blob: d039a5e1009b8e257b9c863139efde7eab7d623a [file] [log] [blame]
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2007 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server;
18
Dianne Hackborna06de0f2012-12-11 16:34:47 -080019import android.app.AppOpsManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080020import android.app.PendingIntent;
Victoria Lease38389b62012-09-30 11:44:22 -070021import android.content.BroadcastReceiver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080022import android.content.ContentResolver;
23import android.content.Context;
24import android.content.Intent;
Victoria Lease38389b62012-09-30 11:44:22 -070025import android.content.IntentFilter;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070026import android.content.pm.ApplicationInfo;
Jeff Hamiltonfbadb692012-10-05 14:21:58 -050027import android.content.pm.PackageInfo;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080028import android.content.pm.PackageManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070029import android.content.pm.PackageManager.NameNotFoundException;
Jeff Hamiltonfbadb692012-10-05 14:21:58 -050030import android.content.pm.ResolveInfo;
31import android.content.pm.Signature;
Mike Lockwood628fd6d2010-01-25 22:46:13 -050032import android.content.res.Resources;
Brian Muramatsubb95cb92012-08-29 10:43:21 -070033import android.database.ContentObserver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080034import android.location.Address;
Mike Lockwood03ca2162010-04-01 08:10:09 -070035import android.location.Criteria;
Mike Lockwood34901402010-01-04 12:14:21 -050036import android.location.GeocoderParams;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070037import android.location.Geofence;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080038import android.location.IGpsStatusListener;
Mike Lockwood15e3d0f2009-05-01 07:53:28 -040039import android.location.IGpsStatusProvider;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080040import android.location.ILocationListener;
41import android.location.ILocationManager;
Danke Xie22d1f9f2009-08-18 18:28:45 -040042import android.location.INetInitiatedListener;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080043import android.location.Location;
44import android.location.LocationManager;
45import android.location.LocationProvider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070046import android.location.LocationRequest;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080047import android.os.Binder;
48import android.os.Bundle;
49import android.os.Handler;
50import android.os.IBinder;
Mike Lockwood3d12b512009-04-21 23:25:35 -070051import android.os.Looper;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080052import android.os.Message;
53import android.os.PowerManager;
Mike Lockwoode932f7f2009-04-06 10:51:26 -070054import android.os.Process;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080055import android.os.RemoteException;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070056import android.os.SystemClock;
Dianne Hackborn5ac72a22012-08-29 18:32:08 -070057import android.os.UserHandle;
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -070058import android.os.WorkSource;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080059import android.provider.Settings;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080060import android.util.Log;
Joe Onorato8a9b2202010-02-26 18:56:32 -080061import android.util.Slog;
Mike Lockwoode97ae402010-09-29 15:23:46 -040062import com.android.internal.content.PackageMonitor;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070063import com.android.internal.location.ProviderProperties;
64import com.android.internal.location.ProviderRequest;
Dianne Hackborn8d044e82013-04-30 17:24:15 -070065import com.android.internal.os.BackgroundThread;
destradaa1af4b022013-07-12 15:43:36 -070066import com.android.server.location.FlpHardwareProvider;
67import com.android.server.location.FusedProxy;
Mike Lockwood43e33f22010-03-26 10:41:48 -040068import com.android.server.location.GeocoderProxy;
Jaikumar Ganesh8ce470d2013-04-03 12:22:18 -070069import com.android.server.location.GeofenceProxy;
Nick Pellye0fd6932012-07-11 10:26:13 -070070import com.android.server.location.GeofenceManager;
Mike Lockwood43e33f22010-03-26 10:41:48 -040071import com.android.server.location.GpsLocationProvider;
Nick Pelly4035f5a2012-08-17 14:43:49 -070072import com.android.server.location.LocationBlacklist;
Nick Pelly74fa7ea2012-08-13 19:36:38 -070073import com.android.server.location.LocationFudger;
Mike Lockwood43e33f22010-03-26 10:41:48 -040074import com.android.server.location.LocationProviderInterface;
75import com.android.server.location.LocationProviderProxy;
76import com.android.server.location.MockProvider;
77import com.android.server.location.PassiveProvider;
78
79import java.io.FileDescriptor;
80import java.io.PrintWriter;
81import java.util.ArrayList;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070082import java.util.Arrays;
Mike Lockwood43e33f22010-03-26 10:41:48 -040083import java.util.HashMap;
84import java.util.HashSet;
85import java.util.List;
86import java.util.Map;
Mike Lockwood43e33f22010-03-26 10:41:48 -040087import java.util.Set;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080088
89/**
90 * The service class that manages LocationProviders and issues location
91 * updates and alerts.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080092 */
Victoria Lease5cd731a2012-12-19 15:04:21 -080093public class LocationManagerService extends ILocationManager.Stub {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080094 private static final String TAG = "LocationManagerService";
JP Abgrallf79811e72013-02-01 18:45:05 -080095 public static final boolean D = Log.isLoggable(TAG, Log.DEBUG);
Nick Pelly6fa9ad42012-07-16 12:18:23 -070096
97 private static final String WAKELOCK_KEY = TAG;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080098
Victoria Lease37425c32012-10-16 16:08:48 -070099 // Location resolution level: no location data whatsoever
100 private static final int RESOLUTION_LEVEL_NONE = 0;
101 // Location resolution level: coarse location data only
102 private static final int RESOLUTION_LEVEL_COARSE = 1;
103 // Location resolution level: fine location data
104 private static final int RESOLUTION_LEVEL_FINE = 2;
105
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800106 private static final String ACCESS_MOCK_LOCATION =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700107 android.Manifest.permission.ACCESS_MOCK_LOCATION;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800108 private static final String ACCESS_LOCATION_EXTRA_COMMANDS =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700109 android.Manifest.permission.ACCESS_LOCATION_EXTRA_COMMANDS;
Mike Lockwood275555c2009-05-01 11:30:34 -0400110 private static final String INSTALL_LOCATION_PROVIDER =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700111 android.Manifest.permission.INSTALL_LOCATION_PROVIDER;
112
113 private static final String NETWORK_LOCATION_SERVICE_ACTION =
Stan Chesnutt39062dd2013-07-22 14:33:30 -0700114 "com.android.location.service.v3.NetworkLocationProvider";
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700115 private static final String FUSED_LOCATION_SERVICE_ACTION =
116 "com.android.location.service.FusedLocationProvider";
117
118 private static final int MSG_LOCATION_CHANGED = 1;
119
David Christie1b9b7b12013-04-15 15:31:11 -0700120 private static final long NANOS_PER_MILLI = 1000000L;
121
David Christie0b837452013-07-29 16:02:13 -0700122 // The maximum interval a location request can have and still be considered "high power".
123 private static final long HIGH_POWER_INTERVAL_MS = 5 * 60 * 1000;
124
Nick Pellyf1be6862012-05-15 10:53:42 -0700125 // Location Providers may sometimes deliver location updates
126 // slightly faster that requested - provide grace period so
127 // we don't unnecessarily filter events that are otherwise on
128 // time
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700129 private static final int MAX_PROVIDER_SCHEDULING_JITTER_MS = 100;
Nick Pellyf1be6862012-05-15 10:53:42 -0700130
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700131 private static final LocationRequest DEFAULT_LOCATION_REQUEST = new LocationRequest();
132
133 private final Context mContext;
Dianne Hackborna06de0f2012-12-11 16:34:47 -0800134 private final AppOpsManager mAppOps;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700135
136 // used internally for synchronization
137 private final Object mLock = new Object();
138
Victoria Lease5cd731a2012-12-19 15:04:21 -0800139 // --- fields below are final after systemReady() ---
Nick Pelly74fa7ea2012-08-13 19:36:38 -0700140 private LocationFudger mLocationFudger;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700141 private GeofenceManager mGeofenceManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700142 private PackageManager mPackageManager;
Victoria Lease0aa28602013-05-29 15:28:26 -0700143 private PowerManager mPowerManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700144 private GeocoderProxy mGeocodeProvider;
145 private IGpsStatusProvider mGpsStatusProvider;
146 private INetInitiatedListener mNetInitiatedListener;
147 private LocationWorkerHandler mLocationHandler;
Nick Pelly4035f5a2012-08-17 14:43:49 -0700148 private PassiveProvider mPassiveProvider; // track passive provider for special cases
149 private LocationBlacklist mBlacklist;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700150
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700151 // --- fields below are protected by mLock ---
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800152 // Set of providers that are explicitly enabled
153 private final Set<String> mEnabledProviders = new HashSet<String>();
154
155 // Set of providers that are explicitly disabled
156 private final Set<String> mDisabledProviders = new HashSet<String>();
157
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700158 // Mock (test) providers
159 private final HashMap<String, MockProvider> mMockProviders =
160 new HashMap<String, MockProvider>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800161
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700162 // all receivers
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400163 private final HashMap<Object, Receiver> mReceivers = new HashMap<Object, Receiver>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800164
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700165 // currently installed providers (with mocks replacing real providers)
Mike Lockwoodd03ff942010-02-09 08:46:14 -0500166 private final ArrayList<LocationProviderInterface> mProviders =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700167 new ArrayList<LocationProviderInterface>();
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400168
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700169 // real providers, saved here when mocked out
170 private final HashMap<String, LocationProviderInterface> mRealProviders =
171 new HashMap<String, LocationProviderInterface>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800172
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700173 // mapping from provider name to provider
174 private final HashMap<String, LocationProviderInterface> mProvidersByName =
175 new HashMap<String, LocationProviderInterface>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800176
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700177 // mapping from provider name to all its UpdateRecords
178 private final HashMap<String, ArrayList<UpdateRecord>> mRecordsByProvider =
179 new HashMap<String, ArrayList<UpdateRecord>>();
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -0700180
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700181 // mapping from provider name to last known location
182 private final HashMap<String, Location> mLastLocation = new HashMap<String, Location>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800183
David Christie1b9b7b12013-04-15 15:31:11 -0700184 // same as mLastLocation, but is not updated faster than LocationFudger.FASTEST_INTERVAL_MS.
185 // locations stored here are not fudged for coarse permissions.
186 private final HashMap<String, Location> mLastLocationCoarseInterval =
187 new HashMap<String, Location>();
188
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700189 // all providers that operate over proxy, for authorizing incoming location
190 private final ArrayList<LocationProviderProxy> mProxyProviders =
191 new ArrayList<LocationProviderProxy>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800192
Victoria Lease38389b62012-09-30 11:44:22 -0700193 // current active user on the device - other users are denied location data
194 private int mCurrentUserId = UserHandle.USER_OWNER;
195
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700196 public LocationManagerService(Context context) {
197 super();
198 mContext = context;
Dianne Hackborna06de0f2012-12-11 16:34:47 -0800199 mAppOps = (AppOpsManager)context.getSystemService(Context.APP_OPS_SERVICE);
The Android Open Source Project4df24232009-03-05 14:34:35 -0800200
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700201 if (D) Log.d(TAG, "Constructed");
202
203 // most startup is deferred until systemReady()
204 }
205
Svetoslav Ganova0027152013-06-25 14:59:53 -0700206 public void systemRunning() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700207 synchronized (mLock) {
Victoria Lease5cd731a2012-12-19 15:04:21 -0800208 if (D) Log.d(TAG, "systemReady()");
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700209
Victoria Lease5cd731a2012-12-19 15:04:21 -0800210 // fetch package manager
211 mPackageManager = mContext.getPackageManager();
212
Victoria Lease0aa28602013-05-29 15:28:26 -0700213 // fetch power manager
214 mPowerManager = (PowerManager) mContext.getSystemService(Context.POWER_SERVICE);
Victoria Lease5cd731a2012-12-19 15:04:21 -0800215
216 // prepare worker thread
Dianne Hackborn8d044e82013-04-30 17:24:15 -0700217 mLocationHandler = new LocationWorkerHandler(BackgroundThread.get().getLooper());
Victoria Lease5cd731a2012-12-19 15:04:21 -0800218
219 // prepare mLocationHandler's dependents
220 mLocationFudger = new LocationFudger(mContext, mLocationHandler);
221 mBlacklist = new LocationBlacklist(mContext, mLocationHandler);
222 mBlacklist.init();
223 mGeofenceManager = new GeofenceManager(mContext, mBlacklist);
224
Dianne Hackbornc2293022013-02-06 23:14:49 -0800225 // Monitor for app ops mode changes.
226 AppOpsManager.Callback callback = new AppOpsManager.Callback() {
227 public void opChanged(int op, String packageName) {
228 synchronized (mLock) {
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700229 for (Receiver receiver : mReceivers.values()) {
230 receiver.updateMonitoring(true);
231 }
Dianne Hackbornc2293022013-02-06 23:14:49 -0800232 applyAllProviderRequirementsLocked();
233 }
234 }
235 };
236 mAppOps.startWatchingMode(AppOpsManager.OP_COARSE_LOCATION, null, callback);
237
Victoria Lease5cd731a2012-12-19 15:04:21 -0800238 // prepare providers
239 loadProvidersLocked();
240 updateProvidersLocked();
241 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700242
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700243 // listen for settings changes
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700244 mContext.getContentResolver().registerContentObserver(
Laurent Tu75defb62012-11-01 16:21:52 -0700245 Settings.Secure.getUriFor(Settings.Secure.LOCATION_PROVIDERS_ALLOWED), true,
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700246 new ContentObserver(mLocationHandler) {
Victoria Lease5cd731a2012-12-19 15:04:21 -0800247 @Override
248 public void onChange(boolean selfChange) {
249 synchronized (mLock) {
250 updateProvidersLocked();
251 }
252 }
253 }, UserHandle.USER_ALL);
254 mPackageMonitor.register(mContext, mLocationHandler.getLooper(), true);
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700255
Victoria Lease38389b62012-09-30 11:44:22 -0700256 // listen for user change
257 IntentFilter intentFilter = new IntentFilter();
258 intentFilter.addAction(Intent.ACTION_USER_SWITCHED);
259
260 mContext.registerReceiverAsUser(new BroadcastReceiver() {
261 @Override
262 public void onReceive(Context context, Intent intent) {
263 String action = intent.getAction();
264 if (Intent.ACTION_USER_SWITCHED.equals(action)) {
265 switchUser(intent.getIntExtra(Intent.EXTRA_USER_HANDLE, 0));
266 }
267 }
Victoria Lease5cd731a2012-12-19 15:04:21 -0800268 }, UserHandle.ALL, intentFilter, null, mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700269 }
270
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500271 private void ensureFallbackFusedProviderPresentLocked(ArrayList<String> pkgs) {
272 PackageManager pm = mContext.getPackageManager();
273 String systemPackageName = mContext.getPackageName();
274 ArrayList<HashSet<Signature>> sigSets = ServiceWatcher.getSignatureSets(mContext, pkgs);
275
276 List<ResolveInfo> rInfos = pm.queryIntentServicesAsUser(
277 new Intent(FUSED_LOCATION_SERVICE_ACTION),
278 PackageManager.GET_META_DATA, mCurrentUserId);
279 for (ResolveInfo rInfo : rInfos) {
280 String packageName = rInfo.serviceInfo.packageName;
281
282 // Check that the signature is in the list of supported sigs. If it's not in
283 // this list the standard provider binding logic won't bind to it.
