenwoodReplace |
| public static final native void setCanSelfBackground(boolean backgroundOk); |
| |
| /** @hide */ |
| public static final void setCanSelfBackground$ravenwood(boolean backgroundOk) { |
| final SomeArgs args = |
| Preconditions.requireNonNullViaRavenwoodRule(sIdentity$ravenwood).get(); |
| args.arg1 = Boolean.valueOf(backgroundOk); |
| } |
| |
| /** |
| * Sets the scheduling group for a thread. |
| * @hide |
| * @param tid The identifier of the thread to change. |
| * @param group The target group for this thread from THREAD_GROUP_*. |
| * |
| * @throws IllegalArgumentException Throws IllegalArgumentException if |
| * <var>tid</var> does not exist. |
| * @throws SecurityException Throws SecurityException if your process does |
| * not have permission to modify the given thread, or to use the given |
| * priority. |
| * If the thread is a thread group leader, that is it's gettid() == getpid(), |
| * then the other threads in the same thread group are _not_ affected. |
| * |
| * Does not set cpuset for some historical reason, just calls |
| * libcutils::set_sched_policy(). |
| */ |
| public static final native void setThreadGroup(int tid, int group) |
| throws IllegalArgumentException, SecurityException; |
| |
| /** |
| * Sets the scheduling group and the corresponding cpuset group |
| * @hide |
| * @param tid The identifier of the thread to change. |
| * @param group The target group for this thread from THREAD_GROUP_*. |
| * |
| * @throws IllegalArgumentException Throws IllegalArgumentException if |
| * <var>tid</var> does not exist. |
| * @throws SecurityException Throws SecurityException if your process does |
| * not have permission to modify the given thread, or to use the given |
| * priority. |
| */ |
| public static final native void setThreadGroupAndCpuset(int tid, int group) |
| throws IllegalArgumentException, SecurityException; |
| |
| /** |
| * Sets the scheduling group for a process and all child threads |
| * @hide |
| * @param pid The identifier of the process to change. |
| * @param group The target group for this process from THREAD_GROUP_*. |
| * |
| * @throws IllegalArgumentException Throws IllegalArgumentException if |
| * <var>tid</var> does not exist. |
| * @throws SecurityException Throws SecurityException if your process does |
| * not have permission to modify the given thread, or to use the given |
| * priority. |
| * |
| * group == THREAD_GROUP_DEFAULT means to move all non-background priority |
| * threads to the foreground scheduling group, but to leave background |
| * priority threads alone. group == THREAD_GROUP_BACKGROUND moves all |
| * threads, regardless of priority, to the background scheduling group. |
| * group == THREAD_GROUP_FOREGROUND is not allowed. |
| * |
| * Always sets cpusets. |
| */ |
| @UnsupportedAppUsage |
| public static final native void setProcessGroup(int pid, int group) |
| throws IllegalArgumentException, SecurityException; |
| |
| /** |
| * Freeze or unfreeze the specified process. |
| * |
| * @param pid Identifier of the process to freeze or unfreeze. |
| * @param uid Identifier of the user the process is running under. |
| * @param frozen Specify whether to free (true) or unfreeze (false). |
| * |
| * @hide |
| */ |
| public static final native void setProcessFrozen(int pid, int uid, boolean frozen); |
| |
| /** |
| * Return the scheduling group of requested process. |
| * |
| * @hide |
| */ |
| public static final native int getProcessGroup(int pid) |
| throws IllegalArgumentException, SecurityException; |
| |
| /** |
| * |
| * Create a new process group in the cgroup uid/pid hierarchy |
| * |
| * @return <0 in case of error |
| * |
| * @hide |
| */ |
| public static final native int createProcessGroup(int uid, int pid); |
| |
| /** |
| * On some devices, the foreground process may have one or more CPU |
| * cores exclusively reserved for it. This method can be used to |
| * retrieve which cores that are (if any), so the calling process |
| * can then use sched_setaffinity() to lock a thread to these cores. |
| * Note that the calling process must currently be running in the |
| * foreground for this method to return any cores. |
| * |
| * The CPU core(s) exclusively reserved for the foreground process will |
