blob: f77363c35bb04659cbe84258f14b7d949fd9a2c6 [file] [log] [blame]
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2007 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server;
18
Dianne Hackborna06de0f2012-12-11 16:34:47 -080019import android.app.AppOpsManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080020import android.app.PendingIntent;
Victoria Lease38389b62012-09-30 11:44:22 -070021import android.content.BroadcastReceiver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080022import android.content.ContentResolver;
23import android.content.Context;
24import android.content.Intent;
Victoria Lease38389b62012-09-30 11:44:22 -070025import android.content.IntentFilter;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070026import android.content.pm.ApplicationInfo;
Jeff Hamiltonfbadb692012-10-05 14:21:58 -050027import android.content.pm.PackageInfo;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080028import android.content.pm.PackageManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070029import android.content.pm.PackageManager.NameNotFoundException;
Jeff Hamiltonfbadb692012-10-05 14:21:58 -050030import android.content.pm.ResolveInfo;
31import android.content.pm.Signature;
Mike Lockwood628fd6d2010-01-25 22:46:13 -050032import android.content.res.Resources;
Brian Muramatsubb95cb92012-08-29 10:43:21 -070033import android.database.ContentObserver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080034import android.location.Address;
Mike Lockwood03ca2162010-04-01 08:10:09 -070035import android.location.Criteria;
Mike Lockwood34901402010-01-04 12:14:21 -050036import android.location.GeocoderParams;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070037import android.location.Geofence;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080038import android.location.IGpsStatusListener;
Mike Lockwood15e3d0f2009-05-01 07:53:28 -040039import android.location.IGpsStatusProvider;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080040import android.location.ILocationListener;
41import android.location.ILocationManager;
Danke Xie22d1f9f2009-08-18 18:28:45 -040042import android.location.INetInitiatedListener;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080043import android.location.Location;
44import android.location.LocationManager;
45import android.location.LocationProvider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070046import android.location.LocationRequest;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080047import android.os.Binder;
48import android.os.Bundle;
49import android.os.Handler;
50import android.os.IBinder;
Mike Lockwood3d12b512009-04-21 23:25:35 -070051import android.os.Looper;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080052import android.os.Message;
53import android.os.PowerManager;
Mike Lockwoode932f7f2009-04-06 10:51:26 -070054import android.os.Process;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080055import android.os.RemoteException;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070056import android.os.SystemClock;
Dianne Hackborn5ac72a22012-08-29 18:32:08 -070057import android.os.UserHandle;
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -070058import android.os.WorkSource;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080059import android.provider.Settings;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080060import android.util.Log;
Joe Onorato8a9b2202010-02-26 18:56:32 -080061import android.util.Slog;
Mike Lockwoode97ae402010-09-29 15:23:46 -040062import com.android.internal.content.PackageMonitor;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070063import com.android.internal.location.ProviderProperties;
64import com.android.internal.location.ProviderRequest;
Dianne Hackborn8d044e82013-04-30 17:24:15 -070065import com.android.internal.os.BackgroundThread;
destradaa1af4b022013-07-12 15:43:36 -070066import com.android.server.location.FlpHardwareProvider;
67import com.android.server.location.FusedProxy;
Mike Lockwood43e33f22010-03-26 10:41:48 -040068import com.android.server.location.GeocoderProxy;
Jaikumar Ganesh8ce470d2013-04-03 12:22:18 -070069import com.android.server.location.GeofenceProxy;
Nick Pellye0fd6932012-07-11 10:26:13 -070070import com.android.server.location.GeofenceManager;
Mike Lockwood43e33f22010-03-26 10:41:48 -040071import com.android.server.location.GpsLocationProvider;
Nick Pelly4035f5a2012-08-17 14:43:49 -070072import com.android.server.location.LocationBlacklist;
Nick Pelly74fa7ea2012-08-13 19:36:38 -070073import com.android.server.location.LocationFudger;
Mike Lockwood43e33f22010-03-26 10:41:48 -040074import com.android.server.location.LocationProviderInterface;
75import com.android.server.location.LocationProviderProxy;
76import com.android.server.location.MockProvider;
77import com.android.server.location.PassiveProvider;
78
79import java.io.FileDescriptor;
80import java.io.PrintWriter;
81import java.util.ArrayList;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070082import java.util.Arrays;
Mike Lockwood43e33f22010-03-26 10:41:48 -040083import java.util.HashMap;
84import java.util.HashSet;
85import java.util.List;
86import java.util.Map;
Mike Lockwood43e33f22010-03-26 10:41:48 -040087import java.util.Set;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080088
89/**
90 * The service class that manages LocationProviders and issues location
91 * updates and alerts.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080092 */
Victoria Lease5cd731a2012-12-19 15:04:21 -080093public class LocationManagerService extends ILocationManager.Stub {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080094 private static final String TAG = "LocationManagerService";
JP Abgrallf79811e72013-02-01 18:45:05 -080095 public static final boolean D = Log.isLoggable(TAG, Log.DEBUG);
Nick Pelly6fa9ad42012-07-16 12:18:23 -070096
97 private static final String WAKELOCK_KEY = TAG;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080098
Victoria Lease37425c32012-10-16 16:08:48 -070099 // Location resolution level: no location data whatsoever
100 private static final int RESOLUTION_LEVEL_NONE = 0;
101 // Location resolution level: coarse location data only
102 private static final int RESOLUTION_LEVEL_COARSE = 1;
103 // Location resolution level: fine location data
104 private static final int RESOLUTION_LEVEL_FINE = 2;
105
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800106 private static final String ACCESS_MOCK_LOCATION =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700107 android.Manifest.permission.ACCESS_MOCK_LOCATION;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800108 private static final String ACCESS_LOCATION_EXTRA_COMMANDS =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700109 android.Manifest.permission.ACCESS_LOCATION_EXTRA_COMMANDS;
Mike Lockwood275555c2009-05-01 11:30:34 -0400110 private static final String INSTALL_LOCATION_PROVIDER =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700111 android.Manifest.permission.INSTALL_LOCATION_PROVIDER;
112
113 private static final String NETWORK_LOCATION_SERVICE_ACTION =
Stan Chesnutt39062dd2013-07-22 14:33:30 -0700114 "com.android.location.service.v3.NetworkLocationProvider";
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700115 private static final String FUSED_LOCATION_SERVICE_ACTION =
116 "com.android.location.service.FusedLocationProvider";
117
118 private static final int MSG_LOCATION_CHANGED = 1;
119
David Christie1b9b7b12013-04-15 15:31:11 -0700120 private static final long NANOS_PER_MILLI = 1000000L;
121
David Christie0b837452013-07-29 16:02:13 -0700122 // The maximum interval a location request can have and still be considered "high power".
123 private static final long HIGH_POWER_INTERVAL_MS = 5 * 60 * 1000;
124
Nick Pellyf1be6862012-05-15 10:53:42 -0700125 // Location Providers may sometimes deliver location updates
126 // slightly faster that requested - provide grace period so
127 // we don't unnecessarily filter events that are otherwise on
128 // time
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700129 private static final int MAX_PROVIDER_SCHEDULING_JITTER_MS = 100;
Nick Pellyf1be6862012-05-15 10:53:42 -0700130
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700131 private static final LocationRequest DEFAULT_LOCATION_REQUEST = new LocationRequest();
132
133 private final Context mContext;
Dianne Hackborna06de0f2012-12-11 16:34:47 -0800134 private final AppOpsManager mAppOps;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700135
136 // used internally for synchronization
137 private final Object mLock = new Object();
138
Victoria Lease5cd731a2012-12-19 15:04:21 -0800139 // --- fields below are final after systemReady() ---
Nick Pelly74fa7ea2012-08-13 19:36:38 -0700140 private LocationFudger mLocationFudger;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700141 private GeofenceManager mGeofenceManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700142 private PackageManager mPackageManager;
Victoria Lease0aa28602013-05-29 15:28:26 -0700143 private PowerManager mPowerManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700144 private GeocoderProxy mGeocodeProvider;
145 private IGpsStatusProvider mGpsStatusProvider;
146 private INetInitiatedListener mNetInitiatedListener;
147 private LocationWorkerHandler mLocationHandler;
Nick Pelly4035f5a2012-08-17 14:43:49 -0700148 private PassiveProvider mPassiveProvider; // track passive provider for special cases
149 private LocationBlacklist mBlacklist;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700150
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700151 // --- fields below are protected by mLock ---
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800152 // Set of providers that are explicitly enabled
153 private final Set<String> mEnabledProviders = new HashSet<String>();
154
155 // Set of providers that are explicitly disabled
156 private final Set<String> mDisabledProviders = new HashSet<String>();
157
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700158 // Mock (test) providers
159 private final HashMap<String, MockProvider> mMockProviders =
160 new HashMap<String, MockProvider>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800161
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700162 // all receivers
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400163 private final HashMap<Object, Receiver> mReceivers = new HashMap<Object, Receiver>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800164
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700165 // currently installed providers (with mocks replacing real providers)
Mike Lockwoodd03ff942010-02-09 08:46:14 -0500166 private final ArrayList<LocationProviderInterface> mProviders =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700167 new ArrayList<LocationProviderInterface>();
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400168
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700169 // real providers, saved here when mocked out
170 private final HashMap<String, LocationProviderInterface> mRealProviders =
171 new HashMap<String, LocationProviderInterface>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800172
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700173 // mapping from provider name to provider
174 private final HashMap<String, LocationProviderInterface> mProvidersByName =
175 new HashMap<String, LocationProviderInterface>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800176
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700177 // mapping from provider name to all its UpdateRecords
178 private final HashMap<String, ArrayList<UpdateRecord>> mRecordsByProvider =
179 new HashMap<String, ArrayList<UpdateRecord>>();
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -0700180
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700181 // mapping from provider name to last known location
182 private final HashMap<String, Location> mLastLocation = new HashMap<String, Location>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800183
David Christie1b9b7b12013-04-15 15:31:11 -0700184 // same as mLastLocation, but is not updated faster than LocationFudger.FASTEST_INTERVAL_MS.
185 // locations stored here are not fudged for coarse permissions.
186 private final HashMap<String, Location> mLastLocationCoarseInterval =
187 new HashMap<String, Location>();
188
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700189 // all providers that operate over proxy, for authorizing incoming location
190 private final ArrayList<LocationProviderProxy> mProxyProviders =
191 new ArrayList<LocationProviderProxy>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800192
Victoria Lease38389b62012-09-30 11:44:22 -0700193 // current active user on the device - other users are denied location data
194 private int mCurrentUserId = UserHandle.USER_OWNER;
195
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700196 public LocationManagerService(Context context) {
197 super();
198 mContext = context;
Dianne Hackborna06de0f2012-12-11 16:34:47 -0800199 mAppOps = (AppOpsManager)context.getSystemService(Context.APP_OPS_SERVICE);
The Android Open Source Project4df24232009-03-05 14:34:35 -0800200
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700201 if (D) Log.d(TAG, "Constructed");
202
203 // most startup is deferred until systemReady()
204 }
205
Svetoslav Ganova0027152013-06-25 14:59:53 -0700206 public void systemRunning() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700207 synchronized (mLock) {
Victoria Lease5cd731a2012-12-19 15:04:21 -0800208 if (D) Log.d(TAG, "systemReady()");
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700209
Victoria Lease5cd731a2012-12-19 15:04:21 -0800210 // fetch package manager
211 mPackageManager = mContext.getPackageManager();
212
Victoria Lease0aa28602013-05-29 15:28:26 -0700213 // fetch power manager
214 mPowerManager = (PowerManager) mContext.getSystemService(Context.POWER_SERVICE);
Victoria Lease5cd731a2012-12-19 15:04:21 -0800215
216 // prepare worker thread
Dianne Hackborn8d044e82013-04-30 17:24:15 -0700217 mLocationHandler = new LocationWorkerHandler(BackgroundThread.get().getLooper());
Victoria Lease5cd731a2012-12-19 15:04:21 -0800218
219 // prepare mLocationHandler's dependents
220 mLocationFudger = new LocationFudger(mContext, mLocationHandler);
221 mBlacklist = new LocationBlacklist(mContext, mLocationHandler);
222 mBlacklist.init();
223 mGeofenceManager = new GeofenceManager(mContext, mBlacklist);
224
Dianne Hackbornc2293022013-02-06 23:14:49 -0800225 // Monitor for app ops mode changes.
226 AppOpsManager.Callback callback = new AppOpsManager.Callback() {
227 public void opChanged(int op, String packageName) {
228 synchronized (mLock) {
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700229 for (Receiver receiver : mReceivers.values()) {
230 receiver.updateMonitoring(true);
231 }
Dianne Hackbornc2293022013-02-06 23:14:49 -0800232 applyAllProviderRequirementsLocked();
233 }
234 }
235 };
236 mAppOps.startWatchingMode(AppOpsManager.OP_COARSE_LOCATION, null, callback);
237
Victoria Lease5cd731a2012-12-19 15:04:21 -0800238 // prepare providers
239 loadProvidersLocked();
240 updateProvidersLocked();
241 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700242
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700243 // listen for settings changes
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700244 mContext.getContentResolver().registerContentObserver(
Laurent Tu75defb62012-11-01 16:21:52 -0700245 Settings.Secure.getUriFor(Settings.Secure.LOCATION_PROVIDERS_ALLOWED), true,
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700246 new ContentObserver(mLocationHandler) {
Victoria Lease5cd731a2012-12-19 15:04:21 -0800247 @Override
248 public void onChange(boolean selfChange) {
249 synchronized (mLock) {
250 updateProvidersLocked();
251 }
252 }
253 }, UserHandle.USER_ALL);
254 mPackageMonitor.register(mContext, mLocationHandler.getLooper(), true);
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700255
Victoria Lease38389b62012-09-30 11:44:22 -0700256 // listen for user change
257 IntentFilter intentFilter = new IntentFilter();
258 intentFilter.addAction(Intent.ACTION_USER_SWITCHED);
259
260 mContext.registerReceiverAsUser(new BroadcastReceiver() {
261 @Override
262 public void onReceive(Context context, Intent intent) {
263 String action = intent.getAction();
264 if (Intent.ACTION_USER_SWITCHED.equals(action)) {
265 switchUser(intent.getIntExtra(Intent.EXTRA_USER_HANDLE, 0));
266 }
267 }
Victoria Lease5cd731a2012-12-19 15:04:21 -0800268 }, UserHandle.ALL, intentFilter, null, mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700269 }
270
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500271 private void ensureFallbackFusedProviderPresentLocked(ArrayList<String> pkgs) {
272 PackageManager pm = mContext.getPackageManager();
273 String systemPackageName = mContext.getPackageName();
274 ArrayList<HashSet<Signature>> sigSets = ServiceWatcher.getSignatureSets(mContext, pkgs);
275
276 List<ResolveInfo> rInfos = pm.queryIntentServicesAsUser(
277 new Intent(FUSED_LOCATION_SERVICE_ACTION),
278 PackageManager.GET_META_DATA, mCurrentUserId);
279 for (ResolveInfo rInfo : rInfos) {
280 String packageName = rInfo.serviceInfo.packageName;
281
282 // Check that the signature is in the list of supported sigs. If it's not in
283 // this list the standard provider binding logic won't bind to it.
