blob: 62deec23663b31881e9e3473c981da5feab57830 [file] [log] [blame]
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2007 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server;
18
Dianne Hackborna06de0f2012-12-11 16:34:47 -080019import android.app.AppOpsManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080020import android.app.PendingIntent;
Victoria Lease38389b62012-09-30 11:44:22 -070021import android.content.BroadcastReceiver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080022import android.content.ContentResolver;
23import android.content.Context;
24import android.content.Intent;
Victoria Lease38389b62012-09-30 11:44:22 -070025import android.content.IntentFilter;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070026import android.content.pm.ApplicationInfo;
Jeff Hamiltonfbadb692012-10-05 14:21:58 -050027import android.content.pm.PackageInfo;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080028import android.content.pm.PackageManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070029import android.content.pm.PackageManager.NameNotFoundException;
Jeff Hamiltonfbadb692012-10-05 14:21:58 -050030import android.content.pm.ResolveInfo;
31import android.content.pm.Signature;
Mike Lockwood628fd6d2010-01-25 22:46:13 -050032import android.content.res.Resources;
Brian Muramatsubb95cb92012-08-29 10:43:21 -070033import android.database.ContentObserver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080034import android.location.Address;
Mike Lockwood03ca2162010-04-01 08:10:09 -070035import android.location.Criteria;
Mike Lockwood34901402010-01-04 12:14:21 -050036import android.location.GeocoderParams;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070037import android.location.Geofence;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080038import android.location.IGpsStatusListener;
Mike Lockwood15e3d0f2009-05-01 07:53:28 -040039import android.location.IGpsStatusProvider;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080040import android.location.ILocationListener;
41import android.location.ILocationManager;
Danke Xie22d1f9f2009-08-18 18:28:45 -040042import android.location.INetInitiatedListener;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080043import android.location.Location;
44import android.location.LocationManager;
45import android.location.LocationProvider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070046import android.location.LocationRequest;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080047import android.os.Binder;
48import android.os.Bundle;
49import android.os.Handler;
50import android.os.IBinder;
Mike Lockwood3d12b512009-04-21 23:25:35 -070051import android.os.Looper;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080052import android.os.Message;
53import android.os.PowerManager;
Mike Lockwoode932f7f2009-04-06 10:51:26 -070054import android.os.Process;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080055import android.os.RemoteException;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070056import android.os.SystemClock;
Dianne Hackborn5ac72a22012-08-29 18:32:08 -070057import android.os.UserHandle;
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -070058import android.os.WorkSource;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080059import android.provider.Settings;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080060import android.util.Log;
Joe Onorato8a9b2202010-02-26 18:56:32 -080061import android.util.Slog;
Mike Lockwoode97ae402010-09-29 15:23:46 -040062import com.android.internal.content.PackageMonitor;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070063import com.android.internal.location.ProviderProperties;
64import com.android.internal.location.ProviderRequest;
Dianne Hackborn8d044e82013-04-30 17:24:15 -070065import com.android.internal.os.BackgroundThread;
destradaa1af4b022013-07-12 15:43:36 -070066import com.android.server.location.FlpHardwareProvider;
67import com.android.server.location.FusedProxy;
Mike Lockwood43e33f22010-03-26 10:41:48 -040068import com.android.server.location.GeocoderProxy;
Jaikumar Ganesh8ce470d2013-04-03 12:22:18 -070069import com.android.server.location.GeofenceProxy;
Nick Pellye0fd6932012-07-11 10:26:13 -070070import com.android.server.location.GeofenceManager;
Mike Lockwood43e33f22010-03-26 10:41:48 -040071import com.android.server.location.GpsLocationProvider;
Nick Pelly4035f5a2012-08-17 14:43:49 -070072import com.android.server.location.LocationBlacklist;
Nick Pelly74fa7ea2012-08-13 19:36:38 -070073import com.android.server.location.LocationFudger;
Mike Lockwood43e33f22010-03-26 10:41:48 -040074import com.android.server.location.LocationProviderInterface;
75import com.android.server.location.LocationProviderProxy;
David Christie2ff96af2014-01-30 16:09:37 -080076import com.android.server.location.LocationRequestStatistics;
77import com.android.server.location.LocationRequestStatistics.PackageProviderKey;
78import com.android.server.location.LocationRequestStatistics.PackageStatistics;
Mike Lockwood43e33f22010-03-26 10:41:48 -040079import com.android.server.location.MockProvider;
80import com.android.server.location.PassiveProvider;
81
82import java.io.FileDescriptor;
83import java.io.PrintWriter;
84import java.util.ArrayList;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070085import java.util.Arrays;
Mike Lockwood43e33f22010-03-26 10:41:48 -040086import java.util.HashMap;
87import java.util.HashSet;
88import java.util.List;
89import java.util.Map;
Mike Lockwood43e33f22010-03-26 10:41:48 -040090import java.util.Set;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080091
92/**
93 * The service class that manages LocationProviders and issues location
94 * updates and alerts.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080095 */
Victoria Lease5cd731a2012-12-19 15:04:21 -080096public class LocationManagerService extends ILocationManager.Stub {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080097 private static final String TAG = "LocationManagerService";
JP Abgrallf79811e72013-02-01 18:45:05 -080098 public static final boolean D = Log.isLoggable(TAG, Log.DEBUG);
Nick Pelly6fa9ad42012-07-16 12:18:23 -070099
100 private static final String WAKELOCK_KEY = TAG;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800101
Victoria Lease37425c32012-10-16 16:08:48 -0700102 // Location resolution level: no location data whatsoever
103 private static final int RESOLUTION_LEVEL_NONE = 0;
104 // Location resolution level: coarse location data only
105 private static final int RESOLUTION_LEVEL_COARSE = 1;
106 // Location resolution level: fine location data
107 private static final int RESOLUTION_LEVEL_FINE = 2;
108
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800109 private static final String ACCESS_MOCK_LOCATION =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700110 android.Manifest.permission.ACCESS_MOCK_LOCATION;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800111 private static final String ACCESS_LOCATION_EXTRA_COMMANDS =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700112 android.Manifest.permission.ACCESS_LOCATION_EXTRA_COMMANDS;
Mike Lockwood275555c2009-05-01 11:30:34 -0400113 private static final String INSTALL_LOCATION_PROVIDER =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700114 android.Manifest.permission.INSTALL_LOCATION_PROVIDER;
115
116 private static final String NETWORK_LOCATION_SERVICE_ACTION =
Stan Chesnutt39062dd2013-07-22 14:33:30 -0700117 "com.android.location.service.v3.NetworkLocationProvider";
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700118 private static final String FUSED_LOCATION_SERVICE_ACTION =
119 "com.android.location.service.FusedLocationProvider";
120
121 private static final int MSG_LOCATION_CHANGED = 1;
122
David Christie1b9b7b12013-04-15 15:31:11 -0700123 private static final long NANOS_PER_MILLI = 1000000L;
124
David Christie0b837452013-07-29 16:02:13 -0700125 // The maximum interval a location request can have and still be considered "high power".
126 private static final long HIGH_POWER_INTERVAL_MS = 5 * 60 * 1000;
127
Nick Pellyf1be6862012-05-15 10:53:42 -0700128 // Location Providers may sometimes deliver location updates
129 // slightly faster that requested - provide grace period so
130 // we don't unnecessarily filter events that are otherwise on
131 // time
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700132 private static final int MAX_PROVIDER_SCHEDULING_JITTER_MS = 100;
Nick Pellyf1be6862012-05-15 10:53:42 -0700133
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700134 private static final LocationRequest DEFAULT_LOCATION_REQUEST = new LocationRequest();
135
136 private final Context mContext;
Dianne Hackborna06de0f2012-12-11 16:34:47 -0800137 private final AppOpsManager mAppOps;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700138
139 // used internally for synchronization
140 private final Object mLock = new Object();
141
Victoria Lease5cd731a2012-12-19 15:04:21 -0800142 // --- fields below are final after systemReady() ---
Nick Pelly74fa7ea2012-08-13 19:36:38 -0700143 private LocationFudger mLocationFudger;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700144 private GeofenceManager mGeofenceManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700145 private PackageManager mPackageManager;
Victoria Lease0aa28602013-05-29 15:28:26 -0700146 private PowerManager mPowerManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700147 private GeocoderProxy mGeocodeProvider;
148 private IGpsStatusProvider mGpsStatusProvider;
149 private INetInitiatedListener mNetInitiatedListener;
150 private LocationWorkerHandler mLocationHandler;
Nick Pelly4035f5a2012-08-17 14:43:49 -0700151 private PassiveProvider mPassiveProvider; // track passive provider for special cases
152 private LocationBlacklist mBlacklist;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700153
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700154 // --- fields below are protected by mLock ---
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800155 // Set of providers that are explicitly enabled
156 private final Set<String> mEnabledProviders = new HashSet<String>();
157
158 // Set of providers that are explicitly disabled
159 private final Set<String> mDisabledProviders = new HashSet<String>();
160
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700161 // Mock (test) providers
162 private final HashMap<String, MockProvider> mMockProviders =
163 new HashMap<String, MockProvider>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800164
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700165 // all receivers
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400166 private final HashMap<Object, Receiver> mReceivers = new HashMap<Object, Receiver>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800167
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700168 // currently installed providers (with mocks replacing real providers)
Mike Lockwoodd03ff942010-02-09 08:46:14 -0500169 private final ArrayList<LocationProviderInterface> mProviders =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700170 new ArrayList<LocationProviderInterface>();
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400171
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700172 // real providers, saved here when mocked out
173 private final HashMap<String, LocationProviderInterface> mRealProviders =
174 new HashMap<String, LocationProviderInterface>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800175
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700176 // mapping from provider name to provider
177 private final HashMap<String, LocationProviderInterface> mProvidersByName =
178 new HashMap<String, LocationProviderInterface>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800179
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700180 // mapping from provider name to all its UpdateRecords
181 private final HashMap<String, ArrayList<UpdateRecord>> mRecordsByProvider =
182 new HashMap<String, ArrayList<UpdateRecord>>();
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -0700183
David Christie2ff96af2014-01-30 16:09:37 -0800184 private final LocationRequestStatistics mRequestStatistics = new LocationRequestStatistics();
185
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700186 // mapping from provider name to last known location
187 private final HashMap<String, Location> mLastLocation = new HashMap<String, Location>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800188
David Christie1b9b7b12013-04-15 15:31:11 -0700189 // same as mLastLocation, but is not updated faster than LocationFudger.FASTEST_INTERVAL_MS.
190 // locations stored here are not fudged for coarse permissions.
191 private final HashMap<String, Location> mLastLocationCoarseInterval =
192 new HashMap<String, Location>();
193
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700194 // all providers that operate over proxy, for authorizing incoming location
195 private final ArrayList<LocationProviderProxy> mProxyProviders =
196 new ArrayList<LocationProviderProxy>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800197
Victoria Lease38389b62012-09-30 11:44:22 -0700198 // current active user on the device - other users are denied location data
199 private int mCurrentUserId = UserHandle.USER_OWNER;
200
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700201 public LocationManagerService(Context context) {
202 super();
203 mContext = context;
Dianne Hackborna06de0f2012-12-11 16:34:47 -0800204 mAppOps = (AppOpsManager)context.getSystemService(Context.APP_OPS_SERVICE);
The Android Open Source Project4df24232009-03-05 14:34:35 -0800205
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700206 if (D) Log.d(TAG, "Constructed");
207
208 // most startup is deferred until systemReady()
209 }
210
Svetoslav Ganova0027152013-06-25 14:59:53 -0700211 public void systemRunning() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700212 synchronized (mLock) {
Victoria Lease5cd731a2012-12-19 15:04:21 -0800213 if (D) Log.d(TAG, "systemReady()");
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700214
Victoria Lease5cd731a2012-12-19 15:04:21 -0800215 // fetch package manager
216 mPackageManager = mContext.getPackageManager();
217
Victoria Lease0aa28602013-05-29 15:28:26 -0700218 // fetch power manager
219 mPowerManager = (PowerManager) mContext.getSystemService(Context.POWER_SERVICE);
Victoria Lease5cd731a2012-12-19 15:04:21 -0800220
221 // prepare worker thread
Dianne Hackborn8d044e82013-04-30 17:24:15 -0700222 mLocationHandler = new LocationWorkerHandler(BackgroundThread.get().getLooper());
Victoria Lease5cd731a2012-12-19 15:04:21 -0800223
224 // prepare mLocationHandler's dependents
225 mLocationFudger = new LocationFudger(mContext, mLocationHandler);
226 mBlacklist = new LocationBlacklist(mContext, mLocationHandler);
227 mBlacklist.init();
228 mGeofenceManager = new GeofenceManager(mContext, mBlacklist);
229
Dianne Hackbornc2293022013-02-06 23:14:49 -0800230 // Monitor for app ops mode changes.
Dianne Hackborn9bb0ee92013-09-22 12:31:38 -0700231 AppOpsManager.OnOpChangedListener callback
232 = new AppOpsManager.OnOpChangedInternalListener() {
233 public void onOpChanged(int op, String packageName) {
Dianne Hackbornc2293022013-02-06 23:14:49 -0800234 synchronized (mLock) {
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700235 for (Receiver receiver : mReceivers.values()) {
236 receiver.updateMonitoring(true);
237 }
Dianne Hackbornc2293022013-02-06 23:14:49 -0800238 applyAllProviderRequirementsLocked();
239 }
240 }
241 };
242 mAppOps.startWatchingMode(AppOpsManager.OP_COARSE_LOCATION, null, callback);
243
Victoria Lease5cd731a2012-12-19 15:04:21 -0800244 // prepare providers
245 loadProvidersLocked();
246 updateProvidersLocked();
247 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700248
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700249 // listen for settings changes
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700250 mContext.getContentResolver().registerContentObserver(
Laurent Tu75defb62012-11-01 16:21:52 -0700251 Settings.Secure.getUriFor(Settings.Secure.LOCATION_PROVIDERS_ALLOWED), true,
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700252 new ContentObserver(mLocationHandler) {
Victoria Lease5cd731a2012-12-19 15:04:21 -0800253 @Override
254 public void onChange(boolean selfChange) {
255 synchronized (mLock) {
256 updateProvidersLocked();
257 }
258 }
259 }, UserHandle.USER_ALL);
260 mPackageMonitor.register(mContext, mLocationHandler.getLooper(), true);
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700261
Victoria Lease38389b62012-09-30 11:44:22 -0700262 // listen for user change
263 IntentFilter intentFilter = new IntentFilter();
264 intentFilter.addAction(Intent.ACTION_USER_SWITCHED);
265
266 mContext.registerReceiverAsUser(new BroadcastReceiver() {
267 @Override
268 public void onReceive(Context context, Intent intent) {
269 String action = intent.getAction();
270 if (Intent.ACTION_USER_SWITCHED.equals(action)) {
271 switchUser(intent.getIntExtra(Intent.EXTRA_USER_HANDLE, 0));
272 }
273 }
Victoria Lease5cd731a2012-12-19 15:04:21 -0800274 }, UserHandle.ALL, intentFilter, null, mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700275 }
276
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500277 private void ensureFallbackFusedProviderPresentLocked(ArrayList<String> pkgs) {
278 PackageManager pm = mContext.getPackageManager();
279 String systemPackageName = mContext.getPackageName();
280 ArrayList<HashSet<Signature>> sigSets = ServiceWatcher.getSignatureSets(mContext, pkgs);
281
282 List<ResolveInfo> rInfos = pm.queryIntentServicesAsUser(
283 new Intent(FUSED_LOCATION_SERVICE_ACTION),
284 PackageManager.GET_META_DATA, mCurrentUserId);
285 for (ResolveInfo rInfo : rInfos) {
286 String packageName = rInfo.serviceInfo.packageName;
287
288 // Check that the signature is in the list of supported sigs. If it's not in
289 // this list the standard provider binding logic won't bind to it.
