blob: a4a22efadcd87ed28f10918fa49a410f2a6decd7 [file] [log] [blame]
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2007 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server;
18
Dianne Hackborna06de0f2012-12-11 16:34:47 -080019import android.app.AppOpsManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080020import android.app.PendingIntent;
Victoria Lease38389b62012-09-30 11:44:22 -070021import android.content.BroadcastReceiver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080022import android.content.ContentResolver;
23import android.content.Context;
24import android.content.Intent;
Victoria Lease38389b62012-09-30 11:44:22 -070025import android.content.IntentFilter;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070026import android.content.pm.ApplicationInfo;
Jeff Hamiltonfbadb692012-10-05 14:21:58 -050027import android.content.pm.PackageInfo;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080028import android.content.pm.PackageManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070029import android.content.pm.PackageManager.NameNotFoundException;
Jeff Hamiltonfbadb692012-10-05 14:21:58 -050030import android.content.pm.ResolveInfo;
31import android.content.pm.Signature;
Mike Lockwood628fd6d2010-01-25 22:46:13 -050032import android.content.res.Resources;
Brian Muramatsubb95cb92012-08-29 10:43:21 -070033import android.database.ContentObserver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080034import android.location.Address;
Mike Lockwood03ca2162010-04-01 08:10:09 -070035import android.location.Criteria;
Mike Lockwood34901402010-01-04 12:14:21 -050036import android.location.GeocoderParams;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070037import android.location.Geofence;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080038import android.location.IGpsStatusListener;
Mike Lockwood15e3d0f2009-05-01 07:53:28 -040039import android.location.IGpsStatusProvider;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080040import android.location.ILocationListener;
41import android.location.ILocationManager;
Danke Xie22d1f9f2009-08-18 18:28:45 -040042import android.location.INetInitiatedListener;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080043import android.location.Location;
44import android.location.LocationManager;
45import android.location.LocationProvider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070046import android.location.LocationRequest;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080047import android.os.Binder;
48import android.os.Bundle;
49import android.os.Handler;
Victoria Lease5cd731a2012-12-19 15:04:21 -080050import android.os.HandlerThread;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080051import android.os.IBinder;
Mike Lockwood3d12b512009-04-21 23:25:35 -070052import android.os.Looper;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080053import android.os.Message;
54import android.os.PowerManager;
Mike Lockwoode932f7f2009-04-06 10:51:26 -070055import android.os.Process;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080056import android.os.RemoteException;
Dianne Hackborna06de0f2012-12-11 16:34:47 -080057import android.os.ServiceManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070058import android.os.SystemClock;
Dianne Hackborn5ac72a22012-08-29 18:32:08 -070059import android.os.UserHandle;
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -070060import android.os.WorkSource;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080061import android.provider.Settings;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080062import android.util.Log;
Joe Onorato8a9b2202010-02-26 18:56:32 -080063import android.util.Slog;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080064
Dianne Hackborna06de0f2012-12-11 16:34:47 -080065import com.android.internal.app.IAppOpsService;
Mike Lockwoode97ae402010-09-29 15:23:46 -040066import com.android.internal.content.PackageMonitor;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070067import com.android.internal.location.ProviderProperties;
68import com.android.internal.location.ProviderRequest;
Mike Lockwood43e33f22010-03-26 10:41:48 -040069import com.android.server.location.GeocoderProxy;
Nick Pellye0fd6932012-07-11 10:26:13 -070070import com.android.server.location.GeofenceManager;
Mike Lockwood43e33f22010-03-26 10:41:48 -040071import com.android.server.location.GpsLocationProvider;
Nick Pelly4035f5a2012-08-17 14:43:49 -070072import com.android.server.location.LocationBlacklist;
Nick Pelly74fa7ea2012-08-13 19:36:38 -070073import com.android.server.location.LocationFudger;
Mike Lockwood43e33f22010-03-26 10:41:48 -040074import com.android.server.location.LocationProviderInterface;
75import com.android.server.location.LocationProviderProxy;
76import com.android.server.location.MockProvider;
77import com.android.server.location.PassiveProvider;
78
79import java.io.FileDescriptor;
80import java.io.PrintWriter;
81import java.util.ArrayList;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070082import java.util.Arrays;
Mike Lockwood43e33f22010-03-26 10:41:48 -040083import java.util.HashMap;
84import java.util.HashSet;
85import java.util.List;
86import java.util.Map;
Mike Lockwood43e33f22010-03-26 10:41:48 -040087import java.util.Set;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080088
89/**
90 * The service class that manages LocationProviders and issues location
91 * updates and alerts.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080092 */
Victoria Lease5cd731a2012-12-19 15:04:21 -080093public class LocationManagerService extends ILocationManager.Stub {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080094 private static final String TAG = "LocationManagerService";
Nick Pelly6fa9ad42012-07-16 12:18:23 -070095 public static final boolean D = false;
96
97 private static final String WAKELOCK_KEY = TAG;
98 private static final String THREAD_NAME = TAG;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080099
Victoria Lease37425c32012-10-16 16:08:48 -0700100 // Location resolution level: no location data whatsoever
101 private static final int RESOLUTION_LEVEL_NONE = 0;
102 // Location resolution level: coarse location data only
103 private static final int RESOLUTION_LEVEL_COARSE = 1;
104 // Location resolution level: fine location data
105 private static final int RESOLUTION_LEVEL_FINE = 2;
106
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800107 private static final String ACCESS_MOCK_LOCATION =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700108 android.Manifest.permission.ACCESS_MOCK_LOCATION;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800109 private static final String ACCESS_LOCATION_EXTRA_COMMANDS =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700110 android.Manifest.permission.ACCESS_LOCATION_EXTRA_COMMANDS;
Mike Lockwood275555c2009-05-01 11:30:34 -0400111 private static final String INSTALL_LOCATION_PROVIDER =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700112 android.Manifest.permission.INSTALL_LOCATION_PROVIDER;
113
114 private static final String NETWORK_LOCATION_SERVICE_ACTION =
115 "com.android.location.service.v2.NetworkLocationProvider";
116 private static final String FUSED_LOCATION_SERVICE_ACTION =
117 "com.android.location.service.FusedLocationProvider";
118
119 private static final int MSG_LOCATION_CHANGED = 1;
120
Nick Pellyf1be6862012-05-15 10:53:42 -0700121 // Location Providers may sometimes deliver location updates
122 // slightly faster that requested - provide grace period so
123 // we don't unnecessarily filter events that are otherwise on
124 // time
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700125 private static final int MAX_PROVIDER_SCHEDULING_JITTER_MS = 100;
Nick Pellyf1be6862012-05-15 10:53:42 -0700126
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700127 private static final LocationRequest DEFAULT_LOCATION_REQUEST = new LocationRequest();
128
129 private final Context mContext;
Dianne Hackborna06de0f2012-12-11 16:34:47 -0800130 private final AppOpsManager mAppOps;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700131
132 // used internally for synchronization
133 private final Object mLock = new Object();
134
Victoria Lease5cd731a2012-12-19 15:04:21 -0800135 // --- fields below are final after systemReady() ---
Nick Pelly74fa7ea2012-08-13 19:36:38 -0700136 private LocationFudger mLocationFudger;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700137 private GeofenceManager mGeofenceManager;
138 private PowerManager.WakeLock mWakeLock;
139 private PackageManager mPackageManager;
140 private GeocoderProxy mGeocodeProvider;
141 private IGpsStatusProvider mGpsStatusProvider;
142 private INetInitiatedListener mNetInitiatedListener;
143 private LocationWorkerHandler mLocationHandler;
Nick Pelly4035f5a2012-08-17 14:43:49 -0700144 private PassiveProvider mPassiveProvider; // track passive provider for special cases
145 private LocationBlacklist mBlacklist;
Victoria Lease5cd731a2012-12-19 15:04:21 -0800146 private HandlerThread mHandlerThread;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700147
148 // --- fields below are protected by mWakeLock ---
149 private int mPendingBroadcasts;
150
151 // --- fields below are protected by mLock ---
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800152 // Set of providers that are explicitly enabled
153 private final Set<String> mEnabledProviders = new HashSet<String>();
154
155 // Set of providers that are explicitly disabled
156 private final Set<String> mDisabledProviders = new HashSet<String>();
157
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700158 // Mock (test) providers
159 private final HashMap<String, MockProvider> mMockProviders =
160 new HashMap<String, MockProvider>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800161
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700162 // all receivers
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400163 private final HashMap<Object, Receiver> mReceivers = new HashMap<Object, Receiver>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800164
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700165 // currently installed providers (with mocks replacing real providers)
Mike Lockwoodd03ff942010-02-09 08:46:14 -0500166 private final ArrayList<LocationProviderInterface> mProviders =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700167 new ArrayList<LocationProviderInterface>();
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400168
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700169 // real providers, saved here when mocked out
170 private final HashMap<String, LocationProviderInterface> mRealProviders =
171 new HashMap<String, LocationProviderInterface>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800172
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700173 // mapping from provider name to provider
174 private final HashMap<String, LocationProviderInterface> mProvidersByName =
175 new HashMap<String, LocationProviderInterface>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800176
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700177 // mapping from provider name to all its UpdateRecords
178 private final HashMap<String, ArrayList<UpdateRecord>> mRecordsByProvider =
179 new HashMap<String, ArrayList<UpdateRecord>>();
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -0700180
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700181 // mapping from provider name to last known location
182 private final HashMap<String, Location> mLastLocation = new HashMap<String, Location>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800183
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700184 // all providers that operate over proxy, for authorizing incoming location
185 private final ArrayList<LocationProviderProxy> mProxyProviders =
186 new ArrayList<LocationProviderProxy>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800187
Victoria Lease38389b62012-09-30 11:44:22 -0700188 // current active user on the device - other users are denied location data
189 private int mCurrentUserId = UserHandle.USER_OWNER;
190
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700191 public LocationManagerService(Context context) {
192 super();
193 mContext = context;
Dianne Hackborna06de0f2012-12-11 16:34:47 -0800194 mAppOps = (AppOpsManager)context.getSystemService(Context.APP_OPS_SERVICE);
The Android Open Source Project4df24232009-03-05 14:34:35 -0800195
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700196 if (D) Log.d(TAG, "Constructed");
197
198 // most startup is deferred until systemReady()
199 }
200
201 public void systemReady() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700202 synchronized (mLock) {
Victoria Lease5cd731a2012-12-19 15:04:21 -0800203 if (D) Log.d(TAG, "systemReady()");
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700204
Victoria Lease5cd731a2012-12-19 15:04:21 -0800205 // fetch package manager
206 mPackageManager = mContext.getPackageManager();
207
208 // prepare wake lock
209 PowerManager powerManager =
210 (PowerManager) mContext.getSystemService(Context.POWER_SERVICE);
211 mWakeLock = powerManager.newWakeLock(PowerManager.PARTIAL_WAKE_LOCK, WAKELOCK_KEY);
212
213 // prepare worker thread
214 mHandlerThread = new HandlerThread(THREAD_NAME, Process.THREAD_PRIORITY_BACKGROUND);
215 mHandlerThread.start();
216 mLocationHandler = new LocationWorkerHandler(mHandlerThread.getLooper());
217
218 // prepare mLocationHandler's dependents
219 mLocationFudger = new LocationFudger(mContext, mLocationHandler);
220 mBlacklist = new LocationBlacklist(mContext, mLocationHandler);
221 mBlacklist.init();
222 mGeofenceManager = new GeofenceManager(mContext, mBlacklist);
223
224 // prepare providers
225 loadProvidersLocked();
226 updateProvidersLocked();
227 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700228
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700229 // listen for settings changes
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700230 mContext.getContentResolver().registerContentObserver(
Laurent Tu75defb62012-11-01 16:21:52 -0700231 Settings.Secure.getUriFor(Settings.Secure.LOCATION_PROVIDERS_ALLOWED), true,
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700232 new ContentObserver(mLocationHandler) {
Victoria Lease5cd731a2012-12-19 15:04:21 -0800233 @Override
234 public void onChange(boolean selfChange) {
235 synchronized (mLock) {
236 updateProvidersLocked();
237 }
238 }
239 }, UserHandle.USER_ALL);
240 mPackageMonitor.register(mContext, mLocationHandler.getLooper(), true);
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700241
Victoria Lease38389b62012-09-30 11:44:22 -0700242 // listen for user change
243 IntentFilter intentFilter = new IntentFilter();
244 intentFilter.addAction(Intent.ACTION_USER_SWITCHED);
245
246 mContext.registerReceiverAsUser(new BroadcastReceiver() {
247 @Override
248 public void onReceive(Context context, Intent intent) {
249 String action = intent.getAction();
250 if (Intent.ACTION_USER_SWITCHED.equals(action)) {
251 switchUser(intent.getIntExtra(Intent.EXTRA_USER_HANDLE, 0));
252 }
253 }
Victoria Lease5cd731a2012-12-19 15:04:21 -0800254 }, UserHandle.ALL, intentFilter, null, mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700255 }
256
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500257 private void ensureFallbackFusedProviderPresentLocked(ArrayList<String> pkgs) {
258 PackageManager pm = mContext.getPackageManager();
259 String systemPackageName = mContext.getPackageName();
260 ArrayList<HashSet<Signature>> sigSets = ServiceWatcher.getSignatureSets(mContext, pkgs);
261
262 List<ResolveInfo> rInfos = pm.queryIntentServicesAsUser(
263 new Intent(FUSED_LOCATION_SERVICE_ACTION),
264 PackageManager.GET_META_DATA, mCurrentUserId);
265 for (ResolveInfo rInfo : rInfos) {
266 String packageName = rInfo.serviceInfo.packageName;
267
268 // Check that the signature is in the list of supported sigs. If it's not in
269 // this list the standard provider binding logic won't bind to it.
