blob: 88882f3b9b639ec76cc2077a4717aeb9cae72487 [file] [log] [blame]
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server;
18
Jeff Sharkey1a303952011-06-16 13:04:20 -070019import static android.Manifest.permission.MANAGE_NETWORK_POLICY;
Haoyu Baidb3c8672012-06-20 14:29:57 -070020import static android.Manifest.permission.RECEIVE_DATA_ACTIVITY_CHANGE;
Jeff Sharkey961e3042011-08-29 16:02:57 -070021import static android.net.ConnectivityManager.CONNECTIVITY_ACTION;
22import static android.net.ConnectivityManager.CONNECTIVITY_ACTION_IMMEDIATE;
Jeff Sharkeyfb878b62012-07-26 18:32:30 -070023import static android.net.ConnectivityManager.TYPE_BLUETOOTH;
24import static android.net.ConnectivityManager.TYPE_DUMMY;
25import static android.net.ConnectivityManager.TYPE_ETHERNET;
26import static android.net.ConnectivityManager.TYPE_MOBILE;
27import static android.net.ConnectivityManager.TYPE_WIFI;
28import static android.net.ConnectivityManager.TYPE_WIMAX;
Hui Lu1c5624a2014-01-15 11:05:36 -050029import static android.net.ConnectivityManager.TYPE_PROXY;
Jeff Sharkeyfb878b62012-07-26 18:32:30 -070030import static android.net.ConnectivityManager.getNetworkTypeName;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -070031import static android.net.ConnectivityManager.isNetworkTypeValid;
32import static android.net.NetworkPolicyManager.RULE_ALLOW_ALL;
Jeff Sharkeyfdfef572011-06-16 15:07:48 -070033import static android.net.NetworkPolicyManager.RULE_REJECT_METERED;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -070034
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -070035import android.app.AlarmManager;
Chad Brubaker74f99a42014-03-13 18:18:40 +000036import android.app.AppOpsManager;
Wink Savilleab9321d2013-06-29 21:10:57 -070037import android.app.Notification;
38import android.app.NotificationManager;
39import android.app.PendingIntent;
Jaikumar Ganesh15c74392010-12-21 22:31:44 -080040import android.bluetooth.BluetoothTetheringDataTracker;
Wink Saville948282b2013-08-29 08:55:16 -070041import android.content.ActivityNotFoundException;
Jeff Sharkey69ddab42012-08-25 00:05:46 -070042import android.content.BroadcastReceiver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080043import android.content.ContentResolver;
44import android.content.Context;
tk.mun148c7d02011-10-13 22:51:57 +090045import android.content.ContextWrapper;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080046import android.content.Intent;
Jeff Sharkey69ddab42012-08-25 00:05:46 -070047import android.content.IntentFilter;
Chad Brubaker74f99a42014-03-13 18:18:40 +000048import android.content.pm.ApplicationInfo;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080049import android.content.pm.PackageManager;
Chad Brubaker74f99a42014-03-13 18:18:40 +000050import android.content.pm.PackageManager.NameNotFoundException;
Robert Greenwalte182bfe2013-07-16 12:06:09 -070051import android.content.res.Configuration;
tk.mun148c7d02011-10-13 22:51:57 +090052import android.content.res.Resources;
Robert Greenwalt434203a2010-10-11 16:00:27 -070053import android.database.ContentObserver;
Irfan Sheriffda6da092012-08-16 12:49:23 -070054import android.net.CaptivePortalTracker;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080055import android.net.ConnectivityManager;
Robert Greenwaltda3d5e62010-12-06 13:56:24 -080056import android.net.DummyDataStateTracker;
Benoit Goby19970692010-12-22 14:29:40 -080057import android.net.EthernetDataTracker;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080058import android.net.IConnectivityManager;
Haoyu Baidb3c8672012-06-20 14:29:57 -070059import android.net.INetworkManagementEventObserver;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -070060import android.net.INetworkPolicyListener;
61import android.net.INetworkPolicyManager;
Jeff Sharkey367d15a2011-09-22 14:59:51 -070062import android.net.INetworkStatsService;
Wink Savillec9822c52011-07-14 12:23:28 -070063import android.net.LinkAddress;
Jaikumar Ganesh15c74392010-12-21 22:31:44 -080064import android.net.LinkProperties;
Robert Greenwalt0a46db52011-07-14 14:28:05 -070065import android.net.LinkProperties.CompareResult;
Jeff Sharkeye4984be2013-09-10 21:03:27 -070066import android.net.LinkQualityInfo;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080067import android.net.MobileDataStateTracker;
Robert Greenwaltd55a6b42011-03-25 13:09:25 -070068import android.net.NetworkConfig;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080069import android.net.NetworkInfo;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -070070import android.net.NetworkInfo.DetailedState;
Jeff Sharkeyf0ceede2011-08-02 17:22:34 -070071import android.net.NetworkQuotaInfo;
Jeff Sharkeyd2a45872011-05-28 20:56:34 -070072import android.net.NetworkState;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080073import android.net.NetworkStateTracker;
Robert Greenwalt585ac0f2010-08-27 09:24:29 -070074import android.net.NetworkUtils;
Robert Greenwalt434203a2010-10-11 16:00:27 -070075import android.net.Proxy;
Hui Lu1c5624a2014-01-15 11:05:36 -050076import android.net.ProxyDataTracker;
Robert Greenwalt434203a2010-10-11 16:00:27 -070077import android.net.ProxyProperties;
Robert Greenwaltaa70f102011-04-28 14:28:50 -070078import android.net.RouteInfo;
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -070079import android.net.SamplingDataTracker;
Jason Monk602b2322013-07-03 17:04:33 -040080import android.net.Uri;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080081import android.net.wifi.WifiStateTracker;
tk.mun148c7d02011-10-13 22:51:57 +090082import android.net.wimax.WimaxManagerConstants;
Wink Savilleab9321d2013-06-29 21:10:57 -070083import android.os.AsyncTask;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080084import android.os.Binder;
Wink Saville1d3a89e2013-10-31 06:35:22 -070085import android.os.Build;
Mike Lockwoodda8bb742011-05-28 13:24:04 -040086import android.os.FileUtils;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080087import android.os.Handler;
Wink Savillebb08caf2010-09-02 19:23:52 -070088import android.os.HandlerThread;
Robert Greenwalt42acef32009-08-12 16:08:25 -070089import android.os.IBinder;
Chia-chi Yehc9338302011-05-11 16:35:13 -070090import android.os.INetworkManagementService;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080091import android.os.Looper;
92import android.os.Message;
Robert Greenwalt665e1ae2012-08-21 19:27:00 -070093import android.os.Messenger;
Chia-chi Yehff3bdca2011-05-23 17:26:46 -070094import android.os.ParcelFileDescriptor;
Robert Greenwalt14f2ef42010-06-15 12:19:37 -070095import android.os.PowerManager;
Jeff Sharkeyf56e2432012-09-06 17:54:29 -070096import android.os.Process;
Robert Greenwalt42acef32009-08-12 16:08:25 -070097import android.os.RemoteException;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080098import android.os.ServiceManager;
Robert Greenwalt5a0c3202012-05-22 16:07:46 -070099import android.os.SystemClock;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800100import android.os.SystemProperties;
Dianne Hackborn5ac72a22012-08-29 18:32:08 -0700101import android.os.UserHandle;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800102import android.provider.Settings;
Jeff Sharkey69ddab42012-08-25 00:05:46 -0700103import android.security.Credentials;
Jeff Sharkey82f85212012-08-24 11:17:25 -0700104import android.security.KeyStore;
Wink Savilleab9321d2013-06-29 21:10:57 -0700105import android.telephony.TelephonyManager;
Robert Greenwalt42acef32009-08-12 16:08:25 -0700106import android.text.TextUtils;
Joe Onorato8a9b2202010-02-26 18:56:32 -0800107import android.util.Slog;
Chad Brubaker4ca19e82013-06-14 11:16:51 -0700108import android.util.SparseArray;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700109import android.util.SparseIntArray;
Robert Greenwalte182bfe2013-07-16 12:06:09 -0700110import android.util.Xml;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800111
Wink Savilleab9321d2013-06-29 21:10:57 -0700112import com.android.internal.R;
Jason Monk602b2322013-07-03 17:04:33 -0400113import com.android.internal.annotations.GuardedBy;
Chia-chi Yeh2e467642011-07-04 03:23:12 -0700114import com.android.internal.net.LegacyVpnInfo;
Chia-chi Yeh04ba25c2011-06-15 17:07:27 -0700115import com.android.internal.net.VpnConfig;
Jeff Sharkey82f85212012-08-24 11:17:25 -0700116import com.android.internal.net.VpnProfile;
Wink Savilleab9321d2013-06-29 21:10:57 -0700117import com.android.internal.telephony.DctConstants;
Robert Greenwalt42acef32009-08-12 16:08:25 -0700118import com.android.internal.telephony.Phone;
Wink Savillea639b312012-07-10 12:37:54 -0700119import com.android.internal.telephony.PhoneConstants;
Jeff Sharkeye6e61972012-09-14 13:47:51 -0700120import com.android.internal.util.IndentingPrintWriter;
Robert Greenwalte182bfe2013-07-16 12:06:09 -0700121import com.android.internal.util.XmlUtils;
Jeff Sharkey1059c3c2011-10-04 16:54:49 -0700122import com.android.server.am.BatteryStatsService;
John Spurlockbf991a82013-06-24 14:20:23 -0400123import com.android.server.connectivity.DataConnectionStats;
Lorenzo Colitti13c9fde2013-03-15 04:22:37 +0900124import com.android.server.connectivity.Nat464Xlat;
Jason Monk602b2322013-07-03 17:04:33 -0400125import com.android.server.connectivity.PacManager;
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800126import com.android.server.connectivity.Tethering;
Chia-chi Yehff3bdca2011-05-23 17:26:46 -0700127import com.android.server.connectivity.Vpn;
Jeff Sharkey216c1812012-08-05 14:29:23 -0700128import com.android.server.net.BaseNetworkObserver;
Jeff Sharkey69ddab42012-08-25 00:05:46 -0700129import com.android.server.net.LockdownVpnTracker;
Jeff Sharkeyd2a45872011-05-28 20:56:34 -0700130import com.google.android.collect.Lists;
Jeff Sharkeyfdfef572011-06-16 15:07:48 -0700131import com.google.android.collect.Sets;
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700132
tk.mun148c7d02011-10-13 22:51:57 +0900133import dalvik.system.DexClassLoader;
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700134
Robert Greenwalte182bfe2013-07-16 12:06:09 -0700135import org.xmlpull.v1.XmlPullParser;
136import org.xmlpull.v1.XmlPullParserException;
137
138import java.io.File;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800139import java.io.FileDescriptor;
Robert Greenwalte182bfe2013-07-16 12:06:09 -0700140import java.io.FileNotFoundException;
141import java.io.FileReader;
Irfan Sheriffd649c122010-06-09 15:39:36 -0700142import java.io.IOException;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800143import java.io.PrintWriter;
tk.mun148c7d02011-10-13 22:51:57 +0900144import java.lang.reflect.Constructor;
Wink Savilleab9321d2013-06-29 21:10:57 -0700145import java.net.HttpURLConnection;
Wink Savillec9822c52011-07-14 12:23:28 -0700146import java.net.Inet4Address;
Wink Savillee8222252011-07-13 13:44:13 -0700147import java.net.Inet6Address;
Robert Greenwalt47f69fe2010-06-15 15:43:39 -0700148import java.net.InetAddress;
Wink Savilleab9321d2013-06-29 21:10:57 -0700149import java.net.URL;
Wink Saville1d3a89e2013-10-31 06:35:22 -0700150import java.net.URLConnection;
Robert Greenwalt47f69fe2010-06-15 15:43:39 -0700151import java.net.UnknownHostException;
Robert Greenwalt42acef32009-08-12 16:08:25 -0700152import java.util.ArrayList;
Jeff Sharkeyfdfef572011-06-16 15:07:48 -0700153import java.util.Arrays;
Robert Greenwalt47f69fe2010-06-15 15:43:39 -0700154import java.util.Collection;
Robert Greenwalt4e8dfef2010-09-20 14:35:25 -0700155import java.util.GregorianCalendar;
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -0700156import java.util.HashMap;
Jeff Sharkeyfdfef572011-06-16 15:07:48 -0700157import java.util.HashSet;
Robert Greenwalt42acef32009-08-12 16:08:25 -0700158import java.util.List;
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -0700159import java.util.Map;
Wink Savilleab9321d2013-06-29 21:10:57 -0700160import java.util.Random;
Wink Saville948282b2013-08-29 08:55:16 -0700161import java.util.concurrent.atomic.AtomicBoolean;
Wink Savilleab9321d2013-06-29 21:10:57 -0700162import java.util.concurrent.atomic.AtomicInteger;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800163
Wink Saville1d3a89e2013-10-31 06:35:22 -0700164import javax.net.ssl.HostnameVerifier;
165import javax.net.ssl.HttpsURLConnection;
166import javax.net.ssl.SSLSession;
167
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800168/**
169 * @hide
170 */
171public class ConnectivityService extends IConnectivityManager.Stub {
Jeff Sharkey899223b2012-08-04 15:24:58 -0700172 private static final String TAG = "ConnectivityService";
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800173
Robert Greenwaltba175a52010-10-05 19:12:26 -0700174 private static final boolean DBG = true;
Wink Savillec9acde92011-09-21 11:05:43 -0700175 private static final boolean VDBG = false;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800176
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700177 private static final boolean LOGD_RULES = false;
178
Jeff Sharkey899223b2012-08-04 15:24:58 -0700179 // TODO: create better separation between radio types and network types
180
Robert Greenwalt42acef32009-08-12 16:08:25 -0700181 // how long to wait before switching back to a radio's default network
182 private static final int RESTORE_DEFAULT_NETWORK_DELAY = 1 * 60 * 1000;
183 // system property that can override the above value
184 private static final String NETWORK_RESTORE_DELAY_PROP_NAME =
185 "android.telephony.apn-restore";
186
Wink Savilleab9321d2013-06-29 21:10:57 -0700187 // Default value if FAIL_FAST_TIME_MS is not set
188 private static final int DEFAULT_FAIL_FAST_TIME_MS = 1 * 60 * 1000;
189 // system property that can override DEFAULT_FAIL_FAST_TIME_MS
190 private static final String FAIL_FAST_TIME_MS =
191 "persist.radio.fail_fast_time_ms";
192
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -0700193 private static final String ACTION_PKT_CNT_SAMPLE_INTERVAL_ELAPSED =
194 "android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED";
195
Sreeram Ramachandranb1486ae2013-08-27 11:41:19 -0700196 private static final int SAMPLE_INTERVAL_ELAPSED_REQUEST_CODE = 0;
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -0700197
198 private PendingIntent mSampleIntervalElapsedIntent;
199
200 // Set network sampling interval at 12 minutes, this way, even if the timers get
201 // aggregated, it will fire at around 15 minutes, which should allow us to
202 // aggregate this timer with other timers (specially the socket keep alive timers)
203 private static final int DEFAULT_SAMPLING_INTERVAL_IN_SECONDS = (VDBG ? 30 : 12 * 60);
204
205 // start network sampling a minute after booting ...
206 private static final int DEFAULT_START_SAMPLING_INTERVAL_IN_SECONDS = (VDBG ? 30 : 60);
207
208 AlarmManager mAlarmManager;
209
Robert Greenwaltf43396c2011-05-06 17:10:53 -0700210 // used in recursive route setting to add gateways for the host for which
211 // a host route was requested.
212 private static final int MAX_HOSTROUTE_CYCLE_COUNT = 10;
213
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800214 private Tethering mTethering;
215
Jeff Sharkey69ddab42012-08-25 00:05:46 -0700216 private KeyStore mKeyStore;
Jeff Sharkey82f85212012-08-24 11:17:25 -0700217
Chad Brubaker4ca19e82013-06-14 11:16:51 -0700218 @GuardedBy("mVpns")
219 private final SparseArray<Vpn> mVpns = new SparseArray<Vpn>();
Jeff Sharkey899223b2012-08-04 15:24:58 -0700220 private VpnCallback mVpnCallback = new VpnCallback();
Chia-chi Yehff3bdca2011-05-23 17:26:46 -0700221
Jeff Sharkey69ddab42012-08-25 00:05:46 -0700222 private boolean mLockdownEnabled;
223 private LockdownVpnTracker mLockdownTracker;
224
Lorenzo Colitti13c9fde2013-03-15 04:22:37 +0900225 private Nat464Xlat mClat;
226
Jeff Sharkeyfdfef572011-06-16 15:07:48 -0700227 /** Lock around {@link #mUidRules} and {@link #mMeteredIfaces}. */
228 private Object mRulesLock = new Object();
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700229 /** Currently active network rules by UID. */
230 private SparseIntArray mUidRules = new SparseIntArray();
Jeff Sharkeyfdfef572011-06-16 15:07:48 -0700231 /** Set of ifaces that are costly. */
232 private HashSet<String> mMeteredIfaces = Sets.newHashSet();
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700233
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800234 /**
235 * Sometimes we want to refer to the individual network state
236 * trackers separately, and sometimes we just want to treat them
237 * abstractly.
238 */
239 private NetworkStateTracker mNetTrackers[];
Robert Greenwalt42acef32009-08-12 16:08:25 -0700240
Irfan Sheriffda6da092012-08-16 12:49:23 -0700241 /* Handles captive portal check on a network */
242 private CaptivePortalTracker mCaptivePortalTracker;
243
Robert Greenwalt42acef32009-08-12 16:08:25 -0700244 /**
Wink Savillee8222252011-07-13 13:44:13 -0700245 * The link properties that define the current links
246 */
247 private LinkProperties mCurrentLinkProperties[];
248
249 /**
Robert Greenwalt42acef32009-08-12 16:08:25 -0700250 * A per Net list of the PID's that requested access to the net
251 * used both as a refcount and for per-PID DNS selection
252 */
Mattias Falk8b47b362011-08-23 14:15:13 +0200253 private List<Integer> mNetRequestersPids[];
Robert Greenwalt42acef32009-08-12 16:08:25 -0700254
Robert Greenwalt42acef32009-08-12 16:08:25 -0700255 // priority order of the nettrackers
256 // (excluding dynamically set mNetworkPreference)
257 // TODO - move mNetworkTypePreference into this
258 private int[] mPriorityList;
259
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800260 private Context mContext;
261 private int mNetworkPreference;
Robert Greenwalt42acef32009-08-12 16:08:25 -0700262 private int mActiveDefaultNetwork = -1;
Robert Greenwaltd7085fc2010-09-08 15:24:47 -0700263 // 0 is full bad, 100 is full good
Wink Saville5b7573e2013-01-31 00:30:13 +0000264 private int mDefaultInetCondition = 0;
Robert Greenwaltd7085fc2010-09-08 15:24:47 -0700265 private int mDefaultInetConditionPublished = 0;
266 private boolean mInetConditionChangeInFlight = false;
267 private int mDefaultConnectionSequence = 0;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800268
Chia-chi Yeh44bb2512011-07-14 18:01:57 -0700269 private Object mDnsLock = new Object();
Robert Greenwalt0dd19a82013-02-11 15:25:10 -0800270 private int mNumDnsEntries;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800271
272 private boolean mTestMode;
Joe Onorato00092872010-09-01 21:18:22 -0700273 private static ConnectivityService sServiceInstance;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800274
Robert Greenwalt59b1a4e2011-05-10 15:05:02 -0700275 private INetworkManagementService mNetd;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700276 private INetworkPolicyManager mPolicyManager;
Robert Greenwalt59b1a4e2011-05-10 15:05:02 -0700277
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -0700278 private static final int ENABLED = 1;
279 private static final int DISABLED = 0;
280
Robert Greenwalt3b28e9a2011-11-02 14:37:19 -0700281 private static final boolean ADD = true;
282 private static final boolean REMOVE = false;
283
284 private static final boolean TO_DEFAULT_TABLE = true;
285 private static final boolean TO_SECONDARY_TABLE = false;
286
Chad Brubakerf336d722013-07-15 16:34:04 -0700287 private static final boolean EXEMPT = true;
288 private static final boolean UNEXEMPT = false;
289
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -0700290 /**
291 * used internally as a delayed event to make us switch back to the
292 * default network
293 */
Jeff Sharkey4c628eb2012-07-23 13:19:46 -0700294 private static final int EVENT_RESTORE_DEFAULT_NETWORK = 1;
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -0700295
296 /**
297 * used internally to change our mobile data enabled flag
298 */
Jeff Sharkey4c628eb2012-07-23 13:19:46 -0700299 private static final int EVENT_CHANGE_MOBILE_DATA_ENABLED = 2;
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -0700300
301 /**
302 * used internally to change our network preference setting
303 * arg1 = networkType to prefer
304 */
Jeff Sharkey4c628eb2012-07-23 13:19:46 -0700305 private static final int EVENT_SET_NETWORK_PREFERENCE = 3;
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -0700306
307 /**
308 * used internally to synchronize inet condition reports
309 * arg1 = networkType
310 * arg2 = condition (0 bad, 100 good)
311 */
Jeff Sharkey4c628eb2012-07-23 13:19:46 -0700312 private static final int EVENT_INET_CONDITION_CHANGE = 4;
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -0700313
314 /**
315 * used internally to mark the end of inet condition hold periods
316 * arg1 = networkType
317 */
Jeff Sharkey4c628eb2012-07-23 13:19:46 -0700318 private static final int EVENT_INET_CONDITION_HOLD_END = 5;
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -0700319
320 /**
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -0700321 * used internally to set enable/disable cellular data
322 * arg1 = ENBALED or DISABLED
323 */
Jeff Sharkey4c628eb2012-07-23 13:19:46 -0700324 private static final int EVENT_SET_MOBILE_DATA = 7;
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -0700325
Robert Greenwaltf3331232010-09-24 14:32:21 -0700326 /**
327 * used internally to clear a wakelock when transitioning
328 * from one net to another
329 */
Jeff Sharkey4c628eb2012-07-23 13:19:46 -0700330 private static final int EVENT_CLEAR_NET_TRANSITION_WAKELOCK = 8;
Robert Greenwaltf3331232010-09-24 14:32:21 -0700331
Robert Greenwalt434203a2010-10-11 16:00:27 -0700332 /**
333 * used internally to reload global proxy settings
334 */
Jeff Sharkey4c628eb2012-07-23 13:19:46 -0700335 private static final int EVENT_APPLY_GLOBAL_HTTP_PROXY = 9;
Robert Greenwalt434203a2010-10-11 16:00:27 -0700336
Robert Greenwaltd55a6b42011-03-25 13:09:25 -0700337 /**
338 * used internally to set external dependency met/unmet
339 * arg1 = ENABLED (met) or DISABLED (unmet)
340 * arg2 = NetworkType
341 */
Jeff Sharkey4c628eb2012-07-23 13:19:46 -0700342 private static final int EVENT_SET_DEPENDENCY_MET = 10;
Robert Greenwaltd55a6b42011-03-25 13:09:25 -0700343
Chia-chi Yeh44bb2512011-07-14 18:01:57 -0700344 /**
Wink Saville628b0852011-08-04 15:01:58 -0700345 * used internally to send a sticky broadcast delayed.
346 */
Chad Brubakerb98703e2013-07-23 17:44:41 -0700347 private static final int EVENT_SEND_STICKY_BROADCAST_INTENT = 11;
Wink Saville628b0852011-08-04 15:01:58 -0700348
Jeff Sharkey8e28b7d2011-08-19 02:24:24 -0700349 /**
350 * Used internally to
351 * {@link NetworkStateTracker#setPolicyDataEnable(boolean)}.
352 */
Chad Brubakerb98703e2013-07-23 17:44:41 -0700353 private static final int EVENT_SET_POLICY_DATA_ENABLE = 12;
Jeff Sharkey8e28b7d2011-08-19 02:24:24 -0700354
Chad Brubakerb98703e2013-07-23 17:44:41 -0700355 private static final int EVENT_VPN_STATE_CHANGED = 13;
Jeff Sharkey69ddab42012-08-25 00:05:46 -0700356
Wink Savilleab9321d2013-06-29 21:10:57 -0700357 /**
358 * Used internally to disable fail fast of mobile data
359 */
Chad Brubakerb98703e2013-07-23 17:44:41 -0700360 private static final int EVENT_ENABLE_FAIL_FAST_MOBILE_DATA = 14;
Wink Savilleab9321d2013-06-29 21:10:57 -0700361
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -0700362 /**
363 * user internally to indicate that data sampling interval is up
364 */
365 private static final int EVENT_SAMPLE_INTERVAL_ELAPSED = 15;
366
Jason Monkdecd2952013-10-10 14:02:51 -0400367 /**
368 * PAC manager has received new port.
369 */
370 private static final int EVENT_PROXY_HAS_CHANGED = 16;
371
Jeff Sharkey4c628eb2012-07-23 13:19:46 -0700372 /** Handler used for internal events. */
373 private InternalHandler mHandler;
374 /** Handler used for incoming {@link NetworkStateTracker} events. */
375 private NetworkStateTrackerHandler mTrackerHandler;
Robert Greenwalt42acef32009-08-12 16:08:25 -0700376
377 // list of DeathRecipients used to make sure features are turned off when
378 // a process dies
Kazuhiro Ondo3bed4c92011-07-19 11:23:37 -0500379 private List<FeatureUser> mFeatureUsers;
Robert Greenwalt42acef32009-08-12 16:08:25 -0700380
Mike Lockwood0f79b542009-08-14 14:18:49 -0400381 private boolean mSystemReady;
Dianne Hackborn1c633fc2009-12-08 19:45:14 -0800382 private Intent mInitialBroadcast;
Mike Lockwood0f79b542009-08-14 14:18:49 -0400383
Robert Greenwalt14f2ef42010-06-15 12:19:37 -0700384 private PowerManager.WakeLock mNetTransitionWakeLock;
385 private String mNetTransitionWakeLockCausedBy = "";
386 private int mNetTransitionWakeLockSerialNumber;
387 private int mNetTransitionWakeLockTimeout;
388
Robert Greenwalte90aa5e2010-09-01 11:34:05 -0700389 private InetAddress mDefaultDns;
390
Chad Brubakerf336d722013-07-15 16:34:04 -0700391 // Lock for protecting access to mAddedRoutes and mExemptAddresses
392 private final Object mRoutesLock = new Object();
393
Robert Greenwalt0a46db52011-07-14 14:28:05 -0700394 // this collection is used to refcount the added routes - if there are none left
395 // it's time to remove the route from the route table
Chad Brubakerf336d722013-07-15 16:34:04 -0700396 @GuardedBy("mRoutesLock")
Robert Greenwalt0a46db52011-07-14 14:28:05 -0700397 private Collection<RouteInfo> mAddedRoutes = new ArrayList<RouteInfo>();
398
Chad Brubakerf336d722013-07-15 16:34:04 -0700399 // this collection corresponds to the entries of mAddedRoutes that have routing exemptions
400 // used to handle cleanup of exempt rules
401 @GuardedBy("mRoutesLock")
402 private Collection<LinkAddress> mExemptAddresses = new ArrayList<LinkAddress>();
403
Robert Greenwalt4e8dfef2010-09-20 14:35:25 -0700404 // used in DBG mode to track inet condition reports
405 private static final int INET_CONDITION_LOG_MAX_SIZE = 15;
406 private ArrayList mInetLog;
407
Robert Greenwalt434203a2010-10-11 16:00:27 -0700408 // track the current default http proxy - tell the world if we get a new one (real change)
409 private ProxyProperties mDefaultProxy = null;
Robert Greenwalt00e8d4c2013-04-05 17:14:19 -0700410 private Object mProxyLock = new Object();
Chia-chi Yeh4c12a472011-10-03 15:34:04 -0700411 private boolean mDefaultProxyDisabled = false;
412
Robert Greenwalt434203a2010-10-11 16:00:27 -0700413 // track the global proxy.