290 try {
291 PackageInfo pInfo;
292 pInfo = pm.getPackageInfo(packageName, PackageManager.GET_SIGNATURES);
293 if (!ServiceWatcher.isSignatureMatch(pInfo.signatures, sigSets)) {
294 Log.w(TAG, packageName + " resolves service " + FUSED_LOCATION_SERVICE_ACTION +
295 ", but has wrong signature, ignoring");
296 continue;
297 }
298 } catch (NameNotFoundException e) {
299 Log.e(TAG, "missing package: " + packageName);
300 continue;
301 }
302
303 // Get the version info
304 if (rInfo.serviceInfo.metaData == null) {
305 Log.w(TAG, "Found fused provider without metadata: " + packageName);
306 continue;
307 }
308
309 int version = rInfo.serviceInfo.metaData.getInt(
310 ServiceWatcher.EXTRA_SERVICE_VERSION, -1);
311 if (version == 0) {
312 // This should be the fallback fused location provider.
313
314 // Make sure it's in the system partition.
315 if ((rInfo.serviceInfo.applicationInfo.flags & ApplicationInfo.FLAG_SYSTEM) == 0) {
316 if (D) Log.d(TAG, "Fallback candidate not in /system: " + packageName);
317 continue;
318 }
319
320 // Check that the fallback is signed the same as the OS
321 // as a proxy for coreApp="true"
322 if (pm.checkSignatures(systemPackageName, packageName)
323 != PackageManager.SIGNATURE_MATCH) {
324 if (D) Log.d(TAG, "Fallback candidate not signed the same as system: "
325 + packageName);
326 continue;
327 }
328
329 // Found a valid fallback.
330 if (D) Log.d(TAG, "Found fallback provider: " + packageName);
331 return;
332 } else {
333 if (D) Log.d(TAG, "Fallback candidate not version 0: " + packageName);
334 }
335 }
336
337 throw new IllegalStateException("Unable to find a fused location provider that is in the "
338 + "system partition with version 0 and signed with the platform certificate. "
339 + "Such a package is needed to provide a default fused location provider in the "
340 + "event that no other fused location provider has been installed or is currently "
341 + "available. For example, coreOnly boot mode when decrypting the data "
342 + "partition. The fallback must also be marked coreApp=\"true\" in the manifest");
343 }
344
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700345 private void loadProvidersLocked() {
Victoria Lease5c24fd02012-10-01 11:00:50 -0700346 // create a passive location provider, which is always enabled
347 PassiveProvider passiveProvider = new PassiveProvider(this);
348 addProviderLocked(passiveProvider);
349 mEnabledProviders.add(passiveProvider.getName());
350 mPassiveProvider = passiveProvider;
Jaikumar Ganesh8ce470d2013-04-03 12:22:18 -0700351 // Create a gps location provider
352 GpsLocationProvider gpsProvider = new GpsLocationProvider(mContext, this,
353 mLocationHandler.getLooper());
Victoria Lease5c24fd02012-10-01 11:00:50 -0700354
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700355 if (GpsLocationProvider.isSupported()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700356 mGpsStatusProvider = gpsProvider.getGpsStatusProvider();
357 mNetInitiatedListener = gpsProvider.getNetInitiatedListener();
358 addProviderLocked(gpsProvider);
359 mRealProviders.put(LocationManager.GPS_PROVIDER, gpsProvider);
360 }
361
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700362 /*
363 Load package name(s) containing location provider support.
364 These packages can contain services implementing location providers:
365 Geocoder Provider, Network Location Provider, and
366 Fused Location Provider. They will each be searched for
367 service components implementing these providers.
368 The location framework also has support for installation
369 of new location providers at run-time. The new package does not
370 have to be explicitly listed here, however it must have a signature
371 that matches the signature of at least one package on this list.
372 */
373 Resources resources = mContext.getResources();
374 ArrayList<String> providerPackageNames = new ArrayList<String>();
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500375 String[] pkgs = resources.getStringArray(
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700376 com.android.internal.R.array.config_locationProviderPackageNames);
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500377 if (D) Log.d(TAG, "certificates for location providers pulled from: " +
378 Arrays.toString(pkgs));
379 if (pkgs != null) providerPackageNames.addAll(Arrays.asList(pkgs));
380
381 ensureFallbackFusedProviderPresentLocked(providerPackageNames);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700382
383 // bind to network provider
384 LocationProviderProxy networkProvider = LocationProviderProxy.createAndBind(
385 mContext,
386 LocationManager.NETWORK_PROVIDER,
387 NETWORK_LOCATION_SERVICE_ACTION,
Zhentao Sunc5fc9982013-04-17 17:47:53 -0700388 com.android.internal.R.bool.config_enableNetworkLocationOverlay,
389 com.android.internal.R.string.config_networkLocationProviderPackageName,
390 com.android.internal.R.array.config_locationProviderPackageNames,
391 mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700392 if (networkProvider != null) {
393 mRealProviders.put(LocationManager.NETWORK_PROVIDER, networkProvider);
394 mProxyProviders.add(networkProvider);
395 addProviderLocked(networkProvider);
396 } else {
397 Slog.w(TAG, "no network location provider found");
398 }
399
400 // bind to fused provider
401 LocationProviderProxy fusedLocationProvider = LocationProviderProxy.createAndBind(
402 mContext,
403 LocationManager.FUSED_PROVIDER,
404 FUSED_LOCATION_SERVICE_ACTION,
Zhentao Sunc5fc9982013-04-17 17:47:53 -0700405 com.android.internal.R.bool.config_enableFusedLocationOverlay,
406 com.android.internal.R.string.config_fusedLocationProviderPackageName,
407 com.android.internal.R.array.config_locationProviderPackageNames,
408 mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700409 if (fusedLocationProvider != null) {
410 addProviderLocked(fusedLocationProvider);
411 mProxyProviders.add(fusedLocationProvider);
412 mEnabledProviders.add(fusedLocationProvider.getName());
Kenny Rootc3575182012-10-09 12:44:40 -0700413 mRealProviders.put(LocationManager.FUSED_PROVIDER, fusedLocationProvider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700414 } else {
415 Slog.e(TAG, "no fused location provider found",
416 new IllegalStateException("Location service needs a fused location provider"));
417 }
418
419 // bind to geocoder provider
Zhentao Sunc5fc9982013-04-17 17:47:53 -0700420 mGeocodeProvider = GeocoderProxy.createAndBind(mContext,
421 com.android.internal.R.bool.config_enableGeocoderOverlay,
422 com.android.internal.R.string.config_geocoderProviderPackageName,
423 com.android.internal.R.array.config_locationProviderPackageNames,
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800424 mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700425 if (mGeocodeProvider == null) {
426 Slog.e(TAG, "no geocoder provider found");
427 }
Jaikumar Ganesh8ce470d2013-04-03 12:22:18 -0700428
destradaa1af4b022013-07-12 15:43:36 -0700429 // bind to fused provider
destradaa1af4b022013-07-12 15:43:36 -0700430 FlpHardwareProvider flpHardwareProvider = FlpHardwareProvider.getInstance(mContext);
431 FusedProxy fusedProxy = FusedProxy.createAndBind(
432 mContext,
433 mLocationHandler,
destradaa64be0c62013-08-09 15:01:49 -0700434 flpHardwareProvider.getLocationHardware(),
435 com.android.internal.R.bool.config_enableFusedLocationOverlay,
436 com.android.internal.R.string.config_fusedLocationProviderPackageName,
437 com.android.internal.R.array.config_locationProviderPackageNames);
destradaa1af4b022013-07-12 15:43:36 -0700438 if(fusedProxy == null) {
439 Slog.e(TAG, "No FusedProvider found.");
440 }
destradaa0682809a2013-08-12 18:50:30 -0700441
442 // bind to geofence provider
443 GeofenceProxy provider = GeofenceProxy.createAndBind(mContext,
444 com.android.internal.R.bool.config_enableGeofenceOverlay,
445 com.android.internal.R.string.config_geofenceProviderPackageName,
446 com.android.internal.R.array.config_locationProviderPackageNames,
447 mLocationHandler,
448 gpsProvider.getGpsGeofenceProxy(),
449 flpHardwareProvider.getGeofenceHardware());
450 if (provider == null) {
451 Slog.e(TAG, "no geofence provider found");
452 }
Ji-Hwan Lee26bdb8f2014-04-21 20:48:19 +0900453
454 String[] testProviderStrings = resources.getStringArray(
455 com.android.internal.R.array.config_testLocationProviders);
456 for (String testProviderString : testProviderStrings) {
457 String fragments[] = testProviderString.split(",");
458 String name = fragments[0].trim();
459 if (mProvidersByName.get(name) != null) {
460 throw new IllegalArgumentException("Provider \"" + name + "\" already exists");
461 }
462 ProviderProperties properties = new ProviderProperties(
463 Boolean.parseBoolean(fragments[1]) /* requiresNetwork */,
464 Boolean.parseBoolean(fragments[2]) /* requiresSatellite */,
465 Boolean.parseBoolean(fragments[3]) /* requiresCell */,
466 Boolean.parseBoolean(fragments[4]) /* hasMonetaryCost */,
467 Boolean.parseBoolean(fragments[5]) /* supportsAltitude */,
468 Boolean.parseBoolean(fragments[6]) /* supportsSpeed */,
469 Boolean.parseBoolean(fragments[7]) /* supportsBearing */,
470 Integer.parseInt(fragments[8]) /* powerRequirement */,
471 Integer.parseInt(fragments[9]) /* accuracy */);
472 addTestProviderLocked(name, properties);
473 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700474 }
Mike Lockwood9637d472009-04-02 21:41:57 -0700475
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800476 /**
Victoria Lease38389b62012-09-30 11:44:22 -0700477 * Called when the device's active user changes.
478 * @param userId the new active user's UserId
479 */
480 private void switchUser(int userId) {
Jianzheng Zhoud5c69462013-10-10 14:02:09 +0800481 if (mCurrentUserId == userId) {
482 return;
483 }
Victoria Lease83762d22012-10-03 13:51:17 -0700484 mBlacklist.switchUser(userId);
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800485 mLocationHandler.removeMessages(MSG_LOCATION_CHANGED);
Victoria Lease38389b62012-09-30 11:44:22 -0700486 synchronized (mLock) {
Victoria Leaseb711d572012-10-02 13:14:11 -0700487 mLastLocation.clear();
David Christie1b9b7b12013-04-15 15:31:11 -0700488 mLastLocationCoarseInterval.clear();
Victoria Leaseb711d572012-10-02 13:14:11 -0700489 for (LocationProviderInterface p : mProviders) {
490 updateProviderListenersLocked(p.getName(), false, mCurrentUserId);
Victoria Leaseb711d572012-10-02 13:14:11 -0700491 }
Victoria Lease38389b62012-09-30 11:44:22 -0700492 mCurrentUserId = userId;
Victoria Leaseb711d572012-10-02 13:14:11 -0700493 updateProvidersLocked();
Victoria Lease38389b62012-09-30 11:44:22 -0700494 }
495 }
496
497 /**
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800498 * A wrapper class holding either an ILocationListener or a PendingIntent to receive
499 * location updates.
500 */
Mike Lockwood48f17512009-04-23 09:12:08 -0700501 private final class Receiver implements IBinder.DeathRecipient, PendingIntent.OnFinished {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700502 final int mUid; // uid of receiver
503 final int mPid; // pid of receiver
504 final String mPackageName; // package name of receiver
Victoria Lease37425c32012-10-16 16:08:48 -0700505 final int mAllowedResolutionLevel; // resolution level allowed to receiver
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700506
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800507 final ILocationListener mListener;
508 final PendingIntent mPendingIntent;
David Christie82edc9b2013-07-19 11:31:42 -0700509 final WorkSource mWorkSource; // WorkSource for battery blame, or null to assign to caller.
David Christie40e57822013-07-30 11:36:48 -0700510 final boolean mHideFromAppOps; // True if AppOps should not monitor this receiver.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800511 final Object mKey;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700512
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400513 final HashMap<String,UpdateRecord> mUpdateRecords = new HashMap<String,UpdateRecord>();
Nick Pellyf1be6862012-05-15 10:53:42 -0700514
David Christie0b837452013-07-29 16:02:13 -0700515 // True if app ops has started monitoring this receiver for locations.
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700516 boolean mOpMonitoring;
David Christie0b837452013-07-29 16:02:13 -0700517 // True if app ops has started monitoring this receiver for high power (gps) locations.
518 boolean mOpHighPowerMonitoring;
Mike Lockwood48f17512009-04-23 09:12:08 -0700519 int mPendingBroadcasts;
Victoria Lease0aa28602013-05-29 15:28:26 -0700520 PowerManager.WakeLock mWakeLock;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800521
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700522 Receiver(ILocationListener listener, PendingIntent intent, int pid, int uid,
David Christie40e57822013-07-30 11:36:48 -0700523 String packageName, WorkSource workSource, boolean hideFromAppOps) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800524 mListener = listener;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800525 mPendingIntent = intent;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700526 if (listener != null) {
527 mKey = listener.asBinder();
528 } else {
529 mKey = intent;
530 }
Victoria Lease37425c32012-10-16 16:08:48 -0700531 mAllowedResolutionLevel = getAllowedResolutionLevel(pid, uid);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700532 mUid = uid;
533 mPid = pid;
534 mPackageName = packageName;
David Christie82edc9b2013-07-19 11:31:42 -0700535 if (workSource != null && workSource.size() <= 0) {
536 workSource = null;
537 }
538 mWorkSource = workSource;
David Christie40e57822013-07-30 11:36:48 -0700539 mHideFromAppOps = hideFromAppOps;
Victoria Lease0aa28602013-05-29 15:28:26 -0700540
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700541 updateMonitoring(true);
542
Victoria Lease0aa28602013-05-29 15:28:26 -0700543 // construct/configure wakelock
544 mWakeLock = mPowerManager.newWakeLock(PowerManager.PARTIAL_WAKE_LOCK, WAKELOCK_KEY);
David Christie82edc9b2013-07-19 11:31:42 -0700545 if (workSource == null) {
546 workSource = new WorkSource(mUid, mPackageName);
547 }
548 mWakeLock.setWorkSource(workSource);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800549 }
550
551 @Override
552 public boolean equals(Object otherObj) {
553 if (otherObj instanceof Receiver) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700554 return mKey.equals(((Receiver)otherObj).mKey);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800555 }
556 return false;
557 }
558
559 @Override
560 public int hashCode() {
561 return mKey.hashCode();
562 }
Mike Lockwood3681f262009-05-12 10:52:03 -0400563
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800564 @Override
565 public String toString() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700566 StringBuilder s = new StringBuilder();
567 s.append("Reciever[");
568 s.append(Integer.toHexString(System.identityHashCode(this)));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800569 if (mListener != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700570 s.append(" listener");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800571 } else {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700572 s.append(" intent");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800573 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700574 for (String p : mUpdateRecords.keySet()) {
575 s.append(" ").append(mUpdateRecords.get(p).toString());
576 }
577 s.append("]");
578 return s.toString();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800579 }
580
David Christie15b31912013-08-13 15:54:32 -0700581 /**
582 * Update AppOp monitoring for this receiver.