270 try {
271 PackageInfo pInfo;
272 pInfo = pm.getPackageInfo(packageName, PackageManager.GET_SIGNATURES);
273 if (!ServiceWatcher.isSignatureMatch(pInfo.signatures, sigSets)) {
274 Log.w(TAG, packageName + " resolves service " + FUSED_LOCATION_SERVICE_ACTION +
275 ", but has wrong signature, ignoring");
276 continue;
277 }
278 } catch (NameNotFoundException e) {
279 Log.e(TAG, "missing package: " + packageName);
280 continue;
281 }
282
283 // Get the version info
284 if (rInfo.serviceInfo.metaData == null) {
285 Log.w(TAG, "Found fused provider without metadata: " + packageName);
286 continue;
287 }
288
289 int version = rInfo.serviceInfo.metaData.getInt(
290 ServiceWatcher.EXTRA_SERVICE_VERSION, -1);
291 if (version == 0) {
292 // This should be the fallback fused location provider.
293
294 // Make sure it's in the system partition.
295 if ((rInfo.serviceInfo.applicationInfo.flags & ApplicationInfo.FLAG_SYSTEM) == 0) {
296 if (D) Log.d(TAG, "Fallback candidate not in /system: " + packageName);
297 continue;
298 }
299
300 // Check that the fallback is signed the same as the OS
301 // as a proxy for coreApp="true"
302 if (pm.checkSignatures(systemPackageName, packageName)
303 != PackageManager.SIGNATURE_MATCH) {
304 if (D) Log.d(TAG, "Fallback candidate not signed the same as system: "
305 + packageName);
306 continue;
307 }
308
309 // Found a valid fallback.
310 if (D) Log.d(TAG, "Found fallback provider: " + packageName);
311 return;
312 } else {
313 if (D) Log.d(TAG, "Fallback candidate not version 0: " + packageName);
314 }
315 }
316
317 throw new IllegalStateException("Unable to find a fused location provider that is in the "
318 + "system partition with version 0 and signed with the platform certificate. "
319 + "Such a package is needed to provide a default fused location provider in the "
320 + "event that no other fused location provider has been installed or is currently "
321 + "available. For example, coreOnly boot mode when decrypting the data "
322 + "partition. The fallback must also be marked coreApp=\"true\" in the manifest");
323 }
324
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700325 private void loadProvidersLocked() {
Victoria Lease5c24fd02012-10-01 11:00:50 -0700326 // create a passive location provider, which is always enabled
327 PassiveProvider passiveProvider = new PassiveProvider(this);
328 addProviderLocked(passiveProvider);
329 mEnabledProviders.add(passiveProvider.getName());
330 mPassiveProvider = passiveProvider;
331
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700332 if (GpsLocationProvider.isSupported()) {
333 // Create a gps location provider
Victoria Lease5cd731a2012-12-19 15:04:21 -0800334 GpsLocationProvider gpsProvider = new GpsLocationProvider(mContext, this,
335 mLocationHandler.getLooper());
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700336 mGpsStatusProvider = gpsProvider.getGpsStatusProvider();
337 mNetInitiatedListener = gpsProvider.getNetInitiatedListener();
338 addProviderLocked(gpsProvider);
339 mRealProviders.put(LocationManager.GPS_PROVIDER, gpsProvider);
340 }
341
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700342 /*
343 Load package name(s) containing location provider support.
344 These packages can contain services implementing location providers:
345 Geocoder Provider, Network Location Provider, and
346 Fused Location Provider. They will each be searched for
347 service components implementing these providers.
348 The location framework also has support for installation
349 of new location providers at run-time. The new package does not
350 have to be explicitly listed here, however it must have a signature
351 that matches the signature of at least one package on this list.
352 */
353 Resources resources = mContext.getResources();
354 ArrayList<String> providerPackageNames = new ArrayList<String>();
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500355 String[] pkgs = resources.getStringArray(
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700356 com.android.internal.R.array.config_locationProviderPackageNames);
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500357 if (D) Log.d(TAG, "certificates for location providers pulled from: " +
358 Arrays.toString(pkgs));
359 if (pkgs != null) providerPackageNames.addAll(Arrays.asList(pkgs));
360
361 ensureFallbackFusedProviderPresentLocked(providerPackageNames);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700362
363 // bind to network provider
364 LocationProviderProxy networkProvider = LocationProviderProxy.createAndBind(
365 mContext,
366 LocationManager.NETWORK_PROVIDER,
367 NETWORK_LOCATION_SERVICE_ACTION,
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800368 providerPackageNames, mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700369 if (networkProvider != null) {
370 mRealProviders.put(LocationManager.NETWORK_PROVIDER, networkProvider);
371 mProxyProviders.add(networkProvider);
372 addProviderLocked(networkProvider);
373 } else {
374 Slog.w(TAG, "no network location provider found");
375 }
376
377 // bind to fused provider
378 LocationProviderProxy fusedLocationProvider = LocationProviderProxy.createAndBind(
379 mContext,
380 LocationManager.FUSED_PROVIDER,
381 FUSED_LOCATION_SERVICE_ACTION,
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800382 providerPackageNames, mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700383 if (fusedLocationProvider != null) {
384 addProviderLocked(fusedLocationProvider);
385 mProxyProviders.add(fusedLocationProvider);
386 mEnabledProviders.add(fusedLocationProvider.getName());
Kenny Rootc3575182012-10-09 12:44:40 -0700387 mRealProviders.put(LocationManager.FUSED_PROVIDER, fusedLocationProvider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700388 } else {
389 Slog.e(TAG, "no fused location provider found",
390 new IllegalStateException("Location service needs a fused location provider"));
391 }
392
393 // bind to geocoder provider
Victoria Leaseb711d572012-10-02 13:14:11 -0700394 mGeocodeProvider = GeocoderProxy.createAndBind(mContext, providerPackageNames,
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800395 mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700396 if (mGeocodeProvider == null) {
397 Slog.e(TAG, "no geocoder provider found");
398 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700399 }
Mike Lockwood9637d472009-04-02 21:41:57 -0700400
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800401 /**
Victoria Lease38389b62012-09-30 11:44:22 -0700402 * Called when the device's active user changes.
403 * @param userId the new active user's UserId
404 */
405 private void switchUser(int userId) {
Victoria Lease83762d22012-10-03 13:51:17 -0700406 mBlacklist.switchUser(userId);
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800407 mLocationHandler.removeMessages(MSG_LOCATION_CHANGED);
Victoria Lease38389b62012-09-30 11:44:22 -0700408 synchronized (mLock) {
Victoria Leaseb711d572012-10-02 13:14:11 -0700409 mLastLocation.clear();
410 for (LocationProviderInterface p : mProviders) {
411 updateProviderListenersLocked(p.getName(), false, mCurrentUserId);
Victoria Leaseb711d572012-10-02 13:14:11 -0700412 }
Victoria Lease38389b62012-09-30 11:44:22 -0700413 mCurrentUserId = userId;
Victoria Leaseb711d572012-10-02 13:14:11 -0700414 updateProvidersLocked();
Victoria Lease38389b62012-09-30 11:44:22 -0700415 }
416 }
417
418 /**
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800419 * A wrapper class holding either an ILocationListener or a PendingIntent to receive
420 * location updates.
421 */
Mike Lockwood48f17512009-04-23 09:12:08 -0700422 private final class Receiver implements IBinder.DeathRecipient, PendingIntent.OnFinished {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700423 final int mUid; // uid of receiver
424 final int mPid; // pid of receiver
425 final String mPackageName; // package name of receiver
Victoria Lease37425c32012-10-16 16:08:48 -0700426 final int mAllowedResolutionLevel; // resolution level allowed to receiver
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700427
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800428 final ILocationListener mListener;
429 final PendingIntent mPendingIntent;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800430 final Object mKey;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700431
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400432 final HashMap<String,UpdateRecord> mUpdateRecords = new HashMap<String,UpdateRecord>();
Nick Pellyf1be6862012-05-15 10:53:42 -0700433
Mike Lockwood48f17512009-04-23 09:12:08 -0700434 int mPendingBroadcasts;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800435
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700436 Receiver(ILocationListener listener, PendingIntent intent, int pid, int uid,
437 String packageName) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800438 mListener = listener;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800439 mPendingIntent = intent;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700440 if (listener != null) {
441 mKey = listener.asBinder();
442 } else {
443 mKey = intent;
444 }
Victoria Lease37425c32012-10-16 16:08:48 -0700445 mAllowedResolutionLevel = getAllowedResolutionLevel(pid, uid);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700446 mUid = uid;
447 mPid = pid;
448 mPackageName = packageName;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800449 }
450
451 @Override
452 public boolean equals(Object otherObj) {
453 if (otherObj instanceof Receiver) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700454 return mKey.equals(((Receiver)otherObj).mKey);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800455 }
456 return false;
457 }
458
459 @Override
460 public int hashCode() {
461 return mKey.hashCode();
462 }
Mike Lockwood3681f262009-05-12 10:52:03 -0400463
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800464 @Override
465 public String toString() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700466 StringBuilder s = new StringBuilder();
467 s.append("Reciever[");
468 s.append(Integer.toHexString(System.identityHashCode(this)));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800469 if (mListener != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700470 s.append(" listener");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800471 } else {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700472 s.append(" intent");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800473 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700474 for (String p : mUpdateRecords.keySet()) {
475 s.append(" ").append(mUpdateRecords.get(p).toString());
476 }
477 s.append("]");
478 return s.toString();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800479 }
480
481 public boolean isListener() {
482 return mListener != null;
483 }
484
485 public boolean isPendingIntent() {
486 return mPendingIntent != null;
487 }
488
489 public ILocationListener getListener() {
490 if (mListener != null) {
491 return mListener;
492 }
493 throw new IllegalStateException("Request for non-existent listener");
494 }
495
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800496 public boolean callStatusChangedLocked(String provider, int status, Bundle extras) {
497 if (mListener != null) {
498 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700499 synchronized (this) {
500 // synchronize to ensure incrementPendingBroadcastsLocked()
501 // is called before decrementPendingBroadcasts()
502 mListener.onStatusChanged(provider, status, extras);
Nick Pellye0fd6932012-07-11 10:26:13 -0700503 // call this after broadcasting so we do not increment
504 // if we throw an exeption.
505 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700506 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800507 } catch (RemoteException e) {
508 return false;
509 }
510 } else {
511 Intent statusChanged = new Intent();
Victoria Lease61ecb022012-11-13 15:12:51 -0800512 statusChanged.putExtras(new Bundle(extras));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800513 statusChanged.putExtra(LocationManager.KEY_STATUS_CHANGED, status);
514 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700515 synchronized (this) {
516 // synchronize to ensure incrementPendingBroadcastsLocked()
517 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700518 mPendingIntent.send(mContext, 0, statusChanged, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700519 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700520 // call this after broadcasting so we do not increment
521 // if we throw an exeption.