414 private ProxyProperties mGlobalProxy = null;
Robert Greenwalt434203a2010-10-11 16:00:27 -0700415
Jason Monk602b2322013-07-03 17:04:33 -0400416 private PacManager mPacManager = null;
417
Robert Greenwalt434203a2010-10-11 16:00:27 -0700418 private SettingsObserver mSettingsObserver;
419
Chad Brubaker74f99a42014-03-13 18:18:40 +0000420 private AppOpsManager mAppOpsManager;
421
Robert Greenwaltd55a6b42011-03-25 13:09:25 -0700422 NetworkConfig[] mNetConfigs;
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700423 int mNetworksDefined;
Robert Greenwalt42acef32009-08-12 16:08:25 -0700424
Robert Greenwalt511288a2009-12-07 11:33:18 -0800425 private static class RadioAttributes {
Robert Greenwalt42acef32009-08-12 16:08:25 -0700426 public int mSimultaneity;
427 public int mType;
428 public RadioAttributes(String init) {
429 String fragments[] = init.split(",");
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700430 mType = Integer.parseInt(fragments[0]);
431 mSimultaneity = Integer.parseInt(fragments[1]);
Robert Greenwalt42acef32009-08-12 16:08:25 -0700432 }
433 }
434 RadioAttributes[] mRadioAttributes;
435
Robert Greenwalt50393202011-06-21 17:26:14 -0700436 // the set of network types that can only be enabled by system/sig apps
437 List mProtectedNetworks;
438
John Spurlockbf991a82013-06-24 14:20:23 -0400439 private DataConnectionStats mDataConnectionStats;
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -0700440
Wink Savilleab9321d2013-06-29 21:10:57 -0700441 private AtomicInteger mEnableFailFastMobileDataTag = new AtomicInteger(0);
442
443 TelephonyManager mTelephonyManager;
John Spurlockbf991a82013-06-24 14:20:23 -0400444
Jeff Sharkey367d15a2011-09-22 14:59:51 -0700445 public ConnectivityService(Context context, INetworkManagementService netd,
446 INetworkStatsService statsService, INetworkPolicyManager policyManager) {
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700447 // Currently, omitting a NetworkFactory will create one internally
448 // TODO: create here when we have cleaner WiMAX support
449 this(context, netd, statsService, policyManager, null);
450 }
451
Jeff Sharkey899223b2012-08-04 15:24:58 -0700452 public ConnectivityService(Context context, INetworkManagementService netManager,
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700453 INetworkStatsService statsService, INetworkPolicyManager policyManager,
454 NetworkFactory netFactory) {
Wink Savilleed9c02b2010-12-03 12:01:38 -0800455 if (DBG) log("ConnectivityService starting up");
Robert Greenwaltde8383c2010-01-14 17:47:58 -0800456
Wink Savillebb08caf2010-09-02 19:23:52 -0700457 HandlerThread handlerThread = new HandlerThread("ConnectivityServiceThread");
458 handlerThread.start();
Jeff Sharkey4c628eb2012-07-23 13:19:46 -0700459 mHandler = new InternalHandler(handlerThread.getLooper());
460 mTrackerHandler = new NetworkStateTrackerHandler(handlerThread.getLooper());
Wink Savillebb08caf2010-09-02 19:23:52 -0700461
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700462 if (netFactory == null) {
463 netFactory = new DefaultNetworkFactory(context, mTrackerHandler);
464 }
465
Robert Greenwaltde8383c2010-01-14 17:47:58 -0800466 // setup our unique device name
Robert Greenwalt733c6292010-12-06 09:30:17 -0800467 if (TextUtils.isEmpty(SystemProperties.get("net.hostname"))) {
468 String id = Settings.Secure.getString(context.getContentResolver(),
469 Settings.Secure.ANDROID_ID);
470 if (id != null && id.length() > 0) {
Irfan Sheriffa10a3ad2011-09-20 15:17:07 -0700471 String name = new String("android-").concat(id);
Robert Greenwalt733c6292010-12-06 09:30:17 -0800472 SystemProperties.set("net.hostname", name);
473 }
Robert Greenwaltde8383c2010-01-14 17:47:58 -0800474 }
475
Robert Greenwalte90aa5e2010-09-01 11:34:05 -0700476 // read our default dns server ip
Jeff Sharkey625239a2012-09-26 22:03:49 -0700477 String dns = Settings.Global.getString(context.getContentResolver(),
478 Settings.Global.DEFAULT_DNS_SERVER);
Robert Greenwalte90aa5e2010-09-01 11:34:05 -0700479 if (dns == null || dns.length() == 0) {
480 dns = context.getResources().getString(
481 com.android.internal.R.string.config_default_dns_server);
482 }
483 try {
Robert Greenwalte5903732011-02-22 16:00:42 -0800484 mDefaultDns = NetworkUtils.numericToInetAddress(dns);
485 } catch (IllegalArgumentException e) {
Wink Savilleed9c02b2010-12-03 12:01:38 -0800486 loge("Error setting defaultDns using " + dns);
Robert Greenwalte90aa5e2010-09-01 11:34:05 -0700487 }
488
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700489 mContext = checkNotNull(context, "missing Context");
Jeff Sharkey899223b2012-08-04 15:24:58 -0700490 mNetd = checkNotNull(netManager, "missing INetworkManagementService");
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700491 mPolicyManager = checkNotNull(policyManager, "missing INetworkPolicyManager");
Jeff Sharkey82f85212012-08-24 11:17:25 -0700492 mKeyStore = KeyStore.getInstance();
Wink Savilleab9321d2013-06-29 21:10:57 -0700493 mTelephonyManager = (TelephonyManager) mContext.getSystemService(Context.TELEPHONY_SERVICE);
Robert Greenwalt14f2ef42010-06-15 12:19:37 -0700494
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700495 try {
496 mPolicyManager.registerListener(mPolicyListener);
497 } catch (RemoteException e) {
498 // ouch, no rules updates means some processes may never get network
Robert Greenwalt58d4c592011-08-02 17:18:41 -0700499 loge("unable to register INetworkPolicyListener" + e.toString());
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700500 }
501
502 final PowerManager powerManager = (PowerManager) context.getSystemService(
503 Context.POWER_SERVICE);
Robert Greenwalt14f2ef42010-06-15 12:19:37 -0700504 mNetTransitionWakeLock = powerManager.newWakeLock(PowerManager.PARTIAL_WAKE_LOCK, TAG);
505 mNetTransitionWakeLockTimeout = mContext.getResources().getInteger(
506 com.android.internal.R.integer.config_networkTransitionTimeout);
507
Robert Greenwalt42acef32009-08-12 16:08:25 -0700508 mNetTrackers = new NetworkStateTracker[
509 ConnectivityManager.MAX_NETWORK_TYPE+1];
Wink Savillee8222252011-07-13 13:44:13 -0700510 mCurrentLinkProperties = new LinkProperties[ConnectivityManager.MAX_NETWORK_TYPE+1];
Robert Greenwalt86e9e552009-07-16 17:21:39 -0700511
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700512 mRadioAttributes = new RadioAttributes[ConnectivityManager.MAX_RADIO_TYPE+1];
Robert Greenwaltd55a6b42011-03-25 13:09:25 -0700513 mNetConfigs = new NetworkConfig[ConnectivityManager.MAX_NETWORK_TYPE+1];
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700514
Robert Greenwalt42acef32009-08-12 16:08:25 -0700515 // Load device network attributes from resources
Robert Greenwalt42acef32009-08-12 16:08:25 -0700516 String[] raStrings = context.getResources().getStringArray(
517 com.android.internal.R.array.radioAttributes);
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700518 for (String raString : raStrings) {
519 RadioAttributes r = new RadioAttributes(raString);
Wink Saville5e56bc52013-07-29 15:00:57 -0700520 if (VDBG) log("raString=" + raString + " r=" + r);
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700521 if (r.mType > ConnectivityManager.MAX_RADIO_TYPE) {
Wink Savilleed9c02b2010-12-03 12:01:38 -0800522 loge("Error in radioAttributes - ignoring attempt to define type " + r.mType);
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700523 continue;
524 }
525 if (mRadioAttributes[r.mType] != null) {
Wink Savilleed9c02b2010-12-03 12:01:38 -0800526 loge("Error in radioAttributes - ignoring attempt to redefine type " +
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700527 r.mType);
528 continue;
529 }
Robert Greenwalt42acef32009-08-12 16:08:25 -0700530 mRadioAttributes[r.mType] = r;
531 }
532
Wink Saville51f456f2013-04-23 14:26:51 -0700533 // TODO: What is the "correct" way to do determine if this is a wifi only device?
534 boolean wifiOnly = SystemProperties.getBoolean("ro.radio.noril", false);
535 log("wifiOnly=" + wifiOnly);
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700536 String[] naStrings = context.getResources().getStringArray(
537 com.android.internal.R.array.networkAttributes);
538 for (String naString : naStrings) {
539 try {
Robert Greenwaltd55a6b42011-03-25 13:09:25 -0700540 NetworkConfig n = new NetworkConfig(naString);
Wink Saville5e56bc52013-07-29 15:00:57 -0700541 if (VDBG) log("naString=" + naString + " config=" + n);
Wink Saville975c8482011-04-07 14:23:45 -0700542 if (n.type > ConnectivityManager.MAX_NETWORK_TYPE) {
Wink Savilleed9c02b2010-12-03 12:01:38 -0800543 loge("Error in networkAttributes - ignoring attempt to define type " +
Wink Saville975c8482011-04-07 14:23:45 -0700544 n.type);
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700545 continue;
Robert Greenwalt42acef32009-08-12 16:08:25 -0700546 }
Wink Saville51f456f2013-04-23 14:26:51 -0700547 if (wifiOnly && ConnectivityManager.isNetworkTypeMobile(n.type)) {
548 log("networkAttributes - ignoring mobile as this dev is wifiOnly " +
549 n.type);
550 continue;
551 }
Wink Saville975c8482011-04-07 14:23:45 -0700552 if (mNetConfigs[n.type] != null) {
Wink Savilleed9c02b2010-12-03 12:01:38 -0800553 loge("Error in networkAttributes - ignoring attempt to redefine type " +
Wink Saville975c8482011-04-07 14:23:45 -0700554 n.type);
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700555 continue;
556 }
Wink Saville975c8482011-04-07 14:23:45 -0700557 if (mRadioAttributes[n.radio] == null) {
Wink Savilleed9c02b2010-12-03 12:01:38 -0800558 loge("Error in networkAttributes - ignoring attempt to use undefined " +
Wink Saville975c8482011-04-07 14:23:45 -0700559 "radio " + n.radio + " in network type " + n.type);
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700560 continue;
561 }
Wink Saville975c8482011-04-07 14:23:45 -0700562 mNetConfigs[n.type] = n;
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700563 mNetworksDefined++;
564 } catch(Exception e) {
565 // ignore it - leave the entry null
Robert Greenwalt42acef32009-08-12 16:08:25 -0700566 }
567 }
Wink Saville5e56bc52013-07-29 15:00:57 -0700568 if (VDBG) log("mNetworksDefined=" + mNetworksDefined);
Robert Greenwalt42acef32009-08-12 16:08:25 -0700569
Robert Greenwalt50393202011-06-21 17:26:14 -0700570 mProtectedNetworks = new ArrayList<Integer>();
571 int[] protectedNetworks = context.getResources().getIntArray(
572 com.android.internal.R.array.config_protectedNetworks);
573 for (int p : protectedNetworks) {
574 if ((mNetConfigs[p] != null) && (mProtectedNetworks.contains(p) == false)) {
575 mProtectedNetworks.add(p);
576 } else {
577 if (DBG) loge("Ignoring protectedNetwork " + p);
578 }
579 }
580
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700581 // high priority first
582 mPriorityList = new int[mNetworksDefined];
583 {
584 int insertionPoint = mNetworksDefined-1;
585 int currentLowest = 0;
586 int nextLowest = 0;
587 while (insertionPoint > -1) {
Robert Greenwaltd55a6b42011-03-25 13:09:25 -0700588 for (NetworkConfig na : mNetConfigs) {
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700589 if (na == null) continue;
Wink Saville975c8482011-04-07 14:23:45 -0700590 if (na.priority < currentLowest) continue;
591 if (na.priority > currentLowest) {
592 if (na.priority < nextLowest || nextLowest == 0) {
593 nextLowest = na.priority;
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700594 }
595 continue;
596 }
Wink Saville975c8482011-04-07 14:23:45 -0700597 mPriorityList[insertionPoint--] = na.type;
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700598 }
599 currentLowest = nextLowest;
600 nextLowest = 0;
601 }
602 }
603
Jianzheng Zhoudcf03f32012-11-16 13:45:20 +0800604 // Update mNetworkPreference according to user mannually first then overlay config.xml
605 mNetworkPreference = getPersistedNetworkPreference();
606 if (mNetworkPreference == -1) {
607 for (int n : mPriorityList) {
608 if (mNetConfigs[n].isDefault() && ConnectivityManager.isNetworkTypeValid(n)) {
609 mNetworkPreference = n;
610 break;
611 }
612 }
613 if (mNetworkPreference == -1) {
614 throw new IllegalStateException(
615 "You should set at least one default Network in config.xml!");
616 }
617 }
618
Mattias Falk8b47b362011-08-23 14:15:13 +0200619 mNetRequestersPids =
620 (List<Integer> [])new ArrayList[ConnectivityManager.MAX_NETWORK_TYPE+1];
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700621 for (int i : mPriorityList) {
Mattias Falk8b47b362011-08-23 14:15:13 +0200622 mNetRequestersPids[i] = new ArrayList<Integer>();
Robert Greenwalt42acef32009-08-12 16:08:25 -0700623 }
624
Kazuhiro Ondo3bed4c92011-07-19 11:23:37 -0500625 mFeatureUsers = new ArrayList<FeatureUser>();
Robert Greenwalt42acef32009-08-12 16:08:25 -0700626
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700627 mTestMode = SystemProperties.get("cm.test.mode").equals("true")
628 && SystemProperties.get("ro.build.type").equals("eng");
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700629
630 // Create and start trackers for hard-coded networks
631 for (int targetNetworkType : mPriorityList) {
632 final NetworkConfig config = mNetConfigs[targetNetworkType];
633 final NetworkStateTracker tracker;
634 try {
635 tracker = netFactory.createTracker(targetNetworkType, config);
636 mNetTrackers[targetNetworkType] = tracker;
637 } catch (IllegalArgumentException e) {
638 Slog.e(TAG, "Problem creating " + getNetworkTypeName(targetNetworkType)
639 + " tracker: " + e);
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700640 continue;
641 }
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700642
643 tracker.startMonitoring(context, mTrackerHandler);
644 if (config.isDefault()) {
645 tracker.reconnect();
Robert Greenwalt6537b022011-11-10 16:55:20 -0800646 }
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700647 }
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -0800648
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700649 mTethering = new Tethering(mContext, mNetd, statsService, this, mHandler.getLooper());
Robert Greenwaltc9d5fb72010-02-25 12:29:30 -0800650
Robert Greenwaltbfc76342013-07-19 14:30:49 -0700651 //set up the listener for user state for creating user VPNs
Chad Brubaker4ca19e82013-06-14 11:16:51 -0700652 IntentFilter intentFilter = new IntentFilter();
653 intentFilter.addAction(Intent.ACTION_USER_STARTING);
654 intentFilter.addAction(Intent.ACTION_USER_STOPPING);
655 mContext.registerReceiverAsUser(
656 mUserIntentReceiver, UserHandle.ALL, intentFilter, null, null);
Lorenzo Colitti13c9fde2013-03-15 04:22:37 +0900657 mClat = new Nat464Xlat(mContext, mNetd, this, mTrackerHandler);
658
Chia-chi Yeh008ff392011-05-23 15:08:29 -0700659 try {
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700660 mNetd.registerObserver(mTethering);
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700661 mNetd.registerObserver(mDataActivityObserver);
Lorenzo Colitti13c9fde2013-03-15 04:22:37 +0900662 mNetd.registerObserver(mClat);
Chia-chi Yeh008ff392011-05-23 15:08:29 -0700663 } catch (RemoteException e) {
664 loge("Error registering observer :" + e);
665 }
666
Robert Greenwalt4e8dfef2010-09-20 14:35:25 -0700667 if (DBG) {
668 mInetLog = new ArrayList();
669 }
Robert Greenwalt434203a2010-10-11 16:00:27 -0700670
671 mSettingsObserver = new SettingsObserver(mHandler, EVENT_APPLY_GLOBAL_HTTP_PROXY);
672 mSettingsObserver.observe(mContext);
Robert Greenwaltb7090d62010-12-02 11:31:00 -0800673
John Spurlockbf991a82013-06-24 14:20:23 -0400674 mDataConnectionStats = new DataConnectionStats(mContext);
675 mDataConnectionStats.startMonitoring();
Jason Monk602b2322013-07-03 17:04:33 -0400676
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -0700677 // start network sampling ..
678 Intent intent = new Intent(ACTION_PKT_CNT_SAMPLE_INTERVAL_ELAPSED, null);
679 mSampleIntervalElapsedIntent = PendingIntent.getBroadcast(mContext,
Sreeram Ramachandranb1486ae2013-08-27 11:41:19 -0700680 SAMPLE_INTERVAL_ELAPSED_REQUEST_CODE, intent, 0);
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -0700681
682 mAlarmManager = (AlarmManager)mContext.getSystemService(Context.ALARM_SERVICE);
683 setAlarm(DEFAULT_START_SAMPLING_INTERVAL_IN_SECONDS * 1000, mSampleIntervalElapsedIntent);
684
685 IntentFilter filter = new IntentFilter();
686 filter.addAction(ACTION_PKT_CNT_SAMPLE_INTERVAL_ELAPSED);
687 mContext.registerReceiver(
688 new BroadcastReceiver() {
689 @Override
690 public void onReceive(Context context, Intent intent) {
691 String action = intent.getAction();
692 if (action.equals(ACTION_PKT_CNT_SAMPLE_INTERVAL_ELAPSED)) {
693 mHandler.sendMessage(mHandler.obtainMessage
694 (EVENT_SAMPLE_INTERVAL_ELAPSED));
695 }
696 }
697 },
698 new IntentFilter(filter));
699
Jason Monkdecd2952013-10-10 14:02:51 -0400700 mPacManager = new PacManager(mContext, mHandler, EVENT_PROXY_HAS_CHANGED);
Wink Saville7788c612013-08-29 14:57:08 -0700701
702 filter = new IntentFilter();
Wink Saville948282b2013-08-29 08:55:16 -0700703 filter.addAction(CONNECTED_TO_PROVISIONING_NETWORK_ACTION);
704 mContext.registerReceiver(mProvisioningReceiver, filter);
Chad Brubaker74f99a42014-03-13 18:18:40 +0000705
706 mAppOpsManager = (AppOpsManager) context.getSystemService(Context.APP_OPS_SERVICE);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800707 }
Jeff Sharkey4c628eb2012-07-23 13:19:46 -0700708
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700709 /**
710 * Factory that creates {@link NetworkStateTracker} instances using given
711 * {@link NetworkConfig}.
712 */
713 public interface NetworkFactory {
714 public NetworkStateTracker createTracker(int targetNetworkType, NetworkConfig config);
715 }
716
717 private static class DefaultNetworkFactory implements NetworkFactory {
718 private final Context mContext;
719 private final Handler mTrackerHandler;
720
721 public DefaultNetworkFactory(Context context, Handler trackerHandler) {
722 mContext = context;
723 mTrackerHandler = trackerHandler;
724 }
725
726 @Override
727 public NetworkStateTracker createTracker(int targetNetworkType, NetworkConfig config) {
728 switch (config.radio) {
729 case TYPE_WIFI:
730 return new WifiStateTracker(targetNetworkType, config.name);
731 case TYPE_MOBILE:
732 return new MobileDataStateTracker(targetNetworkType, config.name);
733 case TYPE_DUMMY:
734 return new DummyDataStateTracker(targetNetworkType, config.name);
735 case TYPE_BLUETOOTH:
736 return BluetoothTetheringDataTracker.getInstance();
737 case TYPE_WIMAX:
738 return makeWimaxStateTracker(mContext, mTrackerHandler);
739 case TYPE_ETHERNET:
740 return EthernetDataTracker.getInstance();
Hui Lu1c5624a2014-01-15 11:05:36 -0500741 case TYPE_PROXY:
742 return new ProxyDataTracker();
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700743 default:
744 throw new IllegalArgumentException(
745 "Trying to create a NetworkStateTracker for an unknown radio type: "
746 + config.radio);
747 }
748 }
749 }
750
751 /**
752 * Loads external WiMAX library and registers as system service, returning a
753 * {@link NetworkStateTracker} for WiMAX. Caller is still responsible for
754 * invoking {@link NetworkStateTracker#startMonitoring(Context, Handler)}.
755 */
756 private static NetworkStateTracker makeWimaxStateTracker(
757 Context context, Handler trackerHandler) {
Jeff Sharkey4c628eb2012-07-23 13:19:46 -0700758 // Initialize Wimax
tk.mun148c7d02011-10-13 22:51:57 +0900759 DexClassLoader wimaxClassLoader;
760 Class wimaxStateTrackerClass = null;
761 Class wimaxServiceClass = null;
762 Class wimaxManagerClass;
763 String wimaxJarLocation;
764 String wimaxLibLocation;
765 String wimaxManagerClassName;
766 String wimaxServiceClassName;
767 String wimaxStateTrackerClassName;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800768
tk.mun148c7d02011-10-13 22:51:57 +0900769 NetworkStateTracker wimaxStateTracker = null;
770
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700771 boolean isWimaxEnabled = context.getResources().getBoolean(
tk.mun148c7d02011-10-13 22:51:57 +0900772 com.android.internal.R.bool.config_wimaxEnabled);
773
774 if (isWimaxEnabled) {
775 try {
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700776 wimaxJarLocation = context.getResources().getString(
tk.mun148c7d02011-10-13 22:51:57 +0900777 com.android.internal.R.string.config_wimaxServiceJarLocation);
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700778 wimaxLibLocation = context.getResources().getString(
tk.mun148c7d02011-10-13 22:51:57 +0900779 com.android.internal.R.string.config_wimaxNativeLibLocation);
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700780 wimaxManagerClassName = context.getResources().getString(
tk.mun148c7d02011-10-13 22:51:57 +0900781 com.android.internal.R.string.config_wimaxManagerClassname);
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700782 wimaxServiceClassName = context.getResources().getString(
tk.mun148c7d02011-10-13 22:51:57 +0900783 com.android.internal.R.string.config_wimaxServiceClassname);
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700784 wimaxStateTrackerClassName = context.getResources().getString(
tk.mun148c7d02011-10-13 22:51:57 +0900785 com.android.internal.R.string.config_wimaxStateTrackerClassname);
786
Dianne Hackborn7ff30112012-11-08 11:12:09 -0800787 if (DBG) log("wimaxJarLocation: " + wimaxJarLocation);
tk.mun148c7d02011-10-13 22:51:57 +0900788 wimaxClassLoader = new DexClassLoader(wimaxJarLocation,
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700789 new ContextWrapper(context).getCacheDir().getAbsolutePath(),
tk.mun148c7d02011-10-13 22:51:57 +0900790 wimaxLibLocation, ClassLoader.getSystemClassLoader());
791
792 try {
793 wimaxManagerClass = wimaxClassLoader.loadClass(wimaxManagerClassName);
794 wimaxStateTrackerClass = wimaxClassLoader.loadClass(wimaxStateTrackerClassName);
795 wimaxServiceClass = wimaxClassLoader.loadClass(wimaxServiceClassName);
796 } catch (ClassNotFoundException ex) {
797 loge("Exception finding Wimax classes: " + ex.toString());
798 return null;
799 }
800 } catch(Resources.NotFoundException ex) {
801 loge("Wimax Resources does not exist!!! ");
802 return null;
803 }
804
805 try {
Dianne Hackborn7ff30112012-11-08 11:12:09 -0800806 if (DBG) log("Starting Wimax Service... ");
tk.mun148c7d02011-10-13 22:51:57 +0900807
808 Constructor wmxStTrkrConst = wimaxStateTrackerClass.getConstructor
809 (new Class[] {Context.class, Handler.class});
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700810 wimaxStateTracker = (NetworkStateTracker) wmxStTrkrConst.newInstance(
811 context, trackerHandler);
tk.mun148c7d02011-10-13 22:51:57 +0900812
813 Constructor wmxSrvConst = wimaxServiceClass.getDeclaredConstructor
814 (new Class[] {Context.class, wimaxStateTrackerClass});
815 wmxSrvConst.setAccessible(true);
Jeff Sharkeyfb878b62012-07-26 18:32:30 -0700816 IBinder svcInvoker = (IBinder)wmxSrvConst.newInstance(context, wimaxStateTracker);
tk.mun148c7d02011-10-13 22:51:57 +0900817 wmxSrvConst.setAccessible(false);
818
819 ServiceManager.addService(WimaxManagerConstants.WIMAX_SERVICE, svcInvoker);
820
821 } catch(Exception ex) {
822 loge("Exception creating Wimax classes: " + ex.toString());
823 return null;
824 }
825 } else {
826 loge("Wimax is not enabled or not added to the network attributes!!! ");
827 return null;
828 }
829
830 return wimaxStateTracker;
831 }
Jeff Sharkey4c628eb2012-07-23 13:19:46 -0700832
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800833 /**
Robert Greenwalt86e9e552009-07-16 17:21:39 -0700834 * Sets the preferred network.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800835 * @param preference the new preference
836 */
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -0700837 public void setNetworkPreference(int preference) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800838 enforceChangePermission();
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -0700839
Jeff Sharkey4c628eb2012-07-23 13:19:46 -0700840 mHandler.sendMessage(
841 mHandler.obtainMessage(EVENT_SET_NETWORK_PREFERENCE, preference, 0));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800842 }
843
844 public int getNetworkPreference() {
845 enforceAccessPermission();
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -0700846 int preference;
847 synchronized(this) {
848 preference = mNetworkPreference;
849 }
850 return preference;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800851 }
852
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -0700853 private void handleSetNetworkPreference(int preference) {
854 if (ConnectivityManager.isNetworkTypeValid(preference) &&
Robert Greenwaltd55a6b42011-03-25 13:09:25 -0700855 mNetConfigs[preference] != null &&
856 mNetConfigs[preference].isDefault()) {
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -0700857 if (mNetworkPreference != preference) {
858 final ContentResolver cr = mContext.getContentResolver();
Jeff Brownbf6f6f92012-09-25 15:03:20 -0700859 Settings.Global.putInt(cr, Settings.Global.NETWORK_PREFERENCE, preference);
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -0700860 synchronized(this) {
861 mNetworkPreference = preference;
862 }
863 enforcePreference();
864 }
865 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800866 }
Robert Greenwalt86e9e552009-07-16 17:21:39 -0700867
Wink Saville628b0852011-08-04 15:01:58 -0700868 private int getConnectivityChangeDelay() {
869 final ContentResolver cr = mContext.getContentResolver();
870
871 /** Check system properties for the default value then use secure settings value, if any. */
872 int defaultDelay = SystemProperties.getInt(
Jeff Sharkey625239a2012-09-26 22:03:49 -0700873 "conn." + Settings.Global.CONNECTIVITY_CHANGE_DELAY,
874 ConnectivityManager.CONNECTIVITY_CHANGE_DELAY_DEFAULT);
875 return Settings.Global.getInt(cr, Settings.Global.CONNECTIVITY_CHANGE_DELAY,
Wink Saville628b0852011-08-04 15:01:58 -0700876 defaultDelay);
877 }
878
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800879 private int getPersistedNetworkPreference() {
880 final ContentResolver cr = mContext.getContentResolver();
881
Jeff Brownbf6f6f92012-09-25 15:03:20 -0700882 final int networkPrefSetting = Settings.Global
883 .getInt(cr, Settings.Global.NETWORK_PREFERENCE, -1);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800884
Jianzheng Zhoudcf03f32012-11-16 13:45:20 +0800885 return networkPrefSetting;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800886 }
Robert Greenwalt86e9e552009-07-16 17:21:39 -0700887
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800888 /**
Robert Greenwalt86e9e552009-07-16 17:21:39 -0700889 * Make the state of network connectivity conform to the preference settings
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800890 * In this method, we only tear down a non-preferred network. Establishing
891 * a connection to the preferred network is taken care of when we handle
892 * the disconnect event from the non-preferred network
893 * (see {@link #handleDisconnect(NetworkInfo)}).
894 */
895 private void enforcePreference() {
Robert Greenwalt42acef32009-08-12 16:08:25 -0700896 if (mNetTrackers[mNetworkPreference].getNetworkInfo().isConnected())
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800897 return;
898
Robert Greenwalt42acef32009-08-12 16:08:25 -0700899 if (!mNetTrackers[mNetworkPreference].isAvailable())
900 return;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800901
Robert Greenwalt42acef32009-08-12 16:08:25 -0700902 for (int t=0; t <= ConnectivityManager.MAX_RADIO_TYPE; t++) {
Robert Greenwalt5154ae762009-10-30 14:17:42 -0700903 if (t != mNetworkPreference && mNetTrackers[t] != null &&
Robert Greenwalt42acef32009-08-12 16:08:25 -0700904 mNetTrackers[t].getNetworkInfo().isConnected()) {
Robert Greenwaltec9fe462009-08-20 15:25:14 -0700905 if (DBG) {
Wink Savilleed9c02b2010-12-03 12:01:38 -0800906 log("tearing down " + mNetTrackers[t].getNetworkInfo() +
Robert Greenwaltec9fe462009-08-20 15:25:14 -0700907 " in enforcePreference");
908 }
Robert Greenwalt42acef32009-08-12 16:08:25 -0700909 teardown(mNetTrackers[t]);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800910 }
911 }
912 }
913
914 private boolean teardown(NetworkStateTracker netTracker) {
915 if (netTracker.teardown()) {
916 netTracker.setTeardownRequested(true);
917 return true;
918 } else {
919 return false;
920 }
921 }
922
923 /**
Jeff Sharkeyfdfef572011-06-16 15:07:48 -0700924 * Check if UID should be blocked from using the network represented by the
925 * given {@link NetworkStateTracker}.