284 try {
285 PackageInfo pInfo;
286 pInfo = pm.getPackageInfo(packageName, PackageManager.GET_SIGNATURES);
287 if (!ServiceWatcher.isSignatureMatch(pInfo.signatures, sigSets)) {
288 Log.w(TAG, packageName + " resolves service " + FUSED_LOCATION_SERVICE_ACTION +
289 ", but has wrong signature, ignoring");
290 continue;
291 }
292 } catch (NameNotFoundException e) {
293 Log.e(TAG, "missing package: " + packageName);
294 continue;
295 }
296
297 // Get the version info
298 if (rInfo.serviceInfo.metaData == null) {
299 Log.w(TAG, "Found fused provider without metadata: " + packageName);
300 continue;
301 }
302
303 int version = rInfo.serviceInfo.metaData.getInt(
304 ServiceWatcher.EXTRA_SERVICE_VERSION, -1);
305 if (version == 0) {
306 // This should be the fallback fused location provider.
307
308 // Make sure it's in the system partition.
309 if ((rInfo.serviceInfo.applicationInfo.flags & ApplicationInfo.FLAG_SYSTEM) == 0) {
310 if (D) Log.d(TAG, "Fallback candidate not in /system: " + packageName);
311 continue;
312 }
313
314 // Check that the fallback is signed the same as the OS
315 // as a proxy for coreApp="true"
316 if (pm.checkSignatures(systemPackageName, packageName)
317 != PackageManager.SIGNATURE_MATCH) {
318 if (D) Log.d(TAG, "Fallback candidate not signed the same as system: "
319 + packageName);
320 continue;
321 }
322
323 // Found a valid fallback.
324 if (D) Log.d(TAG, "Found fallback provider: " + packageName);
325 return;
326 } else {
327 if (D) Log.d(TAG, "Fallback candidate not version 0: " + packageName);
328 }
329 }
330
331 throw new IllegalStateException("Unable to find a fused location provider that is in the "
332 + "system partition with version 0 and signed with the platform certificate. "
333 + "Such a package is needed to provide a default fused location provider in the "
334 + "event that no other fused location provider has been installed or is currently "
335 + "available. For example, coreOnly boot mode when decrypting the data "
336 + "partition. The fallback must also be marked coreApp=\"true\" in the manifest");
337 }
338
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700339 private void loadProvidersLocked() {
Victoria Lease5c24fd02012-10-01 11:00:50 -0700340 // create a passive location provider, which is always enabled
341 PassiveProvider passiveProvider = new PassiveProvider(this);
342 addProviderLocked(passiveProvider);
343 mEnabledProviders.add(passiveProvider.getName());
344 mPassiveProvider = passiveProvider;
Jaikumar Ganesh8ce470d2013-04-03 12:22:18 -0700345 // Create a gps location provider
346 GpsLocationProvider gpsProvider = new GpsLocationProvider(mContext, this,
347 mLocationHandler.getLooper());
Victoria Lease5c24fd02012-10-01 11:00:50 -0700348
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700349 if (GpsLocationProvider.isSupported()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700350 mGpsStatusProvider = gpsProvider.getGpsStatusProvider();
351 mNetInitiatedListener = gpsProvider.getNetInitiatedListener();
352 addProviderLocked(gpsProvider);
353 mRealProviders.put(LocationManager.GPS_PROVIDER, gpsProvider);
354 }
355
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700356 /*
357 Load package name(s) containing location provider support.
358 These packages can contain services implementing location providers:
359 Geocoder Provider, Network Location Provider, and
360 Fused Location Provider. They will each be searched for
361 service components implementing these providers.
362 The location framework also has support for installation
363 of new location providers at run-time. The new package does not
364 have to be explicitly listed here, however it must have a signature
365 that matches the signature of at least one package on this list.
366 */
367 Resources resources = mContext.getResources();
368 ArrayList<String> providerPackageNames = new ArrayList<String>();
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500369 String[] pkgs = resources.getStringArray(
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700370 com.android.internal.R.array.config_locationProviderPackageNames);
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500371 if (D) Log.d(TAG, "certificates for location providers pulled from: " +
372 Arrays.toString(pkgs));
373 if (pkgs != null) providerPackageNames.addAll(Arrays.asList(pkgs));
374
375 ensureFallbackFusedProviderPresentLocked(providerPackageNames);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700376
377 // bind to network provider
378 LocationProviderProxy networkProvider = LocationProviderProxy.createAndBind(
379 mContext,
380 LocationManager.NETWORK_PROVIDER,
381 NETWORK_LOCATION_SERVICE_ACTION,
Zhentao Sunc5fc9982013-04-17 17:47:53 -0700382 com.android.internal.R.bool.config_enableNetworkLocationOverlay,
383 com.android.internal.R.string.config_networkLocationProviderPackageName,
384 com.android.internal.R.array.config_locationProviderPackageNames,
385 mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700386 if (networkProvider != null) {
387 mRealProviders.put(LocationManager.NETWORK_PROVIDER, networkProvider);
388 mProxyProviders.add(networkProvider);
389 addProviderLocked(networkProvider);
390 } else {
391 Slog.w(TAG, "no network location provider found");
392 }
393
394 // bind to fused provider
395 LocationProviderProxy fusedLocationProvider = LocationProviderProxy.createAndBind(
396 mContext,
397 LocationManager.FUSED_PROVIDER,
398 FUSED_LOCATION_SERVICE_ACTION,
Zhentao Sunc5fc9982013-04-17 17:47:53 -0700399 com.android.internal.R.bool.config_enableFusedLocationOverlay,
400 com.android.internal.R.string.config_fusedLocationProviderPackageName,
401 com.android.internal.R.array.config_locationProviderPackageNames,
402 mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700403 if (fusedLocationProvider != null) {
404 addProviderLocked(fusedLocationProvider);
405 mProxyProviders.add(fusedLocationProvider);
406 mEnabledProviders.add(fusedLocationProvider.getName());
Kenny Rootc3575182012-10-09 12:44:40 -0700407 mRealProviders.put(LocationManager.FUSED_PROVIDER, fusedLocationProvider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700408 } else {
409 Slog.e(TAG, "no fused location provider found",
410 new IllegalStateException("Location service needs a fused location provider"));
411 }
412
413 // bind to geocoder provider
Zhentao Sunc5fc9982013-04-17 17:47:53 -0700414 mGeocodeProvider = GeocoderProxy.createAndBind(mContext,
415 com.android.internal.R.bool.config_enableGeocoderOverlay,
416 com.android.internal.R.string.config_geocoderProviderPackageName,
417 com.android.internal.R.array.config_locationProviderPackageNames,
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800418 mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700419 if (mGeocodeProvider == null) {
420 Slog.e(TAG, "no geocoder provider found");
421 }
Jaikumar Ganesh8ce470d2013-04-03 12:22:18 -0700422
destradaa1af4b022013-07-12 15:43:36 -0700423 // bind to fused provider
destradaa1af4b022013-07-12 15:43:36 -0700424 FlpHardwareProvider flpHardwareProvider = FlpHardwareProvider.getInstance(mContext);
425 FusedProxy fusedProxy = FusedProxy.createAndBind(
426 mContext,
427 mLocationHandler,
destradaa64be0c62013-08-09 15:01:49 -0700428 flpHardwareProvider.getLocationHardware(),
429 com.android.internal.R.bool.config_enableFusedLocationOverlay,
430 com.android.internal.R.string.config_fusedLocationProviderPackageName,
431 com.android.internal.R.array.config_locationProviderPackageNames);
destradaa1af4b022013-07-12 15:43:36 -0700432 if(fusedProxy == null) {
433 Slog.e(TAG, "No FusedProvider found.");
434 }
destradaa0682809a2013-08-12 18:50:30 -0700435
436 // bind to geofence provider
437 GeofenceProxy provider = GeofenceProxy.createAndBind(mContext,
438 com.android.internal.R.bool.config_enableGeofenceOverlay,
439 com.android.internal.R.string.config_geofenceProviderPackageName,
440 com.android.internal.R.array.config_locationProviderPackageNames,
441 mLocationHandler,
442 gpsProvider.getGpsGeofenceProxy(),
443 flpHardwareProvider.getGeofenceHardware());
444 if (provider == null) {
445 Slog.e(TAG, "no geofence provider found");
446 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700447 }
Mike Lockwood9637d472009-04-02 21:41:57 -0700448
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800449 /**
Victoria Lease38389b62012-09-30 11:44:22 -0700450 * Called when the device's active user changes.
451 * @param userId the new active user's UserId
452 */
453 private void switchUser(int userId) {
Victoria Lease83762d22012-10-03 13:51:17 -0700454 mBlacklist.switchUser(userId);
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800455 mLocationHandler.removeMessages(MSG_LOCATION_CHANGED);
Victoria Lease38389b62012-09-30 11:44:22 -0700456 synchronized (mLock) {
Victoria Leaseb711d572012-10-02 13:14:11 -0700457 mLastLocation.clear();
David Christie1b9b7b12013-04-15 15:31:11 -0700458 mLastLocationCoarseInterval.clear();
Victoria Leaseb711d572012-10-02 13:14:11 -0700459 for (LocationProviderInterface p : mProviders) {
460 updateProviderListenersLocked(p.getName(), false, mCurrentUserId);
Victoria Leaseb711d572012-10-02 13:14:11 -0700461 }
Victoria Lease38389b62012-09-30 11:44:22 -0700462 mCurrentUserId = userId;
Victoria Leaseb711d572012-10-02 13:14:11 -0700463 updateProvidersLocked();
Victoria Lease38389b62012-09-30 11:44:22 -0700464 }
465 }
466
467 /**
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800468 * A wrapper class holding either an ILocationListener or a PendingIntent to receive
469 * location updates.
470 */
Mike Lockwood48f17512009-04-23 09:12:08 -0700471 private final class Receiver implements IBinder.DeathRecipient, PendingIntent.OnFinished {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700472 final int mUid; // uid of receiver
473 final int mPid; // pid of receiver
474 final String mPackageName; // package name of receiver
Victoria Lease37425c32012-10-16 16:08:48 -0700475 final int mAllowedResolutionLevel; // resolution level allowed to receiver
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700476
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800477 final ILocationListener mListener;
478 final PendingIntent mPendingIntent;
David Christie82edc9b2013-07-19 11:31:42 -0700479 final WorkSource mWorkSource; // WorkSource for battery blame, or null to assign to caller.
David Christie40e57822013-07-30 11:36:48 -0700480 final boolean mHideFromAppOps; // True if AppOps should not monitor this receiver.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800481 final Object mKey;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700482
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400483 final HashMap<String,UpdateRecord> mUpdateRecords = new HashMap<String,UpdateRecord>();
Nick Pellyf1be6862012-05-15 10:53:42 -0700484
David Christie0b837452013-07-29 16:02:13 -0700485 // True if app ops has started monitoring this receiver for locations.
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700486 boolean mOpMonitoring;
David Christie0b837452013-07-29 16:02:13 -0700487 // True if app ops has started monitoring this receiver for high power (gps) locations.
488 boolean mOpHighPowerMonitoring;
Mike Lockwood48f17512009-04-23 09:12:08 -0700489 int mPendingBroadcasts;
Victoria Lease0aa28602013-05-29 15:28:26 -0700490 PowerManager.WakeLock mWakeLock;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800491
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700492 Receiver(ILocationListener listener, PendingIntent intent, int pid, int uid,
David Christie40e57822013-07-30 11:36:48 -0700493 String packageName, WorkSource workSource, boolean hideFromAppOps) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800494 mListener = listener;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800495 mPendingIntent = intent;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700496 if (listener != null) {
497 mKey = listener.asBinder();
498 } else {
499 mKey = intent;
500 }
Victoria Lease37425c32012-10-16 16:08:48 -0700501 mAllowedResolutionLevel = getAllowedResolutionLevel(pid, uid);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700502 mUid = uid;
503 mPid = pid;
504 mPackageName = packageName;
David Christie82edc9b2013-07-19 11:31:42 -0700505 if (workSource != null && workSource.size() <= 0) {
506 workSource = null;
507 }
508 mWorkSource = workSource;
David Christie40e57822013-07-30 11:36:48 -0700509 mHideFromAppOps = hideFromAppOps;
Victoria Lease0aa28602013-05-29 15:28:26 -0700510
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700511 updateMonitoring(true);
512
Victoria Lease0aa28602013-05-29 15:28:26 -0700513 // construct/configure wakelock
514 mWakeLock = mPowerManager.newWakeLock(PowerManager.PARTIAL_WAKE_LOCK, WAKELOCK_KEY);
David Christie82edc9b2013-07-19 11:31:42 -0700515 if (workSource == null) {
516 workSource = new WorkSource(mUid, mPackageName);
517 }
518 mWakeLock.setWorkSource(workSource);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800519 }
520
521 @Override
522 public boolean equals(Object otherObj) {
523 if (otherObj instanceof Receiver) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700524 return mKey.equals(((Receiver)otherObj).mKey);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800525 }
526 return false;
527 }
528
529 @Override
530 public int hashCode() {
531 return mKey.hashCode();
532 }
Mike Lockwood3681f262009-05-12 10:52:03 -0400533
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800534 @Override
535 public String toString() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700536 StringBuilder s = new StringBuilder();
537 s.append("Reciever[");
538 s.append(Integer.toHexString(System.identityHashCode(this)));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800539 if (mListener != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700540 s.append(" listener");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800541 } else {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700542 s.append(" intent");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800543 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700544 for (String p : mUpdateRecords.keySet()) {
545 s.append(" ").append(mUpdateRecords.get(p).toString());
546 }
547 s.append("]");
548 return s.toString();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800549 }
550
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700551 public void updateMonitoring(boolean allow) {
David Christie40e57822013-07-30 11:36:48 -0700552 if (mHideFromAppOps) {
553 return;
554 }
555
David Christie0b837452013-07-29 16:02:13 -0700556 // First update monitoring of any location request (including high power).
