blob: 98fa522d49c46d060cc0e5590384c680af2f01c1 [file] [log] [blame]
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2007 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server;
18
Dianne Hackborna06de0f2012-12-11 16:34:47 -080019import android.app.AppOpsManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080020import android.app.PendingIntent;
Victoria Lease38389b62012-09-30 11:44:22 -070021import android.content.BroadcastReceiver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080022import android.content.ContentResolver;
23import android.content.Context;
24import android.content.Intent;
Victoria Lease38389b62012-09-30 11:44:22 -070025import android.content.IntentFilter;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070026import android.content.pm.ApplicationInfo;
Jeff Hamiltonfbadb692012-10-05 14:21:58 -050027import android.content.pm.PackageInfo;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080028import android.content.pm.PackageManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070029import android.content.pm.PackageManager.NameNotFoundException;
Jeff Hamiltonfbadb692012-10-05 14:21:58 -050030import android.content.pm.ResolveInfo;
31import android.content.pm.Signature;
Mike Lockwood628fd6d2010-01-25 22:46:13 -050032import android.content.res.Resources;
Brian Muramatsubb95cb92012-08-29 10:43:21 -070033import android.database.ContentObserver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080034import android.location.Address;
Mike Lockwood03ca2162010-04-01 08:10:09 -070035import android.location.Criteria;
Mike Lockwood34901402010-01-04 12:14:21 -050036import android.location.GeocoderParams;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070037import android.location.Geofence;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080038import android.location.IGpsStatusListener;
Mike Lockwood15e3d0f2009-05-01 07:53:28 -040039import android.location.IGpsStatusProvider;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080040import android.location.ILocationListener;
41import android.location.ILocationManager;
Danke Xie22d1f9f2009-08-18 18:28:45 -040042import android.location.INetInitiatedListener;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080043import android.location.Location;
44import android.location.LocationManager;
45import android.location.LocationProvider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070046import android.location.LocationRequest;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080047import android.os.Binder;
48import android.os.Bundle;
49import android.os.Handler;
50import android.os.IBinder;
Mike Lockwood3d12b512009-04-21 23:25:35 -070051import android.os.Looper;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080052import android.os.Message;
53import android.os.PowerManager;
Mike Lockwoode932f7f2009-04-06 10:51:26 -070054import android.os.Process;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080055import android.os.RemoteException;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070056import android.os.SystemClock;
Dianne Hackborn5ac72a22012-08-29 18:32:08 -070057import android.os.UserHandle;
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -070058import android.os.WorkSource;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080059import android.provider.Settings;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080060import android.util.Log;
Joe Onorato8a9b2202010-02-26 18:56:32 -080061import android.util.Slog;
Mike Lockwoode97ae402010-09-29 15:23:46 -040062import com.android.internal.content.PackageMonitor;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070063import com.android.internal.location.ProviderProperties;
64import com.android.internal.location.ProviderRequest;
Dianne Hackborn8d044e82013-04-30 17:24:15 -070065import com.android.internal.os.BackgroundThread;
destradaa1af4b022013-07-12 15:43:36 -070066import com.android.server.location.FlpHardwareProvider;
67import com.android.server.location.FusedProxy;
Mike Lockwood43e33f22010-03-26 10:41:48 -040068import com.android.server.location.GeocoderProxy;
Jaikumar Ganesh8ce470d2013-04-03 12:22:18 -070069import com.android.server.location.GeofenceProxy;
Nick Pellye0fd6932012-07-11 10:26:13 -070070import com.android.server.location.GeofenceManager;
Mike Lockwood43e33f22010-03-26 10:41:48 -040071import com.android.server.location.GpsLocationProvider;
Nick Pelly4035f5a2012-08-17 14:43:49 -070072import com.android.server.location.LocationBlacklist;
Nick Pelly74fa7ea2012-08-13 19:36:38 -070073import com.android.server.location.LocationFudger;
Mike Lockwood43e33f22010-03-26 10:41:48 -040074import com.android.server.location.LocationProviderInterface;
75import com.android.server.location.LocationProviderProxy;
David Christie2ff96af2014-01-30 16:09:37 -080076import com.android.server.location.LocationRequestStatistics;
77import com.android.server.location.LocationRequestStatistics.PackageProviderKey;
78import com.android.server.location.LocationRequestStatistics.PackageStatistics;
Mike Lockwood43e33f22010-03-26 10:41:48 -040079import com.android.server.location.MockProvider;
80import com.android.server.location.PassiveProvider;
81
82import java.io.FileDescriptor;
83import java.io.PrintWriter;
84import java.util.ArrayList;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070085import java.util.Arrays;
Mike Lockwood43e33f22010-03-26 10:41:48 -040086import java.util.HashMap;
87import java.util.HashSet;
88import java.util.List;
89import java.util.Map;
Mike Lockwood43e33f22010-03-26 10:41:48 -040090import java.util.Set;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080091
92/**
93 * The service class that manages LocationProviders and issues location
94 * updates and alerts.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080095 */
Victoria Lease5cd731a2012-12-19 15:04:21 -080096public class LocationManagerService extends ILocationManager.Stub {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080097 private static final String TAG = "LocationManagerService";
JP Abgrallf79811e72013-02-01 18:45:05 -080098 public static final boolean D = Log.isLoggable(TAG, Log.DEBUG);
Nick Pelly6fa9ad42012-07-16 12:18:23 -070099
100 private static final String WAKELOCK_KEY = TAG;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800101
Victoria Lease37425c32012-10-16 16:08:48 -0700102 // Location resolution level: no location data whatsoever
103 private static final int RESOLUTION_LEVEL_NONE = 0;
104 // Location resolution level: coarse location data only
105 private static final int RESOLUTION_LEVEL_COARSE = 1;
106 // Location resolution level: fine location data
107 private static final int RESOLUTION_LEVEL_FINE = 2;
108
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800109 private static final String ACCESS_MOCK_LOCATION =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700110 android.Manifest.permission.ACCESS_MOCK_LOCATION;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800111 private static final String ACCESS_LOCATION_EXTRA_COMMANDS =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700112 android.Manifest.permission.ACCESS_LOCATION_EXTRA_COMMANDS;
Mike Lockwood275555c2009-05-01 11:30:34 -0400113 private static final String INSTALL_LOCATION_PROVIDER =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700114 android.Manifest.permission.INSTALL_LOCATION_PROVIDER;
115
116 private static final String NETWORK_LOCATION_SERVICE_ACTION =
Stan Chesnutt39062dd2013-07-22 14:33:30 -0700117 "com.android.location.service.v3.NetworkLocationProvider";
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700118 private static final String FUSED_LOCATION_SERVICE_ACTION =
119 "com.android.location.service.FusedLocationProvider";
120
121 private static final int MSG_LOCATION_CHANGED = 1;
122
David Christie1b9b7b12013-04-15 15:31:11 -0700123 private static final long NANOS_PER_MILLI = 1000000L;
124
David Christie0b837452013-07-29 16:02:13 -0700125 // The maximum interval a location request can have and still be considered "high power".
126 private static final long HIGH_POWER_INTERVAL_MS = 5 * 60 * 1000;
127
Nick Pellyf1be6862012-05-15 10:53:42 -0700128 // Location Providers may sometimes deliver location updates
129 // slightly faster that requested - provide grace period so
130 // we don't unnecessarily filter events that are otherwise on
131 // time
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700132 private static final int MAX_PROVIDER_SCHEDULING_JITTER_MS = 100;
Nick Pellyf1be6862012-05-15 10:53:42 -0700133
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700134 private static final LocationRequest DEFAULT_LOCATION_REQUEST = new LocationRequest();
135
136 private final Context mContext;
Dianne Hackborna06de0f2012-12-11 16:34:47 -0800137 private final AppOpsManager mAppOps;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700138
139 // used internally for synchronization
140 private final Object mLock = new Object();
141
Victoria Lease5cd731a2012-12-19 15:04:21 -0800142 // --- fields below are final after systemReady() ---
Nick Pelly74fa7ea2012-08-13 19:36:38 -0700143 private LocationFudger mLocationFudger;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700144 private GeofenceManager mGeofenceManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700145 private PackageManager mPackageManager;
Victoria Lease0aa28602013-05-29 15:28:26 -0700146 private PowerManager mPowerManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700147 private GeocoderProxy mGeocodeProvider;
148 private IGpsStatusProvider mGpsStatusProvider;
149 private INetInitiatedListener mNetInitiatedListener;
150 private LocationWorkerHandler mLocationHandler;
Nick Pelly4035f5a2012-08-17 14:43:49 -0700151 private PassiveProvider mPassiveProvider; // track passive provider for special cases
152 private LocationBlacklist mBlacklist;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700153
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700154 // --- fields below are protected by mLock ---
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800155 // Set of providers that are explicitly enabled
156 private final Set<String> mEnabledProviders = new HashSet<String>();
157
158 // Set of providers that are explicitly disabled
159 private final Set<String> mDisabledProviders = new HashSet<String>();
160
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700161 // Mock (test) providers
162 private final HashMap<String, MockProvider> mMockProviders =
163 new HashMap<String, MockProvider>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800164
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700165 // all receivers
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400166 private final HashMap<Object, Receiver> mReceivers = new HashMap<Object, Receiver>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800167
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700168 // currently installed providers (with mocks replacing real providers)
Mike Lockwoodd03ff942010-02-09 08:46:14 -0500169 private final ArrayList<LocationProviderInterface> mProviders =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700170 new ArrayList<LocationProviderInterface>();
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400171
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700172 // real providers, saved here when mocked out
173 private final HashMap<String, LocationProviderInterface> mRealProviders =
174 new HashMap<String, LocationProviderInterface>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800175
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700176 // mapping from provider name to provider
177 private final HashMap<String, LocationProviderInterface> mProvidersByName =
178 new HashMap<String, LocationProviderInterface>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800179
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700180 // mapping from provider name to all its UpdateRecords
181 private final HashMap<String, ArrayList<UpdateRecord>> mRecordsByProvider =
182 new HashMap<String, ArrayList<UpdateRecord>>();
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -0700183
David Christie2ff96af2014-01-30 16:09:37 -0800184 private final LocationRequestStatistics mRequestStatistics = new LocationRequestStatistics();
185
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700186 // mapping from provider name to last known location
187 private final HashMap<String, Location> mLastLocation = new HashMap<String, Location>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800188
David Christie1b9b7b12013-04-15 15:31:11 -0700189 // same as mLastLocation, but is not updated faster than LocationFudger.FASTEST_INTERVAL_MS.
190 // locations stored here are not fudged for coarse permissions.
191 private final HashMap<String, Location> mLastLocationCoarseInterval =
192 new HashMap<String, Location>();
193
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700194 // all providers that operate over proxy, for authorizing incoming location
195 private final ArrayList<LocationProviderProxy> mProxyProviders =
196 new ArrayList<LocationProviderProxy>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800197
Victoria Lease38389b62012-09-30 11:44:22 -0700198 // current active user on the device - other users are denied location data
199 private int mCurrentUserId = UserHandle.USER_OWNER;
200
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700201 public LocationManagerService(Context context) {
202 super();
203 mContext = context;
Dianne Hackborna06de0f2012-12-11 16:34:47 -0800204 mAppOps = (AppOpsManager)context.getSystemService(Context.APP_OPS_SERVICE);
The Android Open Source Project4df24232009-03-05 14:34:35 -0800205
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700206 if (D) Log.d(TAG, "Constructed");
207
208 // most startup is deferred until systemReady()
209 }
210
Svetoslav Ganova0027152013-06-25 14:59:53 -0700211 public void systemRunning() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700212 synchronized (mLock) {
Victoria Lease5cd731a2012-12-19 15:04:21 -0800213 if (D) Log.d(TAG, "systemReady()");
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700214
Victoria Lease5cd731a2012-12-19 15:04:21 -0800215 // fetch package manager
216 mPackageManager = mContext.getPackageManager();
217
Victoria Lease0aa28602013-05-29 15:28:26 -0700218 // fetch power manager
219 mPowerManager = (PowerManager) mContext.getSystemService(Context.POWER_SERVICE);
Victoria Lease5cd731a2012-12-19 15:04:21 -0800220
221 // prepare worker thread
Dianne Hackborn8d044e82013-04-30 17:24:15 -0700222 mLocationHandler = new LocationWorkerHandler(BackgroundThread.get().getLooper());
Victoria Lease5cd731a2012-12-19 15:04:21 -0800223
224 // prepare mLocationHandler's dependents
225 mLocationFudger = new LocationFudger(mContext, mLocationHandler);
226 mBlacklist = new LocationBlacklist(mContext, mLocationHandler);
227 mBlacklist.init();
228 mGeofenceManager = new GeofenceManager(mContext, mBlacklist);
229
Dianne Hackbornc2293022013-02-06 23:14:49 -0800230 // Monitor for app ops mode changes.
Dianne Hackborn9bb0ee92013-09-22 12:31:38 -0700231 AppOpsManager.OnOpChangedListener callback
232 = new AppOpsManager.OnOpChangedInternalListener() {
233 public void onOpChanged(int op, String packageName) {
Dianne Hackbornc2293022013-02-06 23:14:49 -0800234 synchronized (mLock) {
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700235 for (Receiver receiver : mReceivers.values()) {
236 receiver.updateMonitoring(true);
237 }
Dianne Hackbornc2293022013-02-06 23:14:49 -0800238 applyAllProviderRequirementsLocked();
239 }
240 }
241 };
242 mAppOps.startWatchingMode(AppOpsManager.OP_COARSE_LOCATION, null, callback);
243
Victoria Lease5cd731a2012-12-19 15:04:21 -0800244 // prepare providers
245 loadProvidersLocked();
246 updateProvidersLocked();
247 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700248
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700249 // listen for settings changes
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700250 mContext.getContentResolver().registerContentObserver(
Laurent Tu75defb62012-11-01 16:21:52 -0700251 Settings.Secure.getUriFor(Settings.Secure.LOCATION_PROVIDERS_ALLOWED), true,
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700252 new ContentObserver(mLocationHandler) {
Victoria Lease5cd731a2012-12-19 15:04:21 -0800253 @Override
254 public void onChange(boolean selfChange) {
255 synchronized (mLock) {
256 updateProvidersLocked();
257 }
258 }
259 }, UserHandle.USER_ALL);
260 mPackageMonitor.register(mContext, mLocationHandler.getLooper(), true);
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700261
Victoria Lease38389b62012-09-30 11:44:22 -0700262 // listen for user change
263 IntentFilter intentFilter = new IntentFilter();
264 intentFilter.addAction(Intent.ACTION_USER_SWITCHED);
265
266 mContext.registerReceiverAsUser(new BroadcastReceiver() {
267 @Override
268 public void onReceive(Context context, Intent intent) {
269 String action = intent.getAction();
270 if (Intent.ACTION_USER_SWITCHED.equals(action)) {
271 switchUser(intent.getIntExtra(Intent.EXTRA_USER_HANDLE, 0));
272 }
273 }
Victoria Lease5cd731a2012-12-19 15:04:21 -0800274 }, UserHandle.ALL, intentFilter, null, mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700275 }
276
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500277 private void ensureFallbackFusedProviderPresentLocked(ArrayList<String> pkgs) {
278 PackageManager pm = mContext.getPackageManager();
279 String systemPackageName = mContext.getPackageName();
280 ArrayList<HashSet<Signature>> sigSets = ServiceWatcher.getSignatureSets(mContext, pkgs);
281
282 List<ResolveInfo> rInfos = pm.queryIntentServicesAsUser(
283 new Intent(FUSED_LOCATION_SERVICE_ACTION),
284 PackageManager.GET_META_DATA, mCurrentUserId);
285 for (ResolveInfo rInfo : rInfos) {
286 String packageName = rInfo.serviceInfo.packageName;
287
288 // Check that the signature is in the list of supported sigs. If it's not in
289 // this list the standard provider binding logic won't bind to it.