583 *
584 * @param allow If true receiver is currently active, if false it's been removed.
585 */
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700586 public void updateMonitoring(boolean allow) {
David Christie40e57822013-07-30 11:36:48 -0700587 if (mHideFromAppOps) {
588 return;
589 }
590
David Christie15b31912013-08-13 15:54:32 -0700591 boolean requestingLocation = false;
592 boolean requestingHighPowerLocation = false;
593 if (allow) {
594 // See if receiver has any enabled update records. Also note if any update records
595 // are high power (has a high power provider with an interval under a threshold).
596 for (UpdateRecord updateRecord : mUpdateRecords.values()) {
597 if (isAllowedByCurrentUserSettingsLocked(updateRecord.mProvider)) {
598 requestingLocation = true;
599 LocationProviderInterface locationProvider
David Christie2ff96af2014-01-30 16:09:37 -0800600 = mProvidersByName.get(updateRecord.mProvider);
David Christie15b31912013-08-13 15:54:32 -0700601 ProviderProperties properties = locationProvider != null
602 ? locationProvider.getProperties() : null;
603 if (properties != null
604 && properties.mPowerRequirement == Criteria.POWER_HIGH
605 && updateRecord.mRequest.getInterval() < HIGH_POWER_INTERVAL_MS) {
606 requestingHighPowerLocation = true;
607 break;
608 }
609 }
610 }
611 }
612
David Christie0b837452013-07-29 16:02:13 -0700613 // First update monitoring of any location request (including high power).
David Christie15b31912013-08-13 15:54:32 -0700614 mOpMonitoring = updateMonitoring(
615 requestingLocation,
616 mOpMonitoring,
David Christie0b837452013-07-29 16:02:13 -0700617 AppOpsManager.OP_MONITOR_LOCATION);
618
619 // Now update monitoring of high power requests only.
David Christiec750c1f2013-08-08 12:56:57 -0700620 boolean wasHighPowerMonitoring = mOpHighPowerMonitoring;
David Christie15b31912013-08-13 15:54:32 -0700621 mOpHighPowerMonitoring = updateMonitoring(
622 requestingHighPowerLocation,
623 mOpHighPowerMonitoring,
David Christie0b837452013-07-29 16:02:13 -0700624 AppOpsManager.OP_MONITOR_HIGH_POWER_LOCATION);
David Christiec750c1f2013-08-08 12:56:57 -0700625 if (mOpHighPowerMonitoring != wasHighPowerMonitoring) {
David Christie15b31912013-08-13 15:54:32 -0700626 // Send an intent to notify that a high power request has been added/removed.
David Christiec750c1f2013-08-08 12:56:57 -0700627 Intent intent = new Intent(LocationManager.HIGH_POWER_REQUEST_CHANGE_ACTION);
628 mContext.sendBroadcastAsUser(intent, UserHandle.ALL);
629 }
David Christie0b837452013-07-29 16:02:13 -0700630 }
631
632 /**
633 * Update AppOps monitoring for a single location request and op type.
634 *
635 * @param allowMonitoring True if monitoring is allowed for this request/op.
636 * @param currentlyMonitoring True if AppOps is currently monitoring this request/op.
637 * @param op AppOps code for the op to update.
638 * @return True if monitoring is on for this request/op after updating.
639 */
640 private boolean updateMonitoring(boolean allowMonitoring, boolean currentlyMonitoring,
641 int op) {
642 if (!currentlyMonitoring) {
643 if (allowMonitoring) {
644 return mAppOps.startOpNoThrow(op, mUid, mPackageName)
645 == AppOpsManager.MODE_ALLOWED;
646 }
647 } else {
648 if (!allowMonitoring || mAppOps.checkOpNoThrow(op, mUid, mPackageName)
649 != AppOpsManager.MODE_ALLOWED) {
650 mAppOps.finishOp(op, mUid, mPackageName);
651 return false;
652 }
653 }
654
655 return currentlyMonitoring;
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700656 }
657
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800658 public boolean isListener() {
659 return mListener != null;
660 }
661
662 public boolean isPendingIntent() {
663 return mPendingIntent != null;
664 }
665
666 public ILocationListener getListener() {
667 if (mListener != null) {
668 return mListener;
669 }
670 throw new IllegalStateException("Request for non-existent listener");
671 }
672
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800673 public boolean callStatusChangedLocked(String provider, int status, Bundle extras) {
674 if (mListener != null) {
675 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700676 synchronized (this) {
677 // synchronize to ensure incrementPendingBroadcastsLocked()
678 // is called before decrementPendingBroadcasts()
679 mListener.onStatusChanged(provider, status, extras);
Nick Pellye0fd6932012-07-11 10:26:13 -0700680 // call this after broadcasting so we do not increment
681 // if we throw an exeption.
682 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700683 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800684 } catch (RemoteException e) {
685 return false;
686 }
687 } else {
688 Intent statusChanged = new Intent();
Victoria Lease61ecb022012-11-13 15:12:51 -0800689 statusChanged.putExtras(new Bundle(extras));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800690 statusChanged.putExtra(LocationManager.KEY_STATUS_CHANGED, status);
691 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700692 synchronized (this) {
693 // synchronize to ensure incrementPendingBroadcastsLocked()
694 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700695 mPendingIntent.send(mContext, 0, statusChanged, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700696 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700697 // call this after broadcasting so we do not increment
698 // if we throw an exeption.
699 incrementPendingBroadcastsLocked();
700 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800701 } catch (PendingIntent.CanceledException e) {
702 return false;
703 }
704 }
705 return true;
706 }
707
708 public boolean callLocationChangedLocked(Location location) {
709 if (mListener != null) {
710 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700711 synchronized (this) {
712 // synchronize to ensure incrementPendingBroadcastsLocked()
713 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c5406a2012-11-29 16:18:01 -0800714 mListener.onLocationChanged(new Location(location));
Nick Pellye0fd6932012-07-11 10:26:13 -0700715 // call this after broadcasting so we do not increment
716 // if we throw an exeption.
717 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700718 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800719 } catch (RemoteException e) {
720 return false;
721 }
722 } else {
723 Intent locationChanged = new Intent();
Victoria Lease61ecb022012-11-13 15:12:51 -0800724 locationChanged.putExtra(LocationManager.KEY_LOCATION_CHANGED, new Location(location));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800725 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700726 synchronized (this) {
727 // synchronize to ensure incrementPendingBroadcastsLocked()
728 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700729 mPendingIntent.send(mContext, 0, locationChanged, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700730 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700731 // call this after broadcasting so we do not increment
732 // if we throw an exeption.
733 incrementPendingBroadcastsLocked();
734 }
735 } catch (PendingIntent.CanceledException e) {
736 return false;
737 }
738 }
739 return true;
740 }
741
742 public boolean callProviderEnabledLocked(String provider, boolean enabled) {
David Christie15b31912013-08-13 15:54:32 -0700743 // First update AppOp monitoring.
744 // An app may get/lose location access as providers are enabled/disabled.
745 updateMonitoring(true);
746
Mike Lockwood48f17512009-04-23 09:12:08 -0700747 if (mListener != null) {
748 try {
749 synchronized (this) {
750 // synchronize to ensure incrementPendingBroadcastsLocked()
751 // is called before decrementPendingBroadcasts()
752 if (enabled) {
753 mListener.onProviderEnabled(provider);
754 } else {
755 mListener.onProviderDisabled(provider);
756 }
Nick Pellye0fd6932012-07-11 10:26:13 -0700757 // call this after broadcasting so we do not increment
758 // if we throw an exeption.
759 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700760 }
761 } catch (RemoteException e) {
762 return false;
763 }
764 } else {
765 Intent providerIntent = new Intent();
766 providerIntent.putExtra(LocationManager.KEY_PROVIDER_ENABLED, enabled);
767 try {
768 synchronized (this) {
769 // synchronize to ensure incrementPendingBroadcastsLocked()
770 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700771 mPendingIntent.send(mContext, 0, providerIntent, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700772 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700773 // call this after broadcasting so we do not increment
774 // if we throw an exeption.
775 incrementPendingBroadcastsLocked();
776 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800777 } catch (PendingIntent.CanceledException e) {
778 return false;
779 }
780 }
781 return true;
782 }
783
Nick Pellyf1be6862012-05-15 10:53:42 -0700784 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800785 public void binderDied() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700786 if (D) Log.d(TAG, "Location listener died");
787
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400788 synchronized (mLock) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800789 removeUpdatesLocked(this);
790 }
Mike Lockwood48f17512009-04-23 09:12:08 -0700791 synchronized (this) {
Victoria Lease0aa28602013-05-29 15:28:26 -0700792 clearPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700793 }
794 }
795
Nick Pellye0fd6932012-07-11 10:26:13 -0700796 @Override
Mike Lockwood48f17512009-04-23 09:12:08 -0700797 public void onSendFinished(PendingIntent pendingIntent, Intent intent,
798 int resultCode, String resultData, Bundle resultExtras) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400799 synchronized (this) {
800 decrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700801 }
802 }
803
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400804 // this must be called while synchronized by caller in a synchronized block
805 // containing the sending of the broadcaset
806 private void incrementPendingBroadcastsLocked() {
807 if (mPendingBroadcasts++ == 0) {
Victoria Lease0aa28602013-05-29 15:28:26 -0700808 mWakeLock.acquire();
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400809 }
810 }
811
812 private void decrementPendingBroadcastsLocked() {
813 if (--mPendingBroadcasts == 0) {
Victoria Lease0aa28602013-05-29 15:28:26 -0700814 if (mWakeLock.isHeld()) {
815 mWakeLock.release();
816 }
817 }
818 }
819
820 public void clearPendingBroadcastsLocked() {
821 if (mPendingBroadcasts > 0) {
822 mPendingBroadcasts = 0;
823 if (mWakeLock.isHeld()) {
824 mWakeLock.release();
825 }
Mike Lockwood48f17512009-04-23 09:12:08 -0700826 }
827 }
828 }
829
Nick Pellye0fd6932012-07-11 10:26:13 -0700830 @Override
Mike Lockwood48f17512009-04-23 09:12:08 -0700831 public void locationCallbackFinished(ILocationListener listener) {
Dianne Hackbornf5fdca92013-06-05 14:53:33 -0700832 //Do not use getReceiverLocked here as that will add the ILocationListener to
Joshua Bartel080b61b2009-10-05 12:44:46 -0400833 //the receiver list if it is not found. If it is not found then the
834 //LocationListener was removed when it had a pending broadcast and should
835 //not be added back.
Dianne Hackbornf5fdca92013-06-05 14:53:33 -0700836 synchronized (mLock) {
837 IBinder binder = listener.asBinder();
838 Receiver receiver = mReceivers.get(binder);
839 if (receiver != null) {
840 synchronized (receiver) {
841 // so wakelock calls will succeed
842 long identity = Binder.clearCallingIdentity();
843 receiver.decrementPendingBroadcastsLocked();
844 Binder.restoreCallingIdentity(identity);
David Christie2ff96af2014-01-30 16:09:37 -0800845 }
Dianne Hackbornf5fdca92013-06-05 14:53:33 -0700846 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800847 }
848 }
849
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700850 private void addProviderLocked(LocationProviderInterface provider) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400851 mProviders.add(provider);
852 mProvidersByName.put(provider.getName(), provider);
853 }
854
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700855 private void removeProviderLocked(LocationProviderInterface provider) {
856 provider.disable();
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400857 mProviders.remove(provider);
858 mProvidersByName.remove(provider.getName());
859 }
860
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800861 /**
Victoria Lease09eeaec2013-02-05 11:34:13 -0800862 * Returns "true" if access to the specified location provider is allowed by the current
863 * user's settings. Access to all location providers is forbidden to non-location-provider
864 * processes belonging to background users.
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800865 *
866 * @param provider the name of the location provider
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800867 * @return
868 */
Victoria Lease09eeaec2013-02-05 11:34:13 -0800869 private boolean isAllowedByCurrentUserSettingsLocked(String provider) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800870 if (mEnabledProviders.contains(provider)) {
871 return true;
872 }
873 if (mDisabledProviders.contains(provider)) {
874 return false;
875 }
876 // Use system settings
877 ContentResolver resolver = mContext.getContentResolver();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800878
Victoria Leaseb711d572012-10-02 13:14:11 -0700879 return Settings.Secure.isLocationProviderEnabledForUser(resolver, provider, mCurrentUserId);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800880 }
881
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700882 /**
Victoria Lease09eeaec2013-02-05 11:34:13 -0800883 * Returns "true" if access to the specified location provider is allowed by the specified
884 * user's settings. Access to all location providers is forbidden to non-location-provider
885 * processes belonging to background users.
886 *
887 * @param provider the name of the location provider
888 * @param uid the requestor's UID
889 * @return
890 */
891 private boolean isAllowedByUserSettingsLocked(String provider, int uid) {
892 if (UserHandle.getUserId(uid) != mCurrentUserId && !isUidALocationProvider(uid)) {
893 return false;
894 }
895 return isAllowedByCurrentUserSettingsLocked(provider);
896 }
897
898 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700899 * Returns the permission string associated with the specified resolution level.
900 *
901 * @param resolutionLevel the resolution level
902 * @return the permission string
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700903 */
Victoria Lease37425c32012-10-16 16:08:48 -0700904 private String getResolutionPermission(int resolutionLevel) {
905 switch (resolutionLevel) {
906 case RESOLUTION_LEVEL_FINE:
907 return android.Manifest.permission.ACCESS_FINE_LOCATION;
908 case RESOLUTION_LEVEL_COARSE:
909 return android.Manifest.permission.ACCESS_COARSE_LOCATION;
910 default:
911 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800912 }
Victoria Leaseda479c52012-10-15 15:24:16 -0700913 }
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700914
Victoria Leaseda479c52012-10-15 15:24:16 -0700915 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700916 * Returns the resolution level allowed to the given PID/UID pair.