557 mOpMonitoring = updateMonitoring(allow, mOpMonitoring,
558 AppOpsManager.OP_MONITOR_LOCATION);
559
560 // Now update monitoring of high power requests only.
561 // A high power request is any gps request with interval under a threshold.
562 boolean allowHighPower = allow;
563 if (allowHighPower) {
564 UpdateRecord gpsRecord = mUpdateRecords.get(LocationManager.GPS_PROVIDER);
565 if (gpsRecord == null
566 || gpsRecord.mRequest.getInterval() > HIGH_POWER_INTERVAL_MS) {
567 allowHighPower = false;
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700568 }
569 }
David Christiec750c1f2013-08-08 12:56:57 -0700570 boolean wasHighPowerMonitoring = mOpHighPowerMonitoring;
David Christie0b837452013-07-29 16:02:13 -0700571 mOpHighPowerMonitoring = updateMonitoring(allowHighPower, mOpHighPowerMonitoring,
572 AppOpsManager.OP_MONITOR_HIGH_POWER_LOCATION);
David Christiec750c1f2013-08-08 12:56:57 -0700573 if (mOpHighPowerMonitoring != wasHighPowerMonitoring) {
574 // send an intent to notify that a high power request has been added/removed.
575 Intent intent = new Intent(LocationManager.HIGH_POWER_REQUEST_CHANGE_ACTION);
576 mContext.sendBroadcastAsUser(intent, UserHandle.ALL);
577 }
David Christie0b837452013-07-29 16:02:13 -0700578 }
579
580 /**
581 * Update AppOps monitoring for a single location request and op type.
582 *
583 * @param allowMonitoring True if monitoring is allowed for this request/op.
584 * @param currentlyMonitoring True if AppOps is currently monitoring this request/op.
585 * @param op AppOps code for the op to update.
586 * @return True if monitoring is on for this request/op after updating.
587 */
588 private boolean updateMonitoring(boolean allowMonitoring, boolean currentlyMonitoring,
589 int op) {
590 if (!currentlyMonitoring) {
591 if (allowMonitoring) {
592 return mAppOps.startOpNoThrow(op, mUid, mPackageName)
593 == AppOpsManager.MODE_ALLOWED;
594 }
595 } else {
596 if (!allowMonitoring || mAppOps.checkOpNoThrow(op, mUid, mPackageName)
597 != AppOpsManager.MODE_ALLOWED) {
598 mAppOps.finishOp(op, mUid, mPackageName);
599 return false;
600 }
601 }
602
603 return currentlyMonitoring;
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700604 }
605
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800606 public boolean isListener() {
607 return mListener != null;
608 }
609
610 public boolean isPendingIntent() {
611 return mPendingIntent != null;
612 }
613
614 public ILocationListener getListener() {
615 if (mListener != null) {
616 return mListener;
617 }
618 throw new IllegalStateException("Request for non-existent listener");
619 }
620
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800621 public boolean callStatusChangedLocked(String provider, int status, Bundle extras) {
622 if (mListener != null) {
623 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700624 synchronized (this) {
625 // synchronize to ensure incrementPendingBroadcastsLocked()
626 // is called before decrementPendingBroadcasts()
627 mListener.onStatusChanged(provider, status, extras);
Nick Pellye0fd6932012-07-11 10:26:13 -0700628 // call this after broadcasting so we do not increment
629 // if we throw an exeption.
630 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700631 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800632 } catch (RemoteException e) {
633 return false;
634 }
635 } else {
636 Intent statusChanged = new Intent();
Victoria Lease61ecb022012-11-13 15:12:51 -0800637 statusChanged.putExtras(new Bundle(extras));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800638 statusChanged.putExtra(LocationManager.KEY_STATUS_CHANGED, status);
639 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700640 synchronized (this) {
641 // synchronize to ensure incrementPendingBroadcastsLocked()
642 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700643 mPendingIntent.send(mContext, 0, statusChanged, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700644 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700645 // call this after broadcasting so we do not increment
646 // if we throw an exeption.
647 incrementPendingBroadcastsLocked();
648 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800649 } catch (PendingIntent.CanceledException e) {
650 return false;
651 }
652 }
653 return true;
654 }
655
656 public boolean callLocationChangedLocked(Location location) {
657 if (mListener != null) {
658 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700659 synchronized (this) {
660 // synchronize to ensure incrementPendingBroadcastsLocked()
661 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c5406a2012-11-29 16:18:01 -0800662 mListener.onLocationChanged(new Location(location));
Nick Pellye0fd6932012-07-11 10:26:13 -0700663 // call this after broadcasting so we do not increment
664 // if we throw an exeption.
665 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700666 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800667 } catch (RemoteException e) {
668 return false;
669 }
670 } else {
671 Intent locationChanged = new Intent();
Victoria Lease61ecb022012-11-13 15:12:51 -0800672 locationChanged.putExtra(LocationManager.KEY_LOCATION_CHANGED, new Location(location));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800673 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700674 synchronized (this) {
675 // synchronize to ensure incrementPendingBroadcastsLocked()
676 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700677 mPendingIntent.send(mContext, 0, locationChanged, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700678 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700679 // call this after broadcasting so we do not increment
680 // if we throw an exeption.
681 incrementPendingBroadcastsLocked();
682 }
683 } catch (PendingIntent.CanceledException e) {
684 return false;
685 }
686 }
687 return true;
688 }
689
690 public boolean callProviderEnabledLocked(String provider, boolean enabled) {
691 if (mListener != null) {
692 try {
693 synchronized (this) {
694 // synchronize to ensure incrementPendingBroadcastsLocked()
695 // is called before decrementPendingBroadcasts()
696 if (enabled) {
697 mListener.onProviderEnabled(provider);
698 } else {
699 mListener.onProviderDisabled(provider);
700 }
Nick Pellye0fd6932012-07-11 10:26:13 -0700701 // call this after broadcasting so we do not increment
702 // if we throw an exeption.
703 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700704 }
705 } catch (RemoteException e) {
706 return false;
707 }
708 } else {
709 Intent providerIntent = new Intent();
710 providerIntent.putExtra(LocationManager.KEY_PROVIDER_ENABLED, enabled);
711 try {
712 synchronized (this) {
713 // synchronize to ensure incrementPendingBroadcastsLocked()
714 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700715 mPendingIntent.send(mContext, 0, providerIntent, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700716 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700717 // call this after broadcasting so we do not increment
718 // if we throw an exeption.
719 incrementPendingBroadcastsLocked();
720 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800721 } catch (PendingIntent.CanceledException e) {
722 return false;
723 }
724 }
725 return true;
726 }
727
Nick Pellyf1be6862012-05-15 10:53:42 -0700728 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800729 public void binderDied() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700730 if (D) Log.d(TAG, "Location listener died");
731
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400732 synchronized (mLock) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800733 removeUpdatesLocked(this);
734 }
Mike Lockwood48f17512009-04-23 09:12:08 -0700735 synchronized (this) {
Victoria Lease0aa28602013-05-29 15:28:26 -0700736 clearPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700737 }
738 }
739
Nick Pellye0fd6932012-07-11 10:26:13 -0700740 @Override
Mike Lockwood48f17512009-04-23 09:12:08 -0700741 public void onSendFinished(PendingIntent pendingIntent, Intent intent,
742 int resultCode, String resultData, Bundle resultExtras) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400743 synchronized (this) {
744 decrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700745 }
746 }
747
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400748 // this must be called while synchronized by caller in a synchronized block
749 // containing the sending of the broadcaset
750 private void incrementPendingBroadcastsLocked() {
751 if (mPendingBroadcasts++ == 0) {
Victoria Lease0aa28602013-05-29 15:28:26 -0700752 mWakeLock.acquire();
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400753 }
754 }
755
756 private void decrementPendingBroadcastsLocked() {
757 if (--mPendingBroadcasts == 0) {
Victoria Lease0aa28602013-05-29 15:28:26 -0700758 if (mWakeLock.isHeld()) {
759 mWakeLock.release();
760 }
761 }
762 }
763
764 public void clearPendingBroadcastsLocked() {
765 if (mPendingBroadcasts > 0) {
766 mPendingBroadcasts = 0;
767 if (mWakeLock.isHeld()) {
768 mWakeLock.release();
769 }
Mike Lockwood48f17512009-04-23 09:12:08 -0700770 }
771 }
772 }
773
Nick Pellye0fd6932012-07-11 10:26:13 -0700774 @Override
Mike Lockwood48f17512009-04-23 09:12:08 -0700775 public void locationCallbackFinished(ILocationListener listener) {
Dianne Hackbornf5fdca92013-06-05 14:53:33 -0700776 //Do not use getReceiverLocked here as that will add the ILocationListener to
Joshua Bartel080b61b2009-10-05 12:44:46 -0400777 //the receiver list if it is not found. If it is not found then the
778 //LocationListener was removed when it had a pending broadcast and should
779 //not be added back.
Dianne Hackbornf5fdca92013-06-05 14:53:33 -0700780 synchronized (mLock) {
781 IBinder binder = listener.asBinder();
782 Receiver receiver = mReceivers.get(binder);
783 if (receiver != null) {
784 synchronized (receiver) {
785 // so wakelock calls will succeed
786 long identity = Binder.clearCallingIdentity();
787 receiver.decrementPendingBroadcastsLocked();
788 Binder.restoreCallingIdentity(identity);
789 }
790 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800791 }
792 }
793
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700794 private void addProviderLocked(LocationProviderInterface provider) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400795 mProviders.add(provider);
796 mProvidersByName.put(provider.getName(), provider);
797 }
798
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700799 private void removeProviderLocked(LocationProviderInterface provider) {
800 provider.disable();
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400801 mProviders.remove(provider);
802 mProvidersByName.remove(provider.getName());
803 }
804
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800805 /**
Victoria Lease09eeaec2013-02-05 11:34:13 -0800806 * Returns "true" if access to the specified location provider is allowed by the current
807 * user's settings. Access to all location providers is forbidden to non-location-provider
808 * processes belonging to background users.
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800809 *
810 * @param provider the name of the location provider
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800811 * @return
812 */
Victoria Lease09eeaec2013-02-05 11:34:13 -0800813 private boolean isAllowedByCurrentUserSettingsLocked(String provider) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800814 if (mEnabledProviders.contains(provider)) {
815 return true;
816 }
817 if (mDisabledProviders.contains(provider)) {
818 return false;
819 }
820 // Use system settings
821 ContentResolver resolver = mContext.getContentResolver();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800822
Victoria Leaseb711d572012-10-02 13:14:11 -0700823 return Settings.Secure.isLocationProviderEnabledForUser(resolver, provider, mCurrentUserId);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800824 }
825
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700826 /**
Victoria Lease09eeaec2013-02-05 11:34:13 -0800827 * Returns "true" if access to the specified location provider is allowed by the specified
828 * user's settings. Access to all location providers is forbidden to non-location-provider
829 * processes belonging to background users.
830 *
831 * @param provider the name of the location provider
832 * @param uid the requestor's UID
833 * @return
834 */
835 private boolean isAllowedByUserSettingsLocked(String provider, int uid) {
836 if (UserHandle.getUserId(uid) != mCurrentUserId && !isUidALocationProvider(uid)) {
837 return false;
838 }
839 return isAllowedByCurrentUserSettingsLocked(provider);
840 }
841
842 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700843 * Returns the permission string associated with the specified resolution level.
844 *
845 * @param resolutionLevel the resolution level
846 * @return the permission string
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700847 */
Victoria Lease37425c32012-10-16 16:08:48 -0700848 private String getResolutionPermission(int resolutionLevel) {
849 switch (resolutionLevel) {
850 case RESOLUTION_LEVEL_FINE:
851 return android.Manifest.permission.ACCESS_FINE_LOCATION;
852 case RESOLUTION_LEVEL_COARSE:
853 return android.Manifest.permission.ACCESS_COARSE_LOCATION;
854 default:
855 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800856 }
Victoria Leaseda479c52012-10-15 15:24:16 -0700857 }
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700858
Victoria Leaseda479c52012-10-15 15:24:16 -0700859 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700860 * Returns the resolution level allowed to the given PID/UID pair.
861 *
862 * @param pid the PID
863 * @param uid the UID
864 * @return resolution level allowed to the pid/uid pair
Victoria Leaseda479c52012-10-15 15:24:16 -0700865 */
Victoria Lease37425c32012-10-16 16:08:48 -0700866 private int getAllowedResolutionLevel(int pid, int uid) {
867 if (mContext.checkPermission(android.Manifest.permission.ACCESS_FINE_LOCATION,
868 pid, uid) == PackageManager.PERMISSION_GRANTED) {
869 return RESOLUTION_LEVEL_FINE;
870 } else if (mContext.checkPermission(android.Manifest.permission.ACCESS_COARSE_LOCATION,
871 pid, uid) == PackageManager.PERMISSION_GRANTED) {
872 return RESOLUTION_LEVEL_COARSE;
873 } else {
874 return RESOLUTION_LEVEL_NONE;
Victoria Leaseda479c52012-10-15 15:24:16 -0700875 }
Victoria Lease4fab68b2012-09-13 13:20:59 -0700876 }
877
878 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700879 * Returns the resolution level allowed to the caller
880 *
881 * @return resolution level allowed to caller
Victoria Lease4fab68b2012-09-13 13:20:59 -0700882 */
Victoria Lease37425c32012-10-16 16:08:48 -0700883 private int getCallerAllowedResolutionLevel() {
884 return getAllowedResolutionLevel(Binder.getCallingPid(), Binder.getCallingUid());
885 }
886
887 /**
888 * Throw SecurityException if specified resolution level is insufficient to use geofences.