290 try {
291 PackageInfo pInfo;
292 pInfo = pm.getPackageInfo(packageName, PackageManager.GET_SIGNATURES);
293 if (!ServiceWatcher.isSignatureMatch(pInfo.signatures, sigSets)) {
294 Log.w(TAG, packageName + " resolves service " + FUSED_LOCATION_SERVICE_ACTION +
295 ", but has wrong signature, ignoring");
296 continue;
297 }
298 } catch (NameNotFoundException e) {
299 Log.e(TAG, "missing package: " + packageName);
300 continue;
301 }
302
303 // Get the version info
304 if (rInfo.serviceInfo.metaData == null) {
305 Log.w(TAG, "Found fused provider without metadata: " + packageName);
306 continue;
307 }
308
309 int version = rInfo.serviceInfo.metaData.getInt(
310 ServiceWatcher.EXTRA_SERVICE_VERSION, -1);
311 if (version == 0) {
312 // This should be the fallback fused location provider.
313
314 // Make sure it's in the system partition.
315 if ((rInfo.serviceInfo.applicationInfo.flags & ApplicationInfo.FLAG_SYSTEM) == 0) {
316 if (D) Log.d(TAG, "Fallback candidate not in /system: " + packageName);
317 continue;
318 }
319
320 // Check that the fallback is signed the same as the OS
321 // as a proxy for coreApp="true"
322 if (pm.checkSignatures(systemPackageName, packageName)
323 != PackageManager.SIGNATURE_MATCH) {
324 if (D) Log.d(TAG, "Fallback candidate not signed the same as system: "
325 + packageName);
326 continue;
327 }
328
329 // Found a valid fallback.
330 if (D) Log.d(TAG, "Found fallback provider: " + packageName);
331 return;
332 } else {
333 if (D) Log.d(TAG, "Fallback candidate not version 0: " + packageName);
334 }
335 }
336
337 throw new IllegalStateException("Unable to find a fused location provider that is in the "
338 + "system partition with version 0 and signed with the platform certificate. "
339 + "Such a package is needed to provide a default fused location provider in the "
340 + "event that no other fused location provider has been installed or is currently "
341 + "available. For example, coreOnly boot mode when decrypting the data "
342 + "partition. The fallback must also be marked coreApp=\"true\" in the manifest");
343 }
344
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700345 private void loadProvidersLocked() {
Victoria Lease5c24fd02012-10-01 11:00:50 -0700346 // create a passive location provider, which is always enabled
347 PassiveProvider passiveProvider = new PassiveProvider(this);
348 addProviderLocked(passiveProvider);
349 mEnabledProviders.add(passiveProvider.getName());
350 mPassiveProvider = passiveProvider;
Jaikumar Ganesh8ce470d2013-04-03 12:22:18 -0700351 // Create a gps location provider
352 GpsLocationProvider gpsProvider = new GpsLocationProvider(mContext, this,
353 mLocationHandler.getLooper());
Victoria Lease5c24fd02012-10-01 11:00:50 -0700354
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700355 if (GpsLocationProvider.isSupported()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700356 mGpsStatusProvider = gpsProvider.getGpsStatusProvider();
357 mNetInitiatedListener = gpsProvider.getNetInitiatedListener();
358 addProviderLocked(gpsProvider);
359 mRealProviders.put(LocationManager.GPS_PROVIDER, gpsProvider);
360 }
361
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700362 /*
363 Load package name(s) containing location provider support.
364 These packages can contain services implementing location providers:
365 Geocoder Provider, Network Location Provider, and
366 Fused Location Provider. They will each be searched for
367 service components implementing these providers.
368 The location framework also has support for installation
369 of new location providers at run-time. The new package does not
370 have to be explicitly listed here, however it must have a signature
371 that matches the signature of at least one package on this list.
372 */
373 Resources resources = mContext.getResources();
374 ArrayList<String> providerPackageNames = new ArrayList<String>();
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500375 String[] pkgs = resources.getStringArray(
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700376 com.android.internal.R.array.config_locationProviderPackageNames);
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500377 if (D) Log.d(TAG, "certificates for location providers pulled from: " +
378 Arrays.toString(pkgs));
379 if (pkgs != null) providerPackageNames.addAll(Arrays.asList(pkgs));
380
381 ensureFallbackFusedProviderPresentLocked(providerPackageNames);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700382
383 // bind to network provider
384 LocationProviderProxy networkProvider = LocationProviderProxy.createAndBind(
385 mContext,
386 LocationManager.NETWORK_PROVIDER,
387 NETWORK_LOCATION_SERVICE_ACTION,
Zhentao Sunc5fc9982013-04-17 17:47:53 -0700388 com.android.internal.R.bool.config_enableNetworkLocationOverlay,
389 com.android.internal.R.string.config_networkLocationProviderPackageName,
390 com.android.internal.R.array.config_locationProviderPackageNames,
391 mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700392 if (networkProvider != null) {
393 mRealProviders.put(LocationManager.NETWORK_PROVIDER, networkProvider);
394 mProxyProviders.add(networkProvider);
395 addProviderLocked(networkProvider);
396 } else {
397 Slog.w(TAG, "no network location provider found");
398 }
399
400 // bind to fused provider
401 LocationProviderProxy fusedLocationProvider = LocationProviderProxy.createAndBind(
402 mContext,
403 LocationManager.FUSED_PROVIDER,
404 FUSED_LOCATION_SERVICE_ACTION,
Zhentao Sunc5fc9982013-04-17 17:47:53 -0700405 com.android.internal.R.bool.config_enableFusedLocationOverlay,
406 com.android.internal.R.string.config_fusedLocationProviderPackageName,
407 com.android.internal.R.array.config_locationProviderPackageNames,
408 mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700409 if (fusedLocationProvider != null) {
410 addProviderLocked(fusedLocationProvider);
411 mProxyProviders.add(fusedLocationProvider);
412 mEnabledProviders.add(fusedLocationProvider.getName());
Kenny Rootc3575182012-10-09 12:44:40 -0700413 mRealProviders.put(LocationManager.FUSED_PROVIDER, fusedLocationProvider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700414 } else {
415 Slog.e(TAG, "no fused location provider found",
416 new IllegalStateException("Location service needs a fused location provider"));
417 }
418
419 // bind to geocoder provider
Zhentao Sunc5fc9982013-04-17 17:47:53 -0700420 mGeocodeProvider = GeocoderProxy.createAndBind(mContext,
421 com.android.internal.R.bool.config_enableGeocoderOverlay,
422 com.android.internal.R.string.config_geocoderProviderPackageName,
423 com.android.internal.R.array.config_locationProviderPackageNames,
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800424 mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700425 if (mGeocodeProvider == null) {
426 Slog.e(TAG, "no geocoder provider found");
427 }
Jaikumar Ganesh8ce470d2013-04-03 12:22:18 -0700428
destradaacfbdcd22014-04-30 11:29:11 -0700429 // bind to fused provider if supported
destradaa5ce66d82014-05-28 18:24:08 -0700430 if (FlpHardwareProvider.isSupported()) {
431 FlpHardwareProvider flpHardwareProvider =
432 FlpHardwareProvider.getInstance(mContext);
destradaacfbdcd22014-04-30 11:29:11 -0700433 FusedProxy fusedProxy = FusedProxy.createAndBind(
434 mContext,
435 mLocationHandler,
436 flpHardwareProvider.getLocationHardware(),
437 com.android.internal.R.bool.config_enableFusedLocationOverlay,
438 com.android.internal.R.string.config_fusedLocationProviderPackageName,
439 com.android.internal.R.array.config_locationProviderPackageNames);
440 if(fusedProxy == null) {
441 Slog.e(TAG, "Unable to bind FusedProxy.");
442 }
destradaa0682809a2013-08-12 18:50:30 -0700443
destradaacfbdcd22014-04-30 11:29:11 -0700444 // bind to geofence provider
445 GeofenceProxy provider = GeofenceProxy.createAndBind(mContext,
446 com.android.internal.R.bool.config_enableGeofenceOverlay,
447 com.android.internal.R.string.config_geofenceProviderPackageName,
448 com.android.internal.R.array.config_locationProviderPackageNames,
449 mLocationHandler,
450 gpsProvider.getGpsGeofenceProxy(),
451 flpHardwareProvider.getGeofenceHardware());
452 if (provider == null) {
453 Slog.e(TAG, "Unable to bind FLP Geofence proxy.");
454 }
455 } else {
456 Slog.e(TAG, "FLP HAL not supported.");
destradaa0682809a2013-08-12 18:50:30 -0700457 }
Ji-Hwan Lee26bdb8f2014-04-21 20:48:19 +0900458
459 String[] testProviderStrings = resources.getStringArray(
460 com.android.internal.R.array.config_testLocationProviders);
461 for (String testProviderString : testProviderStrings) {
462 String fragments[] = testProviderString.split(",");
463 String name = fragments[0].trim();
464 if (mProvidersByName.get(name) != null) {
465 throw new IllegalArgumentException("Provider \"" + name + "\" already exists");
466 }
467 ProviderProperties properties = new ProviderProperties(
468 Boolean.parseBoolean(fragments[1]) /* requiresNetwork */,
469 Boolean.parseBoolean(fragments[2]) /* requiresSatellite */,
470 Boolean.parseBoolean(fragments[3]) /* requiresCell */,
471 Boolean.parseBoolean(fragments[4]) /* hasMonetaryCost */,
472 Boolean.parseBoolean(fragments[5]) /* supportsAltitude */,
473 Boolean.parseBoolean(fragments[6]) /* supportsSpeed */,
474 Boolean.parseBoolean(fragments[7]) /* supportsBearing */,
475 Integer.parseInt(fragments[8]) /* powerRequirement */,
476 Integer.parseInt(fragments[9]) /* accuracy */);
477 addTestProviderLocked(name, properties);
478 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700479 }
Mike Lockwood9637d472009-04-02 21:41:57 -0700480
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800481 /**
Victoria Lease38389b62012-09-30 11:44:22 -0700482 * Called when the device's active user changes.
483 * @param userId the new active user's UserId
484 */
485 private void switchUser(int userId) {
Jianzheng Zhoud5c69462013-10-10 14:02:09 +0800486 if (mCurrentUserId == userId) {
487 return;
488 }
Victoria Lease83762d22012-10-03 13:51:17 -0700489 mBlacklist.switchUser(userId);
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800490 mLocationHandler.removeMessages(MSG_LOCATION_CHANGED);
Victoria Lease38389b62012-09-30 11:44:22 -0700491 synchronized (mLock) {
Victoria Leaseb711d572012-10-02 13:14:11 -0700492 mLastLocation.clear();
David Christie1b9b7b12013-04-15 15:31:11 -0700493 mLastLocationCoarseInterval.clear();
Victoria Leaseb711d572012-10-02 13:14:11 -0700494 for (LocationProviderInterface p : mProviders) {
495 updateProviderListenersLocked(p.getName(), false, mCurrentUserId);
Victoria Leaseb711d572012-10-02 13:14:11 -0700496 }
Victoria Lease38389b62012-09-30 11:44:22 -0700497 mCurrentUserId = userId;
Victoria Leaseb711d572012-10-02 13:14:11 -0700498 updateProvidersLocked();
Victoria Lease38389b62012-09-30 11:44:22 -0700499 }
500 }
501
502 /**
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800503 * A wrapper class holding either an ILocationListener or a PendingIntent to receive
504 * location updates.
505 */
Mike Lockwood48f17512009-04-23 09:12:08 -0700506 private final class Receiver implements IBinder.DeathRecipient, PendingIntent.OnFinished {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700507 final int mUid; // uid of receiver
508 final int mPid; // pid of receiver
509 final String mPackageName; // package name of receiver
Victoria Lease37425c32012-10-16 16:08:48 -0700510 final int mAllowedResolutionLevel; // resolution level allowed to receiver
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700511
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800512 final ILocationListener mListener;
513 final PendingIntent mPendingIntent;
David Christie82edc9b2013-07-19 11:31:42 -0700514 final WorkSource mWorkSource; // WorkSource for battery blame, or null to assign to caller.
David Christie40e57822013-07-30 11:36:48 -0700515 final boolean mHideFromAppOps; // True if AppOps should not monitor this receiver.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800516 final Object mKey;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700517
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400518 final HashMap<String,UpdateRecord> mUpdateRecords = new HashMap<String,UpdateRecord>();
Nick Pellyf1be6862012-05-15 10:53:42 -0700519
David Christie0b837452013-07-29 16:02:13 -0700520 // True if app ops has started monitoring this receiver for locations.
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700521 boolean mOpMonitoring;
David Christie0b837452013-07-29 16:02:13 -0700522 // True if app ops has started monitoring this receiver for high power (gps) locations.