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700926 */
Jeff Sharkeyfdfef572011-06-16 15:07:48 -0700927 private boolean isNetworkBlocked(NetworkStateTracker tracker, int uid) {
928 final String iface = tracker.getLinkProperties().getInterfaceName();
Jeff Sharkeyd2a45872011-05-28 20:56:34 -0700929
Jeff Sharkeyfdfef572011-06-16 15:07:48 -0700930 final boolean networkCostly;
931 final int uidRules;
932 synchronized (mRulesLock) {
933 networkCostly = mMeteredIfaces.contains(iface);
934 uidRules = mUidRules.get(uid, RULE_ALLOW_ALL);
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700935 }
Jeff Sharkeyfdfef572011-06-16 15:07:48 -0700936
937 if (networkCostly && (uidRules & RULE_REJECT_METERED) != 0) {
938 return true;
939 }
940
941 // no restrictive rules; network is visible
942 return false;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700943 }
944
945 /**
Jeff Sharkeyfdfef572011-06-16 15:07:48 -0700946 * Return a filtered {@link NetworkInfo}, potentially marked
947 * {@link DetailedState#BLOCKED} based on
948 * {@link #isNetworkBlocked(NetworkStateTracker, int)}.
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700949 */
Jeff Sharkeyfdfef572011-06-16 15:07:48 -0700950 private NetworkInfo getFilteredNetworkInfo(NetworkStateTracker tracker, int uid) {
951 NetworkInfo info = tracker.getNetworkInfo();
952 if (isNetworkBlocked(tracker, uid)) {
Jeff Sharkeyd2a45872011-05-28 20:56:34 -0700953 // network is blocked; clone and override state
954 info = new NetworkInfo(info);
955 info.setDetailedState(DetailedState.BLOCKED, null, null);
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700956 }
Jeff Sharkey69ddab42012-08-25 00:05:46 -0700957 if (mLockdownTracker != null) {
958 info = mLockdownTracker.augmentNetworkInfo(info);
959 }
Jeff Sharkeyd2a45872011-05-28 20:56:34 -0700960 return info;
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700961 }
962
963 /**
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800964 * Return NetworkInfo for the active (i.e., connected) network interface.
965 * It is assumed that at most one network is active at a time. If more
966 * than one is active, it is indeterminate which will be returned.
Robert Greenwalt86e9e552009-07-16 17:21:39 -0700967 * @return the info for the active network, or {@code null} if none is
968 * active
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800969 */
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700970 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800971 public NetworkInfo getActiveNetworkInfo() {
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -0700972 enforceAccessPermission();
973 final int uid = Binder.getCallingUid();
974 return getNetworkInfo(mActiveDefaultNetwork, uid);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800975 }
976
Wink Saville948282b2013-08-29 08:55:16 -0700977 /**
978 * Find the first Provisioning network.
979 *
980 * @return NetworkInfo or null if none.
981 */
982 private NetworkInfo getProvisioningNetworkInfo() {
983 enforceAccessPermission();
984
985 // Find the first Provisioning Network
986 NetworkInfo provNi = null;
987 for (NetworkInfo ni : getAllNetworkInfo()) {
Wink Saville67c38212013-09-05 12:02:25 -0700988 if (ni.isConnectedToProvisioningNetwork()) {
Wink Saville948282b2013-08-29 08:55:16 -0700989 provNi = ni;
990 break;
991 }
992 }
993 if (DBG) log("getProvisioningNetworkInfo: X provNi=" + provNi);
994 return provNi;
995 }
996
997 /**
998 * Find the first Provisioning network or the ActiveDefaultNetwork
999 * if there is no Provisioning network
1000 *
1001 * @return NetworkInfo or null if none.
1002 */
1003 @Override
1004 public NetworkInfo getProvisioningOrActiveNetworkInfo() {
1005 enforceAccessPermission();
1006
1007 NetworkInfo provNi = getProvisioningNetworkInfo();
1008 if (provNi == null) {
1009 final int uid = Binder.getCallingUid();
1010 provNi = getNetworkInfo(mActiveDefaultNetwork, uid);
1011 }
1012 if (DBG) log("getProvisioningOrActiveNetworkInfo: X provNi=" + provNi);
1013 return provNi;
1014 }
1015
Jeff Sharkey69ddab42012-08-25 00:05:46 -07001016 public NetworkInfo getActiveNetworkInfoUnfiltered() {
1017 enforceAccessPermission();
1018 if (isNetworkTypeValid(mActiveDefaultNetwork)) {
1019 final NetworkStateTracker tracker = mNetTrackers[mActiveDefaultNetwork];
1020 if (tracker != null) {
1021 return tracker.getNetworkInfo();
1022 }
1023 }
1024 return null;
1025 }
1026
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -07001027 @Override
1028 public NetworkInfo getActiveNetworkInfoForUid(int uid) {
1029 enforceConnectivityInternalPermission();
1030 return getNetworkInfo(mActiveDefaultNetwork, uid);
1031 }
1032
1033 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001034 public NetworkInfo getNetworkInfo(int networkType) {
1035 enforceAccessPermission();
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -07001036 final int uid = Binder.getCallingUid();
1037 return getNetworkInfo(networkType, uid);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001038 }
1039
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -07001040 private NetworkInfo getNetworkInfo(int networkType, int uid) {
1041 NetworkInfo info = null;
1042 if (isNetworkTypeValid(networkType)) {
1043 final NetworkStateTracker tracker = mNetTrackers[networkType];
1044 if (tracker != null) {
Jeff Sharkeyfdfef572011-06-16 15:07:48 -07001045 info = getFilteredNetworkInfo(tracker, uid);
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -07001046 }
1047 }
1048 return info;
1049 }
1050
1051 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001052 public NetworkInfo[] getAllNetworkInfo() {
1053 enforceAccessPermission();
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -07001054 final int uid = Binder.getCallingUid();
Jeff Sharkeyd2a45872011-05-28 20:56:34 -07001055 final ArrayList<NetworkInfo> result = Lists.newArrayList();
Jeff Sharkeyfdfef572011-06-16 15:07:48 -07001056 synchronized (mRulesLock) {
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -07001057 for (NetworkStateTracker tracker : mNetTrackers) {
1058 if (tracker != null) {
Jeff Sharkeyfdfef572011-06-16 15:07:48 -07001059 result.add(getFilteredNetworkInfo(tracker, uid));
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -07001060 }
1061 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001062 }
Jeff Sharkeyd2a45872011-05-28 20:56:34 -07001063 return result.toArray(new NetworkInfo[result.size()]);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001064 }
1065
Robert Greenwalt9b2886e2011-08-31 11:46:42 -07001066 @Override
1067 public boolean isNetworkSupported(int networkType) {
1068 enforceAccessPermission();
1069 return (isNetworkTypeValid(networkType) && (mNetTrackers[networkType] != null));
1070 }
1071
Robert Greenwaltd192dad2010-09-14 09:18:02 -07001072 /**
1073 * Return LinkProperties for the active (i.e., connected) default
1074 * network interface. It is assumed that at most one default network
1075 * is active at a time. If more than one is active, it is indeterminate
1076 * which will be returned.
1077 * @return the ip properties for the active network, or {@code null} if
1078 * none is active
1079 */
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -07001080 @Override
Robert Greenwaltd192dad2010-09-14 09:18:02 -07001081 public LinkProperties getActiveLinkProperties() {
Robert Greenwalt59911582011-05-20 12:23:41 -07001082 return getLinkProperties(mActiveDefaultNetwork);
Robert Greenwaltd192dad2010-09-14 09:18:02 -07001083 }
1084
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -07001085 @Override
Robert Greenwaltd192dad2010-09-14 09:18:02 -07001086 public LinkProperties getLinkProperties(int networkType) {
1087 enforceAccessPermission();
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -07001088 if (isNetworkTypeValid(networkType)) {
1089 final NetworkStateTracker tracker = mNetTrackers[networkType];
1090 if (tracker != null) {
1091 return tracker.getLinkProperties();
1092 }
Robert Greenwaltd192dad2010-09-14 09:18:02 -07001093 }
1094 return null;
1095 }
1096
Jeff Sharkeyd2a45872011-05-28 20:56:34 -07001097 @Override
1098 public NetworkState[] getAllNetworkState() {
1099 enforceAccessPermission();
1100 final int uid = Binder.getCallingUid();
1101 final ArrayList<NetworkState> result = Lists.newArrayList();
Jeff Sharkeyfdfef572011-06-16 15:07:48 -07001102 synchronized (mRulesLock) {
Jeff Sharkeyd2a45872011-05-28 20:56:34 -07001103 for (NetworkStateTracker tracker : mNetTrackers) {
1104 if (tracker != null) {
Jeff Sharkeyfdfef572011-06-16 15:07:48 -07001105 final NetworkInfo info = getFilteredNetworkInfo(tracker, uid);
Jeff Sharkeyd2a45872011-05-28 20:56:34 -07001106 result.add(new NetworkState(
1107 info, tracker.getLinkProperties(), tracker.getLinkCapabilities()));
1108 }
1109 }
1110 }
1111 return result.toArray(new NetworkState[result.size()]);
1112 }
1113
Jeff Sharkeyf0ceede2011-08-02 17:22:34 -07001114 private NetworkState getNetworkStateUnchecked(int networkType) {
1115 if (isNetworkTypeValid(networkType)) {
1116 final NetworkStateTracker tracker = mNetTrackers[networkType];
1117 if (tracker != null) {
1118 return new NetworkState(tracker.getNetworkInfo(), tracker.getLinkProperties(),
1119 tracker.getLinkCapabilities());
1120 }
1121 }
1122 return null;
1123 }
1124
1125 @Override
1126 public NetworkQuotaInfo getActiveNetworkQuotaInfo() {
1127 enforceAccessPermission();
Jeff Sharkey15ec7d62012-04-17 12:23:40 -07001128
1129 final long token = Binder.clearCallingIdentity();
1130 try {
1131 final NetworkState state = getNetworkStateUnchecked(mActiveDefaultNetwork);
1132 if (state != null) {
1133 try {
1134 return mPolicyManager.getNetworkQuotaInfo(state);
1135 } catch (RemoteException e) {
1136 }
Jeff Sharkeyf0ceede2011-08-02 17:22:34 -07001137 }
Jeff Sharkey15ec7d62012-04-17 12:23:40 -07001138 return null;
1139 } finally {
1140 Binder.restoreCallingIdentity(token);
Jeff Sharkeyf0ceede2011-08-02 17:22:34 -07001141 }
Jeff Sharkeyf0ceede2011-08-02 17:22:34 -07001142 }
1143
Jeff Sharkey9f7cbf02012-04-12 18:34:54 -07001144 @Override
1145 public boolean isActiveNetworkMetered() {
1146 enforceAccessPermission();
Jeff Sharkey15ec7d62012-04-17 12:23:40 -07001147 final long token = Binder.clearCallingIdentity();
1148 try {
Jeff Sharkey5f4dafb2012-04-30 15:47:05 -07001149 return isNetworkMeteredUnchecked(mActiveDefaultNetwork);
Jeff Sharkey15ec7d62012-04-17 12:23:40 -07001150 } finally {
1151 Binder.restoreCallingIdentity(token);
Jeff Sharkey9f7cbf02012-04-12 18:34:54 -07001152 }
Jeff Sharkey9f7cbf02012-04-12 18:34:54 -07001153 }
1154
Jeff Sharkey5f4dafb2012-04-30 15:47:05 -07001155 private boolean isNetworkMeteredUnchecked(int networkType) {
1156 final NetworkState state = getNetworkStateUnchecked(networkType);
1157 if (state != null) {
1158 try {
1159 return mPolicyManager.isNetworkMetered(state);
1160 } catch (RemoteException e) {
1161 }
1162 }
1163 return false;
1164 }
1165
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001166 public boolean setRadios(boolean turnOn) {
1167 boolean result = true;
1168 enforceChangePermission();
1169 for (NetworkStateTracker t : mNetTrackers) {
Robert Greenwalt5154ae762009-10-30 14:17:42 -07001170 if (t != null) result = t.setRadio(turnOn) && result;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001171 }
1172 return result;
1173 }
1174
1175 public boolean setRadio(int netType, boolean turnOn) {
1176 enforceChangePermission();
1177 if (!ConnectivityManager.isNetworkTypeValid(netType)) {
1178 return false;
1179 }
1180 NetworkStateTracker tracker = mNetTrackers[netType];
1181 return tracker != null && tracker.setRadio(turnOn);
1182 }
1183
Jeff Sharkey216c1812012-08-05 14:29:23 -07001184 private INetworkManagementEventObserver mDataActivityObserver = new BaseNetworkObserver() {
1185 @Override
Haoyu Baidb3c8672012-06-20 14:29:57 -07001186 public void interfaceClassDataActivityChanged(String label, boolean active) {
1187 int deviceType = Integer.parseInt(label);
1188 sendDataActivityBroadcast(deviceType, active);
1189 }
Jeff Sharkey216c1812012-08-05 14:29:23 -07001190 };
Haoyu Baidb3c8672012-06-20 14:29:57 -07001191
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001192 /**
1193 * Used to notice when the calling process dies so we can self-expire
1194 *
1195 * Also used to know if the process has cleaned up after itself when
1196 * our auto-expire timer goes off. The timer has a link to an object.
1197 *
1198 */
Robert Greenwalt42acef32009-08-12 16:08:25 -07001199 private class FeatureUser implements IBinder.DeathRecipient {
1200 int mNetworkType;
1201 String mFeature;
1202 IBinder mBinder;
1203 int mPid;
1204 int mUid;
Robert Greenwaltb9285352009-12-21 18:24:07 -08001205 long mCreateTime;
Robert Greenwalt42acef32009-08-12 16:08:25 -07001206
1207 FeatureUser(int type, String feature, IBinder binder) {
1208 super();
1209 mNetworkType = type;
1210 mFeature = feature;
1211 mBinder = binder;
1212 mPid = getCallingPid();
1213 mUid = getCallingUid();
Robert Greenwaltb9285352009-12-21 18:24:07 -08001214 mCreateTime = System.currentTimeMillis();
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001215
Robert Greenwalt42acef32009-08-12 16:08:25 -07001216 try {
1217 mBinder.linkToDeath(this, 0);
1218 } catch (RemoteException e) {
1219 binderDied();
1220 }
1221 }
1222
1223 void unlinkDeathRecipient() {
1224 mBinder.unlinkToDeath(this, 0);
1225 }
1226
1227 public void binderDied() {
Wink Savilleed9c02b2010-12-03 12:01:38 -08001228 log("ConnectivityService FeatureUser binderDied(" +
Robert Greenwaltb9285352009-12-21 18:24:07 -08001229 mNetworkType + ", " + mFeature + ", " + mBinder + "), created " +
1230 (System.currentTimeMillis() - mCreateTime) + " mSec ago");
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001231 stopUsingNetworkFeature(this, false);
Robert Greenwalt42acef32009-08-12 16:08:25 -07001232 }
1233
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001234 public void expire() {
Robert Greenwalt58d4c592011-08-02 17:18:41 -07001235 if (VDBG) {
1236 log("ConnectivityService FeatureUser expire(" +
1237 mNetworkType + ", " + mFeature + ", " + mBinder +"), created " +
1238 (System.currentTimeMillis() - mCreateTime) + " mSec ago");
1239 }
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001240 stopUsingNetworkFeature(this, false);
1241 }
Robert Greenwaltb9285352009-12-21 18:24:07 -08001242
Kazuhiro Ondo3bed4c92011-07-19 11:23:37 -05001243 public boolean isSameUser(FeatureUser u) {
1244 if (u == null) return false;
1245
1246 return isSameUser(u.mPid, u.mUid, u.mNetworkType, u.mFeature);
1247 }
1248
1249 public boolean isSameUser(int pid, int uid, int networkType, String feature) {
1250 if ((mPid == pid) && (mUid == uid) && (mNetworkType == networkType) &&
1251 TextUtils.equals(mFeature, feature)) {
1252 return true;
1253 }
1254 return false;
1255 }
1256
Robert Greenwaltb9285352009-12-21 18:24:07 -08001257 public String toString() {
1258 return "FeatureUser("+mNetworkType+","+mFeature+","+mPid+","+mUid+"), created " +
1259 (System.currentTimeMillis() - mCreateTime) + " mSec ago";
1260 }
Robert Greenwalt42acef32009-08-12 16:08:25 -07001261 }
1262
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001263 // javadoc from interface
Robert Greenwalt42acef32009-08-12 16:08:25 -07001264 public int startUsingNetworkFeature(int networkType, String feature,
1265 IBinder binder) {
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001266 long startTime = 0;
1267 if (DBG) {
1268 startTime = SystemClock.elapsedRealtime();
1269 }
Wink Savillec9acde92011-09-21 11:05:43 -07001270 if (VDBG) {
Jeff Sharkey5f4dafb2012-04-30 15:47:05 -07001271 log("startUsingNetworkFeature for net " + networkType + ": " + feature + ", uid="
1272 + Binder.getCallingUid());
Robert Greenwalt42acef32009-08-12 16:08:25 -07001273 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001274 enforceChangePermission();
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001275 try {
1276 if (!ConnectivityManager.isNetworkTypeValid(networkType) ||
1277 mNetConfigs[networkType] == null) {
Wink Savillea639b312012-07-10 12:37:54 -07001278 return PhoneConstants.APN_REQUEST_FAILED;
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001279 }
Robert Greenwalt42acef32009-08-12 16:08:25 -07001280
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001281 FeatureUser f = new FeatureUser(networkType, feature, binder);
Robert Greenwalt42acef32009-08-12 16:08:25 -07001282
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001283 // TODO - move this into individual networktrackers
1284 int usedNetworkType = convertFeatureToNetworkType(networkType, feature);
Robert Greenwalt50393202011-06-21 17:26:14 -07001285
Jeff Sharkey69ddab42012-08-25 00:05:46 -07001286 if (mLockdownEnabled) {
1287 // Since carrier APNs usually aren't available from VPN
1288 // endpoint, mark them as unavailable.
1289 return PhoneConstants.APN_TYPE_NOT_AVAILABLE;
1290 }
1291
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001292 if (mProtectedNetworks.contains(usedNetworkType)) {
1293 enforceConnectivityInternalPermission();
1294 }
Robert Greenwalt50393202011-06-21 17:26:14 -07001295
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001296 // if UID is restricted, don't allow them to bring up metered APNs
1297 final boolean networkMetered = isNetworkMeteredUnchecked(usedNetworkType);
1298 final int uidRules;
1299 synchronized (mRulesLock) {
1300 uidRules = mUidRules.get(Binder.getCallingUid(), RULE_ALLOW_ALL);
1301 }
1302 if (networkMetered && (uidRules & RULE_REJECT_METERED) != 0) {
Wink Savillea639b312012-07-10 12:37:54 -07001303 return PhoneConstants.APN_REQUEST_FAILED;
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001304 }
Jeff Sharkey5f4dafb2012-04-30 15:47:05 -07001305
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001306 NetworkStateTracker network = mNetTrackers[usedNetworkType];
1307 if (network != null) {
1308 Integer currentPid = new Integer(getCallingPid());
1309 if (usedNetworkType != networkType) {
1310 NetworkInfo ni = network.getNetworkInfo();
Robert Greenwalt42acef32009-08-12 16:08:25 -07001311
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001312 if (ni.isAvailable() == false) {
1313 if (!TextUtils.equals(feature,Phone.FEATURE_ENABLE_DUN_ALWAYS)) {
1314 if (DBG) log("special network not available ni=" + ni.getTypeName());
Wink Savillea639b312012-07-10 12:37:54 -07001315 return PhoneConstants.APN_TYPE_NOT_AVAILABLE;
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001316 } else {
1317 // else make the attempt anyway - probably giving REQUEST_STARTED below
1318 if (DBG) {
1319 log("special network not available, but try anyway ni=" +
1320 ni.getTypeName());
Kazuhiro Ondo3bed4c92011-07-19 11:23:37 -05001321 }
1322 }
1323 }
1324
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001325 int restoreTimer = getRestoreDefaultNetworkDelay(usedNetworkType);
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001326
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001327 synchronized(this) {
1328 boolean addToList = true;
1329 if (restoreTimer < 0) {
1330 // In case there is no timer is specified for the feature,
1331 // make sure we don't add duplicate entry with the same request.
1332 for (FeatureUser u : mFeatureUsers) {
1333 if (u.isSameUser(f)) {
1334 // Duplicate user is found. Do not add.
1335 addToList = false;
1336 break;
1337 }
1338 }
Robert Greenwalt8beff952011-12-13 15:26:02 -08001339 }
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001340
1341 if (addToList) mFeatureUsers.add(f);
1342 if (!mNetRequestersPids[usedNetworkType].contains(currentPid)) {
1343 // this gets used for per-pid dns when connected
1344 mNetRequestersPids[usedNetworkType].add(currentPid);
1345 }
Robert Greenwalt42acef32009-08-12 16:08:25 -07001346 }
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001347
1348 if (restoreTimer >= 0) {
1349 mHandler.sendMessageDelayed(mHandler.obtainMessage(
1350 EVENT_RESTORE_DEFAULT_NETWORK, f), restoreTimer);
1351 }
1352
1353 if ((ni.isConnectedOrConnecting() == true) &&
1354 !network.isTeardownRequested()) {
1355 if (ni.isConnected() == true) {
1356 final long token = Binder.clearCallingIdentity();
1357 try {
1358 // add the pid-specific dns
1359 handleDnsConfigurationChange(usedNetworkType);
1360 if (VDBG) log("special network already active");
1361 } finally {
1362 Binder.restoreCallingIdentity(token);
1363 }
Wink Savillea639b312012-07-10 12:37:54 -07001364 return PhoneConstants.APN_ALREADY_ACTIVE;
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001365 }
1366 if (VDBG) log("special network already connecting");
Wink Savillea639b312012-07-10 12:37:54 -07001367 return PhoneConstants.APN_REQUEST_STARTED;
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001368 }
1369
1370 // check if the radio in play can make another contact
1371 // assume if cannot for now
1372
1373 if (DBG) {
1374 log("startUsingNetworkFeature reconnecting to " + networkType + ": " +
1375 feature);
1376 }
Mikael Hedegren342a7cb2012-12-14 15:52:52 +01001377 if (network.reconnect()) {
Wink Saville948282b2013-08-29 08:55:16 -07001378 if (DBG) log("startUsingNetworkFeature X: return APN_REQUEST_STARTED");
Mikael Hedegren342a7cb2012-12-14 15:52:52 +01001379 return PhoneConstants.APN_REQUEST_STARTED;
1380 } else {
Wink Saville948282b2013-08-29 08:55:16 -07001381 if (DBG) log("startUsingNetworkFeature X: return APN_REQUEST_FAILED");
Mikael Hedegren342a7cb2012-12-14 15:52:52 +01001382 return PhoneConstants.APN_REQUEST_FAILED;
1383 }
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001384 } else {
1385 // need to remember this unsupported request so we respond appropriately on stop
1386 synchronized(this) {
1387 mFeatureUsers.add(f);
1388 if (!mNetRequestersPids[usedNetworkType].contains(currentPid)) {
1389 // this gets used for per-pid dns when connected
1390 mNetRequestersPids[usedNetworkType].add(currentPid);
1391 }
Robert Greenwalt0be1e982010-12-15 13:26:33 -08001392 }
Wink Saville948282b2013-08-29 08:55:16 -07001393 if (DBG) log("startUsingNetworkFeature X: return -1 unsupported feature.");
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001394 return -1;
Robert Greenwalt0be1e982010-12-15 13:26:33 -08001395 }
Robert Greenwalt42acef32009-08-12 16:08:25 -07001396 }
Wink Saville948282b2013-08-29 08:55:16 -07001397 if (DBG) log("startUsingNetworkFeature X: return APN_TYPE_NOT_AVAILABLE");
Wink Savillea639b312012-07-10 12:37:54 -07001398 return PhoneConstants.APN_TYPE_NOT_AVAILABLE;
Robert Greenwalt5a0c3202012-05-22 16:07:46 -07001399 } finally {
1400 if (DBG) {
1401 final long execTime = SystemClock.elapsedRealtime() - startTime;
1402 if (execTime > 250) {
1403 loge("startUsingNetworkFeature took too long: " + execTime + "ms");
1404 } else {
1405 if (VDBG) log("startUsingNetworkFeature took " + execTime + "ms");
1406 }
1407 }
1408 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001409 }
1410
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001411 // javadoc from interface
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001412 public int stopUsingNetworkFeature(int networkType, String feature) {
Robert Greenwaltb8f16342009-10-06 17:52:40 -07001413 enforceChangePermission();
1414
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001415 int pid = getCallingPid();
1416 int uid = getCallingUid();
1417
1418 FeatureUser u = null;
1419 boolean found = false;
1420
1421 synchronized(this) {
Kazuhiro Ondo3bed4c92011-07-19 11:23:37 -05001422 for (FeatureUser x : mFeatureUsers) {
1423 if (x.isSameUser(pid, uid, networkType, feature)) {
1424 u = x;
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001425 found = true;
1426 break;
1427 }
1428 }
1429 }
1430 if (found && u != null) {
Wink Saville948282b2013-08-29 08:55:16 -07001431 if (VDBG) log("stopUsingNetworkFeature: X");
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001432 // stop regardless of how many other time this proc had called start
1433 return stopUsingNetworkFeature(u, true);
1434 } else {
1435 // none found!
Wink Saville948282b2013-08-29 08:55:16 -07001436 if (VDBG) log("stopUsingNetworkFeature: X not a live request, ignoring");
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001437 return 1;
1438 }
Robert Greenwalt42acef32009-08-12 16:08:25 -07001439 }
1440
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001441 private int stopUsingNetworkFeature(FeatureUser u, boolean ignoreDups) {
1442 int networkType = u.mNetworkType;
1443 String feature = u.mFeature;
1444 int pid = u.mPid;
1445 int uid = u.mUid;
1446
1447 NetworkStateTracker tracker = null;
1448 boolean callTeardown = false; // used to carry our decision outside of sync block
1449
Wink Savillec9acde92011-09-21 11:05:43 -07001450 if (VDBG) {
1451 log("stopUsingNetworkFeature: net " + networkType + ": " + feature);
Robert Greenwalt42acef32009-08-12 16:08:25 -07001452 }
Robert Greenwaltb8f16342009-10-06 17:52:40 -07001453
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001454 if (!ConnectivityManager.isNetworkTypeValid(networkType)) {
Wink Savillec9acde92011-09-21 11:05:43 -07001455 if (DBG) {
1456 log("stopUsingNetworkFeature: net " + networkType + ": " + feature +
1457 ", net is invalid");
1458 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001459 return -1;
1460 }
Robert Greenwalt42acef32009-08-12 16:08:25 -07001461
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001462 // need to link the mFeatureUsers list with the mNetRequestersPids state in this
1463 // sync block
1464 synchronized(this) {
1465 // check if this process still has an outstanding start request
1466 if (!mFeatureUsers.contains(u)) {
Wink Savillec9acde92011-09-21 11:05:43 -07001467 if (VDBG) {
1468 log("stopUsingNetworkFeature: this process has no outstanding requests" +
1469 ", ignoring");
1470 }
Robert Greenwalt42acef32009-08-12 16:08:25 -07001471 return 1;
1472 }
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001473 u.unlinkDeathRecipient();
1474 mFeatureUsers.remove(mFeatureUsers.indexOf(u));
1475 // If we care about duplicate requests, check for that here.
1476 //
1477 // This is done to support the extension of a request - the app
1478 // can request we start the network feature again and renew the
1479 // auto-shutoff delay. Normal "stop" calls from the app though
1480 // do not pay attention to duplicate requests - in effect the
1481 // API does not refcount and a single stop will counter multiple starts.