889 *
890 * @param allowedResolutionLevel resolution level allowed to caller
891 */
892 private void checkResolutionLevelIsSufficientForGeofenceUse(int allowedResolutionLevel) {
893 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
Victoria Lease4fab68b2012-09-13 13:20:59 -0700894 throw new SecurityException("Geofence usage requires ACCESS_FINE_LOCATION permission");
895 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800896 }
897
Victoria Lease37425c32012-10-16 16:08:48 -0700898 /**
899 * Return the minimum resolution level required to use the specified location provider.
900 *
901 * @param provider the name of the location provider
902 * @return minimum resolution level required for provider
903 */
904 private int getMinimumResolutionLevelForProviderUse(String provider) {
Victoria Lease8dbb6342012-09-21 16:55:53 -0700905 if (LocationManager.GPS_PROVIDER.equals(provider) ||
906 LocationManager.PASSIVE_PROVIDER.equals(provider)) {
907 // gps and passive providers require FINE permission
Victoria Lease37425c32012-10-16 16:08:48 -0700908 return RESOLUTION_LEVEL_FINE;
Victoria Lease8dbb6342012-09-21 16:55:53 -0700909 } else if (LocationManager.NETWORK_PROVIDER.equals(provider) ||
910 LocationManager.FUSED_PROVIDER.equals(provider)) {
911 // network and fused providers are ok with COARSE or FINE
Victoria Lease37425c32012-10-16 16:08:48 -0700912 return RESOLUTION_LEVEL_COARSE;
Laurent Tu941221c2012-10-04 14:21:52 -0700913 } else {
914 // mock providers
915 LocationProviderInterface lp = mMockProviders.get(provider);
916 if (lp != null) {
917 ProviderProperties properties = lp.getProperties();
918 if (properties != null) {
919 if (properties.mRequiresSatellite) {
920 // provider requiring satellites require FINE permission
Victoria Lease37425c32012-10-16 16:08:48 -0700921 return RESOLUTION_LEVEL_FINE;
Laurent Tu941221c2012-10-04 14:21:52 -0700922 } else if (properties.mRequiresNetwork || properties.mRequiresCell) {
923 // provider requiring network and or cell require COARSE or FINE
Victoria Lease37425c32012-10-16 16:08:48 -0700924 return RESOLUTION_LEVEL_COARSE;
Laurent Tu941221c2012-10-04 14:21:52 -0700925 }
926 }
927 }
Victoria Lease8dbb6342012-09-21 16:55:53 -0700928 }
Victoria Lease37425c32012-10-16 16:08:48 -0700929 return RESOLUTION_LEVEL_FINE; // if in doubt, require FINE
Victoria Leaseda479c52012-10-15 15:24:16 -0700930 }
931
Victoria Lease37425c32012-10-16 16:08:48 -0700932 /**
933 * Throw SecurityException if specified resolution level is insufficient to use the named
934 * location provider.
935 *
936 * @param allowedResolutionLevel resolution level allowed to caller
937 * @param providerName the name of the location provider
938 */
939 private void checkResolutionLevelIsSufficientForProviderUse(int allowedResolutionLevel,
940 String providerName) {
941 int requiredResolutionLevel = getMinimumResolutionLevelForProviderUse(providerName);
942 if (allowedResolutionLevel < requiredResolutionLevel) {
943 switch (requiredResolutionLevel) {
944 case RESOLUTION_LEVEL_FINE:
945 throw new SecurityException("\"" + providerName + "\" location provider " +
946 "requires ACCESS_FINE_LOCATION permission.");
947 case RESOLUTION_LEVEL_COARSE:
948 throw new SecurityException("\"" + providerName + "\" location provider " +
949 "requires ACCESS_COARSE_LOCATION or ACCESS_FINE_LOCATION permission.");
950 default:
951 throw new SecurityException("Insufficient permission for \"" + providerName +
952 "\" location provider.");
Victoria Leaseda479c52012-10-15 15:24:16 -0700953 }
954 }
Victoria Lease8dbb6342012-09-21 16:55:53 -0700955 }
956
David Christie82edc9b2013-07-19 11:31:42 -0700957 /**
958 * Throw SecurityException if WorkSource use is not allowed (i.e. can't blame other packages
959 * for battery).
960 */
David Christie40e57822013-07-30 11:36:48 -0700961 private void checkDeviceStatsAllowed() {
David Christie82edc9b2013-07-19 11:31:42 -0700962 mContext.enforceCallingOrSelfPermission(
963 android.Manifest.permission.UPDATE_DEVICE_STATS, null);
964 }
965
David Christie40e57822013-07-30 11:36:48 -0700966 private void checkUpdateAppOpsAllowed() {
967 mContext.enforceCallingOrSelfPermission(
968 android.Manifest.permission.UPDATE_APP_OPS_STATS, null);
969 }
970
Dianne Hackborn5e45ee62013-01-24 19:13:44 -0800971 public static int resolutionLevelToOp(int allowedResolutionLevel) {
Dianne Hackborn35654b62013-01-14 17:38:02 -0800972 if (allowedResolutionLevel != RESOLUTION_LEVEL_NONE) {
973 if (allowedResolutionLevel == RESOLUTION_LEVEL_COARSE) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -0800974 return AppOpsManager.OP_COARSE_LOCATION;
Dianne Hackborn35654b62013-01-14 17:38:02 -0800975 } else {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -0800976 return AppOpsManager.OP_FINE_LOCATION;
Dianne Hackborn35654b62013-01-14 17:38:02 -0800977 }
Dianne Hackborn5e45ee62013-01-24 19:13:44 -0800978 }
979 return -1;
980 }
981
982 boolean reportLocationAccessNoThrow(int uid, String packageName, int allowedResolutionLevel) {
983 int op = resolutionLevelToOp(allowedResolutionLevel);
984 if (op >= 0) {
Dianne Hackborn35654b62013-01-14 17:38:02 -0800985 if (mAppOps.noteOpNoThrow(op, uid, packageName) != AppOpsManager.MODE_ALLOWED) {
986 return false;
987 }
988 }
989 return true;
990 }
991
992 boolean checkLocationAccess(int uid, String packageName, int allowedResolutionLevel) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -0800993 int op = resolutionLevelToOp(allowedResolutionLevel);
994 if (op >= 0) {
Dianne Hackborn35654b62013-01-14 17:38:02 -0800995 if (mAppOps.checkOp(op, uid, packageName) != AppOpsManager.MODE_ALLOWED) {
996 return false;
997 }
998 }
999 return true;
1000 }
1001
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001002 /**
1003 * Returns all providers by name, including passive, but excluding
Laurent Tu0d21e212012-10-02 15:33:48 -07001004 * fused, also including ones that are not permitted to
1005 * be accessed by the calling activity or are currently disabled.
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001006 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001007 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001008 public List<String> getAllProviders() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001009 ArrayList<String> out;
1010 synchronized (mLock) {
1011 out = new ArrayList<String>(mProviders.size());
1012 for (LocationProviderInterface provider : mProviders) {
1013 String name = provider.getName();
1014 if (LocationManager.FUSED_PROVIDER.equals(name)) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07001015 continue;
1016 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001017 out.add(name);
1018 }
1019 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001020
1021 if (D) Log.d(TAG, "getAllProviders()=" + out);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001022 return out;
1023 }
1024
Mike Lockwood03ca2162010-04-01 08:10:09 -07001025 /**
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001026 * Return all providers by name, that match criteria and are optionally
1027 * enabled.
1028 * Can return passive provider, but never returns fused provider.
Mike Lockwood03ca2162010-04-01 08:10:09 -07001029 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001030 @Override
1031 public List<String> getProviders(Criteria criteria, boolean enabledOnly) {
Victoria Lease37425c32012-10-16 16:08:48 -07001032 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001033 ArrayList<String> out;
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001034 int uid = Binder.getCallingUid();;
Victoria Lease269518e2012-10-29 08:25:39 -07001035 long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001036 try {
1037 synchronized (mLock) {
1038 out = new ArrayList<String>(mProviders.size());
1039 for (LocationProviderInterface provider : mProviders) {
1040 String name = provider.getName();
1041 if (LocationManager.FUSED_PROVIDER.equals(name)) {
Victoria Lease8dbb6342012-09-21 16:55:53 -07001042 continue;
1043 }
Victoria Lease37425c32012-10-16 16:08:48 -07001044 if (allowedResolutionLevel >= getMinimumResolutionLevelForProviderUse(name)) {
Victoria Lease09eeaec2013-02-05 11:34:13 -08001045 if (enabledOnly && !isAllowedByUserSettingsLocked(name, uid)) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001046 continue;
1047 }
1048 if (criteria != null && !LocationProvider.propertiesMeetCriteria(
1049 name, provider.getProperties(), criteria)) {
1050 continue;
1051 }
1052 out.add(name);
Victoria Lease8dbb6342012-09-21 16:55:53 -07001053 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001054 }
Mike Lockwood03ca2162010-04-01 08:10:09 -07001055 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001056 } finally {
1057 Binder.restoreCallingIdentity(identity);
Mike Lockwood03ca2162010-04-01 08:10:09 -07001058 }
1059
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001060 if (D) Log.d(TAG, "getProviders()=" + out);
1061 return out;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001062 }
1063
1064 /**
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001065 * Return the name of the best provider given a Criteria object.
1066 * This method has been deprecated from the public API,
Victoria Lease8dbb6342012-09-21 16:55:53 -07001067 * and the whole LocationProvider (including #meetsCriteria)
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001068 * has been deprecated as well. So this method now uses
1069 * some simplified logic.
Mike Lockwood03ca2162010-04-01 08:10:09 -07001070 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001071 @Override
Mike Lockwood03ca2162010-04-01 08:10:09 -07001072 public String getBestProvider(Criteria criteria, boolean enabledOnly) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001073 String result = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001074
1075 List<String> providers = getProviders(criteria, enabledOnly);
Victoria Lease8dbb6342012-09-21 16:55:53 -07001076 if (!providers.isEmpty()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001077 result = pickBest(providers);
1078 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
1079 return result;
1080 }
1081 providers = getProviders(null, enabledOnly);
Victoria Lease8dbb6342012-09-21 16:55:53 -07001082 if (!providers.isEmpty()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001083 result = pickBest(providers);
1084 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
1085 return result;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001086 }
1087
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001088 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
Mike Lockwood03ca2162010-04-01 08:10:09 -07001089 return null;
1090 }
1091
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001092 private String pickBest(List<String> providers) {
Victoria Lease1925e292012-09-24 17:00:18 -07001093 if (providers.contains(LocationManager.GPS_PROVIDER)) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001094 return LocationManager.GPS_PROVIDER;
Victoria Lease1925e292012-09-24 17:00:18 -07001095 } else if (providers.contains(LocationManager.NETWORK_PROVIDER)) {
1096 return LocationManager.NETWORK_PROVIDER;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001097 } else {
1098 return providers.get(0);
1099 }
1100 }
1101
Nick Pellye0fd6932012-07-11 10:26:13 -07001102 @Override
Mike Lockwood03ca2162010-04-01 08:10:09 -07001103 public boolean providerMeetsCriteria(String provider, Criteria criteria) {
1104 LocationProviderInterface p = mProvidersByName.get(provider);
1105 if (p == null) {
1106 throw new IllegalArgumentException("provider=" + provider);
1107 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001108
1109 boolean result = LocationProvider.propertiesMeetCriteria(
1110 p.getName(), p.getProperties(), criteria);
1111 if (D) Log.d(TAG, "providerMeetsCriteria(" + provider + ", " + criteria + ")=" + result);
1112 return result;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001113 }
1114
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001115 private void updateProvidersLocked() {
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001116 boolean changesMade = false;
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001117 for (int i = mProviders.size() - 1; i >= 0; i--) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001118 LocationProviderInterface p = mProviders.get(i);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001119 boolean isEnabled = p.isEnabled();
1120 String name = p.getName();
Victoria Lease09eeaec2013-02-05 11:34:13 -08001121 boolean shouldBeEnabled = isAllowedByCurrentUserSettingsLocked(name);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001122 if (isEnabled && !shouldBeEnabled) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001123 updateProviderListenersLocked(name, false, mCurrentUserId);
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001124 changesMade = true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001125 } else if (!isEnabled && shouldBeEnabled) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001126 updateProviderListenersLocked(name, true, mCurrentUserId);
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001127 changesMade = true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001128 }
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001129 }
1130 if (changesMade) {
Dianne Hackborn5ac72a22012-08-29 18:32:08 -07001131 mContext.sendBroadcastAsUser(new Intent(LocationManager.PROVIDERS_CHANGED_ACTION),
1132 UserHandle.ALL);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001133 }
1134 }
1135
Victoria Leaseb711d572012-10-02 13:14:11 -07001136 private void updateProviderListenersLocked(String provider, boolean enabled, int userId) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001137 int listeners = 0;
1138
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001139 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001140 if (p == null) return;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001141
1142 ArrayList<Receiver> deadReceivers = null;
Nick Pellye0fd6932012-07-11 10:26:13 -07001143
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001144 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1145 if (records != null) {
1146 final int N = records.size();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001147 for (int i = 0; i < N; i++) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001148 UpdateRecord record = records.get(i);
Victoria Lease269518e2012-10-29 08:25:39 -07001149 if (UserHandle.getUserId(record.mReceiver.mUid) == userId) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001150 // Sends a notification message to the receiver
1151 if (!record.mReceiver.callProviderEnabledLocked(provider, enabled)) {
1152 if (deadReceivers == null) {
1153 deadReceivers = new ArrayList<Receiver>();
1154 }
1155 deadReceivers.add(record.mReceiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001156 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001157 listeners++;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001158 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001159 }
1160 }
1161
1162 if (deadReceivers != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001163 for (int i = deadReceivers.size() - 1; i >= 0; i--) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001164 removeUpdatesLocked(deadReceivers.get(i));
1165 }
1166 }
Nick Pellye0fd6932012-07-11 10:26:13 -07001167
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001168 if (enabled) {
1169 p.enable();
1170 if (listeners > 0) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001171 applyRequirementsLocked(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001172 }
1173 } else {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001174 p.disable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001175 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001176 }
1177
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001178 private void applyRequirementsLocked(String provider) {
1179 LocationProviderInterface p = mProvidersByName.get(provider);
1180 if (p == null) return;
1181
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001182 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001183 WorkSource worksource = new WorkSource();
1184 ProviderRequest providerRequest = new ProviderRequest();
1185
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001186 if (records != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001187 for (UpdateRecord record : records) {
Victoria Lease269518e2012-10-29 08:25:39 -07001188 if (UserHandle.getUserId(record.mReceiver.mUid) == mCurrentUserId) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001189 if (checkLocationAccess(record.mReceiver.mUid, record.mReceiver.mPackageName,
1190 record.mReceiver.mAllowedResolutionLevel)) {
1191 LocationRequest locationRequest = record.mRequest;
1192 providerRequest.locationRequests.add(locationRequest);
1193 if (locationRequest.getInterval() < providerRequest.interval) {
1194 providerRequest.reportLocation = true;
1195 providerRequest.interval = locationRequest.getInterval();
1196 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001197 }
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -07001198 }
1199 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001200
1201 if (providerRequest.reportLocation) {
1202 // calculate who to blame for power
1203 // This is somewhat arbitrary. We pick a threshold interval
1204 // that is slightly higher that the minimum interval, and
1205 // spread the blame across all applications with a request
1206 // under that threshold.
