blob: 7218a280e2e8cff20a17d60898cd7c6886a824ed [file] [log] [blame]
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2007 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server;
18
Dianne Hackborna06de0f2012-12-11 16:34:47 -080019import android.app.AppOpsManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080020import android.app.PendingIntent;
Victoria Lease38389b62012-09-30 11:44:22 -070021import android.content.BroadcastReceiver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080022import android.content.ContentResolver;
23import android.content.Context;
24import android.content.Intent;
Victoria Lease38389b62012-09-30 11:44:22 -070025import android.content.IntentFilter;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070026import android.content.pm.ApplicationInfo;
Jeff Hamiltonfbadb692012-10-05 14:21:58 -050027import android.content.pm.PackageInfo;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080028import android.content.pm.PackageManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070029import android.content.pm.PackageManager.NameNotFoundException;
Jeff Hamiltonfbadb692012-10-05 14:21:58 -050030import android.content.pm.ResolveInfo;
31import android.content.pm.Signature;
Mike Lockwood628fd6d2010-01-25 22:46:13 -050032import android.content.res.Resources;
Brian Muramatsubb95cb92012-08-29 10:43:21 -070033import android.database.ContentObserver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080034import android.location.Address;
Mike Lockwood03ca2162010-04-01 08:10:09 -070035import android.location.Criteria;
Mike Lockwood34901402010-01-04 12:14:21 -050036import android.location.GeocoderParams;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070037import android.location.Geofence;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080038import android.location.IGpsStatusListener;
Mike Lockwood15e3d0f2009-05-01 07:53:28 -040039import android.location.IGpsStatusProvider;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080040import android.location.ILocationListener;
41import android.location.ILocationManager;
Danke Xie22d1f9f2009-08-18 18:28:45 -040042import android.location.INetInitiatedListener;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080043import android.location.Location;
44import android.location.LocationManager;
45import android.location.LocationProvider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070046import android.location.LocationRequest;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080047import android.os.Binder;
48import android.os.Bundle;
49import android.os.Handler;
Victoria Lease5cd731a2012-12-19 15:04:21 -080050import android.os.HandlerThread;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080051import android.os.IBinder;
Mike Lockwood3d12b512009-04-21 23:25:35 -070052import android.os.Looper;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080053import android.os.Message;
54import android.os.PowerManager;
Mike Lockwoode932f7f2009-04-06 10:51:26 -070055import android.os.Process;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080056import android.os.RemoteException;
Dianne Hackborna06de0f2012-12-11 16:34:47 -080057import android.os.ServiceManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070058import android.os.SystemClock;
Dianne Hackborn5ac72a22012-08-29 18:32:08 -070059import android.os.UserHandle;
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -070060import android.os.WorkSource;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080061import android.provider.Settings;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080062import android.util.Log;
Joe Onorato8a9b2202010-02-26 18:56:32 -080063import android.util.Slog;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080064
Dianne Hackborna06de0f2012-12-11 16:34:47 -080065import com.android.internal.app.IAppOpsService;
Mike Lockwoode97ae402010-09-29 15:23:46 -040066import com.android.internal.content.PackageMonitor;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070067import com.android.internal.location.ProviderProperties;
68import com.android.internal.location.ProviderRequest;
Mike Lockwood43e33f22010-03-26 10:41:48 -040069import com.android.server.location.GeocoderProxy;
Nick Pellye0fd6932012-07-11 10:26:13 -070070import com.android.server.location.GeofenceManager;
Mike Lockwood43e33f22010-03-26 10:41:48 -040071import com.android.server.location.GpsLocationProvider;
Nick Pelly4035f5a2012-08-17 14:43:49 -070072import com.android.server.location.LocationBlacklist;
Nick Pelly74fa7ea2012-08-13 19:36:38 -070073import com.android.server.location.LocationFudger;
Mike Lockwood43e33f22010-03-26 10:41:48 -040074import com.android.server.location.LocationProviderInterface;
75import com.android.server.location.LocationProviderProxy;
76import com.android.server.location.MockProvider;
77import com.android.server.location.PassiveProvider;
78
79import java.io.FileDescriptor;
80import java.io.PrintWriter;
81import java.util.ArrayList;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070082import java.util.Arrays;
Mike Lockwood43e33f22010-03-26 10:41:48 -040083import java.util.HashMap;
84import java.util.HashSet;
85import java.util.List;
86import java.util.Map;
Mike Lockwood43e33f22010-03-26 10:41:48 -040087import java.util.Set;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080088
89/**
90 * The service class that manages LocationProviders and issues location
91 * updates and alerts.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080092 */
Victoria Lease5cd731a2012-12-19 15:04:21 -080093public class LocationManagerService extends ILocationManager.Stub {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080094 private static final String TAG = "LocationManagerService";
Nick Pelly6fa9ad42012-07-16 12:18:23 -070095 public static final boolean D = false;
96
97 private static final String WAKELOCK_KEY = TAG;
98 private static final String THREAD_NAME = TAG;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080099
Victoria Lease37425c32012-10-16 16:08:48 -0700100 // Location resolution level: no location data whatsoever
101 private static final int RESOLUTION_LEVEL_NONE = 0;
102 // Location resolution level: coarse location data only
103 private static final int RESOLUTION_LEVEL_COARSE = 1;
104 // Location resolution level: fine location data
105 private static final int RESOLUTION_LEVEL_FINE = 2;
106
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800107 private static final String ACCESS_MOCK_LOCATION =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700108 android.Manifest.permission.ACCESS_MOCK_LOCATION;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800109 private static final String ACCESS_LOCATION_EXTRA_COMMANDS =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700110 android.Manifest.permission.ACCESS_LOCATION_EXTRA_COMMANDS;
Mike Lockwood275555c2009-05-01 11:30:34 -0400111 private static final String INSTALL_LOCATION_PROVIDER =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700112 android.Manifest.permission.INSTALL_LOCATION_PROVIDER;
113
114 private static final String NETWORK_LOCATION_SERVICE_ACTION =
115 "com.android.location.service.v2.NetworkLocationProvider";
116 private static final String FUSED_LOCATION_SERVICE_ACTION =
117 "com.android.location.service.FusedLocationProvider";
118
119 private static final int MSG_LOCATION_CHANGED = 1;
120
Nick Pellyf1be6862012-05-15 10:53:42 -0700121 // Location Providers may sometimes deliver location updates
122 // slightly faster that requested - provide grace period so
123 // we don't unnecessarily filter events that are otherwise on
124 // time
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700125 private static final int MAX_PROVIDER_SCHEDULING_JITTER_MS = 100;
Nick Pellyf1be6862012-05-15 10:53:42 -0700126
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700127 private static final LocationRequest DEFAULT_LOCATION_REQUEST = new LocationRequest();
128
129 private final Context mContext;
Dianne Hackborna06de0f2012-12-11 16:34:47 -0800130 private final AppOpsManager mAppOps;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700131
132 // used internally for synchronization
133 private final Object mLock = new Object();
134
Victoria Lease5cd731a2012-12-19 15:04:21 -0800135 // --- fields below are final after systemReady() ---
Nick Pelly74fa7ea2012-08-13 19:36:38 -0700136 private LocationFudger mLocationFudger;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700137 private GeofenceManager mGeofenceManager;
138 private PowerManager.WakeLock mWakeLock;
139 private PackageManager mPackageManager;
140 private GeocoderProxy mGeocodeProvider;
141 private IGpsStatusProvider mGpsStatusProvider;
142 private INetInitiatedListener mNetInitiatedListener;
143 private LocationWorkerHandler mLocationHandler;
Nick Pelly4035f5a2012-08-17 14:43:49 -0700144 private PassiveProvider mPassiveProvider; // track passive provider for special cases
145 private LocationBlacklist mBlacklist;
Victoria Lease5cd731a2012-12-19 15:04:21 -0800146 private HandlerThread mHandlerThread;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700147
148 // --- fields below are protected by mWakeLock ---
149 private int mPendingBroadcasts;
150
151 // --- fields below are protected by mLock ---
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800152 // Set of providers that are explicitly enabled
153 private final Set<String> mEnabledProviders = new HashSet<String>();
154
155 // Set of providers that are explicitly disabled
156 private final Set<String> mDisabledProviders = new HashSet<String>();
157
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700158 // Mock (test) providers
159 private final HashMap<String, MockProvider> mMockProviders =
160 new HashMap<String, MockProvider>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800161
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700162 // all receivers
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400163 private final HashMap<Object, Receiver> mReceivers = new HashMap<Object, Receiver>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800164
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700165 // currently installed providers (with mocks replacing real providers)
Mike Lockwoodd03ff942010-02-09 08:46:14 -0500166 private final ArrayList<LocationProviderInterface> mProviders =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700167 new ArrayList<LocationProviderInterface>();
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400168
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700169 // real providers, saved here when mocked out
170 private final HashMap<String, LocationProviderInterface> mRealProviders =
171 new HashMap<String, LocationProviderInterface>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800172
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700173 // mapping from provider name to provider
174 private final HashMap<String, LocationProviderInterface> mProvidersByName =
175 new HashMap<String, LocationProviderInterface>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800176
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700177 // mapping from provider name to all its UpdateRecords
178 private final HashMap<String, ArrayList<UpdateRecord>> mRecordsByProvider =
179 new HashMap<String, ArrayList<UpdateRecord>>();
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -0700180
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700181 // mapping from provider name to last known location
182 private final HashMap<String, Location> mLastLocation = new HashMap<String, Location>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800183
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700184 // all providers that operate over proxy, for authorizing incoming location
185 private final ArrayList<LocationProviderProxy> mProxyProviders =
186 new ArrayList<LocationProviderProxy>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800187
Victoria Lease38389b62012-09-30 11:44:22 -0700188 // current active user on the device - other users are denied location data
189 private int mCurrentUserId = UserHandle.USER_OWNER;
190
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700191 public LocationManagerService(Context context) {
192 super();
193 mContext = context;
Dianne Hackborna06de0f2012-12-11 16:34:47 -0800194 mAppOps = (AppOpsManager)context.getSystemService(Context.APP_OPS_SERVICE);
The Android Open Source Project4df24232009-03-05 14:34:35 -0800195
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700196 if (D) Log.d(TAG, "Constructed");
197
198 // most startup is deferred until systemReady()
199 }
200
201 public void systemReady() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700202 synchronized (mLock) {
Victoria Lease5cd731a2012-12-19 15:04:21 -0800203 if (D) Log.d(TAG, "systemReady()");
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700204
Victoria Lease5cd731a2012-12-19 15:04:21 -0800205 // fetch package manager
206 mPackageManager = mContext.getPackageManager();
207
208 // prepare wake lock
209 PowerManager powerManager =
210 (PowerManager) mContext.getSystemService(Context.POWER_SERVICE);
211 mWakeLock = powerManager.newWakeLock(PowerManager.PARTIAL_WAKE_LOCK, WAKELOCK_KEY);
212
213 // prepare worker thread
214 mHandlerThread = new HandlerThread(THREAD_NAME, Process.THREAD_PRIORITY_BACKGROUND);
215 mHandlerThread.start();
216 mLocationHandler = new LocationWorkerHandler(mHandlerThread.getLooper());
217
218 // prepare mLocationHandler's dependents
219 mLocationFudger = new LocationFudger(mContext, mLocationHandler);
220 mBlacklist = new LocationBlacklist(mContext, mLocationHandler);
221 mBlacklist.init();
222 mGeofenceManager = new GeofenceManager(mContext, mBlacklist);
223
224 // prepare providers
225 loadProvidersLocked();
226 updateProvidersLocked();
227 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700228
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700229 // listen for settings changes
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700230 mContext.getContentResolver().registerContentObserver(
Laurent Tu75defb62012-11-01 16:21:52 -0700231 Settings.Secure.getUriFor(Settings.Secure.LOCATION_PROVIDERS_ALLOWED), true,
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700232 new ContentObserver(mLocationHandler) {
Victoria Lease5cd731a2012-12-19 15:04:21 -0800233 @Override
234 public void onChange(boolean selfChange) {
235 synchronized (mLock) {
236 updateProvidersLocked();
237 }
238 }
239 }, UserHandle.USER_ALL);
240 mPackageMonitor.register(mContext, mLocationHandler.getLooper(), true);
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700241
Victoria Lease38389b62012-09-30 11:44:22 -0700242 // listen for user change
243 IntentFilter intentFilter = new IntentFilter();
244 intentFilter.addAction(Intent.ACTION_USER_SWITCHED);
245
246 mContext.registerReceiverAsUser(new BroadcastReceiver() {
247 @Override
248 public void onReceive(Context context, Intent intent) {
249 String action = intent.getAction();
250 if (Intent.ACTION_USER_SWITCHED.equals(action)) {
251 switchUser(intent.getIntExtra(Intent.EXTRA_USER_HANDLE, 0));
252 }
253 }
Victoria Lease5cd731a2012-12-19 15:04:21 -0800254 }, UserHandle.ALL, intentFilter, null, mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700255 }
256
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500257 private void ensureFallbackFusedProviderPresentLocked(ArrayList<String> pkgs) {
258 PackageManager pm = mContext.getPackageManager();
259 String systemPackageName = mContext.getPackageName();
260 ArrayList<HashSet<Signature>> sigSets = ServiceWatcher.getSignatureSets(mContext, pkgs);
261
262 List<ResolveInfo> rInfos = pm.queryIntentServicesAsUser(
263 new Intent(FUSED_LOCATION_SERVICE_ACTION),
264 PackageManager.GET_META_DATA, mCurrentUserId);
265 for (ResolveInfo rInfo : rInfos) {
266 String packageName = rInfo.serviceInfo.packageName;
267
268 // Check that the signature is in the list of supported sigs. If it's not in
269 // this list the standard provider binding logic won't bind to it.