| * stay reserved for as long as the process stays in the foreground. |
| * |
| * As soon as a process leaves the foreground, those CPU cores will |
| * no longer be reserved for it, and will most likely be reserved for |
| * the new foreground process. It's not necessary to change the affinity |
| * of your process when it leaves the foreground (if you had previously |
| * set it to use a reserved core); the OS will automatically take care |
| * of resetting the affinity at that point. |
| * |
| * @return an array of integers, indicating the CPU cores exclusively |
| * reserved for this process. The array will have length zero if no |
| * CPU cores are exclusively reserved for this process at this point |
| * in time. |
| */ |
| public static final native int[] getExclusiveCores(); |
| |
| /** |
| * Set the priority of the calling thread, based on Linux priorities. See |
| * {@link #setThreadPriority(int, int)} for more information. |
| * |
| * @param priority A Linux priority level, from -20 for highest scheduling |
| * priority to 19 for lowest scheduling priority. |
| * |
| * @throws IllegalArgumentException Throws IllegalArgumentException if |
| * <var>tid</var> does not exist. |
| * @throws SecurityException Throws SecurityException if your process does |
| * not have permission to modify the given thread, or to use the given |
| * priority. |
| * |
| * @see #setThreadPriority(int, int) |
| */ |
| @android.ravenwood.annotation.RavenwoodReplace |
| public static final native void setThreadPriority( |
| @IntRange(from = -20, to = THREAD_PRIORITY_LOWEST) int priority) |
| throws IllegalArgumentException, SecurityException; |
| |
| /** @hide */ |
| public static final void setThreadPriority$ravenwood(int priority) { |
| setThreadPriority(myTid(), priority); |
| } |
| |
| /** |
| * Return the current priority of a thread, based on Linux priorities. |
| * |
| * @param tid The identifier of the thread/process. If tid equals zero, the priority of the |
| * calling process/thread will be returned. |
| * |
| * @return Returns the current priority, as a Linux priority level, |
| * from -20 for highest scheduling priority to 19 for lowest scheduling |
| * priority. |
| * |
| * @throws IllegalArgumentException Throws IllegalArgumentException if |
| * <var>tid</var> does not exist. |
| */ |
| @android.ravenwood.annotation.RavenwoodReplace |
| @IntRange(from = -20, to = THREAD_PRIORITY_LOWEST) |
| public static final native int getThreadPriority(int tid) |
| throws IllegalArgumentException; |
| |
| /** @hide */ |
| public static final int getThreadPriority$ravenwood(int tid) { |
| final SomeArgs args = |
| Preconditions.requireNonNullViaRavenwoodRule(sIdentity$ravenwood).get(); |
| if (args.argi3 == tid) { |
| return args.argi4; |
| } else { |
| throw new UnsupportedOperationException( |
| "Cross-thread priority management not yet available in Ravenwood"); |
| } |
| } |
| |
| /** |
| * Return the current scheduling policy of a thread, based on Linux. |
| * |
| * @param tid The identifier of the thread/process to get the scheduling policy. |
| * |
| * @throws IllegalArgumentException Throws IllegalArgumentException if |
| * <var>tid</var> does not exist, or if <var>priority</var> is out of range for the policy. |
| * @throws SecurityException Throws SecurityException if your process does |
| * not have permission to modify the given thread, or to use the given |
| * scheduling policy or priority. |
| * |
| * {@hide} |
| */ |
| |
| @TestApi |
| public static final native int getThreadScheduler(int tid) |
| throws IllegalArgumentException; |
| |
| /** |
| * Set the scheduling policy and priority of a thread, based on Linux. |
| * |
| * @param tid The identifier of the thread/process to change. |
| * @param policy A Linux scheduling policy such as SCHED_OTHER etc. |
| * @param priority A Linux priority level in a range appropriate for the given policy. |
| * |
| * @throws IllegalArgumentException Throws IllegalArgumentException if |
| * <var>tid</var> does not exist, or if <var>priority</var> is out of range for the policy. |
| * @throws SecurityException Throws SecurityException if your process does |
| * not have permission to modify the given thread, or to use the given |