523 boolean mOpHighPowerMonitoring;
Mike Lockwood48f17512009-04-23 09:12:08 -0700524 int mPendingBroadcasts;
Victoria Lease0aa28602013-05-29 15:28:26 -0700525 PowerManager.WakeLock mWakeLock;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800526
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700527 Receiver(ILocationListener listener, PendingIntent intent, int pid, int uid,
David Christie40e57822013-07-30 11:36:48 -0700528 String packageName, WorkSource workSource, boolean hideFromAppOps) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800529 mListener = listener;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800530 mPendingIntent = intent;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700531 if (listener != null) {
532 mKey = listener.asBinder();
533 } else {
534 mKey = intent;
535 }
Victoria Lease37425c32012-10-16 16:08:48 -0700536 mAllowedResolutionLevel = getAllowedResolutionLevel(pid, uid);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700537 mUid = uid;
538 mPid = pid;
539 mPackageName = packageName;
David Christie82edc9b2013-07-19 11:31:42 -0700540 if (workSource != null && workSource.size() <= 0) {
541 workSource = null;
542 }
543 mWorkSource = workSource;
David Christie40e57822013-07-30 11:36:48 -0700544 mHideFromAppOps = hideFromAppOps;
Victoria Lease0aa28602013-05-29 15:28:26 -0700545
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700546 updateMonitoring(true);
547
Victoria Lease0aa28602013-05-29 15:28:26 -0700548 // construct/configure wakelock
549 mWakeLock = mPowerManager.newWakeLock(PowerManager.PARTIAL_WAKE_LOCK, WAKELOCK_KEY);
David Christie82edc9b2013-07-19 11:31:42 -0700550 if (workSource == null) {
551 workSource = new WorkSource(mUid, mPackageName);
552 }
553 mWakeLock.setWorkSource(workSource);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800554 }
555
556 @Override
557 public boolean equals(Object otherObj) {
558 if (otherObj instanceof Receiver) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700559 return mKey.equals(((Receiver)otherObj).mKey);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800560 }
561 return false;
562 }
563
564 @Override
565 public int hashCode() {
566 return mKey.hashCode();
567 }
Mike Lockwood3681f262009-05-12 10:52:03 -0400568
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800569 @Override
570 public String toString() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700571 StringBuilder s = new StringBuilder();
572 s.append("Reciever[");
573 s.append(Integer.toHexString(System.identityHashCode(this)));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800574 if (mListener != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700575 s.append(" listener");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800576 } else {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700577 s.append(" intent");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800578 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700579 for (String p : mUpdateRecords.keySet()) {
580 s.append(" ").append(mUpdateRecords.get(p).toString());
581 }
582 s.append("]");
583 return s.toString();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800584 }
585
David Christie15b31912013-08-13 15:54:32 -0700586 /**
587 * Update AppOp monitoring for this receiver.
588 *
589 * @param allow If true receiver is currently active, if false it's been removed.
590 */
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700591 public void updateMonitoring(boolean allow) {
David Christie40e57822013-07-30 11:36:48 -0700592 if (mHideFromAppOps) {
593 return;
594 }
595
David Christie15b31912013-08-13 15:54:32 -0700596 boolean requestingLocation = false;
597 boolean requestingHighPowerLocation = false;
598 if (allow) {
599 // See if receiver has any enabled update records. Also note if any update records
600 // are high power (has a high power provider with an interval under a threshold).
601 for (UpdateRecord updateRecord : mUpdateRecords.values()) {
602 if (isAllowedByCurrentUserSettingsLocked(updateRecord.mProvider)) {
603 requestingLocation = true;
604 LocationProviderInterface locationProvider
David Christie2ff96af2014-01-30 16:09:37 -0800605 = mProvidersByName.get(updateRecord.mProvider);
David Christie15b31912013-08-13 15:54:32 -0700606 ProviderProperties properties = locationProvider != null
607 ? locationProvider.getProperties() : null;
608 if (properties != null
609 && properties.mPowerRequirement == Criteria.POWER_HIGH
610 && updateRecord.mRequest.getInterval() < HIGH_POWER_INTERVAL_MS) {
611 requestingHighPowerLocation = true;
612 break;
613 }
614 }
615 }
616 }
617
David Christie0b837452013-07-29 16:02:13 -0700618 // First update monitoring of any location request (including high power).
David Christie15b31912013-08-13 15:54:32 -0700619 mOpMonitoring = updateMonitoring(
620 requestingLocation,
621 mOpMonitoring,
David Christie0b837452013-07-29 16:02:13 -0700622 AppOpsManager.OP_MONITOR_LOCATION);
623
624 // Now update monitoring of high power requests only.
David Christiec750c1f2013-08-08 12:56:57 -0700625 boolean wasHighPowerMonitoring = mOpHighPowerMonitoring;
David Christie15b31912013-08-13 15:54:32 -0700626 mOpHighPowerMonitoring = updateMonitoring(
627 requestingHighPowerLocation,
628 mOpHighPowerMonitoring,
David Christie0b837452013-07-29 16:02:13 -0700629 AppOpsManager.OP_MONITOR_HIGH_POWER_LOCATION);
David Christiec750c1f2013-08-08 12:56:57 -0700630 if (mOpHighPowerMonitoring != wasHighPowerMonitoring) {
David Christie15b31912013-08-13 15:54:32 -0700631 // Send an intent to notify that a high power request has been added/removed.
David Christiec750c1f2013-08-08 12:56:57 -0700632 Intent intent = new Intent(LocationManager.HIGH_POWER_REQUEST_CHANGE_ACTION);
633 mContext.sendBroadcastAsUser(intent, UserHandle.ALL);
634 }
David Christie0b837452013-07-29 16:02:13 -0700635 }
636
637 /**
638 * Update AppOps monitoring for a single location request and op type.
639 *
640 * @param allowMonitoring True if monitoring is allowed for this request/op.
641 * @param currentlyMonitoring True if AppOps is currently monitoring this request/op.
642 * @param op AppOps code for the op to update.
643 * @return True if monitoring is on for this request/op after updating.
644 */
645 private boolean updateMonitoring(boolean allowMonitoring, boolean currentlyMonitoring,
646 int op) {
647 if (!currentlyMonitoring) {
648 if (allowMonitoring) {
649 return mAppOps.startOpNoThrow(op, mUid, mPackageName)
650 == AppOpsManager.MODE_ALLOWED;
651 }
652 } else {
653 if (!allowMonitoring || mAppOps.checkOpNoThrow(op, mUid, mPackageName)
654 != AppOpsManager.MODE_ALLOWED) {
655 mAppOps.finishOp(op, mUid, mPackageName);
656 return false;
657 }
658 }
659
660 return currentlyMonitoring;
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700661 }
662
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800663 public boolean isListener() {
664 return mListener != null;
665 }
666
667 public boolean isPendingIntent() {
668 return mPendingIntent != null;
669 }
670
671 public ILocationListener getListener() {
672 if (mListener != null) {
673 return mListener;
674 }
675 throw new IllegalStateException("Request for non-existent listener");
676 }
677
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800678 public boolean callStatusChangedLocked(String provider, int status, Bundle extras) {
679 if (mListener != null) {
680 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700681 synchronized (this) {
682 // synchronize to ensure incrementPendingBroadcastsLocked()
683 // is called before decrementPendingBroadcasts()
684 mListener.onStatusChanged(provider, status, extras);
Nick Pellye0fd6932012-07-11 10:26:13 -0700685 // call this after broadcasting so we do not increment
686 // if we throw an exeption.
687 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700688 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800689 } catch (RemoteException e) {
690 return false;
691 }
692 } else {
693 Intent statusChanged = new Intent();
Victoria Lease61ecb022012-11-13 15:12:51 -0800694 statusChanged.putExtras(new Bundle(extras));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800695 statusChanged.putExtra(LocationManager.KEY_STATUS_CHANGED, status);
696 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700697 synchronized (this) {
698 // synchronize to ensure incrementPendingBroadcastsLocked()
699 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700700 mPendingIntent.send(mContext, 0, statusChanged, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700701 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700702 // call this after broadcasting so we do not increment
703 // if we throw an exeption.
704 incrementPendingBroadcastsLocked();
705 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800706 } catch (PendingIntent.CanceledException e) {
707 return false;
708 }
709 }
710 return true;
711 }
712
713 public boolean callLocationChangedLocked(Location location) {
714 if (mListener != null) {
715 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700716 synchronized (this) {
717 // synchronize to ensure incrementPendingBroadcastsLocked()
718 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c5406a2012-11-29 16:18:01 -0800719 mListener.onLocationChanged(new Location(location));
Nick Pellye0fd6932012-07-11 10:26:13 -0700720 // call this after broadcasting so we do not increment
721 // if we throw an exeption.
722 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700723 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800724 } catch (RemoteException e) {
725 return false;
726 }
727 } else {
728 Intent locationChanged = new Intent();
Victoria Lease61ecb022012-11-13 15:12:51 -0800729 locationChanged.putExtra(LocationManager.KEY_LOCATION_CHANGED, new Location(location));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800730 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700731 synchronized (this) {
732 // synchronize to ensure incrementPendingBroadcastsLocked()
733 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700734 mPendingIntent.send(mContext, 0, locationChanged, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700735 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700736 // call this after broadcasting so we do not increment
737 // if we throw an exeption.
738 incrementPendingBroadcastsLocked();
739 }
740 } catch (PendingIntent.CanceledException e) {
741 return false;
742 }
743 }
744 return true;
745 }
746
747 public boolean callProviderEnabledLocked(String provider, boolean enabled) {
David Christie15b31912013-08-13 15:54:32 -0700748 // First update AppOp monitoring.
749 // An app may get/lose location access as providers are enabled/disabled.
750 updateMonitoring(true);
751
Mike Lockwood48f17512009-04-23 09:12:08 -0700752 if (mListener != null) {
753 try {
754 synchronized (this) {
755 // synchronize to ensure incrementPendingBroadcastsLocked()
756 // is called before decrementPendingBroadcasts()
757 if (enabled) {
758 mListener.onProviderEnabled(provider);
759 } else {
760 mListener.onProviderDisabled(provider);
761 }
Nick Pellye0fd6932012-07-11 10:26:13 -0700762 // call this after broadcasting so we do not increment
763 // if we throw an exeption.
764 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700765 }
766 } catch (RemoteException e) {
767 return false;
768 }
769 } else {
770 Intent providerIntent = new Intent();
771 providerIntent.putExtra(LocationManager.KEY_PROVIDER_ENABLED, enabled);
772 try {
773 synchronized (this) {
774 // synchronize to ensure incrementPendingBroadcastsLocked()
775 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700776 mPendingIntent.send(mContext, 0, providerIntent, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700777 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700778 // call this after broadcasting so we do not increment
779 // if we throw an exeption.
780 incrementPendingBroadcastsLocked();
781 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800782 } catch (PendingIntent.CanceledException e) {
783 return false;
784 }
785 }
786 return true;
787 }
788
Nick Pellyf1be6862012-05-15 10:53:42 -0700789 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800790 public void binderDied() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700791 if (D) Log.d(TAG, "Location listener died");
792
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400793 synchronized (mLock) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800794 removeUpdatesLocked(this);
795 }
Mike Lockwood48f17512009-04-23 09:12:08 -0700796 synchronized (this) {
Victoria Lease0aa28602013-05-29 15:28:26 -0700797 clearPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700798 }
799 }
800
Nick Pellye0fd6932012-07-11 10:26:13 -0700801 @Override
Mike Lockwood48f17512009-04-23 09:12:08 -0700802 public void onSendFinished(PendingIntent pendingIntent, Intent intent,
803 int resultCode, String resultData, Bundle resultExtras) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400804 synchronized (this) {
805 decrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700806 }
807 }
808
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400809 // this must be called while synchronized by caller in a synchronized block
810 // containing the sending of the broadcaset
811 private void incrementPendingBroadcastsLocked() {
812 if (mPendingBroadcasts++ == 0) {
Victoria Lease0aa28602013-05-29 15:28:26 -0700813 mWakeLock.acquire();
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400814 }
815 }
816
817 private void decrementPendingBroadcastsLocked() {
818 if (--mPendingBroadcasts == 0) {
Victoria Lease0aa28602013-05-29 15:28:26 -0700819 if (mWakeLock.isHeld()) {
820 mWakeLock.release();
821 }
822 }
823 }
824
825 public void clearPendingBroadcastsLocked() {
826 if (mPendingBroadcasts > 0) {
827 mPendingBroadcasts = 0;
828 if (mWakeLock.isHeld()) {
829 mWakeLock.release();
830 }
Mike Lockwood48f17512009-04-23 09:12:08 -0700831 }
832 }
833 }
834
Nick Pellye0fd6932012-07-11 10:26:13 -0700835 @Override
Mike Lockwood48f17512009-04-23 09:12:08 -0700836 public void locationCallbackFinished(ILocationListener listener) {
Dianne Hackbornf5fdca92013-06-05 14:53:33 -0700837 //Do not use getReceiverLocked here as that will add the ILocationListener to
Joshua Bartel080b61b2009-10-05 12:44:46 -0400838 //the receiver list if it is not found. If it is not found then the
839 //LocationListener was removed when it had a pending broadcast and should
840 //not be added back.
Dianne Hackbornf5fdca92013-06-05 14:53:33 -0700841 synchronized (mLock) {
842 IBinder binder = listener.asBinder();
843 Receiver receiver = mReceivers.get(binder);
844 if (receiver != null) {
845 synchronized (receiver) {
846 // so wakelock calls will succeed
847 long identity = Binder.clearCallingIdentity();
848 receiver.decrementPendingBroadcastsLocked();
849 Binder.restoreCallingIdentity(identity);
David Christie2ff96af2014-01-30 16:09:37 -0800850 }
Dianne Hackbornf5fdca92013-06-05 14:53:33 -0700851 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800852 }
853 }
854
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700855 private void addProviderLocked(LocationProviderInterface provider) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400856 mProviders.add(provider);
857 mProvidersByName.put(provider.getName(), provider);
858 }
859
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700860 private void removeProviderLocked(LocationProviderInterface provider) {
861 provider.disable();
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400862 mProviders.remove(provider);
863 mProvidersByName.remove(provider.getName());
864 }
865
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800866 /**
Victoria Lease09eeaec2013-02-05 11:34:13 -0800867 * Returns "true" if access to the specified location provider is allowed by the current
868 * user's settings. Access to all location providers is forbidden to non-location-provider
869 * processes belonging to background users.
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800870 *
871 * @param provider the name of the location provider
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800872 * @return
873 */
Victoria Lease09eeaec2013-02-05 11:34:13 -0800874 private boolean isAllowedByCurrentUserSettingsLocked(String provider) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800875 if (mEnabledProviders.contains(provider)) {
876 return true;
877 }
878 if (mDisabledProviders.contains(provider)) {
879 return false;
880 }
881 // Use system settings
882 ContentResolver resolver = mContext.getContentResolver();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800883
Victoria Leaseb711d572012-10-02 13:14:11 -0700884 return Settings.Secure.isLocationProviderEnabledForUser(resolver, provider, mCurrentUserId);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800885 }
886
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700887 /**
Victoria Lease09eeaec2013-02-05 11:34:13 -0800888 * Returns "true" if access to the specified location provider is allowed by the specified
889 * user's settings. Access to all location providers is forbidden to non-location-provider
890 * processes belonging to background users.
891 *
892 * @param provider the name of the location provider
893 * @param uid the requestor's UID
894 * @return
895 */
896 private boolean isAllowedByUserSettingsLocked(String provider, int uid) {
897 if (UserHandle.getUserId(uid) != mCurrentUserId && !isUidALocationProvider(uid)) {
898 return false;
899 }
900 return isAllowedByCurrentUserSettingsLocked(provider);
901 }
902
903 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700904 * Returns the permission string associated with the specified resolution level.
905 *
906 * @param resolutionLevel the resolution level
907 * @return the permission string
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700908 */
Victoria Lease37425c32012-10-16 16:08:48 -0700909 private String getResolutionPermission(int resolutionLevel) {
910 switch (resolutionLevel) {
911 case RESOLUTION_LEVEL_FINE:
912 return android.Manifest.permission.ACCESS_FINE_LOCATION;
913 case RESOLUTION_LEVEL_COARSE:
914 return android.Manifest.permission.ACCESS_COARSE_LOCATION;
915 default:
916 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800917 }
Victoria Leaseda479c52012-10-15 15:24:16 -0700918 }
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700919
Victoria Leaseda479c52012-10-15 15:24:16 -0700920 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700921 * Returns the resolution level allowed to the given PID/UID pair.