1207 long thresholdInterval = (providerRequest.interval + 1000) * 3 / 2;
1208 for (UpdateRecord record : records) {
Victoria Lease269518e2012-10-29 08:25:39 -07001209 if (UserHandle.getUserId(record.mReceiver.mUid) == mCurrentUserId) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001210 LocationRequest locationRequest = record.mRequest;
1211 if (locationRequest.getInterval() <= thresholdInterval) {
David Christie82edc9b2013-07-19 11:31:42 -07001212 if (record.mReceiver.mWorkSource != null) {
1213 // Assign blame to another work source.
1214 worksource.add(record.mReceiver.mWorkSource);
1215 } else {
1216 // Assign blame to caller.
1217 worksource.add(
1218 record.mReceiver.mUid,
1219 record.mReceiver.mPackageName);
1220 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001221 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001222 }
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -07001223 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001224 }
1225 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001226
1227 if (D) Log.d(TAG, "provider request: " + provider + " " + providerRequest);
1228 p.setRequest(providerRequest, worksource);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001229 }
1230
1231 private class UpdateRecord {
1232 final String mProvider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001233 final LocationRequest mRequest;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001234 final Receiver mReceiver;
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001235 Location mLastFixBroadcast;
1236 long mLastStatusBroadcast;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001237
1238 /**
1239 * Note: must be constructed with lock held.
1240 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001241 UpdateRecord(String provider, LocationRequest request, Receiver receiver) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001242 mProvider = provider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001243 mRequest = request;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001244 mReceiver = receiver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001245
1246 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1247 if (records == null) {
1248 records = new ArrayList<UpdateRecord>();
1249 mRecordsByProvider.put(provider, records);
1250 }
1251 if (!records.contains(this)) {
1252 records.add(this);
1253 }
1254 }
1255
1256 /**
1257 * Method to be called when a record will no longer be used. Calling this multiple times
1258 * must have the same effect as calling it once.
1259 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001260 void disposeLocked(boolean removeReceiver) {
1261 // remove from mRecordsByProvider
1262 ArrayList<UpdateRecord> globalRecords = mRecordsByProvider.get(this.mProvider);
1263 if (globalRecords != null) {
1264 globalRecords.remove(this);
1265 }
1266
1267 if (!removeReceiver) return; // the caller will handle the rest
1268
1269 // remove from Receiver#mUpdateRecords
1270 HashMap<String, UpdateRecord> receiverRecords = mReceiver.mUpdateRecords;
1271 if (receiverRecords != null) {
1272 receiverRecords.remove(this.mProvider);
1273
1274 // and also remove the Receiver if it has no more update records
1275 if (removeReceiver && receiverRecords.size() == 0) {
1276 removeUpdatesLocked(mReceiver);
1277 }
Mike Lockwood3a76fd62009-09-01 07:26:56 -04001278 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001279 }
1280
1281 @Override
1282 public String toString() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001283 StringBuilder s = new StringBuilder();
1284 s.append("UpdateRecord[");
1285 s.append(mProvider);
1286 s.append(' ').append(mReceiver.mPackageName).append('(');
1287 s.append(mReceiver.mUid).append(')');
1288 s.append(' ').append(mRequest);
1289 s.append(']');
1290 return s.toString();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001291 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001292 }
1293
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001294 private Receiver getReceiverLocked(ILocationListener listener, int pid, int uid,
David Christie40e57822013-07-30 11:36:48 -07001295 String packageName, WorkSource workSource, boolean hideFromAppOps) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001296 IBinder binder = listener.asBinder();
1297 Receiver receiver = mReceivers.get(binder);
1298 if (receiver == null) {
David Christie40e57822013-07-30 11:36:48 -07001299 receiver = new Receiver(listener, null, pid, uid, packageName, workSource,
1300 hideFromAppOps);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001301 mReceivers.put(binder, receiver);
1302
1303 try {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001304 receiver.getListener().asBinder().linkToDeath(receiver, 0);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001305 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001306 Slog.e(TAG, "linkToDeath failed:", e);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001307 return null;
1308 }
1309 }
1310 return receiver;
1311 }
1312
David Christie82edc9b2013-07-19 11:31:42 -07001313 private Receiver getReceiverLocked(PendingIntent intent, int pid, int uid, String packageName,
David Christie40e57822013-07-30 11:36:48 -07001314 WorkSource workSource, boolean hideFromAppOps) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001315 Receiver receiver = mReceivers.get(intent);
1316 if (receiver == null) {
David Christie40e57822013-07-30 11:36:48 -07001317 receiver = new Receiver(null, intent, pid, uid, packageName, workSource,
1318 hideFromAppOps);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001319 mReceivers.put(intent, receiver);
1320 }
1321 return receiver;
1322 }
1323
Victoria Lease37425c32012-10-16 16:08:48 -07001324 /**
1325 * Creates a LocationRequest based upon the supplied LocationRequest that to meets resolution
1326 * and consistency requirements.
1327 *
1328 * @param request the LocationRequest from which to create a sanitized version
Victoria Lease37425c32012-10-16 16:08:48 -07001329 * @return a version of request that meets the given resolution and consistency requirements
1330 * @hide
1331 */
1332 private LocationRequest createSanitizedRequest(LocationRequest request, int resolutionLevel) {
1333 LocationRequest sanitizedRequest = new LocationRequest(request);
1334 if (resolutionLevel < RESOLUTION_LEVEL_FINE) {
1335 switch (sanitizedRequest.getQuality()) {
Victoria Lease09016ab2012-09-16 12:33:15 -07001336 case LocationRequest.ACCURACY_FINE:
Victoria Lease37425c32012-10-16 16:08:48 -07001337 sanitizedRequest.setQuality(LocationRequest.ACCURACY_BLOCK);
Victoria Lease09016ab2012-09-16 12:33:15 -07001338 break;
1339 case LocationRequest.POWER_HIGH:
Victoria Lease37425c32012-10-16 16:08:48 -07001340 sanitizedRequest.setQuality(LocationRequest.POWER_LOW);
Victoria Lease09016ab2012-09-16 12:33:15 -07001341 break;
1342 }
1343 // throttle
Victoria Lease37425c32012-10-16 16:08:48 -07001344 if (sanitizedRequest.getInterval() < LocationFudger.FASTEST_INTERVAL_MS) {
1345 sanitizedRequest.setInterval(LocationFudger.FASTEST_INTERVAL_MS);
Victoria Lease09016ab2012-09-16 12:33:15 -07001346 }
Victoria Lease37425c32012-10-16 16:08:48 -07001347 if (sanitizedRequest.getFastestInterval() < LocationFudger.FASTEST_INTERVAL_MS) {
1348 sanitizedRequest.setFastestInterval(LocationFudger.FASTEST_INTERVAL_MS);
Victoria Lease09016ab2012-09-16 12:33:15 -07001349 }
Nick Pelly74fa7ea2012-08-13 19:36:38 -07001350 }
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001351 // make getFastestInterval() the minimum of interval and fastest interval
Victoria Lease37425c32012-10-16 16:08:48 -07001352 if (sanitizedRequest.getFastestInterval() > sanitizedRequest.getInterval()) {
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001353 request.setFastestInterval(request.getInterval());
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001354 }
Victoria Lease37425c32012-10-16 16:08:48 -07001355 return sanitizedRequest;
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001356 }
1357
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001358 private void checkPackageName(String packageName) {
Nick Pellye0fd6932012-07-11 10:26:13 -07001359 if (packageName == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001360 throw new SecurityException("invalid package name: " + packageName);
Nick Pellye0fd6932012-07-11 10:26:13 -07001361 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001362 int uid = Binder.getCallingUid();
Nick Pellye0fd6932012-07-11 10:26:13 -07001363 String[] packages = mPackageManager.getPackagesForUid(uid);
1364 if (packages == null) {
1365 throw new SecurityException("invalid UID " + uid);
1366 }
1367 for (String pkg : packages) {
1368 if (packageName.equals(pkg)) return;
1369 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001370 throw new SecurityException("invalid package name: " + packageName);
Nick Pellye0fd6932012-07-11 10:26:13 -07001371 }
1372
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001373 private void checkPendingIntent(PendingIntent intent) {
1374 if (intent == null) {
1375 throw new IllegalArgumentException("invalid pending intent: " + intent);
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001376 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001377 }
1378
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001379 private Receiver checkListenerOrIntentLocked(ILocationListener listener, PendingIntent intent,
David Christie40e57822013-07-30 11:36:48 -07001380 int pid, int uid, String packageName, WorkSource workSource, boolean hideFromAppOps) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001381 if (intent == null && listener == null) {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001382 throw new IllegalArgumentException("need either listener or intent");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001383 } else if (intent != null && listener != null) {
1384 throw new IllegalArgumentException("cannot register both listener and intent");
1385 } else if (intent != null) {
1386 checkPendingIntent(intent);
David Christie40e57822013-07-30 11:36:48 -07001387 return getReceiverLocked(intent, pid, uid, packageName, workSource, hideFromAppOps);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001388 } else {
David Christie40e57822013-07-30 11:36:48 -07001389 return getReceiverLocked(listener, pid, uid, packageName, workSource, hideFromAppOps);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001390 }
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001391 }
1392
Nick Pellye0fd6932012-07-11 10:26:13 -07001393 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001394 public void requestLocationUpdates(LocationRequest request, ILocationListener listener,
1395 PendingIntent intent, String packageName) {
1396 if (request == null) request = DEFAULT_LOCATION_REQUEST;
1397 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001398 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1399 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1400 request.getProvider());
David Christie82edc9b2013-07-19 11:31:42 -07001401 WorkSource workSource = request.getWorkSource();
1402 if (workSource != null && workSource.size() > 0) {
David Christie40e57822013-07-30 11:36:48 -07001403 checkDeviceStatsAllowed();
1404 }
1405 boolean hideFromAppOps = request.getHideFromAppOps();
1406 if (hideFromAppOps) {
1407 checkUpdateAppOpsAllowed();
David Christie82edc9b2013-07-19 11:31:42 -07001408 }
Victoria Lease37425c32012-10-16 16:08:48 -07001409 LocationRequest sanitizedRequest = createSanitizedRequest(request, allowedResolutionLevel);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001410
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001411 final int pid = Binder.getCallingPid();
1412 final int uid = Binder.getCallingUid();
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001413 // providers may use public location API's, need to clear identity
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001414 long identity = Binder.clearCallingIdentity();
1415 try {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001416 // We don't check for MODE_IGNORED here; we will do that when we go to deliver
1417 // a location.
Dianne Hackborn35654b62013-01-14 17:38:02 -08001418 checkLocationAccess(uid, packageName, allowedResolutionLevel);
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001419
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001420 synchronized (mLock) {
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001421 Receiver recevier = checkListenerOrIntentLocked(listener, intent, pid, uid,
David Christie40e57822013-07-30 11:36:48 -07001422 packageName, workSource, hideFromAppOps);
Victoria Lease37425c32012-10-16 16:08:48 -07001423 requestLocationUpdatesLocked(sanitizedRequest, recevier, pid, uid, packageName);
Mike Lockwood2d4d1bf2010-10-18 17:06:26 -04001424 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001425 } finally {
1426 Binder.restoreCallingIdentity(identity);
1427 }
1428 }
1429
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001430 private void requestLocationUpdatesLocked(LocationRequest request, Receiver receiver,
1431 int pid, int uid, String packageName) {
1432 // Figure out the provider. Either its explicitly request (legacy use cases), or
1433 // use the fused provider
1434 if (request == null) request = DEFAULT_LOCATION_REQUEST;
1435 String name = request.getProvider();
Victoria Lease09016ab2012-09-16 12:33:15 -07001436 if (name == null) {
1437 throw new IllegalArgumentException("provider name must not be null");
1438 }
Zhentao Sunc5fc9982013-04-17 17:47:53 -07001439
1440 if (D) Log.d(TAG, "request " + Integer.toHexString(System.identityHashCode(receiver))
1441 + " " + name + " " + request + " from " + packageName + "(" + uid + ")");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001442 LocationProviderInterface provider = mProvidersByName.get(name);
1443 if (provider == null) {
1444 throw new IllegalArgumentException("provider doesn't exisit: " + provider);
1445 }
1446
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001447 UpdateRecord record = new UpdateRecord(name, request, receiver);
1448 UpdateRecord oldRecord = receiver.mUpdateRecords.put(name, record);
1449 if (oldRecord != null) {
1450 oldRecord.disposeLocked(false);
1451 }
1452
Victoria Lease09eeaec2013-02-05 11:34:13 -08001453 boolean isProviderEnabled = isAllowedByUserSettingsLocked(name, uid);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001454 if (isProviderEnabled) {
1455 applyRequirementsLocked(name);
1456 } else {
1457 // Notify the listener that updates are currently disabled
1458 receiver.callProviderEnabledLocked(name, false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001459 }
David Christie0b837452013-07-29 16:02:13 -07001460 // Update the monitoring here just in case multiple location requests were added to the
1461 // same receiver (this request may be high power and the initial might not have been).