| * scheduling policy or priority. |
| * |
| * {@hide} |
| */ |
| |
| public static final native void setThreadScheduler(int tid, int policy, int priority) |
| throws IllegalArgumentException; |
| |
| /** |
| * Determine whether the current environment supports multiple processes. |
| * |
| * @return Returns true if the system can run in multiple processes, else |
| * false if everything is running in a single process. |
| * |
| * @deprecated This method always returns true. Do not use. |
| */ |
| @Deprecated |
| public static final boolean supportsProcesses() { |
| return true; |
| } |
| |
| /** |
| * Adjust the swappiness level for a process. |
| * |
| * @param pid The process identifier to set. |
| * @param is_increased Whether swappiness should be increased or default. |
| * |
| * @return Returns true if the underlying system supports this |
| * feature, else false. |
| * |
| * {@hide} |
| */ |
| public static final native boolean setSwappiness(int pid, boolean is_increased); |
| |
| /** |
| * Change this process's argv[0] parameter. This can be useful to show |
| * more descriptive information in things like the 'ps' command. |
| * |
| * @param text The new name of this process. |
| * |
| * {@hide} |
| */ |
| @UnsupportedAppUsage(maxTargetSdk = VERSION_CODES.S, publicAlternatives = "Do not try to " |
| + "change the process name. (If you must, you could use {@code pthread_setname_np(3)}, " |
| + "but this could confuse the system)") |
| public static void setArgV0(@NonNull String text) { |
| sArgV0 = text; |
| setArgV0Native(text); |
| } |
| |
| private static native void setArgV0Native(String text); |
| |
| /** |
| * Return the name of this process. By default, the process name is the same as the app's |
| * package name, but this can be changed using {@code android:process}. |
| */ |
| @NonNull |
| public static String myProcessName() { |
| // Note this could be different from the actual process name if someone changes the |
| // process name using native code (using pthread_setname_np()). But sArgV0 |
| // is the name that the system thinks this process has. |
| return sArgV0; |
| } |
| |
| /** |
| * Kill the process with the given PID. |
| * Note that, though this API allows us to request to |
| * kill any process based on its PID, the kernel will |
| * still impose standard restrictions on which PIDs you |
| * are actually able to kill. Typically this means only |
| * the process running the caller's packages/application |
| * and any additional processes created by that app; packages |
| * sharing a common UID will also be able to kill each |
| * other's processes. |
| */ |
| public static final void killProcess(int pid) { |
| sendSignal(pid, SIGNAL_KILL); |
| } |
| |
| /** |
| * Check the tgid and tid pair to see if the tid still exists and belong to the tgid. |
| * |
| * TOCTOU warning: the status of the tid can change at the time this method returns. This should |
| * be used in very rare cases such as checking if a (tid, tgid) pair that is known to exist |
| * recently no longer exists now. As the possibility of the same tid to be reused under the same |
| * tgid during a short window is rare. And even if it happens the caller logic should be robust |
| * to handle it without error. |
| * |
| * @throws IllegalArgumentException if tgid or tid is not positive. |
| * @throws SecurityException if the caller doesn't have the permission, this method is expected |
| * to be used by system process with {@link #SYSTEM_UID} because it |
| * internally uses tkill(2). |
| * @throws NoSuchElementException if the Linux process with pid as the tid has exited or it |
| * doesn't belong to the tgid. |
| * @hide |
| */ |
| public static final void checkTid(int tgid, int tid) |
| throws IllegalArgumentException, SecurityException, NoSuchElementException { |
| sendTgSignalThrows(tgid, tid, SIGNAL_DEFAULT); |
| } |
| |
| /** |
| * Check if the pid still exists. |
| * |
| * TOCTOU warning: the status of the pid can change at the time this method returns. This should |
| * be used in very rare cases such as checking if a pid that belongs to an isolated process of a |
| * uid known to exist recently no longer exists now. As the possibility of the same pid to be |