284 try {
285 PackageInfo pInfo;
286 pInfo = pm.getPackageInfo(packageName, PackageManager.GET_SIGNATURES);
287 if (!ServiceWatcher.isSignatureMatch(pInfo.signatures, sigSets)) {
288 Log.w(TAG, packageName + " resolves service " + FUSED_LOCATION_SERVICE_ACTION +
289 ", but has wrong signature, ignoring");
290 continue;
291 }
292 } catch (NameNotFoundException e) {
293 Log.e(TAG, "missing package: " + packageName);
294 continue;
295 }
296
297 // Get the version info
298 if (rInfo.serviceInfo.metaData == null) {
299 Log.w(TAG, "Found fused provider without metadata: " + packageName);
300 continue;
301 }
302
303 int version = rInfo.serviceInfo.metaData.getInt(
304 ServiceWatcher.EXTRA_SERVICE_VERSION, -1);
305 if (version == 0) {
306 // This should be the fallback fused location provider.
307
308 // Make sure it's in the system partition.
309 if ((rInfo.serviceInfo.applicationInfo.flags & ApplicationInfo.FLAG_SYSTEM) == 0) {
310 if (D) Log.d(TAG, "Fallback candidate not in /system: " + packageName);
311 continue;
312 }
313
314 // Check that the fallback is signed the same as the OS
315 // as a proxy for coreApp="true"
316 if (pm.checkSignatures(systemPackageName, packageName)
317 != PackageManager.SIGNATURE_MATCH) {
318 if (D) Log.d(TAG, "Fallback candidate not signed the same as system: "
319 + packageName);
320 continue;
321 }
322
323 // Found a valid fallback.
324 if (D) Log.d(TAG, "Found fallback provider: " + packageName);
325 return;
326 } else {
327 if (D) Log.d(TAG, "Fallback candidate not version 0: " + packageName);
328 }
329 }
330
331 throw new IllegalStateException("Unable to find a fused location provider that is in the "
332 + "system partition with version 0 and signed with the platform certificate. "
333 + "Such a package is needed to provide a default fused location provider in the "
334 + "event that no other fused location provider has been installed or is currently "
335 + "available. For example, coreOnly boot mode when decrypting the data "
336 + "partition. The fallback must also be marked coreApp=\"true\" in the manifest");
337 }
338
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700339 private void loadProvidersLocked() {
Victoria Lease5c24fd02012-10-01 11:00:50 -0700340 // create a passive location provider, which is always enabled
341 PassiveProvider passiveProvider = new PassiveProvider(this);
342 addProviderLocked(passiveProvider);
343 mEnabledProviders.add(passiveProvider.getName());
344 mPassiveProvider = passiveProvider;
Jaikumar Ganesh8ce470d2013-04-03 12:22:18 -0700345 // Create a gps location provider
346 GpsLocationProvider gpsProvider = new GpsLocationProvider(mContext, this,
347 mLocationHandler.getLooper());
Victoria Lease5c24fd02012-10-01 11:00:50 -0700348
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700349 if (GpsLocationProvider.isSupported()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700350 mGpsStatusProvider = gpsProvider.getGpsStatusProvider();
351 mNetInitiatedListener = gpsProvider.getNetInitiatedListener();
352 addProviderLocked(gpsProvider);
353 mRealProviders.put(LocationManager.GPS_PROVIDER, gpsProvider);
354 }
355
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700356 /*
357 Load package name(s) containing location provider support.
358 These packages can contain services implementing location providers:
359 Geocoder Provider, Network Location Provider, and
360 Fused Location Provider. They will each be searched for
361 service components implementing these providers.
362 The location framework also has support for installation
363 of new location providers at run-time. The new package does not
364 have to be explicitly listed here, however it must have a signature
365 that matches the signature of at least one package on this list.
366 */
367 Resources resources = mContext.getResources();
368 ArrayList<String> providerPackageNames = new ArrayList<String>();
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500369 String[] pkgs = resources.getStringArray(
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700370 com.android.internal.R.array.config_locationProviderPackageNames);
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500371 if (D) Log.d(TAG, "certificates for location providers pulled from: " +
372 Arrays.toString(pkgs));
373 if (pkgs != null) providerPackageNames.addAll(Arrays.asList(pkgs));
374
375 ensureFallbackFusedProviderPresentLocked(providerPackageNames);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700376
377 // bind to network provider
378 LocationProviderProxy networkProvider = LocationProviderProxy.createAndBind(
379 mContext,
380 LocationManager.NETWORK_PROVIDER,
381 NETWORK_LOCATION_SERVICE_ACTION,
Zhentao Sunc5fc9982013-04-17 17:47:53 -0700382 com.android.internal.R.bool.config_enableNetworkLocationOverlay,
383 com.android.internal.R.string.config_networkLocationProviderPackageName,
384 com.android.internal.R.array.config_locationProviderPackageNames,
385 mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700386 if (networkProvider != null) {
387 mRealProviders.put(LocationManager.NETWORK_PROVIDER, networkProvider);
388 mProxyProviders.add(networkProvider);
389 addProviderLocked(networkProvider);
390 } else {
391 Slog.w(TAG, "no network location provider found");
392 }
393
394 // bind to fused provider
395 LocationProviderProxy fusedLocationProvider = LocationProviderProxy.createAndBind(
396 mContext,
397 LocationManager.FUSED_PROVIDER,
398 FUSED_LOCATION_SERVICE_ACTION,
Zhentao Sunc5fc9982013-04-17 17:47:53 -0700399 com.android.internal.R.bool.config_enableFusedLocationOverlay,
400 com.android.internal.R.string.config_fusedLocationProviderPackageName,
401 com.android.internal.R.array.config_locationProviderPackageNames,
402 mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700403 if (fusedLocationProvider != null) {
404 addProviderLocked(fusedLocationProvider);
405 mProxyProviders.add(fusedLocationProvider);
406 mEnabledProviders.add(fusedLocationProvider.getName());
Kenny Rootc3575182012-10-09 12:44:40 -0700407 mRealProviders.put(LocationManager.FUSED_PROVIDER, fusedLocationProvider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700408 } else {
409 Slog.e(TAG, "no fused location provider found",
410 new IllegalStateException("Location service needs a fused location provider"));
411 }
412
413 // bind to geocoder provider
Zhentao Sunc5fc9982013-04-17 17:47:53 -0700414 mGeocodeProvider = GeocoderProxy.createAndBind(mContext,
415 com.android.internal.R.bool.config_enableGeocoderOverlay,
416 com.android.internal.R.string.config_geocoderProviderPackageName,
417 com.android.internal.R.array.config_locationProviderPackageNames,
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800418 mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700419 if (mGeocodeProvider == null) {
420 Slog.e(TAG, "no geocoder provider found");
421 }
Jaikumar Ganesh8ce470d2013-04-03 12:22:18 -0700422
423 // bind to geofence provider
Zhentao Sunc5fc9982013-04-17 17:47:53 -0700424 GeofenceProxy provider = GeofenceProxy.createAndBind(mContext,
425 com.android.internal.R.bool.config_enableGeofenceOverlay,
426 com.android.internal.R.string.config_geofenceProviderPackageName,
427 com.android.internal.R.array.config_locationProviderPackageNames,
428 mLocationHandler,
429 gpsProvider.getGpsGeofenceProxy());
Jaikumar Ganesh8ce470d2013-04-03 12:22:18 -0700430 if (provider == null) {
431 Slog.e(TAG, "no geofence provider found");
432 }
433
destradaa1af4b022013-07-12 15:43:36 -0700434 // bind to fused provider
435 // TODO: [GeofenceIntegration] bind #getGeofenceHardware() with the GeofenceProxy
436 FlpHardwareProvider flpHardwareProvider = FlpHardwareProvider.getInstance(mContext);
437 FusedProxy fusedProxy = FusedProxy.createAndBind(
438 mContext,
439 mLocationHandler,
destradaa64be0c62013-08-09 15:01:49 -0700440 flpHardwareProvider.getLocationHardware(),
441 com.android.internal.R.bool.config_enableFusedLocationOverlay,
442 com.android.internal.R.string.config_fusedLocationProviderPackageName,
443 com.android.internal.R.array.config_locationProviderPackageNames);
destradaa1af4b022013-07-12 15:43:36 -0700444
445 if(fusedProxy == null) {
446 Slog.e(TAG, "No FusedProvider found.");
447 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700448 }
Mike Lockwood9637d472009-04-02 21:41:57 -0700449
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800450 /**
Victoria Lease38389b62012-09-30 11:44:22 -0700451 * Called when the device's active user changes.
452 * @param userId the new active user's UserId
453 */
454 private void switchUser(int userId) {
Victoria Lease83762d22012-10-03 13:51:17 -0700455 mBlacklist.switchUser(userId);
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800456 mLocationHandler.removeMessages(MSG_LOCATION_CHANGED);
Victoria Lease38389b62012-09-30 11:44:22 -0700457 synchronized (mLock) {
Victoria Leaseb711d572012-10-02 13:14:11 -0700458 mLastLocation.clear();
David Christie1b9b7b12013-04-15 15:31:11 -0700459 mLastLocationCoarseInterval.clear();
Victoria Leaseb711d572012-10-02 13:14:11 -0700460 for (LocationProviderInterface p : mProviders) {
461 updateProviderListenersLocked(p.getName(), false, mCurrentUserId);
Victoria Leaseb711d572012-10-02 13:14:11 -0700462 }
Victoria Lease38389b62012-09-30 11:44:22 -0700463 mCurrentUserId = userId;
Victoria Leaseb711d572012-10-02 13:14:11 -0700464 updateProvidersLocked();
Victoria Lease38389b62012-09-30 11:44:22 -0700465 }
466 }
467
468 /**
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800469 * A wrapper class holding either an ILocationListener or a PendingIntent to receive
470 * location updates.
471 */
Mike Lockwood48f17512009-04-23 09:12:08 -0700472 private final class Receiver implements IBinder.DeathRecipient, PendingIntent.OnFinished {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700473 final int mUid; // uid of receiver
474 final int mPid; // pid of receiver
475 final String mPackageName; // package name of receiver
Victoria Lease37425c32012-10-16 16:08:48 -0700476 final int mAllowedResolutionLevel; // resolution level allowed to receiver
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700477
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800478 final ILocationListener mListener;
479 final PendingIntent mPendingIntent;
David Christie82edc9b2013-07-19 11:31:42 -0700480 final WorkSource mWorkSource; // WorkSource for battery blame, or null to assign to caller.
David Christie40e57822013-07-30 11:36:48 -0700481 final boolean mHideFromAppOps; // True if AppOps should not monitor this receiver.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800482 final Object mKey;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700483
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400484 final HashMap<String,UpdateRecord> mUpdateRecords = new HashMap<String,UpdateRecord>();
Nick Pellyf1be6862012-05-15 10:53:42 -0700485
David Christie0b837452013-07-29 16:02:13 -0700486 // True if app ops has started monitoring this receiver for locations.
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700487 boolean mOpMonitoring;
David Christie0b837452013-07-29 16:02:13 -0700488 // True if app ops has started monitoring this receiver for high power (gps) locations.
489 boolean mOpHighPowerMonitoring;
Mike Lockwood48f17512009-04-23 09:12:08 -0700490 int mPendingBroadcasts;
Victoria Lease0aa28602013-05-29 15:28:26 -0700491 PowerManager.WakeLock mWakeLock;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800492
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700493 Receiver(ILocationListener listener, PendingIntent intent, int pid, int uid,
David Christie40e57822013-07-30 11:36:48 -0700494 String packageName, WorkSource workSource, boolean hideFromAppOps) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800495 mListener = listener;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800496 mPendingIntent = intent;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700497 if (listener != null) {
498 mKey = listener.asBinder();
499 } else {
500 mKey = intent;
501 }
Victoria Lease37425c32012-10-16 16:08:48 -0700502 mAllowedResolutionLevel = getAllowedResolutionLevel(pid, uid);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700503 mUid = uid;
504 mPid = pid;
505 mPackageName = packageName;
David Christie82edc9b2013-07-19 11:31:42 -0700506 if (workSource != null && workSource.size() <= 0) {
507 workSource = null;
508 }
509 mWorkSource = workSource;
David Christie40e57822013-07-30 11:36:48 -0700510 mHideFromAppOps = hideFromAppOps;
Victoria Lease0aa28602013-05-29 15:28:26 -0700511
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700512 updateMonitoring(true);
513
Victoria Lease0aa28602013-05-29 15:28:26 -0700514 // construct/configure wakelock
515 mWakeLock = mPowerManager.newWakeLock(PowerManager.PARTIAL_WAKE_LOCK, WAKELOCK_KEY);
David Christie82edc9b2013-07-19 11:31:42 -0700516 if (workSource == null) {
517 workSource = new WorkSource(mUid, mPackageName);
518 }
519 mWakeLock.setWorkSource(workSource);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800520 }
521
522 @Override
523 public boolean equals(Object otherObj) {
524 if (otherObj instanceof Receiver) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700525 return mKey.equals(((Receiver)otherObj).mKey);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800526 }
527 return false;
528 }
529
530 @Override
531 public int hashCode() {
532 return mKey.hashCode();
533 }
Mike Lockwood3681f262009-05-12 10:52:03 -0400534
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800535 @Override
536 public String toString() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700537 StringBuilder s = new StringBuilder();
538 s.append("Reciever[");
539 s.append(Integer.toHexString(System.identityHashCode(this)));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800540 if (mListener != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700541 s.append(" listener");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800542 } else {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700543 s.append(" intent");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800544 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700545 for (String p : mUpdateRecords.keySet()) {
546 s.append(" ").append(mUpdateRecords.get(p).toString());
547 }
548 s.append("]");
549 return s.toString();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800550 }
551
David Christie15b31912013-08-13 15:54:32 -0700552 /**
553 * Update AppOp monitoring for this receiver.