922 *
923 * @param pid the PID
924 * @param uid the UID
925 * @return resolution level allowed to the pid/uid pair
Victoria Leaseda479c52012-10-15 15:24:16 -0700926 */
Victoria Lease37425c32012-10-16 16:08:48 -0700927 private int getAllowedResolutionLevel(int pid, int uid) {
928 if (mContext.checkPermission(android.Manifest.permission.ACCESS_FINE_LOCATION,
929 pid, uid) == PackageManager.PERMISSION_GRANTED) {
930 return RESOLUTION_LEVEL_FINE;
931 } else if (mContext.checkPermission(android.Manifest.permission.ACCESS_COARSE_LOCATION,
932 pid, uid) == PackageManager.PERMISSION_GRANTED) {
933 return RESOLUTION_LEVEL_COARSE;
934 } else {
935 return RESOLUTION_LEVEL_NONE;
Victoria Leaseda479c52012-10-15 15:24:16 -0700936 }
Victoria Lease4fab68b2012-09-13 13:20:59 -0700937 }
938
939 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700940 * Returns the resolution level allowed to the caller
941 *
942 * @return resolution level allowed to caller
Victoria Lease4fab68b2012-09-13 13:20:59 -0700943 */
Victoria Lease37425c32012-10-16 16:08:48 -0700944 private int getCallerAllowedResolutionLevel() {
945 return getAllowedResolutionLevel(Binder.getCallingPid(), Binder.getCallingUid());
946 }
947
948 /**
949 * Throw SecurityException if specified resolution level is insufficient to use geofences.
950 *
951 * @param allowedResolutionLevel resolution level allowed to caller
952 */
953 private void checkResolutionLevelIsSufficientForGeofenceUse(int allowedResolutionLevel) {
954 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
Victoria Lease4fab68b2012-09-13 13:20:59 -0700955 throw new SecurityException("Geofence usage requires ACCESS_FINE_LOCATION permission");
956 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800957 }
958
Victoria Lease37425c32012-10-16 16:08:48 -0700959 /**
960 * Return the minimum resolution level required to use the specified location provider.
961 *
962 * @param provider the name of the location provider
963 * @return minimum resolution level required for provider
964 */
965 private int getMinimumResolutionLevelForProviderUse(String provider) {
Victoria Lease8dbb6342012-09-21 16:55:53 -0700966 if (LocationManager.GPS_PROVIDER.equals(provider) ||
967 LocationManager.PASSIVE_PROVIDER.equals(provider)) {
968 // gps and passive providers require FINE permission
Victoria Lease37425c32012-10-16 16:08:48 -0700969 return RESOLUTION_LEVEL_FINE;
Victoria Lease8dbb6342012-09-21 16:55:53 -0700970 } else if (LocationManager.NETWORK_PROVIDER.equals(provider) ||
971 LocationManager.FUSED_PROVIDER.equals(provider)) {
972 // network and fused providers are ok with COARSE or FINE
Victoria Lease37425c32012-10-16 16:08:48 -0700973 return RESOLUTION_LEVEL_COARSE;
Laurent Tu941221c2012-10-04 14:21:52 -0700974 } else {
975 // mock providers
976 LocationProviderInterface lp = mMockProviders.get(provider);
977 if (lp != null) {
978 ProviderProperties properties = lp.getProperties();
979 if (properties != null) {
980 if (properties.mRequiresSatellite) {
981 // provider requiring satellites require FINE permission
Victoria Lease37425c32012-10-16 16:08:48 -0700982 return RESOLUTION_LEVEL_FINE;
Laurent Tu941221c2012-10-04 14:21:52 -0700983 } else if (properties.mRequiresNetwork || properties.mRequiresCell) {
984 // provider requiring network and or cell require COARSE or FINE
Victoria Lease37425c32012-10-16 16:08:48 -0700985 return RESOLUTION_LEVEL_COARSE;
Laurent Tu941221c2012-10-04 14:21:52 -0700986 }
987 }
988 }
Victoria Lease8dbb6342012-09-21 16:55:53 -0700989 }
Victoria Lease37425c32012-10-16 16:08:48 -0700990 return RESOLUTION_LEVEL_FINE; // if in doubt, require FINE
Victoria Leaseda479c52012-10-15 15:24:16 -0700991 }
992
Victoria Lease37425c32012-10-16 16:08:48 -0700993 /**
994 * Throw SecurityException if specified resolution level is insufficient to use the named
995 * location provider.
996 *
997 * @param allowedResolutionLevel resolution level allowed to caller
998 * @param providerName the name of the location provider
999 */
1000 private void checkResolutionLevelIsSufficientForProviderUse(int allowedResolutionLevel,
1001 String providerName) {
1002 int requiredResolutionLevel = getMinimumResolutionLevelForProviderUse(providerName);
1003 if (allowedResolutionLevel < requiredResolutionLevel) {
1004 switch (requiredResolutionLevel) {
1005 case RESOLUTION_LEVEL_FINE:
1006 throw new SecurityException("\"" + providerName + "\" location provider " +
1007 "requires ACCESS_FINE_LOCATION permission.");
1008 case RESOLUTION_LEVEL_COARSE:
1009 throw new SecurityException("\"" + providerName + "\" location provider " +
1010 "requires ACCESS_COARSE_LOCATION or ACCESS_FINE_LOCATION permission.");
1011 default:
1012 throw new SecurityException("Insufficient permission for \"" + providerName +
1013 "\" location provider.");
Victoria Leaseda479c52012-10-15 15:24:16 -07001014 }
1015 }
Victoria Lease8dbb6342012-09-21 16:55:53 -07001016 }
1017
David Christie82edc9b2013-07-19 11:31:42 -07001018 /**
1019 * Throw SecurityException if WorkSource use is not allowed (i.e. can't blame other packages
1020 * for battery).
1021 */
David Christie40e57822013-07-30 11:36:48 -07001022 private void checkDeviceStatsAllowed() {
David Christie82edc9b2013-07-19 11:31:42 -07001023 mContext.enforceCallingOrSelfPermission(
1024 android.Manifest.permission.UPDATE_DEVICE_STATS, null);
1025 }
1026
David Christie40e57822013-07-30 11:36:48 -07001027 private void checkUpdateAppOpsAllowed() {
1028 mContext.enforceCallingOrSelfPermission(
1029 android.Manifest.permission.UPDATE_APP_OPS_STATS, null);
1030 }
1031
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001032 public static int resolutionLevelToOp(int allowedResolutionLevel) {
Dianne Hackborn35654b62013-01-14 17:38:02 -08001033 if (allowedResolutionLevel != RESOLUTION_LEVEL_NONE) {
1034 if (allowedResolutionLevel == RESOLUTION_LEVEL_COARSE) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001035 return AppOpsManager.OP_COARSE_LOCATION;
Dianne Hackborn35654b62013-01-14 17:38:02 -08001036 } else {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001037 return AppOpsManager.OP_FINE_LOCATION;
Dianne Hackborn35654b62013-01-14 17:38:02 -08001038 }
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001039 }
1040 return -1;
1041 }
1042
1043 boolean reportLocationAccessNoThrow(int uid, String packageName, int allowedResolutionLevel) {
1044 int op = resolutionLevelToOp(allowedResolutionLevel);
1045 if (op >= 0) {
Dianne Hackborn35654b62013-01-14 17:38:02 -08001046 if (mAppOps.noteOpNoThrow(op, uid, packageName) != AppOpsManager.MODE_ALLOWED) {
1047 return false;
1048 }
1049 }
1050 return true;
1051 }
1052
1053 boolean checkLocationAccess(int uid, String packageName, int allowedResolutionLevel) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001054 int op = resolutionLevelToOp(allowedResolutionLevel);
1055 if (op >= 0) {
Dianne Hackborn35654b62013-01-14 17:38:02 -08001056 if (mAppOps.checkOp(op, uid, packageName) != AppOpsManager.MODE_ALLOWED) {
1057 return false;
1058 }
1059 }
1060 return true;
1061 }
1062
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001063 /**
1064 * Returns all providers by name, including passive, but excluding
Laurent Tu0d21e212012-10-02 15:33:48 -07001065 * fused, also including ones that are not permitted to
1066 * be accessed by the calling activity or are currently disabled.
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001067 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001068 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001069 public List<String> getAllProviders() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001070 ArrayList<String> out;
1071 synchronized (mLock) {
1072 out = new ArrayList<String>(mProviders.size());
1073 for (LocationProviderInterface provider : mProviders) {
1074 String name = provider.getName();
1075 if (LocationManager.FUSED_PROVIDER.equals(name)) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07001076 continue;
1077 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001078 out.add(name);
1079 }
1080 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001081
1082 if (D) Log.d(TAG, "getAllProviders()=" + out);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001083 return out;
1084 }
1085
Mike Lockwood03ca2162010-04-01 08:10:09 -07001086 /**
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001087 * Return all providers by name, that match criteria and are optionally
1088 * enabled.
1089 * Can return passive provider, but never returns fused provider.
Mike Lockwood03ca2162010-04-01 08:10:09 -07001090 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001091 @Override
1092 public List<String> getProviders(Criteria criteria, boolean enabledOnly) {
Victoria Lease37425c32012-10-16 16:08:48 -07001093 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001094 ArrayList<String> out;
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001095 int uid = Binder.getCallingUid();;
Victoria Lease269518e2012-10-29 08:25:39 -07001096 long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001097 try {
1098 synchronized (mLock) {
1099 out = new ArrayList<String>(mProviders.size());
1100 for (LocationProviderInterface provider : mProviders) {
1101 String name = provider.getName();
1102 if (LocationManager.FUSED_PROVIDER.equals(name)) {
Victoria Lease8dbb6342012-09-21 16:55:53 -07001103 continue;
1104 }
Victoria Lease37425c32012-10-16 16:08:48 -07001105 if (allowedResolutionLevel >= getMinimumResolutionLevelForProviderUse(name)) {
Victoria Lease09eeaec2013-02-05 11:34:13 -08001106 if (enabledOnly && !isAllowedByUserSettingsLocked(name, uid)) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001107 continue;
1108 }
1109 if (criteria != null && !LocationProvider.propertiesMeetCriteria(
1110 name, provider.getProperties(), criteria)) {
1111 continue;
1112 }
1113 out.add(name);
Victoria Lease8dbb6342012-09-21 16:55:53 -07001114 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001115 }
Mike Lockwood03ca2162010-04-01 08:10:09 -07001116 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001117 } finally {
1118 Binder.restoreCallingIdentity(identity);
Mike Lockwood03ca2162010-04-01 08:10:09 -07001119 }
1120
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001121 if (D) Log.d(TAG, "getProviders()=" + out);
1122 return out;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001123 }
1124
1125 /**
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001126 * Return the name of the best provider given a Criteria object.
1127 * This method has been deprecated from the public API,
Victoria Lease8dbb6342012-09-21 16:55:53 -07001128 * and the whole LocationProvider (including #meetsCriteria)
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001129 * has been deprecated as well. So this method now uses
1130 * some simplified logic.
Mike Lockwood03ca2162010-04-01 08:10:09 -07001131 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001132 @Override
Mike Lockwood03ca2162010-04-01 08:10:09 -07001133 public String getBestProvider(Criteria criteria, boolean enabledOnly) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001134 String result = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001135
1136 List<String> providers = getProviders(criteria, enabledOnly);
Victoria Lease8dbb6342012-09-21 16:55:53 -07001137 if (!providers.isEmpty()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001138 result = pickBest(providers);
1139 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
1140 return result;
1141 }
1142 providers = getProviders(null, enabledOnly);
Victoria Lease8dbb6342012-09-21 16:55:53 -07001143 if (!providers.isEmpty()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001144 result = pickBest(providers);
1145 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
1146 return result;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001147 }
1148
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001149 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
Mike Lockwood03ca2162010-04-01 08:10:09 -07001150 return null;
1151 }
1152
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001153 private String pickBest(List<String> providers) {
Victoria Lease1925e292012-09-24 17:00:18 -07001154 if (providers.contains(LocationManager.GPS_PROVIDER)) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001155 return LocationManager.GPS_PROVIDER;
Victoria Lease1925e292012-09-24 17:00:18 -07001156 } else if (providers.contains(LocationManager.NETWORK_PROVIDER)) {
1157 return LocationManager.NETWORK_PROVIDER;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001158 } else {
1159 return providers.get(0);
1160 }
1161 }
1162
Nick Pellye0fd6932012-07-11 10:26:13 -07001163 @Override
Mike Lockwood03ca2162010-04-01 08:10:09 -07001164 public boolean providerMeetsCriteria(String provider, Criteria criteria) {
1165 LocationProviderInterface p = mProvidersByName.get(provider);
1166 if (p == null) {
1167 throw new IllegalArgumentException("provider=" + provider);
1168 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001169
1170 boolean result = LocationProvider.propertiesMeetCriteria(
1171 p.getName(), p.getProperties(), criteria);
1172 if (D) Log.d(TAG, "providerMeetsCriteria(" + provider + ", " + criteria + ")=" + result);
1173 return result;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001174 }
1175
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001176 private void updateProvidersLocked() {
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001177 boolean changesMade = false;
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001178 for (int i = mProviders.size() - 1; i >= 0; i--) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001179 LocationProviderInterface p = mProviders.get(i);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001180 boolean isEnabled = p.isEnabled();
1181 String name = p.getName();
Victoria Lease09eeaec2013-02-05 11:34:13 -08001182 boolean shouldBeEnabled = isAllowedByCurrentUserSettingsLocked(name);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001183 if (isEnabled && !shouldBeEnabled) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001184 updateProviderListenersLocked(name, false, mCurrentUserId);
David Christieb084fef2013-12-18 14:33:57 -08001185 // If any provider has been disabled, clear all last locations for all providers.
1186 // This is to be on the safe side in case a provider has location derived from
1187 // this disabled provider.