522 incrementPendingBroadcastsLocked();
523 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800524 } catch (PendingIntent.CanceledException e) {
525 return false;
526 }
527 }
528 return true;
529 }
530
531 public boolean callLocationChangedLocked(Location location) {
532 if (mListener != null) {
533 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700534 synchronized (this) {
535 // synchronize to ensure incrementPendingBroadcastsLocked()
536 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c5406a2012-11-29 16:18:01 -0800537 mListener.onLocationChanged(new Location(location));
Nick Pellye0fd6932012-07-11 10:26:13 -0700538 // call this after broadcasting so we do not increment
539 // if we throw an exeption.
540 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700541 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800542 } catch (RemoteException e) {
543 return false;
544 }
545 } else {
546 Intent locationChanged = new Intent();
Victoria Lease61ecb022012-11-13 15:12:51 -0800547 locationChanged.putExtra(LocationManager.KEY_LOCATION_CHANGED, new Location(location));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800548 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700549 synchronized (this) {
550 // synchronize to ensure incrementPendingBroadcastsLocked()
551 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700552 mPendingIntent.send(mContext, 0, locationChanged, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700553 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700554 // call this after broadcasting so we do not increment
555 // if we throw an exeption.
556 incrementPendingBroadcastsLocked();
557 }
558 } catch (PendingIntent.CanceledException e) {
559 return false;
560 }
561 }
562 return true;
563 }
564
565 public boolean callProviderEnabledLocked(String provider, boolean enabled) {
566 if (mListener != null) {
567 try {
568 synchronized (this) {
569 // synchronize to ensure incrementPendingBroadcastsLocked()
570 // is called before decrementPendingBroadcasts()
571 if (enabled) {
572 mListener.onProviderEnabled(provider);
573 } else {
574 mListener.onProviderDisabled(provider);
575 }
Nick Pellye0fd6932012-07-11 10:26:13 -0700576 // call this after broadcasting so we do not increment
577 // if we throw an exeption.
578 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700579 }
580 } catch (RemoteException e) {
581 return false;
582 }
583 } else {
584 Intent providerIntent = new Intent();
585 providerIntent.putExtra(LocationManager.KEY_PROVIDER_ENABLED, enabled);
586 try {
587 synchronized (this) {
588 // synchronize to ensure incrementPendingBroadcastsLocked()
589 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700590 mPendingIntent.send(mContext, 0, providerIntent, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700591 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700592 // call this after broadcasting so we do not increment
593 // if we throw an exeption.
594 incrementPendingBroadcastsLocked();
595 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800596 } catch (PendingIntent.CanceledException e) {
597 return false;
598 }
599 }
600 return true;
601 }
602
Nick Pellyf1be6862012-05-15 10:53:42 -0700603 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800604 public void binderDied() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700605 if (D) Log.d(TAG, "Location listener died");
606
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400607 synchronized (mLock) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800608 removeUpdatesLocked(this);
609 }
Mike Lockwood48f17512009-04-23 09:12:08 -0700610 synchronized (this) {
611 if (mPendingBroadcasts > 0) {
612 LocationManagerService.this.decrementPendingBroadcasts();
613 mPendingBroadcasts = 0;
614 }
615 }
616 }
617
Nick Pellye0fd6932012-07-11 10:26:13 -0700618 @Override
Mike Lockwood48f17512009-04-23 09:12:08 -0700619 public void onSendFinished(PendingIntent pendingIntent, Intent intent,
620 int resultCode, String resultData, Bundle resultExtras) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400621 synchronized (this) {
622 decrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700623 }
624 }
625
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400626 // this must be called while synchronized by caller in a synchronized block
627 // containing the sending of the broadcaset
628 private void incrementPendingBroadcastsLocked() {
629 if (mPendingBroadcasts++ == 0) {
630 LocationManagerService.this.incrementPendingBroadcasts();
631 }
632 }
633
634 private void decrementPendingBroadcastsLocked() {
635 if (--mPendingBroadcasts == 0) {
636 LocationManagerService.this.decrementPendingBroadcasts();
Mike Lockwood48f17512009-04-23 09:12:08 -0700637 }
638 }
639 }
640
Nick Pellye0fd6932012-07-11 10:26:13 -0700641 @Override
Mike Lockwood48f17512009-04-23 09:12:08 -0700642 public void locationCallbackFinished(ILocationListener listener) {
Joshua Bartel080b61b2009-10-05 12:44:46 -0400643 //Do not use getReceiver here as that will add the ILocationListener to
644 //the receiver list if it is not found. If it is not found then the
645 //LocationListener was removed when it had a pending broadcast and should
646 //not be added back.
647 IBinder binder = listener.asBinder();
648 Receiver receiver = mReceivers.get(binder);
Mike Lockwood48f17512009-04-23 09:12:08 -0700649 if (receiver != null) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400650 synchronized (receiver) {
651 // so wakelock calls will succeed
652 long identity = Binder.clearCallingIdentity();
653 receiver.decrementPendingBroadcastsLocked();
654 Binder.restoreCallingIdentity(identity);
655 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800656 }
657 }
658
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700659 private void addProviderLocked(LocationProviderInterface provider) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400660 mProviders.add(provider);
661 mProvidersByName.put(provider.getName(), provider);
662 }
663
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700664 private void removeProviderLocked(LocationProviderInterface provider) {
665 provider.disable();
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400666 mProviders.remove(provider);
667 mProvidersByName.remove(provider.getName());
668 }
669
Mike Lockwood3d12b512009-04-21 23:25:35 -0700670
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800671 /**
672 * Returns "true" if access to the specified location provider is allowed by the current user's
673 * settings. Access to all location providers is forbidden to non-location-provider processes
674 * belonging to background users.
675 *
676 * @param provider the name of the location provider
677 * @param uid the requestor's UID
678 * @return
679 */
680 private boolean isAllowedBySettingsLocked(String provider, int uid) {
681 if (UserHandle.getUserId(uid) != mCurrentUserId && !isUidALocationProvider(uid)) {
Victoria Leaseb711d572012-10-02 13:14:11 -0700682 return false;
683 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800684 if (mEnabledProviders.contains(provider)) {
685 return true;
686 }
687 if (mDisabledProviders.contains(provider)) {
688 return false;
689 }
690 // Use system settings
691 ContentResolver resolver = mContext.getContentResolver();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800692
Victoria Leaseb711d572012-10-02 13:14:11 -0700693 return Settings.Secure.isLocationProviderEnabledForUser(resolver, provider, mCurrentUserId);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800694 }
695
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700696 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700697 * Returns the permission string associated with the specified resolution level.
698 *
699 * @param resolutionLevel the resolution level
700 * @return the permission string
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700701 */
Victoria Lease37425c32012-10-16 16:08:48 -0700702 private String getResolutionPermission(int resolutionLevel) {
703 switch (resolutionLevel) {
704 case RESOLUTION_LEVEL_FINE:
705 return android.Manifest.permission.ACCESS_FINE_LOCATION;
706 case RESOLUTION_LEVEL_COARSE:
707 return android.Manifest.permission.ACCESS_COARSE_LOCATION;
708 default:
709 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800710 }
Victoria Leaseda479c52012-10-15 15:24:16 -0700711 }
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700712
Victoria Leaseda479c52012-10-15 15:24:16 -0700713 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700714 * Returns the resolution level allowed to the given PID/UID pair.
715 *
716 * @param pid the PID
717 * @param uid the UID
718 * @return resolution level allowed to the pid/uid pair
Victoria Leaseda479c52012-10-15 15:24:16 -0700719 */
Victoria Lease37425c32012-10-16 16:08:48 -0700720 private int getAllowedResolutionLevel(int pid, int uid) {
721 if (mContext.checkPermission(android.Manifest.permission.ACCESS_FINE_LOCATION,
722 pid, uid) == PackageManager.PERMISSION_GRANTED) {
723 return RESOLUTION_LEVEL_FINE;
724 } else if (mContext.checkPermission(android.Manifest.permission.ACCESS_COARSE_LOCATION,
725 pid, uid) == PackageManager.PERMISSION_GRANTED) {
726 return RESOLUTION_LEVEL_COARSE;
727 } else {
728 return RESOLUTION_LEVEL_NONE;
Victoria Leaseda479c52012-10-15 15:24:16 -0700729 }
Victoria Lease4fab68b2012-09-13 13:20:59 -0700730 }
731
732 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700733 * Returns the resolution level allowed to the caller
734 *
735 * @return resolution level allowed to caller
Victoria Lease4fab68b2012-09-13 13:20:59 -0700736 */
Victoria Lease37425c32012-10-16 16:08:48 -0700737 private int getCallerAllowedResolutionLevel() {
738 return getAllowedResolutionLevel(Binder.getCallingPid(), Binder.getCallingUid());
739 }
740
741 /**
742 * Throw SecurityException if specified resolution level is insufficient to use geofences.
743 *
744 * @param allowedResolutionLevel resolution level allowed to caller
745 */
746 private void checkResolutionLevelIsSufficientForGeofenceUse(int allowedResolutionLevel) {
747 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
Victoria Lease4fab68b2012-09-13 13:20:59 -0700748 throw new SecurityException("Geofence usage requires ACCESS_FINE_LOCATION permission");
749 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800750 }
751
Victoria Lease37425c32012-10-16 16:08:48 -0700752 /**
753 * Return the minimum resolution level required to use the specified location provider.
754 *
755 * @param provider the name of the location provider
756 * @return minimum resolution level required for provider
757 */
758 private int getMinimumResolutionLevelForProviderUse(String provider) {
Victoria Lease8dbb6342012-09-21 16:55:53 -0700759 if (LocationManager.GPS_PROVIDER.equals(provider) ||
760 LocationManager.PASSIVE_PROVIDER.equals(provider)) {
761 // gps and passive providers require FINE permission
Victoria Lease37425c32012-10-16 16:08:48 -0700762 return RESOLUTION_LEVEL_FINE;
Victoria Lease8dbb6342012-09-21 16:55:53 -0700763 } else if (LocationManager.NETWORK_PROVIDER.equals(provider) ||
764 LocationManager.FUSED_PROVIDER.equals(provider)) {
765 // network and fused providers are ok with COARSE or FINE
Victoria Lease37425c32012-10-16 16:08:48 -0700766 return RESOLUTION_LEVEL_COARSE;
Laurent Tu941221c2012-10-04 14:21:52 -0700767 } else {
768 // mock providers
769 LocationProviderInterface lp = mMockProviders.get(provider);
770 if (lp != null) {
771 ProviderProperties properties = lp.getProperties();
772 if (properties != null) {
773 if (properties.mRequiresSatellite) {
774 // provider requiring satellites require FINE permission
Victoria Lease37425c32012-10-16 16:08:48 -0700775 return RESOLUTION_LEVEL_FINE;
Laurent Tu941221c2012-10-04 14:21:52 -0700776 } else if (properties.mRequiresNetwork || properties.mRequiresCell) {
777 // provider requiring network and or cell require COARSE or FINE
Victoria Lease37425c32012-10-16 16:08:48 -0700778 return RESOLUTION_LEVEL_COARSE;
Laurent Tu941221c2012-10-04 14:21:52 -0700779 }
780 }
781 }
Victoria Lease8dbb6342012-09-21 16:55:53 -0700782 }
Victoria Lease37425c32012-10-16 16:08:48 -0700783 return RESOLUTION_LEVEL_FINE; // if in doubt, require FINE
Victoria Leaseda479c52012-10-15 15:24:16 -0700784 }
785
Victoria Lease37425c32012-10-16 16:08:48 -0700786 /**
787 * Throw SecurityException if specified resolution level is insufficient to use the named
788 * location provider.