1482 if (ignoreDups == false) {
Kazuhiro Ondo3bed4c92011-07-19 11:23:37 -05001483 for (FeatureUser x : mFeatureUsers) {
1484 if (x.isSameUser(u)) {
Wink Savillec9acde92011-09-21 11:05:43 -07001485 if (VDBG) log("stopUsingNetworkFeature: dup is found, ignoring");
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001486 return 1;
1487 }
1488 }
Robert Greenwalt42acef32009-08-12 16:08:25 -07001489 }
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001490
repo syncaea743a2011-07-29 23:55:49 -07001491 // TODO - move to individual network trackers
1492 int usedNetworkType = convertFeatureToNetworkType(networkType, feature);
1493
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001494 tracker = mNetTrackers[usedNetworkType];
Robert Greenwalt5154ae762009-10-30 14:17:42 -07001495 if (tracker == null) {
Wink Savillec9acde92011-09-21 11:05:43 -07001496 if (DBG) {
1497 log("stopUsingNetworkFeature: net " + networkType + ": " + feature +
1498 " no known tracker for used net type " + usedNetworkType);
1499 }
Robert Greenwalt5154ae762009-10-30 14:17:42 -07001500 return -1;
1501 }
1502 if (usedNetworkType != networkType) {
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001503 Integer currentPid = new Integer(pid);
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001504 mNetRequestersPids[usedNetworkType].remove(currentPid);
Robert Greenwalt9055ae32013-02-12 17:18:25 -08001505
1506 final long token = Binder.clearCallingIdentity();
1507 try {
1508 reassessPidDns(pid, true);
1509 } finally {
1510 Binder.restoreCallingIdentity(token);
1511 }
Mattias Falk8b47b362011-08-23 14:15:13 +02001512 flushVmDnsCache();
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001513 if (mNetRequestersPids[usedNetworkType].size() != 0) {
Wink Savillec9acde92011-09-21 11:05:43 -07001514 if (VDBG) {
1515 log("stopUsingNetworkFeature: net " + networkType + ": " + feature +
1516 " others still using it");
1517 }
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001518 return 1;
1519 }
1520 callTeardown = true;
Robert Greenwalt19b9ab42011-01-10 11:58:31 -08001521 } else {
Wink Savillec9acde92011-09-21 11:05:43 -07001522 if (DBG) {
1523 log("stopUsingNetworkFeature: net " + networkType + ": " + feature +
1524 " not a known feature - dropping");
1525 }
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001526 }
1527 }
Wink Savillec9acde92011-09-21 11:05:43 -07001528
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001529 if (callTeardown) {
Wink Savillec9acde92011-09-21 11:05:43 -07001530 if (DBG) {
1531 log("stopUsingNetworkFeature: teardown net " + networkType + ": " + feature);
1532 }
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07001533 tracker.teardown();
Robert Greenwalt42acef32009-08-12 16:08:25 -07001534 return 1;
1535 } else {
Robert Greenwalt02648a42010-05-18 10:52:51 -07001536 return -1;
Robert Greenwalt42acef32009-08-12 16:08:25 -07001537 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001538 }
1539
1540 /**
Chad Brubaker74f99a42014-03-13 18:18:40 +00001541 * Check if the address falls into any of currently running VPN's route's.
1542 */
1543 private boolean isAddressUnderVpn(InetAddress address) {
1544 synchronized (mVpns) {
1545 synchronized (mRoutesLock) {
1546 int uid = UserHandle.getCallingUserId();
1547 Vpn vpn = mVpns.get(uid);
1548 if (vpn == null) {
1549 return false;
1550 }
1551
1552 // Check if an exemption exists for this address.
1553 for (LinkAddress destination : mExemptAddresses) {
1554 if (!NetworkUtils.addressTypeMatches(address, destination.getAddress())) {
1555 continue;
1556 }
1557
1558 int prefix = destination.getNetworkPrefixLength();
1559 InetAddress addrMasked = NetworkUtils.getNetworkPart(address, prefix);
1560 InetAddress destMasked = NetworkUtils.getNetworkPart(destination.getAddress(),
1561 prefix);
1562
1563 if (addrMasked.equals(destMasked)) {
1564 return false;
1565 }
1566 }
1567
1568 // Finally check if the address is covered by the VPN.
1569 return vpn.isAddressCovered(address);
1570 }
1571 }
1572 }
1573
1574 /**
Robert Greenwalt585ac0f2010-08-27 09:24:29 -07001575 * @deprecated use requestRouteToHostAddress instead
1576 *
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001577 * Ensure that a network route exists to deliver traffic to the specified
1578 * host via the specified network interface.
Robert Greenwalt86e9e552009-07-16 17:21:39 -07001579 * @param networkType the type of the network over which traffic to the
1580 * specified host is to be routed
1581 * @param hostAddress the IP address of the host to which the route is
1582 * desired
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001583 * @return {@code true} on success, {@code false} on failure
1584 */
Chad Brubakerf5729a62014-03-13 18:18:36 +00001585 public boolean requestRouteToHost(int networkType, int hostAddress, String packageName) {
Robert Greenwalt585ac0f2010-08-27 09:24:29 -07001586 InetAddress inetAddress = NetworkUtils.intToInetAddress(hostAddress);
1587
1588 if (inetAddress == null) {
1589 return false;
1590 }
1591
Chad Brubakerf5729a62014-03-13 18:18:36 +00001592 return requestRouteToHostAddress(networkType, inetAddress.getAddress(), packageName);
Robert Greenwalt585ac0f2010-08-27 09:24:29 -07001593 }
1594
1595 /**
1596 * Ensure that a network route exists to deliver traffic to the specified
1597 * host via the specified network interface.
1598 * @param networkType the type of the network over which traffic to the
1599 * specified host is to be routed
1600 * @param hostAddress the IP address of the host to which the route is
1601 * desired
1602 * @return {@code true} on success, {@code false} on failure
1603 */
Chad Brubakerf5729a62014-03-13 18:18:36 +00001604 public boolean requestRouteToHostAddress(int networkType, byte[] hostAddress,
1605 String packageName) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001606 enforceChangePermission();
Robert Greenwalt50393202011-06-21 17:26:14 -07001607 if (mProtectedNetworks.contains(networkType)) {
1608 enforceConnectivityInternalPermission();
1609 }
Chad Brubaker74f99a42014-03-13 18:18:40 +00001610 boolean exempt;
1611 InetAddress addr;
1612 try {
1613 addr = InetAddress.getByAddress(hostAddress);
1614 } catch (UnknownHostException e) {
1615 if (DBG) log("requestRouteToHostAddress got " + e.toString());
1616 return false;
1617 }
1618 // System apps may request routes bypassing the VPN to keep other networks working.
1619 if (Binder.getCallingUid() == Process.SYSTEM_UID) {
1620 exempt = true;
1621 } else {
1622 mAppOpsManager.checkPackage(Binder.getCallingUid(), packageName);
1623 try {
1624 ApplicationInfo info = mContext.getPackageManager().getApplicationInfo(packageName,
1625 0);
1626 exempt = (info.flags & ApplicationInfo.FLAG_SYSTEM) != 0;
1627 } catch (NameNotFoundException e) {
1628 throw new IllegalArgumentException("Failed to find calling package details", e);
1629 }
1630 }
1631
1632 // Non-exempt routeToHost's can only be added if the host is not covered by the VPN.
1633 // This can be either because the VPN's routes do not cover the destination or a
1634 // system application added an exemption that covers this destination.
1635 if (!exempt && isAddressUnderVpn(addr)) {
1636 return false;
1637 }
Robert Greenwalt50393202011-06-21 17:26:14 -07001638
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001639 if (!ConnectivityManager.isNetworkTypeValid(networkType)) {
Robert Greenwalt8beff952011-12-13 15:26:02 -08001640 if (DBG) log("requestRouteToHostAddress on invalid network: " + networkType);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001641 return false;
1642 }
1643 NetworkStateTracker tracker = mNetTrackers[networkType];
Ken Mixter151d3032013-11-07 22:08:24 -08001644 DetailedState netState = DetailedState.DISCONNECTED;
1645 if (tracker != null) {
1646 netState = tracker.getNetworkInfo().getDetailedState();
1647 }
Robert Greenwalt8206ff32009-09-10 15:06:20 -07001648
Ken Mixter151d3032013-11-07 22:08:24 -08001649 if ((netState != DetailedState.CONNECTED &&
Irfan Sheriffda6da092012-08-16 12:49:23 -07001650 netState != DetailedState.CAPTIVE_PORTAL_CHECK) ||
Robert Greenwalt5154ae762009-10-30 14:17:42 -07001651 tracker.isTeardownRequested()) {
Robert Greenwalt58d4c592011-08-02 17:18:41 -07001652 if (VDBG) {
Wink Savilleab9321d2013-06-29 21:10:57 -07001653 log("requestRouteToHostAddress on down network "
1654 + "(" + networkType + ") - dropped"
1655 + " tracker=" + tracker
1656 + " netState=" + netState
1657 + " isTeardownRequested="
1658 + ((tracker != null) ? tracker.isTeardownRequested() : "tracker:null"));
Robert Greenwalt8206ff32009-09-10 15:06:20 -07001659 }
1660 return false;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001661 }
Robert Greenwalt8beff952011-12-13 15:26:02 -08001662 final long token = Binder.clearCallingIdentity();
Robert Greenwalt47f69fe2010-06-15 15:43:39 -07001663 try {
Robert Greenwalt0a46db52011-07-14 14:28:05 -07001664 LinkProperties lp = tracker.getLinkProperties();
Chad Brubaker74f99a42014-03-13 18:18:40 +00001665 boolean ok = addRouteToAddress(lp, addr, exempt);
Wink Savilleab9321d2013-06-29 21:10:57 -07001666 if (DBG) log("requestRouteToHostAddress ok=" + ok);
1667 return ok;
Robert Greenwalt8beff952011-12-13 15:26:02 -08001668 } finally {
1669 Binder.restoreCallingIdentity(token);
1670 }
Irfan Sheriffd649c122010-06-09 15:39:36 -07001671 }
1672
Chad Brubakerf336d722013-07-15 16:34:04 -07001673 private boolean addRoute(LinkProperties p, RouteInfo r, boolean toDefaultTable,
1674 boolean exempt) {
1675 return modifyRoute(p, r, 0, ADD, toDefaultTable, exempt);
Robert Greenwaltf43396c2011-05-06 17:10:53 -07001676 }
1677
Robert Greenwalt3b28e9a2011-11-02 14:37:19 -07001678 private boolean removeRoute(LinkProperties p, RouteInfo r, boolean toDefaultTable) {
Chad Brubakerf336d722013-07-15 16:34:04 -07001679 return modifyRoute(p, r, 0, REMOVE, toDefaultTable, UNEXEMPT);
Robert Greenwalt0a46db52011-07-14 14:28:05 -07001680 }
1681
Chad Brubakerf336d722013-07-15 16:34:04 -07001682 private boolean addRouteToAddress(LinkProperties lp, InetAddress addr, boolean exempt) {
1683 return modifyRouteToAddress(lp, addr, ADD, TO_DEFAULT_TABLE, exempt);
Robert Greenwaltad55d352011-07-22 11:55:33 -07001684 }
1685
1686 private boolean removeRouteToAddress(LinkProperties lp, InetAddress addr) {
Chad Brubakerf336d722013-07-15 16:34:04 -07001687 return modifyRouteToAddress(lp, addr, REMOVE, TO_DEFAULT_TABLE, UNEXEMPT);
Robert Greenwaltad55d352011-07-22 11:55:33 -07001688 }
1689
Robert Greenwalt3b28e9a2011-11-02 14:37:19 -07001690 private boolean modifyRouteToAddress(LinkProperties lp, InetAddress addr, boolean doAdd,
Chad Brubakerf336d722013-07-15 16:34:04 -07001691 boolean toDefaultTable, boolean exempt) {
Lorenzo Colittif83d90c2013-03-15 13:58:38 +09001692 RouteInfo bestRoute = RouteInfo.selectBestRoute(lp.getAllRoutes(), addr);
Robert Greenwaltad55d352011-07-22 11:55:33 -07001693 if (bestRoute == null) {
Lorenzo Colittif83d90c2013-03-15 13:58:38 +09001694 bestRoute = RouteInfo.makeHostRoute(addr, lp.getInterfaceName());
Robert Greenwaltad55d352011-07-22 11:55:33 -07001695 } else {
Lorenzo Colittif83d90c2013-03-15 13:58:38 +09001696 String iface = bestRoute.getInterface();
Robert Greenwaltad55d352011-07-22 11:55:33 -07001697 if (bestRoute.getGateway().equals(addr)) {
1698 // if there is no better route, add the implied hostroute for our gateway
Lorenzo Colittie1671352013-03-08 12:30:44 -08001699 bestRoute = RouteInfo.makeHostRoute(addr, iface);
Robert Greenwaltad55d352011-07-22 11:55:33 -07001700 } else {
1701 // if we will connect to this through another route, add a direct route
1702 // to it's gateway
Lorenzo Colittie1671352013-03-08 12:30:44 -08001703 bestRoute = RouteInfo.makeHostRoute(addr, bestRoute.getGateway(), iface);
Robert Greenwaltad55d352011-07-22 11:55:33 -07001704 }
1705 }
Chad Brubakerf336d722013-07-15 16:34:04 -07001706 return modifyRoute(lp, bestRoute, 0, doAdd, toDefaultTable, exempt);
Robert Greenwaltad55d352011-07-22 11:55:33 -07001707 }
1708
Lorenzo Colitti2adea7f2013-03-12 07:39:59 +09001709 private boolean modifyRoute(LinkProperties lp, RouteInfo r, int cycleCount, boolean doAdd,
Chad Brubakerf336d722013-07-15 16:34:04 -07001710 boolean toDefaultTable, boolean exempt) {
Lorenzo Colittif83d90c2013-03-15 13:58:38 +09001711 if ((lp == null) || (r == null)) {
1712 if (DBG) log("modifyRoute got unexpected null: " + lp + ", " + r);
Robert Greenwalt8beff952011-12-13 15:26:02 -08001713 return false;
1714 }
Robert Greenwalt0a46db52011-07-14 14:28:05 -07001715
1716 if (cycleCount > MAX_HOSTROUTE_CYCLE_COUNT) {
Robert Greenwalt3b28e9a2011-11-02 14:37:19 -07001717 loge("Error modifying route - too much recursion");
Robert Greenwalt0a46db52011-07-14 14:28:05 -07001718 return false;
1719 }
1720
Lorenzo Colittif83d90c2013-03-15 13:58:38 +09001721 String ifaceName = r.getInterface();
1722 if(ifaceName == null) {
1723 loge("Error modifying route - no interface name");
1724 return false;
1725 }
Robert Greenwaltca441ee2013-04-11 13:48:16 -07001726 if (r.hasGateway()) {
Lorenzo Colittif83d90c2013-03-15 13:58:38 +09001727 RouteInfo bestRoute = RouteInfo.selectBestRoute(lp.getAllRoutes(), r.getGateway());
Robert Greenwalt0a46db52011-07-14 14:28:05 -07001728 if (bestRoute != null) {
Robert Greenwalt476f5522011-07-15 09:45:08 -07001729 if (bestRoute.getGateway().equals(r.getGateway())) {
1730 // if there is no better route, add the implied hostroute for our gateway
Lorenzo Colittie1671352013-03-08 12:30:44 -08001731 bestRoute = RouteInfo.makeHostRoute(r.getGateway(), ifaceName);
Robert Greenwalt476f5522011-07-15 09:45:08 -07001732 } else {
1733 // if we will connect to our gateway through another route, add a direct
1734 // route to it's gateway
Lorenzo Colittie1671352013-03-08 12:30:44 -08001735 bestRoute = RouteInfo.makeHostRoute(r.getGateway(),
1736 bestRoute.getGateway(),
1737 ifaceName);
Robert Greenwalt0a46db52011-07-14 14:28:05 -07001738 }
Chad Brubakerf336d722013-07-15 16:34:04 -07001739 modifyRoute(lp, bestRoute, cycleCount+1, doAdd, toDefaultTable, exempt);
Robert Greenwalt0a46db52011-07-14 14:28:05 -07001740 }
1741 }
1742 if (doAdd) {
Robert Greenwalt58d4c592011-08-02 17:18:41 -07001743 if (VDBG) log("Adding " + r + " for interface " + ifaceName);
Robert Greenwalt0a46db52011-07-14 14:28:05 -07001744 try {
Robert Greenwalt3b28e9a2011-11-02 14:37:19 -07001745 if (toDefaultTable) {
Chad Brubakerf336d722013-07-15 16:34:04 -07001746 synchronized (mRoutesLock) {
1747 // only track default table - only one apps can effect
1748 mAddedRoutes.add(r);
1749 mNetd.addRoute(ifaceName, r);
1750 if (exempt) {
1751 LinkAddress dest = r.getDestination();
1752 if (!mExemptAddresses.contains(dest)) {
1753 mNetd.setHostExemption(dest);
1754 mExemptAddresses.add(dest);
1755 }
1756 }
1757 }
Robert Greenwalt3b28e9a2011-11-02 14:37:19 -07001758 } else {
1759 mNetd.addSecondaryRoute(ifaceName, r);
1760 }
Robert Greenwalt0a46db52011-07-14 14:28:05 -07001761 } catch (Exception e) {
1762 // never crash - catch them all
Robert Greenwalt8beff952011-12-13 15:26:02 -08001763 if (DBG) loge("Exception trying to add a route: " + e);
Robert Greenwalt0a46db52011-07-14 14:28:05 -07001764 return false;
1765 }
1766 } else {
1767 // if we remove this one and there are no more like it, then refcount==0 and
1768 // we can remove it from the table
Robert Greenwalt3b28e9a2011-11-02 14:37:19 -07001769 if (toDefaultTable) {
Chad Brubakerf336d722013-07-15 16:34:04 -07001770 synchronized (mRoutesLock) {
1771 mAddedRoutes.remove(r);
1772 if (mAddedRoutes.contains(r) == false) {
1773 if (VDBG) log("Removing " + r + " for interface " + ifaceName);
1774 try {
1775 mNetd.removeRoute(ifaceName, r);
1776 LinkAddress dest = r.getDestination();
1777 if (mExemptAddresses.contains(dest)) {
1778 mNetd.clearHostExemption(dest);
1779 mExemptAddresses.remove(dest);
1780 }
1781 } catch (Exception e) {
1782 // never crash - catch them all
1783 if (VDBG) loge("Exception trying to remove a route: " + e);
1784 return false;
1785 }
1786 } else {
1787 if (VDBG) log("not removing " + r + " as it's still in use");
Robert Greenwalt3b28e9a2011-11-02 14:37:19 -07001788 }
Robert Greenwalt3b28e9a2011-11-02 14:37:19 -07001789 }
1790 } else {
Robert Greenwalt58d4c592011-08-02 17:18:41 -07001791 if (VDBG) log("Removing " + r + " for interface " + ifaceName);
Robert Greenwalt0a46db52011-07-14 14:28:05 -07001792 try {
Robert Greenwalt3b28e9a2011-11-02 14:37:19 -07001793 mNetd.removeSecondaryRoute(ifaceName, r);
Robert Greenwalt0a46db52011-07-14 14:28:05 -07001794 } catch (Exception e) {
1795 // never crash - catch them all
Robert Greenwalt2473a4ba2012-04-23 18:00:37 -07001796 if (VDBG) loge("Exception trying to remove a route: " + e);
Robert Greenwalt0a46db52011-07-14 14:28:05 -07001797 return false;
1798 }
Robert Greenwalt0a46db52011-07-14 14:28:05 -07001799 }
1800 }
1801 return true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001802 }
1803
1804 /**
Robert Greenwaltc03fa502010-02-23 18:58:05 -08001805 * @see ConnectivityManager#getMobileDataEnabled()
1806 */
1807 public boolean getMobileDataEnabled() {
Wink Savillee7982682010-12-07 10:31:02 -08001808 // TODO: This detail should probably be in DataConnectionTracker's
1809 // which is where we store the value and maybe make this
1810 // asynchronous.
Robert Greenwaltc03fa502010-02-23 18:58:05 -08001811 enforceAccessPermission();
Jeff Sharkeybdfce2e2012-09-26 15:54:06 -07001812 boolean retVal = Settings.Global.getInt(mContext.getContentResolver(),
1813 Settings.Global.MOBILE_DATA, 1) == 1;
Robert Greenwalt58d4c592011-08-02 17:18:41 -07001814 if (VDBG) log("getMobileDataEnabled returning " + retVal);
Robert Greenwaltc03fa502010-02-23 18:58:05 -08001815 return retVal;
1816 }
1817
Robert Greenwaltd55a6b42011-03-25 13:09:25 -07001818 public void setDataDependency(int networkType, boolean met) {
Robert Greenwalt50393202011-06-21 17:26:14 -07001819 enforceConnectivityInternalPermission();
1820
Robert Greenwaltd55a6b42011-03-25 13:09:25 -07001821 mHandler.sendMessage(mHandler.obtainMessage(EVENT_SET_DEPENDENCY_MET,
1822 (met ? ENABLED : DISABLED), networkType));
1823 }
1824
1825 private void handleSetDependencyMet(int networkType, boolean met) {
1826 if (mNetTrackers[networkType] != null) {
1827 if (DBG) {
1828 log("handleSetDependencyMet(" + networkType + ", " + met + ")");
1829 }
1830 mNetTrackers[networkType].setDependencyMet(met);
1831 }
1832 }
1833
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -07001834 private INetworkPolicyListener mPolicyListener = new INetworkPolicyListener.Stub() {
1835 @Override
Jeff Sharkeyfdfef572011-06-16 15:07:48 -07001836 public void onUidRulesChanged(int uid, int uidRules) {
Jeff Sharkey1f8ea2d2012-02-07 12:05:43 -08001837 // caller is NPMS, since we only register with them
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -07001838 if (LOGD_RULES) {
Robert Greenwalt58d4c592011-08-02 17:18:41 -07001839 log("onUidRulesChanged(uid=" + uid + ", uidRules=" + uidRules + ")");
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -07001840 }
1841
Jeff Sharkeyfdfef572011-06-16 15:07:48 -07001842 synchronized (mRulesLock) {
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -07001843 // skip update when we've already applied rules
1844 final int oldRules = mUidRules.get(uid, RULE_ALLOW_ALL);
1845 if (oldRules == uidRules) return;
1846
1847 mUidRules.put(uid, uidRules);
1848 }
1849
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -07001850 // TODO: notify UID when it has requested targeted updates
1851 }
Jeff Sharkeyfdfef572011-06-16 15:07:48 -07001852
1853 @Override
1854 public void onMeteredIfacesChanged(String[] meteredIfaces) {
Jeff Sharkey1f8ea2d2012-02-07 12:05:43 -08001855 // caller is NPMS, since we only register with them
Jeff Sharkeyfdfef572011-06-16 15:07:48 -07001856 if (LOGD_RULES) {
Robert Greenwalt58d4c592011-08-02 17:18:41 -07001857 log("onMeteredIfacesChanged(ifaces=" + Arrays.toString(meteredIfaces) + ")");
Jeff Sharkeyfdfef572011-06-16 15:07:48 -07001858 }
1859
1860 synchronized (mRulesLock) {
1861 mMeteredIfaces.clear();
1862 for (String iface : meteredIfaces) {
1863 mMeteredIfaces.add(iface);
1864 }
1865 }
1866 }
Jeff Sharkey1f8ea2d2012-02-07 12:05:43 -08001867
1868 @Override
1869 public void onRestrictBackgroundChanged(boolean restrictBackground) {
1870 // caller is NPMS, since we only register with them
1871 if (LOGD_RULES) {
1872 log("onRestrictBackgroundChanged(restrictBackground=" + restrictBackground + ")");
1873 }
1874
1875 // kick off connectivity change broadcast for active network, since
1876 // global background policy change is radical.
1877 final int networkType = mActiveDefaultNetwork;
1878 if (isNetworkTypeValid(networkType)) {
1879 final NetworkStateTracker tracker = mNetTrackers[networkType];
1880 if (tracker != null) {
1881 final NetworkInfo info = tracker.getNetworkInfo();
1882 if (info != null && info.isConnected()) {
1883 sendConnectedBroadcast(info);
1884 }
1885 }
1886 }
1887 }
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -07001888 };
1889
Robert Greenwaltc03fa502010-02-23 18:58:05 -08001890 /**
1891 * @see ConnectivityManager#setMobileDataEnabled(boolean)
1892 */
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07001893 public void setMobileDataEnabled(boolean enabled) {
Robert Greenwaltc03fa502010-02-23 18:58:05 -08001894 enforceChangePermission();
Wink Savilleed9c02b2010-12-03 12:01:38 -08001895 if (DBG) log("setMobileDataEnabled(" + enabled + ")");
Robert Greenwaltc03fa502010-02-23 18:58:05 -08001896
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07001897 mHandler.sendMessage(mHandler.obtainMessage(EVENT_SET_MOBILE_DATA,
Robert Greenwaltd55a6b42011-03-25 13:09:25 -07001898 (enabled ? ENABLED : DISABLED), 0));
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07001899 }
1900
1901 private void handleSetMobileData(boolean enabled) {
Wink Savillee7982682010-12-07 10:31:02 -08001902 if (mNetTrackers[ConnectivityManager.TYPE_MOBILE] != null) {
Robert Greenwalt58d4c592011-08-02 17:18:41 -07001903 if (VDBG) {
1904 log(mNetTrackers[ConnectivityManager.TYPE_MOBILE].toString() + enabled);
Robert Greenwaltc03fa502010-02-23 18:58:05 -08001905 }
Jeff Sharkey8e28b7d2011-08-19 02:24:24 -07001906 mNetTrackers[ConnectivityManager.TYPE_MOBILE].setUserDataEnable(enabled);
1907 }
tk.munb97d34c2012-01-06 10:43:52 +09001908 if (mNetTrackers[ConnectivityManager.TYPE_WIMAX] != null) {
1909 if (VDBG) {
1910 log(mNetTrackers[ConnectivityManager.TYPE_WIMAX].toString() + enabled);
1911 }
1912 mNetTrackers[ConnectivityManager.TYPE_WIMAX].setUserDataEnable(enabled);
1913 }
Jeff Sharkey8e28b7d2011-08-19 02:24:24 -07001914 }
1915
1916 @Override
1917 public void setPolicyDataEnable(int networkType, boolean enabled) {
1918 // only someone like NPMS should only be calling us
1919 mContext.enforceCallingOrSelfPermission(MANAGE_NETWORK_POLICY, TAG);
1920
1921 mHandler.sendMessage(mHandler.obtainMessage(
1922 EVENT_SET_POLICY_DATA_ENABLE, networkType, (enabled ? ENABLED : DISABLED)));
1923 }
1924
1925 private void handleSetPolicyDataEnable(int networkType, boolean enabled) {
1926 if (isNetworkTypeValid(networkType)) {
1927 final NetworkStateTracker tracker = mNetTrackers[networkType];
1928 if (tracker != null) {
1929 tracker.setPolicyDataEnable(enabled);
1930 }
Robert Greenwaltc03fa502010-02-23 18:58:05 -08001931 }
1932 }
1933
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001934 private void enforceAccessPermission() {
Robert Greenwalt86e9e552009-07-16 17:21:39 -07001935 mContext.enforceCallingOrSelfPermission(
1936 android.Manifest.permission.ACCESS_NETWORK_STATE,
1937 "ConnectivityService");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001938 }
1939
1940 private void enforceChangePermission() {
Robert Greenwalt86e9e552009-07-16 17:21:39 -07001941 mContext.enforceCallingOrSelfPermission(
1942 android.Manifest.permission.CHANGE_NETWORK_STATE,
1943 "ConnectivityService");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001944 }
1945
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08001946 // TODO Make this a special check when it goes public
1947 private void enforceTetherChangePermission() {
1948 mContext.enforceCallingOrSelfPermission(
1949 android.Manifest.permission.CHANGE_NETWORK_STATE,
1950 "ConnectivityService");
1951 }
1952
Robert Greenwalt2a091d72010-02-11 18:18:40 -08001953 private void enforceTetherAccessPermission() {
1954 mContext.enforceCallingOrSelfPermission(
1955 android.Manifest.permission.ACCESS_NETWORK_STATE,
1956 "ConnectivityService");
1957 }
1958
Robert Greenwalt14f2ef42010-06-15 12:19:37 -07001959 private void enforceConnectivityInternalPermission() {
1960 mContext.enforceCallingOrSelfPermission(
1961 android.Manifest.permission.CONNECTIVITY_INTERNAL,
1962 "ConnectivityService");
1963 }
1964
Chad Brubakerd475c702013-07-11 13:29:30 -07001965 private void enforceMarkNetworkSocketPermission() {
1966 //Media server special case
1967 if (Binder.getCallingUid() == Process.MEDIA_UID) {
1968 return;
1969 }
1970 mContext.enforceCallingOrSelfPermission(
1971 android.Manifest.permission.MARK_NETWORK_SOCKET,
1972 "ConnectivityService");
1973 }
1974
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001975 /**
Robert Greenwalt86e9e552009-07-16 17:21:39 -07001976 * Handle a {@code DISCONNECTED} event. If this pertains to the non-active
1977 * network, we ignore it. If it is for the active network, we send out a
1978 * broadcast. But first, we check whether it might be possible to connect
1979 * to a different network.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001980 * @param info the {@code NetworkInfo} for the network
1981 */
1982 private void handleDisconnect(NetworkInfo info) {
1983
Robert Greenwalt42acef32009-08-12 16:08:25 -07001984 int prevNetType = info.getType();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001985
Robert Greenwalt42acef32009-08-12 16:08:25 -07001986 mNetTrackers[prevNetType].setTeardownRequested(false);
Haoyu Bai04124232012-06-28 15:26:19 -07001987
1988 // Remove idletimer previously setup in {@code handleConnect}
1989 removeDataActivityTracking(prevNetType);
1990
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001991 /*
1992 * If the disconnected network is not the active one, then don't report
1993 * this as a loss of connectivity. What probably happened is that we're
1994 * getting the disconnect for a network that we explicitly disabled
1995 * in accordance with network preference policies.