1462 receiver.updateMonitoring(true);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001463 }
1464
Nick Pellye0fd6932012-07-11 10:26:13 -07001465 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001466 public void removeUpdates(ILocationListener listener, PendingIntent intent,
1467 String packageName) {
1468 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001469
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001470 final int pid = Binder.getCallingPid();
1471 final int uid = Binder.getCallingUid();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001472
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001473 synchronized (mLock) {
David Christie82edc9b2013-07-19 11:31:42 -07001474 WorkSource workSource = null;
David Christie40e57822013-07-30 11:36:48 -07001475 boolean hideFromAppOps = false;
1476 Receiver receiver = checkListenerOrIntentLocked(listener, intent, pid, uid,
1477 packageName, workSource, hideFromAppOps);
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001478
1479 // providers may use public location API's, need to clear identity
1480 long identity = Binder.clearCallingIdentity();
1481 try {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001482 removeUpdatesLocked(receiver);
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001483 } finally {
1484 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001485 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001486 }
1487 }
1488
1489 private void removeUpdatesLocked(Receiver receiver) {
Dianne Hackborn7ff30112012-11-08 11:12:09 -08001490 if (D) Log.i(TAG, "remove " + Integer.toHexString(System.identityHashCode(receiver)));
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001491
1492 if (mReceivers.remove(receiver.mKey) != null && receiver.isListener()) {
1493 receiver.getListener().asBinder().unlinkToDeath(receiver, 0);
1494 synchronized (receiver) {
Victoria Lease0aa28602013-05-29 15:28:26 -07001495 receiver.clearPendingBroadcastsLocked();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001496 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001497 }
1498
Dianne Hackborn1304f4a2013-07-09 18:17:27 -07001499 receiver.updateMonitoring(false);
1500
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001501 // Record which providers were associated with this listener
1502 HashSet<String> providers = new HashSet<String>();
1503 HashMap<String, UpdateRecord> oldRecords = receiver.mUpdateRecords;
1504 if (oldRecords != null) {
1505 // Call dispose() on the obsolete update records.
1506 for (UpdateRecord record : oldRecords.values()) {
1507 record.disposeLocked(false);
1508 }
1509 // Accumulate providers
1510 providers.addAll(oldRecords.keySet());
1511 }
1512
1513 // update provider
1514 for (String provider : providers) {
1515 // If provider is already disabled, don't need to do anything
Victoria Lease09eeaec2013-02-05 11:34:13 -08001516 if (!isAllowedByCurrentUserSettingsLocked(provider)) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001517 continue;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001518 }
1519
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001520 applyRequirementsLocked(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001521 }
1522 }
1523
Dianne Hackbornc2293022013-02-06 23:14:49 -08001524 private void applyAllProviderRequirementsLocked() {
1525 for (LocationProviderInterface p : mProviders) {
1526 // If provider is already disabled, don't need to do anything
Dianne Hackborn64d41d72013-02-07 00:33:31 -08001527 if (!isAllowedByCurrentUserSettingsLocked(p.getName())) {
Dianne Hackbornc2293022013-02-06 23:14:49 -08001528 continue;
1529 }
1530
1531 applyRequirementsLocked(p.getName());
1532 }
1533 }
1534
Nick Pellye0fd6932012-07-11 10:26:13 -07001535 @Override
Nick Pelly4035f5a2012-08-17 14:43:49 -07001536 public Location getLastLocation(LocationRequest request, String packageName) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001537 if (D) Log.d(TAG, "getLastLocation: " + request);
1538 if (request == null) request = DEFAULT_LOCATION_REQUEST;
Victoria Lease37425c32012-10-16 16:08:48 -07001539 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
Nick Pelly4035f5a2012-08-17 14:43:49 -07001540 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001541 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1542 request.getProvider());
1543 // no need to sanitize this request, as only the provider name is used
Nick Pelly4035f5a2012-08-17 14:43:49 -07001544
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001545 final int uid = Binder.getCallingUid();
1546 final long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001547 try {
1548 if (mBlacklist.isBlacklisted(packageName)) {
1549 if (D) Log.d(TAG, "not returning last loc for blacklisted app: " +
1550 packageName);
Victoria Lease09016ab2012-09-16 12:33:15 -07001551 return null;
1552 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001553
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001554 if (!reportLocationAccessNoThrow(uid, packageName, allowedResolutionLevel)) {
1555 if (D) Log.d(TAG, "not returning last loc for no op app: " +
1556 packageName);
1557 return null;
1558 }
1559
Victoria Leaseb711d572012-10-02 13:14:11 -07001560 synchronized (mLock) {
1561 // Figure out the provider. Either its explicitly request (deprecated API's),
1562 // or use the fused provider
1563 String name = request.getProvider();
1564 if (name == null) name = LocationManager.FUSED_PROVIDER;
1565 LocationProviderInterface provider = mProvidersByName.get(name);
1566 if (provider == null) return null;
1567
Victoria Lease09eeaec2013-02-05 11:34:13 -08001568 if (!isAllowedByUserSettingsLocked(name, uid)) return null;
Victoria Leaseb711d572012-10-02 13:14:11 -07001569
David Christie1b9b7b12013-04-15 15:31:11 -07001570 Location location;
1571 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
1572 // Make sure that an app with coarse permissions can't get frequent location
1573 // updates by calling LocationManager.getLastKnownLocation repeatedly.
1574 location = mLastLocationCoarseInterval.get(name);
1575 } else {
1576 location = mLastLocation.get(name);
1577 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001578 if (location == null) {
1579 return null;
1580 }
Victoria Lease37425c32012-10-16 16:08:48 -07001581 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001582 Location noGPSLocation = location.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1583 if (noGPSLocation != null) {
Dianne Hackborn6c5406a2012-11-29 16:18:01 -08001584 return new Location(mLocationFudger.getOrCreate(noGPSLocation));
Victoria Leaseb711d572012-10-02 13:14:11 -07001585 }
Victoria Lease37425c32012-10-16 16:08:48 -07001586 } else {
Dianne Hackborn6c5406a2012-11-29 16:18:01 -08001587 return new Location(location);
Victoria Lease09016ab2012-09-16 12:33:15 -07001588 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001589 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001590 return null;
1591 } finally {
1592 Binder.restoreCallingIdentity(identity);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001593 }
1594 }
1595
1596 @Override
1597 public void requestGeofence(LocationRequest request, Geofence geofence, PendingIntent intent,
1598 String packageName) {
1599 if (request == null) request = DEFAULT_LOCATION_REQUEST;
Victoria Lease37425c32012-10-16 16:08:48 -07001600 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1601 checkResolutionLevelIsSufficientForGeofenceUse(allowedResolutionLevel);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001602 checkPendingIntent(intent);
1603 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001604 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1605 request.getProvider());
1606 LocationRequest sanitizedRequest = createSanitizedRequest(request, allowedResolutionLevel);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001607
Victoria Lease37425c32012-10-16 16:08:48 -07001608 if (D) Log.d(TAG, "requestGeofence: " + sanitizedRequest + " " + geofence + " " + intent);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001609
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001610 // geo-fence manager uses the public location API, need to clear identity
1611 int uid = Binder.getCallingUid();
Victoria Lease56e675b2012-11-05 19:25:06 -08001612 if (UserHandle.getUserId(uid) != UserHandle.USER_OWNER) {
1613 // temporary measure until geofences work for secondary users
1614 Log.w(TAG, "proximity alerts are currently available only to the primary user");
1615 return;
1616 }
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001617 long identity = Binder.clearCallingIdentity();
1618 try {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001619 mGeofenceManager.addFence(sanitizedRequest, geofence, intent, allowedResolutionLevel,
1620 uid, packageName);
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001621 } finally {
1622 Binder.restoreCallingIdentity(identity);
1623 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001624 }
1625
1626 @Override
1627 public void removeGeofence(Geofence geofence, PendingIntent intent, String packageName) {
Victoria Lease37425c32012-10-16 16:08:48 -07001628 checkResolutionLevelIsSufficientForGeofenceUse(getCallerAllowedResolutionLevel());
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001629 checkPendingIntent(intent);
1630 checkPackageName(packageName);
1631
1632 if (D) Log.d(TAG, "removeGeofence: " + geofence + " " + intent);
1633
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001634 // geo-fence manager uses the public location API, need to clear identity
1635 long identity = Binder.clearCallingIdentity();
1636 try {
1637 mGeofenceManager.removeFence(geofence, intent);
1638 } finally {
1639 Binder.restoreCallingIdentity(identity);
1640 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001641 }
1642
1643
1644 @Override
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001645 public boolean addGpsStatusListener(IGpsStatusListener listener, String packageName) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001646 if (mGpsStatusProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001647 return false;
1648 }
Dianne Hackborn35654b62013-01-14 17:38:02 -08001649 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1650 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
Victoria Lease37425c32012-10-16 16:08:48 -07001651 LocationManager.GPS_PROVIDER);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001652
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001653 final int uid = Binder.getCallingUid();
1654 final long ident = Binder.clearCallingIdentity();
1655 try {
Victoria Lease3d5173d2013-02-05 16:07:32 -08001656 if (!checkLocationAccess(uid, packageName, allowedResolutionLevel)) {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001657 return false;
1658 }
1659 } finally {
1660 Binder.restoreCallingIdentity(ident);
1661 }
1662
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001663 try {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001664 mGpsStatusProvider.addGpsStatusListener(listener);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001665 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001666 Slog.e(TAG, "mGpsStatusProvider.addGpsStatusListener failed", e);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001667 return false;
1668 }
1669 return true;
1670 }
1671
Nick Pellye0fd6932012-07-11 10:26:13 -07001672 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001673 public void removeGpsStatusListener(IGpsStatusListener listener) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001674 synchronized (mLock) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001675 try {
1676 mGpsStatusProvider.removeGpsStatusListener(listener);
1677 } catch (Exception e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001678 Slog.e(TAG, "mGpsStatusProvider.removeGpsStatusListener failed", e);
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001679 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001680 }
1681 }
1682
Nick Pellye0fd6932012-07-11 10:26:13 -07001683 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001684 public boolean sendExtraCommand(String provider, String command, Bundle extras) {
Mike Lockwoodc6cc8362009-08-17 13:16:08 -04001685 if (provider == null) {
1686 // throw NullPointerException to remain compatible with previous implementation
1687 throw new NullPointerException();
1688 }
Victoria Lease37425c32012-10-16 16:08:48 -07001689 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1690 provider);
Mike Lockwoodc6cc8362009-08-17 13:16:08 -04001691
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001692 // and check for ACCESS_LOCATION_EXTRA_COMMANDS
Mike Lockwoodb7e99222009-07-07 13:18:21 -04001693 if ((mContext.checkCallingOrSelfPermission(ACCESS_LOCATION_EXTRA_COMMANDS)
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001694 != PackageManager.PERMISSION_GRANTED)) {
1695 throw new SecurityException("Requires ACCESS_LOCATION_EXTRA_COMMANDS permission");
1696 }
1697
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001698 synchronized (mLock) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001699 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001700 if (p == null) return false;
Nick Pellye0fd6932012-07-11 10:26:13 -07001701
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001702 return p.sendExtraCommand(command, extras);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001703 }
1704 }
1705
Nick Pellye0fd6932012-07-11 10:26:13 -07001706 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001707 public boolean sendNiResponse(int notifId, int userResponse) {
Mike Lockwood18ad9f62009-08-27 14:01:23 -07001708 if (Binder.getCallingUid() != Process.myUid()) {
1709 throw new SecurityException(
1710 "calling sendNiResponse from outside of the system is not allowed");
1711 }
Danke Xie22d1f9f2009-08-18 18:28:45 -04001712 try {
1713 return mNetInitiatedListener.sendNiResponse(notifId, userResponse);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001714 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001715 Slog.e(TAG, "RemoteException in LocationManagerService.sendNiResponse");
Danke Xie22d1f9f2009-08-18 18:28:45 -04001716 return false;
1717 }
1718 }
1719
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001720 /**
Mike Lockwood628fd6d2010-01-25 22:46:13 -05001721 * @return null if the provider does not exist
Alexey Tarasovf2db9fb2009-09-01 02:37:07 +11001722 * @throws SecurityException if the provider is not allowed to be
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001723 * accessed by the caller
1724 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001725 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001726 public ProviderProperties getProviderProperties(String provider) {
Laurent Tub7f9d252012-10-16 14:25:00 -07001727 if (mProvidersByName.get(provider) == null) {
1728 return null;
1729 }
1730
Victoria Lease37425c32012-10-16 16:08:48 -07001731 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1732 provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001733
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001734 LocationProviderInterface p;
1735 synchronized (mLock) {
1736 p = mProvidersByName.get(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001737 }
1738
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001739 if (p == null) return null;
1740 return p.getProperties();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001741 }
1742
Nick Pellye0fd6932012-07-11 10:26:13 -07001743 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001744 public boolean isProviderEnabled(String provider) {
Victoria Lease37425c32012-10-16 16:08:48 -07001745 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1746 provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001747 if (LocationManager.FUSED_PROVIDER.equals(provider)) return false;
1748
Victoria Lease09eeaec2013-02-05 11:34:13 -08001749 int uid = Binder.getCallingUid();
Victoria Lease269518e2012-10-29 08:25:39 -07001750 long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001751 try {
1752 synchronized (mLock) {
1753 LocationProviderInterface p = mProvidersByName.get(provider);
1754 if (p == null) return false;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001755
Victoria Lease09eeaec2013-02-05 11:34:13 -08001756 return isAllowedByUserSettingsLocked(provider, uid);
Victoria Leaseb711d572012-10-02 13:14:11 -07001757 }
1758 } finally {
1759 Binder.restoreCallingIdentity(identity);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001760 }
1761 }
1762
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001763 /**
1764 * Returns "true" if the UID belongs to a bound location provider.