789 *
790 * @param allowedResolutionLevel resolution level allowed to caller
791 * @param providerName the name of the location provider
792 */
793 private void checkResolutionLevelIsSufficientForProviderUse(int allowedResolutionLevel,
794 String providerName) {
795 int requiredResolutionLevel = getMinimumResolutionLevelForProviderUse(providerName);
796 if (allowedResolutionLevel < requiredResolutionLevel) {
797 switch (requiredResolutionLevel) {
798 case RESOLUTION_LEVEL_FINE:
799 throw new SecurityException("\"" + providerName + "\" location provider " +
800 "requires ACCESS_FINE_LOCATION permission.");
801 case RESOLUTION_LEVEL_COARSE:
802 throw new SecurityException("\"" + providerName + "\" location provider " +
803 "requires ACCESS_COARSE_LOCATION or ACCESS_FINE_LOCATION permission.");
804 default:
805 throw new SecurityException("Insufficient permission for \"" + providerName +
806 "\" location provider.");
Victoria Leaseda479c52012-10-15 15:24:16 -0700807 }
808 }
Victoria Lease8dbb6342012-09-21 16:55:53 -0700809 }
810
Dianne Hackborn5e45ee62013-01-24 19:13:44 -0800811 public static int resolutionLevelToOp(int allowedResolutionLevel) {
Dianne Hackborn35654b62013-01-14 17:38:02 -0800812 if (allowedResolutionLevel != RESOLUTION_LEVEL_NONE) {
813 if (allowedResolutionLevel == RESOLUTION_LEVEL_COARSE) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -0800814 return AppOpsManager.OP_COARSE_LOCATION;
Dianne Hackborn35654b62013-01-14 17:38:02 -0800815 } else {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -0800816 return AppOpsManager.OP_FINE_LOCATION;
Dianne Hackborn35654b62013-01-14 17:38:02 -0800817 }
Dianne Hackborn5e45ee62013-01-24 19:13:44 -0800818 }
819 return -1;
820 }
821
822 boolean reportLocationAccessNoThrow(int uid, String packageName, int allowedResolutionLevel) {
823 int op = resolutionLevelToOp(allowedResolutionLevel);
824 if (op >= 0) {
Dianne Hackborn35654b62013-01-14 17:38:02 -0800825 if (mAppOps.noteOpNoThrow(op, uid, packageName) != AppOpsManager.MODE_ALLOWED) {
826 return false;
827 }
828 }
829 return true;
830 }
831
832 boolean checkLocationAccess(int uid, String packageName, int allowedResolutionLevel) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -0800833 int op = resolutionLevelToOp(allowedResolutionLevel);
834 if (op >= 0) {
Dianne Hackborn35654b62013-01-14 17:38:02 -0800835 if (mAppOps.checkOp(op, uid, packageName) != AppOpsManager.MODE_ALLOWED) {
836 return false;
837 }
838 }
839 return true;
840 }
841
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700842 /**
843 * Returns all providers by name, including passive, but excluding
Laurent Tu0d21e212012-10-02 15:33:48 -0700844 * fused, also including ones that are not permitted to
845 * be accessed by the calling activity or are currently disabled.
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700846 */
Nick Pellye0fd6932012-07-11 10:26:13 -0700847 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800848 public List<String> getAllProviders() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700849 ArrayList<String> out;
850 synchronized (mLock) {
851 out = new ArrayList<String>(mProviders.size());
852 for (LocationProviderInterface provider : mProviders) {
853 String name = provider.getName();
854 if (LocationManager.FUSED_PROVIDER.equals(name)) {
Mike Lockwood03ca2162010-04-01 08:10:09 -0700855 continue;
856 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800857 out.add(name);
858 }
859 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700860
861 if (D) Log.d(TAG, "getAllProviders()=" + out);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800862 return out;
863 }
864
Mike Lockwood03ca2162010-04-01 08:10:09 -0700865 /**
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700866 * Return all providers by name, that match criteria and are optionally
867 * enabled.
868 * Can return passive provider, but never returns fused provider.
Mike Lockwood03ca2162010-04-01 08:10:09 -0700869 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700870 @Override
871 public List<String> getProviders(Criteria criteria, boolean enabledOnly) {
Victoria Lease37425c32012-10-16 16:08:48 -0700872 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700873 ArrayList<String> out;
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800874 int uid = Binder.getCallingUid();;
Victoria Lease269518e2012-10-29 08:25:39 -0700875 long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -0700876 try {
877 synchronized (mLock) {
878 out = new ArrayList<String>(mProviders.size());
879 for (LocationProviderInterface provider : mProviders) {
880 String name = provider.getName();
881 if (LocationManager.FUSED_PROVIDER.equals(name)) {
Victoria Lease8dbb6342012-09-21 16:55:53 -0700882 continue;
883 }
Victoria Lease37425c32012-10-16 16:08:48 -0700884 if (allowedResolutionLevel >= getMinimumResolutionLevelForProviderUse(name)) {
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800885 if (enabledOnly && !isAllowedBySettingsLocked(name, uid)) {
Victoria Leaseb711d572012-10-02 13:14:11 -0700886 continue;
887 }
888 if (criteria != null && !LocationProvider.propertiesMeetCriteria(
889 name, provider.getProperties(), criteria)) {
890 continue;
891 }
892 out.add(name);
Victoria Lease8dbb6342012-09-21 16:55:53 -0700893 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700894 }
Mike Lockwood03ca2162010-04-01 08:10:09 -0700895 }
Victoria Leaseb711d572012-10-02 13:14:11 -0700896 } finally {
897 Binder.restoreCallingIdentity(identity);
Mike Lockwood03ca2162010-04-01 08:10:09 -0700898 }
899
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700900 if (D) Log.d(TAG, "getProviders()=" + out);
901 return out;
Mike Lockwood03ca2162010-04-01 08:10:09 -0700902 }
903
904 /**
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700905 * Return the name of the best provider given a Criteria object.
906 * This method has been deprecated from the public API,
Victoria Lease8dbb6342012-09-21 16:55:53 -0700907 * and the whole LocationProvider (including #meetsCriteria)
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700908 * has been deprecated as well. So this method now uses
909 * some simplified logic.
Mike Lockwood03ca2162010-04-01 08:10:09 -0700910 */
Nick Pellye0fd6932012-07-11 10:26:13 -0700911 @Override
Mike Lockwood03ca2162010-04-01 08:10:09 -0700912 public String getBestProvider(Criteria criteria, boolean enabledOnly) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700913 String result = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700914
915 List<String> providers = getProviders(criteria, enabledOnly);
Victoria Lease8dbb6342012-09-21 16:55:53 -0700916 if (!providers.isEmpty()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700917 result = pickBest(providers);
918 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
919 return result;
920 }
921 providers = getProviders(null, enabledOnly);
Victoria Lease8dbb6342012-09-21 16:55:53 -0700922 if (!providers.isEmpty()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700923 result = pickBest(providers);
924 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
925 return result;
Mike Lockwood03ca2162010-04-01 08:10:09 -0700926 }
927
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700928 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
Mike Lockwood03ca2162010-04-01 08:10:09 -0700929 return null;
930 }
931
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700932 private String pickBest(List<String> providers) {
Victoria Lease1925e292012-09-24 17:00:18 -0700933 if (providers.contains(LocationManager.GPS_PROVIDER)) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700934 return LocationManager.GPS_PROVIDER;
Victoria Lease1925e292012-09-24 17:00:18 -0700935 } else if (providers.contains(LocationManager.NETWORK_PROVIDER)) {
936 return LocationManager.NETWORK_PROVIDER;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700937 } else {
938 return providers.get(0);
939 }
940 }
941
Nick Pellye0fd6932012-07-11 10:26:13 -0700942 @Override
Mike Lockwood03ca2162010-04-01 08:10:09 -0700943 public boolean providerMeetsCriteria(String provider, Criteria criteria) {
944 LocationProviderInterface p = mProvidersByName.get(provider);
945 if (p == null) {
946 throw new IllegalArgumentException("provider=" + provider);
947 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700948
949 boolean result = LocationProvider.propertiesMeetCriteria(
950 p.getName(), p.getProperties(), criteria);
951 if (D) Log.d(TAG, "providerMeetsCriteria(" + provider + ", " + criteria + ")=" + result);
952 return result;
Mike Lockwood03ca2162010-04-01 08:10:09 -0700953 }
954
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800955 private void updateProvidersLocked() {
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -0700956 boolean changesMade = false;
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400957 for (int i = mProviders.size() - 1; i >= 0; i--) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -0500958 LocationProviderInterface p = mProviders.get(i);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800959 boolean isEnabled = p.isEnabled();
960 String name = p.getName();
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800961 boolean shouldBeEnabled = isAllowedBySettingsLocked(name,
962 UserHandle.getUid(mCurrentUserId, 0));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800963 if (isEnabled && !shouldBeEnabled) {
Victoria Leaseb711d572012-10-02 13:14:11 -0700964 updateProviderListenersLocked(name, false, mCurrentUserId);
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -0700965 changesMade = true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800966 } else if (!isEnabled && shouldBeEnabled) {
Victoria Leaseb711d572012-10-02 13:14:11 -0700967 updateProviderListenersLocked(name, true, mCurrentUserId);
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -0700968 changesMade = true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800969 }
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -0700970 }
971 if (changesMade) {
Dianne Hackborn5ac72a22012-08-29 18:32:08 -0700972 mContext.sendBroadcastAsUser(new Intent(LocationManager.PROVIDERS_CHANGED_ACTION),
973 UserHandle.ALL);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800974 }
975 }
976
Victoria Leaseb711d572012-10-02 13:14:11 -0700977 private void updateProviderListenersLocked(String provider, boolean enabled, int userId) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800978 int listeners = 0;
979
Mike Lockwoodd03ff942010-02-09 08:46:14 -0500980 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700981 if (p == null) return;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800982
983 ArrayList<Receiver> deadReceivers = null;
Nick Pellye0fd6932012-07-11 10:26:13 -0700984
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800985 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
986 if (records != null) {
987 final int N = records.size();
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700988 for (int i = 0; i < N; i++) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800989 UpdateRecord record = records.get(i);
Victoria Lease269518e2012-10-29 08:25:39 -0700990 if (UserHandle.getUserId(record.mReceiver.mUid) == userId) {
Victoria Leaseb711d572012-10-02 13:14:11 -0700991 // Sends a notification message to the receiver
992 if (!record.mReceiver.callProviderEnabledLocked(provider, enabled)) {
993 if (deadReceivers == null) {
994 deadReceivers = new ArrayList<Receiver>();
995 }
996 deadReceivers.add(record.mReceiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800997 }
Victoria Leaseb711d572012-10-02 13:14:11 -0700998 listeners++;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800999 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001000 }
1001 }
1002
1003 if (deadReceivers != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001004 for (int i = deadReceivers.size() - 1; i >= 0; i--) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001005 removeUpdatesLocked(deadReceivers.get(i));
1006 }
1007 }
Nick Pellye0fd6932012-07-11 10:26:13 -07001008
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001009 if (enabled) {
1010 p.enable();
1011 if (listeners > 0) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001012 applyRequirementsLocked(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001013 }
1014 } else {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001015 p.disable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001016 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001017 }
1018
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001019 private void applyRequirementsLocked(String provider) {
1020 LocationProviderInterface p = mProvidersByName.get(provider);
1021 if (p == null) return;
1022
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001023 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001024 WorkSource worksource = new WorkSource();
1025 ProviderRequest providerRequest = new ProviderRequest();
1026
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001027 if (records != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001028 for (UpdateRecord record : records) {
Victoria Lease269518e2012-10-29 08:25:39 -07001029 if (UserHandle.getUserId(record.mReceiver.mUid) == mCurrentUserId) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001030 if (checkLocationAccess(record.mReceiver.mUid, record.mReceiver.mPackageName,
1031 record.mReceiver.mAllowedResolutionLevel)) {
1032 LocationRequest locationRequest = record.mRequest;
1033 providerRequest.locationRequests.add(locationRequest);
1034 if (locationRequest.getInterval() < providerRequest.interval) {
1035 providerRequest.reportLocation = true;
1036 providerRequest.interval = locationRequest.getInterval();
1037 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001038 }
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -07001039 }
1040 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001041
1042 if (providerRequest.reportLocation) {
1043 // calculate who to blame for power
1044 // This is somewhat arbitrary. We pick a threshold interval
1045 // that is slightly higher that the minimum interval, and
1046 // spread the blame across all applications with a request
1047 // under that threshold.
1048 long thresholdInterval = (providerRequest.interval + 1000) * 3 / 2;
1049 for (UpdateRecord record : records) {
Victoria Lease269518e2012-10-29 08:25:39 -07001050 if (UserHandle.getUserId(record.mReceiver.mUid) == mCurrentUserId) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001051 LocationRequest locationRequest = record.mRequest;
1052 if (locationRequest.getInterval() <= thresholdInterval) {
Dianne Hackborn002a54e2013-01-10 17:34:55 -08001053 worksource.add(record.mReceiver.mUid, record.mReceiver.mPackageName);
Victoria Leaseb711d572012-10-02 13:14:11 -07001054 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001055 }
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -07001056 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001057 }
1058 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001059
1060 if (D) Log.d(TAG, "provider request: " + provider + " " + providerRequest);
1061 p.setRequest(providerRequest, worksource);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001062 }
1063
1064 private class UpdateRecord {
1065 final String mProvider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001066 final LocationRequest mRequest;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001067 final Receiver mReceiver;
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001068 Location mLastFixBroadcast;
1069 long mLastStatusBroadcast;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001070
1071 /**
1072 * Note: must be constructed with lock held.