1996 */
Robert Greenwaltd55a6b42011-03-25 13:09:25 -07001997 if (!mNetConfigs[prevNetType].isDefault()) {
Mattias Falk8b47b362011-08-23 14:15:13 +02001998 List<Integer> pids = mNetRequestersPids[prevNetType];
1999 for (Integer pid : pids) {
Robert Greenwalt42acef32009-08-12 16:08:25 -07002000 // will remove them because the net's no longer connected
2001 // need to do this now as only now do we know the pids and
2002 // can properly null things that are no longer referenced.
2003 reassessPidDns(pid.intValue(), false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002004 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002005 }
2006
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002007 Intent intent = new Intent(ConnectivityManager.CONNECTIVITY_ACTION);
Irfan Sheriff9538bdd2012-09-20 09:32:41 -07002008 intent.putExtra(ConnectivityManager.EXTRA_NETWORK_INFO, new NetworkInfo(info));
Jeff Sharkey75fbb4b2012-08-06 11:41:50 -07002009 intent.putExtra(ConnectivityManager.EXTRA_NETWORK_TYPE, info.getType());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002010 if (info.isFailover()) {
2011 intent.putExtra(ConnectivityManager.EXTRA_IS_FAILOVER, true);
2012 info.setFailover(false);
2013 }
2014 if (info.getReason() != null) {
2015 intent.putExtra(ConnectivityManager.EXTRA_REASON, info.getReason());
2016 }
2017 if (info.getExtraInfo() != null) {
Robert Greenwalt86e9e552009-07-16 17:21:39 -07002018 intent.putExtra(ConnectivityManager.EXTRA_EXTRA_INFO,
2019 info.getExtraInfo());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002020 }
Robert Greenwalt42acef32009-08-12 16:08:25 -07002021
Robert Greenwaltd55a6b42011-03-25 13:09:25 -07002022 if (mNetConfigs[prevNetType].isDefault()) {
Robert Greenwaltf21ef7d2011-01-11 13:56:33 -08002023 tryFailover(prevNetType);
2024 if (mActiveDefaultNetwork != -1) {
2025 NetworkInfo switchTo = mNetTrackers[mActiveDefaultNetwork].getNetworkInfo();
Robert Greenwaltcc4b4012010-01-25 17:54:29 -08002026 intent.putExtra(ConnectivityManager.EXTRA_OTHER_NETWORK_INFO, switchTo);
2027 } else {
Robert Greenwalt029be812010-09-20 18:01:43 -07002028 mDefaultInetConditionPublished = 0; // we're not connected anymore
Robert Greenwaltcc4b4012010-01-25 17:54:29 -08002029 intent.putExtra(ConnectivityManager.EXTRA_NO_CONNECTIVITY, true);
2030 }
Robert Greenwaltda03c4e2010-01-20 19:29:41 -08002031 }
Robert Greenwalt029be812010-09-20 18:01:43 -07002032 intent.putExtra(ConnectivityManager.EXTRA_INET_CONDITION, mDefaultInetConditionPublished);
Robert Greenwaltec896c62011-06-15 12:22:07 -07002033
2034 // Reset interface if no other connections are using the same interface
2035 boolean doReset = true;
2036 LinkProperties linkProperties = mNetTrackers[prevNetType].getLinkProperties();
2037 if (linkProperties != null) {
2038 String oldIface = linkProperties.getInterfaceName();
2039 if (TextUtils.isEmpty(oldIface) == false) {
2040 for (NetworkStateTracker networkStateTracker : mNetTrackers) {
2041 if (networkStateTracker == null) continue;
2042 NetworkInfo networkInfo = networkStateTracker.getNetworkInfo();
2043 if (networkInfo.isConnected() && networkInfo.getType() != prevNetType) {
2044 LinkProperties l = networkStateTracker.getLinkProperties();
2045 if (l == null) continue;
2046 if (oldIface.equals(l.getInterfaceName())) {
2047 doReset = false;
2048 break;
2049 }
2050 }
2051 }
2052 }
2053 }
2054
Robert Greenwaltda03c4e2010-01-20 19:29:41 -08002055 // do this before we broadcast the change
Robert Greenwaltec896c62011-06-15 12:22:07 -07002056 handleConnectivityChange(prevNetType, doReset);
Robert Greenwaltda03c4e2010-01-20 19:29:41 -08002057
Jeff Sharkey961e3042011-08-29 16:02:57 -07002058 final Intent immediateIntent = new Intent(intent);
2059 immediateIntent.setAction(CONNECTIVITY_ACTION_IMMEDIATE);
2060 sendStickyBroadcast(immediateIntent);
Wink Saville628b0852011-08-04 15:01:58 -07002061 sendStickyBroadcastDelayed(intent, getConnectivityChangeDelay());
Robert Greenwaltda03c4e2010-01-20 19:29:41 -08002062 /*
2063 * If the failover network is already connected, then immediately send
2064 * out a followup broadcast indicating successful failover
2065 */
Robert Greenwaltf21ef7d2011-01-11 13:56:33 -08002066 if (mActiveDefaultNetwork != -1) {
Wink Saville628b0852011-08-04 15:01:58 -07002067 sendConnectedBroadcastDelayed(mNetTrackers[mActiveDefaultNetwork].getNetworkInfo(),
2068 getConnectivityChangeDelay());
Robert Greenwaltda03c4e2010-01-20 19:29:41 -08002069 }
2070 }
2071
Robert Greenwaltf21ef7d2011-01-11 13:56:33 -08002072 private void tryFailover(int prevNetType) {
Robert Greenwalt42acef32009-08-12 16:08:25 -07002073 /*
Robert Greenwaltbff90182011-01-06 15:41:07 -08002074 * If this is a default network, check if other defaults are available.
2075 * Try to reconnect on all available and let them hash it out when
2076 * more than one connects.
Robert Greenwalt42acef32009-08-12 16:08:25 -07002077 */
Robert Greenwaltd55a6b42011-03-25 13:09:25 -07002078 if (mNetConfigs[prevNetType].isDefault()) {
Robert Greenwalt42acef32009-08-12 16:08:25 -07002079 if (mActiveDefaultNetwork == prevNetType) {
Wink Saville948282b2013-08-29 08:55:16 -07002080 if (DBG) {
2081 log("tryFailover: set mActiveDefaultNetwork=-1, prevNetType=" + prevNetType);
2082 }
Robert Greenwalt42acef32009-08-12 16:08:25 -07002083 mActiveDefaultNetwork = -1;
2084 }
2085
Robert Greenwaltf21ef7d2011-01-11 13:56:33 -08002086 // don't signal a reconnect for anything lower or equal priority than our
2087 // current connected default
2088 // TODO - don't filter by priority now - nice optimization but risky
2089// int currentPriority = -1;
2090// if (mActiveDefaultNetwork != -1) {
Robert Greenwaltd55a6b42011-03-25 13:09:25 -07002091// currentPriority = mNetConfigs[mActiveDefaultNetwork].mPriority;
Robert Greenwaltf21ef7d2011-01-11 13:56:33 -08002092// }
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -07002093
Robert Greenwaltda03c4e2010-01-20 19:29:41 -08002094 for (int checkType=0; checkType <= ConnectivityManager.MAX_NETWORK_TYPE; checkType++) {
Robert Greenwalt5154ae762009-10-30 14:17:42 -07002095 if (checkType == prevNetType) continue;
Robert Greenwaltd55a6b42011-03-25 13:09:25 -07002096 if (mNetConfigs[checkType] == null) continue;
2097 if (!mNetConfigs[checkType].isDefault()) continue;
Robert Greenwalt424781e2011-11-11 09:56:03 -08002098 if (mNetTrackers[checkType] == null) continue;
Wink Saville9f7a0b22011-01-26 15:43:49 -08002099
2100// Enabling the isAvailable() optimization caused mobile to not get
2101// selected if it was in the middle of error handling. Specifically
2102// a moble connection that took 30 seconds to complete the DEACTIVATE_DATA_CALL
2103// would not be available and we wouldn't get connected to anything.
2104// So removing the isAvailable() optimization below for now. TODO: This
2105// optimization should work and we need to investigate why it doesn't work.
2106// This could be related to how DEACTIVATE_DATA_CALL is reporting its
2107// complete before it is really complete.
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -07002108
Wink Saville9f7a0b22011-01-26 15:43:49 -08002109// if (!mNetTrackers[checkType].isAvailable()) continue;
2110
Robert Greenwaltd55a6b42011-03-25 13:09:25 -07002111// if (currentPriority >= mNetConfigs[checkType].mPriority) continue;
Robert Greenwalt42acef32009-08-12 16:08:25 -07002112
Robert Greenwaltf21ef7d2011-01-11 13:56:33 -08002113 NetworkStateTracker checkTracker = mNetTrackers[checkType];
2114 NetworkInfo checkInfo = checkTracker.getNetworkInfo();
2115 if (!checkInfo.isConnectedOrConnecting() || checkTracker.isTeardownRequested()) {
2116 checkInfo.setFailover(true);
2117 checkTracker.reconnect();
Robert Greenwalt42acef32009-08-12 16:08:25 -07002118 }
Robert Greenwaltf21ef7d2011-01-11 13:56:33 -08002119 if (DBG) log("Attempting to switch to " + checkInfo.getTypeName());
Robert Greenwalt42acef32009-08-12 16:08:25 -07002120 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002121 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002122 }
2123
Jeff Sharkey69ddab42012-08-25 00:05:46 -07002124 public void sendConnectedBroadcast(NetworkInfo info) {
Robert Greenwalt5a6bdc42013-02-15 10:56:35 -08002125 enforceConnectivityInternalPermission();
Jeff Sharkey961e3042011-08-29 16:02:57 -07002126 sendGeneralBroadcast(info, CONNECTIVITY_ACTION_IMMEDIATE);
2127 sendGeneralBroadcast(info, CONNECTIVITY_ACTION);
Robert Greenwalt1e9aac22010-09-15 17:36:33 -07002128 }
2129
Wink Saville628b0852011-08-04 15:01:58 -07002130 private void sendConnectedBroadcastDelayed(NetworkInfo info, int delayMs) {
Jeff Sharkey961e3042011-08-29 16:02:57 -07002131 sendGeneralBroadcast(info, CONNECTIVITY_ACTION_IMMEDIATE);
2132 sendGeneralBroadcastDelayed(info, CONNECTIVITY_ACTION, delayMs);
Wink Saville628b0852011-08-04 15:01:58 -07002133 }
2134
Robert Greenwalt1e9aac22010-09-15 17:36:33 -07002135 private void sendInetConditionBroadcast(NetworkInfo info) {
2136 sendGeneralBroadcast(info, ConnectivityManager.INET_CONDITION_ACTION);
2137 }
2138
Wink Saville628b0852011-08-04 15:01:58 -07002139 private Intent makeGeneralIntent(NetworkInfo info, String bcastType) {
Jeff Sharkey69ddab42012-08-25 00:05:46 -07002140 if (mLockdownTracker != null) {
2141 info = mLockdownTracker.augmentNetworkInfo(info);
2142 }
2143
Robert Greenwalt1e9aac22010-09-15 17:36:33 -07002144 Intent intent = new Intent(bcastType);
Irfan Sheriff9538bdd2012-09-20 09:32:41 -07002145 intent.putExtra(ConnectivityManager.EXTRA_NETWORK_INFO, new NetworkInfo(info));
Jeff Sharkey75fbb4b2012-08-06 11:41:50 -07002146 intent.putExtra(ConnectivityManager.EXTRA_NETWORK_TYPE, info.getType());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002147 if (info.isFailover()) {
2148 intent.putExtra(ConnectivityManager.EXTRA_IS_FAILOVER, true);
2149 info.setFailover(false);
2150 }
2151 if (info.getReason() != null) {
2152 intent.putExtra(ConnectivityManager.EXTRA_REASON, info.getReason());
2153 }
2154 if (info.getExtraInfo() != null) {
Robert Greenwalt86e9e552009-07-16 17:21:39 -07002155 intent.putExtra(ConnectivityManager.EXTRA_EXTRA_INFO,
2156 info.getExtraInfo());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002157 }
Robert Greenwaltd7085fc2010-09-08 15:24:47 -07002158 intent.putExtra(ConnectivityManager.EXTRA_INET_CONDITION, mDefaultInetConditionPublished);
Wink Saville628b0852011-08-04 15:01:58 -07002159 return intent;
2160 }
2161
2162 private void sendGeneralBroadcast(NetworkInfo info, String bcastType) {
2163 sendStickyBroadcast(makeGeneralIntent(info, bcastType));
2164 }
2165
2166 private void sendGeneralBroadcastDelayed(NetworkInfo info, String bcastType, int delayMs) {
2167 sendStickyBroadcastDelayed(makeGeneralIntent(info, bcastType), delayMs);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002168 }
2169
Haoyu Baidb3c8672012-06-20 14:29:57 -07002170 private void sendDataActivityBroadcast(int deviceType, boolean active) {
2171 Intent intent = new Intent(ConnectivityManager.ACTION_DATA_ACTIVITY_CHANGE);
2172 intent.putExtra(ConnectivityManager.EXTRA_DEVICE_TYPE, deviceType);
2173 intent.putExtra(ConnectivityManager.EXTRA_IS_ACTIVE, active);
Dianne Hackbornfd8bf5c2012-09-04 18:48:37 -07002174 final long ident = Binder.clearCallingIdentity();
2175 try {
2176 mContext.sendOrderedBroadcastAsUser(intent, UserHandle.ALL,
2177 RECEIVE_DATA_ACTIVITY_CHANGE, null, null, 0, null, null);
2178 } finally {
2179 Binder.restoreCallingIdentity(ident);
2180 }
Haoyu Baidb3c8672012-06-20 14:29:57 -07002181 }
2182
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002183 /**
2184 * Called when an attempt to fail over to another network has failed.
2185 * @param info the {@link NetworkInfo} for the failed network
2186 */
2187 private void handleConnectionFailure(NetworkInfo info) {
2188 mNetTrackers[info.getType()].setTeardownRequested(false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002189
Robert Greenwalt42acef32009-08-12 16:08:25 -07002190 String reason = info.getReason();
2191 String extraInfo = info.getExtraInfo();
Robert Greenwalt86e9e552009-07-16 17:21:39 -07002192
Robert Greenwalt572172b2010-10-08 16:35:52 -07002193 String reasonText;
2194 if (reason == null) {
2195 reasonText = ".";
2196 } else {
2197 reasonText = " (" + reason + ").";
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002198 }
Wink Savilleed9c02b2010-12-03 12:01:38 -08002199 loge("Attempt to connect to " + info.getTypeName() + " failed" + reasonText);
Robert Greenwalt42acef32009-08-12 16:08:25 -07002200
2201 Intent intent = new Intent(ConnectivityManager.CONNECTIVITY_ACTION);
Irfan Sheriff9538bdd2012-09-20 09:32:41 -07002202 intent.putExtra(ConnectivityManager.EXTRA_NETWORK_INFO, new NetworkInfo(info));
Jeff Sharkey75fbb4b2012-08-06 11:41:50 -07002203 intent.putExtra(ConnectivityManager.EXTRA_NETWORK_TYPE, info.getType());
Robert Greenwalt42acef32009-08-12 16:08:25 -07002204 if (getActiveNetworkInfo() == null) {
2205 intent.putExtra(ConnectivityManager.EXTRA_NO_CONNECTIVITY, true);
2206 }
2207 if (reason != null) {
2208 intent.putExtra(ConnectivityManager.EXTRA_REASON, reason);
2209 }
2210 if (extraInfo != null) {
2211 intent.putExtra(ConnectivityManager.EXTRA_EXTRA_INFO, extraInfo);
2212 }
2213 if (info.isFailover()) {
2214 intent.putExtra(ConnectivityManager.EXTRA_IS_FAILOVER, true);
2215 info.setFailover(false);
2216 }
Robert Greenwaltda03c4e2010-01-20 19:29:41 -08002217
Robert Greenwaltd55a6b42011-03-25 13:09:25 -07002218 if (mNetConfigs[info.getType()].isDefault()) {
Robert Greenwaltf21ef7d2011-01-11 13:56:33 -08002219 tryFailover(info.getType());
2220 if (mActiveDefaultNetwork != -1) {
2221 NetworkInfo switchTo = mNetTrackers[mActiveDefaultNetwork].getNetworkInfo();
Robert Greenwaltcc4b4012010-01-25 17:54:29 -08002222 intent.putExtra(ConnectivityManager.EXTRA_OTHER_NETWORK_INFO, switchTo);
2223 } else {
Robert Greenwalt029be812010-09-20 18:01:43 -07002224 mDefaultInetConditionPublished = 0;
Robert Greenwaltcc4b4012010-01-25 17:54:29 -08002225 intent.putExtra(ConnectivityManager.EXTRA_NO_CONNECTIVITY, true);
2226 }
Robert Greenwaltda03c4e2010-01-20 19:29:41 -08002227 }
Robert Greenwaltcc4b4012010-01-25 17:54:29 -08002228
Robert Greenwalt029be812010-09-20 18:01:43 -07002229 intent.putExtra(ConnectivityManager.EXTRA_INET_CONDITION, mDefaultInetConditionPublished);
Jeff Sharkey961e3042011-08-29 16:02:57 -07002230
2231 final Intent immediateIntent = new Intent(intent);
2232 immediateIntent.setAction(CONNECTIVITY_ACTION_IMMEDIATE);
2233 sendStickyBroadcast(immediateIntent);
Mike Lockwood0f79b542009-08-14 14:18:49 -04002234 sendStickyBroadcast(intent);
Robert Greenwaltda03c4e2010-01-20 19:29:41 -08002235 /*
2236 * If the failover network is already connected, then immediately send
2237 * out a followup broadcast indicating successful failover
2238 */
Robert Greenwaltf21ef7d2011-01-11 13:56:33 -08002239 if (mActiveDefaultNetwork != -1) {
2240 sendConnectedBroadcast(mNetTrackers[mActiveDefaultNetwork].getNetworkInfo());
Robert Greenwaltda03c4e2010-01-20 19:29:41 -08002241 }
Mike Lockwood0f79b542009-08-14 14:18:49 -04002242 }
2243
2244 private void sendStickyBroadcast(Intent intent) {
2245 synchronized(this) {
Dianne Hackborn1c633fc2009-12-08 19:45:14 -08002246 if (!mSystemReady) {
2247 mInitialBroadcast = new Intent(intent);
Mike Lockwood0f79b542009-08-14 14:18:49 -04002248 }
Dianne Hackborn1c633fc2009-12-08 19:45:14 -08002249 intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY_BEFORE_BOOT);
Wink Savillec9acde92011-09-21 11:05:43 -07002250 if (VDBG) {
Jeff Sharkey961e3042011-08-29 16:02:57 -07002251 log("sendStickyBroadcast: action=" + intent.getAction());
Wink Saville628b0852011-08-04 15:01:58 -07002252 }
2253
Dianne Hackbornfd8bf5c2012-09-04 18:48:37 -07002254 final long ident = Binder.clearCallingIdentity();
2255 try {
2256 mContext.sendStickyBroadcastAsUser(intent, UserHandle.ALL);
2257 } finally {
2258 Binder.restoreCallingIdentity(ident);
2259 }
Mike Lockwood0f79b542009-08-14 14:18:49 -04002260 }
2261 }
2262
Wink Saville628b0852011-08-04 15:01:58 -07002263 private void sendStickyBroadcastDelayed(Intent intent, int delayMs) {
2264 if (delayMs <= 0) {
2265 sendStickyBroadcast(intent);
2266 } else {
Wink Savillec9acde92011-09-21 11:05:43 -07002267 if (VDBG) {
Jeff Sharkey961e3042011-08-29 16:02:57 -07002268 log("sendStickyBroadcastDelayed: delayMs=" + delayMs + ", action="
2269 + intent.getAction());
2270 }
Wink Saville628b0852011-08-04 15:01:58 -07002271 mHandler.sendMessageDelayed(mHandler.obtainMessage(
2272 EVENT_SEND_STICKY_BROADCAST_INTENT, intent), delayMs);
2273 }
2274 }
2275
Mike Lockwood0f79b542009-08-14 14:18:49 -04002276 void systemReady() {
Wink Saville948282b2013-08-29 08:55:16 -07002277 mCaptivePortalTracker = CaptivePortalTracker.makeCaptivePortalTracker(mContext, this);
2278 loadGlobalProxy();
2279
Mike Lockwood0f79b542009-08-14 14:18:49 -04002280 synchronized(this) {
2281 mSystemReady = true;
Dianne Hackborn1c633fc2009-12-08 19:45:14 -08002282 if (mInitialBroadcast != null) {
Dianne Hackborn5ac72a22012-08-29 18:32:08 -07002283 mContext.sendStickyBroadcastAsUser(mInitialBroadcast, UserHandle.ALL);
Dianne Hackborn1c633fc2009-12-08 19:45:14 -08002284 mInitialBroadcast = null;
Mike Lockwood0f79b542009-08-14 14:18:49 -04002285 }
2286 }
Robert Greenwalt434203a2010-10-11 16:00:27 -07002287 // load the global proxy at startup
2288 mHandler.sendMessage(mHandler.obtainMessage(EVENT_APPLY_GLOBAL_HTTP_PROXY));
Jeff Sharkey69ddab42012-08-25 00:05:46 -07002289
2290 // Try bringing up tracker, but if KeyStore isn't ready yet, wait
2291 // for user to unlock device.
2292 if (!updateLockdownVpn()) {
2293 final IntentFilter filter = new IntentFilter(Intent.ACTION_USER_PRESENT);
2294 mContext.registerReceiver(mUserPresentReceiver, filter);
2295 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002296 }
2297
Jeff Sharkey69ddab42012-08-25 00:05:46 -07002298 private BroadcastReceiver mUserPresentReceiver = new BroadcastReceiver() {
2299 @Override
2300 public void onReceive(Context context, Intent intent) {
2301 // Try creating lockdown tracker, since user present usually means
2302 // unlocked keystore.
2303 if (updateLockdownVpn()) {
2304 mContext.unregisterReceiver(this);
2305 }
2306 }
2307 };
2308
Irfan Sheriffda6da092012-08-16 12:49:23 -07002309 private boolean isNewNetTypePreferredOverCurrentNetType(int type) {
Wink Saville948282b2013-08-29 08:55:16 -07002310 if (((type != mNetworkPreference)
2311 && (mNetConfigs[mActiveDefaultNetwork].priority > mNetConfigs[type].priority))
2312 || (mNetworkPreference == mActiveDefaultNetwork)) {
2313 return false;
2314 }
Irfan Sheriffda6da092012-08-16 12:49:23 -07002315 return true;
2316 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002317
Irfan Sheriffda6da092012-08-16 12:49:23 -07002318 private void handleConnect(NetworkInfo info) {
2319 final int newNetType = info.getType();
2320
2321 setupDataActivityTracking(newNetType);
Haoyu Bai04124232012-06-28 15:26:19 -07002322
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002323 // snapshot isFailover, because sendConnectedBroadcast() resets it
2324 boolean isFailover = info.isFailover();
Irfan Sheriffda6da092012-08-16 12:49:23 -07002325 final NetworkStateTracker thisNet = mNetTrackers[newNetType];
Jeff Sharkeyfb878b62012-07-26 18:32:30 -07002326 final String thisIface = thisNet.getLinkProperties().getInterfaceName();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002327
Wink Saville948282b2013-08-29 08:55:16 -07002328 if (VDBG) {
2329 log("handleConnect: E newNetType=" + newNetType + " thisIface=" + thisIface
2330 + " isFailover" + isFailover);
2331 }
2332
Robert Greenwalt42acef32009-08-12 16:08:25 -07002333 // if this is a default net and other default is running
2334 // kill the one not preferred
Irfan Sheriffda6da092012-08-16 12:49:23 -07002335 if (mNetConfigs[newNetType].isDefault()) {
2336 if (mActiveDefaultNetwork != -1 && mActiveDefaultNetwork != newNetType) {
2337 if (isNewNetTypePreferredOverCurrentNetType(newNetType)) {
Robert Greenwalt42acef32009-08-12 16:08:25 -07002338 // tear down the other
2339 NetworkStateTracker otherNet =
2340 mNetTrackers[mActiveDefaultNetwork];
Wink Savilleed9c02b2010-12-03 12:01:38 -08002341 if (DBG) {
2342 log("Policy requires " + otherNet.getNetworkInfo().getTypeName() +
Robert Greenwalt42acef32009-08-12 16:08:25 -07002343 " teardown");
Wink Savilleed9c02b2010-12-03 12:01:38 -08002344 }
Robert Greenwalt42acef32009-08-12 16:08:25 -07002345 if (!teardown(otherNet)) {
Wink Savilleed9c02b2010-12-03 12:01:38 -08002346 loge("Network declined teardown request");
Robert Greenwalt27725e82011-03-29 11:36:28 -07002347 teardown(thisNet);
Robert Greenwalt42acef32009-08-12 16:08:25 -07002348 return;
2349 }
Irfan Sheriffda6da092012-08-16 12:49:23 -07002350 } else {
2351 // don't accept this one
2352 if (VDBG) {
2353 log("Not broadcasting CONNECT_ACTION " +
2354 "to torn down network " + info.getTypeName());
2355 }
2356 teardown(thisNet);
2357 return;
Robert Greenwalt14f2ef42010-06-15 12:19:37 -07002358 }
2359 }
2360 synchronized (ConnectivityService.this) {
2361 // have a new default network, release the transition wakelock in a second
2362 // if it's held. The second pause is to allow apps to reconnect over the
2363 // new network
2364 if (mNetTransitionWakeLock.isHeld()) {
2365 mHandler.sendMessageDelayed(mHandler.obtainMessage(
Robert Greenwaltf3331232010-09-24 14:32:21 -07002366 EVENT_CLEAR_NET_TRANSITION_WAKELOCK,
Robert Greenwalt14f2ef42010-06-15 12:19:37 -07002367 mNetTransitionWakeLockSerialNumber, 0),
2368 1000);
Robert Greenwalt42acef32009-08-12 16:08:25 -07002369 }
2370 }
Irfan Sheriffda6da092012-08-16 12:49:23 -07002371 mActiveDefaultNetwork = newNetType;
Robert Greenwaltd7085fc2010-09-08 15:24:47 -07002372 // this will cause us to come up initially as unconnected and switching
2373 // to connected after our normal pause unless somebody reports us as reall
2374 // disconnected
2375 mDefaultInetConditionPublished = 0;
2376 mDefaultConnectionSequence++;
2377 mInetConditionChangeInFlight = false;
2378 // Don't do this - if we never sign in stay, grey
2379 //reportNetworkCondition(mActiveDefaultNetwork, 100);
Robert Greenwalt30a2bc82014-02-28 16:44:00 -08002380 updateNetworkSettings(thisNet);
Robert Greenwalt42acef32009-08-12 16:08:25 -07002381 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002382 thisNet.setTeardownRequested(false);
sy.yun9d9b74a2013-09-02 05:24:09 +09002383 updateMtuSizeSettings(thisNet);
Irfan Sheriffda6da092012-08-16 12:49:23 -07002384 handleConnectivityChange(newNetType, false);
Wink Saville628b0852011-08-04 15:01:58 -07002385 sendConnectedBroadcastDelayed(info, getConnectivityChangeDelay());
Jeff Sharkey1059c3c2011-10-04 16:54:49 -07002386
2387 // notify battery stats service about this network
Jeff Sharkeyfb878b62012-07-26 18:32:30 -07002388 if (thisIface != null) {
Jeff Sharkey1059c3c2011-10-04 16:54:49 -07002389 try {
Irfan Sheriffda6da092012-08-16 12:49:23 -07002390 BatteryStatsService.getService().noteNetworkInterfaceType(thisIface, newNetType);
Jeff Sharkey1059c3c2011-10-04 16:54:49 -07002391 } catch (RemoteException e) {
2392 // ignored; service lives in system_server
2393 }
2394 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002395 }
2396
Irfan Sheriffda6da092012-08-16 12:49:23 -07002397 private void handleCaptivePortalTrackerCheck(NetworkInfo info) {
2398 if (DBG) log("Captive portal check " + info);
2399 int type = info.getType();
2400 final NetworkStateTracker thisNet = mNetTrackers[type];
2401 if (mNetConfigs[type].isDefault()) {
2402 if (mActiveDefaultNetwork != -1 && mActiveDefaultNetwork != type) {
2403 if (isNewNetTypePreferredOverCurrentNetType(type)) {
2404 if (DBG) log("Captive check on " + info.getTypeName());
Irfan Sheriff9538bdd2012-09-20 09:32:41 -07002405 mCaptivePortalTracker.detectCaptivePortal(new NetworkInfo(info));
Irfan Sheriffda6da092012-08-16 12:49:23 -07002406 return;
2407 } else {
2408 if (DBG) log("Tear down low priority net " + info.getTypeName());
2409 teardown(thisNet);
2410 return;
2411 }
2412 }
2413 }
2414
Wink Savilled747cbc2013-08-07 16:22:47 -07002415 if (DBG) log("handleCaptivePortalTrackerCheck: call captivePortalCheckComplete ni=" + info);
Irfan Sheriffda6da092012-08-16 12:49:23 -07002416 thisNet.captivePortalCheckComplete();
2417 }
2418
2419 /** @hide */
Wink Savilled747cbc2013-08-07 16:22:47 -07002420 @Override
Irfan Sheriffda6da092012-08-16 12:49:23 -07002421 public void captivePortalCheckComplete(NetworkInfo info) {
Robert Greenwalt5a6bdc42013-02-15 10:56:35 -08002422 enforceConnectivityInternalPermission();
Wink Savilled747cbc2013-08-07 16:22:47 -07002423 if (DBG) log("captivePortalCheckComplete: ni=" + info);
Irfan Sheriffda6da092012-08-16 12:49:23 -07002424 mNetTrackers[info.getType()].captivePortalCheckComplete();
Irfan Sheriffda6da092012-08-16 12:49:23 -07002425 }
2426
Wink Savilled747cbc2013-08-07 16:22:47 -07002427 /** @hide */
2428 @Override
2429 public void captivePortalCheckCompleted(NetworkInfo info, boolean isCaptivePortal) {
2430 enforceConnectivityInternalPermission();
2431 if (DBG) log("captivePortalCheckCompleted: ni=" + info + " captive=" + isCaptivePortal);
2432 mNetTrackers[info.getType()].captivePortalCheckCompleted(isCaptivePortal);
2433 }
2434
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002435 /**
Haoyu Bai04124232012-06-28 15:26:19 -07002436 * Setup data activity tracking for the given network interface.