917 *
918 * @param pid the PID
919 * @param uid the UID
920 * @return resolution level allowed to the pid/uid pair
Victoria Leaseda479c52012-10-15 15:24:16 -0700921 */
Victoria Lease37425c32012-10-16 16:08:48 -0700922 private int getAllowedResolutionLevel(int pid, int uid) {
923 if (mContext.checkPermission(android.Manifest.permission.ACCESS_FINE_LOCATION,
924 pid, uid) == PackageManager.PERMISSION_GRANTED) {
925 return RESOLUTION_LEVEL_FINE;
926 } else if (mContext.checkPermission(android.Manifest.permission.ACCESS_COARSE_LOCATION,
927 pid, uid) == PackageManager.PERMISSION_GRANTED) {
928 return RESOLUTION_LEVEL_COARSE;
929 } else {
930 return RESOLUTION_LEVEL_NONE;
Victoria Leaseda479c52012-10-15 15:24:16 -0700931 }
Victoria Lease4fab68b2012-09-13 13:20:59 -0700932 }
933
934 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700935 * Returns the resolution level allowed to the caller
936 *
937 * @return resolution level allowed to caller
Victoria Lease4fab68b2012-09-13 13:20:59 -0700938 */
Victoria Lease37425c32012-10-16 16:08:48 -0700939 private int getCallerAllowedResolutionLevel() {
940 return getAllowedResolutionLevel(Binder.getCallingPid(), Binder.getCallingUid());
941 }
942
943 /**
944 * Throw SecurityException if specified resolution level is insufficient to use geofences.
945 *
946 * @param allowedResolutionLevel resolution level allowed to caller
947 */
948 private void checkResolutionLevelIsSufficientForGeofenceUse(int allowedResolutionLevel) {
949 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
Victoria Lease4fab68b2012-09-13 13:20:59 -0700950 throw new SecurityException("Geofence usage requires ACCESS_FINE_LOCATION permission");
951 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800952 }
953
Victoria Lease37425c32012-10-16 16:08:48 -0700954 /**
955 * Return the minimum resolution level required to use the specified location provider.
956 *
957 * @param provider the name of the location provider
958 * @return minimum resolution level required for provider
959 */
960 private int getMinimumResolutionLevelForProviderUse(String provider) {
Victoria Lease8dbb6342012-09-21 16:55:53 -0700961 if (LocationManager.GPS_PROVIDER.equals(provider) ||
962 LocationManager.PASSIVE_PROVIDER.equals(provider)) {
963 // gps and passive providers require FINE permission
Victoria Lease37425c32012-10-16 16:08:48 -0700964 return RESOLUTION_LEVEL_FINE;
Victoria Lease8dbb6342012-09-21 16:55:53 -0700965 } else if (LocationManager.NETWORK_PROVIDER.equals(provider) ||
966 LocationManager.FUSED_PROVIDER.equals(provider)) {
967 // network and fused providers are ok with COARSE or FINE
Victoria Lease37425c32012-10-16 16:08:48 -0700968 return RESOLUTION_LEVEL_COARSE;
Laurent Tu941221c2012-10-04 14:21:52 -0700969 } else {
970 // mock providers
971 LocationProviderInterface lp = mMockProviders.get(provider);
972 if (lp != null) {
973 ProviderProperties properties = lp.getProperties();
974 if (properties != null) {
975 if (properties.mRequiresSatellite) {
976 // provider requiring satellites require FINE permission
Victoria Lease37425c32012-10-16 16:08:48 -0700977 return RESOLUTION_LEVEL_FINE;
Laurent Tu941221c2012-10-04 14:21:52 -0700978 } else if (properties.mRequiresNetwork || properties.mRequiresCell) {
979 // provider requiring network and or cell require COARSE or FINE
Victoria Lease37425c32012-10-16 16:08:48 -0700980 return RESOLUTION_LEVEL_COARSE;
Laurent Tu941221c2012-10-04 14:21:52 -0700981 }
982 }
983 }
Victoria Lease8dbb6342012-09-21 16:55:53 -0700984 }
Victoria Lease37425c32012-10-16 16:08:48 -0700985 return RESOLUTION_LEVEL_FINE; // if in doubt, require FINE
Victoria Leaseda479c52012-10-15 15:24:16 -0700986 }
987
Victoria Lease37425c32012-10-16 16:08:48 -0700988 /**
989 * Throw SecurityException if specified resolution level is insufficient to use the named
990 * location provider.
991 *
992 * @param allowedResolutionLevel resolution level allowed to caller
993 * @param providerName the name of the location provider
994 */
995 private void checkResolutionLevelIsSufficientForProviderUse(int allowedResolutionLevel,
996 String providerName) {
997 int requiredResolutionLevel = getMinimumResolutionLevelForProviderUse(providerName);
998 if (allowedResolutionLevel < requiredResolutionLevel) {
999 switch (requiredResolutionLevel) {
1000 case RESOLUTION_LEVEL_FINE:
1001 throw new SecurityException("\"" + providerName + "\" location provider " +
1002 "requires ACCESS_FINE_LOCATION permission.");
1003 case RESOLUTION_LEVEL_COARSE:
1004 throw new SecurityException("\"" + providerName + "\" location provider " +
1005 "requires ACCESS_COARSE_LOCATION or ACCESS_FINE_LOCATION permission.");
1006 default:
1007 throw new SecurityException("Insufficient permission for \"" + providerName +
1008 "\" location provider.");
Victoria Leaseda479c52012-10-15 15:24:16 -07001009 }
1010 }
Victoria Lease8dbb6342012-09-21 16:55:53 -07001011 }
1012
David Christie82edc9b2013-07-19 11:31:42 -07001013 /**
1014 * Throw SecurityException if WorkSource use is not allowed (i.e. can't blame other packages
1015 * for battery).
1016 */
David Christie40e57822013-07-30 11:36:48 -07001017 private void checkDeviceStatsAllowed() {
David Christie82edc9b2013-07-19 11:31:42 -07001018 mContext.enforceCallingOrSelfPermission(
1019 android.Manifest.permission.UPDATE_DEVICE_STATS, null);
1020 }
1021
David Christie40e57822013-07-30 11:36:48 -07001022 private void checkUpdateAppOpsAllowed() {
1023 mContext.enforceCallingOrSelfPermission(
1024 android.Manifest.permission.UPDATE_APP_OPS_STATS, null);
1025 }
1026
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001027 public static int resolutionLevelToOp(int allowedResolutionLevel) {
Dianne Hackborn35654b62013-01-14 17:38:02 -08001028 if (allowedResolutionLevel != RESOLUTION_LEVEL_NONE) {
1029 if (allowedResolutionLevel == RESOLUTION_LEVEL_COARSE) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001030 return AppOpsManager.OP_COARSE_LOCATION;
Dianne Hackborn35654b62013-01-14 17:38:02 -08001031 } else {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001032 return AppOpsManager.OP_FINE_LOCATION;
Dianne Hackborn35654b62013-01-14 17:38:02 -08001033 }
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001034 }
1035 return -1;
1036 }
1037
1038 boolean reportLocationAccessNoThrow(int uid, String packageName, int allowedResolutionLevel) {
1039 int op = resolutionLevelToOp(allowedResolutionLevel);
1040 if (op >= 0) {
Dianne Hackborn35654b62013-01-14 17:38:02 -08001041 if (mAppOps.noteOpNoThrow(op, uid, packageName) != AppOpsManager.MODE_ALLOWED) {
1042 return false;
1043 }
1044 }
1045 return true;
1046 }
1047
1048 boolean checkLocationAccess(int uid, String packageName, int allowedResolutionLevel) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001049 int op = resolutionLevelToOp(allowedResolutionLevel);
1050 if (op >= 0) {
Dianne Hackborn35654b62013-01-14 17:38:02 -08001051 if (mAppOps.checkOp(op, uid, packageName) != AppOpsManager.MODE_ALLOWED) {
1052 return false;
1053 }
1054 }
1055 return true;
1056 }
1057
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001058 /**
1059 * Returns all providers by name, including passive, but excluding
Laurent Tu0d21e212012-10-02 15:33:48 -07001060 * fused, also including ones that are not permitted to
1061 * be accessed by the calling activity or are currently disabled.
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001062 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001063 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001064 public List<String> getAllProviders() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001065 ArrayList<String> out;
1066 synchronized (mLock) {
1067 out = new ArrayList<String>(mProviders.size());
1068 for (LocationProviderInterface provider : mProviders) {
1069 String name = provider.getName();
1070 if (LocationManager.FUSED_PROVIDER.equals(name)) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07001071 continue;
1072 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001073 out.add(name);
1074 }
1075 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001076
1077 if (D) Log.d(TAG, "getAllProviders()=" + out);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001078 return out;
1079 }
1080
Mike Lockwood03ca2162010-04-01 08:10:09 -07001081 /**
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001082 * Return all providers by name, that match criteria and are optionally
1083 * enabled.
1084 * Can return passive provider, but never returns fused provider.
Mike Lockwood03ca2162010-04-01 08:10:09 -07001085 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001086 @Override
1087 public List<String> getProviders(Criteria criteria, boolean enabledOnly) {
Victoria Lease37425c32012-10-16 16:08:48 -07001088 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001089 ArrayList<String> out;
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001090 int uid = Binder.getCallingUid();;
Victoria Lease269518e2012-10-29 08:25:39 -07001091 long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001092 try {
1093 synchronized (mLock) {
1094 out = new ArrayList<String>(mProviders.size());
1095 for (LocationProviderInterface provider : mProviders) {
1096 String name = provider.getName();
1097 if (LocationManager.FUSED_PROVIDER.equals(name)) {
Victoria Lease8dbb6342012-09-21 16:55:53 -07001098 continue;
1099 }
Victoria Lease37425c32012-10-16 16:08:48 -07001100 if (allowedResolutionLevel >= getMinimumResolutionLevelForProviderUse(name)) {
Victoria Lease09eeaec2013-02-05 11:34:13 -08001101 if (enabledOnly && !isAllowedByUserSettingsLocked(name, uid)) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001102 continue;
1103 }
1104 if (criteria != null && !LocationProvider.propertiesMeetCriteria(
1105 name, provider.getProperties(), criteria)) {
1106 continue;
1107 }
1108 out.add(name);
Victoria Lease8dbb6342012-09-21 16:55:53 -07001109 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001110 }
Mike Lockwood03ca2162010-04-01 08:10:09 -07001111 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001112 } finally {
1113 Binder.restoreCallingIdentity(identity);
Mike Lockwood03ca2162010-04-01 08:10:09 -07001114 }
1115
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001116 if (D) Log.d(TAG, "getProviders()=" + out);
1117 return out;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001118 }
1119
1120 /**
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001121 * Return the name of the best provider given a Criteria object.
1122 * This method has been deprecated from the public API,
Victoria Lease8dbb6342012-09-21 16:55:53 -07001123 * and the whole LocationProvider (including #meetsCriteria)
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001124 * has been deprecated as well. So this method now uses
1125 * some simplified logic.
Mike Lockwood03ca2162010-04-01 08:10:09 -07001126 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001127 @Override
Mike Lockwood03ca2162010-04-01 08:10:09 -07001128 public String getBestProvider(Criteria criteria, boolean enabledOnly) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001129 String result = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001130
1131 List<String> providers = getProviders(criteria, enabledOnly);
Victoria Lease8dbb6342012-09-21 16:55:53 -07001132 if (!providers.isEmpty()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001133 result = pickBest(providers);
1134 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
1135 return result;
1136 }
1137 providers = getProviders(null, enabledOnly);
Victoria Lease8dbb6342012-09-21 16:55:53 -07001138 if (!providers.isEmpty()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001139 result = pickBest(providers);
1140 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
1141 return result;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001142 }
1143
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001144 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
Mike Lockwood03ca2162010-04-01 08:10:09 -07001145 return null;
1146 }
1147
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001148 private String pickBest(List<String> providers) {
Victoria Lease1925e292012-09-24 17:00:18 -07001149 if (providers.contains(LocationManager.GPS_PROVIDER)) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001150 return LocationManager.GPS_PROVIDER;
Victoria Lease1925e292012-09-24 17:00:18 -07001151 } else if (providers.contains(LocationManager.NETWORK_PROVIDER)) {
1152 return LocationManager.NETWORK_PROVIDER;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001153 } else {
1154 return providers.get(0);
1155 }
1156 }
1157
Nick Pellye0fd6932012-07-11 10:26:13 -07001158 @Override
Mike Lockwood03ca2162010-04-01 08:10:09 -07001159 public boolean providerMeetsCriteria(String provider, Criteria criteria) {
1160 LocationProviderInterface p = mProvidersByName.get(provider);
1161 if (p == null) {
1162 throw new IllegalArgumentException("provider=" + provider);
1163 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001164
1165 boolean result = LocationProvider.propertiesMeetCriteria(
1166 p.getName(), p.getProperties(), criteria);
1167 if (D) Log.d(TAG, "providerMeetsCriteria(" + provider + ", " + criteria + ")=" + result);
1168 return result;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001169 }
1170
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001171 private void updateProvidersLocked() {
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001172 boolean changesMade = false;
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001173 for (int i = mProviders.size() - 1; i >= 0; i--) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001174 LocationProviderInterface p = mProviders.get(i);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001175 boolean isEnabled = p.isEnabled();
1176 String name = p.getName();
Victoria Lease09eeaec2013-02-05 11:34:13 -08001177 boolean shouldBeEnabled = isAllowedByCurrentUserSettingsLocked(name);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001178 if (isEnabled && !shouldBeEnabled) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001179 updateProviderListenersLocked(name, false, mCurrentUserId);
David Christieb084fef2013-12-18 14:33:57 -08001180 // If any provider has been disabled, clear all last locations for all providers.
1181 // This is to be on the safe side in case a provider has location derived from
1182 // this disabled provider.