1188 mLastLocation.clear();
1189 mLastLocationCoarseInterval.clear();
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001190 changesMade = true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001191 } else if (!isEnabled && shouldBeEnabled) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001192 updateProviderListenersLocked(name, true, mCurrentUserId);
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001193 changesMade = true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001194 }
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001195 }
1196 if (changesMade) {
Dianne Hackborn5ac72a22012-08-29 18:32:08 -07001197 mContext.sendBroadcastAsUser(new Intent(LocationManager.PROVIDERS_CHANGED_ACTION),
1198 UserHandle.ALL);
Tom O'Neill40a86c22013-09-03 18:05:13 -07001199 mContext.sendBroadcastAsUser(new Intent(LocationManager.MODE_CHANGED_ACTION),
1200 UserHandle.ALL);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001201 }
1202 }
1203
Victoria Leaseb711d572012-10-02 13:14:11 -07001204 private void updateProviderListenersLocked(String provider, boolean enabled, int userId) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001205 int listeners = 0;
1206
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001207 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001208 if (p == null) return;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001209
1210 ArrayList<Receiver> deadReceivers = null;
Nick Pellye0fd6932012-07-11 10:26:13 -07001211
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001212 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1213 if (records != null) {
1214 final int N = records.size();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001215 for (int i = 0; i < N; i++) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001216 UpdateRecord record = records.get(i);
Victoria Lease269518e2012-10-29 08:25:39 -07001217 if (UserHandle.getUserId(record.mReceiver.mUid) == userId) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001218 // Sends a notification message to the receiver
1219 if (!record.mReceiver.callProviderEnabledLocked(provider, enabled)) {
1220 if (deadReceivers == null) {
1221 deadReceivers = new ArrayList<Receiver>();
1222 }
1223 deadReceivers.add(record.mReceiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001224 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001225 listeners++;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001226 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001227 }
1228 }
1229
1230 if (deadReceivers != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001231 for (int i = deadReceivers.size() - 1; i >= 0; i--) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001232 removeUpdatesLocked(deadReceivers.get(i));
1233 }
1234 }
Nick Pellye0fd6932012-07-11 10:26:13 -07001235
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001236 if (enabled) {
1237 p.enable();
1238 if (listeners > 0) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001239 applyRequirementsLocked(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001240 }
1241 } else {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001242 p.disable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001243 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001244 }
1245
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001246 private void applyRequirementsLocked(String provider) {
1247 LocationProviderInterface p = mProvidersByName.get(provider);
1248 if (p == null) return;
1249
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001250 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001251 WorkSource worksource = new WorkSource();
1252 ProviderRequest providerRequest = new ProviderRequest();
1253
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001254 if (records != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001255 for (UpdateRecord record : records) {
Victoria Lease269518e2012-10-29 08:25:39 -07001256 if (UserHandle.getUserId(record.mReceiver.mUid) == mCurrentUserId) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001257 if (checkLocationAccess(record.mReceiver.mUid, record.mReceiver.mPackageName,
1258 record.mReceiver.mAllowedResolutionLevel)) {
1259 LocationRequest locationRequest = record.mRequest;
1260 providerRequest.locationRequests.add(locationRequest);
1261 if (locationRequest.getInterval() < providerRequest.interval) {
1262 providerRequest.reportLocation = true;
1263 providerRequest.interval = locationRequest.getInterval();
1264 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001265 }
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -07001266 }
1267 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001268
1269 if (providerRequest.reportLocation) {
1270 // calculate who to blame for power
1271 // This is somewhat arbitrary. We pick a threshold interval
1272 // that is slightly higher that the minimum interval, and
1273 // spread the blame across all applications with a request
1274 // under that threshold.
1275 long thresholdInterval = (providerRequest.interval + 1000) * 3 / 2;
1276 for (UpdateRecord record : records) {
Victoria Lease269518e2012-10-29 08:25:39 -07001277 if (UserHandle.getUserId(record.mReceiver.mUid) == mCurrentUserId) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001278 LocationRequest locationRequest = record.mRequest;
1279 if (locationRequest.getInterval() <= thresholdInterval) {
David Christiee55c9682013-08-22 10:10:34 -07001280 if (record.mReceiver.mWorkSource != null
1281 && record.mReceiver.mWorkSource.size() > 0
1282 && record.mReceiver.mWorkSource.getName(0) != null) {
David Christie82edc9b2013-07-19 11:31:42 -07001283 // Assign blame to another work source.
David Christiee55c9682013-08-22 10:10:34 -07001284 // Can only assign blame if the WorkSource contains names.
David Christie82edc9b2013-07-19 11:31:42 -07001285 worksource.add(record.mReceiver.mWorkSource);
1286 } else {
1287 // Assign blame to caller.
1288 worksource.add(
1289 record.mReceiver.mUid,
1290 record.mReceiver.mPackageName);
1291 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001292 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001293 }
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -07001294 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001295 }
1296 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001297
1298 if (D) Log.d(TAG, "provider request: " + provider + " " + providerRequest);
1299 p.setRequest(providerRequest, worksource);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001300 }
1301
1302 private class UpdateRecord {
1303 final String mProvider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001304 final LocationRequest mRequest;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001305 final Receiver mReceiver;
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001306 Location mLastFixBroadcast;
1307 long mLastStatusBroadcast;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001308
1309 /**
1310 * Note: must be constructed with lock held.
1311 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001312 UpdateRecord(String provider, LocationRequest request, Receiver receiver) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001313 mProvider = provider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001314 mRequest = request;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001315 mReceiver = receiver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001316
1317 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1318 if (records == null) {
1319 records = new ArrayList<UpdateRecord>();
1320 mRecordsByProvider.put(provider, records);
1321 }
1322 if (!records.contains(this)) {
1323 records.add(this);
1324 }
David Christie2ff96af2014-01-30 16:09:37 -08001325
1326 // Update statistics for historical location requests by package/provider
1327 mRequestStatistics.startRequesting(
1328 mReceiver.mPackageName, provider, request.getInterval());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001329 }
1330
1331 /**
David Christie2ff96af2014-01-30 16:09:37 -08001332 * Method to be called when a record will no longer be used.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001333 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001334 void disposeLocked(boolean removeReceiver) {
David Christie2ff96af2014-01-30 16:09:37 -08001335 mRequestStatistics.stopRequesting(mReceiver.mPackageName, mProvider);
1336
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001337 // remove from mRecordsByProvider
1338 ArrayList<UpdateRecord> globalRecords = mRecordsByProvider.get(this.mProvider);
1339 if (globalRecords != null) {
1340 globalRecords.remove(this);
1341 }
1342
1343 if (!removeReceiver) return; // the caller will handle the rest
1344
1345 // remove from Receiver#mUpdateRecords
1346 HashMap<String, UpdateRecord> receiverRecords = mReceiver.mUpdateRecords;
1347 if (receiverRecords != null) {
1348 receiverRecords.remove(this.mProvider);
1349
1350 // and also remove the Receiver if it has no more update records
1351 if (removeReceiver && receiverRecords.size() == 0) {
1352 removeUpdatesLocked(mReceiver);
1353 }
Mike Lockwood3a76fd62009-09-01 07:26:56 -04001354 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001355 }
1356
1357 @Override
1358 public String toString() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001359 StringBuilder s = new StringBuilder();
1360 s.append("UpdateRecord[");
1361 s.append(mProvider);
1362 s.append(' ').append(mReceiver.mPackageName).append('(');
1363 s.append(mReceiver.mUid).append(')');
1364 s.append(' ').append(mRequest);
1365 s.append(']');
1366 return s.toString();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001367 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001368 }
1369
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001370 private Receiver getReceiverLocked(ILocationListener listener, int pid, int uid,
David Christie40e57822013-07-30 11:36:48 -07001371 String packageName, WorkSource workSource, boolean hideFromAppOps) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001372 IBinder binder = listener.asBinder();
1373 Receiver receiver = mReceivers.get(binder);
1374 if (receiver == null) {
David Christie40e57822013-07-30 11:36:48 -07001375 receiver = new Receiver(listener, null, pid, uid, packageName, workSource,
1376 hideFromAppOps);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001377 mReceivers.put(binder, receiver);
1378
1379 try {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001380 receiver.getListener().asBinder().linkToDeath(receiver, 0);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001381 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001382 Slog.e(TAG, "linkToDeath failed:", e);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001383 return null;
1384 }
1385 }
1386 return receiver;
1387 }
1388
David Christie82edc9b2013-07-19 11:31:42 -07001389 private Receiver getReceiverLocked(PendingIntent intent, int pid, int uid, String packageName,
David Christie40e57822013-07-30 11:36:48 -07001390 WorkSource workSource, boolean hideFromAppOps) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001391 Receiver receiver = mReceivers.get(intent);
1392 if (receiver == null) {
David Christie40e57822013-07-30 11:36:48 -07001393 receiver = new Receiver(null, intent, pid, uid, packageName, workSource,
1394 hideFromAppOps);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001395 mReceivers.put(intent, receiver);
1396 }
1397 return receiver;
1398 }
1399
Victoria Lease37425c32012-10-16 16:08:48 -07001400 /**
1401 * Creates a LocationRequest based upon the supplied LocationRequest that to meets resolution
1402 * and consistency requirements.
1403 *
1404 * @param request the LocationRequest from which to create a sanitized version
Victoria Lease37425c32012-10-16 16:08:48 -07001405 * @return a version of request that meets the given resolution and consistency requirements
1406 * @hide
1407 */
1408 private LocationRequest createSanitizedRequest(LocationRequest request, int resolutionLevel) {
1409 LocationRequest sanitizedRequest = new LocationRequest(request);
1410 if (resolutionLevel < RESOLUTION_LEVEL_FINE) {
1411 switch (sanitizedRequest.getQuality()) {
Victoria Lease09016ab2012-09-16 12:33:15 -07001412 case LocationRequest.ACCURACY_FINE:
Victoria Lease37425c32012-10-16 16:08:48 -07001413 sanitizedRequest.setQuality(LocationRequest.ACCURACY_BLOCK);
Victoria Lease09016ab2012-09-16 12:33:15 -07001414 break;
1415 case LocationRequest.POWER_HIGH:
Victoria Lease37425c32012-10-16 16:08:48 -07001416 sanitizedRequest.setQuality(LocationRequest.POWER_LOW);
Victoria Lease09016ab2012-09-16 12:33:15 -07001417 break;
1418 }
1419 // throttle
Victoria Lease37425c32012-10-16 16:08:48 -07001420 if (sanitizedRequest.getInterval() < LocationFudger.FASTEST_INTERVAL_MS) {
1421 sanitizedRequest.setInterval(LocationFudger.FASTEST_INTERVAL_MS);
Victoria Lease09016ab2012-09-16 12:33:15 -07001422 }
Victoria Lease37425c32012-10-16 16:08:48 -07001423 if (sanitizedRequest.getFastestInterval() < LocationFudger.FASTEST_INTERVAL_MS) {
1424 sanitizedRequest.setFastestInterval(LocationFudger.FASTEST_INTERVAL_MS);
Victoria Lease09016ab2012-09-16 12:33:15 -07001425 }
Nick Pelly74fa7ea2012-08-13 19:36:38 -07001426 }
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001427 // make getFastestInterval() the minimum of interval and fastest interval
Victoria Lease37425c32012-10-16 16:08:48 -07001428 if (sanitizedRequest.getFastestInterval() > sanitizedRequest.getInterval()) {
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001429 request.setFastestInterval(request.getInterval());
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001430 }
Victoria Lease37425c32012-10-16 16:08:48 -07001431 return sanitizedRequest;
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001432 }
1433
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001434 private void checkPackageName(String packageName) {
Nick Pellye0fd6932012-07-11 10:26:13 -07001435 if (packageName == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001436 throw new SecurityException("invalid package name: " + packageName);
Nick Pellye0fd6932012-07-11 10:26:13 -07001437 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001438 int uid = Binder.getCallingUid();
Nick Pellye0fd6932012-07-11 10:26:13 -07001439 String[] packages = mPackageManager.getPackagesForUid(uid);
1440 if (packages == null) {
1441 throw new SecurityException("invalid UID " + uid);
1442 }
1443 for (String pkg : packages) {
1444 if (packageName.equals(pkg)) return;
1445 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001446 throw new SecurityException("invalid package name: " + packageName);
Nick Pellye0fd6932012-07-11 10:26:13 -07001447 }
1448
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001449 private void checkPendingIntent(PendingIntent intent) {
1450 if (intent == null) {
1451 throw new IllegalArgumentException("invalid pending intent: " + intent);
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001452 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001453 }
1454
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001455 private Receiver checkListenerOrIntentLocked(ILocationListener listener, PendingIntent intent,
David Christie40e57822013-07-30 11:36:48 -07001456 int pid, int uid, String packageName, WorkSource workSource, boolean hideFromAppOps) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001457 if (intent == null && listener == null) {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001458 throw new IllegalArgumentException("need either listener or intent");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001459 } else if (intent != null && listener != null) {
1460 throw new IllegalArgumentException("cannot register both listener and intent");
1461 } else if (intent != null) {
1462 checkPendingIntent(intent);
David Christie40e57822013-07-30 11:36:48 -07001463 return getReceiverLocked(intent, pid, uid, packageName, workSource, hideFromAppOps);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001464 } else {
David Christie40e57822013-07-30 11:36:48 -07001465 return getReceiverLocked(listener, pid, uid, packageName, workSource, hideFromAppOps);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001466 }
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001467 }
1468
Nick Pellye0fd6932012-07-11 10:26:13 -07001469 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001470 public void requestLocationUpdates(LocationRequest request, ILocationListener listener,
1471 PendingIntent intent, String packageName) {
1472 if (request == null) request = DEFAULT_LOCATION_REQUEST;
1473 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001474 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1475 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1476 request.getProvider());
David Christie82edc9b2013-07-19 11:31:42 -07001477 WorkSource workSource = request.getWorkSource();
1478 if (workSource != null && workSource.size() > 0) {
David Christie40e57822013-07-30 11:36:48 -07001479 checkDeviceStatsAllowed();
1480 }
1481 boolean hideFromAppOps = request.getHideFromAppOps();
1482 if (hideFromAppOps) {
1483 checkUpdateAppOpsAllowed();
David Christie82edc9b2013-07-19 11:31:42 -07001484 }
Victoria Lease37425c32012-10-16 16:08:48 -07001485 LocationRequest sanitizedRequest = createSanitizedRequest(request, allowedResolutionLevel);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001486
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001487 final int pid = Binder.getCallingPid();
1488 final int uid = Binder.getCallingUid();
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001489 // providers may use public location API's, need to clear identity
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001490 long identity = Binder.clearCallingIdentity();
1491 try {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001492 // We don't check for MODE_IGNORED here; we will do that when we go to deliver
1493 // a location.