554 *
555 * @param allow If true receiver is currently active, if false it's been removed.
556 */
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700557 public void updateMonitoring(boolean allow) {
David Christie40e57822013-07-30 11:36:48 -0700558 if (mHideFromAppOps) {
559 return;
560 }
561
David Christie15b31912013-08-13 15:54:32 -0700562 boolean requestingLocation = false;
563 boolean requestingHighPowerLocation = false;
564 if (allow) {
565 // See if receiver has any enabled update records. Also note if any update records
566 // are high power (has a high power provider with an interval under a threshold).
567 for (UpdateRecord updateRecord : mUpdateRecords.values()) {
568 if (isAllowedByCurrentUserSettingsLocked(updateRecord.mProvider)) {
569 requestingLocation = true;
570 LocationProviderInterface locationProvider
571 = mProvidersByName.get(updateRecord.mProvider);
572 ProviderProperties properties = locationProvider != null
573 ? locationProvider.getProperties() : null;
574 if (properties != null
575 && properties.mPowerRequirement == Criteria.POWER_HIGH
576 && updateRecord.mRequest.getInterval() < HIGH_POWER_INTERVAL_MS) {
577 requestingHighPowerLocation = true;
578 break;
579 }
580 }
581 }
582 }
583
David Christie0b837452013-07-29 16:02:13 -0700584 // First update monitoring of any location request (including high power).
David Christie15b31912013-08-13 15:54:32 -0700585 mOpMonitoring = updateMonitoring(
586 requestingLocation,
587 mOpMonitoring,
David Christie0b837452013-07-29 16:02:13 -0700588 AppOpsManager.OP_MONITOR_LOCATION);
589
590 // Now update monitoring of high power requests only.
David Christiec750c1f2013-08-08 12:56:57 -0700591 boolean wasHighPowerMonitoring = mOpHighPowerMonitoring;
David Christie15b31912013-08-13 15:54:32 -0700592 mOpHighPowerMonitoring = updateMonitoring(
593 requestingHighPowerLocation,
594 mOpHighPowerMonitoring,
David Christie0b837452013-07-29 16:02:13 -0700595 AppOpsManager.OP_MONITOR_HIGH_POWER_LOCATION);
David Christiec750c1f2013-08-08 12:56:57 -0700596 if (mOpHighPowerMonitoring != wasHighPowerMonitoring) {
David Christie15b31912013-08-13 15:54:32 -0700597 // Send an intent to notify that a high power request has been added/removed.
David Christiec750c1f2013-08-08 12:56:57 -0700598 Intent intent = new Intent(LocationManager.HIGH_POWER_REQUEST_CHANGE_ACTION);
599 mContext.sendBroadcastAsUser(intent, UserHandle.ALL);
600 }
David Christie0b837452013-07-29 16:02:13 -0700601 }
602
603 /**
604 * Update AppOps monitoring for a single location request and op type.
605 *
606 * @param allowMonitoring True if monitoring is allowed for this request/op.
607 * @param currentlyMonitoring True if AppOps is currently monitoring this request/op.
608 * @param op AppOps code for the op to update.
609 * @return True if monitoring is on for this request/op after updating.
610 */
611 private boolean updateMonitoring(boolean allowMonitoring, boolean currentlyMonitoring,
612 int op) {
613 if (!currentlyMonitoring) {
614 if (allowMonitoring) {
615 return mAppOps.startOpNoThrow(op, mUid, mPackageName)
616 == AppOpsManager.MODE_ALLOWED;
617 }
618 } else {
619 if (!allowMonitoring || mAppOps.checkOpNoThrow(op, mUid, mPackageName)
620 != AppOpsManager.MODE_ALLOWED) {
621 mAppOps.finishOp(op, mUid, mPackageName);
622 return false;
623 }
624 }
625
626 return currentlyMonitoring;
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700627 }
628
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800629 public boolean isListener() {
630 return mListener != null;
631 }
632
633 public boolean isPendingIntent() {
634 return mPendingIntent != null;
635 }
636
637 public ILocationListener getListener() {
638 if (mListener != null) {
639 return mListener;
640 }
641 throw new IllegalStateException("Request for non-existent listener");
642 }
643
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800644 public boolean callStatusChangedLocked(String provider, int status, Bundle extras) {
645 if (mListener != null) {
646 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700647 synchronized (this) {
648 // synchronize to ensure incrementPendingBroadcastsLocked()
649 // is called before decrementPendingBroadcasts()
650 mListener.onStatusChanged(provider, status, extras);
Nick Pellye0fd6932012-07-11 10:26:13 -0700651 // call this after broadcasting so we do not increment
652 // if we throw an exeption.
653 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700654 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800655 } catch (RemoteException e) {
656 return false;
657 }
658 } else {
659 Intent statusChanged = new Intent();
Victoria Lease61ecb022012-11-13 15:12:51 -0800660 statusChanged.putExtras(new Bundle(extras));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800661 statusChanged.putExtra(LocationManager.KEY_STATUS_CHANGED, status);
662 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700663 synchronized (this) {
664 // synchronize to ensure incrementPendingBroadcastsLocked()
665 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700666 mPendingIntent.send(mContext, 0, statusChanged, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700667 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700668 // call this after broadcasting so we do not increment
669 // if we throw an exeption.
670 incrementPendingBroadcastsLocked();
671 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800672 } catch (PendingIntent.CanceledException e) {
673 return false;
674 }
675 }
676 return true;
677 }
678
679 public boolean callLocationChangedLocked(Location location) {
680 if (mListener != null) {
681 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700682 synchronized (this) {
683 // synchronize to ensure incrementPendingBroadcastsLocked()
684 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c5406a2012-11-29 16:18:01 -0800685 mListener.onLocationChanged(new Location(location));
Nick Pellye0fd6932012-07-11 10:26:13 -0700686 // call this after broadcasting so we do not increment
687 // if we throw an exeption.
688 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700689 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800690 } catch (RemoteException e) {
691 return false;
692 }
693 } else {
694 Intent locationChanged = new Intent();
Victoria Lease61ecb022012-11-13 15:12:51 -0800695 locationChanged.putExtra(LocationManager.KEY_LOCATION_CHANGED, new Location(location));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800696 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700697 synchronized (this) {
698 // synchronize to ensure incrementPendingBroadcastsLocked()
699 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700700 mPendingIntent.send(mContext, 0, locationChanged, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700701 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700702 // call this after broadcasting so we do not increment
703 // if we throw an exeption.
704 incrementPendingBroadcastsLocked();
705 }
706 } catch (PendingIntent.CanceledException e) {
707 return false;
708 }
709 }
710 return true;
711 }
712
713 public boolean callProviderEnabledLocked(String provider, boolean enabled) {
David Christie15b31912013-08-13 15:54:32 -0700714 // First update AppOp monitoring.
715 // An app may get/lose location access as providers are enabled/disabled.
716 updateMonitoring(true);
717
Mike Lockwood48f17512009-04-23 09:12:08 -0700718 if (mListener != null) {
719 try {
720 synchronized (this) {
721 // synchronize to ensure incrementPendingBroadcastsLocked()
722 // is called before decrementPendingBroadcasts()
723 if (enabled) {
724 mListener.onProviderEnabled(provider);
725 } else {
726 mListener.onProviderDisabled(provider);
727 }
Nick Pellye0fd6932012-07-11 10:26:13 -0700728 // call this after broadcasting so we do not increment
729 // if we throw an exeption.
730 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700731 }
732 } catch (RemoteException e) {
733 return false;
734 }
735 } else {
736 Intent providerIntent = new Intent();
737 providerIntent.putExtra(LocationManager.KEY_PROVIDER_ENABLED, enabled);
738 try {
739 synchronized (this) {
740 // synchronize to ensure incrementPendingBroadcastsLocked()
741 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700742 mPendingIntent.send(mContext, 0, providerIntent, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700743 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700744 // call this after broadcasting so we do not increment
745 // if we throw an exeption.
746 incrementPendingBroadcastsLocked();
747 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800748 } catch (PendingIntent.CanceledException e) {
749 return false;
750 }
751 }
752 return true;
753 }
754
Nick Pellyf1be6862012-05-15 10:53:42 -0700755 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800756 public void binderDied() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700757 if (D) Log.d(TAG, "Location listener died");
758
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400759 synchronized (mLock) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800760 removeUpdatesLocked(this);
761 }
Mike Lockwood48f17512009-04-23 09:12:08 -0700762 synchronized (this) {
Victoria Lease0aa28602013-05-29 15:28:26 -0700763 clearPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700764 }
765 }
766
Nick Pellye0fd6932012-07-11 10:26:13 -0700767 @Override
Mike Lockwood48f17512009-04-23 09:12:08 -0700768 public void onSendFinished(PendingIntent pendingIntent, Intent intent,
769 int resultCode, String resultData, Bundle resultExtras) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400770 synchronized (this) {
771 decrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700772 }
773 }
774
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400775 // this must be called while synchronized by caller in a synchronized block
776 // containing the sending of the broadcaset
777 private void incrementPendingBroadcastsLocked() {
778 if (mPendingBroadcasts++ == 0) {
Victoria Lease0aa28602013-05-29 15:28:26 -0700779 mWakeLock.acquire();
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400780 }
781 }
782
783 private void decrementPendingBroadcastsLocked() {
784 if (--mPendingBroadcasts == 0) {
Victoria Lease0aa28602013-05-29 15:28:26 -0700785 if (mWakeLock.isHeld()) {
786 mWakeLock.release();
787 }
788 }
789 }
790
791 public void clearPendingBroadcastsLocked() {
792 if (mPendingBroadcasts > 0) {
793 mPendingBroadcasts = 0;
794 if (mWakeLock.isHeld()) {
795 mWakeLock.release();
796 }
Mike Lockwood48f17512009-04-23 09:12:08 -0700797 }
798 }
799 }
800
Nick Pellye0fd6932012-07-11 10:26:13 -0700801 @Override
Mike Lockwood48f17512009-04-23 09:12:08 -0700802 public void locationCallbackFinished(ILocationListener listener) {
Dianne Hackbornf5fdca92013-06-05 14:53:33 -0700803 //Do not use getReceiverLocked here as that will add the ILocationListener to
Joshua Bartel080b61b2009-10-05 12:44:46 -0400804 //the receiver list if it is not found. If it is not found then the
805 //LocationListener was removed when it had a pending broadcast and should
806 //not be added back.
Dianne Hackbornf5fdca92013-06-05 14:53:33 -0700807 synchronized (mLock) {
808 IBinder binder = listener.asBinder();
809 Receiver receiver = mReceivers.get(binder);
810 if (receiver != null) {
811 synchronized (receiver) {
812 // so wakelock calls will succeed
813 long identity = Binder.clearCallingIdentity();
814 receiver.decrementPendingBroadcastsLocked();
815 Binder.restoreCallingIdentity(identity);
816 }
817 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800818 }
819 }
820
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700821 private void addProviderLocked(LocationProviderInterface provider) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400822 mProviders.add(provider);
823 mProvidersByName.put(provider.getName(), provider);
824 }
825
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700826 private void removeProviderLocked(LocationProviderInterface provider) {
827 provider.disable();
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400828 mProviders.remove(provider);
829 mProvidersByName.remove(provider.getName());
830 }
831
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800832 /**
Victoria Lease09eeaec2013-02-05 11:34:13 -0800833 * Returns "true" if access to the specified location provider is allowed by the current
834 * user's settings. Access to all location providers is forbidden to non-location-provider
835 * processes belonging to background users.
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800836 *
837 * @param provider the name of the location provider
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800838 * @return
839 */
Victoria Lease09eeaec2013-02-05 11:34:13 -0800840 private boolean isAllowedByCurrentUserSettingsLocked(String provider) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800841 if (mEnabledProviders.contains(provider)) {
842 return true;
843 }
844 if (mDisabledProviders.contains(provider)) {
845 return false;
846 }
847 // Use system settings
848 ContentResolver resolver = mContext.getContentResolver();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800849
Victoria Leaseb711d572012-10-02 13:14:11 -0700850 return Settings.Secure.isLocationProviderEnabledForUser(resolver, provider, mCurrentUserId);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800851 }
852
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700853 /**
Victoria Lease09eeaec2013-02-05 11:34:13 -0800854 * Returns "true" if access to the specified location provider is allowed by the specified
855 * user's settings. Access to all location providers is forbidden to non-location-provider
856 * processes belonging to background users.
857 *
858 * @param provider the name of the location provider
859 * @param uid the requestor's UID
860 * @return
861 */
862 private boolean isAllowedByUserSettingsLocked(String provider, int uid) {
863 if (UserHandle.getUserId(uid) != mCurrentUserId && !isUidALocationProvider(uid)) {
864 return false;
865 }
866 return isAllowedByCurrentUserSettingsLocked(provider);
867 }
868
869 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700870 * Returns the permission string associated with the specified resolution level.
871 *
872 * @param resolutionLevel the resolution level
873 * @return the permission string
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700874 */
Victoria Lease37425c32012-10-16 16:08:48 -0700875 private String getResolutionPermission(int resolutionLevel) {
876 switch (resolutionLevel) {
877 case RESOLUTION_LEVEL_FINE:
878 return android.Manifest.permission.ACCESS_FINE_LOCATION;
879 case RESOLUTION_LEVEL_COARSE:
880 return android.Manifest.permission.ACCESS_COARSE_LOCATION;
881 default:
882 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800883 }
Victoria Leaseda479c52012-10-15 15:24:16 -0700884 }
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700885
Victoria Leaseda479c52012-10-15 15:24:16 -0700886 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700887 * Returns the resolution level allowed to the given PID/UID pair.