1183 mLastLocation.clear();
1184 mLastLocationCoarseInterval.clear();
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001185 changesMade = true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001186 } else if (!isEnabled && shouldBeEnabled) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001187 updateProviderListenersLocked(name, true, mCurrentUserId);
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001188 changesMade = true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001189 }
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001190 }
1191 if (changesMade) {
Dianne Hackborn5ac72a22012-08-29 18:32:08 -07001192 mContext.sendBroadcastAsUser(new Intent(LocationManager.PROVIDERS_CHANGED_ACTION),
1193 UserHandle.ALL);
Tom O'Neill40a86c22013-09-03 18:05:13 -07001194 mContext.sendBroadcastAsUser(new Intent(LocationManager.MODE_CHANGED_ACTION),
1195 UserHandle.ALL);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001196 }
1197 }
1198
Victoria Leaseb711d572012-10-02 13:14:11 -07001199 private void updateProviderListenersLocked(String provider, boolean enabled, int userId) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001200 int listeners = 0;
1201
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001202 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001203 if (p == null) return;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001204
1205 ArrayList<Receiver> deadReceivers = null;
Nick Pellye0fd6932012-07-11 10:26:13 -07001206
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001207 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1208 if (records != null) {
1209 final int N = records.size();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001210 for (int i = 0; i < N; i++) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001211 UpdateRecord record = records.get(i);
Victoria Lease269518e2012-10-29 08:25:39 -07001212 if (UserHandle.getUserId(record.mReceiver.mUid) == userId) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001213 // Sends a notification message to the receiver
1214 if (!record.mReceiver.callProviderEnabledLocked(provider, enabled)) {
1215 if (deadReceivers == null) {
1216 deadReceivers = new ArrayList<Receiver>();
1217 }
1218 deadReceivers.add(record.mReceiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001219 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001220 listeners++;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001221 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001222 }
1223 }
1224
1225 if (deadReceivers != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001226 for (int i = deadReceivers.size() - 1; i >= 0; i--) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001227 removeUpdatesLocked(deadReceivers.get(i));
1228 }
1229 }
Nick Pellye0fd6932012-07-11 10:26:13 -07001230
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001231 if (enabled) {
1232 p.enable();
1233 if (listeners > 0) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001234 applyRequirementsLocked(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001235 }
1236 } else {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001237 p.disable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001238 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001239 }
1240
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001241 private void applyRequirementsLocked(String provider) {
1242 LocationProviderInterface p = mProvidersByName.get(provider);
1243 if (p == null) return;
1244
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001245 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001246 WorkSource worksource = new WorkSource();
1247 ProviderRequest providerRequest = new ProviderRequest();
1248
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001249 if (records != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001250 for (UpdateRecord record : records) {
Victoria Lease269518e2012-10-29 08:25:39 -07001251 if (UserHandle.getUserId(record.mReceiver.mUid) == mCurrentUserId) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001252 if (checkLocationAccess(record.mReceiver.mUid, record.mReceiver.mPackageName,
1253 record.mReceiver.mAllowedResolutionLevel)) {
1254 LocationRequest locationRequest = record.mRequest;
1255 providerRequest.locationRequests.add(locationRequest);
1256 if (locationRequest.getInterval() < providerRequest.interval) {
1257 providerRequest.reportLocation = true;
1258 providerRequest.interval = locationRequest.getInterval();
1259 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001260 }
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -07001261 }
1262 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001263
1264 if (providerRequest.reportLocation) {
1265 // calculate who to blame for power
1266 // This is somewhat arbitrary. We pick a threshold interval
1267 // that is slightly higher that the minimum interval, and
1268 // spread the blame across all applications with a request
1269 // under that threshold.
1270 long thresholdInterval = (providerRequest.interval + 1000) * 3 / 2;
1271 for (UpdateRecord record : records) {
Victoria Lease269518e2012-10-29 08:25:39 -07001272 if (UserHandle.getUserId(record.mReceiver.mUid) == mCurrentUserId) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001273 LocationRequest locationRequest = record.mRequest;
1274 if (locationRequest.getInterval() <= thresholdInterval) {
David Christiee55c9682013-08-22 10:10:34 -07001275 if (record.mReceiver.mWorkSource != null
1276 && record.mReceiver.mWorkSource.size() > 0
1277 && record.mReceiver.mWorkSource.getName(0) != null) {
David Christie82edc9b2013-07-19 11:31:42 -07001278 // Assign blame to another work source.
David Christiee55c9682013-08-22 10:10:34 -07001279 // Can only assign blame if the WorkSource contains names.
David Christie82edc9b2013-07-19 11:31:42 -07001280 worksource.add(record.mReceiver.mWorkSource);
1281 } else {
1282 // Assign blame to caller.
1283 worksource.add(
1284 record.mReceiver.mUid,
1285 record.mReceiver.mPackageName);
1286 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001287 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001288 }
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -07001289 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001290 }
1291 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001292
1293 if (D) Log.d(TAG, "provider request: " + provider + " " + providerRequest);
1294 p.setRequest(providerRequest, worksource);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001295 }
1296
1297 private class UpdateRecord {
1298 final String mProvider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001299 final LocationRequest mRequest;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001300 final Receiver mReceiver;
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001301 Location mLastFixBroadcast;
1302 long mLastStatusBroadcast;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001303
1304 /**
1305 * Note: must be constructed with lock held.
1306 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001307 UpdateRecord(String provider, LocationRequest request, Receiver receiver) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001308 mProvider = provider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001309 mRequest = request;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001310 mReceiver = receiver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001311
1312 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1313 if (records == null) {
1314 records = new ArrayList<UpdateRecord>();
1315 mRecordsByProvider.put(provider, records);
1316 }
1317 if (!records.contains(this)) {
1318 records.add(this);
1319 }
David Christie2ff96af2014-01-30 16:09:37 -08001320
1321 // Update statistics for historical location requests by package/provider
1322 mRequestStatistics.startRequesting(
1323 mReceiver.mPackageName, provider, request.getInterval());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001324 }
1325
1326 /**
David Christie2ff96af2014-01-30 16:09:37 -08001327 * Method to be called when a record will no longer be used.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001328 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001329 void disposeLocked(boolean removeReceiver) {
David Christie2ff96af2014-01-30 16:09:37 -08001330 mRequestStatistics.stopRequesting(mReceiver.mPackageName, mProvider);
1331
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001332 // remove from mRecordsByProvider
1333 ArrayList<UpdateRecord> globalRecords = mRecordsByProvider.get(this.mProvider);
1334 if (globalRecords != null) {
1335 globalRecords.remove(this);
1336 }
1337
1338 if (!removeReceiver) return; // the caller will handle the rest
1339
1340 // remove from Receiver#mUpdateRecords
1341 HashMap<String, UpdateRecord> receiverRecords = mReceiver.mUpdateRecords;
1342 if (receiverRecords != null) {
1343 receiverRecords.remove(this.mProvider);
1344
1345 // and also remove the Receiver if it has no more update records
1346 if (removeReceiver && receiverRecords.size() == 0) {
1347 removeUpdatesLocked(mReceiver);
1348 }
Mike Lockwood3a76fd62009-09-01 07:26:56 -04001349 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001350 }
1351
1352 @Override
1353 public String toString() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001354 StringBuilder s = new StringBuilder();
1355 s.append("UpdateRecord[");
1356 s.append(mProvider);
1357 s.append(' ').append(mReceiver.mPackageName).append('(');
1358 s.append(mReceiver.mUid).append(')');
1359 s.append(' ').append(mRequest);
1360 s.append(']');
1361 return s.toString();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001362 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001363 }
1364
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001365 private Receiver getReceiverLocked(ILocationListener listener, int pid, int uid,
David Christie40e57822013-07-30 11:36:48 -07001366 String packageName, WorkSource workSource, boolean hideFromAppOps) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001367 IBinder binder = listener.asBinder();
1368 Receiver receiver = mReceivers.get(binder);
1369 if (receiver == null) {
David Christie40e57822013-07-30 11:36:48 -07001370 receiver = new Receiver(listener, null, pid, uid, packageName, workSource,
1371 hideFromAppOps);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001372 mReceivers.put(binder, receiver);
1373
1374 try {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001375 receiver.getListener().asBinder().linkToDeath(receiver, 0);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001376 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001377 Slog.e(TAG, "linkToDeath failed:", e);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001378 return null;
1379 }
1380 }
1381 return receiver;
1382 }
1383
David Christie82edc9b2013-07-19 11:31:42 -07001384 private Receiver getReceiverLocked(PendingIntent intent, int pid, int uid, String packageName,
David Christie40e57822013-07-30 11:36:48 -07001385 WorkSource workSource, boolean hideFromAppOps) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001386 Receiver receiver = mReceivers.get(intent);
1387 if (receiver == null) {
David Christie40e57822013-07-30 11:36:48 -07001388 receiver = new Receiver(null, intent, pid, uid, packageName, workSource,
1389 hideFromAppOps);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001390 mReceivers.put(intent, receiver);
1391 }
1392 return receiver;
1393 }
1394
Victoria Lease37425c32012-10-16 16:08:48 -07001395 /**
1396 * Creates a LocationRequest based upon the supplied LocationRequest that to meets resolution
1397 * and consistency requirements.
1398 *
1399 * @param request the LocationRequest from which to create a sanitized version
Victoria Lease37425c32012-10-16 16:08:48 -07001400 * @return a version of request that meets the given resolution and consistency requirements
1401 * @hide
1402 */
1403 private LocationRequest createSanitizedRequest(LocationRequest request, int resolutionLevel) {
1404 LocationRequest sanitizedRequest = new LocationRequest(request);
1405 if (resolutionLevel < RESOLUTION_LEVEL_FINE) {
1406 switch (sanitizedRequest.getQuality()) {
Victoria Lease09016ab2012-09-16 12:33:15 -07001407 case LocationRequest.ACCURACY_FINE:
Victoria Lease37425c32012-10-16 16:08:48 -07001408 sanitizedRequest.setQuality(LocationRequest.ACCURACY_BLOCK);
Victoria Lease09016ab2012-09-16 12:33:15 -07001409 break;
1410 case LocationRequest.POWER_HIGH:
Victoria Lease37425c32012-10-16 16:08:48 -07001411 sanitizedRequest.setQuality(LocationRequest.POWER_LOW);
Victoria Lease09016ab2012-09-16 12:33:15 -07001412 break;
1413 }
1414 // throttle
Victoria Lease37425c32012-10-16 16:08:48 -07001415 if (sanitizedRequest.getInterval() < LocationFudger.FASTEST_INTERVAL_MS) {
1416 sanitizedRequest.setInterval(LocationFudger.FASTEST_INTERVAL_MS);
Victoria Lease09016ab2012-09-16 12:33:15 -07001417 }
Victoria Lease37425c32012-10-16 16:08:48 -07001418 if (sanitizedRequest.getFastestInterval() < LocationFudger.FASTEST_INTERVAL_MS) {
1419 sanitizedRequest.setFastestInterval(LocationFudger.FASTEST_INTERVAL_MS);
Victoria Lease09016ab2012-09-16 12:33:15 -07001420 }
Nick Pelly74fa7ea2012-08-13 19:36:38 -07001421 }
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001422 // make getFastestInterval() the minimum of interval and fastest interval
Victoria Lease37425c32012-10-16 16:08:48 -07001423 if (sanitizedRequest.getFastestInterval() > sanitizedRequest.getInterval()) {
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001424 request.setFastestInterval(request.getInterval());
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001425 }
Victoria Lease37425c32012-10-16 16:08:48 -07001426 return sanitizedRequest;
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001427 }
1428
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001429 private void checkPackageName(String packageName) {
Nick Pellye0fd6932012-07-11 10:26:13 -07001430 if (packageName == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001431 throw new SecurityException("invalid package name: " + packageName);
Nick Pellye0fd6932012-07-11 10:26:13 -07001432 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001433 int uid = Binder.getCallingUid();
Nick Pellye0fd6932012-07-11 10:26:13 -07001434 String[] packages = mPackageManager.getPackagesForUid(uid);
1435 if (packages == null) {
1436 throw new SecurityException("invalid UID " + uid);
1437 }
1438 for (String pkg : packages) {
1439 if (packageName.equals(pkg)) return;
1440 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001441 throw new SecurityException("invalid package name: " + packageName);
Nick Pellye0fd6932012-07-11 10:26:13 -07001442 }
1443
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001444 private void checkPendingIntent(PendingIntent intent) {
1445 if (intent == null) {
1446 throw new IllegalArgumentException("invalid pending intent: " + intent);
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001447 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001448 }
1449
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001450 private Receiver checkListenerOrIntentLocked(ILocationListener listener, PendingIntent intent,
David Christie40e57822013-07-30 11:36:48 -07001451 int pid, int uid, String packageName, WorkSource workSource, boolean hideFromAppOps) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001452 if (intent == null && listener == null) {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001453 throw new IllegalArgumentException("need either listener or intent");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001454 } else if (intent != null && listener != null) {
1455 throw new IllegalArgumentException("cannot register both listener and intent");
1456 } else if (intent != null) {
1457 checkPendingIntent(intent);
David Christie40e57822013-07-30 11:36:48 -07001458 return getReceiverLocked(intent, pid, uid, packageName, workSource, hideFromAppOps);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001459 } else {
David Christie40e57822013-07-30 11:36:48 -07001460 return getReceiverLocked(listener, pid, uid, packageName, workSource, hideFromAppOps);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001461 }
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001462 }
1463
Nick Pellye0fd6932012-07-11 10:26:13 -07001464 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001465 public void requestLocationUpdates(LocationRequest request, ILocationListener listener,
1466 PendingIntent intent, String packageName) {
1467 if (request == null) request = DEFAULT_LOCATION_REQUEST;
1468 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001469 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1470 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1471 request.getProvider());
David Christie82edc9b2013-07-19 11:31:42 -07001472 WorkSource workSource = request.getWorkSource();
1473 if (workSource != null && workSource.size() > 0) {
David Christie40e57822013-07-30 11:36:48 -07001474 checkDeviceStatsAllowed();
1475 }
1476 boolean hideFromAppOps = request.getHideFromAppOps();
1477 if (hideFromAppOps) {
1478 checkUpdateAppOpsAllowed();
David Christie82edc9b2013-07-19 11:31:42 -07001479 }
Victoria Lease37425c32012-10-16 16:08:48 -07001480 LocationRequest sanitizedRequest = createSanitizedRequest(request, allowedResolutionLevel);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001481
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001482 final int pid = Binder.getCallingPid();
1483 final int uid = Binder.getCallingUid();
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001484 // providers may use public location API's, need to clear identity
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001485 long identity = Binder.clearCallingIdentity();
1486 try {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001487 // We don't check for MODE_IGNORED here; we will do that when we go to deliver
1488 // a location.