| * reused again under the same uid during a short window is rare. And even if it happens the |
| * caller logic should be robust to handle it without error. |
| * |
| * @throws IllegalArgumentException if pid is not positive. |
| * @throws SecurityException if the caller doesn't have the permission, this method is expected |
| * to be used by system process with {@link #SYSTEM_UID} because it |
| * internally uses kill(2). |
| * @throws NoSuchElementException if the Linux process with the pid has exited. |
| * @hide |
| */ |
| public static final void checkPid(int pid) |
| throws IllegalArgumentException, SecurityException, NoSuchElementException { |
| sendSignalThrows(pid, SIGNAL_DEFAULT); |
| } |
| |
| /** @hide */ |
| public static final native int setUid(int uid); |
| |
| /** @hide */ |
| public static final native int setGid(int uid); |
| |
| /** |
| * Send a signal to the given process. |
| * |
| * @param pid The pid of the target process. |
| * @param signal The signal to send. |
| */ |
| public static final native void sendSignal(int pid, int signal); |
| |
| private static native void sendSignalThrows(int pid, int signal) |
| throws IllegalArgumentException, SecurityException, NoSuchElementException; |
| |
| private static native void sendTgSignalThrows(int pid, int tgid, int signal) |
| throws IllegalArgumentException, SecurityException, NoSuchElementException; |
| |
| /** |
| * @hide |
| * Private impl for avoiding a log message... DO NOT USE without doing |
| * your own log, or the Android Illuminati will find you some night and |
| * beat you up. |
| */ |
| public static final void killProcessQuiet(int pid) { |
| sendSignalQuiet(pid, SIGNAL_KILL); |
| } |
| |
| /** |
| * @hide |
| * Private impl for avoiding a log message... DO NOT USE without doing |
| * your own log, or the Android Illuminati will find you some night and |
| * beat you up. |
| */ |
| @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P) |
| public static final native void sendSignalQuiet(int pid, int signal); |
| |
| /** |
| * @return The advertised memory of the system, as the end user would encounter in a retail |
| * display environment. If the advertised memory is not defined, it returns |
| * {@code getTotalMemory()} rounded. |
| * |
| * @hide |
| */ |
| public static final long getAdvertisedMem() { |
| String formatSize = MemoryProperties.memory_ddr_size().orElse("0KB"); |
| long memSize = FileUtils.parseSize(formatSize); |
| |
| if (memSize <= 0) { |
| return FileUtils.roundStorageSize(getTotalMemory()); |
| } |
| |
| return memSize; |
| } |
| |
| /** @hide */ |
| @UnsupportedAppUsage |
| public static final native long getFreeMemory(); |
| |
| /** @hide */ |
| @UnsupportedAppUsage |
| public static final native long getTotalMemory(); |
| |
| /** @hide */ |
| @UnsupportedAppUsage |
| public static final native void readProcLines(String path, |
| String[] reqFields, long[] outSizes); |
| |
| /** @hide */ |
| @UnsupportedAppUsage |
| public static final native int[] getPids(String path, int[] lastArray); |
| |
| /** @hide */ |
| @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) |
| public static final int PROC_TERM_MASK = 0xff; |
| /** @hide */ |
| @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) |
| public static final int PROC_ZERO_TERM = 0; |
| /** @hide */ |
| @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) |
| public static final int PROC_SPACE_TERM = (int)' '; |
| /** @hide */ |
| @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) |
| public static final int PROC_TAB_TERM = (int)'\t'; |
| /** @hide */ |
| public static final int PROC_NEWLINE_TERM = (int) '\n'; |
| /** @hide */ |
| @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) |
| public static final int PROC_COMBINE = 0x100; |
| /** @hide */ |
| @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) |
| public static final int PROC_PARENS = 0x200; |
| /** @hide */ |
| @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) |
| public static final int PROC_QUOTES = 0x400; |
| /** @hide */ |
| public static final int PROC_CHAR = 0x800; |
| /** @hide */ |
| @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) |
| public static final int PROC_OUT_STRING = 0x1000; |
| /** @hide */ |