2437 *
2438 * Every {@code setupDataActivityTracking} should be paired with a
2439 * {@link removeDataActivityTracking} for cleanup.
2440 */
2441 private void setupDataActivityTracking(int type) {
2442 final NetworkStateTracker thisNet = mNetTrackers[type];
2443 final String iface = thisNet.getLinkProperties().getInterfaceName();
2444
2445 final int timeout;
2446
2447 if (ConnectivityManager.isNetworkTypeMobile(type)) {
Jeff Brownbf6f6f92012-09-25 15:03:20 -07002448 timeout = Settings.Global.getInt(mContext.getContentResolver(),
2449 Settings.Global.DATA_ACTIVITY_TIMEOUT_MOBILE,
Haoyu Bai04124232012-06-28 15:26:19 -07002450 0);
2451 // Canonicalize mobile network type
2452 type = ConnectivityManager.TYPE_MOBILE;
2453 } else if (ConnectivityManager.TYPE_WIFI == type) {
Jeff Brownbf6f6f92012-09-25 15:03:20 -07002454 timeout = Settings.Global.getInt(mContext.getContentResolver(),
2455 Settings.Global.DATA_ACTIVITY_TIMEOUT_WIFI,
Haoyu Bai04124232012-06-28 15:26:19 -07002456 0);
2457 } else {
2458 // do not track any other networks
2459 timeout = 0;
2460 }
2461
2462 if (timeout > 0 && iface != null) {
2463 try {
2464 mNetd.addIdleTimer(iface, timeout, Integer.toString(type));
2465 } catch (RemoteException e) {
2466 }
2467 }
2468 }
2469
2470 /**
2471 * Remove data activity tracking when network disconnects.
2472 */
2473 private void removeDataActivityTracking(int type) {
2474 final NetworkStateTracker net = mNetTrackers[type];
2475 final String iface = net.getLinkProperties().getInterfaceName();
2476
2477 if (iface != null && (ConnectivityManager.isNetworkTypeMobile(type) ||
2478 ConnectivityManager.TYPE_WIFI == type)) {
2479 try {
2480 // the call fails silently if no idletimer setup for this interface
2481 mNetd.removeIdleTimer(iface);
2482 } catch (RemoteException e) {
2483 }
2484 }
2485 }
2486
2487 /**
Robert Greenwaltc76b8fa2010-07-23 15:46:26 -07002488 * After a change in the connectivity state of a network. We're mainly
2489 * concerned with making sure that the list of DNS servers is set up
2490 * according to which networks are connected, and ensuring that the
2491 * right routing table entries exist.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002492 */
Robert Greenwaltec896c62011-06-15 12:22:07 -07002493 private void handleConnectivityChange(int netType, boolean doReset) {
Wink Savillee8222252011-07-13 13:44:13 -07002494 int resetMask = doReset ? NetworkUtils.RESET_ALL_ADDRESSES : 0;
Chad Brubakerf336d722013-07-15 16:34:04 -07002495 boolean exempt = ConnectivityManager.isNetworkTypeExempt(netType);
Wink Saville948282b2013-08-29 08:55:16 -07002496 if (VDBG) {
2497 log("handleConnectivityChange: netType=" + netType + " doReset=" + doReset
2498 + " resetMask=" + resetMask);
2499 }
Wink Savillee8222252011-07-13 13:44:13 -07002500
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002501 /*
Robert Greenwalt42acef32009-08-12 16:08:25 -07002502 * If a non-default network is enabled, add the host routes that
Robert Greenwaltc76b8fa2010-07-23 15:46:26 -07002503 * will allow it's DNS servers to be accessed.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002504 */
Robert Greenwaltc76b8fa2010-07-23 15:46:26 -07002505 handleDnsConfigurationChange(netType);
Robert Greenwalt42acef32009-08-12 16:08:25 -07002506
Robert Greenwalt0a46db52011-07-14 14:28:05 -07002507 LinkProperties curLp = mCurrentLinkProperties[netType];
2508 LinkProperties newLp = null;
2509
Robert Greenwaltc76b8fa2010-07-23 15:46:26 -07002510 if (mNetTrackers[netType].getNetworkInfo().isConnected()) {
Robert Greenwalt0a46db52011-07-14 14:28:05 -07002511 newLp = mNetTrackers[netType].getLinkProperties();
Wink Savillee8222252011-07-13 13:44:13 -07002512 if (VDBG) {
2513 log("handleConnectivityChange: changed linkProperty[" + netType + "]:" +
2514 " doReset=" + doReset + " resetMask=" + resetMask +
2515 "\n curLp=" + curLp +
2516 "\n newLp=" + newLp);
2517 }
2518
Robert Greenwalt0a46db52011-07-14 14:28:05 -07002519 if (curLp != null) {
2520 if (curLp.isIdenticalInterfaceName(newLp)) {
2521 CompareResult<LinkAddress> car = curLp.compareAddresses(newLp);
2522 if ((car.removed.size() != 0) || (car.added.size() != 0)) {
2523 for (LinkAddress linkAddr : car.removed) {
2524 if (linkAddr.getAddress() instanceof Inet4Address) {
2525 resetMask |= NetworkUtils.RESET_IPV4_ADDRESSES;
2526 }
2527 if (linkAddr.getAddress() instanceof Inet6Address) {
2528 resetMask |= NetworkUtils.RESET_IPV6_ADDRESSES;
2529 }
Wink Savillee8222252011-07-13 13:44:13 -07002530 }
Robert Greenwalt0a46db52011-07-14 14:28:05 -07002531 if (DBG) {
2532 log("handleConnectivityChange: addresses changed" +
2533 " linkProperty[" + netType + "]:" + " resetMask=" + resetMask +
2534 "\n car=" + car);
Wink Savillee8222252011-07-13 13:44:13 -07002535 }
Robert Greenwalt0a46db52011-07-14 14:28:05 -07002536 } else {
2537 if (DBG) {
2538 log("handleConnectivityChange: address are the same reset per doReset" +
2539 " linkProperty[" + netType + "]:" +
2540 " resetMask=" + resetMask);
2541 }
Wink Savillee8222252011-07-13 13:44:13 -07002542 }
2543 } else {
Robert Greenwalt0a46db52011-07-14 14:28:05 -07002544 resetMask = NetworkUtils.RESET_ALL_ADDRESSES;
Robert Greenwalt58d4c592011-08-02 17:18:41 -07002545 if (DBG) {
2546 log("handleConnectivityChange: interface not not equivalent reset both" +
2547 " linkProperty[" + netType + "]:" +
2548 " resetMask=" + resetMask);
2549 }
Wink Savillee8222252011-07-13 13:44:13 -07002550 }
Wink Savillee8222252011-07-13 13:44:13 -07002551 }
Robert Greenwaltd55a6b42011-03-25 13:09:25 -07002552 if (mNetConfigs[netType].isDefault()) {
Chia-chi Yeh4c12a472011-10-03 15:34:04 -07002553 handleApplyDefaultProxy(newLp.getHttpProxy());
Robert Greenwaltc76b8fa2010-07-23 15:46:26 -07002554 }
2555 } else {
Robert Greenwalt0a46db52011-07-14 14:28:05 -07002556 if (VDBG) {
2557 log("handleConnectivityChange: changed linkProperty[" + netType + "]:" +
2558 " doReset=" + doReset + " resetMask=" + resetMask +
2559 "\n curLp=" + curLp +
2560 "\n newLp= null");
Robert Greenwalt42acef32009-08-12 16:08:25 -07002561 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002562 }
Robert Greenwalt0a46db52011-07-14 14:28:05 -07002563 mCurrentLinkProperties[netType] = newLp;
Chad Brubakerf336d722013-07-15 16:34:04 -07002564 boolean resetDns = updateRoutes(newLp, curLp, mNetConfigs[netType].isDefault(), exempt);
Robert Greenwaltec896c62011-06-15 12:22:07 -07002565
Chia-chi Yeh0c074e62011-08-15 15:19:40 -07002566 if (resetMask != 0 || resetDns) {
Wink Saville948282b2013-08-29 08:55:16 -07002567 if (VDBG) log("handleConnectivityChange: resetting");
Robert Greenwalt80eb63b2013-05-23 18:33:06 -07002568 if (curLp != null) {
Wink Saville948282b2013-08-29 08:55:16 -07002569 if (VDBG) log("handleConnectivityChange: resetting curLp=" + curLp);
Robert Greenwalt80eb63b2013-05-23 18:33:06 -07002570 for (String iface : curLp.getAllInterfaceNames()) {
Lorenzo Colitti4aa9bcf2013-03-20 19:22:58 +09002571 if (TextUtils.isEmpty(iface) == false) {
2572 if (resetMask != 0) {
2573 if (DBG) log("resetConnections(" + iface + ", " + resetMask + ")");
2574 NetworkUtils.resetConnections(iface, resetMask);
Chia-chi Yeh0c074e62011-08-15 15:19:40 -07002575
Lorenzo Colitti4aa9bcf2013-03-20 19:22:58 +09002576 // Tell VPN the interface is down. It is a temporary
2577 // but effective fix to make VPN aware of the change.
2578 if ((resetMask & NetworkUtils.RESET_IPV4_ADDRESSES) != 0) {
Chad Brubaker4ca19e82013-06-14 11:16:51 -07002579 synchronized(mVpns) {
2580 for (int i = 0; i < mVpns.size(); i++) {
2581 mVpns.valueAt(i).interfaceStatusChanged(iface, false);
2582 }
2583 }
Lorenzo Colitti4aa9bcf2013-03-20 19:22:58 +09002584 }
Chia-chi Yeh0c074e62011-08-15 15:19:40 -07002585 }
Lorenzo Colitti4aa9bcf2013-03-20 19:22:58 +09002586 if (resetDns) {
2587 flushVmDnsCache();
2588 if (VDBG) log("resetting DNS cache for " + iface);
2589 try {
2590 mNetd.flushInterfaceDnsCache(iface);
2591 } catch (Exception e) {
2592 // never crash - catch them all
2593 if (DBG) loge("Exception resetting dns cache: " + e);
2594 }
Robert Greenwaltf125a092011-08-15 12:31:55 -07002595 }
Robert Greenwalt80eb63b2013-05-23 18:33:06 -07002596 } else {
2597 loge("Can't reset connection for type "+netType);
Robert Greenwaltf125a092011-08-15 12:31:55 -07002598 }
Robert Greenwaltec896c62011-06-15 12:22:07 -07002599 }
2600 }
2601 }
Kazuhiro Ondo1ccb10e2011-06-22 21:10:34 -05002602
Lorenzo Colitti13c9fde2013-03-15 04:22:37 +09002603 // Update 464xlat state.
Lorenzo Colitti13c9fde2013-03-15 04:22:37 +09002604 NetworkStateTracker tracker = mNetTrackers[netType];
2605 if (mClat.requiresClat(netType, tracker)) {
Wink Saville948282b2013-08-29 08:55:16 -07002606
Lorenzo Colittid2ef1e52013-03-28 14:13:43 +09002607 // If the connection was previously using clat, but is not using it now, stop the clat
2608 // daemon. Normally, this happens automatically when the connection disconnects, but if
2609 // the disconnect is not reported, or if the connection's LinkProperties changed for
2610 // some other reason (e.g., handoff changes the IP addresses on the link), it would
2611 // still be running. If it's not running, then stopping it is a no-op.
2612 if (Nat464Xlat.isRunningClat(curLp) && !Nat464Xlat.isRunningClat(newLp)) {
2613 mClat.stopClat();
2614 }
2615 // If the link requires clat to be running, then start the daemon now.
Lorenzo Colitti13c9fde2013-03-15 04:22:37 +09002616 if (mNetTrackers[netType].getNetworkInfo().isConnected()) {
2617 mClat.startClat(tracker);
2618 } else {
2619 mClat.stopClat();
2620 }
2621 }
2622
Kazuhiro Ondo1ccb10e2011-06-22 21:10:34 -05002623 // TODO: Temporary notifying upstread change to Tethering.
2624 // @see bug/4455071
2625 /** Notify TetheringService if interface name has been changed. */
2626 if (TextUtils.equals(mNetTrackers[netType].getNetworkInfo().getReason(),
Wink Savillea639b312012-07-10 12:37:54 -07002627 PhoneConstants.REASON_LINK_PROPERTIES_CHANGED)) {
Kazuhiro Ondo1ccb10e2011-06-22 21:10:34 -05002628 if (isTetheringSupported()) {
2629 mTethering.handleTetherIfaceChange();
2630 }
2631 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002632 }
2633
Robert Greenwalt0a46db52011-07-14 14:28:05 -07002634 /**
2635 * Add and remove routes using the old properties (null if not previously connected),
2636 * new properties (null if becoming disconnected). May even be double null, which
2637 * is a noop.
2638 * Uses isLinkDefault to determine if default routes should be set or conversely if
2639 * host routes should be set to the dns servers
Robert Greenwaltf125a092011-08-15 12:31:55 -07002640 * returns a boolean indicating the routes changed
Robert Greenwalt0a46db52011-07-14 14:28:05 -07002641 */
Robert Greenwaltf125a092011-08-15 12:31:55 -07002642 private boolean updateRoutes(LinkProperties newLp, LinkProperties curLp,
Chad Brubakerf336d722013-07-15 16:34:04 -07002643 boolean isLinkDefault, boolean exempt) {
Robert Greenwalt0a46db52011-07-14 14:28:05 -07002644 Collection<RouteInfo> routesToAdd = null;
Robert Greenwaltad55d352011-07-22 11:55:33 -07002645 CompareResult<InetAddress> dnsDiff = new CompareResult<InetAddress>();
2646 CompareResult<RouteInfo> routeDiff = new CompareResult<RouteInfo>();
Robert Greenwalt0a46db52011-07-14 14:28:05 -07002647 if (curLp != null) {
2648 // check for the delta between the current set and the new
Lorenzo Colittid1e0fae2013-07-31 23:23:21 +09002649 routeDiff = curLp.compareAllRoutes(newLp);
Robert Greenwalt0a46db52011-07-14 14:28:05 -07002650 dnsDiff = curLp.compareDnses(newLp);
Robert Greenwaltad55d352011-07-22 11:55:33 -07002651 } else if (newLp != null) {
Lorenzo Colittif83d90c2013-03-15 13:58:38 +09002652 routeDiff.added = newLp.getAllRoutes();
Robert Greenwaltad55d352011-07-22 11:55:33 -07002653 dnsDiff.added = newLp.getDnses();
Irfan Sheriffd649c122010-06-09 15:39:36 -07002654 }
Irfan Sheriffd649c122010-06-09 15:39:36 -07002655
Robert Greenwaltf125a092011-08-15 12:31:55 -07002656 boolean routesChanged = (routeDiff.removed.size() != 0 || routeDiff.added.size() != 0);
2657
Robert Greenwaltad55d352011-07-22 11:55:33 -07002658 for (RouteInfo r : routeDiff.removed) {
2659 if (isLinkDefault || ! r.isDefaultRoute()) {
Wink Saville948282b2013-08-29 08:55:16 -07002660 if (VDBG) log("updateRoutes: default remove route r=" + r);
Robert Greenwalt3b28e9a2011-11-02 14:37:19 -07002661 removeRoute(curLp, r, TO_DEFAULT_TABLE);
2662 }
2663 if (isLinkDefault == false) {
2664 // remove from a secondary route table
2665 removeRoute(curLp, r, TO_SECONDARY_TABLE);
Robert Greenwalt0a46db52011-07-14 14:28:05 -07002666 }
Robert Greenwaltad55d352011-07-22 11:55:33 -07002667 }
Irfan Sheriffd649c122010-06-09 15:39:36 -07002668
Robert Greenwalt0a46db52011-07-14 14:28:05 -07002669 if (!isLinkDefault) {
2670 // handle DNS routes
Robert Greenwaltf125a092011-08-15 12:31:55 -07002671 if (routesChanged) {
Robert Greenwaltad55d352011-07-22 11:55:33 -07002672 // routes changed - remove all old dns entries and add new
2673 if (curLp != null) {
2674 for (InetAddress oldDns : curLp.getDnses()) {
2675 removeRouteToAddress(curLp, oldDns);
2676 }
2677 }
2678 if (newLp != null) {
2679 for (InetAddress newDns : newLp.getDnses()) {
Chad Brubakerf336d722013-07-15 16:34:04 -07002680 addRouteToAddress(newLp, newDns, exempt);
Robert Greenwaltad55d352011-07-22 11:55:33 -07002681 }
Robert Greenwaltedcb4f92011-03-22 18:47:42 -07002682 }
Robert Greenwaltf125a092011-08-15 12:31:55 -07002683 } else {
2684 // no change in routes, check for change in dns themselves
2685 for (InetAddress oldDns : dnsDiff.removed) {
2686 removeRouteToAddress(curLp, oldDns);
2687 }
2688 for (InetAddress newDns : dnsDiff.added) {
Chad Brubakerf336d722013-07-15 16:34:04 -07002689 addRouteToAddress(newLp, newDns, exempt);
Robert Greenwaltf125a092011-08-15 12:31:55 -07002690 }
Irfan Sheriffd649c122010-06-09 15:39:36 -07002691 }
Irfan Sheriffd649c122010-06-09 15:39:36 -07002692 }
Robert Greenwalt979ee3c2013-04-05 16:49:32 -07002693
2694 for (RouteInfo r : routeDiff.added) {
2695 if (isLinkDefault || ! r.isDefaultRoute()) {
Chad Brubakerf336d722013-07-15 16:34:04 -07002696 addRoute(newLp, r, TO_DEFAULT_TABLE, exempt);
Robert Greenwalt979ee3c2013-04-05 16:49:32 -07002697 } else {
2698 // add to a secondary route table
Chad Brubakerf336d722013-07-15 16:34:04 -07002699 addRoute(newLp, r, TO_SECONDARY_TABLE, UNEXEMPT);
Robert Greenwalt979ee3c2013-04-05 16:49:32 -07002700
2701 // many radios add a default route even when we don't want one.
2702 // remove the default route unless somebody else has asked for it
2703 String ifaceName = newLp.getInterfaceName();
Chad Brubakerf336d722013-07-15 16:34:04 -07002704 synchronized (mRoutesLock) {
2705 if (!TextUtils.isEmpty(ifaceName) && !mAddedRoutes.contains(r)) {
2706 if (VDBG) log("Removing " + r + " for interface " + ifaceName);
2707 try {
2708 mNetd.removeRoute(ifaceName, r);
2709 } catch (Exception e) {
2710 // never crash - catch them all
2711 if (DBG) loge("Exception trying to remove a route: " + e);
2712 }
Robert Greenwalt979ee3c2013-04-05 16:49:32 -07002713 }
2714 }
2715 }
2716 }
2717
Robert Greenwaltf125a092011-08-15 12:31:55 -07002718 return routesChanged;
Irfan Sheriffd649c122010-06-09 15:39:36 -07002719 }
2720
sy.yun9d9b74a2013-09-02 05:24:09 +09002721 /**
2722 * Reads the network specific MTU size from reources.
2723 * and set it on it's iface.
2724 */
2725 private void updateMtuSizeSettings(NetworkStateTracker nt) {
2726 final String iface = nt.getLinkProperties().getInterfaceName();
2727 final int mtu = nt.getLinkProperties().getMtu();
2728
2729 if (mtu < 68 || mtu > 10000) {
2730 loge("Unexpected mtu value: " + nt);
2731 return;
2732 }
2733
2734 try {
2735 if (VDBG) log("Setting MTU size: " + iface + ", " + mtu);
2736 mNetd.setMtu(iface, mtu);
2737 } catch (Exception e) {
2738 Slog.e(TAG, "exception in setMtu()" + e);
2739 }
2740 }
Irfan Sheriffd649c122010-06-09 15:39:36 -07002741
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -07002742 /**
Irfan Sheriffd649c122010-06-09 15:39:36 -07002743 * Reads the network specific TCP buffer sizes from SystemProperties
2744 * net.tcp.buffersize.[default|wifi|umts|edge|gprs] and set them for system
2745 * wide use
2746 */
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -07002747 private void updateNetworkSettings(NetworkStateTracker nt) {
Irfan Sheriffd649c122010-06-09 15:39:36 -07002748 String key = nt.getTcpBufferSizesPropName();
Jeff Sharkey899223b2012-08-04 15:24:58 -07002749 String bufferSizes = key == null ? null : SystemProperties.get(key);
Irfan Sheriffd649c122010-06-09 15:39:36 -07002750
Jeff Sharkey899223b2012-08-04 15:24:58 -07002751 if (TextUtils.isEmpty(bufferSizes)) {
Robert Greenwalt58d4c592011-08-02 17:18:41 -07002752 if (VDBG) log(key + " not found in system properties. Using defaults");
Irfan Sheriffd649c122010-06-09 15:39:36 -07002753
2754 // Setting to default values so we won't be stuck to previous values
2755 key = "net.tcp.buffersize.default";
2756 bufferSizes = SystemProperties.get(key);
2757 }
2758
2759 // Set values in kernel
2760 if (bufferSizes.length() != 0) {
Robert Greenwalt58d4c592011-08-02 17:18:41 -07002761 if (VDBG) {
Wink Savilleed9c02b2010-12-03 12:01:38 -08002762 log("Setting TCP values: [" + bufferSizes
Irfan Sheriffd649c122010-06-09 15:39:36 -07002763 + "] which comes from [" + key + "]");
2764 }
2765 setBufferSize(bufferSizes);
2766 }
2767 }
2768
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -07002769 /**
Irfan Sheriffd649c122010-06-09 15:39:36 -07002770 * Writes TCP buffer sizes to /sys/kernel/ipv4/tcp_[r/w]mem_[min/def/max]
2771 * which maps to /proc/sys/net/ipv4/tcp_rmem and tcpwmem
2772 *
2773 * @param bufferSizes in the format of "readMin, readInitial, readMax,
2774 * writeMin, writeInitial, writeMax"
2775 */
2776 private void setBufferSize(String bufferSizes) {
2777 try {
2778 String[] values = bufferSizes.split(",");
2779
2780 if (values.length == 6) {
2781 final String prefix = "/sys/kernel/ipv4/tcp_";
Mike Lockwoodda8bb742011-05-28 13:24:04 -04002782 FileUtils.stringToFile(prefix + "rmem_min", values[0]);
2783 FileUtils.stringToFile(prefix + "rmem_def", values[1]);
2784 FileUtils.stringToFile(prefix + "rmem_max", values[2]);
2785 FileUtils.stringToFile(prefix + "wmem_min", values[3]);
2786 FileUtils.stringToFile(prefix + "wmem_def", values[4]);
2787 FileUtils.stringToFile(prefix + "wmem_max", values[5]);
Irfan Sheriffd649c122010-06-09 15:39:36 -07002788 } else {
Wink Savilleed9c02b2010-12-03 12:01:38 -08002789 loge("Invalid buffersize string: " + bufferSizes);
Irfan Sheriffd649c122010-06-09 15:39:36 -07002790 }
2791 } catch (IOException e) {
Wink Savilleed9c02b2010-12-03 12:01:38 -08002792 loge("Can't set tcp buffer sizes:" + e);
Irfan Sheriffd649c122010-06-09 15:39:36 -07002793 }
2794 }
2795
Robert Greenwalt42acef32009-08-12 16:08:25 -07002796 /**
2797 * Adjust the per-process dns entries (net.dns<x>.<pid>) based
2798 * on the highest priority active net which this process requested.
2799 * If there aren't any, clear it out
2800 */
Mattias Falk8b47b362011-08-23 14:15:13 +02002801 private void reassessPidDns(int pid, boolean doBump)
Robert Greenwalt42acef32009-08-12 16:08:25 -07002802 {
Mattias Falk8b47b362011-08-23 14:15:13 +02002803 if (VDBG) log("reassessPidDns for pid " + pid);
2804 Integer myPid = new Integer(pid);
Robert Greenwalt42acef32009-08-12 16:08:25 -07002805 for(int i : mPriorityList) {
Robert Greenwaltd55a6b42011-03-25 13:09:25 -07002806 if (mNetConfigs[i].isDefault()) {
Robert Greenwalt42acef32009-08-12 16:08:25 -07002807 continue;
2808 }
2809 NetworkStateTracker nt = mNetTrackers[i];
Robert Greenwalt86e9e552009-07-16 17:21:39 -07002810 if (nt.getNetworkInfo().isConnected() &&
2811 !nt.isTeardownRequested()) {
Robert Greenwalt37e65eb2010-08-30 10:56:47 -07002812 LinkProperties p = nt.getLinkProperties();
Robert Greenwalt47f69fe2010-06-15 15:43:39 -07002813 if (p == null) continue;
Mattias Falk8b47b362011-08-23 14:15:13 +02002814 if (mNetRequestersPids[i].contains(myPid)) {
2815 try {
2816 mNetd.setDnsInterfaceForPid(p.getInterfaceName(), pid);
2817 } catch (Exception e) {
2818 Slog.e(TAG, "exception reasseses pid dns: " + e);
Robert Greenwalt42acef32009-08-12 16:08:25 -07002819 }
Mattias Falk8b47b362011-08-23 14:15:13 +02002820 return;
Robert Greenwalt42acef32009-08-12 16:08:25 -07002821 }
2822 }
2823 }
2824 // nothing found - delete
Mattias Falk8b47b362011-08-23 14:15:13 +02002825 try {
2826 mNetd.clearDnsInterfaceForPid(pid);
2827 } catch (Exception e) {
2828 Slog.e(TAG, "exception clear interface from pid: " + e);
Robert Greenwalt42acef32009-08-12 16:08:25 -07002829 }
2830 }
2831
Mattias Falk8b47b362011-08-23 14:15:13 +02002832 private void flushVmDnsCache() {
Robert Greenwalt03595d02010-11-02 14:08:23 -07002833 /*
2834 * Tell the VMs to toss their DNS caches
2835 */
2836 Intent intent = new Intent(Intent.ACTION_CLEAR_DNS_CACHE);
2837 intent.addFlags(Intent.FLAG_RECEIVER_REPLACE_PENDING);
Stan Chesnutt3d1db862011-01-05 17:14:03 -08002838 /*
2839 * Connectivity events can happen before boot has completed ...