Dianne Hackborn35654b62013-01-14 17:38:02 -08001494 checkLocationAccess(uid, packageName, allowedResolutionLevel);
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001495
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001496 synchronized (mLock) {
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001497 Receiver recevier = checkListenerOrIntentLocked(listener, intent, pid, uid,
David Christie40e57822013-07-30 11:36:48 -07001498 packageName, workSource, hideFromAppOps);
Victoria Lease37425c32012-10-16 16:08:48 -07001499 requestLocationUpdatesLocked(sanitizedRequest, recevier, pid, uid, packageName);
Mike Lockwood2d4d1bf2010-10-18 17:06:26 -04001500 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001501 } finally {
1502 Binder.restoreCallingIdentity(identity);
1503 }
1504 }
1505
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001506 private void requestLocationUpdatesLocked(LocationRequest request, Receiver receiver,
1507 int pid, int uid, String packageName) {
1508 // Figure out the provider. Either its explicitly request (legacy use cases), or
1509 // use the fused provider
1510 if (request == null) request = DEFAULT_LOCATION_REQUEST;
1511 String name = request.getProvider();
Victoria Lease09016ab2012-09-16 12:33:15 -07001512 if (name == null) {
1513 throw new IllegalArgumentException("provider name must not be null");
1514 }
Zhentao Sunc5fc9982013-04-17 17:47:53 -07001515
1516 if (D) Log.d(TAG, "request " + Integer.toHexString(System.identityHashCode(receiver))
1517 + " " + name + " " + request + " from " + packageName + "(" + uid + ")");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001518 LocationProviderInterface provider = mProvidersByName.get(name);
1519 if (provider == null) {
Victoria Leaseb30f3832013-10-13 12:15:40 -07001520 throw new IllegalArgumentException("provider doesn't exist: " + name);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001521 }
1522
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001523 UpdateRecord record = new UpdateRecord(name, request, receiver);
1524 UpdateRecord oldRecord = receiver.mUpdateRecords.put(name, record);
1525 if (oldRecord != null) {
1526 oldRecord.disposeLocked(false);
1527 }
1528
Victoria Lease09eeaec2013-02-05 11:34:13 -08001529 boolean isProviderEnabled = isAllowedByUserSettingsLocked(name, uid);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001530 if (isProviderEnabled) {
1531 applyRequirementsLocked(name);
1532 } else {
1533 // Notify the listener that updates are currently disabled
1534 receiver.callProviderEnabledLocked(name, false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001535 }
David Christie0b837452013-07-29 16:02:13 -07001536 // Update the monitoring here just in case multiple location requests were added to the
1537 // same receiver (this request may be high power and the initial might not have been).
1538 receiver.updateMonitoring(true);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001539 }
1540
Nick Pellye0fd6932012-07-11 10:26:13 -07001541 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001542 public void removeUpdates(ILocationListener listener, PendingIntent intent,
1543 String packageName) {
1544 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001545
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001546 final int pid = Binder.getCallingPid();
1547 final int uid = Binder.getCallingUid();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001548
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001549 synchronized (mLock) {
David Christie82edc9b2013-07-19 11:31:42 -07001550 WorkSource workSource = null;
David Christie40e57822013-07-30 11:36:48 -07001551 boolean hideFromAppOps = false;
1552 Receiver receiver = checkListenerOrIntentLocked(listener, intent, pid, uid,
1553 packageName, workSource, hideFromAppOps);
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001554
1555 // providers may use public location API's, need to clear identity
1556 long identity = Binder.clearCallingIdentity();
1557 try {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001558 removeUpdatesLocked(receiver);
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001559 } finally {
1560 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001561 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001562 }
1563 }
1564
1565 private void removeUpdatesLocked(Receiver receiver) {
Dianne Hackborn7ff30112012-11-08 11:12:09 -08001566 if (D) Log.i(TAG, "remove " + Integer.toHexString(System.identityHashCode(receiver)));
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001567
1568 if (mReceivers.remove(receiver.mKey) != null && receiver.isListener()) {
1569 receiver.getListener().asBinder().unlinkToDeath(receiver, 0);
1570 synchronized (receiver) {
Victoria Lease0aa28602013-05-29 15:28:26 -07001571 receiver.clearPendingBroadcastsLocked();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001572 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001573 }
1574
Dianne Hackborn1304f4a2013-07-09 18:17:27 -07001575 receiver.updateMonitoring(false);
1576
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001577 // Record which providers were associated with this listener
1578 HashSet<String> providers = new HashSet<String>();
1579 HashMap<String, UpdateRecord> oldRecords = receiver.mUpdateRecords;
1580 if (oldRecords != null) {
1581 // Call dispose() on the obsolete update records.
1582 for (UpdateRecord record : oldRecords.values()) {
David Christie2ff96af2014-01-30 16:09:37 -08001583 // Update statistics for historical location requests by package/provider
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001584 record.disposeLocked(false);
1585 }
1586 // Accumulate providers
1587 providers.addAll(oldRecords.keySet());
1588 }
1589
1590 // update provider
1591 for (String provider : providers) {
1592 // If provider is already disabled, don't need to do anything
Victoria Lease09eeaec2013-02-05 11:34:13 -08001593 if (!isAllowedByCurrentUserSettingsLocked(provider)) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001594 continue;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001595 }
1596
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001597 applyRequirementsLocked(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001598 }
1599 }
1600
Dianne Hackbornc2293022013-02-06 23:14:49 -08001601 private void applyAllProviderRequirementsLocked() {
1602 for (LocationProviderInterface p : mProviders) {
1603 // If provider is already disabled, don't need to do anything
Dianne Hackborn64d41d72013-02-07 00:33:31 -08001604 if (!isAllowedByCurrentUserSettingsLocked(p.getName())) {
Dianne Hackbornc2293022013-02-06 23:14:49 -08001605 continue;
1606 }
1607
1608 applyRequirementsLocked(p.getName());
1609 }
1610 }
1611
Nick Pellye0fd6932012-07-11 10:26:13 -07001612 @Override
Nick Pelly4035f5a2012-08-17 14:43:49 -07001613 public Location getLastLocation(LocationRequest request, String packageName) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001614 if (D) Log.d(TAG, "getLastLocation: " + request);
1615 if (request == null) request = DEFAULT_LOCATION_REQUEST;
Victoria Lease37425c32012-10-16 16:08:48 -07001616 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
Nick Pelly4035f5a2012-08-17 14:43:49 -07001617 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001618 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1619 request.getProvider());
1620 // no need to sanitize this request, as only the provider name is used
Nick Pelly4035f5a2012-08-17 14:43:49 -07001621
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001622 final int uid = Binder.getCallingUid();
1623 final long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001624 try {
1625 if (mBlacklist.isBlacklisted(packageName)) {
1626 if (D) Log.d(TAG, "not returning last loc for blacklisted app: " +
1627 packageName);
Victoria Lease09016ab2012-09-16 12:33:15 -07001628 return null;
1629 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001630
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001631 if (!reportLocationAccessNoThrow(uid, packageName, allowedResolutionLevel)) {
1632 if (D) Log.d(TAG, "not returning last loc for no op app: " +
1633 packageName);
1634 return null;
1635 }
1636
Victoria Leaseb711d572012-10-02 13:14:11 -07001637 synchronized (mLock) {
1638 // Figure out the provider. Either its explicitly request (deprecated API's),
1639 // or use the fused provider
1640 String name = request.getProvider();
1641 if (name == null) name = LocationManager.FUSED_PROVIDER;
1642 LocationProviderInterface provider = mProvidersByName.get(name);
1643 if (provider == null) return null;
1644
Victoria Lease09eeaec2013-02-05 11:34:13 -08001645 if (!isAllowedByUserSettingsLocked(name, uid)) return null;
Victoria Leaseb711d572012-10-02 13:14:11 -07001646
David Christie1b9b7b12013-04-15 15:31:11 -07001647 Location location;
1648 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
1649 // Make sure that an app with coarse permissions can't get frequent location
1650 // updates by calling LocationManager.getLastKnownLocation repeatedly.
1651 location = mLastLocationCoarseInterval.get(name);
1652 } else {
1653 location = mLastLocation.get(name);
1654 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001655 if (location == null) {
1656 return null;
1657 }
Victoria Lease37425c32012-10-16 16:08:48 -07001658 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001659 Location noGPSLocation = location.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1660 if (noGPSLocation != null) {
Dianne Hackborn6c5406a2012-11-29 16:18:01 -08001661 return new Location(mLocationFudger.getOrCreate(noGPSLocation));
Victoria Leaseb711d572012-10-02 13:14:11 -07001662 }
Victoria Lease37425c32012-10-16 16:08:48 -07001663 } else {
Dianne Hackborn6c5406a2012-11-29 16:18:01 -08001664 return new Location(location);
Victoria Lease09016ab2012-09-16 12:33:15 -07001665 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001666 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001667 return null;
1668 } finally {
1669 Binder.restoreCallingIdentity(identity);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001670 }
1671 }
1672
1673 @Override
1674 public void requestGeofence(LocationRequest request, Geofence geofence, PendingIntent intent,
1675 String packageName) {
1676 if (request == null) request = DEFAULT_LOCATION_REQUEST;
Victoria Lease37425c32012-10-16 16:08:48 -07001677 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1678 checkResolutionLevelIsSufficientForGeofenceUse(allowedResolutionLevel);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001679 checkPendingIntent(intent);
1680 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001681 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1682 request.getProvider());
1683 LocationRequest sanitizedRequest = createSanitizedRequest(request, allowedResolutionLevel);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001684
Victoria Lease37425c32012-10-16 16:08:48 -07001685 if (D) Log.d(TAG, "requestGeofence: " + sanitizedRequest + " " + geofence + " " + intent);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001686
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001687 // geo-fence manager uses the public location API, need to clear identity
1688 int uid = Binder.getCallingUid();
Victoria Lease56e675b2012-11-05 19:25:06 -08001689 if (UserHandle.getUserId(uid) != UserHandle.USER_OWNER) {
1690 // temporary measure until geofences work for secondary users
1691 Log.w(TAG, "proximity alerts are currently available only to the primary user");
1692 return;
1693 }
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001694 long identity = Binder.clearCallingIdentity();
1695 try {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001696 mGeofenceManager.addFence(sanitizedRequest, geofence, intent, allowedResolutionLevel,
1697 uid, packageName);
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001698 } finally {
1699 Binder.restoreCallingIdentity(identity);
1700 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001701 }
1702
1703 @Override
1704 public void removeGeofence(Geofence geofence, PendingIntent intent, String packageName) {
Victoria Lease37425c32012-10-16 16:08:48 -07001705 checkResolutionLevelIsSufficientForGeofenceUse(getCallerAllowedResolutionLevel());
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001706 checkPendingIntent(intent);
1707 checkPackageName(packageName);
1708
1709 if (D) Log.d(TAG, "removeGeofence: " + geofence + " " + intent);
1710
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001711 // geo-fence manager uses the public location API, need to clear identity
1712 long identity = Binder.clearCallingIdentity();
1713 try {
1714 mGeofenceManager.removeFence(geofence, intent);
1715 } finally {
1716 Binder.restoreCallingIdentity(identity);
1717 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001718 }
1719
1720
1721 @Override
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001722 public boolean addGpsStatusListener(IGpsStatusListener listener, String packageName) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001723 if (mGpsStatusProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001724 return false;
1725 }
Dianne Hackborn35654b62013-01-14 17:38:02 -08001726 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1727 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
Victoria Lease37425c32012-10-16 16:08:48 -07001728 LocationManager.GPS_PROVIDER);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001729
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001730 final int uid = Binder.getCallingUid();
1731 final long ident = Binder.clearCallingIdentity();
1732 try {
Victoria Lease3d5173d2013-02-05 16:07:32 -08001733 if (!checkLocationAccess(uid, packageName, allowedResolutionLevel)) {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001734 return false;
1735 }
1736 } finally {
1737 Binder.restoreCallingIdentity(ident);
1738 }
1739
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001740 try {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001741 mGpsStatusProvider.addGpsStatusListener(listener);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001742 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001743 Slog.e(TAG, "mGpsStatusProvider.addGpsStatusListener failed", e);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001744 return false;
1745 }
1746 return true;
1747 }
1748
Nick Pellye0fd6932012-07-11 10:26:13 -07001749 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001750 public void removeGpsStatusListener(IGpsStatusListener listener) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001751 synchronized (mLock) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001752 try {
1753 mGpsStatusProvider.removeGpsStatusListener(listener);
1754 } catch (Exception e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001755 Slog.e(TAG, "mGpsStatusProvider.removeGpsStatusListener failed", e);
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001756 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001757 }
1758 }
1759
Nick Pellye0fd6932012-07-11 10:26:13 -07001760 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001761 public boolean sendExtraCommand(String provider, String command, Bundle extras) {
Mike Lockwoodc6cc8362009-08-17 13:16:08 -04001762 if (provider == null) {
1763 // throw NullPointerException to remain compatible with previous implementation
1764 throw new NullPointerException();
1765 }
Victoria Lease37425c32012-10-16 16:08:48 -07001766 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1767 provider);
Mike Lockwoodc6cc8362009-08-17 13:16:08 -04001768
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001769 // and check for ACCESS_LOCATION_EXTRA_COMMANDS
Mike Lockwoodb7e99222009-07-07 13:18:21 -04001770 if ((mContext.checkCallingOrSelfPermission(ACCESS_LOCATION_EXTRA_COMMANDS)
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001771 != PackageManager.PERMISSION_GRANTED)) {
1772 throw new SecurityException("Requires ACCESS_LOCATION_EXTRA_COMMANDS permission");
1773 }
1774
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001775 synchronized (mLock) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001776 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001777 if (p == null) return false;
Nick Pellye0fd6932012-07-11 10:26:13 -07001778
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001779 return p.sendExtraCommand(command, extras);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001780 }
1781 }
1782
Nick Pellye0fd6932012-07-11 10:26:13 -07001783 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001784 public boolean sendNiResponse(int notifId, int userResponse) {
Mike Lockwood18ad9f62009-08-27 14:01:23 -07001785 if (Binder.getCallingUid() != Process.myUid()) {
1786 throw new SecurityException(
1787 "calling sendNiResponse from outside of the system is not allowed");
1788 }
Danke Xie22d1f9f2009-08-18 18:28:45 -04001789 try {
1790 return mNetInitiatedListener.sendNiResponse(notifId, userResponse);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001791 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001792 Slog.e(TAG, "RemoteException in LocationManagerService.sendNiResponse");
Danke Xie22d1f9f2009-08-18 18:28:45 -04001793 return false;
1794 }
1795 }
1796
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001797 /**
Mike Lockwood628fd6d2010-01-25 22:46:13 -05001798 * @return null if the provider does not exist
Alexey Tarasovf2db9fb2009-09-01 02:37:07 +11001799 * @throws SecurityException if the provider is not allowed to be
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001800 * accessed by the caller
1801 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001802 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001803 public ProviderProperties getProviderProperties(String provider) {
Laurent Tub7f9d252012-10-16 14:25:00 -07001804 if (mProvidersByName.get(provider) == null) {
David Christie2ff96af2014-01-30 16:09:37 -08001805 return null;
Laurent Tub7f9d252012-10-16 14:25:00 -07001806 }
1807
Victoria Lease37425c32012-10-16 16:08:48 -07001808 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1809 provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001810
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001811 LocationProviderInterface p;
1812 synchronized (mLock) {
1813 p = mProvidersByName.get(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001814 }
1815
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001816 if (p == null) return null;
1817 return p.getProperties();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001818 }
1819
Nick Pellye0fd6932012-07-11 10:26:13 -07001820 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001821 public boolean isProviderEnabled(String provider) {
Tom O'Neilld5759432013-09-11 11:03:03 -07001822 // Fused provider is accessed indirectly via criteria rather than the provider-based APIs,
1823 // so we discourage its use
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001824 if (LocationManager.FUSED_PROVIDER.equals(provider)) return false;
1825
Victoria Lease09eeaec2013-02-05 11:34:13 -08001826 int uid = Binder.getCallingUid();
Victoria Lease269518e2012-10-29 08:25:39 -07001827 long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001828 try {
1829 synchronized (mLock) {
1830 LocationProviderInterface p = mProvidersByName.get(provider);
1831 if (p == null) return false;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001832
Victoria Lease09eeaec2013-02-05 11:34:13 -08001833 return isAllowedByUserSettingsLocked(provider, uid);
Victoria Leaseb711d572012-10-02 13:14:11 -07001834 }
1835 } finally {
1836 Binder.restoreCallingIdentity(identity);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001837 }
1838 }
1839
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001840 /**
1841 * Returns "true" if the UID belongs to a bound location provider.