888 *
889 * @param pid the PID
890 * @param uid the UID
891 * @return resolution level allowed to the pid/uid pair
Victoria Leaseda479c52012-10-15 15:24:16 -0700892 */
Victoria Lease37425c32012-10-16 16:08:48 -0700893 private int getAllowedResolutionLevel(int pid, int uid) {
894 if (mContext.checkPermission(android.Manifest.permission.ACCESS_FINE_LOCATION,
895 pid, uid) == PackageManager.PERMISSION_GRANTED) {
896 return RESOLUTION_LEVEL_FINE;
897 } else if (mContext.checkPermission(android.Manifest.permission.ACCESS_COARSE_LOCATION,
898 pid, uid) == PackageManager.PERMISSION_GRANTED) {
899 return RESOLUTION_LEVEL_COARSE;
900 } else {
901 return RESOLUTION_LEVEL_NONE;
Victoria Leaseda479c52012-10-15 15:24:16 -0700902 }
Victoria Lease4fab68b2012-09-13 13:20:59 -0700903 }
904
905 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700906 * Returns the resolution level allowed to the caller
907 *
908 * @return resolution level allowed to caller
Victoria Lease4fab68b2012-09-13 13:20:59 -0700909 */
Victoria Lease37425c32012-10-16 16:08:48 -0700910 private int getCallerAllowedResolutionLevel() {
911 return getAllowedResolutionLevel(Binder.getCallingPid(), Binder.getCallingUid());
912 }
913
914 /**
915 * Throw SecurityException if specified resolution level is insufficient to use geofences.
916 *
917 * @param allowedResolutionLevel resolution level allowed to caller
918 */
919 private void checkResolutionLevelIsSufficientForGeofenceUse(int allowedResolutionLevel) {
920 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
Victoria Lease4fab68b2012-09-13 13:20:59 -0700921 throw new SecurityException("Geofence usage requires ACCESS_FINE_LOCATION permission");
922 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800923 }
924
Victoria Lease37425c32012-10-16 16:08:48 -0700925 /**
926 * Return the minimum resolution level required to use the specified location provider.
927 *
928 * @param provider the name of the location provider
929 * @return minimum resolution level required for provider
930 */
931 private int getMinimumResolutionLevelForProviderUse(String provider) {
Victoria Lease8dbb6342012-09-21 16:55:53 -0700932 if (LocationManager.GPS_PROVIDER.equals(provider) ||
933 LocationManager.PASSIVE_PROVIDER.equals(provider)) {
934 // gps and passive providers require FINE permission
Victoria Lease37425c32012-10-16 16:08:48 -0700935 return RESOLUTION_LEVEL_FINE;
Victoria Lease8dbb6342012-09-21 16:55:53 -0700936 } else if (LocationManager.NETWORK_PROVIDER.equals(provider) ||
937 LocationManager.FUSED_PROVIDER.equals(provider)) {
938 // network and fused providers are ok with COARSE or FINE
Victoria Lease37425c32012-10-16 16:08:48 -0700939 return RESOLUTION_LEVEL_COARSE;
Laurent Tu941221c2012-10-04 14:21:52 -0700940 } else {
941 // mock providers
942 LocationProviderInterface lp = mMockProviders.get(provider);
943 if (lp != null) {
944 ProviderProperties properties = lp.getProperties();
945 if (properties != null) {
946 if (properties.mRequiresSatellite) {
947 // provider requiring satellites require FINE permission
Victoria Lease37425c32012-10-16 16:08:48 -0700948 return RESOLUTION_LEVEL_FINE;
Laurent Tu941221c2012-10-04 14:21:52 -0700949 } else if (properties.mRequiresNetwork || properties.mRequiresCell) {
950 // provider requiring network and or cell require COARSE or FINE
Victoria Lease37425c32012-10-16 16:08:48 -0700951 return RESOLUTION_LEVEL_COARSE;
Laurent Tu941221c2012-10-04 14:21:52 -0700952 }
953 }
954 }
Victoria Lease8dbb6342012-09-21 16:55:53 -0700955 }
Victoria Lease37425c32012-10-16 16:08:48 -0700956 return RESOLUTION_LEVEL_FINE; // if in doubt, require FINE
Victoria Leaseda479c52012-10-15 15:24:16 -0700957 }
958
Victoria Lease37425c32012-10-16 16:08:48 -0700959 /**
960 * Throw SecurityException if specified resolution level is insufficient to use the named
961 * location provider.
962 *
963 * @param allowedResolutionLevel resolution level allowed to caller
964 * @param providerName the name of the location provider
965 */
966 private void checkResolutionLevelIsSufficientForProviderUse(int allowedResolutionLevel,
967 String providerName) {
968 int requiredResolutionLevel = getMinimumResolutionLevelForProviderUse(providerName);
969 if (allowedResolutionLevel < requiredResolutionLevel) {
970 switch (requiredResolutionLevel) {
971 case RESOLUTION_LEVEL_FINE:
972 throw new SecurityException("\"" + providerName + "\" location provider " +
973 "requires ACCESS_FINE_LOCATION permission.");
974 case RESOLUTION_LEVEL_COARSE:
975 throw new SecurityException("\"" + providerName + "\" location provider " +
976 "requires ACCESS_COARSE_LOCATION or ACCESS_FINE_LOCATION permission.");
977 default:
978 throw new SecurityException("Insufficient permission for \"" + providerName +
979 "\" location provider.");
Victoria Leaseda479c52012-10-15 15:24:16 -0700980 }
981 }
Victoria Lease8dbb6342012-09-21 16:55:53 -0700982 }
983
David Christie82edc9b2013-07-19 11:31:42 -0700984 /**
985 * Throw SecurityException if WorkSource use is not allowed (i.e. can't blame other packages
986 * for battery).
987 */
David Christie40e57822013-07-30 11:36:48 -0700988 private void checkDeviceStatsAllowed() {
David Christie82edc9b2013-07-19 11:31:42 -0700989 mContext.enforceCallingOrSelfPermission(
990 android.Manifest.permission.UPDATE_DEVICE_STATS, null);
991 }
992
David Christie40e57822013-07-30 11:36:48 -0700993 private void checkUpdateAppOpsAllowed() {
994 mContext.enforceCallingOrSelfPermission(
995 android.Manifest.permission.UPDATE_APP_OPS_STATS, null);
996 }
997
Dianne Hackborn5e45ee62013-01-24 19:13:44 -0800998 public static int resolutionLevelToOp(int allowedResolutionLevel) {
Dianne Hackborn35654b62013-01-14 17:38:02 -0800999 if (allowedResolutionLevel != RESOLUTION_LEVEL_NONE) {
1000 if (allowedResolutionLevel == RESOLUTION_LEVEL_COARSE) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001001 return AppOpsManager.OP_COARSE_LOCATION;
Dianne Hackborn35654b62013-01-14 17:38:02 -08001002 } else {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001003 return AppOpsManager.OP_FINE_LOCATION;
Dianne Hackborn35654b62013-01-14 17:38:02 -08001004 }
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001005 }
1006 return -1;
1007 }
1008
1009 boolean reportLocationAccessNoThrow(int uid, String packageName, int allowedResolutionLevel) {
1010 int op = resolutionLevelToOp(allowedResolutionLevel);
1011 if (op >= 0) {
Dianne Hackborn35654b62013-01-14 17:38:02 -08001012 if (mAppOps.noteOpNoThrow(op, uid, packageName) != AppOpsManager.MODE_ALLOWED) {
1013 return false;
1014 }
1015 }
1016 return true;
1017 }
1018
1019 boolean checkLocationAccess(int uid, String packageName, int allowedResolutionLevel) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001020 int op = resolutionLevelToOp(allowedResolutionLevel);
1021 if (op >= 0) {
Dianne Hackborn35654b62013-01-14 17:38:02 -08001022 if (mAppOps.checkOp(op, uid, packageName) != AppOpsManager.MODE_ALLOWED) {
1023 return false;
1024 }
1025 }
1026 return true;
1027 }
1028
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001029 /**
1030 * Returns all providers by name, including passive, but excluding
Laurent Tu0d21e212012-10-02 15:33:48 -07001031 * fused, also including ones that are not permitted to
1032 * be accessed by the calling activity or are currently disabled.
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001033 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001034 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001035 public List<String> getAllProviders() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001036 ArrayList<String> out;
1037 synchronized (mLock) {
1038 out = new ArrayList<String>(mProviders.size());
1039 for (LocationProviderInterface provider : mProviders) {
1040 String name = provider.getName();
1041 if (LocationManager.FUSED_PROVIDER.equals(name)) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07001042 continue;
1043 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001044 out.add(name);
1045 }
1046 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001047
1048 if (D) Log.d(TAG, "getAllProviders()=" + out);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001049 return out;
1050 }
1051
Mike Lockwood03ca2162010-04-01 08:10:09 -07001052 /**
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001053 * Return all providers by name, that match criteria and are optionally
1054 * enabled.
1055 * Can return passive provider, but never returns fused provider.
Mike Lockwood03ca2162010-04-01 08:10:09 -07001056 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001057 @Override
1058 public List<String> getProviders(Criteria criteria, boolean enabledOnly) {
Victoria Lease37425c32012-10-16 16:08:48 -07001059 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001060 ArrayList<String> out;
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001061 int uid = Binder.getCallingUid();;
Victoria Lease269518e2012-10-29 08:25:39 -07001062 long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001063 try {
1064 synchronized (mLock) {
1065 out = new ArrayList<String>(mProviders.size());
1066 for (LocationProviderInterface provider : mProviders) {
1067 String name = provider.getName();
1068 if (LocationManager.FUSED_PROVIDER.equals(name)) {
Victoria Lease8dbb6342012-09-21 16:55:53 -07001069 continue;
1070 }
Victoria Lease37425c32012-10-16 16:08:48 -07001071 if (allowedResolutionLevel >= getMinimumResolutionLevelForProviderUse(name)) {
Victoria Lease09eeaec2013-02-05 11:34:13 -08001072 if (enabledOnly && !isAllowedByUserSettingsLocked(name, uid)) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001073 continue;
1074 }
1075 if (criteria != null && !LocationProvider.propertiesMeetCriteria(
1076 name, provider.getProperties(), criteria)) {
1077 continue;
1078 }
1079 out.add(name);
Victoria Lease8dbb6342012-09-21 16:55:53 -07001080 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001081 }
Mike Lockwood03ca2162010-04-01 08:10:09 -07001082 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001083 } finally {
1084 Binder.restoreCallingIdentity(identity);
Mike Lockwood03ca2162010-04-01 08:10:09 -07001085 }
1086
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001087 if (D) Log.d(TAG, "getProviders()=" + out);
1088 return out;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001089 }
1090
1091 /**
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001092 * Return the name of the best provider given a Criteria object.
1093 * This method has been deprecated from the public API,
Victoria Lease8dbb6342012-09-21 16:55:53 -07001094 * and the whole LocationProvider (including #meetsCriteria)
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001095 * has been deprecated as well. So this method now uses
1096 * some simplified logic.
Mike Lockwood03ca2162010-04-01 08:10:09 -07001097 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001098 @Override
Mike Lockwood03ca2162010-04-01 08:10:09 -07001099 public String getBestProvider(Criteria criteria, boolean enabledOnly) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001100 String result = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001101
1102 List<String> providers = getProviders(criteria, enabledOnly);
Victoria Lease8dbb6342012-09-21 16:55:53 -07001103 if (!providers.isEmpty()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001104 result = pickBest(providers);
1105 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
1106 return result;
1107 }
1108 providers = getProviders(null, enabledOnly);
Victoria Lease8dbb6342012-09-21 16:55:53 -07001109 if (!providers.isEmpty()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001110 result = pickBest(providers);
1111 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
1112 return result;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001113 }
1114
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001115 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
Mike Lockwood03ca2162010-04-01 08:10:09 -07001116 return null;
1117 }
1118
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001119 private String pickBest(List<String> providers) {
Victoria Lease1925e292012-09-24 17:00:18 -07001120 if (providers.contains(LocationManager.GPS_PROVIDER)) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001121 return LocationManager.GPS_PROVIDER;
Victoria Lease1925e292012-09-24 17:00:18 -07001122 } else if (providers.contains(LocationManager.NETWORK_PROVIDER)) {
1123 return LocationManager.NETWORK_PROVIDER;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001124 } else {
1125 return providers.get(0);
1126 }
1127 }
1128
Nick Pellye0fd6932012-07-11 10:26:13 -07001129 @Override
Mike Lockwood03ca2162010-04-01 08:10:09 -07001130 public boolean providerMeetsCriteria(String provider, Criteria criteria) {
1131 LocationProviderInterface p = mProvidersByName.get(provider);
1132 if (p == null) {
1133 throw new IllegalArgumentException("provider=" + provider);
1134 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001135
1136 boolean result = LocationProvider.propertiesMeetCriteria(
1137 p.getName(), p.getProperties(), criteria);
1138 if (D) Log.d(TAG, "providerMeetsCriteria(" + provider + ", " + criteria + ")=" + result);
1139 return result;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001140 }
1141
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001142 private void updateProvidersLocked() {
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001143 boolean changesMade = false;
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001144 for (int i = mProviders.size() - 1; i >= 0; i--) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001145 LocationProviderInterface p = mProviders.get(i);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001146 boolean isEnabled = p.isEnabled();
1147 String name = p.getName();
Victoria Lease09eeaec2013-02-05 11:34:13 -08001148 boolean shouldBeEnabled = isAllowedByCurrentUserSettingsLocked(name);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001149 if (isEnabled && !shouldBeEnabled) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001150 updateProviderListenersLocked(name, false, mCurrentUserId);
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001151 changesMade = true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001152 } else if (!isEnabled && shouldBeEnabled) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001153 updateProviderListenersLocked(name, true, mCurrentUserId);
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001154 changesMade = true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001155 }
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001156 }
1157 if (changesMade) {
Dianne Hackborn5ac72a22012-08-29 18:32:08 -07001158 mContext.sendBroadcastAsUser(new Intent(LocationManager.PROVIDERS_CHANGED_ACTION),
1159 UserHandle.ALL);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001160 }
1161 }
1162
Victoria Leaseb711d572012-10-02 13:14:11 -07001163 private void updateProviderListenersLocked(String provider, boolean enabled, int userId) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001164 int listeners = 0;
1165
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001166 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001167 if (p == null) return;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001168
1169 ArrayList<Receiver> deadReceivers = null;
Nick Pellye0fd6932012-07-11 10:26:13 -07001170
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001171 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1172 if (records != null) {
1173 final int N = records.size();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001174 for (int i = 0; i < N; i++) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001175 UpdateRecord record = records.get(i);
Victoria Lease269518e2012-10-29 08:25:39 -07001176 if (UserHandle.getUserId(record.mReceiver.mUid) == userId) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001177 // Sends a notification message to the receiver
1178 if (!record.mReceiver.callProviderEnabledLocked(provider, enabled)) {
1179 if (deadReceivers == null) {
1180 deadReceivers = new ArrayList<Receiver>();
1181 }
1182 deadReceivers.add(record.mReceiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001183 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001184 listeners++;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001185 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001186 }
1187 }
1188
1189 if (deadReceivers != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001190 for (int i = deadReceivers.size() - 1; i >= 0; i--) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001191 removeUpdatesLocked(deadReceivers.get(i));
1192 }
1193 }
Nick Pellye0fd6932012-07-11 10:26:13 -07001194
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001195 if (enabled) {
1196 p.enable();
1197 if (listeners > 0) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001198 applyRequirementsLocked(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001199 }
1200 } else {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001201 p.disable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001202 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001203 }
1204
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001205 private void applyRequirementsLocked(String provider) {
1206 LocationProviderInterface p = mProvidersByName.get(provider);
1207 if (p == null) return;
1208
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001209 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001210 WorkSource worksource = new WorkSource();
1211 ProviderRequest providerRequest = new ProviderRequest();
1212
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001213 if (records != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001214 for (UpdateRecord record : records) {
Victoria Lease269518e2012-10-29 08:25:39 -07001215 if (UserHandle.getUserId(record.mReceiver.mUid) == mCurrentUserId) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001216 if (checkLocationAccess(record.mReceiver.mUid, record.mReceiver.mPackageName,
1217 record.mReceiver.mAllowedResolutionLevel)) {
1218 LocationRequest locationRequest = record.mRequest;
1219 providerRequest.locationRequests.add(locationRequest);
1220 if (locationRequest.getInterval() < providerRequest.interval) {
1221 providerRequest.reportLocation = true;
1222 providerRequest.interval = locationRequest.getInterval();
1223 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001224 }
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -07001225 }
1226 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001227
1228 if (providerRequest.reportLocation) {
1229 // calculate who to blame for power
1230 // This is somewhat arbitrary. We pick a threshold interval
1231 // that is slightly higher that the minimum interval, and
1232 // spread the blame across all applications with a request
1233 // under that threshold.