| @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) |
| public static final int PROC_OUT_LONG = 0x2000; |
| /** @hide */ |
| @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) |
| public static final int PROC_OUT_FLOAT = 0x4000; |
| |
| /** |
| * Read and parse a {@code proc} file in the given format. |
| * |
| * <p>The format is a list of integers, where every integer describes a variable in the file. It |
| * specifies how the variable is syntactically terminated (e.g. {@link Process#PROC_SPACE_TERM}, |
| * {@link Process#PROC_TAB_TERM}, {@link Process#PROC_ZERO_TERM}, {@link |
| * Process#PROC_NEWLINE_TERM}). |
| * |
| * <p>If the variable should be parsed and returned to the caller, the termination type should |
| * be binary OR'd with the type of output (e.g. {@link Process#PROC_OUT_STRING}, {@link |
| * Process#PROC_OUT_LONG}, {@link Process#PROC_OUT_FLOAT}. |
| * |
| * <p>If the variable is wrapped in quotation marks it should be binary OR'd with {@link |
| * Process#PROC_QUOTES}. If the variable is wrapped in parentheses it should be binary OR'd with |
| * {@link Process#PROC_PARENS}. |
| * |
| * <p>If the variable is not formatted as a string and should be cast directly from characters |
| * to a long, the {@link Process#PROC_CHAR} integer should be binary OR'd. |
| * |
| * <p>If the terminating character can be repeated, the {@link Process#PROC_COMBINE} integer |
| * should be binary OR'd. |
| * |
| * @param file the path of the {@code proc} file to read |
| * @param format the format of the file |
| * @param outStrings the parsed {@code String}s from the file |
| * @param outLongs the parsed {@code long}s from the file |
| * @param outFloats the parsed {@code float}s from the file |
| * @hide |
| */ |
| @UnsupportedAppUsage |
| public static final native boolean readProcFile(String file, int[] format, |
| String[] outStrings, long[] outLongs, float[] outFloats); |
| |
| /** @hide */ |
| @UnsupportedAppUsage |
| public static final native boolean parseProcLine(byte[] buffer, int startIndex, |
| int endIndex, int[] format, String[] outStrings, long[] outLongs, float[] outFloats); |
| |
| /** @hide */ |
| @UnsupportedAppUsage |
| public static final native int[] getPidsForCommands(String[] cmds); |
| |
| /** |
| * Gets the total Pss value for a given process, in bytes. |
| * |
| * @param pid the process to the Pss for |
| * @return the total Pss value for the given process in bytes, |
| * or -1 if the value cannot be determined |
| * @hide |
| */ |
| @UnsupportedAppUsage |
| public static final native long getPss(int pid); |
| |
| /** |
| * Gets the total Rss value for a given process, in bytes. |
| * |
| * @param pid the process to the Rss for |
| * @return an ordered array containing multiple values, they are: |
| * [total_rss, file, anon, swap, shmem]. |
| * or NULL if the value cannot be determined |
| * @hide |
| */ |
| public static final native long[] getRss(int pid); |
| |
| /** |
| * Specifies the outcome of having started a process. |
| * @hide |
| */ |
| public static final class ProcessStartResult { |
| /** |
| * The PID of the newly started process. |
| * Always >= 0. (If the start failed, an exception will have been thrown instead.) |
| */ |
| public int pid; |
| |
| /** |
| * True if the process was started with a wrapper attached. |
| */ |
| public boolean usingWrapper; |
| } |
| |
| /** |
| * Kill all processes in a process group started for the given |
| * pid. |
| * @hide |
| */ |
| public static final native int killProcessGroup(int uid, int pid); |
| |
| /** |
| * Send a signal to all processes in a group under the given PID, but do not wait for the |
| * processes to be fully cleaned up, or for the cgroup to be removed before returning. |
| * Callers should also ensure that killProcessGroup is called later to ensure the cgroup is |
| * fully removed, otherwise system resources may leak. |
| * @hide |
| */ |
| public static final native boolean sendSignalToProcessGroup(int uid, int pid, int signal); |
| |
| /** |
| * Freeze the cgroup for the given UID. |
| * This cgroup may contain child cgroups which will also be frozen. If this cgroup or its |
| * children contain processes with Binder interfaces, those interfaces should be frozen before |