2840 */
2841 intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY_BEFORE_BOOT);
Dianne Hackbornfd8bf5c2012-09-04 18:48:37 -07002842 final long ident = Binder.clearCallingIdentity();
2843 try {
2844 mContext.sendBroadcastAsUser(intent, UserHandle.ALL);
2845 } finally {
2846 Binder.restoreCallingIdentity(ident);
2847 }
Robert Greenwalt42acef32009-08-12 16:08:25 -07002848 }
2849
Chia-chi Yeh44bb2512011-07-14 18:01:57 -07002850 // Caller must grab mDnsLock.
Mattias Falk8b47b362011-08-23 14:15:13 +02002851 private void updateDnsLocked(String network, String iface,
Chad Brubaker20a7e882013-07-23 17:13:36 -07002852 Collection<InetAddress> dnses, String domains, boolean defaultDns) {
Chia-chi Yeh44bb2512011-07-14 18:01:57 -07002853 int last = 0;
2854 if (dnses.size() == 0 && mDefaultDns != null) {
Mattias Falk8b47b362011-08-23 14:15:13 +02002855 dnses = new ArrayList();
2856 dnses.add(mDefaultDns);
2857 if (DBG) {
2858 loge("no dns provided for " + network + " - using " + mDefaultDns.getHostAddress());
Robert Greenwalt63837f42013-01-19 00:34:07 +00002859 }
Robert Greenwalt63837f42013-01-19 00:34:07 +00002860 }
2861
Mattias Falk8b47b362011-08-23 14:15:13 +02002862 try {
2863 mNetd.setDnsServersForInterface(iface, NetworkUtils.makeStrings(dnses), domains);
Chad Brubaker20a7e882013-07-23 17:13:36 -07002864 if (defaultDns) {
2865 mNetd.setDefaultInterfaceForDns(iface);
2866 }
2867
Robert Greenwalt0dd19a82013-02-11 15:25:10 -08002868 for (InetAddress dns : dnses) {
2869 ++last;
2870 String key = "net.dns" + last;
2871 String value = dns.getHostAddress();
2872 SystemProperties.set(key, value);
2873 }
2874 for (int i = last + 1; i <= mNumDnsEntries; ++i) {
2875 String key = "net.dns" + i;
2876 SystemProperties.set(key, "");
2877 }
2878 mNumDnsEntries = last;
Mattias Falk8b47b362011-08-23 14:15:13 +02002879 } catch (Exception e) {
Robert Greenwalt69887e82013-09-24 11:05:57 -07002880 loge("exception setting default dns interface: " + e);
Robert Greenwalt63837f42013-01-19 00:34:07 +00002881 }
Chia-chi Yeh44bb2512011-07-14 18:01:57 -07002882 }
2883
Robert Greenwaltc76b8fa2010-07-23 15:46:26 -07002884 private void handleDnsConfigurationChange(int netType) {
Robert Greenwalt42acef32009-08-12 16:08:25 -07002885 // add default net's dns entries
Robert Greenwaltc76b8fa2010-07-23 15:46:26 -07002886 NetworkStateTracker nt = mNetTrackers[netType];
2887 if (nt != null && nt.getNetworkInfo().isConnected() && !nt.isTeardownRequested()) {
Robert Greenwalt37e65eb2010-08-30 10:56:47 -07002888 LinkProperties p = nt.getLinkProperties();
Robert Greenwaltc76b8fa2010-07-23 15:46:26 -07002889 if (p == null) return;
2890 Collection<InetAddress> dnses = p.getDnses();
Robert Greenwaltd55a6b42011-03-25 13:09:25 -07002891 if (mNetConfigs[netType].isDefault()) {
Chia-chi Yeh44bb2512011-07-14 18:01:57 -07002892 String network = nt.getNetworkInfo().getTypeName();
2893 synchronized (mDnsLock) {
Chad Brubakerb98703e2013-07-23 17:44:41 -07002894 updateDnsLocked(network, p.getInterfaceName(), dnses, p.getDomains(), true);
Robert Greenwaltc76b8fa2010-07-23 15:46:26 -07002895 }
Robert Greenwaltc76b8fa2010-07-23 15:46:26 -07002896 } else {
Robert Greenwalta10b7fd2011-07-25 16:06:25 -07002897 try {
Robert Greenwaltc59c6da2011-07-27 10:00:36 -07002898 mNetd.setDnsServersForInterface(p.getInterfaceName(),
Robert Greenwalt8058f622012-11-09 10:52:27 -08002899 NetworkUtils.makeStrings(dnses), p.getDomains());
Robert Greenwalta10b7fd2011-07-25 16:06:25 -07002900 } catch (Exception e) {
Robert Greenwalt8beff952011-12-13 15:26:02 -08002901 if (DBG) loge("exception setting dns servers: " + e);
Robert Greenwalta10b7fd2011-07-25 16:06:25 -07002902 }
Robert Greenwaltc76b8fa2010-07-23 15:46:26 -07002903 // set per-pid dns for attached secondary nets
Mattias Falk8b47b362011-08-23 14:15:13 +02002904 List<Integer> pids = mNetRequestersPids[netType];
2905 for (Integer pid : pids) {
2906 try {
2907 mNetd.setDnsInterfaceForPid(p.getInterfaceName(), pid);
2908 } catch (Exception e) {
2909 Slog.e(TAG, "exception setting interface for pid: " + e);
2910 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002911 }
2912 }
Mattias Falk8b47b362011-08-23 14:15:13 +02002913 flushVmDnsCache();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002914 }
Robert Greenwalt42acef32009-08-12 16:08:25 -07002915 }
2916
Robert Greenwaltf2102f72011-05-03 19:02:44 -07002917 private int getRestoreDefaultNetworkDelay(int networkType) {
Robert Greenwalt42acef32009-08-12 16:08:25 -07002918 String restoreDefaultNetworkDelayStr = SystemProperties.get(
2919 NETWORK_RESTORE_DELAY_PROP_NAME);
2920 if(restoreDefaultNetworkDelayStr != null &&
2921 restoreDefaultNetworkDelayStr.length() != 0) {
2922 try {
2923 return Integer.valueOf(restoreDefaultNetworkDelayStr);
2924 } catch (NumberFormatException e) {
2925 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002926 }
Robert Greenwaltf2102f72011-05-03 19:02:44 -07002927 // if the system property isn't set, use the value for the apn type
2928 int ret = RESTORE_DEFAULT_NETWORK_DELAY;
2929
2930 if ((networkType <= ConnectivityManager.MAX_NETWORK_TYPE) &&
2931 (mNetConfigs[networkType] != null)) {
2932 ret = mNetConfigs[networkType].restoreTime;
2933 }
2934 return ret;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002935 }
2936
2937 @Override
Jeff Sharkeye6e61972012-09-14 13:47:51 -07002938 protected void dump(FileDescriptor fd, PrintWriter writer, String[] args) {
2939 final IndentingPrintWriter pw = new IndentingPrintWriter(writer, " ");
Robert Greenwalt86e9e552009-07-16 17:21:39 -07002940 if (mContext.checkCallingOrSelfPermission(
2941 android.Manifest.permission.DUMP)
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002942 != PackageManager.PERMISSION_GRANTED) {
Robert Greenwalt86e9e552009-07-16 17:21:39 -07002943 pw.println("Permission Denial: can't dump ConnectivityService " +
2944 "from from pid=" + Binder.getCallingPid() + ", uid=" +
2945 Binder.getCallingUid());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002946 return;
2947 }
Jeff Sharkeye6e61972012-09-14 13:47:51 -07002948
2949 // TODO: add locking to get atomic snapshot
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002950 pw.println();
Jeff Sharkeye6e61972012-09-14 13:47:51 -07002951 for (int i = 0; i < mNetTrackers.length; i++) {
2952 final NetworkStateTracker nst = mNetTrackers[i];
Robert Greenwaltb9285352009-12-21 18:24:07 -08002953 if (nst != null) {
Jeff Sharkeye6e61972012-09-14 13:47:51 -07002954 pw.println("NetworkStateTracker for " + getNetworkTypeName(i) + ":");
2955 pw.increaseIndent();
Robert Greenwaltb9285352009-12-21 18:24:07 -08002956 if (nst.getNetworkInfo().isConnected()) {
2957 pw.println("Active network: " + nst.getNetworkInfo().
2958 getTypeName());
2959 }
2960 pw.println(nst.getNetworkInfo());
Jeff Sharkeye6e61972012-09-14 13:47:51 -07002961 pw.println(nst.getLinkProperties());
Robert Greenwaltb9285352009-12-21 18:24:07 -08002962 pw.println(nst);
2963 pw.println();
Jeff Sharkeye6e61972012-09-14 13:47:51 -07002964 pw.decreaseIndent();
Robert Greenwalt42acef32009-08-12 16:08:25 -07002965 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002966 }
Robert Greenwaltb9285352009-12-21 18:24:07 -08002967
2968 pw.println("Network Requester Pids:");
Jeff Sharkeye6e61972012-09-14 13:47:51 -07002969 pw.increaseIndent();
Robert Greenwaltb9285352009-12-21 18:24:07 -08002970 for (int net : mPriorityList) {
2971 String pidString = net + ": ";
Mattias Falk8b47b362011-08-23 14:15:13 +02002972 for (Integer pid : mNetRequestersPids[net]) {
Robert Greenwaltb9285352009-12-21 18:24:07 -08002973 pidString = pidString + pid.toString() + ", ";
2974 }
2975 pw.println(pidString);
2976 }
2977 pw.println();
Jeff Sharkeye6e61972012-09-14 13:47:51 -07002978 pw.decreaseIndent();
Robert Greenwaltb9285352009-12-21 18:24:07 -08002979
2980 pw.println("FeatureUsers:");
Jeff Sharkeye6e61972012-09-14 13:47:51 -07002981 pw.increaseIndent();
Robert Greenwaltb9285352009-12-21 18:24:07 -08002982 for (Object requester : mFeatureUsers) {
2983 pw.println(requester.toString());
2984 }
2985 pw.println();
Jeff Sharkeye6e61972012-09-14 13:47:51 -07002986 pw.decreaseIndent();
Robert Greenwalt2a091d72010-02-11 18:18:40 -08002987
Robert Greenwalt14f2ef42010-06-15 12:19:37 -07002988 synchronized (this) {
2989 pw.println("NetworkTranstionWakeLock is currently " +
2990 (mNetTransitionWakeLock.isHeld() ? "" : "not ") + "held.");
2991 pw.println("It was last requested for "+mNetTransitionWakeLockCausedBy);
2992 }
2993 pw.println();
2994
Robert Greenwalt2a091d72010-02-11 18:18:40 -08002995 mTethering.dump(fd, pw, args);
Robert Greenwalt4e8dfef2010-09-20 14:35:25 -07002996
2997 if (mInetLog != null) {
2998 pw.println();
2999 pw.println("Inet condition reports:");
Jeff Sharkeye6e61972012-09-14 13:47:51 -07003000 pw.increaseIndent();
Robert Greenwalt4e8dfef2010-09-20 14:35:25 -07003001 for(int i = 0; i < mInetLog.size(); i++) {
3002 pw.println(mInetLog.get(i));
3003 }
Jeff Sharkeye6e61972012-09-14 13:47:51 -07003004 pw.decreaseIndent();
Robert Greenwalt4e8dfef2010-09-20 14:35:25 -07003005 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08003006 }
3007
Robert Greenwalt42acef32009-08-12 16:08:25 -07003008 // must be stateless - things change under us.
Jeff Sharkey4c628eb2012-07-23 13:19:46 -07003009 private class NetworkStateTrackerHandler extends Handler {
3010 public NetworkStateTrackerHandler(Looper looper) {
Wink Savillebb08caf2010-09-02 19:23:52 -07003011 super(looper);
3012 }
3013
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08003014 @Override
3015 public void handleMessage(Message msg) {
3016 NetworkInfo info;
3017 switch (msg.what) {
Wink Saville948282b2013-08-29 08:55:16 -07003018 case NetworkStateTracker.EVENT_STATE_CHANGED: {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08003019 info = (NetworkInfo) msg.obj;
Robert Greenwalt511288a2009-12-07 11:33:18 -08003020 NetworkInfo.State state = info.getState();
Robert Greenwalt511288a2009-12-07 11:33:18 -08003021
Wink Savillec9acde92011-09-21 11:05:43 -07003022 if (VDBG || (state == NetworkInfo.State.CONNECTED) ||
Wink Saville67c38212013-09-05 12:02:25 -07003023 (state == NetworkInfo.State.DISCONNECTED) ||
3024 (state == NetworkInfo.State.SUSPENDED)) {
Wink Savillec9acde92011-09-21 11:05:43 -07003025 log("ConnectivityChange for " +
Robert Greenwalt86e9e552009-07-16 17:21:39 -07003026 info.getTypeName() + ": " +
Robert Greenwalt511288a2009-12-07 11:33:18 -08003027 state + "/" + info.getDetailedState());
Wink Savillec9acde92011-09-21 11:05:43 -07003028 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08003029
Wink Saville948282b2013-08-29 08:55:16 -07003030 // Since mobile has the notion of a network/apn that can be used for
3031 // provisioning we need to check every time we're connected as
3032 // CaptiveProtalTracker won't detected it because DCT doesn't report it
3033 // as connected as ACTION_ANY_DATA_CONNECTION_STATE_CHANGED instead its
3034 // reported as ACTION_DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN. Which
3035 // is received by MDST and sent here as EVENT_STATE_CHANGED.
3036 if (ConnectivityManager.isNetworkTypeMobile(info.getType())
Wink Savillefde1ac92013-07-16 17:16:37 -07003037 && (0 != Settings.Global.getInt(mContext.getContentResolver(),
3038 Settings.Global.DEVICE_PROVISIONED, 0))
Wink Saville127beff2013-09-14 09:04:53 -07003039 && (((state == NetworkInfo.State.CONNECTED)
3040 && (info.getType() == ConnectivityManager.TYPE_MOBILE))
3041 || info.isConnectedToProvisioningNetwork())) {
3042 log("ConnectivityChange checkMobileProvisioning for"
3043 + " TYPE_MOBILE or ProvisioningNetwork");
Wink Saville948282b2013-08-29 08:55:16 -07003044 checkMobileProvisioning(CheckMp.MAX_TIMEOUT_MS);
Wink Savillefde1ac92013-07-16 17:16:37 -07003045 }
3046
Jeff Sharkey2528b502012-11-09 15:57:02 -08003047 EventLogTags.writeConnectivityStateChanged(
3048 info.getType(), info.getSubtype(), info.getDetailedState().ordinal());
Robert Greenwalt86e9e552009-07-16 17:21:39 -07003049
3050 if (info.getDetailedState() ==
3051 NetworkInfo.DetailedState.FAILED) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08003052 handleConnectionFailure(info);
Irfan Sheriffda6da092012-08-16 12:49:23 -07003053 } else if (info.getDetailedState() ==
3054 DetailedState.CAPTIVE_PORTAL_CHECK) {
3055 handleCaptivePortalTrackerCheck(info);
Wink Saville67c38212013-09-05 12:02:25 -07003056 } else if (info.isConnectedToProvisioningNetwork()) {
Wink Saville948282b2013-08-29 08:55:16 -07003057 /**
3058 * TODO: Create ConnectivityManager.TYPE_MOBILE_PROVISIONING
3059 * for now its an in between network, its a network that
3060 * is actually a default network but we don't want it to be
3061 * announced as such to keep background applications from
3062 * trying to use it. It turns out that some still try so we
3063 * take the additional step of clearing any default routes
3064 * to the link that may have incorrectly setup by the lower
3065 * levels.
3066 */
3067 LinkProperties lp = getLinkProperties(info.getType());
3068 if (DBG) {
3069 log("EVENT_STATE_CHANGED: connected to provisioning network, lp=" + lp);
3070 }
3071
3072 // Clear any default routes setup by the radio so
3073 // any activity by applications trying to use this
3074 // connection will fail until the provisioning network
3075 // is enabled.
3076 for (RouteInfo r : lp.getRoutes()) {
3077 removeRoute(lp, r, TO_DEFAULT_TABLE);
3078 }
Robert Greenwalt511288a2009-12-07 11:33:18 -08003079 } else if (state == NetworkInfo.State.DISCONNECTED) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08003080 handleDisconnect(info);
Robert Greenwalt511288a2009-12-07 11:33:18 -08003081 } else if (state == NetworkInfo.State.SUSPENDED) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08003082 // TODO: need to think this over.
Robert Greenwalt86e9e552009-07-16 17:21:39 -07003083 // the logic here is, handle SUSPENDED the same as
3084 // DISCONNECTED. The only difference being we are
3085 // broadcasting an intent with NetworkInfo that's
3086 // suspended. This allows the applications an
3087 // opportunity to handle DISCONNECTED and SUSPENDED
3088 // differently, or not.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08003089 handleDisconnect(info);
Robert Greenwalt511288a2009-12-07 11:33:18 -08003090 } else if (state == NetworkInfo.State.CONNECTED) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08003091 handleConnect(info);
3092 }
Jeff Sharkey69ddab42012-08-25 00:05:46 -07003093 if (mLockdownTracker != null) {
3094 mLockdownTracker.onNetworkInfoChanged(info);
3095 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08003096 break;
Wink Saville948282b2013-08-29 08:55:16 -07003097 }
3098 case NetworkStateTracker.EVENT_CONFIGURATION_CHANGED: {
Robert Greenwaltc76b8fa2010-07-23 15:46:26 -07003099 info = (NetworkInfo) msg.obj;
Kazuhiro Ondo1ccb10e2011-06-22 21:10:34 -05003100 // TODO: Temporary allowing network configuration
3101 // change not resetting sockets.
3102 // @see bug/4455071
3103 handleConnectivityChange(info.getType(), false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08003104 break;
Wink Saville948282b2013-08-29 08:55:16 -07003105 }
3106 case NetworkStateTracker.EVENT_NETWORK_SUBTYPE_CHANGED: {
Robert Greenwaltd14e1762012-08-20 11:15:39 -07003107 info = (NetworkInfo) msg.obj;
Wink Saville948282b2013-08-29 08:55:16 -07003108 int type = info.getType();
Robert Greenwalt30a2bc82014-02-28 16:44:00 -08003109 if (mNetConfigs[type].isDefault()) updateNetworkSettings(mNetTrackers[type]);
Robert Greenwaltd14e1762012-08-20 11:15:39 -07003110 break;
Wink Saville948282b2013-08-29 08:55:16 -07003111 }
Jeff Sharkey4c628eb2012-07-23 13:19:46 -07003112 }
3113 }
3114 }
3115
3116 private class InternalHandler extends Handler {
3117 public InternalHandler(Looper looper) {
3118 super(looper);
3119 }
3120
3121 @Override
3122 public void handleMessage(Message msg) {
3123 NetworkInfo info;
3124 switch (msg.what) {
Sreeram Ramachandranb1486ae2013-08-27 11:41:19 -07003125 case EVENT_CLEAR_NET_TRANSITION_WAKELOCK: {
Robert Greenwalt14f2ef42010-06-15 12:19:37 -07003126 String causedBy = null;
3127 synchronized (ConnectivityService.this) {
3128 if (msg.arg1 == mNetTransitionWakeLockSerialNumber &&
3129 mNetTransitionWakeLock.isHeld()) {
3130 mNetTransitionWakeLock.release();
3131 causedBy = mNetTransitionWakeLockCausedBy;
3132 }
3133 }
3134 if (causedBy != null) {
Wink Savilleed9c02b2010-12-03 12:01:38 -08003135 log("NetTransition Wakelock for " + causedBy + " released by timeout");
Robert Greenwalt14f2ef42010-06-15 12:19:37 -07003136 }
Robert Greenwalt057d5e92010-09-09 14:05:10 -07003137 break;
Sreeram Ramachandranb1486ae2013-08-27 11:41:19 -07003138 }
3139 case EVENT_RESTORE_DEFAULT_NETWORK: {
Robert Greenwalt9c75d4a2009-09-27 17:27:04 -07003140 FeatureUser u = (FeatureUser)msg.obj;
3141 u.expire();
Robert Greenwaltd7085fc2010-09-08 15:24:47 -07003142 break;
Sreeram Ramachandranb1486ae2013-08-27 11:41:19 -07003143 }
3144 case EVENT_INET_CONDITION_CHANGE: {
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003145 int netType = msg.arg1;
3146 int condition = msg.arg2;
3147 handleInetConditionChange(netType, condition);
Robert Greenwalt14f2ef42010-06-15 12:19:37 -07003148 break;
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003149 }
Sreeram Ramachandranb1486ae2013-08-27 11:41:19 -07003150 case EVENT_INET_CONDITION_HOLD_END: {
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003151 int netType = msg.arg1;
3152 int sequence = msg.arg2;
Wink Saville5b7573e2013-01-31 00:30:13 +00003153 handleInetConditionHoldEnd(netType, sequence);
Robert Greenwaltd7085fc2010-09-08 15:24:47 -07003154 break;
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003155 }
Sreeram Ramachandranb1486ae2013-08-27 11:41:19 -07003156 case EVENT_SET_NETWORK_PREFERENCE: {
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003157 int preference = msg.arg1;
3158 handleSetNetworkPreference(preference);
3159 break;
3160 }
Sreeram Ramachandranb1486ae2013-08-27 11:41:19 -07003161 case EVENT_SET_MOBILE_DATA: {
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003162 boolean enabled = (msg.arg1 == ENABLED);
3163 handleSetMobileData(enabled);
3164 break;
3165 }
Sreeram Ramachandranb1486ae2013-08-27 11:41:19 -07003166 case EVENT_APPLY_GLOBAL_HTTP_PROXY: {
Robert Greenwalt434203a2010-10-11 16:00:27 -07003167 handleDeprecatedGlobalHttpProxy();
Robert Greenwaltd55a6b42011-03-25 13:09:25 -07003168 break;
3169 }
Sreeram Ramachandranb1486ae2013-08-27 11:41:19 -07003170 case EVENT_SET_DEPENDENCY_MET: {
Robert Greenwaltd55a6b42011-03-25 13:09:25 -07003171 boolean met = (msg.arg1 == ENABLED);
3172 handleSetDependencyMet(msg.arg2, met);
3173 break;
Robert Greenwalt434203a2010-10-11 16:00:27 -07003174 }
Sreeram Ramachandranb1486ae2013-08-27 11:41:19 -07003175 case EVENT_SEND_STICKY_BROADCAST_INTENT: {
Wink Saville628b0852011-08-04 15:01:58 -07003176 Intent intent = (Intent)msg.obj;
Wink Saville628b0852011-08-04 15:01:58 -07003177 sendStickyBroadcast(intent);
3178 break;
3179 }
Jeff Sharkey8e28b7d2011-08-19 02:24:24 -07003180 case EVENT_SET_POLICY_DATA_ENABLE: {
3181 final int networkType = msg.arg1;
3182 final boolean enabled = msg.arg2 == ENABLED;
3183 handleSetPolicyDataEnable(networkType, enabled);
Jeff Sharkey69ddab42012-08-25 00:05:46 -07003184 break;
3185 }
3186 case EVENT_VPN_STATE_CHANGED: {
3187 if (mLockdownTracker != null) {
3188 mLockdownTracker.onVpnStateChanged((NetworkInfo) msg.obj);
3189 }
3190 break;
Jeff Sharkey8e28b7d2011-08-19 02:24:24 -07003191 }
Wink Savilleab9321d2013-06-29 21:10:57 -07003192 case EVENT_ENABLE_FAIL_FAST_MOBILE_DATA: {
3193 int tag = mEnableFailFastMobileDataTag.get();
3194 if (msg.arg1 == tag) {
3195 MobileDataStateTracker mobileDst =
3196 (MobileDataStateTracker) mNetTrackers[ConnectivityManager.TYPE_MOBILE];
3197 if (mobileDst != null) {
3198 mobileDst.setEnableFailFastMobileData(msg.arg2);
3199 }
3200 } else {
3201 log("EVENT_ENABLE_FAIL_FAST_MOBILE_DATA: stale arg1:" + msg.arg1
3202 + " != tag:" + tag);
3203 }
Sreeram Ramachandranb1486ae2013-08-27 11:41:19 -07003204 break;
Wink Savilleab9321d2013-06-29 21:10:57 -07003205 }
Sreeram Ramachandranb1486ae2013-08-27 11:41:19 -07003206 case EVENT_SAMPLE_INTERVAL_ELAPSED: {
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -07003207 handleNetworkSamplingTimeout();
3208 break;
Sreeram Ramachandranb1486ae2013-08-27 11:41:19 -07003209 }
Jason Monkdecd2952013-10-10 14:02:51 -04003210 case EVENT_PROXY_HAS_CHANGED: {
3211 handleApplyDefaultProxy((ProxyProperties)msg.obj);
3212 break;
3213 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08003214 }
3215 }
3216 }
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08003217
3218 // javadoc from interface
Robert Greenwalt5a735062010-03-02 17:25:02 -08003219 public int tether(String iface) {
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08003220 enforceTetherChangePermission();
Robert Greenwalt5a735062010-03-02 17:25:02 -08003221
3222 if (isTetheringSupported()) {
3223 return mTethering.tether(iface);
3224 } else {
3225 return ConnectivityManager.TETHER_ERROR_UNSUPPORTED;
3226 }
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08003227 }
3228
3229 // javadoc from interface
Robert Greenwalt5a735062010-03-02 17:25:02 -08003230 public int untether(String iface) {
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08003231 enforceTetherChangePermission();
Robert Greenwalt5a735062010-03-02 17:25:02 -08003232
3233 if (isTetheringSupported()) {
3234 return mTethering.untether(iface);
3235 } else {
3236 return ConnectivityManager.TETHER_ERROR_UNSUPPORTED;
3237 }
3238 }
3239
3240 // javadoc from interface
3241 public int getLastTetherError(String iface) {
3242 enforceTetherAccessPermission();
3243
3244 if (isTetheringSupported()) {
3245 return mTethering.getLastTetherError(iface);
3246 } else {
3247 return ConnectivityManager.TETHER_ERROR_UNSUPPORTED;
3248 }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08003249 }
3250
3251 // TODO - proper iface API for selection by property, inspection, etc
3252 public String[] getTetherableUsbRegexs() {
3253 enforceTetherAccessPermission();
3254 if (isTetheringSupported()) {
3255 return mTethering.getTetherableUsbRegexs();
3256 } else {
3257 return new String[0];
3258 }
3259 }
3260
3261 public String[] getTetherableWifiRegexs() {
3262 enforceTetherAccessPermission();
3263 if (isTetheringSupported()) {
3264 return mTethering.getTetherableWifiRegexs();
3265 } else {
3266 return new String[0];
3267 }
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08003268 }
3269
Danica Chang6fdd0c62010-08-11 14:54:43 -07003270 public String[] getTetherableBluetoothRegexs() {
3271 enforceTetherAccessPermission();
3272 if (isTetheringSupported()) {
3273 return mTethering.getTetherableBluetoothRegexs();
3274 } else {
3275 return new String[0];
3276 }
3277 }
3278
Mike Lockwood6c2260b2011-07-19 13:04:47 -07003279 public int setUsbTethering(boolean enable) {
Robert Greenwalt5a6bdc42013-02-15 10:56:35 -08003280 enforceTetherChangePermission();
Mike Lockwood6c2260b2011-07-19 13:04:47 -07003281 if (isTetheringSupported()) {
3282 return mTethering.setUsbTethering(enable);
3283 } else {
3284 return ConnectivityManager.TETHER_ERROR_UNSUPPORTED;
3285 }
3286 }
3287
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08003288 // TODO - move iface listing, queries, etc to new module
3289 // javadoc from interface
3290 public String[] getTetherableIfaces() {
Robert Greenwalt2a091d72010-02-11 18:18:40 -08003291 enforceTetherAccessPermission();
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08003292 return mTethering.getTetherableIfaces();
3293 }
3294
3295 public String[] getTetheredIfaces() {
Robert Greenwalt2a091d72010-02-11 18:18:40 -08003296 enforceTetherAccessPermission();
Robert Greenwaltd0e18ff2010-01-26 11:40:34 -08003297 return mTethering.getTetheredIfaces();
3298 }
Robert Greenwalt2a091d72010-02-11 18:18:40 -08003299
Robert Greenwalt5a735062010-03-02 17:25:02 -08003300 public String[] getTetheringErroredIfaces() {
3301 enforceTetherAccessPermission();
3302 return mTethering.getErroredIfaces();
3303 }
3304
Robert Greenwalt2a091d72010-02-11 18:18:40 -08003305 // if ro.tether.denied = true we default to no tethering
3306 // gservices could set the secure setting to 1 though to enable it on a build where it
3307 // had previously been turned off.