1234 long thresholdInterval = (providerRequest.interval + 1000) * 3 / 2;
1235 for (UpdateRecord record : records) {
Victoria Lease269518e2012-10-29 08:25:39 -07001236 if (UserHandle.getUserId(record.mReceiver.mUid) == mCurrentUserId) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001237 LocationRequest locationRequest = record.mRequest;
1238 if (locationRequest.getInterval() <= thresholdInterval) {
David Christie82edc9b2013-07-19 11:31:42 -07001239 if (record.mReceiver.mWorkSource != null) {
1240 // Assign blame to another work source.
1241 worksource.add(record.mReceiver.mWorkSource);
1242 } else {
1243 // Assign blame to caller.
1244 worksource.add(
1245 record.mReceiver.mUid,
1246 record.mReceiver.mPackageName);
1247 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001248 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001249 }
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -07001250 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001251 }
1252 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001253
1254 if (D) Log.d(TAG, "provider request: " + provider + " " + providerRequest);
1255 p.setRequest(providerRequest, worksource);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001256 }
1257
1258 private class UpdateRecord {
1259 final String mProvider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001260 final LocationRequest mRequest;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001261 final Receiver mReceiver;
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001262 Location mLastFixBroadcast;
1263 long mLastStatusBroadcast;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001264
1265 /**
1266 * Note: must be constructed with lock held.
1267 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001268 UpdateRecord(String provider, LocationRequest request, Receiver receiver) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001269 mProvider = provider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001270 mRequest = request;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001271 mReceiver = receiver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001272
1273 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1274 if (records == null) {
1275 records = new ArrayList<UpdateRecord>();
1276 mRecordsByProvider.put(provider, records);
1277 }
1278 if (!records.contains(this)) {
1279 records.add(this);
1280 }
1281 }
1282
1283 /**
1284 * Method to be called when a record will no longer be used. Calling this multiple times
1285 * must have the same effect as calling it once.
1286 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001287 void disposeLocked(boolean removeReceiver) {
1288 // remove from mRecordsByProvider
1289 ArrayList<UpdateRecord> globalRecords = mRecordsByProvider.get(this.mProvider);
1290 if (globalRecords != null) {
1291 globalRecords.remove(this);
1292 }
1293
1294 if (!removeReceiver) return; // the caller will handle the rest
1295
1296 // remove from Receiver#mUpdateRecords
1297 HashMap<String, UpdateRecord> receiverRecords = mReceiver.mUpdateRecords;
1298 if (receiverRecords != null) {
1299 receiverRecords.remove(this.mProvider);
1300
1301 // and also remove the Receiver if it has no more update records
1302 if (removeReceiver && receiverRecords.size() == 0) {
1303 removeUpdatesLocked(mReceiver);
1304 }
Mike Lockwood3a76fd62009-09-01 07:26:56 -04001305 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001306 }
1307
1308 @Override
1309 public String toString() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001310 StringBuilder s = new StringBuilder();
1311 s.append("UpdateRecord[");
1312 s.append(mProvider);
1313 s.append(' ').append(mReceiver.mPackageName).append('(');
1314 s.append(mReceiver.mUid).append(')');
1315 s.append(' ').append(mRequest);
1316 s.append(']');
1317 return s.toString();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001318 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001319 }
1320
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001321 private Receiver getReceiverLocked(ILocationListener listener, int pid, int uid,
David Christie40e57822013-07-30 11:36:48 -07001322 String packageName, WorkSource workSource, boolean hideFromAppOps) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001323 IBinder binder = listener.asBinder();
1324 Receiver receiver = mReceivers.get(binder);
1325 if (receiver == null) {
David Christie40e57822013-07-30 11:36:48 -07001326 receiver = new Receiver(listener, null, pid, uid, packageName, workSource,
1327 hideFromAppOps);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001328 mReceivers.put(binder, receiver);
1329
1330 try {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001331 receiver.getListener().asBinder().linkToDeath(receiver, 0);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001332 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001333 Slog.e(TAG, "linkToDeath failed:", e);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001334 return null;
1335 }
1336 }
1337 return receiver;
1338 }
1339
David Christie82edc9b2013-07-19 11:31:42 -07001340 private Receiver getReceiverLocked(PendingIntent intent, int pid, int uid, String packageName,
David Christie40e57822013-07-30 11:36:48 -07001341 WorkSource workSource, boolean hideFromAppOps) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001342 Receiver receiver = mReceivers.get(intent);
1343 if (receiver == null) {
David Christie40e57822013-07-30 11:36:48 -07001344 receiver = new Receiver(null, intent, pid, uid, packageName, workSource,
1345 hideFromAppOps);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001346 mReceivers.put(intent, receiver);
1347 }
1348 return receiver;
1349 }
1350
Victoria Lease37425c32012-10-16 16:08:48 -07001351 /**
1352 * Creates a LocationRequest based upon the supplied LocationRequest that to meets resolution
1353 * and consistency requirements.
1354 *
1355 * @param request the LocationRequest from which to create a sanitized version
Victoria Lease37425c32012-10-16 16:08:48 -07001356 * @return a version of request that meets the given resolution and consistency requirements
1357 * @hide
1358 */
1359 private LocationRequest createSanitizedRequest(LocationRequest request, int resolutionLevel) {
1360 LocationRequest sanitizedRequest = new LocationRequest(request);
1361 if (resolutionLevel < RESOLUTION_LEVEL_FINE) {
1362 switch (sanitizedRequest.getQuality()) {
Victoria Lease09016ab2012-09-16 12:33:15 -07001363 case LocationRequest.ACCURACY_FINE:
Victoria Lease37425c32012-10-16 16:08:48 -07001364 sanitizedRequest.setQuality(LocationRequest.ACCURACY_BLOCK);
Victoria Lease09016ab2012-09-16 12:33:15 -07001365 break;
1366 case LocationRequest.POWER_HIGH:
Victoria Lease37425c32012-10-16 16:08:48 -07001367 sanitizedRequest.setQuality(LocationRequest.POWER_LOW);
Victoria Lease09016ab2012-09-16 12:33:15 -07001368 break;
1369 }
1370 // throttle
Victoria Lease37425c32012-10-16 16:08:48 -07001371 if (sanitizedRequest.getInterval() < LocationFudger.FASTEST_INTERVAL_MS) {
1372 sanitizedRequest.setInterval(LocationFudger.FASTEST_INTERVAL_MS);
Victoria Lease09016ab2012-09-16 12:33:15 -07001373 }
Victoria Lease37425c32012-10-16 16:08:48 -07001374 if (sanitizedRequest.getFastestInterval() < LocationFudger.FASTEST_INTERVAL_MS) {
1375 sanitizedRequest.setFastestInterval(LocationFudger.FASTEST_INTERVAL_MS);
Victoria Lease09016ab2012-09-16 12:33:15 -07001376 }
Nick Pelly74fa7ea2012-08-13 19:36:38 -07001377 }
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001378 // make getFastestInterval() the minimum of interval and fastest interval
Victoria Lease37425c32012-10-16 16:08:48 -07001379 if (sanitizedRequest.getFastestInterval() > sanitizedRequest.getInterval()) {
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001380 request.setFastestInterval(request.getInterval());
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001381 }
Victoria Lease37425c32012-10-16 16:08:48 -07001382 return sanitizedRequest;
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001383 }
1384
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001385 private void checkPackageName(String packageName) {
Nick Pellye0fd6932012-07-11 10:26:13 -07001386 if (packageName == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001387 throw new SecurityException("invalid package name: " + packageName);
Nick Pellye0fd6932012-07-11 10:26:13 -07001388 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001389 int uid = Binder.getCallingUid();
Nick Pellye0fd6932012-07-11 10:26:13 -07001390 String[] packages = mPackageManager.getPackagesForUid(uid);
1391 if (packages == null) {
1392 throw new SecurityException("invalid UID " + uid);
1393 }
1394 for (String pkg : packages) {
1395 if (packageName.equals(pkg)) return;
1396 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001397 throw new SecurityException("invalid package name: " + packageName);
Nick Pellye0fd6932012-07-11 10:26:13 -07001398 }
1399
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001400 private void checkPendingIntent(PendingIntent intent) {
1401 if (intent == null) {
1402 throw new IllegalArgumentException("invalid pending intent: " + intent);
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001403 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001404 }
1405
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001406 private Receiver checkListenerOrIntentLocked(ILocationListener listener, PendingIntent intent,
David Christie40e57822013-07-30 11:36:48 -07001407 int pid, int uid, String packageName, WorkSource workSource, boolean hideFromAppOps) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001408 if (intent == null && listener == null) {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001409 throw new IllegalArgumentException("need either listener or intent");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001410 } else if (intent != null && listener != null) {
1411 throw new IllegalArgumentException("cannot register both listener and intent");
1412 } else if (intent != null) {
1413 checkPendingIntent(intent);
David Christie40e57822013-07-30 11:36:48 -07001414 return getReceiverLocked(intent, pid, uid, packageName, workSource, hideFromAppOps);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001415 } else {
David Christie40e57822013-07-30 11:36:48 -07001416 return getReceiverLocked(listener, pid, uid, packageName, workSource, hideFromAppOps);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001417 }
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001418 }
1419
Nick Pellye0fd6932012-07-11 10:26:13 -07001420 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001421 public void requestLocationUpdates(LocationRequest request, ILocationListener listener,
1422 PendingIntent intent, String packageName) {
1423 if (request == null) request = DEFAULT_LOCATION_REQUEST;
1424 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001425 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1426 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1427 request.getProvider());
David Christie82edc9b2013-07-19 11:31:42 -07001428 WorkSource workSource = request.getWorkSource();
1429 if (workSource != null && workSource.size() > 0) {
David Christie40e57822013-07-30 11:36:48 -07001430 checkDeviceStatsAllowed();
1431 }
1432 boolean hideFromAppOps = request.getHideFromAppOps();
1433 if (hideFromAppOps) {
1434 checkUpdateAppOpsAllowed();
David Christie82edc9b2013-07-19 11:31:42 -07001435 }
Victoria Lease37425c32012-10-16 16:08:48 -07001436 LocationRequest sanitizedRequest = createSanitizedRequest(request, allowedResolutionLevel);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001437
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001438 final int pid = Binder.getCallingPid();
1439 final int uid = Binder.getCallingUid();
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001440 // providers may use public location API's, need to clear identity
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001441 long identity = Binder.clearCallingIdentity();
1442 try {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001443 // We don't check for MODE_IGNORED here; we will do that when we go to deliver
1444 // a location.