270 try {
271 PackageInfo pInfo;
272 pInfo = pm.getPackageInfo(packageName, PackageManager.GET_SIGNATURES);
273 if (!ServiceWatcher.isSignatureMatch(pInfo.signatures, sigSets)) {
274 Log.w(TAG, packageName + " resolves service " + FUSED_LOCATION_SERVICE_ACTION +
275 ", but has wrong signature, ignoring");
276 continue;
277 }
278 } catch (NameNotFoundException e) {
279 Log.e(TAG, "missing package: " + packageName);
280 continue;
281 }
282
283 // Get the version info
284 if (rInfo.serviceInfo.metaData == null) {
285 Log.w(TAG, "Found fused provider without metadata: " + packageName);
286 continue;
287 }
288
289 int version = rInfo.serviceInfo.metaData.getInt(
290 ServiceWatcher.EXTRA_SERVICE_VERSION, -1);
291 if (version == 0) {
292 // This should be the fallback fused location provider.
293
294 // Make sure it's in the system partition.
295 if ((rInfo.serviceInfo.applicationInfo.flags & ApplicationInfo.FLAG_SYSTEM) == 0) {
296 if (D) Log.d(TAG, "Fallback candidate not in /system: " + packageName);
297 continue;
298 }
299
300 // Check that the fallback is signed the same as the OS
301 // as a proxy for coreApp="true"
302 if (pm.checkSignatures(systemPackageName, packageName)
303 != PackageManager.SIGNATURE_MATCH) {
304 if (D) Log.d(TAG, "Fallback candidate not signed the same as system: "
305 + packageName);
306 continue;
307 }
308
309 // Found a valid fallback.
310 if (D) Log.d(TAG, "Found fallback provider: " + packageName);
311 return;
312 } else {
313 if (D) Log.d(TAG, "Fallback candidate not version 0: " + packageName);
314 }
315 }
316
317 throw new IllegalStateException("Unable to find a fused location provider that is in the "
318 + "system partition with version 0 and signed with the platform certificate. "
319 + "Such a package is needed to provide a default fused location provider in the "
320 + "event that no other fused location provider has been installed or is currently "
321 + "available. For example, coreOnly boot mode when decrypting the data "
322 + "partition. The fallback must also be marked coreApp=\"true\" in the manifest");
323 }
324
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700325 private void loadProvidersLocked() {
Victoria Lease5c24fd02012-10-01 11:00:50 -0700326 // create a passive location provider, which is always enabled
327 PassiveProvider passiveProvider = new PassiveProvider(this);
328 addProviderLocked(passiveProvider);
329 mEnabledProviders.add(passiveProvider.getName());
330 mPassiveProvider = passiveProvider;
331
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700332 if (GpsLocationProvider.isSupported()) {
333 // Create a gps location provider
Victoria Lease5cd731a2012-12-19 15:04:21 -0800334 GpsLocationProvider gpsProvider = new GpsLocationProvider(mContext, this,
335 mLocationHandler.getLooper());
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700336 mGpsStatusProvider = gpsProvider.getGpsStatusProvider();
337 mNetInitiatedListener = gpsProvider.getNetInitiatedListener();
338 addProviderLocked(gpsProvider);
339 mRealProviders.put(LocationManager.GPS_PROVIDER, gpsProvider);
340 }
341
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700342 /*
343 Load package name(s) containing location provider support.
344 These packages can contain services implementing location providers:
345 Geocoder Provider, Network Location Provider, and
346 Fused Location Provider. They will each be searched for
347 service components implementing these providers.
348 The location framework also has support for installation
349 of new location providers at run-time. The new package does not
350 have to be explicitly listed here, however it must have a signature
351 that matches the signature of at least one package on this list.
352 */
353 Resources resources = mContext.getResources();
354 ArrayList<String> providerPackageNames = new ArrayList<String>();
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500355 String[] pkgs = resources.getStringArray(
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700356 com.android.internal.R.array.config_locationProviderPackageNames);
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500357 if (D) Log.d(TAG, "certificates for location providers pulled from: " +
358 Arrays.toString(pkgs));
359 if (pkgs != null) providerPackageNames.addAll(Arrays.asList(pkgs));
360
361 ensureFallbackFusedProviderPresentLocked(providerPackageNames);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700362
363 // bind to network provider
364 LocationProviderProxy networkProvider = LocationProviderProxy.createAndBind(
365 mContext,
366 LocationManager.NETWORK_PROVIDER,
367 NETWORK_LOCATION_SERVICE_ACTION,
Victoria Leaseb711d572012-10-02 13:14:11 -0700368 providerPackageNames, mLocationHandler, mCurrentUserId);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700369 if (networkProvider != null) {
370 mRealProviders.put(LocationManager.NETWORK_PROVIDER, networkProvider);
371 mProxyProviders.add(networkProvider);
372 addProviderLocked(networkProvider);
373 } else {
374 Slog.w(TAG, "no network location provider found");
375 }
376
377 // bind to fused provider
378 LocationProviderProxy fusedLocationProvider = LocationProviderProxy.createAndBind(
379 mContext,
380 LocationManager.FUSED_PROVIDER,
381 FUSED_LOCATION_SERVICE_ACTION,
Victoria Leaseb711d572012-10-02 13:14:11 -0700382 providerPackageNames, mLocationHandler, mCurrentUserId);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700383 if (fusedLocationProvider != null) {
384 addProviderLocked(fusedLocationProvider);
385 mProxyProviders.add(fusedLocationProvider);
386 mEnabledProviders.add(fusedLocationProvider.getName());
Kenny Rootc3575182012-10-09 12:44:40 -0700387 mRealProviders.put(LocationManager.FUSED_PROVIDER, fusedLocationProvider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700388 } else {
389 Slog.e(TAG, "no fused location provider found",
390 new IllegalStateException("Location service needs a fused location provider"));
391 }
392
393 // bind to geocoder provider
Victoria Leaseb711d572012-10-02 13:14:11 -0700394 mGeocodeProvider = GeocoderProxy.createAndBind(mContext, providerPackageNames,
Victoria Lease5cd731a2012-12-19 15:04:21 -0800395 mLocationHandler, mCurrentUserId);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700396 if (mGeocodeProvider == null) {
397 Slog.e(TAG, "no geocoder provider found");
398 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700399 }
Mike Lockwood9637d472009-04-02 21:41:57 -0700400
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800401 /**
Victoria Lease38389b62012-09-30 11:44:22 -0700402 * Called when the device's active user changes.
403 * @param userId the new active user's UserId
404 */
405 private void switchUser(int userId) {
Victoria Lease83762d22012-10-03 13:51:17 -0700406 mBlacklist.switchUser(userId);
Victoria Lease38389b62012-09-30 11:44:22 -0700407 synchronized (mLock) {
Victoria Leaseb711d572012-10-02 13:14:11 -0700408 mLastLocation.clear();
409 for (LocationProviderInterface p : mProviders) {
410 updateProviderListenersLocked(p.getName(), false, mCurrentUserId);
Victoria Lease269518e2012-10-29 08:25:39 -0700411 p.switchUser(userId);
Victoria Leaseb711d572012-10-02 13:14:11 -0700412 }
Victoria Lease38389b62012-09-30 11:44:22 -0700413 mCurrentUserId = userId;
Victoria Leaseb711d572012-10-02 13:14:11 -0700414 updateProvidersLocked();
Victoria Lease38389b62012-09-30 11:44:22 -0700415 }
416 }
417
418 /**
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800419 * A wrapper class holding either an ILocationListener or a PendingIntent to receive
420 * location updates.
421 */
Mike Lockwood48f17512009-04-23 09:12:08 -0700422 private final class Receiver implements IBinder.DeathRecipient, PendingIntent.OnFinished {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700423 final int mUid; // uid of receiver
424 final int mPid; // pid of receiver
425 final String mPackageName; // package name of receiver
Victoria Lease37425c32012-10-16 16:08:48 -0700426 final int mAllowedResolutionLevel; // resolution level allowed to receiver
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700427
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800428 final ILocationListener mListener;
429 final PendingIntent mPendingIntent;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800430 final Object mKey;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700431
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400432 final HashMap<String,UpdateRecord> mUpdateRecords = new HashMap<String,UpdateRecord>();
Nick Pellyf1be6862012-05-15 10:53:42 -0700433
Mike Lockwood48f17512009-04-23 09:12:08 -0700434 int mPendingBroadcasts;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800435
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700436 Receiver(ILocationListener listener, PendingIntent intent, int pid, int uid,
437 String packageName) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800438 mListener = listener;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800439 mPendingIntent = intent;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700440 if (listener != null) {
441 mKey = listener.asBinder();
442 } else {
443 mKey = intent;
444 }
Victoria Lease37425c32012-10-16 16:08:48 -0700445 mAllowedResolutionLevel = getAllowedResolutionLevel(pid, uid);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700446 mUid = uid;
447 mPid = pid;
448 mPackageName = packageName;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800449 }
450
451 @Override
452 public boolean equals(Object otherObj) {
453 if (otherObj instanceof Receiver) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700454 return mKey.equals(((Receiver)otherObj).mKey);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800455 }
456 return false;
457 }
458
459 @Override
460 public int hashCode() {
461 return mKey.hashCode();
462 }
Mike Lockwood3681f262009-05-12 10:52:03 -0400463
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800464 @Override
465 public String toString() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700466 StringBuilder s = new StringBuilder();
467 s.append("Reciever[");
468 s.append(Integer.toHexString(System.identityHashCode(this)));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800469 if (mListener != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700470 s.append(" listener");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800471 } else {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700472 s.append(" intent");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800473 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700474 for (String p : mUpdateRecords.keySet()) {
475 s.append(" ").append(mUpdateRecords.get(p).toString());
476 }
477 s.append("]");
478 return s.toString();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800479 }
480
481 public boolean isListener() {
482 return mListener != null;
483 }
484
485 public boolean isPendingIntent() {
486 return mPendingIntent != null;
487 }
488
489 public ILocationListener getListener() {
490 if (mListener != null) {
491 return mListener;
492 }
493 throw new IllegalStateException("Request for non-existent listener");
494 }
495
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800496 public boolean callStatusChangedLocked(String provider, int status, Bundle extras) {
497 if (mListener != null) {
498 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700499 synchronized (this) {
500 // synchronize to ensure incrementPendingBroadcastsLocked()
501 // is called before decrementPendingBroadcasts()
502 mListener.onStatusChanged(provider, status, extras);
Nick Pellye0fd6932012-07-11 10:26:13 -0700503 // call this after broadcasting so we do not increment
504 // if we throw an exeption.
505 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700506 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800507 } catch (RemoteException e) {
508 return false;
509 }
510 } else {
511 Intent statusChanged = new Intent();
Victoria Lease61ecb022012-11-13 15:12:51 -0800512 statusChanged.putExtras(new Bundle(extras));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800513 statusChanged.putExtra(LocationManager.KEY_STATUS_CHANGED, status);
514 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700515 synchronized (this) {
516 // synchronize to ensure incrementPendingBroadcastsLocked()
517 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700518 mPendingIntent.send(mContext, 0, statusChanged, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700519 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700520 // call this after broadcasting so we do not increment
521 // if we throw an exeption.