1073 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001074 UpdateRecord(String provider, LocationRequest request, Receiver receiver) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001075 mProvider = provider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001076 mRequest = request;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001077 mReceiver = receiver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001078
1079 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1080 if (records == null) {
1081 records = new ArrayList<UpdateRecord>();
1082 mRecordsByProvider.put(provider, records);
1083 }
1084 if (!records.contains(this)) {
1085 records.add(this);
1086 }
1087 }
1088
1089 /**
1090 * Method to be called when a record will no longer be used. Calling this multiple times
1091 * must have the same effect as calling it once.
1092 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001093 void disposeLocked(boolean removeReceiver) {
1094 // remove from mRecordsByProvider
1095 ArrayList<UpdateRecord> globalRecords = mRecordsByProvider.get(this.mProvider);
1096 if (globalRecords != null) {
1097 globalRecords.remove(this);
1098 }
1099
1100 if (!removeReceiver) return; // the caller will handle the rest
1101
1102 // remove from Receiver#mUpdateRecords
1103 HashMap<String, UpdateRecord> receiverRecords = mReceiver.mUpdateRecords;
1104 if (receiverRecords != null) {
1105 receiverRecords.remove(this.mProvider);
1106
1107 // and also remove the Receiver if it has no more update records
1108 if (removeReceiver && receiverRecords.size() == 0) {
1109 removeUpdatesLocked(mReceiver);
1110 }
Mike Lockwood3a76fd62009-09-01 07:26:56 -04001111 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001112 }
1113
1114 @Override
1115 public String toString() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001116 StringBuilder s = new StringBuilder();
1117 s.append("UpdateRecord[");
1118 s.append(mProvider);
1119 s.append(' ').append(mReceiver.mPackageName).append('(');
1120 s.append(mReceiver.mUid).append(')');
1121 s.append(' ').append(mRequest);
1122 s.append(']');
1123 return s.toString();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001124 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001125 }
1126
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001127 private Receiver getReceiver(ILocationListener listener, int pid, int uid, String packageName) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001128 IBinder binder = listener.asBinder();
1129 Receiver receiver = mReceivers.get(binder);
1130 if (receiver == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001131 receiver = new Receiver(listener, null, pid, uid, packageName);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001132 mReceivers.put(binder, receiver);
1133
1134 try {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001135 receiver.getListener().asBinder().linkToDeath(receiver, 0);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001136 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001137 Slog.e(TAG, "linkToDeath failed:", e);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001138 return null;
1139 }
1140 }
1141 return receiver;
1142 }
1143
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001144 private Receiver getReceiver(PendingIntent intent, int pid, int uid, String packageName) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001145 Receiver receiver = mReceivers.get(intent);
1146 if (receiver == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001147 receiver = new Receiver(null, intent, pid, uid, packageName);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001148 mReceivers.put(intent, receiver);
1149 }
1150 return receiver;
1151 }
1152
Victoria Lease37425c32012-10-16 16:08:48 -07001153 /**
1154 * Creates a LocationRequest based upon the supplied LocationRequest that to meets resolution
1155 * and consistency requirements.
1156 *
1157 * @param request the LocationRequest from which to create a sanitized version
Victoria Lease37425c32012-10-16 16:08:48 -07001158 * @return a version of request that meets the given resolution and consistency requirements
1159 * @hide
1160 */
1161 private LocationRequest createSanitizedRequest(LocationRequest request, int resolutionLevel) {
1162 LocationRequest sanitizedRequest = new LocationRequest(request);
1163 if (resolutionLevel < RESOLUTION_LEVEL_FINE) {
1164 switch (sanitizedRequest.getQuality()) {
Victoria Lease09016ab2012-09-16 12:33:15 -07001165 case LocationRequest.ACCURACY_FINE:
Victoria Lease37425c32012-10-16 16:08:48 -07001166 sanitizedRequest.setQuality(LocationRequest.ACCURACY_BLOCK);
Victoria Lease09016ab2012-09-16 12:33:15 -07001167 break;
1168 case LocationRequest.POWER_HIGH:
Victoria Lease37425c32012-10-16 16:08:48 -07001169 sanitizedRequest.setQuality(LocationRequest.POWER_LOW);
Victoria Lease09016ab2012-09-16 12:33:15 -07001170 break;
1171 }
1172 // throttle
Victoria Lease37425c32012-10-16 16:08:48 -07001173 if (sanitizedRequest.getInterval() < LocationFudger.FASTEST_INTERVAL_MS) {
1174 sanitizedRequest.setInterval(LocationFudger.FASTEST_INTERVAL_MS);
Victoria Lease09016ab2012-09-16 12:33:15 -07001175 }
Victoria Lease37425c32012-10-16 16:08:48 -07001176 if (sanitizedRequest.getFastestInterval() < LocationFudger.FASTEST_INTERVAL_MS) {
1177 sanitizedRequest.setFastestInterval(LocationFudger.FASTEST_INTERVAL_MS);
Victoria Lease09016ab2012-09-16 12:33:15 -07001178 }
Nick Pelly74fa7ea2012-08-13 19:36:38 -07001179 }
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001180 // make getFastestInterval() the minimum of interval and fastest interval
Victoria Lease37425c32012-10-16 16:08:48 -07001181 if (sanitizedRequest.getFastestInterval() > sanitizedRequest.getInterval()) {
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001182 request.setFastestInterval(request.getInterval());
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001183 }
Victoria Lease37425c32012-10-16 16:08:48 -07001184 return sanitizedRequest;
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001185 }
1186
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001187 private void checkPackageName(String packageName) {
Nick Pellye0fd6932012-07-11 10:26:13 -07001188 if (packageName == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001189 throw new SecurityException("invalid package name: " + packageName);
Nick Pellye0fd6932012-07-11 10:26:13 -07001190 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001191 int uid = Binder.getCallingUid();
Nick Pellye0fd6932012-07-11 10:26:13 -07001192 String[] packages = mPackageManager.getPackagesForUid(uid);
1193 if (packages == null) {
1194 throw new SecurityException("invalid UID " + uid);
1195 }
1196 for (String pkg : packages) {
1197 if (packageName.equals(pkg)) return;
1198 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001199 throw new SecurityException("invalid package name: " + packageName);
Nick Pellye0fd6932012-07-11 10:26:13 -07001200 }
1201
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001202 private void checkPendingIntent(PendingIntent intent) {
1203 if (intent == null) {
1204 throw new IllegalArgumentException("invalid pending intent: " + intent);
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001205 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001206 }
1207
1208 private Receiver checkListenerOrIntent(ILocationListener listener, PendingIntent intent,
1209 int pid, int uid, String packageName) {
1210 if (intent == null && listener == null) {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001211 throw new IllegalArgumentException("need either listener or intent");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001212 } else if (intent != null && listener != null) {
1213 throw new IllegalArgumentException("cannot register both listener and intent");
1214 } else if (intent != null) {
1215 checkPendingIntent(intent);
1216 return getReceiver(intent, pid, uid, packageName);
1217 } else {
1218 return getReceiver(listener, pid, uid, packageName);
1219 }
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001220 }
1221
Nick Pellye0fd6932012-07-11 10:26:13 -07001222 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001223 public void requestLocationUpdates(LocationRequest request, ILocationListener listener,
1224 PendingIntent intent, String packageName) {
1225 if (request == null) request = DEFAULT_LOCATION_REQUEST;
1226 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001227 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1228 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1229 request.getProvider());
1230 LocationRequest sanitizedRequest = createSanitizedRequest(request, allowedResolutionLevel);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001231
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001232 final int pid = Binder.getCallingPid();
1233 final int uid = Binder.getCallingUid();
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001234 // providers may use public location API's, need to clear identity
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001235 long identity = Binder.clearCallingIdentity();
1236 try {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001237 // We don't check for MODE_IGNORED here; we will do that when we go to deliver
1238 // a location.
Dianne Hackborn35654b62013-01-14 17:38:02 -08001239 checkLocationAccess(uid, packageName, allowedResolutionLevel);
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001240 Receiver recevier = checkListenerOrIntent(listener, intent, pid, uid, packageName);
1241
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001242 synchronized (mLock) {
Victoria Lease37425c32012-10-16 16:08:48 -07001243 requestLocationUpdatesLocked(sanitizedRequest, recevier, pid, uid, packageName);
Mike Lockwood2d4d1bf2010-10-18 17:06:26 -04001244 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001245 } finally {
1246 Binder.restoreCallingIdentity(identity);
1247 }
1248 }
1249
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001250 private void requestLocationUpdatesLocked(LocationRequest request, Receiver receiver,
1251 int pid, int uid, String packageName) {
1252 // Figure out the provider. Either its explicitly request (legacy use cases), or
1253 // use the fused provider
1254 if (request == null) request = DEFAULT_LOCATION_REQUEST;
1255 String name = request.getProvider();
Victoria Lease09016ab2012-09-16 12:33:15 -07001256 if (name == null) {
1257 throw new IllegalArgumentException("provider name must not be null");
1258 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001259 LocationProviderInterface provider = mProvidersByName.get(name);
1260 if (provider == null) {
1261 throw new IllegalArgumentException("provider doesn't exisit: " + provider);
1262 }
1263
Dianne Hackborn7ff30112012-11-08 11:12:09 -08001264 if (D) Log.d(TAG, "request " + Integer.toHexString(System.identityHashCode(receiver))
1265 + " " + name + " " + request + " from " + packageName + "(" + uid + ")");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001266
1267 UpdateRecord record = new UpdateRecord(name, request, receiver);
1268 UpdateRecord oldRecord = receiver.mUpdateRecords.put(name, record);
1269 if (oldRecord != null) {
1270 oldRecord.disposeLocked(false);
1271 }
1272
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001273 boolean isProviderEnabled = isAllowedBySettingsLocked(name, uid);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001274 if (isProviderEnabled) {
1275 applyRequirementsLocked(name);
1276 } else {
1277 // Notify the listener that updates are currently disabled
1278 receiver.callProviderEnabledLocked(name, false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001279 }
1280 }
1281
Nick Pellye0fd6932012-07-11 10:26:13 -07001282 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001283 public void removeUpdates(ILocationListener listener, PendingIntent intent,
1284 String packageName) {
1285 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001286
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001287 final int pid = Binder.getCallingPid();
1288 final int uid = Binder.getCallingUid();
1289 Receiver receiver = checkListenerOrIntent(listener, intent, pid, uid, packageName);
1290
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001291 // providers may use public location API's, need to clear identity
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001292 long identity = Binder.clearCallingIdentity();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001293 try {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001294 synchronized (mLock) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001295 removeUpdatesLocked(receiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001296 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001297 } finally {
1298 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001299 }
1300 }
1301
1302 private void removeUpdatesLocked(Receiver receiver) {
Dianne Hackborn7ff30112012-11-08 11:12:09 -08001303 if (D) Log.i(TAG, "remove " + Integer.toHexString(System.identityHashCode(receiver)));
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001304
1305 if (mReceivers.remove(receiver.mKey) != null && receiver.isListener()) {
1306 receiver.getListener().asBinder().unlinkToDeath(receiver, 0);
1307 synchronized (receiver) {
1308 if (receiver.mPendingBroadcasts > 0) {
1309 decrementPendingBroadcasts();
1310 receiver.mPendingBroadcasts = 0;
1311 }
1312 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001313 }
1314
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001315 // Record which providers were associated with this listener
1316 HashSet<String> providers = new HashSet<String>();
1317 HashMap<String, UpdateRecord> oldRecords = receiver.mUpdateRecords;
1318 if (oldRecords != null) {
1319 // Call dispose() on the obsolete update records.