1765 *
1766 * @param uid the uid
1767 * @return true if uid belongs to a bound location provider
1768 */
1769 private boolean isUidALocationProvider(int uid) {
1770 if (uid == Process.SYSTEM_UID) {
1771 return true;
1772 }
1773 if (mGeocodeProvider != null) {
1774 if (doesPackageHaveUid(uid, mGeocodeProvider.getConnectedPackageName())) return true;
1775 }
1776 for (LocationProviderProxy proxy : mProxyProviders) {
1777 if (doesPackageHaveUid(uid, proxy.getConnectedPackageName())) return true;
1778 }
1779 return false;
1780 }
1781
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001782 private void checkCallerIsProvider() {
1783 if (mContext.checkCallingOrSelfPermission(INSTALL_LOCATION_PROVIDER)
1784 == PackageManager.PERMISSION_GRANTED) {
1785 return;
1786 }
1787
1788 // Previously we only used the INSTALL_LOCATION_PROVIDER
1789 // check. But that is system or signature
1790 // protection level which is not flexible enough for
1791 // providers installed oustide the system image. So
1792 // also allow providers with a UID matching the
1793 // currently bound package name
1794
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001795 if (isUidALocationProvider(Binder.getCallingUid())) {
1796 return;
1797 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001798
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001799 throw new SecurityException("need INSTALL_LOCATION_PROVIDER permission, " +
1800 "or UID of a currently bound location provider");
1801 }
1802
1803 private boolean doesPackageHaveUid(int uid, String packageName) {
1804 if (packageName == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001805 return false;
1806 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001807 try {
1808 ApplicationInfo appInfo = mPackageManager.getApplicationInfo(packageName, 0);
1809 if (appInfo.uid != uid) {
1810 return false;
1811 }
1812 } catch (NameNotFoundException e) {
1813 return false;
1814 }
1815 return true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001816 }
1817
Nick Pellye0fd6932012-07-11 10:26:13 -07001818 @Override
Mike Lockwooda4903f22010-02-17 06:42:23 -05001819 public void reportLocation(Location location, boolean passive) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001820 checkCallerIsProvider();
Mike Lockwood275555c2009-05-01 11:30:34 -04001821
Nick Pelly2eeeec22012-07-18 13:13:37 -07001822 if (!location.isComplete()) {
1823 Log.w(TAG, "Dropping incomplete location: " + location);
1824 return;
1825 }
1826
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001827 mLocationHandler.removeMessages(MSG_LOCATION_CHANGED, location);
1828 Message m = Message.obtain(mLocationHandler, MSG_LOCATION_CHANGED, location);
Mike Lockwooda4903f22010-02-17 06:42:23 -05001829 m.arg1 = (passive ? 1 : 0);
Mike Lockwood4e50b782009-04-03 08:24:43 -07001830 mLocationHandler.sendMessageAtFrontOfQueue(m);
1831 }
1832
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001833
Laurent Tu75defb62012-11-01 16:21:52 -07001834 private static boolean shouldBroadcastSafe(
1835 Location loc, Location lastLoc, UpdateRecord record, long now) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001836 // Always broadcast the first update
1837 if (lastLoc == null) {
1838 return true;
1839 }
1840
Nick Pellyf1be6862012-05-15 10:53:42 -07001841 // Check whether sufficient time has passed
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001842 long minTime = record.mRequest.getFastestInterval();
David Christie1b9b7b12013-04-15 15:31:11 -07001843 long delta = (loc.getElapsedRealtimeNanos() - lastLoc.getElapsedRealtimeNanos())
1844 / NANOS_PER_MILLI;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001845 if (delta < minTime - MAX_PROVIDER_SCHEDULING_JITTER_MS) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001846 return false;
1847 }
1848
1849 // Check whether sufficient distance has been traveled
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001850 double minDistance = record.mRequest.getSmallestDisplacement();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001851 if (minDistance > 0.0) {
1852 if (loc.distanceTo(lastLoc) <= minDistance) {
1853 return false;
1854 }
1855 }
1856
Laurent Tu75defb62012-11-01 16:21:52 -07001857 // Check whether sufficient number of udpates is left
1858 if (record.mRequest.getNumUpdates() <= 0) {
1859 return false;
1860 }
1861
1862 // Check whether the expiry date has passed
1863 if (record.mRequest.getExpireAt() < now) {
1864 return false;
1865 }
1866
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001867 return true;
1868 }
1869
Mike Lockwooda4903f22010-02-17 06:42:23 -05001870 private void handleLocationChangedLocked(Location location, boolean passive) {
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001871 if (D) Log.d(TAG, "incoming location: " + location);
1872
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001873 long now = SystemClock.elapsedRealtime();
Mike Lockwooda4903f22010-02-17 06:42:23 -05001874 String provider = (passive ? LocationManager.PASSIVE_PROVIDER : location.getProvider());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001875
Laurent Tu60ec50a2012-10-04 17:00:10 -07001876 // Skip if the provider is unknown.
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001877 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001878 if (p == null) return;
1879
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001880 // Update last known locations
Victoria Lease09016ab2012-09-16 12:33:15 -07001881 Location noGPSLocation = location.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1882 Location lastNoGPSLocation = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001883 Location lastLocation = mLastLocation.get(provider);
Mike Lockwood4e50b782009-04-03 08:24:43 -07001884 if (lastLocation == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001885 lastLocation = new Location(provider);
1886 mLastLocation.put(provider, lastLocation);
Victoria Lease09016ab2012-09-16 12:33:15 -07001887 } else {
1888 lastNoGPSLocation = lastLocation.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1889 if (noGPSLocation == null && lastNoGPSLocation != null) {
1890 // New location has no no-GPS location: adopt last no-GPS location. This is set
1891 // directly into location because we do not want to notify COARSE clients.
1892 location.setExtraLocation(Location.EXTRA_NO_GPS_LOCATION, lastNoGPSLocation);
1893 }
Mike Lockwood4e50b782009-04-03 08:24:43 -07001894 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001895 lastLocation.set(location);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001896
David Christie1b9b7b12013-04-15 15:31:11 -07001897 // Update last known coarse interval location if enough time has passed.
1898 Location lastLocationCoarseInterval = mLastLocationCoarseInterval.get(provider);
1899 if (lastLocationCoarseInterval == null) {
1900 lastLocationCoarseInterval = new Location(location);
1901 mLastLocationCoarseInterval.put(provider, lastLocationCoarseInterval);
1902 }
1903 long timeDiffNanos = location.getElapsedRealtimeNanos()
1904 - lastLocationCoarseInterval.getElapsedRealtimeNanos();
1905 if (timeDiffNanos > LocationFudger.FASTEST_INTERVAL_MS * NANOS_PER_MILLI) {
1906 lastLocationCoarseInterval.set(location);
1907 }
1908 // Don't ever return a coarse location that is more recent than the allowed update
1909 // interval (i.e. don't allow an app to keep registering and unregistering for
1910 // location updates to overcome the minimum interval).
1911 noGPSLocation =
1912 lastLocationCoarseInterval.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1913
Laurent Tu60ec50a2012-10-04 17:00:10 -07001914 // Skip if there are no UpdateRecords for this provider.
1915 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1916 if (records == null || records.size() == 0) return;
1917
Victoria Lease09016ab2012-09-16 12:33:15 -07001918 // Fetch coarse location
1919 Location coarseLocation = null;
David Christie1b9b7b12013-04-15 15:31:11 -07001920 if (noGPSLocation != null) {
Victoria Lease09016ab2012-09-16 12:33:15 -07001921 coarseLocation = mLocationFudger.getOrCreate(noGPSLocation);
1922 }
1923
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001924 // Fetch latest status update time
1925 long newStatusUpdateTime = p.getStatusUpdateTime();
1926
Mike Lockwood7ec434e2009-03-27 07:46:48 -07001927 // Get latest status
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001928 Bundle extras = new Bundle();
1929 int status = p.getStatus(extras);
1930
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001931 ArrayList<Receiver> deadReceivers = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001932 ArrayList<UpdateRecord> deadUpdateRecords = null;
Nick Pellye0fd6932012-07-11 10:26:13 -07001933
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001934 // Broadcast location or status to all listeners
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001935 for (UpdateRecord r : records) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001936 Receiver receiver = r.mReceiver;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001937 boolean receiverDead = false;
Nick Pelly4035f5a2012-08-17 14:43:49 -07001938
Victoria Lease269518e2012-10-29 08:25:39 -07001939 int receiverUserId = UserHandle.getUserId(receiver.mUid);
Victoria Lease2f5b97c2013-05-07 14:22:02 -07001940 if (receiverUserId != mCurrentUserId && !isUidALocationProvider(receiver.mUid)) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001941 if (D) {
Victoria Lease269518e2012-10-29 08:25:39 -07001942 Log.d(TAG, "skipping loc update for background user " + receiverUserId +
Victoria Leaseb711d572012-10-02 13:14:11 -07001943 " (current user: " + mCurrentUserId + ", app: " +
1944 receiver.mPackageName + ")");
1945 }
1946 continue;
1947 }
1948
Nick Pelly4035f5a2012-08-17 14:43:49 -07001949 if (mBlacklist.isBlacklisted(receiver.mPackageName)) {
1950 if (D) Log.d(TAG, "skipping loc update for blacklisted app: " +
1951 receiver.mPackageName);
1952 continue;
1953 }
1954
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001955 if (!reportLocationAccessNoThrow(receiver.mUid, receiver.mPackageName,
1956 receiver.mAllowedResolutionLevel)) {
1957 if (D) Log.d(TAG, "skipping loc update for no op app: " +
1958 receiver.mPackageName);
1959 continue;
1960 }
1961
Victoria Lease09016ab2012-09-16 12:33:15 -07001962 Location notifyLocation = null;
Victoria Lease37425c32012-10-16 16:08:48 -07001963 if (receiver.mAllowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
1964 notifyLocation = coarseLocation; // use coarse location
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001965 } else {
Victoria Lease37425c32012-10-16 16:08:48 -07001966 notifyLocation = lastLocation; // use fine location
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001967 }
Victoria Lease09016ab2012-09-16 12:33:15 -07001968 if (notifyLocation != null) {
1969 Location lastLoc = r.mLastFixBroadcast;
Laurent Tu75defb62012-11-01 16:21:52 -07001970 if ((lastLoc == null) || shouldBroadcastSafe(notifyLocation, lastLoc, r, now)) {
Victoria Lease09016ab2012-09-16 12:33:15 -07001971 if (lastLoc == null) {
1972 lastLoc = new Location(notifyLocation);
1973 r.mLastFixBroadcast = lastLoc;
1974 } else {
1975 lastLoc.set(notifyLocation);
1976 }
1977 if (!receiver.callLocationChangedLocked(notifyLocation)) {
1978 Slog.w(TAG, "RemoteException calling onLocationChanged on " + receiver);
1979 receiverDead = true;
1980 }
Laurent Tu75defb62012-11-01 16:21:52 -07001981 r.mRequest.decrementNumUpdates();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001982 }
1983 }
1984
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001985 long prevStatusUpdateTime = r.mLastStatusBroadcast;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001986 if ((newStatusUpdateTime > prevStatusUpdateTime) &&
Victoria Lease09016ab2012-09-16 12:33:15 -07001987 (prevStatusUpdateTime != 0 || status != LocationProvider.AVAILABLE)) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001988
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001989 r.mLastStatusBroadcast = newStatusUpdateTime;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001990 if (!receiver.callStatusChangedLocked(provider, status, extras)) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07001991 receiverDead = true;
Joe Onorato8a9b2202010-02-26 18:56:32 -08001992 Slog.w(TAG, "RemoteException calling onStatusChanged on " + receiver);
Mike Lockwood03ca2162010-04-01 08:10:09 -07001993 }
1994 }
1995
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001996 // track expired records
Laurent Tu75defb62012-11-01 16:21:52 -07001997 if (r.mRequest.getNumUpdates() <= 0 || r.mRequest.getExpireAt() < now) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001998 if (deadUpdateRecords == null) {
1999 deadUpdateRecords = new ArrayList<UpdateRecord>();
2000 }
2001 deadUpdateRecords.add(r);
2002 }
2003 // track dead receivers
2004 if (receiverDead) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07002005 if (deadReceivers == null) {
2006 deadReceivers = new ArrayList<Receiver>();
2007 }
2008 if (!deadReceivers.contains(receiver)) {
2009 deadReceivers.add(receiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002010 }
2011 }
2012 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002013
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002014 // remove dead records and receivers outside the loop
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002015 if (deadReceivers != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002016 for (Receiver receiver : deadReceivers) {
2017 removeUpdatesLocked(receiver);
2018 }
2019 }
2020 if (deadUpdateRecords != null) {
2021 for (UpdateRecord r : deadUpdateRecords) {
2022 r.disposeLocked(true);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002023 }
Victoria Lease8b38b292012-12-04 15:04:43 -08002024 applyRequirementsLocked(provider);
2025 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002026 }
2027
2028 private class LocationWorkerHandler extends Handler {
Victoria Lease5cd731a2012-12-19 15:04:21 -08002029 public LocationWorkerHandler(Looper looper) {
2030 super(looper, null, true);
2031 }
2032
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002033 @Override
2034 public void handleMessage(Message msg) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002035 switch (msg.what) {
2036 case MSG_LOCATION_CHANGED:
2037 handleLocationChanged((Location) msg.obj, msg.arg1 == 1);
2038 break;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002039 }
2040 }
2041 }
2042
Victoria Lease54ca7ae2013-01-08 09:39:50 -08002043 private boolean isMockProvider(String provider) {
2044 synchronized (mLock) {
2045 return mMockProviders.containsKey(provider);
2046 }
2047 }
2048
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002049 private void handleLocationChanged(Location location, boolean passive) {
Victoria Lease54ca7ae2013-01-08 09:39:50 -08002050 // create a working copy of the incoming Location so that the service can modify it without
2051 // disturbing the caller's copy
2052 Location myLocation = new Location(location);
2053 String provider = myLocation.getProvider();
2054
2055 // set "isFromMockProvider" bit if location came from a mock provider. we do not clear this
2056 // bit if location did not come from a mock provider because passive/fused providers can
2057 // forward locations from mock providers, and should not grant them legitimacy in doing so.