1842 *
1843 * @param uid the uid
1844 * @return true if uid belongs to a bound location provider
1845 */
1846 private boolean isUidALocationProvider(int uid) {
1847 if (uid == Process.SYSTEM_UID) {
1848 return true;
1849 }
1850 if (mGeocodeProvider != null) {
David Christie1f141c12014-05-14 15:11:15 -07001851 if (doesUidHavePackage(uid, mGeocodeProvider.getConnectedPackageName())) return true;
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001852 }
1853 for (LocationProviderProxy proxy : mProxyProviders) {
David Christie1f141c12014-05-14 15:11:15 -07001854 if (doesUidHavePackage(uid, proxy.getConnectedPackageName())) return true;
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001855 }
1856 return false;
1857 }
1858
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001859 private void checkCallerIsProvider() {
1860 if (mContext.checkCallingOrSelfPermission(INSTALL_LOCATION_PROVIDER)
1861 == PackageManager.PERMISSION_GRANTED) {
1862 return;
1863 }
1864
1865 // Previously we only used the INSTALL_LOCATION_PROVIDER
1866 // check. But that is system or signature
1867 // protection level which is not flexible enough for
1868 // providers installed oustide the system image. So
1869 // also allow providers with a UID matching the
1870 // currently bound package name
1871
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001872 if (isUidALocationProvider(Binder.getCallingUid())) {
1873 return;
1874 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001875
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001876 throw new SecurityException("need INSTALL_LOCATION_PROVIDER permission, " +
1877 "or UID of a currently bound location provider");
1878 }
1879
David Christie1f141c12014-05-14 15:11:15 -07001880 /**
1881 * Returns true if the given package belongs to the given uid.
1882 */
1883 private boolean doesUidHavePackage(int uid, String packageName) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001884 if (packageName == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001885 return false;
1886 }
David Christie1f141c12014-05-14 15:11:15 -07001887 String[] packageNames = mPackageManager.getPackagesForUid(uid);
1888 if (packageNames == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001889 return false;
1890 }
David Christie1f141c12014-05-14 15:11:15 -07001891 for (String name : packageNames) {
1892 if (packageName.equals(name)) {
1893 return true;
1894 }
1895 }
1896 return false;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001897 }
1898
Nick Pellye0fd6932012-07-11 10:26:13 -07001899 @Override
Mike Lockwooda4903f22010-02-17 06:42:23 -05001900 public void reportLocation(Location location, boolean passive) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001901 checkCallerIsProvider();
Mike Lockwood275555c2009-05-01 11:30:34 -04001902
Nick Pelly2eeeec22012-07-18 13:13:37 -07001903 if (!location.isComplete()) {
1904 Log.w(TAG, "Dropping incomplete location: " + location);
1905 return;
1906 }
1907
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001908 mLocationHandler.removeMessages(MSG_LOCATION_CHANGED, location);
1909 Message m = Message.obtain(mLocationHandler, MSG_LOCATION_CHANGED, location);
Mike Lockwooda4903f22010-02-17 06:42:23 -05001910 m.arg1 = (passive ? 1 : 0);
Mike Lockwood4e50b782009-04-03 08:24:43 -07001911 mLocationHandler.sendMessageAtFrontOfQueue(m);
1912 }
1913
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001914
Laurent Tu75defb62012-11-01 16:21:52 -07001915 private static boolean shouldBroadcastSafe(
1916 Location loc, Location lastLoc, UpdateRecord record, long now) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001917 // Always broadcast the first update
1918 if (lastLoc == null) {
1919 return true;
1920 }
1921
Nick Pellyf1be6862012-05-15 10:53:42 -07001922 // Check whether sufficient time has passed
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001923 long minTime = record.mRequest.getFastestInterval();
David Christie1b9b7b12013-04-15 15:31:11 -07001924 long delta = (loc.getElapsedRealtimeNanos() - lastLoc.getElapsedRealtimeNanos())
1925 / NANOS_PER_MILLI;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001926 if (delta < minTime - MAX_PROVIDER_SCHEDULING_JITTER_MS) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001927 return false;
1928 }
1929
1930 // Check whether sufficient distance has been traveled
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001931 double minDistance = record.mRequest.getSmallestDisplacement();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001932 if (minDistance > 0.0) {
1933 if (loc.distanceTo(lastLoc) <= minDistance) {
1934 return false;
1935 }
1936 }
1937
Laurent Tu75defb62012-11-01 16:21:52 -07001938 // Check whether sufficient number of udpates is left
1939 if (record.mRequest.getNumUpdates() <= 0) {
1940 return false;
1941 }
1942
1943 // Check whether the expiry date has passed
1944 if (record.mRequest.getExpireAt() < now) {
1945 return false;
1946 }
1947
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001948 return true;
1949 }
1950
Mike Lockwooda4903f22010-02-17 06:42:23 -05001951 private void handleLocationChangedLocked(Location location, boolean passive) {
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001952 if (D) Log.d(TAG, "incoming location: " + location);
1953
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001954 long now = SystemClock.elapsedRealtime();
Mike Lockwooda4903f22010-02-17 06:42:23 -05001955 String provider = (passive ? LocationManager.PASSIVE_PROVIDER : location.getProvider());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001956
Laurent Tu60ec50a2012-10-04 17:00:10 -07001957 // Skip if the provider is unknown.
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001958 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001959 if (p == null) return;
1960
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001961 // Update last known locations
Victoria Lease09016ab2012-09-16 12:33:15 -07001962 Location noGPSLocation = location.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1963 Location lastNoGPSLocation = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001964 Location lastLocation = mLastLocation.get(provider);
Mike Lockwood4e50b782009-04-03 08:24:43 -07001965 if (lastLocation == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001966 lastLocation = new Location(provider);
1967 mLastLocation.put(provider, lastLocation);
Victoria Lease09016ab2012-09-16 12:33:15 -07001968 } else {
1969 lastNoGPSLocation = lastLocation.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1970 if (noGPSLocation == null && lastNoGPSLocation != null) {
1971 // New location has no no-GPS location: adopt last no-GPS location. This is set
1972 // directly into location because we do not want to notify COARSE clients.
1973 location.setExtraLocation(Location.EXTRA_NO_GPS_LOCATION, lastNoGPSLocation);
1974 }
Mike Lockwood4e50b782009-04-03 08:24:43 -07001975 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001976 lastLocation.set(location);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001977
David Christie1b9b7b12013-04-15 15:31:11 -07001978 // Update last known coarse interval location if enough time has passed.
1979 Location lastLocationCoarseInterval = mLastLocationCoarseInterval.get(provider);
1980 if (lastLocationCoarseInterval == null) {
1981 lastLocationCoarseInterval = new Location(location);
1982 mLastLocationCoarseInterval.put(provider, lastLocationCoarseInterval);
1983 }
1984 long timeDiffNanos = location.getElapsedRealtimeNanos()
1985 - lastLocationCoarseInterval.getElapsedRealtimeNanos();
1986 if (timeDiffNanos > LocationFudger.FASTEST_INTERVAL_MS * NANOS_PER_MILLI) {
1987 lastLocationCoarseInterval.set(location);
1988 }
1989 // Don't ever return a coarse location that is more recent than the allowed update
1990 // interval (i.e. don't allow an app to keep registering and unregistering for
1991 // location updates to overcome the minimum interval).
1992 noGPSLocation =
1993 lastLocationCoarseInterval.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1994
Laurent Tu60ec50a2012-10-04 17:00:10 -07001995 // Skip if there are no UpdateRecords for this provider.
1996 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1997 if (records == null || records.size() == 0) return;
1998
Victoria Lease09016ab2012-09-16 12:33:15 -07001999 // Fetch coarse location
2000 Location coarseLocation = null;
David Christie1b9b7b12013-04-15 15:31:11 -07002001 if (noGPSLocation != null) {
Victoria Lease09016ab2012-09-16 12:33:15 -07002002 coarseLocation = mLocationFudger.getOrCreate(noGPSLocation);
2003 }
2004
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002005 // Fetch latest status update time
2006 long newStatusUpdateTime = p.getStatusUpdateTime();
2007
David Christie2ff96af2014-01-30 16:09:37 -08002008 // Get latest status
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002009 Bundle extras = new Bundle();
2010 int status = p.getStatus(extras);
2011
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002012 ArrayList<Receiver> deadReceivers = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002013 ArrayList<UpdateRecord> deadUpdateRecords = null;
Nick Pellye0fd6932012-07-11 10:26:13 -07002014
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002015 // Broadcast location or status to all listeners
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002016 for (UpdateRecord r : records) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002017 Receiver receiver = r.mReceiver;
Mike Lockwood03ca2162010-04-01 08:10:09 -07002018 boolean receiverDead = false;
Nick Pelly4035f5a2012-08-17 14:43:49 -07002019
Victoria Lease269518e2012-10-29 08:25:39 -07002020 int receiverUserId = UserHandle.getUserId(receiver.mUid);
Victoria Lease2f5b97c2013-05-07 14:22:02 -07002021 if (receiverUserId != mCurrentUserId && !isUidALocationProvider(receiver.mUid)) {
Victoria Leaseb711d572012-10-02 13:14:11 -07002022 if (D) {
Victoria Lease269518e2012-10-29 08:25:39 -07002023 Log.d(TAG, "skipping loc update for background user " + receiverUserId +
Victoria Leaseb711d572012-10-02 13:14:11 -07002024 " (current user: " + mCurrentUserId + ", app: " +
2025 receiver.mPackageName + ")");
2026 }
2027 continue;
2028 }
2029
Nick Pelly4035f5a2012-08-17 14:43:49 -07002030 if (mBlacklist.isBlacklisted(receiver.mPackageName)) {
2031 if (D) Log.d(TAG, "skipping loc update for blacklisted app: " +
2032 receiver.mPackageName);
2033 continue;
2034 }
2035
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08002036 if (!reportLocationAccessNoThrow(receiver.mUid, receiver.mPackageName,
2037 receiver.mAllowedResolutionLevel)) {
2038 if (D) Log.d(TAG, "skipping loc update for no op app: " +
2039 receiver.mPackageName);
2040 continue;
2041 }
2042
Victoria Lease09016ab2012-09-16 12:33:15 -07002043 Location notifyLocation = null;
Victoria Lease37425c32012-10-16 16:08:48 -07002044 if (receiver.mAllowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
2045 notifyLocation = coarseLocation; // use coarse location
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002046 } else {
Victoria Lease37425c32012-10-16 16:08:48 -07002047 notifyLocation = lastLocation; // use fine location
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002048 }
Victoria Lease09016ab2012-09-16 12:33:15 -07002049 if (notifyLocation != null) {
2050 Location lastLoc = r.mLastFixBroadcast;
Laurent Tu75defb62012-11-01 16:21:52 -07002051 if ((lastLoc == null) || shouldBroadcastSafe(notifyLocation, lastLoc, r, now)) {
Victoria Lease09016ab2012-09-16 12:33:15 -07002052 if (lastLoc == null) {
2053 lastLoc = new Location(notifyLocation);
2054 r.mLastFixBroadcast = lastLoc;
2055 } else {
2056 lastLoc.set(notifyLocation);
2057 }
2058 if (!receiver.callLocationChangedLocked(notifyLocation)) {
2059 Slog.w(TAG, "RemoteException calling onLocationChanged on " + receiver);
2060 receiverDead = true;
2061 }
Laurent Tu75defb62012-11-01 16:21:52 -07002062 r.mRequest.decrementNumUpdates();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002063 }
2064 }
2065
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002066 long prevStatusUpdateTime = r.mLastStatusBroadcast;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002067 if ((newStatusUpdateTime > prevStatusUpdateTime) &&
Victoria Lease09016ab2012-09-16 12:33:15 -07002068 (prevStatusUpdateTime != 0 || status != LocationProvider.AVAILABLE)) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002069
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002070 r.mLastStatusBroadcast = newStatusUpdateTime;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002071 if (!receiver.callStatusChangedLocked(provider, status, extras)) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07002072 receiverDead = true;
Joe Onorato8a9b2202010-02-26 18:56:32 -08002073 Slog.w(TAG, "RemoteException calling onStatusChanged on " + receiver);
Mike Lockwood03ca2162010-04-01 08:10:09 -07002074 }
2075 }
2076
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002077 // track expired records
Laurent Tu75defb62012-11-01 16:21:52 -07002078 if (r.mRequest.getNumUpdates() <= 0 || r.mRequest.getExpireAt() < now) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002079 if (deadUpdateRecords == null) {
2080 deadUpdateRecords = new ArrayList<UpdateRecord>();
2081 }
2082 deadUpdateRecords.add(r);
2083 }
2084 // track dead receivers
2085 if (receiverDead) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07002086 if (deadReceivers == null) {
2087 deadReceivers = new ArrayList<Receiver>();
2088 }
2089 if (!deadReceivers.contains(receiver)) {
2090 deadReceivers.add(receiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002091 }
2092 }
2093 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002094
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002095 // remove dead records and receivers outside the loop
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002096 if (deadReceivers != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002097 for (Receiver receiver : deadReceivers) {
2098 removeUpdatesLocked(receiver);
2099 }
2100 }
2101 if (deadUpdateRecords != null) {
2102 for (UpdateRecord r : deadUpdateRecords) {
2103 r.disposeLocked(true);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002104 }
Victoria Lease8b38b292012-12-04 15:04:43 -08002105 applyRequirementsLocked(provider);
2106 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002107 }
2108
2109 private class LocationWorkerHandler extends Handler {
Victoria Lease5cd731a2012-12-19 15:04:21 -08002110 public LocationWorkerHandler(Looper looper) {
2111 super(looper, null, true);
2112 }
2113
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002114 @Override
2115 public void handleMessage(Message msg) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002116 switch (msg.what) {
2117 case MSG_LOCATION_CHANGED:
2118 handleLocationChanged((Location) msg.obj, msg.arg1 == 1);
2119 break;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002120 }
2121 }
2122 }
2123
Victoria Lease54ca7ae2013-01-08 09:39:50 -08002124 private boolean isMockProvider(String provider) {
2125 synchronized (mLock) {
2126 return mMockProviders.containsKey(provider);
2127 }
2128 }
2129
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002130 private void handleLocationChanged(Location location, boolean passive) {
Victoria Lease54ca7ae2013-01-08 09:39:50 -08002131 // create a working copy of the incoming Location so that the service can modify it without
2132 // disturbing the caller's copy
2133 Location myLocation = new Location(location);
2134 String provider = myLocation.getProvider();
2135
2136 // set "isFromMockProvider" bit if location came from a mock provider. we do not clear this
2137 // bit if location did not come from a mock provider because passive/fused providers can
2138 // forward locations from mock providers, and should not grant them legitimacy in doing so.