1320 for (UpdateRecord record : oldRecords.values()) {
1321 record.disposeLocked(false);
1322 }
1323 // Accumulate providers
1324 providers.addAll(oldRecords.keySet());
1325 }
1326
1327 // update provider
1328 for (String provider : providers) {
1329 // If provider is already disabled, don't need to do anything
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001330 if (!isAllowedBySettingsLocked(provider, UserHandle.getUid(mCurrentUserId, 0))) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001331 continue;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001332 }
1333
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001334 applyRequirementsLocked(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001335 }
1336 }
1337
Nick Pellye0fd6932012-07-11 10:26:13 -07001338 @Override
Nick Pelly4035f5a2012-08-17 14:43:49 -07001339 public Location getLastLocation(LocationRequest request, String packageName) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001340 if (D) Log.d(TAG, "getLastLocation: " + request);
1341 if (request == null) request = DEFAULT_LOCATION_REQUEST;
Victoria Lease37425c32012-10-16 16:08:48 -07001342 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
Nick Pelly4035f5a2012-08-17 14:43:49 -07001343 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001344 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1345 request.getProvider());
1346 // no need to sanitize this request, as only the provider name is used
Nick Pelly4035f5a2012-08-17 14:43:49 -07001347
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001348 final int uid = Binder.getCallingUid();
1349 final long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001350 try {
1351 if (mBlacklist.isBlacklisted(packageName)) {
1352 if (D) Log.d(TAG, "not returning last loc for blacklisted app: " +
1353 packageName);
Victoria Lease09016ab2012-09-16 12:33:15 -07001354 return null;
1355 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001356
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001357 if (!reportLocationAccessNoThrow(uid, packageName, allowedResolutionLevel)) {
1358 if (D) Log.d(TAG, "not returning last loc for no op app: " +
1359 packageName);
1360 return null;
1361 }
1362
Victoria Leaseb711d572012-10-02 13:14:11 -07001363 synchronized (mLock) {
1364 // Figure out the provider. Either its explicitly request (deprecated API's),
1365 // or use the fused provider
1366 String name = request.getProvider();
1367 if (name == null) name = LocationManager.FUSED_PROVIDER;
1368 LocationProviderInterface provider = mProvidersByName.get(name);
1369 if (provider == null) return null;
1370
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001371 if (!isAllowedBySettingsLocked(name, uid)) return null;
Victoria Leaseb711d572012-10-02 13:14:11 -07001372
1373 Location location = mLastLocation.get(name);
1374 if (location == null) {
1375 return null;
1376 }
Victoria Lease37425c32012-10-16 16:08:48 -07001377 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001378 Location noGPSLocation = location.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1379 if (noGPSLocation != null) {
Dianne Hackborn6c5406a2012-11-29 16:18:01 -08001380 return new Location(mLocationFudger.getOrCreate(noGPSLocation));
Victoria Leaseb711d572012-10-02 13:14:11 -07001381 }
Victoria Lease37425c32012-10-16 16:08:48 -07001382 } else {
Dianne Hackborn6c5406a2012-11-29 16:18:01 -08001383 return new Location(location);
Victoria Lease09016ab2012-09-16 12:33:15 -07001384 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001385 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001386 return null;
1387 } finally {
1388 Binder.restoreCallingIdentity(identity);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001389 }
1390 }
1391
1392 @Override
1393 public void requestGeofence(LocationRequest request, Geofence geofence, PendingIntent intent,
1394 String packageName) {
1395 if (request == null) request = DEFAULT_LOCATION_REQUEST;
Victoria Lease37425c32012-10-16 16:08:48 -07001396 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1397 checkResolutionLevelIsSufficientForGeofenceUse(allowedResolutionLevel);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001398 checkPendingIntent(intent);
1399 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001400 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1401 request.getProvider());
1402 LocationRequest sanitizedRequest = createSanitizedRequest(request, allowedResolutionLevel);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001403
Victoria Lease37425c32012-10-16 16:08:48 -07001404 if (D) Log.d(TAG, "requestGeofence: " + sanitizedRequest + " " + geofence + " " + intent);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001405
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001406 // geo-fence manager uses the public location API, need to clear identity
1407 int uid = Binder.getCallingUid();
Victoria Lease56e675b2012-11-05 19:25:06 -08001408 if (UserHandle.getUserId(uid) != UserHandle.USER_OWNER) {
1409 // temporary measure until geofences work for secondary users
1410 Log.w(TAG, "proximity alerts are currently available only to the primary user");
1411 return;
1412 }
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001413 long identity = Binder.clearCallingIdentity();
1414 try {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001415 mGeofenceManager.addFence(sanitizedRequest, geofence, intent, allowedResolutionLevel,
1416 uid, packageName);
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001417 } finally {
1418 Binder.restoreCallingIdentity(identity);
1419 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001420 }
1421
1422 @Override
1423 public void removeGeofence(Geofence geofence, PendingIntent intent, String packageName) {
Victoria Lease37425c32012-10-16 16:08:48 -07001424 checkResolutionLevelIsSufficientForGeofenceUse(getCallerAllowedResolutionLevel());
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001425 checkPendingIntent(intent);
1426 checkPackageName(packageName);
1427
1428 if (D) Log.d(TAG, "removeGeofence: " + geofence + " " + intent);
1429
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001430 // geo-fence manager uses the public location API, need to clear identity
1431 long identity = Binder.clearCallingIdentity();
1432 try {
1433 mGeofenceManager.removeFence(geofence, intent);
1434 } finally {
1435 Binder.restoreCallingIdentity(identity);
1436 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001437 }
1438
1439
1440 @Override
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001441 public boolean addGpsStatusListener(IGpsStatusListener listener, String packageName) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001442 if (mGpsStatusProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001443 return false;
1444 }
Dianne Hackborn35654b62013-01-14 17:38:02 -08001445 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1446 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
Victoria Lease37425c32012-10-16 16:08:48 -07001447 LocationManager.GPS_PROVIDER);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001448
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001449 final int uid = Binder.getCallingUid();
1450 final long ident = Binder.clearCallingIdentity();
1451 try {
Dianne Hackborn35654b62013-01-14 17:38:02 -08001452 if (checkLocationAccess(uid, packageName, allowedResolutionLevel)) {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001453 return false;
1454 }
1455 } finally {
1456 Binder.restoreCallingIdentity(ident);
1457 }
1458
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001459 try {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001460 mGpsStatusProvider.addGpsStatusListener(listener);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001461 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001462 Slog.e(TAG, "mGpsStatusProvider.addGpsStatusListener failed", e);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001463 return false;
1464 }
1465 return true;
1466 }
1467
Nick Pellye0fd6932012-07-11 10:26:13 -07001468 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001469 public void removeGpsStatusListener(IGpsStatusListener listener) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001470 synchronized (mLock) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001471 try {
1472 mGpsStatusProvider.removeGpsStatusListener(listener);
1473 } catch (Exception e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001474 Slog.e(TAG, "mGpsStatusProvider.removeGpsStatusListener failed", e);
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001475 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001476 }
1477 }
1478
Nick Pellye0fd6932012-07-11 10:26:13 -07001479 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001480 public boolean sendExtraCommand(String provider, String command, Bundle extras) {
Mike Lockwoodc6cc8362009-08-17 13:16:08 -04001481 if (provider == null) {
1482 // throw NullPointerException to remain compatible with previous implementation
1483 throw new NullPointerException();
1484 }
Victoria Lease37425c32012-10-16 16:08:48 -07001485 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1486 provider);
Mike Lockwoodc6cc8362009-08-17 13:16:08 -04001487
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001488 // and check for ACCESS_LOCATION_EXTRA_COMMANDS
Mike Lockwoodb7e99222009-07-07 13:18:21 -04001489 if ((mContext.checkCallingOrSelfPermission(ACCESS_LOCATION_EXTRA_COMMANDS)
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001490 != PackageManager.PERMISSION_GRANTED)) {
1491 throw new SecurityException("Requires ACCESS_LOCATION_EXTRA_COMMANDS permission");
1492 }
1493
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001494 synchronized (mLock) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001495 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001496 if (p == null) return false;
Nick Pellye0fd6932012-07-11 10:26:13 -07001497
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001498 return p.sendExtraCommand(command, extras);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001499 }
1500 }
1501
Nick Pellye0fd6932012-07-11 10:26:13 -07001502 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001503 public boolean sendNiResponse(int notifId, int userResponse) {
Mike Lockwood18ad9f62009-08-27 14:01:23 -07001504 if (Binder.getCallingUid() != Process.myUid()) {
1505 throw new SecurityException(
1506 "calling sendNiResponse from outside of the system is not allowed");
1507 }
Danke Xie22d1f9f2009-08-18 18:28:45 -04001508 try {
1509 return mNetInitiatedListener.sendNiResponse(notifId, userResponse);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001510 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001511 Slog.e(TAG, "RemoteException in LocationManagerService.sendNiResponse");
Danke Xie22d1f9f2009-08-18 18:28:45 -04001512 return false;
1513 }
1514 }
1515
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001516 /**
Mike Lockwood628fd6d2010-01-25 22:46:13 -05001517 * @return null if the provider does not exist
Alexey Tarasovf2db9fb2009-09-01 02:37:07 +11001518 * @throws SecurityException if the provider is not allowed to be
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001519 * accessed by the caller
1520 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001521 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001522 public ProviderProperties getProviderProperties(String provider) {
Laurent Tub7f9d252012-10-16 14:25:00 -07001523 if (mProvidersByName.get(provider) == null) {
1524 return null;
1525 }
1526
Victoria Lease37425c32012-10-16 16:08:48 -07001527 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1528 provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001529
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001530 LocationProviderInterface p;
1531 synchronized (mLock) {
1532 p = mProvidersByName.get(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001533 }
1534
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001535 if (p == null) return null;
1536 return p.getProperties();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001537 }
1538
Nick Pellye0fd6932012-07-11 10:26:13 -07001539 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001540 public boolean isProviderEnabled(String provider) {
Victoria Lease37425c32012-10-16 16:08:48 -07001541 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1542 provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001543 if (LocationManager.FUSED_PROVIDER.equals(provider)) return false;
1544
Victoria Lease269518e2012-10-29 08:25:39 -07001545 long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001546 try {
1547 synchronized (mLock) {
1548 LocationProviderInterface p = mProvidersByName.get(provider);
1549 if (p == null) return false;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001550
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001551 return isAllowedBySettingsLocked(provider, UserHandle.getUid(mCurrentUserId, 0));
Victoria Leaseb711d572012-10-02 13:14:11 -07001552 }
1553 } finally {
1554 Binder.restoreCallingIdentity(identity);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001555 }
1556 }
1557
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001558 /**
1559 * Returns "true" if the UID belongs to a bound location provider.
1560 *
1561 * @param uid the uid
1562 * @return true if uid belongs to a bound location provider
1563 */
1564 private boolean isUidALocationProvider(int uid) {
1565 if (uid == Process.SYSTEM_UID) {
1566 return true;
1567 }
1568 if (mGeocodeProvider != null) {
1569 if (doesPackageHaveUid(uid, mGeocodeProvider.getConnectedPackageName())) return true;
1570 }
1571 for (LocationProviderProxy proxy : mProxyProviders) {
1572 if (doesPackageHaveUid(uid, proxy.getConnectedPackageName())) return true;
1573 }
1574 return false;
1575 }
1576
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001577 private void checkCallerIsProvider() {
1578 if (mContext.checkCallingOrSelfPermission(INSTALL_LOCATION_PROVIDER)
1579 == PackageManager.PERMISSION_GRANTED) {
1580 return;
1581 }
1582
1583 // Previously we only used the INSTALL_LOCATION_PROVIDER
1584 // check. But that is system or signature
1585 // protection level which is not flexible enough for
1586 // providers installed oustide the system image. So
1587 // also allow providers with a UID matching the
1588 // currently bound package name
1589
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001590 if (isUidALocationProvider(Binder.getCallingUid())) {
1591 return;
1592 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001593
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001594 throw new SecurityException("need INSTALL_LOCATION_PROVIDER permission, " +
1595 "or UID of a currently bound location provider");
1596 }
1597
1598 private boolean doesPackageHaveUid(int uid, String packageName) {
1599 if (packageName == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001600 return false;
1601 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001602 try {
1603 ApplicationInfo appInfo = mPackageManager.getApplicationInfo(packageName, 0);
1604 if (appInfo.uid != uid) {
1605 return false;
1606 }
1607 } catch (NameNotFoundException e) {
1608 return false;
1609 }
1610 return true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001611 }
1612
Nick Pellye0fd6932012-07-11 10:26:13 -07001613 @Override
Mike Lockwooda4903f22010-02-17 06:42:23 -05001614 public void reportLocation(Location location, boolean passive) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001615 checkCallerIsProvider();
Mike Lockwood275555c2009-05-01 11:30:34 -04001616
Nick Pelly2eeeec22012-07-18 13:13:37 -07001617 if (!location.isComplete()) {
1618 Log.w(TAG, "Dropping incomplete location: " + location);
1619 return;
1620 }
1621
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001622 mLocationHandler.removeMessages(MSG_LOCATION_CHANGED, location);
1623 Message m = Message.obtain(mLocationHandler, MSG_LOCATION_CHANGED, location);
Mike Lockwooda4903f22010-02-17 06:42:23 -05001624 m.arg1 = (passive ? 1 : 0);
Mike Lockwood4e50b782009-04-03 08:24:43 -07001625 mLocationHandler.sendMessageAtFrontOfQueue(m);
1626 }
1627
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001628
Laurent Tu75defb62012-11-01 16:21:52 -07001629 private static boolean shouldBroadcastSafe(
1630 Location loc, Location lastLoc, UpdateRecord record, long now) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001631 // Always broadcast the first update
1632 if (lastLoc == null) {
1633 return true;
1634 }
1635
Nick Pellyf1be6862012-05-15 10:53:42 -07001636 // Check whether sufficient time has passed
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001637 long minTime = record.mRequest.getFastestInterval();
Philip Milne41180122012-09-26 11:29:25 -07001638 long delta = (loc.getElapsedRealtimeNanos() - lastLoc.getElapsedRealtimeNanos()) / 1000000L;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001639 if (delta < minTime - MAX_PROVIDER_SCHEDULING_JITTER_MS) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001640 return false;
1641 }
1642
1643 // Check whether sufficient distance has been traveled
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001644 double minDistance = record.mRequest.getSmallestDisplacement();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001645 if (minDistance > 0.0) {
1646 if (loc.distanceTo(lastLoc) <= minDistance) {
1647 return false;
1648 }
1649 }
1650
Laurent Tu75defb62012-11-01 16:21:52 -07001651 // Check whether sufficient number of udpates is left
1652 if (record.mRequest.getNumUpdates() <= 0) {
1653 return false;
1654 }
1655
1656 // Check whether the expiry date has passed
1657 if (record.mRequest.getExpireAt() < now) {
1658 return false;
1659 }
1660
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001661 return true;
1662 }
1663
Mike Lockwooda4903f22010-02-17 06:42:23 -05001664 private void handleLocationChangedLocked(Location location, boolean passive) {
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001665 if (D) Log.d(TAG, "incoming location: " + location);
1666
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001667 long now = SystemClock.elapsedRealtime();
Mike Lockwooda4903f22010-02-17 06:42:23 -05001668 String provider = (passive ? LocationManager.PASSIVE_PROVIDER : location.getProvider());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001669
Laurent Tu60ec50a2012-10-04 17:00:10 -07001670 // Skip if the provider is unknown.