Dianne Hackborn35654b62013-01-14 17:38:02 -08001489 checkLocationAccess(uid, packageName, allowedResolutionLevel);
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001490
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001491 synchronized (mLock) {
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001492 Receiver recevier = checkListenerOrIntentLocked(listener, intent, pid, uid,
David Christie40e57822013-07-30 11:36:48 -07001493 packageName, workSource, hideFromAppOps);
Victoria Lease37425c32012-10-16 16:08:48 -07001494 requestLocationUpdatesLocked(sanitizedRequest, recevier, pid, uid, packageName);
Mike Lockwood2d4d1bf2010-10-18 17:06:26 -04001495 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001496 } finally {
1497 Binder.restoreCallingIdentity(identity);
1498 }
1499 }
1500
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001501 private void requestLocationUpdatesLocked(LocationRequest request, Receiver receiver,
1502 int pid, int uid, String packageName) {
1503 // Figure out the provider. Either its explicitly request (legacy use cases), or
1504 // use the fused provider
1505 if (request == null) request = DEFAULT_LOCATION_REQUEST;
1506 String name = request.getProvider();
Victoria Lease09016ab2012-09-16 12:33:15 -07001507 if (name == null) {
1508 throw new IllegalArgumentException("provider name must not be null");
1509 }
Zhentao Sunc5fc9982013-04-17 17:47:53 -07001510
1511 if (D) Log.d(TAG, "request " + Integer.toHexString(System.identityHashCode(receiver))
1512 + " " + name + " " + request + " from " + packageName + "(" + uid + ")");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001513 LocationProviderInterface provider = mProvidersByName.get(name);
1514 if (provider == null) {
Victoria Leaseb30f3832013-10-13 12:15:40 -07001515 throw new IllegalArgumentException("provider doesn't exist: " + name);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001516 }
1517
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001518 UpdateRecord record = new UpdateRecord(name, request, receiver);
1519 UpdateRecord oldRecord = receiver.mUpdateRecords.put(name, record);
1520 if (oldRecord != null) {
1521 oldRecord.disposeLocked(false);
1522 }
1523
Victoria Lease09eeaec2013-02-05 11:34:13 -08001524 boolean isProviderEnabled = isAllowedByUserSettingsLocked(name, uid);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001525 if (isProviderEnabled) {
1526 applyRequirementsLocked(name);
1527 } else {
1528 // Notify the listener that updates are currently disabled
1529 receiver.callProviderEnabledLocked(name, false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001530 }
David Christie0b837452013-07-29 16:02:13 -07001531 // Update the monitoring here just in case multiple location requests were added to the
1532 // same receiver (this request may be high power and the initial might not have been).
1533 receiver.updateMonitoring(true);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001534 }
1535
Nick Pellye0fd6932012-07-11 10:26:13 -07001536 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001537 public void removeUpdates(ILocationListener listener, PendingIntent intent,
1538 String packageName) {
1539 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001540
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001541 final int pid = Binder.getCallingPid();
1542 final int uid = Binder.getCallingUid();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001543
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001544 synchronized (mLock) {
David Christie82edc9b2013-07-19 11:31:42 -07001545 WorkSource workSource = null;
David Christie40e57822013-07-30 11:36:48 -07001546 boolean hideFromAppOps = false;
1547 Receiver receiver = checkListenerOrIntentLocked(listener, intent, pid, uid,
1548 packageName, workSource, hideFromAppOps);
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001549
1550 // providers may use public location API's, need to clear identity
1551 long identity = Binder.clearCallingIdentity();
1552 try {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001553 removeUpdatesLocked(receiver);
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001554 } finally {
1555 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001556 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001557 }
1558 }
1559
1560 private void removeUpdatesLocked(Receiver receiver) {
Dianne Hackborn7ff30112012-11-08 11:12:09 -08001561 if (D) Log.i(TAG, "remove " + Integer.toHexString(System.identityHashCode(receiver)));
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001562
1563 if (mReceivers.remove(receiver.mKey) != null && receiver.isListener()) {
1564 receiver.getListener().asBinder().unlinkToDeath(receiver, 0);
1565 synchronized (receiver) {
Victoria Lease0aa28602013-05-29 15:28:26 -07001566 receiver.clearPendingBroadcastsLocked();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001567 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001568 }
1569
Dianne Hackborn1304f4a2013-07-09 18:17:27 -07001570 receiver.updateMonitoring(false);
1571
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001572 // Record which providers were associated with this listener
1573 HashSet<String> providers = new HashSet<String>();
1574 HashMap<String, UpdateRecord> oldRecords = receiver.mUpdateRecords;
1575 if (oldRecords != null) {
1576 // Call dispose() on the obsolete update records.
1577 for (UpdateRecord record : oldRecords.values()) {
David Christie2ff96af2014-01-30 16:09:37 -08001578 // Update statistics for historical location requests by package/provider
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001579 record.disposeLocked(false);
1580 }
1581 // Accumulate providers
1582 providers.addAll(oldRecords.keySet());
1583 }
1584
1585 // update provider
1586 for (String provider : providers) {
1587 // If provider is already disabled, don't need to do anything
Victoria Lease09eeaec2013-02-05 11:34:13 -08001588 if (!isAllowedByCurrentUserSettingsLocked(provider)) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001589 continue;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001590 }
1591
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001592 applyRequirementsLocked(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001593 }
1594 }
1595
Dianne Hackbornc2293022013-02-06 23:14:49 -08001596 private void applyAllProviderRequirementsLocked() {
1597 for (LocationProviderInterface p : mProviders) {
1598 // If provider is already disabled, don't need to do anything
Dianne Hackborn64d41d72013-02-07 00:33:31 -08001599 if (!isAllowedByCurrentUserSettingsLocked(p.getName())) {
Dianne Hackbornc2293022013-02-06 23:14:49 -08001600 continue;
1601 }
1602
1603 applyRequirementsLocked(p.getName());
1604 }
1605 }
1606
Nick Pellye0fd6932012-07-11 10:26:13 -07001607 @Override
Nick Pelly4035f5a2012-08-17 14:43:49 -07001608 public Location getLastLocation(LocationRequest request, String packageName) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001609 if (D) Log.d(TAG, "getLastLocation: " + request);
1610 if (request == null) request = DEFAULT_LOCATION_REQUEST;
Victoria Lease37425c32012-10-16 16:08:48 -07001611 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
Nick Pelly4035f5a2012-08-17 14:43:49 -07001612 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001613 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1614 request.getProvider());
1615 // no need to sanitize this request, as only the provider name is used
Nick Pelly4035f5a2012-08-17 14:43:49 -07001616
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001617 final int uid = Binder.getCallingUid();
1618 final long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001619 try {
1620 if (mBlacklist.isBlacklisted(packageName)) {
1621 if (D) Log.d(TAG, "not returning last loc for blacklisted app: " +
1622 packageName);
Victoria Lease09016ab2012-09-16 12:33:15 -07001623 return null;
1624 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001625
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001626 if (!reportLocationAccessNoThrow(uid, packageName, allowedResolutionLevel)) {
1627 if (D) Log.d(TAG, "not returning last loc for no op app: " +
1628 packageName);
1629 return null;
1630 }
1631
Victoria Leaseb711d572012-10-02 13:14:11 -07001632 synchronized (mLock) {
1633 // Figure out the provider. Either its explicitly request (deprecated API's),
1634 // or use the fused provider
1635 String name = request.getProvider();
1636 if (name == null) name = LocationManager.FUSED_PROVIDER;
1637 LocationProviderInterface provider = mProvidersByName.get(name);
1638 if (provider == null) return null;
1639
Victoria Lease09eeaec2013-02-05 11:34:13 -08001640 if (!isAllowedByUserSettingsLocked(name, uid)) return null;
Victoria Leaseb711d572012-10-02 13:14:11 -07001641
David Christie1b9b7b12013-04-15 15:31:11 -07001642 Location location;
1643 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
1644 // Make sure that an app with coarse permissions can't get frequent location
1645 // updates by calling LocationManager.getLastKnownLocation repeatedly.
1646 location = mLastLocationCoarseInterval.get(name);
1647 } else {
1648 location = mLastLocation.get(name);
1649 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001650 if (location == null) {
1651 return null;
1652 }
Victoria Lease37425c32012-10-16 16:08:48 -07001653 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001654 Location noGPSLocation = location.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1655 if (noGPSLocation != null) {
Dianne Hackborn6c5406a2012-11-29 16:18:01 -08001656 return new Location(mLocationFudger.getOrCreate(noGPSLocation));
Victoria Leaseb711d572012-10-02 13:14:11 -07001657 }
Victoria Lease37425c32012-10-16 16:08:48 -07001658 } else {
Dianne Hackborn6c5406a2012-11-29 16:18:01 -08001659 return new Location(location);
Victoria Lease09016ab2012-09-16 12:33:15 -07001660 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001661 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001662 return null;
1663 } finally {
1664 Binder.restoreCallingIdentity(identity);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001665 }
1666 }
1667
1668 @Override
1669 public void requestGeofence(LocationRequest request, Geofence geofence, PendingIntent intent,
1670 String packageName) {
1671 if (request == null) request = DEFAULT_LOCATION_REQUEST;
Victoria Lease37425c32012-10-16 16:08:48 -07001672 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1673 checkResolutionLevelIsSufficientForGeofenceUse(allowedResolutionLevel);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001674 checkPendingIntent(intent);
1675 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001676 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1677 request.getProvider());
1678 LocationRequest sanitizedRequest = createSanitizedRequest(request, allowedResolutionLevel);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001679
Victoria Lease37425c32012-10-16 16:08:48 -07001680 if (D) Log.d(TAG, "requestGeofence: " + sanitizedRequest + " " + geofence + " " + intent);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001681
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001682 // geo-fence manager uses the public location API, need to clear identity
1683 int uid = Binder.getCallingUid();
Victoria Lease56e675b2012-11-05 19:25:06 -08001684 if (UserHandle.getUserId(uid) != UserHandle.USER_OWNER) {
1685 // temporary measure until geofences work for secondary users
1686 Log.w(TAG, "proximity alerts are currently available only to the primary user");
1687 return;
1688 }
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001689 long identity = Binder.clearCallingIdentity();
1690 try {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001691 mGeofenceManager.addFence(sanitizedRequest, geofence, intent, allowedResolutionLevel,
1692 uid, packageName);
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001693 } finally {
1694 Binder.restoreCallingIdentity(identity);
1695 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001696 }
1697
1698 @Override
1699 public void removeGeofence(Geofence geofence, PendingIntent intent, String packageName) {
Victoria Lease37425c32012-10-16 16:08:48 -07001700 checkResolutionLevelIsSufficientForGeofenceUse(getCallerAllowedResolutionLevel());
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001701 checkPendingIntent(intent);
1702 checkPackageName(packageName);
1703
1704 if (D) Log.d(TAG, "removeGeofence: " + geofence + " " + intent);
1705
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001706 // geo-fence manager uses the public location API, need to clear identity
1707 long identity = Binder.clearCallingIdentity();
1708 try {
1709 mGeofenceManager.removeFence(geofence, intent);
1710 } finally {
1711 Binder.restoreCallingIdentity(identity);
1712 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001713 }
1714
1715
1716 @Override
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001717 public boolean addGpsStatusListener(IGpsStatusListener listener, String packageName) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001718 if (mGpsStatusProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001719 return false;
1720 }
Dianne Hackborn35654b62013-01-14 17:38:02 -08001721 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1722 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
Victoria Lease37425c32012-10-16 16:08:48 -07001723 LocationManager.GPS_PROVIDER);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001724
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001725 final int uid = Binder.getCallingUid();
1726 final long ident = Binder.clearCallingIdentity();
1727 try {
Victoria Lease3d5173d2013-02-05 16:07:32 -08001728 if (!checkLocationAccess(uid, packageName, allowedResolutionLevel)) {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001729 return false;
1730 }
1731 } finally {
1732 Binder.restoreCallingIdentity(ident);
1733 }
1734
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001735 try {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001736 mGpsStatusProvider.addGpsStatusListener(listener);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001737 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001738 Slog.e(TAG, "mGpsStatusProvider.addGpsStatusListener failed", e);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001739 return false;
1740 }
1741 return true;
1742 }
1743
Nick Pellye0fd6932012-07-11 10:26:13 -07001744 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001745 public void removeGpsStatusListener(IGpsStatusListener listener) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001746 synchronized (mLock) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001747 try {
1748 mGpsStatusProvider.removeGpsStatusListener(listener);
1749 } catch (Exception e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001750 Slog.e(TAG, "mGpsStatusProvider.removeGpsStatusListener failed", e);
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001751 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001752 }
1753 }
1754
Nick Pellye0fd6932012-07-11 10:26:13 -07001755 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001756 public boolean sendExtraCommand(String provider, String command, Bundle extras) {
Mike Lockwoodc6cc8362009-08-17 13:16:08 -04001757 if (provider == null) {
1758 // throw NullPointerException to remain compatible with previous implementation
1759 throw new NullPointerException();
1760 }
Victoria Lease37425c32012-10-16 16:08:48 -07001761 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1762 provider);
Mike Lockwoodc6cc8362009-08-17 13:16:08 -04001763
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001764 // and check for ACCESS_LOCATION_EXTRA_COMMANDS
Mike Lockwoodb7e99222009-07-07 13:18:21 -04001765 if ((mContext.checkCallingOrSelfPermission(ACCESS_LOCATION_EXTRA_COMMANDS)
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001766 != PackageManager.PERMISSION_GRANTED)) {
1767 throw new SecurityException("Requires ACCESS_LOCATION_EXTRA_COMMANDS permission");
1768 }
1769
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001770 synchronized (mLock) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001771 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001772 if (p == null) return false;
Nick Pellye0fd6932012-07-11 10:26:13 -07001773
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001774 return p.sendExtraCommand(command, extras);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001775 }
1776 }
1777
Nick Pellye0fd6932012-07-11 10:26:13 -07001778 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001779 public boolean sendNiResponse(int notifId, int userResponse) {
Mike Lockwood18ad9f62009-08-27 14:01:23 -07001780 if (Binder.getCallingUid() != Process.myUid()) {
1781 throw new SecurityException(
1782 "calling sendNiResponse from outside of the system is not allowed");
1783 }
Danke Xie22d1f9f2009-08-18 18:28:45 -04001784 try {
1785 return mNetInitiatedListener.sendNiResponse(notifId, userResponse);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001786 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001787 Slog.e(TAG, "RemoteException in LocationManagerService.sendNiResponse");
Danke Xie22d1f9f2009-08-18 18:28:45 -04001788 return false;
1789 }
1790 }
1791
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001792 /**
Mike Lockwood628fd6d2010-01-25 22:46:13 -05001793 * @return null if the provider does not exist
Alexey Tarasovf2db9fb2009-09-01 02:37:07 +11001794 * @throws SecurityException if the provider is not allowed to be
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001795 * accessed by the caller
1796 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001797 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001798 public ProviderProperties getProviderProperties(String provider) {
Laurent Tub7f9d252012-10-16 14:25:00 -07001799 if (mProvidersByName.get(provider) == null) {
David Christie2ff96af2014-01-30 16:09:37 -08001800 return null;
Laurent Tub7f9d252012-10-16 14:25:00 -07001801 }
1802
Victoria Lease37425c32012-10-16 16:08:48 -07001803 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1804 provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001805
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001806 LocationProviderInterface p;
1807 synchronized (mLock) {
1808 p = mProvidersByName.get(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001809 }
1810
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001811 if (p == null) return null;
1812 return p.getProperties();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001813 }
1814
Nick Pellye0fd6932012-07-11 10:26:13 -07001815 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001816 public boolean isProviderEnabled(String provider) {
Tom O'Neilld5759432013-09-11 11:03:03 -07001817 // Fused provider is accessed indirectly via criteria rather than the provider-based APIs,
1818 // so we discourage its use
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001819 if (LocationManager.FUSED_PROVIDER.equals(provider)) return false;
1820
Victoria Lease09eeaec2013-02-05 11:34:13 -08001821 int uid = Binder.getCallingUid();
Victoria Lease269518e2012-10-29 08:25:39 -07001822 long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001823 try {
1824 synchronized (mLock) {
1825 LocationProviderInterface p = mProvidersByName.get(provider);
1826 if (p == null) return false;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001827
Victoria Lease09eeaec2013-02-05 11:34:13 -08001828 return isAllowedByUserSettingsLocked(provider, uid);
Victoria Leaseb711d572012-10-02 13:14:11 -07001829 }
1830 } finally {
1831 Binder.restoreCallingIdentity(identity);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001832 }
1833 }
1834
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001835 /**
1836 * Returns "true" if the UID belongs to a bound location provider.