2058 if (!myLocation.isFromMockProvider() && isMockProvider(provider)) {
2059 myLocation.setIsFromMockProvider(true);
2060 }
Jeff Sharkey5e613312012-01-30 11:16:20 -08002061
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002062 synchronized (mLock) {
Victoria Lease09eeaec2013-02-05 11:34:13 -08002063 if (isAllowedByCurrentUserSettingsLocked(provider)) {
2064 if (!passive) {
2065 // notify passive provider of the new location
2066 mPassiveProvider.updateLocation(myLocation);
2067 }
Victoria Lease54ca7ae2013-01-08 09:39:50 -08002068 handleLocationChangedLocked(myLocation, passive);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002069 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002070 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002071 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002072
Mike Lockwoode97ae402010-09-29 15:23:46 -04002073 private final PackageMonitor mPackageMonitor = new PackageMonitor() {
2074 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002075 public void onPackageDisappeared(String packageName, int reason) {
2076 // remove all receivers associated with this package name
2077 synchronized (mLock) {
2078 ArrayList<Receiver> deadReceivers = null;
2079
2080 for (Receiver receiver : mReceivers.values()) {
2081 if (receiver.mPackageName.equals(packageName)) {
2082 if (deadReceivers == null) {
2083 deadReceivers = new ArrayList<Receiver>();
2084 }
2085 deadReceivers.add(receiver);
2086 }
2087 }
2088
2089 // perform removal outside of mReceivers loop
2090 if (deadReceivers != null) {
2091 for (Receiver receiver : deadReceivers) {
2092 removeUpdatesLocked(receiver);
2093 }
2094 }
2095 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002096 }
Mike Lockwoode97ae402010-09-29 15:23:46 -04002097 };
2098
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002099 // Geocoder
2100
Nick Pellye0fd6932012-07-11 10:26:13 -07002101 @Override
Mike Lockwoode15735a2010-09-20 17:48:47 -04002102 public boolean geocoderIsPresent() {
Mark Vandevoorde01ac80b2010-05-21 15:43:26 -07002103 return mGeocodeProvider != null;
2104 }
2105
Nick Pellye0fd6932012-07-11 10:26:13 -07002106 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002107 public String getFromLocation(double latitude, double longitude, int maxResults,
Mike Lockwood34901402010-01-04 12:14:21 -05002108 GeocoderParams params, List<Address> addrs) {
Mike Lockwooda55c3212009-04-15 11:10:11 -04002109 if (mGeocodeProvider != null) {
Mike Lockwood628fd6d2010-01-25 22:46:13 -05002110 return mGeocodeProvider.getFromLocation(latitude, longitude, maxResults,
2111 params, addrs);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002112 }
Mike Lockwooda55c3212009-04-15 11:10:11 -04002113 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002114 }
2115
Mike Lockwooda55c3212009-04-15 11:10:11 -04002116
Nick Pellye0fd6932012-07-11 10:26:13 -07002117 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002118 public String getFromLocationName(String locationName,
Mike Lockwooda55c3212009-04-15 11:10:11 -04002119 double lowerLeftLatitude, double lowerLeftLongitude,
2120 double upperRightLatitude, double upperRightLongitude, int maxResults,
Mike Lockwood34901402010-01-04 12:14:21 -05002121 GeocoderParams params, List<Address> addrs) {
Mike Lockwooda55c3212009-04-15 11:10:11 -04002122
2123 if (mGeocodeProvider != null) {
Mike Lockwood628fd6d2010-01-25 22:46:13 -05002124 return mGeocodeProvider.getFromLocationName(locationName, lowerLeftLatitude,
2125 lowerLeftLongitude, upperRightLatitude, upperRightLongitude,
2126 maxResults, params, addrs);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002127 }
Mike Lockwooda55c3212009-04-15 11:10:11 -04002128 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002129 }
2130
2131 // Mock Providers
2132
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002133 private void checkMockPermissionsSafe() {
2134 boolean allowMocks = Settings.Secure.getInt(mContext.getContentResolver(),
2135 Settings.Secure.ALLOW_MOCK_LOCATION, 0) == 1;
2136 if (!allowMocks) {
2137 throw new SecurityException("Requires ACCESS_MOCK_LOCATION secure setting");
2138 }
2139
2140 if (mContext.checkCallingPermission(ACCESS_MOCK_LOCATION) !=
2141 PackageManager.PERMISSION_GRANTED) {
2142 throw new SecurityException("Requires ACCESS_MOCK_LOCATION permission");
Nick Pellye0fd6932012-07-11 10:26:13 -07002143 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002144 }
2145
Nick Pellye0fd6932012-07-11 10:26:13 -07002146 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002147 public void addTestProvider(String name, ProviderProperties properties) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002148 checkMockPermissionsSafe();
2149
Mike Lockwooda4903f22010-02-17 06:42:23 -05002150 if (LocationManager.PASSIVE_PROVIDER.equals(name)) {
2151 throw new IllegalArgumentException("Cannot mock the passive location provider");
2152 }
2153
Mike Lockwood86328a92009-10-23 08:38:25 -04002154 long identity = Binder.clearCallingIdentity();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002155 synchronized (mLock) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002156 MockProvider provider = new MockProvider(name, this, properties);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07002157 // remove the real provider if we are replacing GPS or network provider
2158 if (LocationManager.GPS_PROVIDER.equals(name)
Nick Pelly1332b532012-08-21 16:25:47 -07002159 || LocationManager.NETWORK_PROVIDER.equals(name)
2160 || LocationManager.FUSED_PROVIDER.equals(name)) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05002161 LocationProviderInterface p = mProvidersByName.get(name);
2162 if (p != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002163 removeProviderLocked(p);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07002164 }
2165 }
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04002166 if (mProvidersByName.get(name) != null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002167 throw new IllegalArgumentException("Provider \"" + name + "\" already exists");
2168 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002169 addProviderLocked(provider);
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002170 mMockProviders.put(name, provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002171 mLastLocation.put(name, null);
David Christie1b9b7b12013-04-15 15:31:11 -07002172 mLastLocationCoarseInterval.put(name, null);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002173 updateProvidersLocked();
2174 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002175 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002176 }
2177
Nick Pellye0fd6932012-07-11 10:26:13 -07002178 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002179 public void removeTestProvider(String provider) {
2180 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002181 synchronized (mLock) {
You Kima6d0b6f2012-10-28 03:58:44 +09002182 MockProvider mockProvider = mMockProviders.remove(provider);
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002183 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002184 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2185 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002186 long identity = Binder.clearCallingIdentity();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002187 removeProviderLocked(mProvidersByName.get(provider));
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002188
2189 // reinstate real provider if available
2190 LocationProviderInterface realProvider = mRealProviders.get(provider);
2191 if (realProvider != null) {
2192 addProviderLocked(realProvider);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07002193 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002194 mLastLocation.put(provider, null);
David Christie1b9b7b12013-04-15 15:31:11 -07002195 mLastLocationCoarseInterval.put(provider, null);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002196 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002197 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002198 }
2199 }
2200
Nick Pellye0fd6932012-07-11 10:26:13 -07002201 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002202 public void setTestProviderLocation(String provider, Location loc) {
2203 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002204 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002205 MockProvider mockProvider = mMockProviders.get(provider);
2206 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002207 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2208 }
Mike Lockwood95427cd2009-05-07 13:27:54 -04002209 // clear calling identity so INSTALL_LOCATION_PROVIDER permission is not required
2210 long identity = Binder.clearCallingIdentity();
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002211 mockProvider.setLocation(loc);
Mike Lockwood95427cd2009-05-07 13:27:54 -04002212 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002213 }
2214 }
2215
Nick Pellye0fd6932012-07-11 10:26:13 -07002216 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002217 public void clearTestProviderLocation(String provider) {
2218 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002219 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002220 MockProvider mockProvider = mMockProviders.get(provider);
2221 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002222 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2223 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002224 mockProvider.clearLocation();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002225 }
2226 }
2227
Nick Pellye0fd6932012-07-11 10:26:13 -07002228 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002229 public void setTestProviderEnabled(String provider, boolean enabled) {
2230 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002231 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002232 MockProvider mockProvider = mMockProviders.get(provider);
2233 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002234 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2235 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002236 long identity = Binder.clearCallingIdentity();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002237 if (enabled) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002238 mockProvider.enable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002239 mEnabledProviders.add(provider);
2240 mDisabledProviders.remove(provider);
2241 } else {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002242 mockProvider.disable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002243 mEnabledProviders.remove(provider);
2244 mDisabledProviders.add(provider);
2245 }
2246 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002247 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002248 }
2249 }
2250
Nick Pellye0fd6932012-07-11 10:26:13 -07002251 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002252 public void clearTestProviderEnabled(String provider) {
2253 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002254 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002255 MockProvider mockProvider = mMockProviders.get(provider);
2256 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002257 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2258 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002259 long identity = Binder.clearCallingIdentity();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002260 mEnabledProviders.remove(provider);
2261 mDisabledProviders.remove(provider);
2262 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002263 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002264 }
2265 }
2266
Nick Pellye0fd6932012-07-11 10:26:13 -07002267 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002268 public void setTestProviderStatus(String provider, int status, Bundle extras, long updateTime) {
2269 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002270 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002271 MockProvider mockProvider = mMockProviders.get(provider);
2272 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002273 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2274 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002275 mockProvider.setStatus(status, extras, updateTime);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002276 }
2277 }
2278
Nick Pellye0fd6932012-07-11 10:26:13 -07002279 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002280 public void clearTestProviderStatus(String provider) {
2281 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002282 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002283 MockProvider mockProvider = mMockProviders.get(provider);
2284 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002285 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2286 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002287 mockProvider.clearStatus();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002288 }
2289 }
2290
2291 private void log(String log) {
2292 if (Log.isLoggable(TAG, Log.VERBOSE)) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08002293 Slog.d(TAG, log);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002294 }
2295 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002296
2297 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002298 protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) {
2299 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
2300 != PackageManager.PERMISSION_GRANTED) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -04002301 pw.println("Permission Denial: can't dump LocationManagerService from from pid="
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002302 + Binder.getCallingPid()
2303 + ", uid=" + Binder.getCallingUid());
2304 return;
2305 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002306
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002307 synchronized (mLock) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002308 pw.println("Current Location Manager state:");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002309 pw.println(" Location Listeners:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002310 for (Receiver receiver : mReceivers.values()) {
2311 pw.println(" " + receiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002312 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002313 pw.println(" Records by Provider:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002314 for (Map.Entry<String, ArrayList<UpdateRecord>> entry : mRecordsByProvider.entrySet()) {
2315 pw.println(" " + entry.getKey() + ":");
2316 for (UpdateRecord record : entry.getValue()) {
2317 pw.println(" " + record);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002318 }
2319 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002320 pw.println(" Last Known Locations:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002321 for (Map.Entry<String, Location> entry : mLastLocation.entrySet()) {
2322 String provider = entry.getKey();
2323 Location location = entry.getValue();
2324 pw.println(" " + provider + ": " + location);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002325 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002326
David Christie1b9b7b12013-04-15 15:31:11 -07002327 pw.println(" Last Known Locations Coarse Intervals:");
2328 for (Map.Entry<String, Location> entry : mLastLocationCoarseInterval.entrySet()) {
2329 String provider = entry.getKey();
2330 Location location = entry.getValue();
2331 pw.println(" " + provider + ": " + location);
2332 }
2333
Nick Pellye0fd6932012-07-11 10:26:13 -07002334 mGeofenceManager.dump(pw);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002335
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002336 if (mEnabledProviders.size() > 0) {
2337 pw.println(" Enabled Providers:");
2338 for (String i : mEnabledProviders) {
2339 pw.println(" " + i);
2340 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002341
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002342 }
2343 if (mDisabledProviders.size() > 0) {
2344 pw.println(" Disabled Providers:");
2345 for (String i : mDisabledProviders) {
2346 pw.println(" " + i);
2347 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002348 }
Nick Pelly4035f5a2012-08-17 14:43:49 -07002349 pw.append(" ");
2350 mBlacklist.dump(pw);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002351 if (mMockProviders.size() > 0) {
2352 pw.println(" Mock Providers:");
2353 for (Map.Entry<String, MockProvider> i : mMockProviders.entrySet()) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002354 i.getValue().dump(pw, " ");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002355 }
2356 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002357
Nick Pelly74fa7ea2012-08-13 19:36:38 -07002358 pw.append(" fudger: ");
2359 mLocationFudger.dump(fd, pw, args);
2360
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002361 if (args.length > 0 && "short".equals(args[0])) {
2362 return;
2363 }
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002364 for (LocationProviderInterface provider: mProviders) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002365 pw.print(provider.getName() + " Internal State");
2366 if (provider instanceof LocationProviderProxy) {
2367 LocationProviderProxy proxy = (LocationProviderProxy) provider;
2368 pw.print(" (" + proxy.getConnectedPackageName() + ")");
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002369 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002370 pw.println(":");
2371 provider.dump(fd, pw, args);
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002372 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002373 }
2374 }
2375}