522 incrementPendingBroadcastsLocked();
523 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800524 } catch (PendingIntent.CanceledException e) {
525 return false;
526 }
527 }
528 return true;
529 }
530
531 public boolean callLocationChangedLocked(Location location) {
Dianne Hackborn35654b62013-01-14 17:38:02 -0800532 if (!reportLocationAccessNoThrow(mUid, mPackageName, mAllowedResolutionLevel)) {
Dianne Hackborna06de0f2012-12-11 16:34:47 -0800533 return true;
534 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800535 if (mListener != null) {
536 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700537 synchronized (this) {
538 // synchronize to ensure incrementPendingBroadcastsLocked()
539 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c5406a2012-11-29 16:18:01 -0800540 mListener.onLocationChanged(new Location(location));
Nick Pellye0fd6932012-07-11 10:26:13 -0700541 // call this after broadcasting so we do not increment
542 // if we throw an exeption.
543 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700544 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800545 } catch (RemoteException e) {
546 return false;
547 }
548 } else {
549 Intent locationChanged = new Intent();
Victoria Lease61ecb022012-11-13 15:12:51 -0800550 locationChanged.putExtra(LocationManager.KEY_LOCATION_CHANGED, new Location(location));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800551 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700552 synchronized (this) {
553 // synchronize to ensure incrementPendingBroadcastsLocked()
554 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700555 mPendingIntent.send(mContext, 0, locationChanged, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700556 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700557 // call this after broadcasting so we do not increment
558 // if we throw an exeption.
559 incrementPendingBroadcastsLocked();
560 }
561 } catch (PendingIntent.CanceledException e) {
562 return false;
563 }
564 }
565 return true;
566 }
567
568 public boolean callProviderEnabledLocked(String provider, boolean enabled) {
569 if (mListener != null) {
570 try {
571 synchronized (this) {
572 // synchronize to ensure incrementPendingBroadcastsLocked()
573 // is called before decrementPendingBroadcasts()
574 if (enabled) {
575 mListener.onProviderEnabled(provider);
576 } else {
577 mListener.onProviderDisabled(provider);
578 }
Nick Pellye0fd6932012-07-11 10:26:13 -0700579 // call this after broadcasting so we do not increment
580 // if we throw an exeption.
581 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700582 }
583 } catch (RemoteException e) {
584 return false;
585 }
586 } else {
587 Intent providerIntent = new Intent();
588 providerIntent.putExtra(LocationManager.KEY_PROVIDER_ENABLED, enabled);
589 try {
590 synchronized (this) {
591 // synchronize to ensure incrementPendingBroadcastsLocked()
592 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700593 mPendingIntent.send(mContext, 0, providerIntent, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700594 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700595 // call this after broadcasting so we do not increment
596 // if we throw an exeption.
597 incrementPendingBroadcastsLocked();
598 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800599 } catch (PendingIntent.CanceledException e) {
600 return false;
601 }
602 }
603 return true;
604 }
605
Nick Pellyf1be6862012-05-15 10:53:42 -0700606 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800607 public void binderDied() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700608 if (D) Log.d(TAG, "Location listener died");
609
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400610 synchronized (mLock) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800611 removeUpdatesLocked(this);
612 }
Mike Lockwood48f17512009-04-23 09:12:08 -0700613 synchronized (this) {
614 if (mPendingBroadcasts > 0) {
615 LocationManagerService.this.decrementPendingBroadcasts();
616 mPendingBroadcasts = 0;
617 }
618 }
619 }
620
Nick Pellye0fd6932012-07-11 10:26:13 -0700621 @Override
Mike Lockwood48f17512009-04-23 09:12:08 -0700622 public void onSendFinished(PendingIntent pendingIntent, Intent intent,
623 int resultCode, String resultData, Bundle resultExtras) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400624 synchronized (this) {
625 decrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700626 }
627 }
628
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400629 // this must be called while synchronized by caller in a synchronized block
630 // containing the sending of the broadcaset
631 private void incrementPendingBroadcastsLocked() {
632 if (mPendingBroadcasts++ == 0) {
633 LocationManagerService.this.incrementPendingBroadcasts();
634 }
635 }
636
637 private void decrementPendingBroadcastsLocked() {
638 if (--mPendingBroadcasts == 0) {
639 LocationManagerService.this.decrementPendingBroadcasts();
Mike Lockwood48f17512009-04-23 09:12:08 -0700640 }
641 }
642 }
643
Nick Pellye0fd6932012-07-11 10:26:13 -0700644 @Override
Mike Lockwood48f17512009-04-23 09:12:08 -0700645 public void locationCallbackFinished(ILocationListener listener) {
Joshua Bartel080b61b2009-10-05 12:44:46 -0400646 //Do not use getReceiver here as that will add the ILocationListener to
647 //the receiver list if it is not found. If it is not found then the
648 //LocationListener was removed when it had a pending broadcast and should
649 //not be added back.
650 IBinder binder = listener.asBinder();
651 Receiver receiver = mReceivers.get(binder);
Mike Lockwood48f17512009-04-23 09:12:08 -0700652 if (receiver != null) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400653 synchronized (receiver) {
654 // so wakelock calls will succeed
655 long identity = Binder.clearCallingIdentity();
656 receiver.decrementPendingBroadcastsLocked();
657 Binder.restoreCallingIdentity(identity);
658 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800659 }
660 }
661
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700662 private void addProviderLocked(LocationProviderInterface provider) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400663 mProviders.add(provider);
664 mProvidersByName.put(provider.getName(), provider);
665 }
666
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700667 private void removeProviderLocked(LocationProviderInterface provider) {
668 provider.disable();
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400669 mProviders.remove(provider);
670 mProvidersByName.remove(provider.getName());
671 }
672
Mike Lockwood3d12b512009-04-21 23:25:35 -0700673
Victoria Lease269518e2012-10-29 08:25:39 -0700674 private boolean isAllowedBySettingsLocked(String provider, int userId) {
675 if (userId != mCurrentUserId) {
Victoria Leaseb711d572012-10-02 13:14:11 -0700676 return false;
677 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800678 if (mEnabledProviders.contains(provider)) {
679 return true;
680 }
681 if (mDisabledProviders.contains(provider)) {
682 return false;
683 }
684 // Use system settings
685 ContentResolver resolver = mContext.getContentResolver();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800686
Victoria Leaseb711d572012-10-02 13:14:11 -0700687 return Settings.Secure.isLocationProviderEnabledForUser(resolver, provider, mCurrentUserId);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800688 }
689
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700690 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700691 * Returns the permission string associated with the specified resolution level.
692 *
693 * @param resolutionLevel the resolution level
694 * @return the permission string
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700695 */
Victoria Lease37425c32012-10-16 16:08:48 -0700696 private String getResolutionPermission(int resolutionLevel) {
697 switch (resolutionLevel) {
698 case RESOLUTION_LEVEL_FINE:
699 return android.Manifest.permission.ACCESS_FINE_LOCATION;
700 case RESOLUTION_LEVEL_COARSE:
701 return android.Manifest.permission.ACCESS_COARSE_LOCATION;
702 default:
703 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800704 }
Victoria Leaseda479c52012-10-15 15:24:16 -0700705 }
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700706
Victoria Leaseda479c52012-10-15 15:24:16 -0700707 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700708 * Returns the resolution level allowed to the given PID/UID pair.
709 *
710 * @param pid the PID
711 * @param uid the UID
712 * @return resolution level allowed to the pid/uid pair
Victoria Leaseda479c52012-10-15 15:24:16 -0700713 */
Victoria Lease37425c32012-10-16 16:08:48 -0700714 private int getAllowedResolutionLevel(int pid, int uid) {
715 if (mContext.checkPermission(android.Manifest.permission.ACCESS_FINE_LOCATION,
716 pid, uid) == PackageManager.PERMISSION_GRANTED) {
717 return RESOLUTION_LEVEL_FINE;
718 } else if (mContext.checkPermission(android.Manifest.permission.ACCESS_COARSE_LOCATION,
719 pid, uid) == PackageManager.PERMISSION_GRANTED) {
720 return RESOLUTION_LEVEL_COARSE;
721 } else {
722 return RESOLUTION_LEVEL_NONE;
Victoria Leaseda479c52012-10-15 15:24:16 -0700723 }
Victoria Lease4fab68b2012-09-13 13:20:59 -0700724 }
725
726 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700727 * Returns the resolution level allowed to the caller
728 *
729 * @return resolution level allowed to caller
Victoria Lease4fab68b2012-09-13 13:20:59 -0700730 */
Victoria Lease37425c32012-10-16 16:08:48 -0700731 private int getCallerAllowedResolutionLevel() {
732 return getAllowedResolutionLevel(Binder.getCallingPid(), Binder.getCallingUid());
733 }
734
735 /**
736 * Throw SecurityException if specified resolution level is insufficient to use geofences.
737 *
738 * @param allowedResolutionLevel resolution level allowed to caller
739 */
740 private void checkResolutionLevelIsSufficientForGeofenceUse(int allowedResolutionLevel) {
741 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
Victoria Lease4fab68b2012-09-13 13:20:59 -0700742 throw new SecurityException("Geofence usage requires ACCESS_FINE_LOCATION permission");
743 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800744 }
745
Victoria Lease37425c32012-10-16 16:08:48 -0700746 /**
747 * Return the minimum resolution level required to use the specified location provider.
748 *
749 * @param provider the name of the location provider
750 * @return minimum resolution level required for provider
751 */
752 private int getMinimumResolutionLevelForProviderUse(String provider) {
Victoria Lease8dbb6342012-09-21 16:55:53 -0700753 if (LocationManager.GPS_PROVIDER.equals(provider) ||
754 LocationManager.PASSIVE_PROVIDER.equals(provider)) {
755 // gps and passive providers require FINE permission
Victoria Lease37425c32012-10-16 16:08:48 -0700756 return RESOLUTION_LEVEL_FINE;
Victoria Lease8dbb6342012-09-21 16:55:53 -0700757 } else if (LocationManager.NETWORK_PROVIDER.equals(provider) ||
758 LocationManager.FUSED_PROVIDER.equals(provider)) {
759 // network and fused providers are ok with COARSE or FINE
Victoria Lease37425c32012-10-16 16:08:48 -0700760 return RESOLUTION_LEVEL_COARSE;
Laurent Tu941221c2012-10-04 14:21:52 -0700761 } else {
762 // mock providers
763 LocationProviderInterface lp = mMockProviders.get(provider);
764 if (lp != null) {
765 ProviderProperties properties = lp.getProperties();
766 if (properties != null) {
767 if (properties.mRequiresSatellite) {
768 // provider requiring satellites require FINE permission
Victoria Lease37425c32012-10-16 16:08:48 -0700769 return RESOLUTION_LEVEL_FINE;
Laurent Tu941221c2012-10-04 14:21:52 -0700770 } else if (properties.mRequiresNetwork || properties.mRequiresCell) {
771 // provider requiring network and or cell require COARSE or FINE
Victoria Lease37425c32012-10-16 16:08:48 -0700772 return RESOLUTION_LEVEL_COARSE;
Laurent Tu941221c2012-10-04 14:21:52 -0700773 }
774 }
775 }
Victoria Lease8dbb6342012-09-21 16:55:53 -0700776 }
Victoria Lease37425c32012-10-16 16:08:48 -0700777 return RESOLUTION_LEVEL_FINE; // if in doubt, require FINE
Victoria Leaseda479c52012-10-15 15:24:16 -0700778 }
779
Victoria Lease37425c32012-10-16 16:08:48 -0700780 /**
781 * Throw SecurityException if specified resolution level is insufficient to use the named
782 * location provider.