Dianne Hackborn35654b62013-01-14 17:38:02 -08001445 checkLocationAccess(uid, packageName, allowedResolutionLevel);
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001446
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001447 synchronized (mLock) {
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001448 Receiver recevier = checkListenerOrIntentLocked(listener, intent, pid, uid,
David Christie40e57822013-07-30 11:36:48 -07001449 packageName, workSource, hideFromAppOps);
Victoria Lease37425c32012-10-16 16:08:48 -07001450 requestLocationUpdatesLocked(sanitizedRequest, recevier, pid, uid, packageName);
Mike Lockwood2d4d1bf2010-10-18 17:06:26 -04001451 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001452 } finally {
1453 Binder.restoreCallingIdentity(identity);
1454 }
1455 }
1456
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001457 private void requestLocationUpdatesLocked(LocationRequest request, Receiver receiver,
1458 int pid, int uid, String packageName) {
1459 // Figure out the provider. Either its explicitly request (legacy use cases), or
1460 // use the fused provider
1461 if (request == null) request = DEFAULT_LOCATION_REQUEST;
1462 String name = request.getProvider();
Victoria Lease09016ab2012-09-16 12:33:15 -07001463 if (name == null) {
1464 throw new IllegalArgumentException("provider name must not be null");
1465 }
Zhentao Sunc5fc9982013-04-17 17:47:53 -07001466
1467 if (D) Log.d(TAG, "request " + Integer.toHexString(System.identityHashCode(receiver))
1468 + " " + name + " " + request + " from " + packageName + "(" + uid + ")");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001469 LocationProviderInterface provider = mProvidersByName.get(name);
1470 if (provider == null) {
1471 throw new IllegalArgumentException("provider doesn't exisit: " + provider);
1472 }
1473
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001474 UpdateRecord record = new UpdateRecord(name, request, receiver);
1475 UpdateRecord oldRecord = receiver.mUpdateRecords.put(name, record);
1476 if (oldRecord != null) {
1477 oldRecord.disposeLocked(false);
1478 }
1479
Victoria Lease09eeaec2013-02-05 11:34:13 -08001480 boolean isProviderEnabled = isAllowedByUserSettingsLocked(name, uid);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001481 if (isProviderEnabled) {
1482 applyRequirementsLocked(name);
1483 } else {
1484 // Notify the listener that updates are currently disabled
1485 receiver.callProviderEnabledLocked(name, false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001486 }
David Christie0b837452013-07-29 16:02:13 -07001487 // Update the monitoring here just in case multiple location requests were added to the
1488 // same receiver (this request may be high power and the initial might not have been).
1489 receiver.updateMonitoring(true);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001490 }
1491
Nick Pellye0fd6932012-07-11 10:26:13 -07001492 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001493 public void removeUpdates(ILocationListener listener, PendingIntent intent,
1494 String packageName) {
1495 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001496
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001497 final int pid = Binder.getCallingPid();
1498 final int uid = Binder.getCallingUid();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001499
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001500 synchronized (mLock) {
David Christie82edc9b2013-07-19 11:31:42 -07001501 WorkSource workSource = null;
David Christie40e57822013-07-30 11:36:48 -07001502 boolean hideFromAppOps = false;
1503 Receiver receiver = checkListenerOrIntentLocked(listener, intent, pid, uid,
1504 packageName, workSource, hideFromAppOps);
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001505
1506 // providers may use public location API's, need to clear identity
1507 long identity = Binder.clearCallingIdentity();
1508 try {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001509 removeUpdatesLocked(receiver);
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001510 } finally {
1511 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001512 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001513 }
1514 }
1515
1516 private void removeUpdatesLocked(Receiver receiver) {
Dianne Hackborn7ff30112012-11-08 11:12:09 -08001517 if (D) Log.i(TAG, "remove " + Integer.toHexString(System.identityHashCode(receiver)));
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001518
1519 if (mReceivers.remove(receiver.mKey) != null && receiver.isListener()) {
1520 receiver.getListener().asBinder().unlinkToDeath(receiver, 0);
1521 synchronized (receiver) {
Victoria Lease0aa28602013-05-29 15:28:26 -07001522 receiver.clearPendingBroadcastsLocked();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001523 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001524 }
1525
Dianne Hackborn1304f4a2013-07-09 18:17:27 -07001526 receiver.updateMonitoring(false);
1527
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001528 // Record which providers were associated with this listener
1529 HashSet<String> providers = new HashSet<String>();
1530 HashMap<String, UpdateRecord> oldRecords = receiver.mUpdateRecords;
1531 if (oldRecords != null) {
1532 // Call dispose() on the obsolete update records.
1533 for (UpdateRecord record : oldRecords.values()) {
1534 record.disposeLocked(false);
1535 }
1536 // Accumulate providers
1537 providers.addAll(oldRecords.keySet());
1538 }
1539
1540 // update provider
1541 for (String provider : providers) {
1542 // If provider is already disabled, don't need to do anything
Victoria Lease09eeaec2013-02-05 11:34:13 -08001543 if (!isAllowedByCurrentUserSettingsLocked(provider)) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001544 continue;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001545 }
1546
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001547 applyRequirementsLocked(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001548 }
1549 }
1550
Dianne Hackbornc2293022013-02-06 23:14:49 -08001551 private void applyAllProviderRequirementsLocked() {
1552 for (LocationProviderInterface p : mProviders) {
1553 // If provider is already disabled, don't need to do anything
Dianne Hackborn64d41d72013-02-07 00:33:31 -08001554 if (!isAllowedByCurrentUserSettingsLocked(p.getName())) {
Dianne Hackbornc2293022013-02-06 23:14:49 -08001555 continue;
1556 }
1557
1558 applyRequirementsLocked(p.getName());
1559 }
1560 }
1561
Nick Pellye0fd6932012-07-11 10:26:13 -07001562 @Override
Nick Pelly4035f5a2012-08-17 14:43:49 -07001563 public Location getLastLocation(LocationRequest request, String packageName) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001564 if (D) Log.d(TAG, "getLastLocation: " + request);
1565 if (request == null) request = DEFAULT_LOCATION_REQUEST;
Victoria Lease37425c32012-10-16 16:08:48 -07001566 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
Nick Pelly4035f5a2012-08-17 14:43:49 -07001567 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001568 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1569 request.getProvider());
1570 // no need to sanitize this request, as only the provider name is used
Nick Pelly4035f5a2012-08-17 14:43:49 -07001571
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001572 final int uid = Binder.getCallingUid();
1573 final long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001574 try {
1575 if (mBlacklist.isBlacklisted(packageName)) {
1576 if (D) Log.d(TAG, "not returning last loc for blacklisted app: " +
1577 packageName);
Victoria Lease09016ab2012-09-16 12:33:15 -07001578 return null;
1579 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001580
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001581 if (!reportLocationAccessNoThrow(uid, packageName, allowedResolutionLevel)) {
1582 if (D) Log.d(TAG, "not returning last loc for no op app: " +
1583 packageName);
1584 return null;
1585 }
1586
Victoria Leaseb711d572012-10-02 13:14:11 -07001587 synchronized (mLock) {
1588 // Figure out the provider. Either its explicitly request (deprecated API's),
1589 // or use the fused provider
1590 String name = request.getProvider();
1591 if (name == null) name = LocationManager.FUSED_PROVIDER;
1592 LocationProviderInterface provider = mProvidersByName.get(name);
1593 if (provider == null) return null;
1594
Victoria Lease09eeaec2013-02-05 11:34:13 -08001595 if (!isAllowedByUserSettingsLocked(name, uid)) return null;
Victoria Leaseb711d572012-10-02 13:14:11 -07001596
David Christie1b9b7b12013-04-15 15:31:11 -07001597 Location location;
1598 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
1599 // Make sure that an app with coarse permissions can't get frequent location
1600 // updates by calling LocationManager.getLastKnownLocation repeatedly.
1601 location = mLastLocationCoarseInterval.get(name);
1602 } else {
1603 location = mLastLocation.get(name);
1604 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001605 if (location == null) {
1606 return null;
1607 }
Victoria Lease37425c32012-10-16 16:08:48 -07001608 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001609 Location noGPSLocation = location.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1610 if (noGPSLocation != null) {
Dianne Hackborn6c5406a2012-11-29 16:18:01 -08001611 return new Location(mLocationFudger.getOrCreate(noGPSLocation));
Victoria Leaseb711d572012-10-02 13:14:11 -07001612 }
Victoria Lease37425c32012-10-16 16:08:48 -07001613 } else {
Dianne Hackborn6c5406a2012-11-29 16:18:01 -08001614 return new Location(location);
Victoria Lease09016ab2012-09-16 12:33:15 -07001615 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001616 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001617 return null;
1618 } finally {
1619 Binder.restoreCallingIdentity(identity);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001620 }
1621 }
1622
1623 @Override
1624 public void requestGeofence(LocationRequest request, Geofence geofence, PendingIntent intent,
1625 String packageName) {
1626 if (request == null) request = DEFAULT_LOCATION_REQUEST;
Victoria Lease37425c32012-10-16 16:08:48 -07001627 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1628 checkResolutionLevelIsSufficientForGeofenceUse(allowedResolutionLevel);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001629 checkPendingIntent(intent);
1630 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001631 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1632 request.getProvider());
1633 LocationRequest sanitizedRequest = createSanitizedRequest(request, allowedResolutionLevel);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001634
Victoria Lease37425c32012-10-16 16:08:48 -07001635 if (D) Log.d(TAG, "requestGeofence: " + sanitizedRequest + " " + geofence + " " + intent);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001636
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001637 // geo-fence manager uses the public location API, need to clear identity
1638 int uid = Binder.getCallingUid();
Victoria Lease56e675b2012-11-05 19:25:06 -08001639 if (UserHandle.getUserId(uid) != UserHandle.USER_OWNER) {
1640 // temporary measure until geofences work for secondary users
1641 Log.w(TAG, "proximity alerts are currently available only to the primary user");
1642 return;
1643 }
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001644 long identity = Binder.clearCallingIdentity();
1645 try {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001646 mGeofenceManager.addFence(sanitizedRequest, geofence, intent, allowedResolutionLevel,
1647 uid, packageName);
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001648 } finally {
1649 Binder.restoreCallingIdentity(identity);
1650 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001651 }
1652
1653 @Override
1654 public void removeGeofence(Geofence geofence, PendingIntent intent, String packageName) {
Victoria Lease37425c32012-10-16 16:08:48 -07001655 checkResolutionLevelIsSufficientForGeofenceUse(getCallerAllowedResolutionLevel());
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001656 checkPendingIntent(intent);
1657 checkPackageName(packageName);
1658
1659 if (D) Log.d(TAG, "removeGeofence: " + geofence + " " + intent);
1660
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001661 // geo-fence manager uses the public location API, need to clear identity
1662 long identity = Binder.clearCallingIdentity();
1663 try {
1664 mGeofenceManager.removeFence(geofence, intent);
1665 } finally {
1666 Binder.restoreCallingIdentity(identity);
1667 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001668 }
1669
1670
1671 @Override
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001672 public boolean addGpsStatusListener(IGpsStatusListener listener, String packageName) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001673 if (mGpsStatusProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001674 return false;
1675 }
Dianne Hackborn35654b62013-01-14 17:38:02 -08001676 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1677 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
Victoria Lease37425c32012-10-16 16:08:48 -07001678 LocationManager.GPS_PROVIDER);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001679
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001680 final int uid = Binder.getCallingUid();
1681 final long ident = Binder.clearCallingIdentity();
1682 try {
Victoria Lease3d5173d2013-02-05 16:07:32 -08001683 if (!checkLocationAccess(uid, packageName, allowedResolutionLevel)) {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001684 return false;
1685 }
1686 } finally {
1687 Binder.restoreCallingIdentity(ident);
1688 }
1689
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001690 try {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001691 mGpsStatusProvider.addGpsStatusListener(listener);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001692 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001693 Slog.e(TAG, "mGpsStatusProvider.addGpsStatusListener failed", e);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001694 return false;
1695 }
1696 return true;
1697 }
1698
Nick Pellye0fd6932012-07-11 10:26:13 -07001699 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001700 public void removeGpsStatusListener(IGpsStatusListener listener) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001701 synchronized (mLock) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001702 try {
1703 mGpsStatusProvider.removeGpsStatusListener(listener);
1704 } catch (Exception e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001705 Slog.e(TAG, "mGpsStatusProvider.removeGpsStatusListener failed", e);
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001706 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001707 }
1708 }
1709
Nick Pellye0fd6932012-07-11 10:26:13 -07001710 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001711 public boolean sendExtraCommand(String provider, String command, Bundle extras) {
Mike Lockwoodc6cc8362009-08-17 13:16:08 -04001712 if (provider == null) {
1713 // throw NullPointerException to remain compatible with previous implementation
1714 throw new NullPointerException();
1715 }
Victoria Lease37425c32012-10-16 16:08:48 -07001716 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1717 provider);
Mike Lockwoodc6cc8362009-08-17 13:16:08 -04001718
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001719 // and check for ACCESS_LOCATION_EXTRA_COMMANDS
Mike Lockwoodb7e99222009-07-07 13:18:21 -04001720 if ((mContext.checkCallingOrSelfPermission(ACCESS_LOCATION_EXTRA_COMMANDS)
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001721 != PackageManager.PERMISSION_GRANTED)) {
1722 throw new SecurityException("Requires ACCESS_LOCATION_EXTRA_COMMANDS permission");
1723 }
1724
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001725 synchronized (mLock) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001726 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001727 if (p == null) return false;
Nick Pellye0fd6932012-07-11 10:26:13 -07001728
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001729 return p.sendExtraCommand(command, extras);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001730 }
1731 }
1732
Nick Pellye0fd6932012-07-11 10:26:13 -07001733 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001734 public boolean sendNiResponse(int notifId, int userResponse) {
Mike Lockwood18ad9f62009-08-27 14:01:23 -07001735 if (Binder.getCallingUid() != Process.myUid()) {
1736 throw new SecurityException(
1737 "calling sendNiResponse from outside of the system is not allowed");
1738 }
Danke Xie22d1f9f2009-08-18 18:28:45 -04001739 try {
1740 return mNetInitiatedListener.sendNiResponse(notifId, userResponse);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001741 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001742 Slog.e(TAG, "RemoteException in LocationManagerService.sendNiResponse");
Danke Xie22d1f9f2009-08-18 18:28:45 -04001743 return false;
1744 }
1745 }
1746
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001747 /**
Mike Lockwood628fd6d2010-01-25 22:46:13 -05001748 * @return null if the provider does not exist
Alexey Tarasovf2db9fb2009-09-01 02:37:07 +11001749 * @throws SecurityException if the provider is not allowed to be
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001750 * accessed by the caller
1751 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001752 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001753 public ProviderProperties getProviderProperties(String provider) {
Laurent Tub7f9d252012-10-16 14:25:00 -07001754 if (mProvidersByName.get(provider) == null) {
1755 return null;
1756 }
1757
Victoria Lease37425c32012-10-16 16:08:48 -07001758 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1759 provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001760
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001761 LocationProviderInterface p;
1762 synchronized (mLock) {
1763 p = mProvidersByName.get(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001764 }
1765
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001766 if (p == null) return null;
1767 return p.getProperties();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001768 }
1769
Nick Pellye0fd6932012-07-11 10:26:13 -07001770 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001771 public boolean isProviderEnabled(String provider) {
Victoria Lease37425c32012-10-16 16:08:48 -07001772 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1773 provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001774 if (LocationManager.FUSED_PROVIDER.equals(provider)) return false;
1775
Victoria Lease09eeaec2013-02-05 11:34:13 -08001776 int uid = Binder.getCallingUid();
Victoria Lease269518e2012-10-29 08:25:39 -07001777 long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001778 try {
1779 synchronized (mLock) {
1780 LocationProviderInterface p = mProvidersByName.get(provider);
1781 if (p == null) return false;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001782
Victoria Lease09eeaec2013-02-05 11:34:13 -08001783 return isAllowedByUserSettingsLocked(provider, uid);
Victoria Leaseb711d572012-10-02 13:14:11 -07001784 }
1785 } finally {
1786 Binder.restoreCallingIdentity(identity);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001787 }
1788 }
1789
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001790 /**
1791 * Returns "true" if the UID belongs to a bound location provider.