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001671 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001672 if (p == null) return;
1673
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001674 // Update last known locations
Victoria Lease09016ab2012-09-16 12:33:15 -07001675 Location noGPSLocation = location.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1676 Location lastNoGPSLocation = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001677 Location lastLocation = mLastLocation.get(provider);
Mike Lockwood4e50b782009-04-03 08:24:43 -07001678 if (lastLocation == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001679 lastLocation = new Location(provider);
1680 mLastLocation.put(provider, lastLocation);
Victoria Lease09016ab2012-09-16 12:33:15 -07001681 } else {
1682 lastNoGPSLocation = lastLocation.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1683 if (noGPSLocation == null && lastNoGPSLocation != null) {
1684 // New location has no no-GPS location: adopt last no-GPS location. This is set
1685 // directly into location because we do not want to notify COARSE clients.
1686 location.setExtraLocation(Location.EXTRA_NO_GPS_LOCATION, lastNoGPSLocation);
1687 }
Mike Lockwood4e50b782009-04-03 08:24:43 -07001688 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001689 lastLocation.set(location);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001690
Laurent Tu60ec50a2012-10-04 17:00:10 -07001691 // Skip if there are no UpdateRecords for this provider.
1692 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1693 if (records == null || records.size() == 0) return;
1694
Victoria Lease09016ab2012-09-16 12:33:15 -07001695 // Fetch coarse location
1696 Location coarseLocation = null;
1697 if (noGPSLocation != null && !noGPSLocation.equals(lastNoGPSLocation)) {
1698 coarseLocation = mLocationFudger.getOrCreate(noGPSLocation);
1699 }
1700
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001701 // Fetch latest status update time
1702 long newStatusUpdateTime = p.getStatusUpdateTime();
1703
Mike Lockwood7ec434e2009-03-27 07:46:48 -07001704 // Get latest status
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001705 Bundle extras = new Bundle();
1706 int status = p.getStatus(extras);
1707
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001708 ArrayList<Receiver> deadReceivers = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001709 ArrayList<UpdateRecord> deadUpdateRecords = null;
Nick Pellye0fd6932012-07-11 10:26:13 -07001710
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001711 // Broadcast location or status to all listeners
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001712 for (UpdateRecord r : records) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001713 Receiver receiver = r.mReceiver;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001714 boolean receiverDead = false;
Nick Pelly4035f5a2012-08-17 14:43:49 -07001715
Victoria Lease269518e2012-10-29 08:25:39 -07001716 int receiverUserId = UserHandle.getUserId(receiver.mUid);
1717 if (receiverUserId != mCurrentUserId) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001718 if (D) {
Victoria Lease269518e2012-10-29 08:25:39 -07001719 Log.d(TAG, "skipping loc update for background user " + receiverUserId +
Victoria Leaseb711d572012-10-02 13:14:11 -07001720 " (current user: " + mCurrentUserId + ", app: " +
1721 receiver.mPackageName + ")");
1722 }
1723 continue;
1724 }
1725
Nick Pelly4035f5a2012-08-17 14:43:49 -07001726 if (mBlacklist.isBlacklisted(receiver.mPackageName)) {
1727 if (D) Log.d(TAG, "skipping loc update for blacklisted app: " +
1728 receiver.mPackageName);
1729 continue;
1730 }
1731
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001732 if (!reportLocationAccessNoThrow(receiver.mUid, receiver.mPackageName,
1733 receiver.mAllowedResolutionLevel)) {
1734 if (D) Log.d(TAG, "skipping loc update for no op app: " +
1735 receiver.mPackageName);
1736 continue;
1737 }
1738
Victoria Lease09016ab2012-09-16 12:33:15 -07001739 Location notifyLocation = null;
Victoria Lease37425c32012-10-16 16:08:48 -07001740 if (receiver.mAllowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
1741 notifyLocation = coarseLocation; // use coarse location
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001742 } else {
Victoria Lease37425c32012-10-16 16:08:48 -07001743 notifyLocation = lastLocation; // use fine location
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001744 }
Victoria Lease09016ab2012-09-16 12:33:15 -07001745 if (notifyLocation != null) {
1746 Location lastLoc = r.mLastFixBroadcast;
Laurent Tu75defb62012-11-01 16:21:52 -07001747 if ((lastLoc == null) || shouldBroadcastSafe(notifyLocation, lastLoc, r, now)) {
Victoria Lease09016ab2012-09-16 12:33:15 -07001748 if (lastLoc == null) {
1749 lastLoc = new Location(notifyLocation);
1750 r.mLastFixBroadcast = lastLoc;
1751 } else {
1752 lastLoc.set(notifyLocation);
1753 }
1754 if (!receiver.callLocationChangedLocked(notifyLocation)) {
1755 Slog.w(TAG, "RemoteException calling onLocationChanged on " + receiver);
1756 receiverDead = true;
1757 }
Laurent Tu75defb62012-11-01 16:21:52 -07001758 r.mRequest.decrementNumUpdates();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001759 }
1760 }
1761
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001762 long prevStatusUpdateTime = r.mLastStatusBroadcast;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001763 if ((newStatusUpdateTime > prevStatusUpdateTime) &&
Victoria Lease09016ab2012-09-16 12:33:15 -07001764 (prevStatusUpdateTime != 0 || status != LocationProvider.AVAILABLE)) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001765
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001766 r.mLastStatusBroadcast = newStatusUpdateTime;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001767 if (!receiver.callStatusChangedLocked(provider, status, extras)) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07001768 receiverDead = true;
Joe Onorato8a9b2202010-02-26 18:56:32 -08001769 Slog.w(TAG, "RemoteException calling onStatusChanged on " + receiver);
Mike Lockwood03ca2162010-04-01 08:10:09 -07001770 }
1771 }
1772
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001773 // track expired records
Laurent Tu75defb62012-11-01 16:21:52 -07001774 if (r.mRequest.getNumUpdates() <= 0 || r.mRequest.getExpireAt() < now) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001775 if (deadUpdateRecords == null) {
1776 deadUpdateRecords = new ArrayList<UpdateRecord>();
1777 }
1778 deadUpdateRecords.add(r);
1779 }
1780 // track dead receivers
1781 if (receiverDead) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07001782 if (deadReceivers == null) {
1783 deadReceivers = new ArrayList<Receiver>();
1784 }
1785 if (!deadReceivers.contains(receiver)) {
1786 deadReceivers.add(receiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001787 }
1788 }
1789 }
Nick Pellye0fd6932012-07-11 10:26:13 -07001790
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001791 // remove dead records and receivers outside the loop
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001792 if (deadReceivers != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001793 for (Receiver receiver : deadReceivers) {
1794 removeUpdatesLocked(receiver);
1795 }
1796 }
1797 if (deadUpdateRecords != null) {
1798 for (UpdateRecord r : deadUpdateRecords) {
1799 r.disposeLocked(true);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001800 }
Victoria Lease8b38b292012-12-04 15:04:43 -08001801 applyRequirementsLocked(provider);
1802 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001803 }
1804
1805 private class LocationWorkerHandler extends Handler {
Victoria Lease5cd731a2012-12-19 15:04:21 -08001806 public LocationWorkerHandler(Looper looper) {
1807 super(looper, null, true);
1808 }
1809
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001810 @Override
1811 public void handleMessage(Message msg) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001812 switch (msg.what) {
1813 case MSG_LOCATION_CHANGED:
1814 handleLocationChanged((Location) msg.obj, msg.arg1 == 1);
1815 break;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001816 }
1817 }
1818 }
1819
Victoria Lease54ca7ae2013-01-08 09:39:50 -08001820 private boolean isMockProvider(String provider) {
1821 synchronized (mLock) {
1822 return mMockProviders.containsKey(provider);
1823 }
1824 }
1825
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001826 private void handleLocationChanged(Location location, boolean passive) {
Victoria Lease54ca7ae2013-01-08 09:39:50 -08001827 // create a working copy of the incoming Location so that the service can modify it without
1828 // disturbing the caller's copy
1829 Location myLocation = new Location(location);
1830 String provider = myLocation.getProvider();
1831
1832 // set "isFromMockProvider" bit if location came from a mock provider. we do not clear this
1833 // bit if location did not come from a mock provider because passive/fused providers can
1834 // forward locations from mock providers, and should not grant them legitimacy in doing so.
1835 if (!myLocation.isFromMockProvider() && isMockProvider(provider)) {
1836 myLocation.setIsFromMockProvider(true);
1837 }
Jeff Sharkey5e613312012-01-30 11:16:20 -08001838
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001839 if (!passive) {
1840 // notify passive provider of the new location
Victoria Lease54ca7ae2013-01-08 09:39:50 -08001841 mPassiveProvider.updateLocation(myLocation);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001842 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001843
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001844 synchronized (mLock) {
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001845 if (isAllowedBySettingsLocked(provider, UserHandle.getUid(mCurrentUserId, 0))) {
Victoria Lease54ca7ae2013-01-08 09:39:50 -08001846 handleLocationChangedLocked(myLocation, passive);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001847 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001848 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001849 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001850
Mike Lockwoode97ae402010-09-29 15:23:46 -04001851 private final PackageMonitor mPackageMonitor = new PackageMonitor() {
1852 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001853 public void onPackageDisappeared(String packageName, int reason) {
1854 // remove all receivers associated with this package name
1855 synchronized (mLock) {
1856 ArrayList<Receiver> deadReceivers = null;
1857
1858 for (Receiver receiver : mReceivers.values()) {
1859 if (receiver.mPackageName.equals(packageName)) {
1860 if (deadReceivers == null) {
1861 deadReceivers = new ArrayList<Receiver>();
1862 }
1863 deadReceivers.add(receiver);
1864 }
1865 }
1866
1867 // perform removal outside of mReceivers loop
1868 if (deadReceivers != null) {
1869 for (Receiver receiver : deadReceivers) {
1870 removeUpdatesLocked(receiver);
1871 }
1872 }
1873 }
Nick Pellye0fd6932012-07-11 10:26:13 -07001874 }
Mike Lockwoode97ae402010-09-29 15:23:46 -04001875 };
1876
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001877 // Wake locks
1878
Mike Lockwood0528b9b2009-05-07 10:12:54 -04001879 private void incrementPendingBroadcasts() {
1880 synchronized (mWakeLock) {
1881 if (mPendingBroadcasts++ == 0) {
1882 try {
1883 mWakeLock.acquire();
1884 log("Acquired wakelock");
1885 } catch (Exception e) {
1886 // This is to catch a runtime exception thrown when we try to release an
1887 // already released lock.