783 *
784 * @param allowedResolutionLevel resolution level allowed to caller
785 * @param providerName the name of the location provider
786 */
787 private void checkResolutionLevelIsSufficientForProviderUse(int allowedResolutionLevel,
788 String providerName) {
789 int requiredResolutionLevel = getMinimumResolutionLevelForProviderUse(providerName);
790 if (allowedResolutionLevel < requiredResolutionLevel) {
791 switch (requiredResolutionLevel) {
792 case RESOLUTION_LEVEL_FINE:
793 throw new SecurityException("\"" + providerName + "\" location provider " +
794 "requires ACCESS_FINE_LOCATION permission.");
795 case RESOLUTION_LEVEL_COARSE:
796 throw new SecurityException("\"" + providerName + "\" location provider " +
797 "requires ACCESS_COARSE_LOCATION or ACCESS_FINE_LOCATION permission.");
798 default:
799 throw new SecurityException("Insufficient permission for \"" + providerName +
800 "\" location provider.");
Victoria Leaseda479c52012-10-15 15:24:16 -0700801 }
802 }
Victoria Lease8dbb6342012-09-21 16:55:53 -0700803 }
804
Dianne Hackborn35654b62013-01-14 17:38:02 -0800805 boolean reportLocationAccessNoThrow(int uid, String packageName, int allowedResolutionLevel) {
806 int op;
807 if (allowedResolutionLevel != RESOLUTION_LEVEL_NONE) {
808 if (allowedResolutionLevel == RESOLUTION_LEVEL_COARSE) {
809 op = AppOpsManager.OP_COARSE_LOCATION;
810 } else {
811 op = AppOpsManager.OP_FINE_LOCATION;
812 }
813 if (mAppOps.noteOpNoThrow(op, uid, packageName) != AppOpsManager.MODE_ALLOWED) {
814 return false;
815 }
816 }
817 return true;
818 }
819
820 boolean checkLocationAccess(int uid, String packageName, int allowedResolutionLevel) {
821 int op;
822 if (allowedResolutionLevel != RESOLUTION_LEVEL_NONE) {
823 if (allowedResolutionLevel == RESOLUTION_LEVEL_COARSE) {
824 op = AppOpsManager.OP_COARSE_LOCATION;
825 } else {
826 op = AppOpsManager.OP_FINE_LOCATION;
827 }
828 if (mAppOps.checkOp(op, uid, packageName) != AppOpsManager.MODE_ALLOWED) {
829 return false;
830 }
831 }
832 return true;
833 }
834
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700835 /**
836 * Returns all providers by name, including passive, but excluding
Laurent Tu0d21e212012-10-02 15:33:48 -0700837 * fused, also including ones that are not permitted to
838 * be accessed by the calling activity or are currently disabled.
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700839 */
Nick Pellye0fd6932012-07-11 10:26:13 -0700840 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800841 public List<String> getAllProviders() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700842 ArrayList<String> out;
843 synchronized (mLock) {
844 out = new ArrayList<String>(mProviders.size());
845 for (LocationProviderInterface provider : mProviders) {
846 String name = provider.getName();
847 if (LocationManager.FUSED_PROVIDER.equals(name)) {
Mike Lockwood03ca2162010-04-01 08:10:09 -0700848 continue;
849 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800850 out.add(name);
851 }
852 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700853
854 if (D) Log.d(TAG, "getAllProviders()=" + out);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800855 return out;
856 }
857
Mike Lockwood03ca2162010-04-01 08:10:09 -0700858 /**
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700859 * Return all providers by name, that match criteria and are optionally
860 * enabled.
861 * Can return passive provider, but never returns fused provider.
Mike Lockwood03ca2162010-04-01 08:10:09 -0700862 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700863 @Override
864 public List<String> getProviders(Criteria criteria, boolean enabledOnly) {
Victoria Lease37425c32012-10-16 16:08:48 -0700865 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700866 ArrayList<String> out;
Victoria Lease269518e2012-10-29 08:25:39 -0700867 int callingUserId = UserHandle.getCallingUserId();
868 long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -0700869 try {
870 synchronized (mLock) {
871 out = new ArrayList<String>(mProviders.size());
872 for (LocationProviderInterface provider : mProviders) {
873 String name = provider.getName();
874 if (LocationManager.FUSED_PROVIDER.equals(name)) {
Victoria Lease8dbb6342012-09-21 16:55:53 -0700875 continue;
876 }
Victoria Lease37425c32012-10-16 16:08:48 -0700877 if (allowedResolutionLevel >= getMinimumResolutionLevelForProviderUse(name)) {
Victoria Lease269518e2012-10-29 08:25:39 -0700878 if (enabledOnly && !isAllowedBySettingsLocked(name, callingUserId)) {
Victoria Leaseb711d572012-10-02 13:14:11 -0700879 continue;
880 }
881 if (criteria != null && !LocationProvider.propertiesMeetCriteria(
882 name, provider.getProperties(), criteria)) {
883 continue;
884 }
885 out.add(name);
Victoria Lease8dbb6342012-09-21 16:55:53 -0700886 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700887 }
Mike Lockwood03ca2162010-04-01 08:10:09 -0700888 }
Victoria Leaseb711d572012-10-02 13:14:11 -0700889 } finally {
890 Binder.restoreCallingIdentity(identity);
Mike Lockwood03ca2162010-04-01 08:10:09 -0700891 }
892
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700893 if (D) Log.d(TAG, "getProviders()=" + out);
894 return out;
Mike Lockwood03ca2162010-04-01 08:10:09 -0700895 }
896
897 /**
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700898 * Return the name of the best provider given a Criteria object.
899 * This method has been deprecated from the public API,
Victoria Lease8dbb6342012-09-21 16:55:53 -0700900 * and the whole LocationProvider (including #meetsCriteria)
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700901 * has been deprecated as well. So this method now uses
902 * some simplified logic.
Mike Lockwood03ca2162010-04-01 08:10:09 -0700903 */
Nick Pellye0fd6932012-07-11 10:26:13 -0700904 @Override
Mike Lockwood03ca2162010-04-01 08:10:09 -0700905 public String getBestProvider(Criteria criteria, boolean enabledOnly) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700906 String result = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700907
908 List<String> providers = getProviders(criteria, enabledOnly);
Victoria Lease8dbb6342012-09-21 16:55:53 -0700909 if (!providers.isEmpty()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700910 result = pickBest(providers);
911 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
912 return result;
913 }
914 providers = getProviders(null, enabledOnly);
Victoria Lease8dbb6342012-09-21 16:55:53 -0700915 if (!providers.isEmpty()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700916 result = pickBest(providers);
917 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
918 return result;
Mike Lockwood03ca2162010-04-01 08:10:09 -0700919 }
920
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700921 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
Mike Lockwood03ca2162010-04-01 08:10:09 -0700922 return null;
923 }
924
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700925 private String pickBest(List<String> providers) {
Victoria Lease1925e292012-09-24 17:00:18 -0700926 if (providers.contains(LocationManager.GPS_PROVIDER)) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700927 return LocationManager.GPS_PROVIDER;
Victoria Lease1925e292012-09-24 17:00:18 -0700928 } else if (providers.contains(LocationManager.NETWORK_PROVIDER)) {
929 return LocationManager.NETWORK_PROVIDER;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700930 } else {
931 return providers.get(0);
932 }
933 }
934
Nick Pellye0fd6932012-07-11 10:26:13 -0700935 @Override
Mike Lockwood03ca2162010-04-01 08:10:09 -0700936 public boolean providerMeetsCriteria(String provider, Criteria criteria) {
937 LocationProviderInterface p = mProvidersByName.get(provider);
938 if (p == null) {
939 throw new IllegalArgumentException("provider=" + provider);
940 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700941
942 boolean result = LocationProvider.propertiesMeetCriteria(
943 p.getName(), p.getProperties(), criteria);
944 if (D) Log.d(TAG, "providerMeetsCriteria(" + provider + ", " + criteria + ")=" + result);
945 return result;
Mike Lockwood03ca2162010-04-01 08:10:09 -0700946 }
947
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800948 private void updateProvidersLocked() {
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -0700949 boolean changesMade = false;
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400950 for (int i = mProviders.size() - 1; i >= 0; i--) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -0500951 LocationProviderInterface p = mProviders.get(i);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800952 boolean isEnabled = p.isEnabled();
953 String name = p.getName();
Victoria Lease269518e2012-10-29 08:25:39 -0700954 boolean shouldBeEnabled = isAllowedBySettingsLocked(name, mCurrentUserId);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800955 if (isEnabled && !shouldBeEnabled) {
Victoria Leaseb711d572012-10-02 13:14:11 -0700956 updateProviderListenersLocked(name, false, mCurrentUserId);
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -0700957 changesMade = true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800958 } else if (!isEnabled && shouldBeEnabled) {
Victoria Leaseb711d572012-10-02 13:14:11 -0700959 updateProviderListenersLocked(name, true, mCurrentUserId);
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -0700960 changesMade = true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800961 }
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -0700962 }
963 if (changesMade) {
Dianne Hackborn5ac72a22012-08-29 18:32:08 -0700964 mContext.sendBroadcastAsUser(new Intent(LocationManager.PROVIDERS_CHANGED_ACTION),
965 UserHandle.ALL);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800966 }
967 }
968
Victoria Leaseb711d572012-10-02 13:14:11 -0700969 private void updateProviderListenersLocked(String provider, boolean enabled, int userId) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800970 int listeners = 0;
971
Mike Lockwoodd03ff942010-02-09 08:46:14 -0500972 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700973 if (p == null) return;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800974
975 ArrayList<Receiver> deadReceivers = null;
Nick Pellye0fd6932012-07-11 10:26:13 -0700976
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800977 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
978 if (records != null) {
979 final int N = records.size();
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700980 for (int i = 0; i < N; i++) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800981 UpdateRecord record = records.get(i);
Victoria Lease269518e2012-10-29 08:25:39 -0700982 if (UserHandle.getUserId(record.mReceiver.mUid) == userId) {
Victoria Leaseb711d572012-10-02 13:14:11 -0700983 // Sends a notification message to the receiver
984 if (!record.mReceiver.callProviderEnabledLocked(provider, enabled)) {
985 if (deadReceivers == null) {
986 deadReceivers = new ArrayList<Receiver>();
987 }
988 deadReceivers.add(record.mReceiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800989 }
Victoria Leaseb711d572012-10-02 13:14:11 -0700990 listeners++;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800991 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800992 }
993 }
994
995 if (deadReceivers != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700996 for (int i = deadReceivers.size() - 1; i >= 0; i--) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800997 removeUpdatesLocked(deadReceivers.get(i));
998 }
999 }
Nick Pellye0fd6932012-07-11 10:26:13 -07001000
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001001 if (enabled) {
1002 p.enable();
1003 if (listeners > 0) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001004 applyRequirementsLocked(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001005 }
1006 } else {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001007 p.disable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001008 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001009 }
1010
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001011 private void applyRequirementsLocked(String provider) {
1012 LocationProviderInterface p = mProvidersByName.get(provider);
1013 if (p == null) return;
1014
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001015 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001016 WorkSource worksource = new WorkSource();
1017 ProviderRequest providerRequest = new ProviderRequest();
1018
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001019 if (records != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001020 for (UpdateRecord record : records) {
Victoria Lease269518e2012-10-29 08:25:39 -07001021 if (UserHandle.getUserId(record.mReceiver.mUid) == mCurrentUserId) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001022 LocationRequest locationRequest = record.mRequest;
1023 providerRequest.locationRequests.add(locationRequest);
1024 if (locationRequest.getInterval() < providerRequest.interval) {
1025 providerRequest.reportLocation = true;
1026 providerRequest.interval = locationRequest.getInterval();
1027 }
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -07001028 }
1029 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001030
1031 if (providerRequest.reportLocation) {
1032 // calculate who to blame for power
1033 // This is somewhat arbitrary. We pick a threshold interval
1034 // that is slightly higher that the minimum interval, and
1035 // spread the blame across all applications with a request
1036 // under that threshold.
1037 long thresholdInterval = (providerRequest.interval + 1000) * 3 / 2;
1038 for (UpdateRecord record : records) {
Victoria Lease269518e2012-10-29 08:25:39 -07001039 if (UserHandle.getUserId(record.mReceiver.mUid) == mCurrentUserId) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001040 LocationRequest locationRequest = record.mRequest;
1041 if (locationRequest.getInterval() <= thresholdInterval) {
Dianne Hackborn002a54e2013-01-10 17:34:55 -08001042 worksource.add(record.mReceiver.mUid, record.mReceiver.mPackageName);
Victoria Leaseb711d572012-10-02 13:14:11 -07001043 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001044 }
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -07001045 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001046 }
1047 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001048
1049 if (D) Log.d(TAG, "provider request: " + provider + " " + providerRequest);
1050 p.setRequest(providerRequest, worksource);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001051 }
1052
1053 private class UpdateRecord {
1054 final String mProvider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001055 final LocationRequest mRequest;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001056 final Receiver mReceiver;
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001057 Location mLastFixBroadcast;
1058 long mLastStatusBroadcast;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001059
1060 /**
1061 * Note: must be constructed with lock held.