1792 *
1793 * @param uid the uid
1794 * @return true if uid belongs to a bound location provider
1795 */
1796 private boolean isUidALocationProvider(int uid) {
1797 if (uid == Process.SYSTEM_UID) {
1798 return true;
1799 }
1800 if (mGeocodeProvider != null) {
1801 if (doesPackageHaveUid(uid, mGeocodeProvider.getConnectedPackageName())) return true;
1802 }
1803 for (LocationProviderProxy proxy : mProxyProviders) {
1804 if (doesPackageHaveUid(uid, proxy.getConnectedPackageName())) return true;
1805 }
1806 return false;
1807 }
1808
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001809 private void checkCallerIsProvider() {
1810 if (mContext.checkCallingOrSelfPermission(INSTALL_LOCATION_PROVIDER)
1811 == PackageManager.PERMISSION_GRANTED) {
1812 return;
1813 }
1814
1815 // Previously we only used the INSTALL_LOCATION_PROVIDER
1816 // check. But that is system or signature
1817 // protection level which is not flexible enough for
1818 // providers installed oustide the system image. So
1819 // also allow providers with a UID matching the
1820 // currently bound package name
1821
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001822 if (isUidALocationProvider(Binder.getCallingUid())) {
1823 return;
1824 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001825
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001826 throw new SecurityException("need INSTALL_LOCATION_PROVIDER permission, " +
1827 "or UID of a currently bound location provider");
1828 }
1829
1830 private boolean doesPackageHaveUid(int uid, String packageName) {
1831 if (packageName == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001832 return false;
1833 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001834 try {
1835 ApplicationInfo appInfo = mPackageManager.getApplicationInfo(packageName, 0);
1836 if (appInfo.uid != uid) {
1837 return false;
1838 }
1839 } catch (NameNotFoundException e) {
1840 return false;
1841 }
1842 return true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001843 }
1844
Nick Pellye0fd6932012-07-11 10:26:13 -07001845 @Override
Mike Lockwooda4903f22010-02-17 06:42:23 -05001846 public void reportLocation(Location location, boolean passive) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001847 checkCallerIsProvider();
Mike Lockwood275555c2009-05-01 11:30:34 -04001848
Nick Pelly2eeeec22012-07-18 13:13:37 -07001849 if (!location.isComplete()) {
1850 Log.w(TAG, "Dropping incomplete location: " + location);
1851 return;
1852 }
1853
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001854 mLocationHandler.removeMessages(MSG_LOCATION_CHANGED, location);
1855 Message m = Message.obtain(mLocationHandler, MSG_LOCATION_CHANGED, location);
Mike Lockwooda4903f22010-02-17 06:42:23 -05001856 m.arg1 = (passive ? 1 : 0);
Mike Lockwood4e50b782009-04-03 08:24:43 -07001857 mLocationHandler.sendMessageAtFrontOfQueue(m);
1858 }
1859
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001860
Laurent Tu75defb62012-11-01 16:21:52 -07001861 private static boolean shouldBroadcastSafe(
1862 Location loc, Location lastLoc, UpdateRecord record, long now) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001863 // Always broadcast the first update
1864 if (lastLoc == null) {
1865 return true;
1866 }
1867
Nick Pellyf1be6862012-05-15 10:53:42 -07001868 // Check whether sufficient time has passed
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001869 long minTime = record.mRequest.getFastestInterval();
David Christie1b9b7b12013-04-15 15:31:11 -07001870 long delta = (loc.getElapsedRealtimeNanos() - lastLoc.getElapsedRealtimeNanos())
1871 / NANOS_PER_MILLI;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001872 if (delta < minTime - MAX_PROVIDER_SCHEDULING_JITTER_MS) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001873 return false;
1874 }
1875
1876 // Check whether sufficient distance has been traveled
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001877 double minDistance = record.mRequest.getSmallestDisplacement();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001878 if (minDistance > 0.0) {
1879 if (loc.distanceTo(lastLoc) <= minDistance) {
1880 return false;
1881 }
1882 }
1883
Laurent Tu75defb62012-11-01 16:21:52 -07001884 // Check whether sufficient number of udpates is left
1885 if (record.mRequest.getNumUpdates() <= 0) {
1886 return false;
1887 }
1888
1889 // Check whether the expiry date has passed
1890 if (record.mRequest.getExpireAt() < now) {
1891 return false;
1892 }
1893
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001894 return true;
1895 }
1896
Mike Lockwooda4903f22010-02-17 06:42:23 -05001897 private void handleLocationChangedLocked(Location location, boolean passive) {
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001898 if (D) Log.d(TAG, "incoming location: " + location);
1899
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001900 long now = SystemClock.elapsedRealtime();
Mike Lockwooda4903f22010-02-17 06:42:23 -05001901 String provider = (passive ? LocationManager.PASSIVE_PROVIDER : location.getProvider());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001902
Laurent Tu60ec50a2012-10-04 17:00:10 -07001903 // Skip if the provider is unknown.
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001904 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001905 if (p == null) return;
1906
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001907 // Update last known locations
Victoria Lease09016ab2012-09-16 12:33:15 -07001908 Location noGPSLocation = location.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1909 Location lastNoGPSLocation = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001910 Location lastLocation = mLastLocation.get(provider);
Mike Lockwood4e50b782009-04-03 08:24:43 -07001911 if (lastLocation == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001912 lastLocation = new Location(provider);
1913 mLastLocation.put(provider, lastLocation);
Victoria Lease09016ab2012-09-16 12:33:15 -07001914 } else {
1915 lastNoGPSLocation = lastLocation.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1916 if (noGPSLocation == null && lastNoGPSLocation != null) {
1917 // New location has no no-GPS location: adopt last no-GPS location. This is set
1918 // directly into location because we do not want to notify COARSE clients.
1919 location.setExtraLocation(Location.EXTRA_NO_GPS_LOCATION, lastNoGPSLocation);
1920 }
Mike Lockwood4e50b782009-04-03 08:24:43 -07001921 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001922 lastLocation.set(location);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001923
David Christie1b9b7b12013-04-15 15:31:11 -07001924 // Update last known coarse interval location if enough time has passed.
1925 Location lastLocationCoarseInterval = mLastLocationCoarseInterval.get(provider);
1926 if (lastLocationCoarseInterval == null) {
1927 lastLocationCoarseInterval = new Location(location);
1928 mLastLocationCoarseInterval.put(provider, lastLocationCoarseInterval);
1929 }
1930 long timeDiffNanos = location.getElapsedRealtimeNanos()
1931 - lastLocationCoarseInterval.getElapsedRealtimeNanos();
1932 if (timeDiffNanos > LocationFudger.FASTEST_INTERVAL_MS * NANOS_PER_MILLI) {
1933 lastLocationCoarseInterval.set(location);
1934 }
1935 // Don't ever return a coarse location that is more recent than the allowed update
1936 // interval (i.e. don't allow an app to keep registering and unregistering for
1937 // location updates to overcome the minimum interval).
1938 noGPSLocation =
1939 lastLocationCoarseInterval.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1940
Laurent Tu60ec50a2012-10-04 17:00:10 -07001941 // Skip if there are no UpdateRecords for this provider.
1942 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1943 if (records == null || records.size() == 0) return;
1944
Victoria Lease09016ab2012-09-16 12:33:15 -07001945 // Fetch coarse location
1946 Location coarseLocation = null;
David Christie1b9b7b12013-04-15 15:31:11 -07001947 if (noGPSLocation != null) {
Victoria Lease09016ab2012-09-16 12:33:15 -07001948 coarseLocation = mLocationFudger.getOrCreate(noGPSLocation);
1949 }
1950
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001951 // Fetch latest status update time
1952 long newStatusUpdateTime = p.getStatusUpdateTime();
1953
Mike Lockwood7ec434e2009-03-27 07:46:48 -07001954 // Get latest status
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001955 Bundle extras = new Bundle();
1956 int status = p.getStatus(extras);
1957
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001958 ArrayList<Receiver> deadReceivers = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001959 ArrayList<UpdateRecord> deadUpdateRecords = null;
Nick Pellye0fd6932012-07-11 10:26:13 -07001960
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001961 // Broadcast location or status to all listeners
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001962 for (UpdateRecord r : records) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001963 Receiver receiver = r.mReceiver;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001964 boolean receiverDead = false;
Nick Pelly4035f5a2012-08-17 14:43:49 -07001965
Victoria Lease269518e2012-10-29 08:25:39 -07001966 int receiverUserId = UserHandle.getUserId(receiver.mUid);
Victoria Lease2f5b97c2013-05-07 14:22:02 -07001967 if (receiverUserId != mCurrentUserId && !isUidALocationProvider(receiver.mUid)) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001968 if (D) {
Victoria Lease269518e2012-10-29 08:25:39 -07001969 Log.d(TAG, "skipping loc update for background user " + receiverUserId +
Victoria Leaseb711d572012-10-02 13:14:11 -07001970 " (current user: " + mCurrentUserId + ", app: " +
1971 receiver.mPackageName + ")");
1972 }
1973 continue;
1974 }
1975
Nick Pelly4035f5a2012-08-17 14:43:49 -07001976 if (mBlacklist.isBlacklisted(receiver.mPackageName)) {
1977 if (D) Log.d(TAG, "skipping loc update for blacklisted app: " +
1978 receiver.mPackageName);
1979 continue;
1980 }
1981
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001982 if (!reportLocationAccessNoThrow(receiver.mUid, receiver.mPackageName,
1983 receiver.mAllowedResolutionLevel)) {
1984 if (D) Log.d(TAG, "skipping loc update for no op app: " +
1985 receiver.mPackageName);
1986 continue;
1987 }
1988
Victoria Lease09016ab2012-09-16 12:33:15 -07001989 Location notifyLocation = null;
Victoria Lease37425c32012-10-16 16:08:48 -07001990 if (receiver.mAllowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
1991 notifyLocation = coarseLocation; // use coarse location
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001992 } else {
Victoria Lease37425c32012-10-16 16:08:48 -07001993 notifyLocation = lastLocation; // use fine location
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001994 }
Victoria Lease09016ab2012-09-16 12:33:15 -07001995 if (notifyLocation != null) {
1996 Location lastLoc = r.mLastFixBroadcast;
Laurent Tu75defb62012-11-01 16:21:52 -07001997 if ((lastLoc == null) || shouldBroadcastSafe(notifyLocation, lastLoc, r, now)) {
Victoria Lease09016ab2012-09-16 12:33:15 -07001998 if (lastLoc == null) {
1999 lastLoc = new Location(notifyLocation);
2000 r.mLastFixBroadcast = lastLoc;
2001 } else {
2002 lastLoc.set(notifyLocation);
2003 }
2004 if (!receiver.callLocationChangedLocked(notifyLocation)) {
2005 Slog.w(TAG, "RemoteException calling onLocationChanged on " + receiver);
2006 receiverDead = true;
2007 }
Laurent Tu75defb62012-11-01 16:21:52 -07002008 r.mRequest.decrementNumUpdates();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002009 }
2010 }
2011
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002012 long prevStatusUpdateTime = r.mLastStatusBroadcast;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002013 if ((newStatusUpdateTime > prevStatusUpdateTime) &&
Victoria Lease09016ab2012-09-16 12:33:15 -07002014 (prevStatusUpdateTime != 0 || status != LocationProvider.AVAILABLE)) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002015
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002016 r.mLastStatusBroadcast = newStatusUpdateTime;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002017 if (!receiver.callStatusChangedLocked(provider, status, extras)) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07002018 receiverDead = true;
Joe Onorato8a9b2202010-02-26 18:56:32 -08002019 Slog.w(TAG, "RemoteException calling onStatusChanged on " + receiver);
Mike Lockwood03ca2162010-04-01 08:10:09 -07002020 }
2021 }
2022
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002023 // track expired records
Laurent Tu75defb62012-11-01 16:21:52 -07002024 if (r.mRequest.getNumUpdates() <= 0 || r.mRequest.getExpireAt() < now) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002025 if (deadUpdateRecords == null) {
2026 deadUpdateRecords = new ArrayList<UpdateRecord>();
2027 }
2028 deadUpdateRecords.add(r);
2029 }
2030 // track dead receivers
2031 if (receiverDead) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07002032 if (deadReceivers == null) {
2033 deadReceivers = new ArrayList<Receiver>();
2034 }
2035 if (!deadReceivers.contains(receiver)) {
2036 deadReceivers.add(receiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002037 }
2038 }
2039 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002040
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002041 // remove dead records and receivers outside the loop
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002042 if (deadReceivers != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002043 for (Receiver receiver : deadReceivers) {
2044 removeUpdatesLocked(receiver);
2045 }
2046 }
2047 if (deadUpdateRecords != null) {
2048 for (UpdateRecord r : deadUpdateRecords) {
2049 r.disposeLocked(true);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002050 }
Victoria Lease8b38b292012-12-04 15:04:43 -08002051 applyRequirementsLocked(provider);
2052 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002053 }
2054
2055 private class LocationWorkerHandler extends Handler {
Victoria Lease5cd731a2012-12-19 15:04:21 -08002056 public LocationWorkerHandler(Looper looper) {
2057 super(looper, null, true);
2058 }
2059
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002060 @Override
2061 public void handleMessage(Message msg) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002062 switch (msg.what) {
2063 case MSG_LOCATION_CHANGED:
2064 handleLocationChanged((Location) msg.obj, msg.arg1 == 1);
2065 break;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002066 }
2067 }
2068 }
2069
Victoria Lease54ca7ae2013-01-08 09:39:50 -08002070 private boolean isMockProvider(String provider) {
2071 synchronized (mLock) {
2072 return mMockProviders.containsKey(provider);
2073 }
2074 }
2075
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002076 private void handleLocationChanged(Location location, boolean passive) {
Victoria Lease54ca7ae2013-01-08 09:39:50 -08002077 // create a working copy of the incoming Location so that the service can modify it without
2078 // disturbing the caller's copy
2079 Location myLocation = new Location(location);
2080 String provider = myLocation.getProvider();
2081
2082 // set "isFromMockProvider" bit if location came from a mock provider. we do not clear this
2083 // bit if location did not come from a mock provider because passive/fused providers can
2084 // forward locations from mock providers, and should not grant them legitimacy in doing so.