2139 if (!myLocation.isFromMockProvider() && isMockProvider(provider)) {
2140 myLocation.setIsFromMockProvider(true);
2141 }
Jeff Sharkey5e613312012-01-30 11:16:20 -08002142
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002143 synchronized (mLock) {
Victoria Lease09eeaec2013-02-05 11:34:13 -08002144 if (isAllowedByCurrentUserSettingsLocked(provider)) {
2145 if (!passive) {
2146 // notify passive provider of the new location
2147 mPassiveProvider.updateLocation(myLocation);
2148 }
Victoria Lease54ca7ae2013-01-08 09:39:50 -08002149 handleLocationChangedLocked(myLocation, passive);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002150 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002151 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002152 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002153
Mike Lockwoode97ae402010-09-29 15:23:46 -04002154 private final PackageMonitor mPackageMonitor = new PackageMonitor() {
2155 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002156 public void onPackageDisappeared(String packageName, int reason) {
2157 // remove all receivers associated with this package name
2158 synchronized (mLock) {
2159 ArrayList<Receiver> deadReceivers = null;
2160
2161 for (Receiver receiver : mReceivers.values()) {
2162 if (receiver.mPackageName.equals(packageName)) {
2163 if (deadReceivers == null) {
2164 deadReceivers = new ArrayList<Receiver>();
2165 }
2166 deadReceivers.add(receiver);
2167 }
2168 }
2169
2170 // perform removal outside of mReceivers loop
2171 if (deadReceivers != null) {
2172 for (Receiver receiver : deadReceivers) {
2173 removeUpdatesLocked(receiver);
2174 }
2175 }
2176 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002177 }
Mike Lockwoode97ae402010-09-29 15:23:46 -04002178 };
2179
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002180 // Geocoder
2181
Nick Pellye0fd6932012-07-11 10:26:13 -07002182 @Override
Mike Lockwoode15735a2010-09-20 17:48:47 -04002183 public boolean geocoderIsPresent() {
Mark Vandevoorde01ac80b2010-05-21 15:43:26 -07002184 return mGeocodeProvider != null;
2185 }
2186
Nick Pellye0fd6932012-07-11 10:26:13 -07002187 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002188 public String getFromLocation(double latitude, double longitude, int maxResults,
Mike Lockwood34901402010-01-04 12:14:21 -05002189 GeocoderParams params, List<Address> addrs) {
Mike Lockwooda55c3212009-04-15 11:10:11 -04002190 if (mGeocodeProvider != null) {
Mike Lockwood628fd6d2010-01-25 22:46:13 -05002191 return mGeocodeProvider.getFromLocation(latitude, longitude, maxResults,
2192 params, addrs);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002193 }
Mike Lockwooda55c3212009-04-15 11:10:11 -04002194 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002195 }
2196
Mike Lockwooda55c3212009-04-15 11:10:11 -04002197
Nick Pellye0fd6932012-07-11 10:26:13 -07002198 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002199 public String getFromLocationName(String locationName,
Mike Lockwooda55c3212009-04-15 11:10:11 -04002200 double lowerLeftLatitude, double lowerLeftLongitude,
2201 double upperRightLatitude, double upperRightLongitude, int maxResults,
Mike Lockwood34901402010-01-04 12:14:21 -05002202 GeocoderParams params, List<Address> addrs) {
Mike Lockwooda55c3212009-04-15 11:10:11 -04002203
2204 if (mGeocodeProvider != null) {
Mike Lockwood628fd6d2010-01-25 22:46:13 -05002205 return mGeocodeProvider.getFromLocationName(locationName, lowerLeftLatitude,
2206 lowerLeftLongitude, upperRightLatitude, upperRightLongitude,
2207 maxResults, params, addrs);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002208 }
Mike Lockwooda55c3212009-04-15 11:10:11 -04002209 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002210 }
2211
2212 // Mock Providers
2213
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002214 private void checkMockPermissionsSafe() {
2215 boolean allowMocks = Settings.Secure.getInt(mContext.getContentResolver(),
2216 Settings.Secure.ALLOW_MOCK_LOCATION, 0) == 1;
2217 if (!allowMocks) {
2218 throw new SecurityException("Requires ACCESS_MOCK_LOCATION secure setting");
2219 }
2220
2221 if (mContext.checkCallingPermission(ACCESS_MOCK_LOCATION) !=
David Christie2ff96af2014-01-30 16:09:37 -08002222 PackageManager.PERMISSION_GRANTED) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002223 throw new SecurityException("Requires ACCESS_MOCK_LOCATION permission");
Nick Pellye0fd6932012-07-11 10:26:13 -07002224 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002225 }
2226
Nick Pellye0fd6932012-07-11 10:26:13 -07002227 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002228 public void addTestProvider(String name, ProviderProperties properties) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002229 checkMockPermissionsSafe();
2230
Mike Lockwooda4903f22010-02-17 06:42:23 -05002231 if (LocationManager.PASSIVE_PROVIDER.equals(name)) {
2232 throw new IllegalArgumentException("Cannot mock the passive location provider");
2233 }
2234
Mike Lockwood86328a92009-10-23 08:38:25 -04002235 long identity = Binder.clearCallingIdentity();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002236 synchronized (mLock) {
Mike Lockwood7566c1d2009-08-25 10:05:18 -07002237 // remove the real provider if we are replacing GPS or network provider
2238 if (LocationManager.GPS_PROVIDER.equals(name)
Nick Pelly1332b532012-08-21 16:25:47 -07002239 || LocationManager.NETWORK_PROVIDER.equals(name)
2240 || LocationManager.FUSED_PROVIDER.equals(name)) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05002241 LocationProviderInterface p = mProvidersByName.get(name);
2242 if (p != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002243 removeProviderLocked(p);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07002244 }
2245 }
Ji-Hwan Lee26bdb8f2014-04-21 20:48:19 +09002246 addTestProviderLocked(name, properties);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002247 updateProvidersLocked();
2248 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002249 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002250 }
2251
Ji-Hwan Lee26bdb8f2014-04-21 20:48:19 +09002252 private void addTestProviderLocked(String name, ProviderProperties properties) {
2253 if (mProvidersByName.get(name) != null) {
2254 throw new IllegalArgumentException("Provider \"" + name + "\" already exists");
2255 }
2256 MockProvider provider = new MockProvider(name, this, properties);
2257 addProviderLocked(provider);
2258 mMockProviders.put(name, provider);
2259 mLastLocation.put(name, null);
2260 mLastLocationCoarseInterval.put(name, null);
2261 }
2262
Nick Pellye0fd6932012-07-11 10:26:13 -07002263 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002264 public void removeTestProvider(String provider) {
2265 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002266 synchronized (mLock) {
Tom O'Neill07ee5d12014-03-03 17:48:35 -08002267
2268 // These methods can't be called after removing the test provider, so first make sure
Tom O'Neillfe6d3c52014-03-04 08:26:17 -08002269 // we don't leave anything dangling.
Tom O'Neill07ee5d12014-03-03 17:48:35 -08002270 clearTestProviderEnabled(provider);
2271 clearTestProviderLocation(provider);
2272 clearTestProviderStatus(provider);
2273
You Kima6d0b6f2012-10-28 03:58:44 +09002274 MockProvider mockProvider = mMockProviders.remove(provider);
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002275 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002276 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2277 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002278 long identity = Binder.clearCallingIdentity();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002279 removeProviderLocked(mProvidersByName.get(provider));
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002280
2281 // reinstate real provider if available
2282 LocationProviderInterface realProvider = mRealProviders.get(provider);
2283 if (realProvider != null) {
2284 addProviderLocked(realProvider);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07002285 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002286 mLastLocation.put(provider, null);
David Christie1b9b7b12013-04-15 15:31:11 -07002287 mLastLocationCoarseInterval.put(provider, null);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002288 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002289 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002290 }
2291 }
2292
Nick Pellye0fd6932012-07-11 10:26:13 -07002293 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002294 public void setTestProviderLocation(String provider, Location loc) {
2295 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002296 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002297 MockProvider mockProvider = mMockProviders.get(provider);
2298 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002299 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2300 }
Mike Lockwood95427cd2009-05-07 13:27:54 -04002301 // clear calling identity so INSTALL_LOCATION_PROVIDER permission is not required
2302 long identity = Binder.clearCallingIdentity();
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002303 mockProvider.setLocation(loc);
Mike Lockwood95427cd2009-05-07 13:27:54 -04002304 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002305 }
2306 }
2307
Nick Pellye0fd6932012-07-11 10:26:13 -07002308 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002309 public void clearTestProviderLocation(String provider) {
2310 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002311 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002312 MockProvider mockProvider = mMockProviders.get(provider);
2313 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002314 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2315 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002316 mockProvider.clearLocation();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002317 }
2318 }
2319
Nick Pellye0fd6932012-07-11 10:26:13 -07002320 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002321 public void setTestProviderEnabled(String provider, boolean enabled) {
2322 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002323 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002324 MockProvider mockProvider = mMockProviders.get(provider);
2325 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002326 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2327 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002328 long identity = Binder.clearCallingIdentity();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002329 if (enabled) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002330 mockProvider.enable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002331 mEnabledProviders.add(provider);
2332 mDisabledProviders.remove(provider);
2333 } else {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002334 mockProvider.disable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002335 mEnabledProviders.remove(provider);
2336 mDisabledProviders.add(provider);
2337 }
2338 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002339 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002340 }
2341 }
2342
Nick Pellye0fd6932012-07-11 10:26:13 -07002343 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002344 public void clearTestProviderEnabled(String provider) {
2345 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002346 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002347 MockProvider mockProvider = mMockProviders.get(provider);
2348 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002349 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2350 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002351 long identity = Binder.clearCallingIdentity();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002352 mEnabledProviders.remove(provider);
2353 mDisabledProviders.remove(provider);
2354 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002355 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002356 }
2357 }
2358
Nick Pellye0fd6932012-07-11 10:26:13 -07002359 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002360 public void setTestProviderStatus(String provider, int status, Bundle extras, long updateTime) {
2361 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002362 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002363 MockProvider mockProvider = mMockProviders.get(provider);
2364 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002365 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2366 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002367 mockProvider.setStatus(status, extras, updateTime);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002368 }
2369 }
2370
Nick Pellye0fd6932012-07-11 10:26:13 -07002371 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002372 public void clearTestProviderStatus(String provider) {
2373 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002374 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002375 MockProvider mockProvider = mMockProviders.get(provider);
2376 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002377 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2378 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002379 mockProvider.clearStatus();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002380 }
2381 }
2382
2383 private void log(String log) {
2384 if (Log.isLoggable(TAG, Log.VERBOSE)) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08002385 Slog.d(TAG, log);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002386 }
2387 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002388
2389 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002390 protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) {
2391 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
2392 != PackageManager.PERMISSION_GRANTED) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -04002393 pw.println("Permission Denial: can't dump LocationManagerService from from pid="
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002394 + Binder.getCallingPid()
2395 + ", uid=" + Binder.getCallingUid());
2396 return;
2397 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002398
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002399 synchronized (mLock) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002400 pw.println("Current Location Manager state:");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002401 pw.println(" Location Listeners:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002402 for (Receiver receiver : mReceivers.values()) {
2403 pw.println(" " + receiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002404 }
David Christie2ff96af2014-01-30 16:09:37 -08002405 pw.println(" Active Records by Provider:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002406 for (Map.Entry<String, ArrayList<UpdateRecord>> entry : mRecordsByProvider.entrySet()) {
2407 pw.println(" " + entry.getKey() + ":");
2408 for (UpdateRecord record : entry.getValue()) {
2409 pw.println(" " + record);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002410 }
2411 }
David Christie2ff96af2014-01-30 16:09:37 -08002412 pw.println(" Historical Records by Provider:");
2413 for (Map.Entry<PackageProviderKey, PackageStatistics> entry
2414 : mRequestStatistics.statistics.entrySet()) {
2415 PackageProviderKey key = entry.getKey();
2416 PackageStatistics stats = entry.getValue();
2417 pw.println(" " + key.packageName + ": " + key.providerName + ": " + stats);
2418 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002419 pw.println(" Last Known Locations:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002420 for (Map.Entry<String, Location> entry : mLastLocation.entrySet()) {
2421 String provider = entry.getKey();
2422 Location location = entry.getValue();
2423 pw.println(" " + provider + ": " + location);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002424 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002425
David Christie1b9b7b12013-04-15 15:31:11 -07002426 pw.println(" Last Known Locations Coarse Intervals:");
2427 for (Map.Entry<String, Location> entry : mLastLocationCoarseInterval.entrySet()) {
2428 String provider = entry.getKey();
2429 Location location = entry.getValue();
2430 pw.println(" " + provider + ": " + location);
2431 }
2432
Nick Pellye0fd6932012-07-11 10:26:13 -07002433 mGeofenceManager.dump(pw);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002434
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002435 if (mEnabledProviders.size() > 0) {
2436 pw.println(" Enabled Providers:");
2437 for (String i : mEnabledProviders) {
2438 pw.println(" " + i);
2439 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002440
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002441 }
2442 if (mDisabledProviders.size() > 0) {
2443 pw.println(" Disabled Providers:");
2444 for (String i : mDisabledProviders) {
2445 pw.println(" " + i);
2446 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002447 }
Nick Pelly4035f5a2012-08-17 14:43:49 -07002448 pw.append(" ");
2449 mBlacklist.dump(pw);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002450 if (mMockProviders.size() > 0) {
2451 pw.println(" Mock Providers:");
2452 for (Map.Entry<String, MockProvider> i : mMockProviders.entrySet()) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002453 i.getValue().dump(pw, " ");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002454 }
2455 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002456
Nick Pelly74fa7ea2012-08-13 19:36:38 -07002457 pw.append(" fudger: ");
2458 mLocationFudger.dump(fd, pw, args);
2459
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002460 if (args.length > 0 && "short".equals(args[0])) {
2461 return;
2462 }
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002463 for (LocationProviderInterface provider: mProviders) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002464 pw.print(provider.getName() + " Internal State");
2465 if (provider instanceof LocationProviderProxy) {
2466 LocationProviderProxy proxy = (LocationProviderProxy) provider;
2467 pw.print(" (" + proxy.getConnectedPackageName() + ")");
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002468 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002469 pw.println(":");
2470 provider.dump(fd, pw, args);
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002471 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002472 }
2473 }
2474}