1062 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001063 UpdateRecord(String provider, LocationRequest request, Receiver receiver) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001064 mProvider = provider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001065 mRequest = request;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001066 mReceiver = receiver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001067
1068 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1069 if (records == null) {
1070 records = new ArrayList<UpdateRecord>();
1071 mRecordsByProvider.put(provider, records);
1072 }
1073 if (!records.contains(this)) {
1074 records.add(this);
1075 }
1076 }
1077
1078 /**
1079 * Method to be called when a record will no longer be used. Calling this multiple times
1080 * must have the same effect as calling it once.
1081 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001082 void disposeLocked(boolean removeReceiver) {
1083 // remove from mRecordsByProvider
1084 ArrayList<UpdateRecord> globalRecords = mRecordsByProvider.get(this.mProvider);
1085 if (globalRecords != null) {
1086 globalRecords.remove(this);
1087 }
1088
1089 if (!removeReceiver) return; // the caller will handle the rest
1090
1091 // remove from Receiver#mUpdateRecords
1092 HashMap<String, UpdateRecord> receiverRecords = mReceiver.mUpdateRecords;
1093 if (receiverRecords != null) {
1094 receiverRecords.remove(this.mProvider);
1095
1096 // and also remove the Receiver if it has no more update records
1097 if (removeReceiver && receiverRecords.size() == 0) {
1098 removeUpdatesLocked(mReceiver);
1099 }
Mike Lockwood3a76fd62009-09-01 07:26:56 -04001100 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001101 }
1102
1103 @Override
1104 public String toString() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001105 StringBuilder s = new StringBuilder();
1106 s.append("UpdateRecord[");
1107 s.append(mProvider);
1108 s.append(' ').append(mReceiver.mPackageName).append('(');
1109 s.append(mReceiver.mUid).append(')');
1110 s.append(' ').append(mRequest);
1111 s.append(']');
1112 return s.toString();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001113 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001114 }
1115
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001116 private Receiver getReceiver(ILocationListener listener, int pid, int uid, String packageName) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001117 IBinder binder = listener.asBinder();
1118 Receiver receiver = mReceivers.get(binder);
1119 if (receiver == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001120 receiver = new Receiver(listener, null, pid, uid, packageName);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001121 mReceivers.put(binder, receiver);
1122
1123 try {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001124 receiver.getListener().asBinder().linkToDeath(receiver, 0);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001125 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001126 Slog.e(TAG, "linkToDeath failed:", e);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001127 return null;
1128 }
1129 }
1130 return receiver;
1131 }
1132
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001133 private Receiver getReceiver(PendingIntent intent, int pid, int uid, String packageName) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001134 Receiver receiver = mReceivers.get(intent);
1135 if (receiver == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001136 receiver = new Receiver(null, intent, pid, uid, packageName);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001137 mReceivers.put(intent, receiver);
1138 }
1139 return receiver;
1140 }
1141
Victoria Lease37425c32012-10-16 16:08:48 -07001142 /**
1143 * Creates a LocationRequest based upon the supplied LocationRequest that to meets resolution
1144 * and consistency requirements.
1145 *
1146 * @param request the LocationRequest from which to create a sanitized version
1147 * @param shouldBeCoarse whether the sanitized version should be held to coarse resolution
1148 * constraints
1149 * @param fastestCoarseIntervalMS minimum interval allowed for coarse resolution
1150 * @return a version of request that meets the given resolution and consistency requirements
1151 * @hide
1152 */
1153 private LocationRequest createSanitizedRequest(LocationRequest request, int resolutionLevel) {
1154 LocationRequest sanitizedRequest = new LocationRequest(request);
1155 if (resolutionLevel < RESOLUTION_LEVEL_FINE) {
1156 switch (sanitizedRequest.getQuality()) {
Victoria Lease09016ab2012-09-16 12:33:15 -07001157 case LocationRequest.ACCURACY_FINE:
Victoria Lease37425c32012-10-16 16:08:48 -07001158 sanitizedRequest.setQuality(LocationRequest.ACCURACY_BLOCK);
Victoria Lease09016ab2012-09-16 12:33:15 -07001159 break;
1160 case LocationRequest.POWER_HIGH:
Victoria Lease37425c32012-10-16 16:08:48 -07001161 sanitizedRequest.setQuality(LocationRequest.POWER_LOW);
Victoria Lease09016ab2012-09-16 12:33:15 -07001162 break;
1163 }
1164 // throttle
Victoria Lease37425c32012-10-16 16:08:48 -07001165 if (sanitizedRequest.getInterval() < LocationFudger.FASTEST_INTERVAL_MS) {
1166 sanitizedRequest.setInterval(LocationFudger.FASTEST_INTERVAL_MS);
Victoria Lease09016ab2012-09-16 12:33:15 -07001167 }
Victoria Lease37425c32012-10-16 16:08:48 -07001168 if (sanitizedRequest.getFastestInterval() < LocationFudger.FASTEST_INTERVAL_MS) {
1169 sanitizedRequest.setFastestInterval(LocationFudger.FASTEST_INTERVAL_MS);
Victoria Lease09016ab2012-09-16 12:33:15 -07001170 }
Nick Pelly74fa7ea2012-08-13 19:36:38 -07001171 }
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001172 // make getFastestInterval() the minimum of interval and fastest interval
Victoria Lease37425c32012-10-16 16:08:48 -07001173 if (sanitizedRequest.getFastestInterval() > sanitizedRequest.getInterval()) {
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001174 request.setFastestInterval(request.getInterval());
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001175 }
Victoria Lease37425c32012-10-16 16:08:48 -07001176 return sanitizedRequest;
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001177 }
1178
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001179 private void checkPackageName(String packageName) {
Nick Pellye0fd6932012-07-11 10:26:13 -07001180 if (packageName == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001181 throw new SecurityException("invalid package name: " + packageName);
Nick Pellye0fd6932012-07-11 10:26:13 -07001182 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001183 int uid = Binder.getCallingUid();
Nick Pellye0fd6932012-07-11 10:26:13 -07001184 String[] packages = mPackageManager.getPackagesForUid(uid);
1185 if (packages == null) {
1186 throw new SecurityException("invalid UID " + uid);
1187 }
1188 for (String pkg : packages) {
1189 if (packageName.equals(pkg)) return;
1190 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001191 throw new SecurityException("invalid package name: " + packageName);
Nick Pellye0fd6932012-07-11 10:26:13 -07001192 }
1193
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001194 private void checkPendingIntent(PendingIntent intent) {
1195 if (intent == null) {
1196 throw new IllegalArgumentException("invalid pending intent: " + intent);
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001197 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001198 }
1199
1200 private Receiver checkListenerOrIntent(ILocationListener listener, PendingIntent intent,
1201 int pid, int uid, String packageName) {
1202 if (intent == null && listener == null) {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001203 throw new IllegalArgumentException("need either listener or intent");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001204 } else if (intent != null && listener != null) {
1205 throw new IllegalArgumentException("cannot register both listener and intent");
1206 } else if (intent != null) {
1207 checkPendingIntent(intent);
1208 return getReceiver(intent, pid, uid, packageName);
1209 } else {
1210 return getReceiver(listener, pid, uid, packageName);
1211 }
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001212 }
1213
Nick Pellye0fd6932012-07-11 10:26:13 -07001214 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001215 public void requestLocationUpdates(LocationRequest request, ILocationListener listener,
1216 PendingIntent intent, String packageName) {
1217 if (request == null) request = DEFAULT_LOCATION_REQUEST;
1218 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001219 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1220 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1221 request.getProvider());
1222 LocationRequest sanitizedRequest = createSanitizedRequest(request, allowedResolutionLevel);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001223
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001224 final int pid = Binder.getCallingPid();
1225 final int uid = Binder.getCallingUid();
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001226 // providers may use public location API's, need to clear identity
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001227 long identity = Binder.clearCallingIdentity();
1228 try {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001229 // We don't check for MODE_IGNORED here; we will do that when we go to deliver
1230 // a location.
Dianne Hackborn35654b62013-01-14 17:38:02 -08001231 checkLocationAccess(uid, packageName, allowedResolutionLevel);
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001232 Receiver recevier = checkListenerOrIntent(listener, intent, pid, uid, packageName);
1233
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001234 synchronized (mLock) {
Victoria Lease37425c32012-10-16 16:08:48 -07001235 requestLocationUpdatesLocked(sanitizedRequest, recevier, pid, uid, packageName);
Mike Lockwood2d4d1bf2010-10-18 17:06:26 -04001236 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001237 } finally {
1238 Binder.restoreCallingIdentity(identity);
1239 }
1240 }
1241
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001242 private void requestLocationUpdatesLocked(LocationRequest request, Receiver receiver,
1243 int pid, int uid, String packageName) {
1244 // Figure out the provider. Either its explicitly request (legacy use cases), or
1245 // use the fused provider
1246 if (request == null) request = DEFAULT_LOCATION_REQUEST;
1247 String name = request.getProvider();
Victoria Lease09016ab2012-09-16 12:33:15 -07001248 if (name == null) {
1249 throw new IllegalArgumentException("provider name must not be null");
1250 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001251 LocationProviderInterface provider = mProvidersByName.get(name);
1252 if (provider == null) {
1253 throw new IllegalArgumentException("provider doesn't exisit: " + provider);
1254 }
1255
Dianne Hackborn7ff30112012-11-08 11:12:09 -08001256 if (D) Log.d(TAG, "request " + Integer.toHexString(System.identityHashCode(receiver))
1257 + " " + name + " " + request + " from " + packageName + "(" + uid + ")");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001258
1259 UpdateRecord record = new UpdateRecord(name, request, receiver);
1260 UpdateRecord oldRecord = receiver.mUpdateRecords.put(name, record);
1261 if (oldRecord != null) {
1262 oldRecord.disposeLocked(false);
1263 }
1264
Victoria Lease269518e2012-10-29 08:25:39 -07001265 boolean isProviderEnabled = isAllowedBySettingsLocked(name, UserHandle.getUserId(uid));
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001266 if (isProviderEnabled) {
1267 applyRequirementsLocked(name);
1268 } else {
1269 // Notify the listener that updates are currently disabled
1270 receiver.callProviderEnabledLocked(name, false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001271 }
1272 }
1273
Nick Pellye0fd6932012-07-11 10:26:13 -07001274 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001275 public void removeUpdates(ILocationListener listener, PendingIntent intent,
1276 String packageName) {
1277 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001278
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001279 final int pid = Binder.getCallingPid();
1280 final int uid = Binder.getCallingUid();
1281 Receiver receiver = checkListenerOrIntent(listener, intent, pid, uid, packageName);
1282
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001283 // providers may use public location API's, need to clear identity
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001284 long identity = Binder.clearCallingIdentity();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001285 try {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001286 synchronized (mLock) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001287 removeUpdatesLocked(receiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001288 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001289 } finally {
1290 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001291 }
1292 }
1293
1294 private void removeUpdatesLocked(Receiver receiver) {
Dianne Hackborn7ff30112012-11-08 11:12:09 -08001295 if (D) Log.i(TAG, "remove " + Integer.toHexString(System.identityHashCode(receiver)));
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001296
1297 if (mReceivers.remove(receiver.mKey) != null && receiver.isListener()) {
1298 receiver.getListener().asBinder().unlinkToDeath(receiver, 0);
1299 synchronized (receiver) {
1300 if (receiver.mPendingBroadcasts > 0) {
1301 decrementPendingBroadcasts();
1302 receiver.mPendingBroadcasts = 0;
1303 }
1304 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001305 }
1306
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001307 // Record which providers were associated with this listener
1308 HashSet<String> providers = new HashSet<String>();
1309 HashMap<String, UpdateRecord> oldRecords = receiver.mUpdateRecords;
1310 if (oldRecords != null) {
1311 // Call dispose() on the obsolete update records.