1837 *
1838 * @param uid the uid
1839 * @return true if uid belongs to a bound location provider
1840 */
1841 private boolean isUidALocationProvider(int uid) {
1842 if (uid == Process.SYSTEM_UID) {
1843 return true;
1844 }
1845 if (mGeocodeProvider != null) {
1846 if (doesPackageHaveUid(uid, mGeocodeProvider.getConnectedPackageName())) return true;
1847 }
1848 for (LocationProviderProxy proxy : mProxyProviders) {
1849 if (doesPackageHaveUid(uid, proxy.getConnectedPackageName())) return true;
1850 }
1851 return false;
1852 }
1853
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001854 private void checkCallerIsProvider() {
1855 if (mContext.checkCallingOrSelfPermission(INSTALL_LOCATION_PROVIDER)
1856 == PackageManager.PERMISSION_GRANTED) {
1857 return;
1858 }
1859
1860 // Previously we only used the INSTALL_LOCATION_PROVIDER
1861 // check. But that is system or signature
1862 // protection level which is not flexible enough for
1863 // providers installed oustide the system image. So
1864 // also allow providers with a UID matching the
1865 // currently bound package name
1866
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001867 if (isUidALocationProvider(Binder.getCallingUid())) {
1868 return;
1869 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001870
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001871 throw new SecurityException("need INSTALL_LOCATION_PROVIDER permission, " +
1872 "or UID of a currently bound location provider");
1873 }
1874
1875 private boolean doesPackageHaveUid(int uid, String packageName) {
1876 if (packageName == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001877 return false;
1878 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001879 try {
1880 ApplicationInfo appInfo = mPackageManager.getApplicationInfo(packageName, 0);
1881 if (appInfo.uid != uid) {
1882 return false;
1883 }
1884 } catch (NameNotFoundException e) {
1885 return false;
1886 }
1887 return true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001888 }
1889
Nick Pellye0fd6932012-07-11 10:26:13 -07001890 @Override
Mike Lockwooda4903f22010-02-17 06:42:23 -05001891 public void reportLocation(Location location, boolean passive) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001892 checkCallerIsProvider();
Mike Lockwood275555c2009-05-01 11:30:34 -04001893
Nick Pelly2eeeec22012-07-18 13:13:37 -07001894 if (!location.isComplete()) {
1895 Log.w(TAG, "Dropping incomplete location: " + location);
1896 return;
1897 }
1898
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001899 mLocationHandler.removeMessages(MSG_LOCATION_CHANGED, location);
1900 Message m = Message.obtain(mLocationHandler, MSG_LOCATION_CHANGED, location);
Mike Lockwooda4903f22010-02-17 06:42:23 -05001901 m.arg1 = (passive ? 1 : 0);
Mike Lockwood4e50b782009-04-03 08:24:43 -07001902 mLocationHandler.sendMessageAtFrontOfQueue(m);
1903 }
1904
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001905
Laurent Tu75defb62012-11-01 16:21:52 -07001906 private static boolean shouldBroadcastSafe(
1907 Location loc, Location lastLoc, UpdateRecord record, long now) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001908 // Always broadcast the first update
1909 if (lastLoc == null) {
1910 return true;
1911 }
1912
Nick Pellyf1be6862012-05-15 10:53:42 -07001913 // Check whether sufficient time has passed
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001914 long minTime = record.mRequest.getFastestInterval();
David Christie1b9b7b12013-04-15 15:31:11 -07001915 long delta = (loc.getElapsedRealtimeNanos() - lastLoc.getElapsedRealtimeNanos())
1916 / NANOS_PER_MILLI;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001917 if (delta < minTime - MAX_PROVIDER_SCHEDULING_JITTER_MS) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001918 return false;
1919 }
1920
1921 // Check whether sufficient distance has been traveled
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001922 double minDistance = record.mRequest.getSmallestDisplacement();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001923 if (minDistance > 0.0) {
1924 if (loc.distanceTo(lastLoc) <= minDistance) {
1925 return false;
1926 }
1927 }
1928
Laurent Tu75defb62012-11-01 16:21:52 -07001929 // Check whether sufficient number of udpates is left
1930 if (record.mRequest.getNumUpdates() <= 0) {
1931 return false;
1932 }
1933
1934 // Check whether the expiry date has passed
1935 if (record.mRequest.getExpireAt() < now) {
1936 return false;
1937 }
1938
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001939 return true;
1940 }
1941
Mike Lockwooda4903f22010-02-17 06:42:23 -05001942 private void handleLocationChangedLocked(Location location, boolean passive) {
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001943 if (D) Log.d(TAG, "incoming location: " + location);
1944
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001945 long now = SystemClock.elapsedRealtime();
Mike Lockwooda4903f22010-02-17 06:42:23 -05001946 String provider = (passive ? LocationManager.PASSIVE_PROVIDER : location.getProvider());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001947
Laurent Tu60ec50a2012-10-04 17:00:10 -07001948 // Skip if the provider is unknown.
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001949 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001950 if (p == null) return;
1951
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001952 // Update last known locations
Victoria Lease09016ab2012-09-16 12:33:15 -07001953 Location noGPSLocation = location.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1954 Location lastNoGPSLocation = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001955 Location lastLocation = mLastLocation.get(provider);
Mike Lockwood4e50b782009-04-03 08:24:43 -07001956 if (lastLocation == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001957 lastLocation = new Location(provider);
1958 mLastLocation.put(provider, lastLocation);
Victoria Lease09016ab2012-09-16 12:33:15 -07001959 } else {
1960 lastNoGPSLocation = lastLocation.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1961 if (noGPSLocation == null && lastNoGPSLocation != null) {
1962 // New location has no no-GPS location: adopt last no-GPS location. This is set
1963 // directly into location because we do not want to notify COARSE clients.
1964 location.setExtraLocation(Location.EXTRA_NO_GPS_LOCATION, lastNoGPSLocation);
1965 }
Mike Lockwood4e50b782009-04-03 08:24:43 -07001966 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001967 lastLocation.set(location);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001968
David Christie1b9b7b12013-04-15 15:31:11 -07001969 // Update last known coarse interval location if enough time has passed.
1970 Location lastLocationCoarseInterval = mLastLocationCoarseInterval.get(provider);
1971 if (lastLocationCoarseInterval == null) {
1972 lastLocationCoarseInterval = new Location(location);
1973 mLastLocationCoarseInterval.put(provider, lastLocationCoarseInterval);
1974 }
1975 long timeDiffNanos = location.getElapsedRealtimeNanos()
1976 - lastLocationCoarseInterval.getElapsedRealtimeNanos();
1977 if (timeDiffNanos > LocationFudger.FASTEST_INTERVAL_MS * NANOS_PER_MILLI) {
1978 lastLocationCoarseInterval.set(location);
1979 }
1980 // Don't ever return a coarse location that is more recent than the allowed update
1981 // interval (i.e. don't allow an app to keep registering and unregistering for
1982 // location updates to overcome the minimum interval).
1983 noGPSLocation =
1984 lastLocationCoarseInterval.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1985
Laurent Tu60ec50a2012-10-04 17:00:10 -07001986 // Skip if there are no UpdateRecords for this provider.
1987 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1988 if (records == null || records.size() == 0) return;
1989
Victoria Lease09016ab2012-09-16 12:33:15 -07001990 // Fetch coarse location
1991 Location coarseLocation = null;
David Christie1b9b7b12013-04-15 15:31:11 -07001992 if (noGPSLocation != null) {
Victoria Lease09016ab2012-09-16 12:33:15 -07001993 coarseLocation = mLocationFudger.getOrCreate(noGPSLocation);
1994 }
1995
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001996 // Fetch latest status update time
1997 long newStatusUpdateTime = p.getStatusUpdateTime();
1998
David Christie2ff96af2014-01-30 16:09:37 -08001999 // Get latest status
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002000 Bundle extras = new Bundle();
2001 int status = p.getStatus(extras);
2002
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002003 ArrayList<Receiver> deadReceivers = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002004 ArrayList<UpdateRecord> deadUpdateRecords = null;
Nick Pellye0fd6932012-07-11 10:26:13 -07002005
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002006 // Broadcast location or status to all listeners
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002007 for (UpdateRecord r : records) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002008 Receiver receiver = r.mReceiver;
Mike Lockwood03ca2162010-04-01 08:10:09 -07002009 boolean receiverDead = false;
Nick Pelly4035f5a2012-08-17 14:43:49 -07002010
Victoria Lease269518e2012-10-29 08:25:39 -07002011 int receiverUserId = UserHandle.getUserId(receiver.mUid);
Victoria Lease2f5b97c2013-05-07 14:22:02 -07002012 if (receiverUserId != mCurrentUserId && !isUidALocationProvider(receiver.mUid)) {
Victoria Leaseb711d572012-10-02 13:14:11 -07002013 if (D) {
Victoria Lease269518e2012-10-29 08:25:39 -07002014 Log.d(TAG, "skipping loc update for background user " + receiverUserId +
Victoria Leaseb711d572012-10-02 13:14:11 -07002015 " (current user: " + mCurrentUserId + ", app: " +
2016 receiver.mPackageName + ")");
2017 }
2018 continue;
2019 }
2020
Nick Pelly4035f5a2012-08-17 14:43:49 -07002021 if (mBlacklist.isBlacklisted(receiver.mPackageName)) {
2022 if (D) Log.d(TAG, "skipping loc update for blacklisted app: " +
2023 receiver.mPackageName);
2024 continue;
2025 }
2026
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08002027 if (!reportLocationAccessNoThrow(receiver.mUid, receiver.mPackageName,
2028 receiver.mAllowedResolutionLevel)) {
2029 if (D) Log.d(TAG, "skipping loc update for no op app: " +
2030 receiver.mPackageName);
2031 continue;
2032 }
2033
Victoria Lease09016ab2012-09-16 12:33:15 -07002034 Location notifyLocation = null;
Victoria Lease37425c32012-10-16 16:08:48 -07002035 if (receiver.mAllowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
2036 notifyLocation = coarseLocation; // use coarse location
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002037 } else {
Victoria Lease37425c32012-10-16 16:08:48 -07002038 notifyLocation = lastLocation; // use fine location
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002039 }
Victoria Lease09016ab2012-09-16 12:33:15 -07002040 if (notifyLocation != null) {
2041 Location lastLoc = r.mLastFixBroadcast;
Laurent Tu75defb62012-11-01 16:21:52 -07002042 if ((lastLoc == null) || shouldBroadcastSafe(notifyLocation, lastLoc, r, now)) {
Victoria Lease09016ab2012-09-16 12:33:15 -07002043 if (lastLoc == null) {
2044 lastLoc = new Location(notifyLocation);
2045 r.mLastFixBroadcast = lastLoc;
2046 } else {
2047 lastLoc.set(notifyLocation);
2048 }
2049 if (!receiver.callLocationChangedLocked(notifyLocation)) {
2050 Slog.w(TAG, "RemoteException calling onLocationChanged on " + receiver);
2051 receiverDead = true;
2052 }
Laurent Tu75defb62012-11-01 16:21:52 -07002053 r.mRequest.decrementNumUpdates();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002054 }
2055 }
2056
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002057 long prevStatusUpdateTime = r.mLastStatusBroadcast;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002058 if ((newStatusUpdateTime > prevStatusUpdateTime) &&
Victoria Lease09016ab2012-09-16 12:33:15 -07002059 (prevStatusUpdateTime != 0 || status != LocationProvider.AVAILABLE)) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002060
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002061 r.mLastStatusBroadcast = newStatusUpdateTime;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002062 if (!receiver.callStatusChangedLocked(provider, status, extras)) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07002063 receiverDead = true;
Joe Onorato8a9b2202010-02-26 18:56:32 -08002064 Slog.w(TAG, "RemoteException calling onStatusChanged on " + receiver);
Mike Lockwood03ca2162010-04-01 08:10:09 -07002065 }
2066 }
2067
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002068 // track expired records
Laurent Tu75defb62012-11-01 16:21:52 -07002069 if (r.mRequest.getNumUpdates() <= 0 || r.mRequest.getExpireAt() < now) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002070 if (deadUpdateRecords == null) {
2071 deadUpdateRecords = new ArrayList<UpdateRecord>();
2072 }
2073 deadUpdateRecords.add(r);
2074 }
2075 // track dead receivers
2076 if (receiverDead) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07002077 if (deadReceivers == null) {
2078 deadReceivers = new ArrayList<Receiver>();
2079 }
2080 if (!deadReceivers.contains(receiver)) {
2081 deadReceivers.add(receiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002082 }
2083 }
2084 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002085
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002086 // remove dead records and receivers outside the loop
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002087 if (deadReceivers != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002088 for (Receiver receiver : deadReceivers) {
2089 removeUpdatesLocked(receiver);
2090 }
2091 }
2092 if (deadUpdateRecords != null) {
2093 for (UpdateRecord r : deadUpdateRecords) {
2094 r.disposeLocked(true);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002095 }
Victoria Lease8b38b292012-12-04 15:04:43 -08002096 applyRequirementsLocked(provider);
2097 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002098 }
2099
2100 private class LocationWorkerHandler extends Handler {
Victoria Lease5cd731a2012-12-19 15:04:21 -08002101 public LocationWorkerHandler(Looper looper) {
2102 super(looper, null, true);
2103 }
2104
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002105 @Override
2106 public void handleMessage(Message msg) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002107 switch (msg.what) {
2108 case MSG_LOCATION_CHANGED:
2109 handleLocationChanged((Location) msg.obj, msg.arg1 == 1);
2110 break;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002111 }
2112 }
2113 }
2114
Victoria Lease54ca7ae2013-01-08 09:39:50 -08002115 private boolean isMockProvider(String provider) {
2116 synchronized (mLock) {
2117 return mMockProviders.containsKey(provider);
2118 }
2119 }
2120
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002121 private void handleLocationChanged(Location location, boolean passive) {
Victoria Lease54ca7ae2013-01-08 09:39:50 -08002122 // create a working copy of the incoming Location so that the service can modify it without
2123 // disturbing the caller's copy
2124 Location myLocation = new Location(location);
2125 String provider = myLocation.getProvider();
2126
2127 // set "isFromMockProvider" bit if location came from a mock provider. we do not clear this
2128 // bit if location did not come from a mock provider because passive/fused providers can
2129 // forward locations from mock providers, and should not grant them legitimacy in doing so.