Joe Onorato8a9b2202010-02-26 18:56:32 -08001888 Slog.e(TAG, "exception in acquireWakeLock()", e);
Mike Lockwood0528b9b2009-05-07 10:12:54 -04001889 }
1890 }
Mike Lockwood48f17512009-04-23 09:12:08 -07001891 }
1892 }
1893
1894 private void decrementPendingBroadcasts() {
Mike Lockwood0528b9b2009-05-07 10:12:54 -04001895 synchronized (mWakeLock) {
Mike Lockwood48f17512009-04-23 09:12:08 -07001896 if (--mPendingBroadcasts == 0) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -04001897 try {
1898 // Release wake lock
1899 if (mWakeLock.isHeld()) {
1900 mWakeLock.release();
1901 log("Released wakelock");
1902 } else {
1903 log("Can't release wakelock again!");
1904 }
1905 } catch (Exception e) {
1906 // This is to catch a runtime exception thrown when we try to release an
1907 // already released lock.
Joe Onorato8a9b2202010-02-26 18:56:32 -08001908 Slog.e(TAG, "exception in releaseWakeLock()", e);
Mike Lockwood0528b9b2009-05-07 10:12:54 -04001909 }
Mike Lockwood48f17512009-04-23 09:12:08 -07001910 }
1911 }
1912 }
1913
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001914 // Geocoder
1915
Nick Pellye0fd6932012-07-11 10:26:13 -07001916 @Override
Mike Lockwoode15735a2010-09-20 17:48:47 -04001917 public boolean geocoderIsPresent() {
Mark Vandevoorde01ac80b2010-05-21 15:43:26 -07001918 return mGeocodeProvider != null;
1919 }
1920
Nick Pellye0fd6932012-07-11 10:26:13 -07001921 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001922 public String getFromLocation(double latitude, double longitude, int maxResults,
Mike Lockwood34901402010-01-04 12:14:21 -05001923 GeocoderParams params, List<Address> addrs) {
Mike Lockwooda55c3212009-04-15 11:10:11 -04001924 if (mGeocodeProvider != null) {
Mike Lockwood628fd6d2010-01-25 22:46:13 -05001925 return mGeocodeProvider.getFromLocation(latitude, longitude, maxResults,
1926 params, addrs);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001927 }
Mike Lockwooda55c3212009-04-15 11:10:11 -04001928 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001929 }
1930
Mike Lockwooda55c3212009-04-15 11:10:11 -04001931
Nick Pellye0fd6932012-07-11 10:26:13 -07001932 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001933 public String getFromLocationName(String locationName,
Mike Lockwooda55c3212009-04-15 11:10:11 -04001934 double lowerLeftLatitude, double lowerLeftLongitude,
1935 double upperRightLatitude, double upperRightLongitude, int maxResults,
Mike Lockwood34901402010-01-04 12:14:21 -05001936 GeocoderParams params, List<Address> addrs) {
Mike Lockwooda55c3212009-04-15 11:10:11 -04001937
1938 if (mGeocodeProvider != null) {
Mike Lockwood628fd6d2010-01-25 22:46:13 -05001939 return mGeocodeProvider.getFromLocationName(locationName, lowerLeftLatitude,
1940 lowerLeftLongitude, upperRightLatitude, upperRightLongitude,
1941 maxResults, params, addrs);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001942 }
Mike Lockwooda55c3212009-04-15 11:10:11 -04001943 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001944 }
1945
1946 // Mock Providers
1947
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001948 private void checkMockPermissionsSafe() {
1949 boolean allowMocks = Settings.Secure.getInt(mContext.getContentResolver(),
1950 Settings.Secure.ALLOW_MOCK_LOCATION, 0) == 1;
1951 if (!allowMocks) {
1952 throw new SecurityException("Requires ACCESS_MOCK_LOCATION secure setting");
1953 }
1954
1955 if (mContext.checkCallingPermission(ACCESS_MOCK_LOCATION) !=
1956 PackageManager.PERMISSION_GRANTED) {
1957 throw new SecurityException("Requires ACCESS_MOCK_LOCATION permission");
Nick Pellye0fd6932012-07-11 10:26:13 -07001958 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001959 }
1960
Nick Pellye0fd6932012-07-11 10:26:13 -07001961 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001962 public void addTestProvider(String name, ProviderProperties properties) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001963 checkMockPermissionsSafe();
1964
Mike Lockwooda4903f22010-02-17 06:42:23 -05001965 if (LocationManager.PASSIVE_PROVIDER.equals(name)) {
1966 throw new IllegalArgumentException("Cannot mock the passive location provider");
1967 }
1968
Mike Lockwood86328a92009-10-23 08:38:25 -04001969 long identity = Binder.clearCallingIdentity();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001970 synchronized (mLock) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001971 MockProvider provider = new MockProvider(name, this, properties);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07001972 // remove the real provider if we are replacing GPS or network provider
1973 if (LocationManager.GPS_PROVIDER.equals(name)
Nick Pelly1332b532012-08-21 16:25:47 -07001974 || LocationManager.NETWORK_PROVIDER.equals(name)
1975 || LocationManager.FUSED_PROVIDER.equals(name)) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001976 LocationProviderInterface p = mProvidersByName.get(name);
1977 if (p != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001978 removeProviderLocked(p);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07001979 }
1980 }
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001981 if (mProvidersByName.get(name) != null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001982 throw new IllegalArgumentException("Provider \"" + name + "\" already exists");
1983 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001984 addProviderLocked(provider);
Mike Lockwood7ec434e2009-03-27 07:46:48 -07001985 mMockProviders.put(name, provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001986 mLastLocation.put(name, null);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001987 updateProvidersLocked();
1988 }
Mike Lockwood86328a92009-10-23 08:38:25 -04001989 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001990 }
1991
Nick Pellye0fd6932012-07-11 10:26:13 -07001992 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001993 public void removeTestProvider(String provider) {
1994 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001995 synchronized (mLock) {
You Kima6d0b6f2012-10-28 03:58:44 +09001996 MockProvider mockProvider = mMockProviders.remove(provider);
Mike Lockwood7ec434e2009-03-27 07:46:48 -07001997 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001998 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
1999 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002000 long identity = Binder.clearCallingIdentity();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002001 removeProviderLocked(mProvidersByName.get(provider));
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002002
2003 // reinstate real provider if available
2004 LocationProviderInterface realProvider = mRealProviders.get(provider);
2005 if (realProvider != null) {
2006 addProviderLocked(realProvider);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07002007 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002008 mLastLocation.put(provider, null);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002009 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002010 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002011 }
2012 }
2013
Nick Pellye0fd6932012-07-11 10:26:13 -07002014 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002015 public void setTestProviderLocation(String provider, Location loc) {
2016 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002017 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002018 MockProvider mockProvider = mMockProviders.get(provider);
2019 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002020 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2021 }
Mike Lockwood95427cd2009-05-07 13:27:54 -04002022 // clear calling identity so INSTALL_LOCATION_PROVIDER permission is not required
2023 long identity = Binder.clearCallingIdentity();
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002024 mockProvider.setLocation(loc);
Mike Lockwood95427cd2009-05-07 13:27:54 -04002025 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002026 }
2027 }
2028
Nick Pellye0fd6932012-07-11 10:26:13 -07002029 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002030 public void clearTestProviderLocation(String provider) {
2031 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002032 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002033 MockProvider mockProvider = mMockProviders.get(provider);
2034 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002035 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2036 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002037 mockProvider.clearLocation();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002038 }
2039 }
2040
Nick Pellye0fd6932012-07-11 10:26:13 -07002041 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002042 public void setTestProviderEnabled(String provider, boolean enabled) {
2043 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002044 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002045 MockProvider mockProvider = mMockProviders.get(provider);
2046 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002047 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2048 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002049 long identity = Binder.clearCallingIdentity();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002050 if (enabled) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002051 mockProvider.enable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002052 mEnabledProviders.add(provider);
2053 mDisabledProviders.remove(provider);
2054 } else {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002055 mockProvider.disable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002056 mEnabledProviders.remove(provider);
2057 mDisabledProviders.add(provider);
2058 }
2059 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002060 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002061 }
2062 }
2063
Nick Pellye0fd6932012-07-11 10:26:13 -07002064 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002065 public void clearTestProviderEnabled(String provider) {
2066 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002067 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002068 MockProvider mockProvider = mMockProviders.get(provider);
2069 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002070 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2071 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002072 long identity = Binder.clearCallingIdentity();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002073 mEnabledProviders.remove(provider);
2074 mDisabledProviders.remove(provider);
2075 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002076 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002077 }
2078 }
2079
Nick Pellye0fd6932012-07-11 10:26:13 -07002080 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002081 public void setTestProviderStatus(String provider, int status, Bundle extras, long updateTime) {
2082 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002083 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002084 MockProvider mockProvider = mMockProviders.get(provider);
2085 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002086 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2087 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002088 mockProvider.setStatus(status, extras, updateTime);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002089 }
2090 }
2091
Nick Pellye0fd6932012-07-11 10:26:13 -07002092 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002093 public void clearTestProviderStatus(String provider) {
2094 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002095 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002096 MockProvider mockProvider = mMockProviders.get(provider);
2097 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002098 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2099 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002100 mockProvider.clearStatus();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002101 }
2102 }
2103
2104 private void log(String log) {
2105 if (Log.isLoggable(TAG, Log.VERBOSE)) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08002106 Slog.d(TAG, log);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002107 }
2108 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002109
2110 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002111 protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) {
2112 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
2113 != PackageManager.PERMISSION_GRANTED) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -04002114 pw.println("Permission Denial: can't dump LocationManagerService from from pid="
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002115 + Binder.getCallingPid()
2116 + ", uid=" + Binder.getCallingUid());
2117 return;
2118 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002119
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002120 synchronized (mLock) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002121 pw.println("Current Location Manager state:");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002122 pw.println(" Location Listeners:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002123 for (Receiver receiver : mReceivers.values()) {
2124 pw.println(" " + receiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002125 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002126 pw.println(" Records by Provider:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002127 for (Map.Entry<String, ArrayList<UpdateRecord>> entry : mRecordsByProvider.entrySet()) {
2128 pw.println(" " + entry.getKey() + ":");
2129 for (UpdateRecord record : entry.getValue()) {
2130 pw.println(" " + record);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002131 }
2132 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002133 pw.println(" Last Known Locations:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002134 for (Map.Entry<String, Location> entry : mLastLocation.entrySet()) {
2135 String provider = entry.getKey();
2136 Location location = entry.getValue();
2137 pw.println(" " + provider + ": " + location);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002138 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002139
Nick Pellye0fd6932012-07-11 10:26:13 -07002140 mGeofenceManager.dump(pw);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002141
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002142 if (mEnabledProviders.size() > 0) {
2143 pw.println(" Enabled Providers:");
2144 for (String i : mEnabledProviders) {
2145 pw.println(" " + i);
2146 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002147
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002148 }
2149 if (mDisabledProviders.size() > 0) {
2150 pw.println(" Disabled Providers:");
2151 for (String i : mDisabledProviders) {
2152 pw.println(" " + i);
2153 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002154 }
Nick Pelly4035f5a2012-08-17 14:43:49 -07002155 pw.append(" ");
2156 mBlacklist.dump(pw);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002157 if (mMockProviders.size() > 0) {
2158 pw.println(" Mock Providers:");
2159 for (Map.Entry<String, MockProvider> i : mMockProviders.entrySet()) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002160 i.getValue().dump(pw, " ");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002161 }
2162 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002163
Nick Pelly74fa7ea2012-08-13 19:36:38 -07002164 pw.append(" fudger: ");
2165 mLocationFudger.dump(fd, pw, args);
2166
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002167 if (args.length > 0 && "short".equals(args[0])) {
2168 return;
2169 }
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002170 for (LocationProviderInterface provider: mProviders) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002171 pw.print(provider.getName() + " Internal State");
2172 if (provider instanceof LocationProviderProxy) {
2173 LocationProviderProxy proxy = (LocationProviderProxy) provider;
2174 pw.print(" (" + proxy.getConnectedPackageName() + ")");
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002175 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002176 pw.println(":");
2177 provider.dump(fd, pw, args);
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002178 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002179 }
2180 }
2181}