1312 for (UpdateRecord record : oldRecords.values()) {
1313 record.disposeLocked(false);
1314 }
1315 // Accumulate providers
1316 providers.addAll(oldRecords.keySet());
1317 }
1318
1319 // update provider
1320 for (String provider : providers) {
1321 // If provider is already disabled, don't need to do anything
Victoria Lease269518e2012-10-29 08:25:39 -07001322 if (!isAllowedBySettingsLocked(provider, mCurrentUserId)) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001323 continue;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001324 }
1325
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001326 applyRequirementsLocked(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001327 }
1328 }
1329
Nick Pellye0fd6932012-07-11 10:26:13 -07001330 @Override
Nick Pelly4035f5a2012-08-17 14:43:49 -07001331 public Location getLastLocation(LocationRequest request, String packageName) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001332 if (D) Log.d(TAG, "getLastLocation: " + request);
1333 if (request == null) request = DEFAULT_LOCATION_REQUEST;
Victoria Lease37425c32012-10-16 16:08:48 -07001334 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
Nick Pelly4035f5a2012-08-17 14:43:49 -07001335 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001336 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1337 request.getProvider());
1338 // no need to sanitize this request, as only the provider name is used
Nick Pelly4035f5a2012-08-17 14:43:49 -07001339
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001340 final int uid = Binder.getCallingUid();
1341 final long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001342 try {
Dianne Hackborn35654b62013-01-14 17:38:02 -08001343 if (!reportLocationAccessNoThrow(uid, packageName, allowedResolutionLevel)) {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001344 return null;
1345 }
1346
Victoria Leaseb711d572012-10-02 13:14:11 -07001347 if (mBlacklist.isBlacklisted(packageName)) {
1348 if (D) Log.d(TAG, "not returning last loc for blacklisted app: " +
1349 packageName);
Victoria Lease09016ab2012-09-16 12:33:15 -07001350 return null;
1351 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001352
1353 synchronized (mLock) {
1354 // Figure out the provider. Either its explicitly request (deprecated API's),
1355 // or use the fused provider
1356 String name = request.getProvider();
1357 if (name == null) name = LocationManager.FUSED_PROVIDER;
1358 LocationProviderInterface provider = mProvidersByName.get(name);
1359 if (provider == null) return null;
1360
Victoria Lease269518e2012-10-29 08:25:39 -07001361 if (!isAllowedBySettingsLocked(name, mCurrentUserId)) return null;
Victoria Leaseb711d572012-10-02 13:14:11 -07001362
1363 Location location = mLastLocation.get(name);
1364 if (location == null) {
1365 return null;
1366 }
Victoria Lease37425c32012-10-16 16:08:48 -07001367 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001368 Location noGPSLocation = location.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1369 if (noGPSLocation != null) {
Dianne Hackborn6c5406a2012-11-29 16:18:01 -08001370 return new Location(mLocationFudger.getOrCreate(noGPSLocation));
Victoria Leaseb711d572012-10-02 13:14:11 -07001371 }
Victoria Lease37425c32012-10-16 16:08:48 -07001372 } else {
Dianne Hackborn6c5406a2012-11-29 16:18:01 -08001373 return new Location(location);
Victoria Lease09016ab2012-09-16 12:33:15 -07001374 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001375 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001376 return null;
1377 } finally {
1378 Binder.restoreCallingIdentity(identity);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001379 }
1380 }
1381
1382 @Override
1383 public void requestGeofence(LocationRequest request, Geofence geofence, PendingIntent intent,
1384 String packageName) {
1385 if (request == null) request = DEFAULT_LOCATION_REQUEST;
Victoria Lease37425c32012-10-16 16:08:48 -07001386 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1387 checkResolutionLevelIsSufficientForGeofenceUse(allowedResolutionLevel);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001388 checkPendingIntent(intent);
1389 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001390 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1391 request.getProvider());
1392 LocationRequest sanitizedRequest = createSanitizedRequest(request, allowedResolutionLevel);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001393
Victoria Lease37425c32012-10-16 16:08:48 -07001394 if (D) Log.d(TAG, "requestGeofence: " + sanitizedRequest + " " + geofence + " " + intent);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001395
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001396 // geo-fence manager uses the public location API, need to clear identity
1397 int uid = Binder.getCallingUid();
Victoria Lease56e675b2012-11-05 19:25:06 -08001398 if (UserHandle.getUserId(uid) != UserHandle.USER_OWNER) {
1399 // temporary measure until geofences work for secondary users
1400 Log.w(TAG, "proximity alerts are currently available only to the primary user");
1401 return;
1402 }
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001403 long identity = Binder.clearCallingIdentity();
1404 try {
Victoria Lease37425c32012-10-16 16:08:48 -07001405 mGeofenceManager.addFence(sanitizedRequest, geofence, intent, uid, packageName);
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001406 } finally {
1407 Binder.restoreCallingIdentity(identity);
1408 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001409 }
1410
1411 @Override
1412 public void removeGeofence(Geofence geofence, PendingIntent intent, String packageName) {
Victoria Lease37425c32012-10-16 16:08:48 -07001413 checkResolutionLevelIsSufficientForGeofenceUse(getCallerAllowedResolutionLevel());
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001414 checkPendingIntent(intent);
1415 checkPackageName(packageName);
1416
1417 if (D) Log.d(TAG, "removeGeofence: " + geofence + " " + intent);
1418
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001419 // geo-fence manager uses the public location API, need to clear identity
1420 long identity = Binder.clearCallingIdentity();
1421 try {
1422 mGeofenceManager.removeFence(geofence, intent);
1423 } finally {
1424 Binder.restoreCallingIdentity(identity);
1425 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001426 }
1427
1428
1429 @Override
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001430 public boolean addGpsStatusListener(IGpsStatusListener listener, String packageName) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001431 if (mGpsStatusProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001432 return false;
1433 }
Dianne Hackborn35654b62013-01-14 17:38:02 -08001434 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1435 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
Victoria Lease37425c32012-10-16 16:08:48 -07001436 LocationManager.GPS_PROVIDER);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001437
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001438 final int uid = Binder.getCallingUid();
1439 final long ident = Binder.clearCallingIdentity();
1440 try {
Dianne Hackborn35654b62013-01-14 17:38:02 -08001441 if (checkLocationAccess(uid, packageName, allowedResolutionLevel)) {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001442 return false;
1443 }
1444 } finally {
1445 Binder.restoreCallingIdentity(ident);
1446 }
1447
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001448 try {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001449 mGpsStatusProvider.addGpsStatusListener(listener);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001450 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001451 Slog.e(TAG, "mGpsStatusProvider.addGpsStatusListener failed", e);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001452 return false;
1453 }
1454 return true;
1455 }
1456
Nick Pellye0fd6932012-07-11 10:26:13 -07001457 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001458 public void removeGpsStatusListener(IGpsStatusListener listener) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001459 synchronized (mLock) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001460 try {
1461 mGpsStatusProvider.removeGpsStatusListener(listener);
1462 } catch (Exception e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001463 Slog.e(TAG, "mGpsStatusProvider.removeGpsStatusListener failed", e);
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001464 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001465 }
1466 }
1467
Nick Pellye0fd6932012-07-11 10:26:13 -07001468 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001469 public boolean sendExtraCommand(String provider, String command, Bundle extras) {
Mike Lockwoodc6cc8362009-08-17 13:16:08 -04001470 if (provider == null) {
1471 // throw NullPointerException to remain compatible with previous implementation
1472 throw new NullPointerException();
1473 }
Victoria Lease37425c32012-10-16 16:08:48 -07001474 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1475 provider);
Mike Lockwoodc6cc8362009-08-17 13:16:08 -04001476
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001477 // and check for ACCESS_LOCATION_EXTRA_COMMANDS
Mike Lockwoodb7e99222009-07-07 13:18:21 -04001478 if ((mContext.checkCallingOrSelfPermission(ACCESS_LOCATION_EXTRA_COMMANDS)
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001479 != PackageManager.PERMISSION_GRANTED)) {
1480 throw new SecurityException("Requires ACCESS_LOCATION_EXTRA_COMMANDS permission");
1481 }
1482
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001483 synchronized (mLock) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001484 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001485 if (p == null) return false;
Nick Pellye0fd6932012-07-11 10:26:13 -07001486
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001487 return p.sendExtraCommand(command, extras);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001488 }
1489 }
1490
Nick Pellye0fd6932012-07-11 10:26:13 -07001491 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001492 public boolean sendNiResponse(int notifId, int userResponse) {
Mike Lockwood18ad9f62009-08-27 14:01:23 -07001493 if (Binder.getCallingUid() != Process.myUid()) {
1494 throw new SecurityException(
1495 "calling sendNiResponse from outside of the system is not allowed");
1496 }
Danke Xie22d1f9f2009-08-18 18:28:45 -04001497 try {
1498 return mNetInitiatedListener.sendNiResponse(notifId, userResponse);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001499 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001500 Slog.e(TAG, "RemoteException in LocationManagerService.sendNiResponse");
Danke Xie22d1f9f2009-08-18 18:28:45 -04001501 return false;
1502 }
1503 }
1504
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001505 /**
Mike Lockwood628fd6d2010-01-25 22:46:13 -05001506 * @return null if the provider does not exist
Alexey Tarasovf2db9fb2009-09-01 02:37:07 +11001507 * @throws SecurityException if the provider is not allowed to be
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001508 * accessed by the caller
1509 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001510 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001511 public ProviderProperties getProviderProperties(String provider) {
Laurent Tub7f9d252012-10-16 14:25:00 -07001512 if (mProvidersByName.get(provider) == null) {
1513 return null;
1514 }
1515
Victoria Lease37425c32012-10-16 16:08:48 -07001516 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1517 provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001518
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001519 LocationProviderInterface p;
1520 synchronized (mLock) {
1521 p = mProvidersByName.get(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001522 }
1523
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001524 if (p == null) return null;
1525 return p.getProperties();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001526 }
1527
Nick Pellye0fd6932012-07-11 10:26:13 -07001528 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001529 public boolean isProviderEnabled(String provider) {
Victoria Lease37425c32012-10-16 16:08:48 -07001530 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1531 provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001532 if (LocationManager.FUSED_PROVIDER.equals(provider)) return false;
1533
Victoria Lease269518e2012-10-29 08:25:39 -07001534 long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001535 try {
1536 synchronized (mLock) {
1537 LocationProviderInterface p = mProvidersByName.get(provider);
1538 if (p == null) return false;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001539
Victoria Lease269518e2012-10-29 08:25:39 -07001540 return isAllowedBySettingsLocked(provider, mCurrentUserId);
Victoria Leaseb711d572012-10-02 13:14:11 -07001541 }
1542 } finally {
1543 Binder.restoreCallingIdentity(identity);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001544 }
1545 }
1546
1547 private void checkCallerIsProvider() {
1548 if (mContext.checkCallingOrSelfPermission(INSTALL_LOCATION_PROVIDER)
1549 == PackageManager.PERMISSION_GRANTED) {
1550 return;
1551 }
1552
1553 // Previously we only used the INSTALL_LOCATION_PROVIDER
1554 // check. But that is system or signature
1555 // protection level which is not flexible enough for
1556 // providers installed oustide the system image. So
1557 // also allow providers with a UID matching the
1558 // currently bound package name
1559
1560 int uid = Binder.getCallingUid();
1561
1562 if (mGeocodeProvider != null) {
1563 if (doesPackageHaveUid(uid, mGeocodeProvider.getConnectedPackageName())) return;
1564 }
1565 for (LocationProviderProxy proxy : mProxyProviders) {
1566 if (doesPackageHaveUid(uid, proxy.getConnectedPackageName())) return;
1567 }
1568 throw new SecurityException("need INSTALL_LOCATION_PROVIDER permission, " +
1569 "or UID of a currently bound location provider");
1570 }
1571
1572 private boolean doesPackageHaveUid(int uid, String packageName) {
1573 if (packageName == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001574 return false;
1575 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001576 try {
1577 ApplicationInfo appInfo = mPackageManager.getApplicationInfo(packageName, 0);
1578 if (appInfo.uid != uid) {
1579 return false;
1580 }
1581 } catch (NameNotFoundException e) {
1582 return false;
1583 }
1584 return true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001585 }
1586
Nick Pellye0fd6932012-07-11 10:26:13 -07001587 @Override
Mike Lockwooda4903f22010-02-17 06:42:23 -05001588 public void reportLocation(Location location, boolean passive) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001589 checkCallerIsProvider();
Mike Lockwood275555c2009-05-01 11:30:34 -04001590
Nick Pelly2eeeec22012-07-18 13:13:37 -07001591 if (!location.isComplete()) {
1592 Log.w(TAG, "Dropping incomplete location: " + location);
1593 return;
1594 }
1595
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001596 mLocationHandler.removeMessages(MSG_LOCATION_CHANGED, location);
1597 Message m = Message.obtain(mLocationHandler, MSG_LOCATION_CHANGED, location);
Mike Lockwooda4903f22010-02-17 06:42:23 -05001598 m.arg1 = (passive ? 1 : 0);
Mike Lockwood4e50b782009-04-03 08:24:43 -07001599 mLocationHandler.sendMessageAtFrontOfQueue(m);
1600 }
1601
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001602
Laurent Tu75defb62012-11-01 16:21:52 -07001603 private static boolean shouldBroadcastSafe(
1604 Location loc, Location lastLoc, UpdateRecord record, long now) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001605 // Always broadcast the first update
1606 if (lastLoc == null) {
1607 return true;
1608 }
1609
Nick Pellyf1be6862012-05-15 10:53:42 -07001610 // Check whether sufficient time has passed
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001611 long minTime = record.mRequest.getFastestInterval();
Philip Milne41180122012-09-26 11:29:25 -07001612 long delta = (loc.getElapsedRealtimeNanos() - lastLoc.getElapsedRealtimeNanos()) / 1000000L;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001613 if (delta < minTime - MAX_PROVIDER_SCHEDULING_JITTER_MS) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001614 return false;
1615 }
1616
1617 // Check whether sufficient distance has been traveled
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001618 double minDistance = record.mRequest.getSmallestDisplacement();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001619 if (minDistance > 0.0) {
1620 if (loc.distanceTo(lastLoc) <= minDistance) {
1621 return false;
1622 }
1623 }
1624
Laurent Tu75defb62012-11-01 16:21:52 -07001625 // Check whether sufficient number of udpates is left
1626 if (record.mRequest.getNumUpdates() <= 0) {
1627 return false;
1628 }
1629
1630 // Check whether the expiry date has passed
1631 if (record.mRequest.getExpireAt() < now) {
1632 return false;
1633 }
1634
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001635 return true;
1636 }
1637
Mike Lockwooda4903f22010-02-17 06:42:23 -05001638 private void handleLocationChangedLocked(Location location, boolean passive) {
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001639 if (D) Log.d(TAG, "incoming location: " + location);
1640
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001641 long now = SystemClock.elapsedRealtime();
Mike Lockwooda4903f22010-02-17 06:42:23 -05001642 String provider = (passive ? LocationManager.PASSIVE_PROVIDER : location.getProvider());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001643
Laurent Tu60ec50a2012-10-04 17:00:10 -07001644 // Skip if the provider is unknown.