| * the cgroup to avoid blocking synchronous callers indefinitely. |
| * |
| * @param uid The UID to be frozen |
| * @param freeze true = freeze; false = unfreeze |
| * @hide |
| */ |
| public static final native void freezeCgroupUid(int uid, boolean freeze); |
| |
| /** |
| * Remove all process groups. Expected to be called when ActivityManager |
| * is restarted. |
| * @hide |
| */ |
| public static final native void removeAllProcessGroups(); |
| |
| /** |
| * Check to see if a thread belongs to a given process. This may require |
| * more permissions than apps generally have. |
| * @return true if this thread belongs to a process |
| * @hide |
| */ |
| public static final boolean isThreadInProcess(int tid, int pid) { |
| StrictMode.ThreadPolicy oldPolicy = StrictMode.allowThreadDiskReads(); |
| try { |
| if (Os.access("/proc/" + tid + "/task/" + pid, OsConstants.F_OK)) { |
| return true; |
| } else { |
| return false; |
| } |
| } catch (Exception e) { |
| return false; |
| } finally { |
| StrictMode.setThreadPolicy(oldPolicy); |
| } |
| |
| } |
| |
| /** |
| * Wait for the death of the given process. |
| * |
| * @param pid The process ID to be waited on |
| * @param timeout The maximum time to wait in milliseconds, or -1 to wait forever |
| * @hide |
| */ |
| public static void waitForProcessDeath(int pid, int timeout) |
| throws InterruptedException, TimeoutException { |
| boolean fallback = supportsPidFd(); |
| if (!fallback) { |
| FileDescriptor pidfd = null; |
| try { |
| final int fd = nativePidFdOpen(pid, 0); |
| if (fd >= 0) { |
| pidfd = new FileDescriptor(); |
| pidfd.setInt$(fd); |
| } else { |
| fallback = true; |
| } |
| if (pidfd != null) { |
| StructPollfd[] fds = new StructPollfd[] { |
| new StructPollfd() |
| }; |
| fds[0].fd = pidfd; |
| fds[0].events = (short) OsConstants.POLLIN; |
| fds[0].revents = 0; |
| fds[0].userData = null; |
| int res = Os.poll(fds, timeout); |
| if (res > 0) { |
| return; |
| } else if (res == 0) { |
| throw new TimeoutException(); |
| } else { |
| // We should get an ErrnoException now |
| } |
| } |
| } catch (ErrnoException e) { |
| if (e.errno == OsConstants.EINTR) { |
| throw new InterruptedException(); |
| } |
| fallback = true; |
| } finally { |
| if (pidfd != null) { |
| IoUtils.closeQuietly(pidfd); |
| } |
| } |
| } |
| if (fallback) { |
| boolean infinity = timeout < 0; |
| long now = System.currentTimeMillis(); |
| final long end = now + timeout; |
| while (infinity || now < end) { |
| try { |
| Os.kill(pid, 0); |
| } catch (ErrnoException e) { |
| if (e.errno == OsConstants.ESRCH) { |
| return; |
| } |
| } |
| Thread.sleep(1); |
| now = System.currentTimeMillis(); |
| } |
| } |
| throw new TimeoutException(); |
| } |
| |
| /** |
| * Determine whether the system supports pidfd APIs |
| * |
| * @return Returns true if the system supports pidfd APIs |
| * @hide |
| */ |
| public static boolean supportsPidFd() { |
| if (sPidFdSupported == PIDFD_UNKNOWN) { |
| int fd = -1; |
| try { |
| fd = nativePidFdOpen(myPid(), 0); |
| sPidFdSupported = PIDFD_SUPPORTED; |
| } catch (ErrnoException e) { |
| sPidFdSupported = e.errno != OsConstants.ENOSYS |
| ? PIDFD_SUPPORTED : PIDFD_UNSUPPORTED; |
| } finally { |
| if (fd >= 0) { |
| final FileDescriptor f = new FileDescriptor(); |
| f.setInt$(fd); |
| IoUtils.closeQuietly(f); |
| } |
| } |
| } |
| return sPidFdSupported == PIDFD_SUPPORTED; |
| } |
| |
| /** |
| * Open process file descriptor for given pid. |
| * |
| * @param pid The process ID to open for |
| * @param flags Reserved, unused now, must be 0 |
| * @return The process file descriptor for given pid |
| * @throws IOException if it can't be opened |
| * |
| * @hide |
| */ |
| public static @Nullable FileDescriptor openPidFd(int pid, int flags) throws IOException { |
| if (!supportsPidFd()) { |
| return null; |
| } |
| if (flags != 0) { |
| throw new IllegalArgumentException(); |
| } |
| try { |
| FileDescriptor pidfd = new FileDescriptor(); |
| pidfd.setInt$(nativePidFdOpen(pid, flags)); |
| return pidfd; |
| } catch (ErrnoException e) { |
| IOException ex = new IOException(); |
| ex.initCause(e); |
| throw ex; |
| } |
| } |
| |
| private static native int nativePidFdOpen(int pid, int flags) throws ErrnoException; |
| } |