2130 if (!myLocation.isFromMockProvider() && isMockProvider(provider)) {
2131 myLocation.setIsFromMockProvider(true);
2132 }
Jeff Sharkey5e613312012-01-30 11:16:20 -08002133
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002134 synchronized (mLock) {
Victoria Lease09eeaec2013-02-05 11:34:13 -08002135 if (isAllowedByCurrentUserSettingsLocked(provider)) {
2136 if (!passive) {
2137 // notify passive provider of the new location
2138 mPassiveProvider.updateLocation(myLocation);
2139 }
Victoria Lease54ca7ae2013-01-08 09:39:50 -08002140 handleLocationChangedLocked(myLocation, passive);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002141 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002142 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002143 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002144
Mike Lockwoode97ae402010-09-29 15:23:46 -04002145 private final PackageMonitor mPackageMonitor = new PackageMonitor() {
2146 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002147 public void onPackageDisappeared(String packageName, int reason) {
2148 // remove all receivers associated with this package name
2149 synchronized (mLock) {
2150 ArrayList<Receiver> deadReceivers = null;
2151
2152 for (Receiver receiver : mReceivers.values()) {
2153 if (receiver.mPackageName.equals(packageName)) {
2154 if (deadReceivers == null) {
2155 deadReceivers = new ArrayList<Receiver>();
2156 }
2157 deadReceivers.add(receiver);
2158 }
2159 }
2160
2161 // perform removal outside of mReceivers loop
2162 if (deadReceivers != null) {
2163 for (Receiver receiver : deadReceivers) {
2164 removeUpdatesLocked(receiver);
2165 }
2166 }
2167 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002168 }
Mike Lockwoode97ae402010-09-29 15:23:46 -04002169 };
2170
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002171 // Geocoder
2172
Nick Pellye0fd6932012-07-11 10:26:13 -07002173 @Override
Mike Lockwoode15735a2010-09-20 17:48:47 -04002174 public boolean geocoderIsPresent() {
Mark Vandevoorde01ac80b2010-05-21 15:43:26 -07002175 return mGeocodeProvider != null;
2176 }
2177
Nick Pellye0fd6932012-07-11 10:26:13 -07002178 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002179 public String getFromLocation(double latitude, double longitude, int maxResults,
Mike Lockwood34901402010-01-04 12:14:21 -05002180 GeocoderParams params, List<Address> addrs) {
Mike Lockwooda55c3212009-04-15 11:10:11 -04002181 if (mGeocodeProvider != null) {
Mike Lockwood628fd6d2010-01-25 22:46:13 -05002182 return mGeocodeProvider.getFromLocation(latitude, longitude, maxResults,
2183 params, addrs);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002184 }
Mike Lockwooda55c3212009-04-15 11:10:11 -04002185 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002186 }
2187
Mike Lockwooda55c3212009-04-15 11:10:11 -04002188
Nick Pellye0fd6932012-07-11 10:26:13 -07002189 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002190 public String getFromLocationName(String locationName,
Mike Lockwooda55c3212009-04-15 11:10:11 -04002191 double lowerLeftLatitude, double lowerLeftLongitude,
2192 double upperRightLatitude, double upperRightLongitude, int maxResults,
Mike Lockwood34901402010-01-04 12:14:21 -05002193 GeocoderParams params, List<Address> addrs) {
Mike Lockwooda55c3212009-04-15 11:10:11 -04002194
2195 if (mGeocodeProvider != null) {
Mike Lockwood628fd6d2010-01-25 22:46:13 -05002196 return mGeocodeProvider.getFromLocationName(locationName, lowerLeftLatitude,
2197 lowerLeftLongitude, upperRightLatitude, upperRightLongitude,
2198 maxResults, params, addrs);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002199 }
Mike Lockwooda55c3212009-04-15 11:10:11 -04002200 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002201 }
2202
2203 // Mock Providers
2204
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002205 private void checkMockPermissionsSafe() {
2206 boolean allowMocks = Settings.Secure.getInt(mContext.getContentResolver(),
2207 Settings.Secure.ALLOW_MOCK_LOCATION, 0) == 1;
2208 if (!allowMocks) {
2209 throw new SecurityException("Requires ACCESS_MOCK_LOCATION secure setting");
2210 }
2211
2212 if (mContext.checkCallingPermission(ACCESS_MOCK_LOCATION) !=
David Christie2ff96af2014-01-30 16:09:37 -08002213 PackageManager.PERMISSION_GRANTED) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002214 throw new SecurityException("Requires ACCESS_MOCK_LOCATION permission");
Nick Pellye0fd6932012-07-11 10:26:13 -07002215 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002216 }
2217
Nick Pellye0fd6932012-07-11 10:26:13 -07002218 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002219 public void addTestProvider(String name, ProviderProperties properties) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002220 checkMockPermissionsSafe();
2221
Mike Lockwooda4903f22010-02-17 06:42:23 -05002222 if (LocationManager.PASSIVE_PROVIDER.equals(name)) {
2223 throw new IllegalArgumentException("Cannot mock the passive location provider");
2224 }
2225
Mike Lockwood86328a92009-10-23 08:38:25 -04002226 long identity = Binder.clearCallingIdentity();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002227 synchronized (mLock) {
Mike Lockwood7566c1d2009-08-25 10:05:18 -07002228 // remove the real provider if we are replacing GPS or network provider
2229 if (LocationManager.GPS_PROVIDER.equals(name)
Nick Pelly1332b532012-08-21 16:25:47 -07002230 || LocationManager.NETWORK_PROVIDER.equals(name)
2231 || LocationManager.FUSED_PROVIDER.equals(name)) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05002232 LocationProviderInterface p = mProvidersByName.get(name);
2233 if (p != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002234 removeProviderLocked(p);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07002235 }
2236 }
Ji-Hwan Lee26bdb8f2014-04-21 20:48:19 +09002237 addTestProviderLocked(name, properties);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002238 updateProvidersLocked();
2239 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002240 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002241 }
2242
Ji-Hwan Lee26bdb8f2014-04-21 20:48:19 +09002243 private void addTestProviderLocked(String name, ProviderProperties properties) {
2244 if (mProvidersByName.get(name) != null) {
2245 throw new IllegalArgumentException("Provider \"" + name + "\" already exists");
2246 }
2247 MockProvider provider = new MockProvider(name, this, properties);
2248 addProviderLocked(provider);
2249 mMockProviders.put(name, provider);
2250 mLastLocation.put(name, null);
2251 mLastLocationCoarseInterval.put(name, null);
2252 }
2253
Nick Pellye0fd6932012-07-11 10:26:13 -07002254 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002255 public void removeTestProvider(String provider) {
2256 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002257 synchronized (mLock) {
Tom O'Neill07ee5d12014-03-03 17:48:35 -08002258
2259 // These methods can't be called after removing the test provider, so first make sure
Tom O'Neillfe6d3c52014-03-04 08:26:17 -08002260 // we don't leave anything dangling.
Tom O'Neill07ee5d12014-03-03 17:48:35 -08002261 clearTestProviderEnabled(provider);
2262 clearTestProviderLocation(provider);
2263 clearTestProviderStatus(provider);
2264
You Kima6d0b6f2012-10-28 03:58:44 +09002265 MockProvider mockProvider = mMockProviders.remove(provider);
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002266 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002267 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2268 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002269 long identity = Binder.clearCallingIdentity();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002270 removeProviderLocked(mProvidersByName.get(provider));
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002271
2272 // reinstate real provider if available
2273 LocationProviderInterface realProvider = mRealProviders.get(provider);
2274 if (realProvider != null) {
2275 addProviderLocked(realProvider);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07002276 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002277 mLastLocation.put(provider, null);
David Christie1b9b7b12013-04-15 15:31:11 -07002278 mLastLocationCoarseInterval.put(provider, null);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002279 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002280 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002281 }
2282 }
2283
Nick Pellye0fd6932012-07-11 10:26:13 -07002284 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002285 public void setTestProviderLocation(String provider, Location loc) {
2286 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002287 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002288 MockProvider mockProvider = mMockProviders.get(provider);
2289 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002290 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2291 }
Mike Lockwood95427cd2009-05-07 13:27:54 -04002292 // clear calling identity so INSTALL_LOCATION_PROVIDER permission is not required
2293 long identity = Binder.clearCallingIdentity();
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002294 mockProvider.setLocation(loc);
Mike Lockwood95427cd2009-05-07 13:27:54 -04002295 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002296 }
2297 }
2298
Nick Pellye0fd6932012-07-11 10:26:13 -07002299 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002300 public void clearTestProviderLocation(String provider) {
2301 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002302 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002303 MockProvider mockProvider = mMockProviders.get(provider);
2304 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002305 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2306 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002307 mockProvider.clearLocation();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002308 }
2309 }
2310
Nick Pellye0fd6932012-07-11 10:26:13 -07002311 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002312 public void setTestProviderEnabled(String provider, boolean enabled) {
2313 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002314 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002315 MockProvider mockProvider = mMockProviders.get(provider);
2316 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002317 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2318 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002319 long identity = Binder.clearCallingIdentity();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002320 if (enabled) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002321 mockProvider.enable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002322 mEnabledProviders.add(provider);
2323 mDisabledProviders.remove(provider);
2324 } else {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002325 mockProvider.disable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002326 mEnabledProviders.remove(provider);
2327 mDisabledProviders.add(provider);
2328 }
2329 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002330 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002331 }
2332 }
2333
Nick Pellye0fd6932012-07-11 10:26:13 -07002334 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002335 public void clearTestProviderEnabled(String provider) {
2336 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002337 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002338 MockProvider mockProvider = mMockProviders.get(provider);
2339 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002340 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2341 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002342 long identity = Binder.clearCallingIdentity();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002343 mEnabledProviders.remove(provider);
2344 mDisabledProviders.remove(provider);
2345 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002346 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002347 }
2348 }
2349
Nick Pellye0fd6932012-07-11 10:26:13 -07002350 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002351 public void setTestProviderStatus(String provider, int status, Bundle extras, long updateTime) {
2352 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002353 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002354 MockProvider mockProvider = mMockProviders.get(provider);
2355 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002356 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2357 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002358 mockProvider.setStatus(status, extras, updateTime);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002359 }
2360 }
2361
Nick Pellye0fd6932012-07-11 10:26:13 -07002362 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002363 public void clearTestProviderStatus(String provider) {
2364 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002365 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002366 MockProvider mockProvider = mMockProviders.get(provider);
2367 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002368 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2369 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002370 mockProvider.clearStatus();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002371 }
2372 }
2373
2374 private void log(String log) {
2375 if (Log.isLoggable(TAG, Log.VERBOSE)) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08002376 Slog.d(TAG, log);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002377 }
2378 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002379
2380 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002381 protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) {
2382 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
2383 != PackageManager.PERMISSION_GRANTED) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -04002384 pw.println("Permission Denial: can't dump LocationManagerService from from pid="
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002385 + Binder.getCallingPid()
2386 + ", uid=" + Binder.getCallingUid());
2387 return;
2388 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002389
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002390 synchronized (mLock) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002391 pw.println("Current Location Manager state:");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002392 pw.println(" Location Listeners:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002393 for (Receiver receiver : mReceivers.values()) {
2394 pw.println(" " + receiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002395 }
David Christie2ff96af2014-01-30 16:09:37 -08002396 pw.println(" Active Records by Provider:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002397 for (Map.Entry<String, ArrayList<UpdateRecord>> entry : mRecordsByProvider.entrySet()) {
2398 pw.println(" " + entry.getKey() + ":");
2399 for (UpdateRecord record : entry.getValue()) {
2400 pw.println(" " + record);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002401 }
2402 }
David Christie2ff96af2014-01-30 16:09:37 -08002403 pw.println(" Historical Records by Provider:");
2404 for (Map.Entry<PackageProviderKey, PackageStatistics> entry
2405 : mRequestStatistics.statistics.entrySet()) {
2406 PackageProviderKey key = entry.getKey();
2407 PackageStatistics stats = entry.getValue();
2408 pw.println(" " + key.packageName + ": " + key.providerName + ": " + stats);
2409 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002410 pw.println(" Last Known Locations:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002411 for (Map.Entry<String, Location> entry : mLastLocation.entrySet()) {
2412 String provider = entry.getKey();
2413 Location location = entry.getValue();
2414 pw.println(" " + provider + ": " + location);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002415 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002416
David Christie1b9b7b12013-04-15 15:31:11 -07002417 pw.println(" Last Known Locations Coarse Intervals:");
2418 for (Map.Entry<String, Location> entry : mLastLocationCoarseInterval.entrySet()) {
2419 String provider = entry.getKey();
2420 Location location = entry.getValue();
2421 pw.println(" " + provider + ": " + location);
2422 }
2423
Nick Pellye0fd6932012-07-11 10:26:13 -07002424 mGeofenceManager.dump(pw);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002425
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002426 if (mEnabledProviders.size() > 0) {
2427 pw.println(" Enabled Providers:");
2428 for (String i : mEnabledProviders) {
2429 pw.println(" " + i);
2430 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002431
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002432 }
2433 if (mDisabledProviders.size() > 0) {
2434 pw.println(" Disabled Providers:");
2435 for (String i : mDisabledProviders) {
2436 pw.println(" " + i);
2437 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002438 }
Nick Pelly4035f5a2012-08-17 14:43:49 -07002439 pw.append(" ");
2440 mBlacklist.dump(pw);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002441 if (mMockProviders.size() > 0) {
2442 pw.println(" Mock Providers:");
2443 for (Map.Entry<String, MockProvider> i : mMockProviders.entrySet()) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002444 i.getValue().dump(pw, " ");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002445 }
2446 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002447
Nick Pelly74fa7ea2012-08-13 19:36:38 -07002448 pw.append(" fudger: ");
2449 mLocationFudger.dump(fd, pw, args);
2450
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002451 if (args.length > 0 && "short".equals(args[0])) {
2452 return;
2453 }
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002454 for (LocationProviderInterface provider: mProviders) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002455 pw.print(provider.getName() + " Internal State");
2456 if (provider instanceof LocationProviderProxy) {
2457 LocationProviderProxy proxy = (LocationProviderProxy) provider;
2458 pw.print(" (" + proxy.getConnectedPackageName() + ")");
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002459 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002460 pw.println(":");
2461 provider.dump(fd, pw, args);
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002462 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002463 }
2464 }
2465}