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001645 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001646 if (p == null) return;
1647
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001648 // Update last known locations
Victoria Lease09016ab2012-09-16 12:33:15 -07001649 Location noGPSLocation = location.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1650 Location lastNoGPSLocation = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001651 Location lastLocation = mLastLocation.get(provider);
Mike Lockwood4e50b782009-04-03 08:24:43 -07001652 if (lastLocation == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001653 lastLocation = new Location(provider);
1654 mLastLocation.put(provider, lastLocation);
Victoria Lease09016ab2012-09-16 12:33:15 -07001655 } else {
1656 lastNoGPSLocation = lastLocation.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1657 if (noGPSLocation == null && lastNoGPSLocation != null) {
1658 // New location has no no-GPS location: adopt last no-GPS location. This is set
1659 // directly into location because we do not want to notify COARSE clients.
1660 location.setExtraLocation(Location.EXTRA_NO_GPS_LOCATION, lastNoGPSLocation);
1661 }
Mike Lockwood4e50b782009-04-03 08:24:43 -07001662 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001663 lastLocation.set(location);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001664
Laurent Tu60ec50a2012-10-04 17:00:10 -07001665 // Skip if there are no UpdateRecords for this provider.
1666 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1667 if (records == null || records.size() == 0) return;
1668
Victoria Lease09016ab2012-09-16 12:33:15 -07001669 // Fetch coarse location
1670 Location coarseLocation = null;
1671 if (noGPSLocation != null && !noGPSLocation.equals(lastNoGPSLocation)) {
1672 coarseLocation = mLocationFudger.getOrCreate(noGPSLocation);
1673 }
1674
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001675 // Fetch latest status update time
1676 long newStatusUpdateTime = p.getStatusUpdateTime();
1677
Mike Lockwood7ec434e2009-03-27 07:46:48 -07001678 // Get latest status
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001679 Bundle extras = new Bundle();
1680 int status = p.getStatus(extras);
1681
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001682 ArrayList<Receiver> deadReceivers = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001683 ArrayList<UpdateRecord> deadUpdateRecords = null;
Nick Pellye0fd6932012-07-11 10:26:13 -07001684
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001685 // Broadcast location or status to all listeners
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001686 for (UpdateRecord r : records) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001687 Receiver receiver = r.mReceiver;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001688 boolean receiverDead = false;
Nick Pelly4035f5a2012-08-17 14:43:49 -07001689
Victoria Lease269518e2012-10-29 08:25:39 -07001690 int receiverUserId = UserHandle.getUserId(receiver.mUid);
1691 if (receiverUserId != mCurrentUserId) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001692 if (D) {
Victoria Lease269518e2012-10-29 08:25:39 -07001693 Log.d(TAG, "skipping loc update for background user " + receiverUserId +
Victoria Leaseb711d572012-10-02 13:14:11 -07001694 " (current user: " + mCurrentUserId + ", app: " +
1695 receiver.mPackageName + ")");
1696 }
1697 continue;
1698 }
1699
Nick Pelly4035f5a2012-08-17 14:43:49 -07001700 if (mBlacklist.isBlacklisted(receiver.mPackageName)) {
1701 if (D) Log.d(TAG, "skipping loc update for blacklisted app: " +
1702 receiver.mPackageName);
1703 continue;
1704 }
1705
Victoria Lease09016ab2012-09-16 12:33:15 -07001706 Location notifyLocation = null;
Victoria Lease37425c32012-10-16 16:08:48 -07001707 if (receiver.mAllowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
1708 notifyLocation = coarseLocation; // use coarse location
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001709 } else {
Victoria Lease37425c32012-10-16 16:08:48 -07001710 notifyLocation = lastLocation; // use fine location
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001711 }
Victoria Lease09016ab2012-09-16 12:33:15 -07001712 if (notifyLocation != null) {
1713 Location lastLoc = r.mLastFixBroadcast;
Laurent Tu75defb62012-11-01 16:21:52 -07001714 if ((lastLoc == null) || shouldBroadcastSafe(notifyLocation, lastLoc, r, now)) {
Victoria Lease09016ab2012-09-16 12:33:15 -07001715 if (lastLoc == null) {
1716 lastLoc = new Location(notifyLocation);
1717 r.mLastFixBroadcast = lastLoc;
1718 } else {
1719 lastLoc.set(notifyLocation);
1720 }
1721 if (!receiver.callLocationChangedLocked(notifyLocation)) {
1722 Slog.w(TAG, "RemoteException calling onLocationChanged on " + receiver);
1723 receiverDead = true;
1724 }
Laurent Tu75defb62012-11-01 16:21:52 -07001725 r.mRequest.decrementNumUpdates();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001726 }
1727 }
1728
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001729 long prevStatusUpdateTime = r.mLastStatusBroadcast;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001730 if ((newStatusUpdateTime > prevStatusUpdateTime) &&
Victoria Lease09016ab2012-09-16 12:33:15 -07001731 (prevStatusUpdateTime != 0 || status != LocationProvider.AVAILABLE)) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001732
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001733 r.mLastStatusBroadcast = newStatusUpdateTime;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001734 if (!receiver.callStatusChangedLocked(provider, status, extras)) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07001735 receiverDead = true;
Joe Onorato8a9b2202010-02-26 18:56:32 -08001736 Slog.w(TAG, "RemoteException calling onStatusChanged on " + receiver);
Mike Lockwood03ca2162010-04-01 08:10:09 -07001737 }
1738 }
1739
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001740 // track expired records
Laurent Tu75defb62012-11-01 16:21:52 -07001741 if (r.mRequest.getNumUpdates() <= 0 || r.mRequest.getExpireAt() < now) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001742 if (deadUpdateRecords == null) {
1743 deadUpdateRecords = new ArrayList<UpdateRecord>();
1744 }
1745 deadUpdateRecords.add(r);
1746 }
1747 // track dead receivers
1748 if (receiverDead) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07001749 if (deadReceivers == null) {
1750 deadReceivers = new ArrayList<Receiver>();
1751 }
1752 if (!deadReceivers.contains(receiver)) {
1753 deadReceivers.add(receiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001754 }
1755 }
1756 }
Nick Pellye0fd6932012-07-11 10:26:13 -07001757
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001758 // remove dead records and receivers outside the loop
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001759 if (deadReceivers != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001760 for (Receiver receiver : deadReceivers) {
1761 removeUpdatesLocked(receiver);
1762 }
1763 }
1764 if (deadUpdateRecords != null) {
1765 for (UpdateRecord r : deadUpdateRecords) {
1766 r.disposeLocked(true);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001767 }
Victoria Lease8b38b292012-12-04 15:04:43 -08001768 applyRequirementsLocked(provider);
1769 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001770 }
1771
1772 private class LocationWorkerHandler extends Handler {
Victoria Lease5cd731a2012-12-19 15:04:21 -08001773 public LocationWorkerHandler(Looper looper) {
1774 super(looper, null, true);
1775 }
1776
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001777 @Override
1778 public void handleMessage(Message msg) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001779 switch (msg.what) {
1780 case MSG_LOCATION_CHANGED:
1781 handleLocationChanged((Location) msg.obj, msg.arg1 == 1);
1782 break;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001783 }
1784 }
1785 }
1786
Victoria Lease54ca7ae2013-01-08 09:39:50 -08001787 private boolean isMockProvider(String provider) {
1788 synchronized (mLock) {
1789 return mMockProviders.containsKey(provider);
1790 }
1791 }
1792
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001793 private void handleLocationChanged(Location location, boolean passive) {
Victoria Lease54ca7ae2013-01-08 09:39:50 -08001794 // create a working copy of the incoming Location so that the service can modify it without
1795 // disturbing the caller's copy
1796 Location myLocation = new Location(location);
1797 String provider = myLocation.getProvider();
1798
1799 // set "isFromMockProvider" bit if location came from a mock provider. we do not clear this
1800 // bit if location did not come from a mock provider because passive/fused providers can
1801 // forward locations from mock providers, and should not grant them legitimacy in doing so.
1802 if (!myLocation.isFromMockProvider() && isMockProvider(provider)) {
1803 myLocation.setIsFromMockProvider(true);
1804 }
Jeff Sharkey5e613312012-01-30 11:16:20 -08001805
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001806 if (!passive) {
1807 // notify passive provider of the new location
Victoria Lease54ca7ae2013-01-08 09:39:50 -08001808 mPassiveProvider.updateLocation(myLocation);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001809 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001810
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001811 synchronized (mLock) {
Victoria Lease269518e2012-10-29 08:25:39 -07001812 if (isAllowedBySettingsLocked(provider, mCurrentUserId)) {
Victoria Lease54ca7ae2013-01-08 09:39:50 -08001813 handleLocationChangedLocked(myLocation, passive);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001814 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001815 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001816 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001817
Mike Lockwoode97ae402010-09-29 15:23:46 -04001818 private final PackageMonitor mPackageMonitor = new PackageMonitor() {
1819 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001820 public void onPackageDisappeared(String packageName, int reason) {
1821 // remove all receivers associated with this package name
1822 synchronized (mLock) {
1823 ArrayList<Receiver> deadReceivers = null;
1824
1825 for (Receiver receiver : mReceivers.values()) {
1826 if (receiver.mPackageName.equals(packageName)) {
1827 if (deadReceivers == null) {
1828 deadReceivers = new ArrayList<Receiver>();
1829 }
1830 deadReceivers.add(receiver);
1831 }
1832 }
1833
1834 // perform removal outside of mReceivers loop
1835 if (deadReceivers != null) {
1836 for (Receiver receiver : deadReceivers) {
1837 removeUpdatesLocked(receiver);
1838 }
1839 }
1840 }
Nick Pellye0fd6932012-07-11 10:26:13 -07001841 }
Mike Lockwoode97ae402010-09-29 15:23:46 -04001842 };
1843
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001844 // Wake locks
1845
Mike Lockwood0528b9b2009-05-07 10:12:54 -04001846 private void incrementPendingBroadcasts() {
1847 synchronized (mWakeLock) {
1848 if (mPendingBroadcasts++ == 0) {
1849 try {
1850 mWakeLock.acquire();
1851 log("Acquired wakelock");
1852 } catch (Exception e) {
1853 // This is to catch a runtime exception thrown when we try to release an
1854 // already released lock.