2085 if (!myLocation.isFromMockProvider() && isMockProvider(provider)) {
2086 myLocation.setIsFromMockProvider(true);
2087 }
Jeff Sharkey5e613312012-01-30 11:16:20 -08002088
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002089 synchronized (mLock) {
Victoria Lease09eeaec2013-02-05 11:34:13 -08002090 if (isAllowedByCurrentUserSettingsLocked(provider)) {
2091 if (!passive) {
2092 // notify passive provider of the new location
2093 mPassiveProvider.updateLocation(myLocation);
2094 }
Victoria Lease54ca7ae2013-01-08 09:39:50 -08002095 handleLocationChangedLocked(myLocation, passive);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002096 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002097 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002098 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002099
Mike Lockwoode97ae402010-09-29 15:23:46 -04002100 private final PackageMonitor mPackageMonitor = new PackageMonitor() {
2101 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002102 public void onPackageDisappeared(String packageName, int reason) {
2103 // remove all receivers associated with this package name
2104 synchronized (mLock) {
2105 ArrayList<Receiver> deadReceivers = null;
2106
2107 for (Receiver receiver : mReceivers.values()) {
2108 if (receiver.mPackageName.equals(packageName)) {
2109 if (deadReceivers == null) {
2110 deadReceivers = new ArrayList<Receiver>();
2111 }
2112 deadReceivers.add(receiver);
2113 }
2114 }
2115
2116 // perform removal outside of mReceivers loop
2117 if (deadReceivers != null) {
2118 for (Receiver receiver : deadReceivers) {
2119 removeUpdatesLocked(receiver);
2120 }
2121 }
2122 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002123 }
Mike Lockwoode97ae402010-09-29 15:23:46 -04002124 };
2125
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002126 // Geocoder
2127
Nick Pellye0fd6932012-07-11 10:26:13 -07002128 @Override
Mike Lockwoode15735a2010-09-20 17:48:47 -04002129 public boolean geocoderIsPresent() {
Mark Vandevoorde01ac80b2010-05-21 15:43:26 -07002130 return mGeocodeProvider != null;
2131 }
2132
Nick Pellye0fd6932012-07-11 10:26:13 -07002133 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002134 public String getFromLocation(double latitude, double longitude, int maxResults,
Mike Lockwood34901402010-01-04 12:14:21 -05002135 GeocoderParams params, List<Address> addrs) {
Mike Lockwooda55c3212009-04-15 11:10:11 -04002136 if (mGeocodeProvider != null) {
Mike Lockwood628fd6d2010-01-25 22:46:13 -05002137 return mGeocodeProvider.getFromLocation(latitude, longitude, maxResults,
2138 params, addrs);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002139 }
Mike Lockwooda55c3212009-04-15 11:10:11 -04002140 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002141 }
2142
Mike Lockwooda55c3212009-04-15 11:10:11 -04002143
Nick Pellye0fd6932012-07-11 10:26:13 -07002144 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002145 public String getFromLocationName(String locationName,
Mike Lockwooda55c3212009-04-15 11:10:11 -04002146 double lowerLeftLatitude, double lowerLeftLongitude,
2147 double upperRightLatitude, double upperRightLongitude, int maxResults,
Mike Lockwood34901402010-01-04 12:14:21 -05002148 GeocoderParams params, List<Address> addrs) {
Mike Lockwooda55c3212009-04-15 11:10:11 -04002149
2150 if (mGeocodeProvider != null) {
Mike Lockwood628fd6d2010-01-25 22:46:13 -05002151 return mGeocodeProvider.getFromLocationName(locationName, lowerLeftLatitude,
2152 lowerLeftLongitude, upperRightLatitude, upperRightLongitude,
2153 maxResults, params, addrs);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002154 }
Mike Lockwooda55c3212009-04-15 11:10:11 -04002155 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002156 }
2157
2158 // Mock Providers
2159
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002160 private void checkMockPermissionsSafe() {
2161 boolean allowMocks = Settings.Secure.getInt(mContext.getContentResolver(),
2162 Settings.Secure.ALLOW_MOCK_LOCATION, 0) == 1;
2163 if (!allowMocks) {
2164 throw new SecurityException("Requires ACCESS_MOCK_LOCATION secure setting");
2165 }
2166
2167 if (mContext.checkCallingPermission(ACCESS_MOCK_LOCATION) !=
2168 PackageManager.PERMISSION_GRANTED) {
2169 throw new SecurityException("Requires ACCESS_MOCK_LOCATION permission");
Nick Pellye0fd6932012-07-11 10:26:13 -07002170 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002171 }
2172
Nick Pellye0fd6932012-07-11 10:26:13 -07002173 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002174 public void addTestProvider(String name, ProviderProperties properties) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002175 checkMockPermissionsSafe();
2176
Mike Lockwooda4903f22010-02-17 06:42:23 -05002177 if (LocationManager.PASSIVE_PROVIDER.equals(name)) {
2178 throw new IllegalArgumentException("Cannot mock the passive location provider");
2179 }
2180
Mike Lockwood86328a92009-10-23 08:38:25 -04002181 long identity = Binder.clearCallingIdentity();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002182 synchronized (mLock) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002183 MockProvider provider = new MockProvider(name, this, properties);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07002184 // remove the real provider if we are replacing GPS or network provider
2185 if (LocationManager.GPS_PROVIDER.equals(name)
Nick Pelly1332b532012-08-21 16:25:47 -07002186 || LocationManager.NETWORK_PROVIDER.equals(name)
2187 || LocationManager.FUSED_PROVIDER.equals(name)) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05002188 LocationProviderInterface p = mProvidersByName.get(name);
2189 if (p != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002190 removeProviderLocked(p);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07002191 }
2192 }
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04002193 if (mProvidersByName.get(name) != null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002194 throw new IllegalArgumentException("Provider \"" + name + "\" already exists");
2195 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002196 addProviderLocked(provider);
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002197 mMockProviders.put(name, provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002198 mLastLocation.put(name, null);
David Christie1b9b7b12013-04-15 15:31:11 -07002199 mLastLocationCoarseInterval.put(name, null);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002200 updateProvidersLocked();
2201 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002202 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002203 }
2204
Nick Pellye0fd6932012-07-11 10:26:13 -07002205 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002206 public void removeTestProvider(String provider) {
2207 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002208 synchronized (mLock) {
You Kima6d0b6f2012-10-28 03:58:44 +09002209 MockProvider mockProvider = mMockProviders.remove(provider);
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002210 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002211 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2212 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002213 long identity = Binder.clearCallingIdentity();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002214 removeProviderLocked(mProvidersByName.get(provider));
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002215
2216 // reinstate real provider if available
2217 LocationProviderInterface realProvider = mRealProviders.get(provider);
2218 if (realProvider != null) {
2219 addProviderLocked(realProvider);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07002220 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002221 mLastLocation.put(provider, null);
David Christie1b9b7b12013-04-15 15:31:11 -07002222 mLastLocationCoarseInterval.put(provider, null);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002223 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002224 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002225 }
2226 }
2227
Nick Pellye0fd6932012-07-11 10:26:13 -07002228 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002229 public void setTestProviderLocation(String provider, Location loc) {
2230 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002231 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002232 MockProvider mockProvider = mMockProviders.get(provider);
2233 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002234 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2235 }
Mike Lockwood95427cd2009-05-07 13:27:54 -04002236 // clear calling identity so INSTALL_LOCATION_PROVIDER permission is not required
2237 long identity = Binder.clearCallingIdentity();
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002238 mockProvider.setLocation(loc);
Mike Lockwood95427cd2009-05-07 13:27:54 -04002239 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002240 }
2241 }
2242
Nick Pellye0fd6932012-07-11 10:26:13 -07002243 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002244 public void clearTestProviderLocation(String provider) {
2245 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002246 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002247 MockProvider mockProvider = mMockProviders.get(provider);
2248 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002249 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2250 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002251 mockProvider.clearLocation();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002252 }
2253 }
2254
Nick Pellye0fd6932012-07-11 10:26:13 -07002255 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002256 public void setTestProviderEnabled(String provider, boolean enabled) {
2257 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002258 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002259 MockProvider mockProvider = mMockProviders.get(provider);
2260 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002261 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2262 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002263 long identity = Binder.clearCallingIdentity();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002264 if (enabled) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002265 mockProvider.enable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002266 mEnabledProviders.add(provider);
2267 mDisabledProviders.remove(provider);
2268 } else {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002269 mockProvider.disable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002270 mEnabledProviders.remove(provider);
2271 mDisabledProviders.add(provider);
2272 }
2273 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002274 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002275 }
2276 }
2277
Nick Pellye0fd6932012-07-11 10:26:13 -07002278 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002279 public void clearTestProviderEnabled(String provider) {
2280 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002281 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002282 MockProvider mockProvider = mMockProviders.get(provider);
2283 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002284 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2285 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002286 long identity = Binder.clearCallingIdentity();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002287 mEnabledProviders.remove(provider);
2288 mDisabledProviders.remove(provider);
2289 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002290 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002291 }
2292 }
2293
Nick Pellye0fd6932012-07-11 10:26:13 -07002294 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002295 public void setTestProviderStatus(String provider, int status, Bundle extras, long updateTime) {
2296 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002297 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002298 MockProvider mockProvider = mMockProviders.get(provider);
2299 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002300 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2301 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002302 mockProvider.setStatus(status, extras, updateTime);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002303 }
2304 }
2305
Nick Pellye0fd6932012-07-11 10:26:13 -07002306 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002307 public void clearTestProviderStatus(String provider) {
2308 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002309 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002310 MockProvider mockProvider = mMockProviders.get(provider);
2311 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002312 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2313 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002314 mockProvider.clearStatus();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002315 }
2316 }
2317
2318 private void log(String log) {
2319 if (Log.isLoggable(TAG, Log.VERBOSE)) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08002320 Slog.d(TAG, log);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002321 }
2322 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002323
2324 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002325 protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) {
2326 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
2327 != PackageManager.PERMISSION_GRANTED) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -04002328 pw.println("Permission Denial: can't dump LocationManagerService from from pid="
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002329 + Binder.getCallingPid()
2330 + ", uid=" + Binder.getCallingUid());
2331 return;
2332 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002333
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002334 synchronized (mLock) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002335 pw.println("Current Location Manager state:");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002336 pw.println(" Location Listeners:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002337 for (Receiver receiver : mReceivers.values()) {
2338 pw.println(" " + receiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002339 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002340 pw.println(" Records by Provider:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002341 for (Map.Entry<String, ArrayList<UpdateRecord>> entry : mRecordsByProvider.entrySet()) {
2342 pw.println(" " + entry.getKey() + ":");
2343 for (UpdateRecord record : entry.getValue()) {
2344 pw.println(" " + record);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002345 }
2346 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002347 pw.println(" Last Known Locations:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002348 for (Map.Entry<String, Location> entry : mLastLocation.entrySet()) {
2349 String provider = entry.getKey();
2350 Location location = entry.getValue();
2351 pw.println(" " + provider + ": " + location);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002352 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002353
David Christie1b9b7b12013-04-15 15:31:11 -07002354 pw.println(" Last Known Locations Coarse Intervals:");
2355 for (Map.Entry<String, Location> entry : mLastLocationCoarseInterval.entrySet()) {
2356 String provider = entry.getKey();
2357 Location location = entry.getValue();
2358 pw.println(" " + provider + ": " + location);
2359 }
2360
Nick Pellye0fd6932012-07-11 10:26:13 -07002361 mGeofenceManager.dump(pw);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002362
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002363 if (mEnabledProviders.size() > 0) {
2364 pw.println(" Enabled Providers:");
2365 for (String i : mEnabledProviders) {
2366 pw.println(" " + i);
2367 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002368
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002369 }
2370 if (mDisabledProviders.size() > 0) {
2371 pw.println(" Disabled Providers:");
2372 for (String i : mDisabledProviders) {
2373 pw.println(" " + i);
2374 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002375 }
Nick Pelly4035f5a2012-08-17 14:43:49 -07002376 pw.append(" ");
2377 mBlacklist.dump(pw);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002378 if (mMockProviders.size() > 0) {
2379 pw.println(" Mock Providers:");
2380 for (Map.Entry<String, MockProvider> i : mMockProviders.entrySet()) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002381 i.getValue().dump(pw, " ");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002382 }
2383 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002384
Nick Pelly74fa7ea2012-08-13 19:36:38 -07002385 pw.append(" fudger: ");
2386 mLocationFudger.dump(fd, pw, args);
2387
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002388 if (args.length > 0 && "short".equals(args[0])) {
2389 return;
2390 }
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002391 for (LocationProviderInterface provider: mProviders) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002392 pw.print(provider.getName() + " Internal State");
2393 if (provider instanceof LocationProviderProxy) {
2394 LocationProviderProxy proxy = (LocationProviderProxy) provider;
2395 pw.print(" (" + proxy.getConnectedPackageName() + ")");
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002396 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002397 pw.println(":");
2398 provider.dump(fd, pw, args);
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002399 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002400 }
2401 }
2402}