Joe Onorato8a9b2202010-02-26 18:56:32 -08001855 Slog.e(TAG, "exception in acquireWakeLock()", e);
Mike Lockwood0528b9b2009-05-07 10:12:54 -04001856 }
1857 }
Mike Lockwood48f17512009-04-23 09:12:08 -07001858 }
1859 }
1860
1861 private void decrementPendingBroadcasts() {
Mike Lockwood0528b9b2009-05-07 10:12:54 -04001862 synchronized (mWakeLock) {
Mike Lockwood48f17512009-04-23 09:12:08 -07001863 if (--mPendingBroadcasts == 0) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -04001864 try {
1865 // Release wake lock
1866 if (mWakeLock.isHeld()) {
1867 mWakeLock.release();
1868 log("Released wakelock");
1869 } else {
1870 log("Can't release wakelock again!");
1871 }
1872 } catch (Exception e) {
1873 // This is to catch a runtime exception thrown when we try to release an
1874 // already released lock.
Joe Onorato8a9b2202010-02-26 18:56:32 -08001875 Slog.e(TAG, "exception in releaseWakeLock()", e);
Mike Lockwood0528b9b2009-05-07 10:12:54 -04001876 }
Mike Lockwood48f17512009-04-23 09:12:08 -07001877 }
1878 }
1879 }
1880
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001881 // Geocoder
1882
Nick Pellye0fd6932012-07-11 10:26:13 -07001883 @Override
Mike Lockwoode15735a2010-09-20 17:48:47 -04001884 public boolean geocoderIsPresent() {
Mark Vandevoorde01ac80b2010-05-21 15:43:26 -07001885 return mGeocodeProvider != null;
1886 }
1887
Nick Pellye0fd6932012-07-11 10:26:13 -07001888 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001889 public String getFromLocation(double latitude, double longitude, int maxResults,
Mike Lockwood34901402010-01-04 12:14:21 -05001890 GeocoderParams params, List<Address> addrs) {
Mike Lockwooda55c3212009-04-15 11:10:11 -04001891 if (mGeocodeProvider != null) {
Mike Lockwood628fd6d2010-01-25 22:46:13 -05001892 return mGeocodeProvider.getFromLocation(latitude, longitude, maxResults,
1893 params, addrs);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001894 }
Mike Lockwooda55c3212009-04-15 11:10:11 -04001895 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001896 }
1897
Mike Lockwooda55c3212009-04-15 11:10:11 -04001898
Nick Pellye0fd6932012-07-11 10:26:13 -07001899 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001900 public String getFromLocationName(String locationName,
Mike Lockwooda55c3212009-04-15 11:10:11 -04001901 double lowerLeftLatitude, double lowerLeftLongitude,
1902 double upperRightLatitude, double upperRightLongitude, int maxResults,
Mike Lockwood34901402010-01-04 12:14:21 -05001903 GeocoderParams params, List<Address> addrs) {
Mike Lockwooda55c3212009-04-15 11:10:11 -04001904
1905 if (mGeocodeProvider != null) {
Mike Lockwood628fd6d2010-01-25 22:46:13 -05001906 return mGeocodeProvider.getFromLocationName(locationName, lowerLeftLatitude,
1907 lowerLeftLongitude, upperRightLatitude, upperRightLongitude,
1908 maxResults, params, addrs);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001909 }
Mike Lockwooda55c3212009-04-15 11:10:11 -04001910 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001911 }
1912
1913 // Mock Providers
1914
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001915 private void checkMockPermissionsSafe() {
1916 boolean allowMocks = Settings.Secure.getInt(mContext.getContentResolver(),
1917 Settings.Secure.ALLOW_MOCK_LOCATION, 0) == 1;
1918 if (!allowMocks) {
1919 throw new SecurityException("Requires ACCESS_MOCK_LOCATION secure setting");
1920 }
1921
1922 if (mContext.checkCallingPermission(ACCESS_MOCK_LOCATION) !=
1923 PackageManager.PERMISSION_GRANTED) {
1924 throw new SecurityException("Requires ACCESS_MOCK_LOCATION permission");
Nick Pellye0fd6932012-07-11 10:26:13 -07001925 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001926 }
1927
Nick Pellye0fd6932012-07-11 10:26:13 -07001928 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001929 public void addTestProvider(String name, ProviderProperties properties) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001930 checkMockPermissionsSafe();
1931
Mike Lockwooda4903f22010-02-17 06:42:23 -05001932 if (LocationManager.PASSIVE_PROVIDER.equals(name)) {
1933 throw new IllegalArgumentException("Cannot mock the passive location provider");
1934 }
1935
Mike Lockwood86328a92009-10-23 08:38:25 -04001936 long identity = Binder.clearCallingIdentity();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001937 synchronized (mLock) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001938 MockProvider provider = new MockProvider(name, this, properties);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07001939 // remove the real provider if we are replacing GPS or network provider
1940 if (LocationManager.GPS_PROVIDER.equals(name)
Nick Pelly1332b532012-08-21 16:25:47 -07001941 || LocationManager.NETWORK_PROVIDER.equals(name)
1942 || LocationManager.FUSED_PROVIDER.equals(name)) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001943 LocationProviderInterface p = mProvidersByName.get(name);
1944 if (p != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001945 removeProviderLocked(p);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07001946 }
1947 }
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001948 if (mProvidersByName.get(name) != null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001949 throw new IllegalArgumentException("Provider \"" + name + "\" already exists");
1950 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001951 addProviderLocked(provider);
Mike Lockwood7ec434e2009-03-27 07:46:48 -07001952 mMockProviders.put(name, provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001953 mLastLocation.put(name, null);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001954 updateProvidersLocked();
1955 }
Mike Lockwood86328a92009-10-23 08:38:25 -04001956 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001957 }
1958
Nick Pellye0fd6932012-07-11 10:26:13 -07001959 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001960 public void removeTestProvider(String provider) {
1961 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001962 synchronized (mLock) {
You Kima6d0b6f2012-10-28 03:58:44 +09001963 MockProvider mockProvider = mMockProviders.remove(provider);
Mike Lockwood7ec434e2009-03-27 07:46:48 -07001964 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001965 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
1966 }
Mike Lockwood86328a92009-10-23 08:38:25 -04001967 long identity = Binder.clearCallingIdentity();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001968 removeProviderLocked(mProvidersByName.get(provider));
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001969
1970 // reinstate real provider if available
1971 LocationProviderInterface realProvider = mRealProviders.get(provider);
1972 if (realProvider != null) {
1973 addProviderLocked(realProvider);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07001974 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001975 mLastLocation.put(provider, null);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001976 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04001977 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001978 }
1979 }
1980
Nick Pellye0fd6932012-07-11 10:26:13 -07001981 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001982 public void setTestProviderLocation(String provider, Location loc) {
1983 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001984 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07001985 MockProvider mockProvider = mMockProviders.get(provider);
1986 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001987 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
1988 }
Mike Lockwood95427cd2009-05-07 13:27:54 -04001989 // clear calling identity so INSTALL_LOCATION_PROVIDER permission is not required
1990 long identity = Binder.clearCallingIdentity();
Mike Lockwood7ec434e2009-03-27 07:46:48 -07001991 mockProvider.setLocation(loc);
Mike Lockwood95427cd2009-05-07 13:27:54 -04001992 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001993 }
1994 }
1995
Nick Pellye0fd6932012-07-11 10:26:13 -07001996 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001997 public void clearTestProviderLocation(String provider) {
1998 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001999 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002000 MockProvider mockProvider = mMockProviders.get(provider);
2001 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002002 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2003 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002004 mockProvider.clearLocation();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002005 }
2006 }
2007
Nick Pellye0fd6932012-07-11 10:26:13 -07002008 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002009 public void setTestProviderEnabled(String provider, boolean enabled) {
2010 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002011 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002012 MockProvider mockProvider = mMockProviders.get(provider);
2013 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002014 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2015 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002016 long identity = Binder.clearCallingIdentity();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002017 if (enabled) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002018 mockProvider.enable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002019 mEnabledProviders.add(provider);
2020 mDisabledProviders.remove(provider);
2021 } else {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002022 mockProvider.disable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002023 mEnabledProviders.remove(provider);
2024 mDisabledProviders.add(provider);
2025 }
2026 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002027 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002028 }
2029 }
2030
Nick Pellye0fd6932012-07-11 10:26:13 -07002031 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002032 public void clearTestProviderEnabled(String provider) {
2033 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002034 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002035 MockProvider mockProvider = mMockProviders.get(provider);
2036 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002037 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2038 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002039 long identity = Binder.clearCallingIdentity();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002040 mEnabledProviders.remove(provider);
2041 mDisabledProviders.remove(provider);
2042 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002043 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002044 }
2045 }
2046
Nick Pellye0fd6932012-07-11 10:26:13 -07002047 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002048 public void setTestProviderStatus(String provider, int status, Bundle extras, long updateTime) {
2049 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002050 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002051 MockProvider mockProvider = mMockProviders.get(provider);
2052 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002053 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2054 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002055 mockProvider.setStatus(status, extras, updateTime);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002056 }
2057 }
2058
Nick Pellye0fd6932012-07-11 10:26:13 -07002059 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002060 public void clearTestProviderStatus(String provider) {
2061 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002062 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002063 MockProvider mockProvider = mMockProviders.get(provider);
2064 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002065 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2066 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002067 mockProvider.clearStatus();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002068 }
2069 }
2070
2071 private void log(String log) {
2072 if (Log.isLoggable(TAG, Log.VERBOSE)) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08002073 Slog.d(TAG, log);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002074 }
2075 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002076
2077 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002078 protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) {
2079 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
2080 != PackageManager.PERMISSION_GRANTED) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -04002081 pw.println("Permission Denial: can't dump LocationManagerService from from pid="
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002082 + Binder.getCallingPid()
2083 + ", uid=" + Binder.getCallingUid());
2084 return;
2085 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002086
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002087 synchronized (mLock) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002088 pw.println("Current Location Manager state:");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002089 pw.println(" Location Listeners:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002090 for (Receiver receiver : mReceivers.values()) {
2091 pw.println(" " + receiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002092 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002093 pw.println(" Records by Provider:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002094 for (Map.Entry<String, ArrayList<UpdateRecord>> entry : mRecordsByProvider.entrySet()) {
2095 pw.println(" " + entry.getKey() + ":");
2096 for (UpdateRecord record : entry.getValue()) {
2097 pw.println(" " + record);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002098 }
2099 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002100 pw.println(" Last Known Locations:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002101 for (Map.Entry<String, Location> entry : mLastLocation.entrySet()) {
2102 String provider = entry.getKey();
2103 Location location = entry.getValue();
2104 pw.println(" " + provider + ": " + location);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002105 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002106
Nick Pellye0fd6932012-07-11 10:26:13 -07002107 mGeofenceManager.dump(pw);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002108
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002109 if (mEnabledProviders.size() > 0) {
2110 pw.println(" Enabled Providers:");
2111 for (String i : mEnabledProviders) {
2112 pw.println(" " + i);
2113 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002114
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002115 }
2116 if (mDisabledProviders.size() > 0) {
2117 pw.println(" Disabled Providers:");
2118 for (String i : mDisabledProviders) {
2119 pw.println(" " + i);
2120 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002121 }
Nick Pelly4035f5a2012-08-17 14:43:49 -07002122 pw.append(" ");
2123 mBlacklist.dump(pw);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002124 if (mMockProviders.size() > 0) {
2125 pw.println(" Mock Providers:");
2126 for (Map.Entry<String, MockProvider> i : mMockProviders.entrySet()) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002127 i.getValue().dump(pw, " ");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002128 }
2129 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002130
Nick Pelly74fa7ea2012-08-13 19:36:38 -07002131 pw.append(" fudger: ");
2132 mLocationFudger.dump(fd, pw, args);
2133
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002134 if (args.length > 0 && "short".equals(args[0])) {
2135 return;
2136 }
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002137 for (LocationProviderInterface provider: mProviders) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002138 pw.print(provider.getName() + " Internal State");
2139 if (provider instanceof LocationProviderProxy) {
2140 LocationProviderProxy proxy = (LocationProviderProxy) provider;
2141 pw.print(" (" + proxy.getConnectedPackageName() + ")");
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002142 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002143 pw.println(":");
2144 provider.dump(fd, pw, args);
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002145 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002146 }
2147 }
2148}