3308 public boolean isTetheringSupported() {
3309 enforceTetherAccessPermission();
3310 int defaultVal = (SystemProperties.get("ro.tether.denied").equals("true") ? 0 : 1);
Jeff Brownbf6f6f92012-09-25 15:03:20 -07003311 boolean tetherEnabledInSettings = (Settings.Global.getInt(mContext.getContentResolver(),
3312 Settings.Global.TETHER_SUPPORTED, defaultVal) != 0);
Robert Greenwaltc13368b2013-07-18 14:24:42 -07003313 return tetherEnabledInSettings && ((mTethering.getTetherableUsbRegexs().length != 0 ||
3314 mTethering.getTetherableWifiRegexs().length != 0 ||
3315 mTethering.getTetherableBluetoothRegexs().length != 0) &&
3316 mTethering.getUpstreamIfaceTypes().length != 0);
Robert Greenwalt2a091d72010-02-11 18:18:40 -08003317 }
Robert Greenwalt14f2ef42010-06-15 12:19:37 -07003318
3319 // An API NetworkStateTrackers can call when they lose their network.
3320 // This will automatically be cleared after X seconds or a network becomes CONNECTED,
3321 // whichever happens first. The timer is started by the first caller and not
3322 // restarted by subsequent callers.
3323 public void requestNetworkTransitionWakelock(String forWhom) {
3324 enforceConnectivityInternalPermission();
3325 synchronized (this) {
3326 if (mNetTransitionWakeLock.isHeld()) return;
3327 mNetTransitionWakeLockSerialNumber++;
3328 mNetTransitionWakeLock.acquire();
3329 mNetTransitionWakeLockCausedBy = forWhom;
3330 }
3331 mHandler.sendMessageDelayed(mHandler.obtainMessage(
Robert Greenwaltf3331232010-09-24 14:32:21 -07003332 EVENT_CLEAR_NET_TRANSITION_WAKELOCK,
Robert Greenwalt14f2ef42010-06-15 12:19:37 -07003333 mNetTransitionWakeLockSerialNumber, 0),
3334 mNetTransitionWakeLockTimeout);
3335 return;
3336 }
Robert Greenwaltca4306c2010-09-09 13:15:32 -07003337
Robert Greenwaltd7085fc2010-09-08 15:24:47 -07003338 // 100 percent is full good, 0 is full bad.
3339 public void reportInetCondition(int networkType, int percentage) {
Robert Greenwalt58d4c592011-08-02 17:18:41 -07003340 if (VDBG) log("reportNetworkCondition(" + networkType + ", " + percentage + ")");
Robert Greenwaltd7085fc2010-09-08 15:24:47 -07003341 mContext.enforceCallingOrSelfPermission(
3342 android.Manifest.permission.STATUS_BAR,
3343 "ConnectivityService");
3344
Robert Greenwalt4e8dfef2010-09-20 14:35:25 -07003345 if (DBG) {
3346 int pid = getCallingPid();
3347 int uid = getCallingUid();
3348 String s = pid + "(" + uid + ") reports inet is " +
3349 (percentage > 50 ? "connected" : "disconnected") + " (" + percentage + ") on " +
3350 "network Type " + networkType + " at " + GregorianCalendar.getInstance().getTime();
3351 mInetLog.add(s);
3352 while(mInetLog.size() > INET_CONDITION_LOG_MAX_SIZE) {
3353 mInetLog.remove(0);
3354 }
3355 }
Robert Greenwaltd7085fc2010-09-08 15:24:47 -07003356 mHandler.sendMessage(mHandler.obtainMessage(
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003357 EVENT_INET_CONDITION_CHANGE, networkType, percentage));
3358 }
3359
3360 private void handleInetConditionChange(int netType, int condition) {
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003361 if (mActiveDefaultNetwork == -1) {
Wink Savillec9acde92011-09-21 11:05:43 -07003362 if (DBG) log("handleInetConditionChange: no active default network - ignore");
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003363 return;
3364 }
3365 if (mActiveDefaultNetwork != netType) {
Wink Savillec9acde92011-09-21 11:05:43 -07003366 if (DBG) log("handleInetConditionChange: net=" + netType +
3367 " != default=" + mActiveDefaultNetwork + " - ignore");
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003368 return;
3369 }
Wink Savillec9acde92011-09-21 11:05:43 -07003370 if (VDBG) {
3371 log("handleInetConditionChange: net=" +
3372 netType + ", condition=" + condition +
Wink Saville5b7573e2013-01-31 00:30:13 +00003373 ",mActiveDefaultNetwork=" + mActiveDefaultNetwork);
Wink Savillec9acde92011-09-21 11:05:43 -07003374 }
Wink Saville5b7573e2013-01-31 00:30:13 +00003375 mDefaultInetCondition = condition;
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003376 int delay;
3377 if (mInetConditionChangeInFlight == false) {
Wink Savillec9acde92011-09-21 11:05:43 -07003378 if (VDBG) log("handleInetConditionChange: starting a change hold");
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003379 // setup a new hold to debounce this
Wink Saville5b7573e2013-01-31 00:30:13 +00003380 if (mDefaultInetCondition > 50) {
Jeff Sharkey625239a2012-09-26 22:03:49 -07003381 delay = Settings.Global.getInt(mContext.getContentResolver(),
3382 Settings.Global.INET_CONDITION_DEBOUNCE_UP_DELAY, 500);
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003383 } else {
Jeff Sharkey625239a2012-09-26 22:03:49 -07003384 delay = Settings.Global.getInt(mContext.getContentResolver(),
3385 Settings.Global.INET_CONDITION_DEBOUNCE_DOWN_DELAY, 3000);
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003386 }
3387 mInetConditionChangeInFlight = true;
3388 mHandler.sendMessageDelayed(mHandler.obtainMessage(EVENT_INET_CONDITION_HOLD_END,
Wink Saville5b7573e2013-01-31 00:30:13 +00003389 mActiveDefaultNetwork, mDefaultConnectionSequence), delay);
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003390 } else {
Wink Savillec9acde92011-09-21 11:05:43 -07003391 // we've set the new condition, when this hold ends that will get picked up
3392 if (VDBG) log("handleInetConditionChange: currently in hold - not setting new end evt");
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003393 }
3394 }
3395
Wink Saville5b7573e2013-01-31 00:30:13 +00003396 private void handleInetConditionHoldEnd(int netType, int sequence) {
Wink Savillec9acde92011-09-21 11:05:43 -07003397 if (DBG) {
Wink Saville5b7573e2013-01-31 00:30:13 +00003398 log("handleInetConditionHoldEnd: net=" + netType +
3399 ", condition=" + mDefaultInetCondition +
3400 ", published condition=" + mDefaultInetConditionPublished);
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003401 }
3402 mInetConditionChangeInFlight = false;
3403
3404 if (mActiveDefaultNetwork == -1) {
Wink Savillec9acde92011-09-21 11:05:43 -07003405 if (DBG) log("handleInetConditionHoldEnd: no active default network - ignoring");
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003406 return;
3407 }
3408 if (mDefaultConnectionSequence != sequence) {
Wink Savillec9acde92011-09-21 11:05:43 -07003409 if (DBG) log("handleInetConditionHoldEnd: event hold for obsolete network - ignoring");
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003410 return;
3411 }
Wink Saville5b7573e2013-01-31 00:30:13 +00003412 // TODO: Figure out why this optimization sometimes causes a
3413 // change in mDefaultInetCondition to be missed and the
3414 // UI to not be updated.
3415 //if (mDefaultInetConditionPublished == mDefaultInetCondition) {
3416 // if (DBG) log("no change in condition - aborting");
3417 // return;
3418 //}
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003419 NetworkInfo networkInfo = mNetTrackers[mActiveDefaultNetwork].getNetworkInfo();
3420 if (networkInfo.isConnected() == false) {
Wink Savillec9acde92011-09-21 11:05:43 -07003421 if (DBG) log("handleInetConditionHoldEnd: default network not connected - ignoring");
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003422 return;
3423 }
Wink Saville5b7573e2013-01-31 00:30:13 +00003424 mDefaultInetConditionPublished = mDefaultInetCondition;
Robert Greenwalt8dcc28b2010-09-23 10:05:56 -07003425 sendInetConditionBroadcast(networkInfo);
3426 return;
Robert Greenwaltd7085fc2010-09-08 15:24:47 -07003427 }
Robert Greenwalt434203a2010-10-11 16:00:27 -07003428
Chia-chi Yeh4c12a472011-10-03 15:34:04 -07003429 public ProxyProperties getProxy() {
Robert Greenwalte436e4f2013-02-22 14:57:00 -08003430 // this information is already available as a world read/writable jvm property
3431 // so this API change wouldn't have a benifit. It also breaks the passing
3432 // of proxy info to all the JVMs.
3433 // enforceAccessPermission();
Robert Greenwalt00e8d4c2013-04-05 17:14:19 -07003434 synchronized (mProxyLock) {
Jason Monk602b2322013-07-03 17:04:33 -04003435 ProxyProperties ret = mGlobalProxy;
3436 if ((ret == null) && !mDefaultProxyDisabled) ret = mDefaultProxy;
3437 return ret;
Chia-chi Yeh4c12a472011-10-03 15:34:04 -07003438 }
Robert Greenwalt434203a2010-10-11 16:00:27 -07003439 }
3440
3441 public void setGlobalProxy(ProxyProperties proxyProperties) {
Robert Greenwalta9bebc22013-04-10 15:32:18 -07003442 enforceConnectivityInternalPermission();
Jason Monk602b2322013-07-03 17:04:33 -04003443
Robert Greenwalt00e8d4c2013-04-05 17:14:19 -07003444 synchronized (mProxyLock) {
Robert Greenwalt434203a2010-10-11 16:00:27 -07003445 if (proxyProperties == mGlobalProxy) return;
3446 if (proxyProperties != null && proxyProperties.equals(mGlobalProxy)) return;
3447 if (mGlobalProxy != null && mGlobalProxy.equals(proxyProperties)) return;
3448
3449 String host = "";
3450 int port = 0;
3451 String exclList = "";
Jason Monk602b2322013-07-03 17:04:33 -04003452 String pacFileUrl = "";
3453 if (proxyProperties != null && (!TextUtils.isEmpty(proxyProperties.getHost()) ||
3454 !TextUtils.isEmpty(proxyProperties.getPacFileUrl()))) {
Raj Mamadgi92d024912013-11-11 13:52:58 -08003455 if (!proxyProperties.isValid()) {
3456 if (DBG)
3457 log("Invalid proxy properties, ignoring: " + proxyProperties.toString());
3458 return;
3459 }
Robert Greenwalt434203a2010-10-11 16:00:27 -07003460 mGlobalProxy = new ProxyProperties(proxyProperties);
3461 host = mGlobalProxy.getHost();
3462 port = mGlobalProxy.getPort();
3463 exclList = mGlobalProxy.getExclusionList();
Jason Monk602b2322013-07-03 17:04:33 -04003464 if (proxyProperties.getPacFileUrl() != null) {
3465 pacFileUrl = proxyProperties.getPacFileUrl();
3466 }
Robert Greenwalt434203a2010-10-11 16:00:27 -07003467 } else {
3468 mGlobalProxy = null;
3469 }
3470 ContentResolver res = mContext.getContentResolver();
Robert Greenwalta9bebc22013-04-10 15:32:18 -07003471 final long token = Binder.clearCallingIdentity();
3472 try {
3473 Settings.Global.putString(res, Settings.Global.GLOBAL_HTTP_PROXY_HOST, host);
3474 Settings.Global.putInt(res, Settings.Global.GLOBAL_HTTP_PROXY_PORT, port);
3475 Settings.Global.putString(res, Settings.Global.GLOBAL_HTTP_PROXY_EXCLUSION_LIST,
3476 exclList);
Jason Monk602b2322013-07-03 17:04:33 -04003477 Settings.Global.putString(res, Settings.Global.GLOBAL_HTTP_PROXY_PAC, pacFileUrl);
Robert Greenwalta9bebc22013-04-10 15:32:18 -07003478 } finally {
3479 Binder.restoreCallingIdentity(token);
3480 }
Robert Greenwalt434203a2010-10-11 16:00:27 -07003481 }
3482
3483 if (mGlobalProxy == null) {
3484 proxyProperties = mDefaultProxy;
3485 }
Robert Greenwalt00e8d4c2013-04-05 17:14:19 -07003486 sendProxyBroadcast(proxyProperties);
Robert Greenwalt434203a2010-10-11 16:00:27 -07003487 }
3488
Robert Greenwaltb7090d62010-12-02 11:31:00 -08003489 private void loadGlobalProxy() {
3490 ContentResolver res = mContext.getContentResolver();
Jeff Sharkey625239a2012-09-26 22:03:49 -07003491 String host = Settings.Global.getString(res, Settings.Global.GLOBAL_HTTP_PROXY_HOST);
3492 int port = Settings.Global.getInt(res, Settings.Global.GLOBAL_HTTP_PROXY_PORT, 0);
3493 String exclList = Settings.Global.getString(res,
3494 Settings.Global.GLOBAL_HTTP_PROXY_EXCLUSION_LIST);
Jason Monk602b2322013-07-03 17:04:33 -04003495 String pacFileUrl = Settings.Global.getString(res, Settings.Global.GLOBAL_HTTP_PROXY_PAC);
3496 if (!TextUtils.isEmpty(host) || !TextUtils.isEmpty(pacFileUrl)) {
3497 ProxyProperties proxyProperties;
3498 if (!TextUtils.isEmpty(pacFileUrl)) {
3499 proxyProperties = new ProxyProperties(pacFileUrl);
3500 } else {
3501 proxyProperties = new ProxyProperties(host, port, exclList);
3502 }
Raj Mamadgi92d024912013-11-11 13:52:58 -08003503 if (!proxyProperties.isValid()) {
3504 if (DBG) log("Invalid proxy properties, ignoring: " + proxyProperties.toString());
3505 return;
3506 }
3507
Robert Greenwalt00e8d4c2013-04-05 17:14:19 -07003508 synchronized (mProxyLock) {
Robert Greenwaltb7090d62010-12-02 11:31:00 -08003509 mGlobalProxy = proxyProperties;
3510 }
3511 }
3512 }
3513
Robert Greenwalt434203a2010-10-11 16:00:27 -07003514 public ProxyProperties getGlobalProxy() {
Robert Greenwalte436e4f2013-02-22 14:57:00 -08003515 // this information is already available as a world read/writable jvm property
3516 // so this API change wouldn't have a benifit. It also breaks the passing
3517 // of proxy info to all the JVMs.
3518 // enforceAccessPermission();
Robert Greenwalt00e8d4c2013-04-05 17:14:19 -07003519 synchronized (mProxyLock) {
Robert Greenwalt434203a2010-10-11 16:00:27 -07003520 return mGlobalProxy;
3521 }
3522 }
3523
Chia-chi Yeh4c12a472011-10-03 15:34:04 -07003524 private void handleApplyDefaultProxy(ProxyProperties proxy) {
Jason Monk602b2322013-07-03 17:04:33 -04003525 if (proxy != null && TextUtils.isEmpty(proxy.getHost())
3526 && TextUtils.isEmpty(proxy.getPacFileUrl())) {
Chia-chi Yeh4c12a472011-10-03 15:34:04 -07003527 proxy = null;
3528 }
Robert Greenwalt00e8d4c2013-04-05 17:14:19 -07003529 synchronized (mProxyLock) {
Robert Greenwalt434203a2010-10-11 16:00:27 -07003530 if (mDefaultProxy != null && mDefaultProxy.equals(proxy)) return;
Robert Greenwalt00e8d4c2013-04-05 17:14:19 -07003531 if (mDefaultProxy == proxy) return; // catches repeated nulls
Robert Greenwalta8dae992013-11-18 09:43:59 -08003532 if (proxy != null && !proxy.isValid()) {
Raj Mamadgi92d024912013-11-11 13:52:58 -08003533 if (DBG) log("Invalid proxy properties, ignoring: " + proxy.toString());
3534 return;
3535 }
Chia-chi Yeh4c12a472011-10-03 15:34:04 -07003536 mDefaultProxy = proxy;
3537
Robert Greenwalt00e8d4c2013-04-05 17:14:19 -07003538 if (mGlobalProxy != null) return;
Chia-chi Yeh4c12a472011-10-03 15:34:04 -07003539 if (!mDefaultProxyDisabled) {
3540 sendProxyBroadcast(proxy);
Robert Greenwalt434203a2010-10-11 16:00:27 -07003541 }
3542 }
Robert Greenwalt434203a2010-10-11 16:00:27 -07003543 }
3544
3545 private void handleDeprecatedGlobalHttpProxy() {
Jeff Sharkey625239a2012-09-26 22:03:49 -07003546 String proxy = Settings.Global.getString(mContext.getContentResolver(),
3547 Settings.Global.HTTP_PROXY);
Robert Greenwalt434203a2010-10-11 16:00:27 -07003548 if (!TextUtils.isEmpty(proxy)) {
3549 String data[] = proxy.split(":");
Andreas Huber7b8e1ea2013-05-28 15:17:37 -07003550 if (data.length == 0) {
3551 return;
3552 }
3553
Robert Greenwalt434203a2010-10-11 16:00:27 -07003554 String proxyHost = data[0];
3555 int proxyPort = 8080;
3556 if (data.length > 1) {
3557 try {
3558 proxyPort = Integer.parseInt(data[1]);
3559 } catch (NumberFormatException e) {
3560 return;
3561 }
3562 }
3563 ProxyProperties p = new ProxyProperties(data[0], proxyPort, "");
3564 setGlobalProxy(p);
3565 }
3566 }
3567
3568 private void sendProxyBroadcast(ProxyProperties proxy) {
Robert Greenwalt55985be2010-12-23 15:51:10 -08003569 if (proxy == null) proxy = new ProxyProperties("", 0, "");
Jason Monk6f8a68f2013-08-23 19:21:25 -04003570 if (mPacManager.setCurrentProxyScriptUrl(proxy)) return;
Robert Greenwalt58d4c592011-08-02 17:18:41 -07003571 if (DBG) log("sending Proxy Broadcast for " + proxy);
Robert Greenwalt434203a2010-10-11 16:00:27 -07003572 Intent intent = new Intent(Proxy.PROXY_CHANGE_ACTION);
Stan Chesnuttb35d67a2011-01-06 11:00:19 -08003573 intent.addFlags(Intent.FLAG_RECEIVER_REPLACE_PENDING |
3574 Intent.FLAG_RECEIVER_REGISTERED_ONLY_BEFORE_BOOT);
Robert Greenwalt434203a2010-10-11 16:00:27 -07003575 intent.putExtra(Proxy.EXTRA_PROXY_INFO, proxy);
Dianne Hackbornfd8bf5c2012-09-04 18:48:37 -07003576 final long ident = Binder.clearCallingIdentity();
3577 try {
3578 mContext.sendStickyBroadcastAsUser(intent, UserHandle.ALL);
3579 } finally {
3580 Binder.restoreCallingIdentity(ident);
3581 }
Robert Greenwalt434203a2010-10-11 16:00:27 -07003582 }
3583
3584 private static class SettingsObserver extends ContentObserver {
3585 private int mWhat;
3586 private Handler mHandler;
3587 SettingsObserver(Handler handler, int what) {
3588 super(handler);
3589 mHandler = handler;
3590 mWhat = what;
3591 }
3592
3593 void observe(Context context) {
3594 ContentResolver resolver = context.getContentResolver();
Jeff Sharkey625239a2012-09-26 22:03:49 -07003595 resolver.registerContentObserver(Settings.Global.getUriFor(
3596 Settings.Global.HTTP_PROXY), false, this);
Robert Greenwalt434203a2010-10-11 16:00:27 -07003597 }
3598
3599 @Override
3600 public void onChange(boolean selfChange) {
3601 mHandler.obtainMessage(mWhat).sendToTarget();
3602 }
3603 }
Wink Savilleed9c02b2010-12-03 12:01:38 -08003604
Jeff Sharkeyfb878b62012-07-26 18:32:30 -07003605 private static void log(String s) {
Wink Savilleed9c02b2010-12-03 12:01:38 -08003606 Slog.d(TAG, s);
3607 }
3608
Jeff Sharkeyfb878b62012-07-26 18:32:30 -07003609 private static void loge(String s) {
Wink Savilleed9c02b2010-12-03 12:01:38 -08003610 Slog.e(TAG, s);
3611 }
Chia-chi Yehff3bdca2011-05-23 17:26:46 -07003612
repo syncaea743a2011-07-29 23:55:49 -07003613 int convertFeatureToNetworkType(int networkType, String feature) {
3614 int usedNetworkType = networkType;
3615
3616 if(networkType == ConnectivityManager.TYPE_MOBILE) {
3617 if (TextUtils.equals(feature, Phone.FEATURE_ENABLE_MMS)) {
3618 usedNetworkType = ConnectivityManager.TYPE_MOBILE_MMS;
3619 } else if (TextUtils.equals(feature, Phone.FEATURE_ENABLE_SUPL)) {
3620 usedNetworkType = ConnectivityManager.TYPE_MOBILE_SUPL;
3621 } else if (TextUtils.equals(feature, Phone.FEATURE_ENABLE_DUN) ||
3622 TextUtils.equals(feature, Phone.FEATURE_ENABLE_DUN_ALWAYS)) {
3623 usedNetworkType = ConnectivityManager.TYPE_MOBILE_DUN;
3624 } else if (TextUtils.equals(feature, Phone.FEATURE_ENABLE_HIPRI)) {
3625 usedNetworkType = ConnectivityManager.TYPE_MOBILE_HIPRI;
3626 } else if (TextUtils.equals(feature, Phone.FEATURE_ENABLE_FOTA)) {
3627 usedNetworkType = ConnectivityManager.TYPE_MOBILE_FOTA;
3628 } else if (TextUtils.equals(feature, Phone.FEATURE_ENABLE_IMS)) {
3629 usedNetworkType = ConnectivityManager.TYPE_MOBILE_IMS;
3630 } else if (TextUtils.equals(feature, Phone.FEATURE_ENABLE_CBS)) {
3631 usedNetworkType = ConnectivityManager.TYPE_MOBILE_CBS;
3632 } else {
3633 Slog.e(TAG, "Can't match any mobile netTracker!");
3634 }
3635 } else if (networkType == ConnectivityManager.TYPE_WIFI) {
3636 if (TextUtils.equals(feature, "p2p")) {
3637 usedNetworkType = ConnectivityManager.TYPE_WIFI_P2P;
3638 } else {
3639 Slog.e(TAG, "Can't match any wifi netTracker!");
3640 }
3641 } else {
3642 Slog.e(TAG, "Unexpected network type");
Wink Saville2b8bcfe2011-02-24 17:58:51 -08003643 }
repo syncaea743a2011-07-29 23:55:49 -07003644 return usedNetworkType;
Wink Saville2b8bcfe2011-02-24 17:58:51 -08003645 }
Jeff Sharkeyc006f1a2011-05-19 17:12:49 -07003646
3647 private static <T> T checkNotNull(T value, String message) {
3648 if (value == null) {
3649 throw new NullPointerException(message);
3650 }
3651 return value;
3652 }
Chia-chi Yehff3bdca2011-05-23 17:26:46 -07003653
Chia-chi Yeh04ba25c2011-06-15 17:07:27 -07003654 /**
3655 * Protect a socket from VPN routing rules. This method is used by
Chia-chi Yeh2e467642011-07-04 03:23:12 -07003656 * VpnBuilder and not available in ConnectivityManager. Permissions
3657 * are checked in Vpn class.
Chia-chi Yeh04ba25c2011-06-15 17:07:27 -07003658 * @hide
3659 */
Chia-chi Yehff3bdca2011-05-23 17:26:46 -07003660 @Override
Chia-chi Yeh5779c9c2011-07-14 16:19:19 -07003661 public boolean protectVpn(ParcelFileDescriptor socket) {
Jeff Sharkey69ddab42012-08-25 00:05:46 -07003662 throwIfLockdownEnabled();
Chia-chi Yeh5779c9c2011-07-14 16:19:19 -07003663 try {
3664 int type = mActiveDefaultNetwork;
Chad Brubaker4ca19e82013-06-14 11:16:51 -07003665 int user = UserHandle.getUserId(Binder.getCallingUid());
Robert Greenwalt665e1ae2012-08-21 19:27:00 -07003666 if (ConnectivityManager.isNetworkTypeValid(type) && mNetTrackers[type] != null) {
Chad Brubaker4ca19e82013-06-14 11:16:51 -07003667 synchronized(mVpns) {
3668 mVpns.get(user).protect(socket,
3669 mNetTrackers[type].getLinkProperties().getInterfaceName());
3670 }
Chia-chi Yeh5779c9c2011-07-14 16:19:19 -07003671 return true;
3672 }
3673 } catch (Exception e) {
3674 // ignore
3675 } finally {
3676 try {
3677 socket.close();
3678 } catch (Exception e) {
3679 // ignore
3680 }
3681 }
3682 return false;
Chia-chi Yehff3bdca2011-05-23 17:26:46 -07003683 }
3684
Chia-chi Yeh04ba25c2011-06-15 17:07:27 -07003685 /**
3686 * Prepare for a VPN application. This method is used by VpnDialogs
Chia-chi Yeh2e467642011-07-04 03:23:12 -07003687 * and not available in ConnectivityManager. Permissions are checked
3688 * in Vpn class.
Chia-chi Yeh04ba25c2011-06-15 17:07:27 -07003689 * @hide
3690 */
Chia-chi Yehff3bdca2011-05-23 17:26:46 -07003691 @Override
Chia-chi Yeh100155a2011-07-03 16:52:38 -07003692 public boolean prepareVpn(String oldPackage, String newPackage) {
Jeff Sharkey69ddab42012-08-25 00:05:46 -07003693 throwIfLockdownEnabled();
Chad Brubaker4ca19e82013-06-14 11:16:51 -07003694 int user = UserHandle.getUserId(Binder.getCallingUid());
3695 synchronized(mVpns) {
3696 return mVpns.get(user).prepare(oldPackage, newPackage);
3697 }
Chia-chi Yehff3bdca2011-05-23 17:26:46 -07003698 }
3699
Chad Brubakerd475c702013-07-11 13:29:30 -07003700 @Override
3701 public void markSocketAsUser(ParcelFileDescriptor socket, int uid) {
3702 enforceMarkNetworkSocketPermission();
3703 final long token = Binder.clearCallingIdentity();
3704 try {
3705 int mark = mNetd.getMarkForUid(uid);
3706 // Clear the mark on the socket if no mark is needed to prevent socket reuse issues
3707 if (mark == -1) {
3708 mark = 0;
3709 }
3710 NetworkUtils.markSocket(socket.getFd(), mark);
3711 } catch (RemoteException e) {
3712 } finally {
3713 Binder.restoreCallingIdentity(token);
3714 }
3715 }
3716
Chia-chi Yeh04ba25c2011-06-15 17:07:27 -07003717 /**
3718 * Configure a TUN interface and return its file descriptor. Parameters
3719 * are encoded and opaque to this class. This method is used by VpnBuilder
Chia-chi Yeh2e467642011-07-04 03:23:12 -07003720 * and not available in ConnectivityManager. Permissions are checked in
3721 * Vpn class.
Chia-chi Yeh04ba25c2011-06-15 17:07:27 -07003722 * @hide
3723 */
Chia-chi Yehff3bdca2011-05-23 17:26:46 -07003724 @Override
Chia-chi Yeh04ba25c2011-06-15 17:07:27 -07003725 public ParcelFileDescriptor establishVpn(VpnConfig config) {
Jeff Sharkey69ddab42012-08-25 00:05:46 -07003726 throwIfLockdownEnabled();
Chad Brubaker4ca19e82013-06-14 11:16:51 -07003727 int user = UserHandle.getUserId(Binder.getCallingUid());
3728 synchronized(mVpns) {
3729 return mVpns.get(user).establish(config);
3730 }
Chia-chi Yehff3bdca2011-05-23 17:26:46 -07003731 }
3732
Chia-chi Yeh77fd4852011-07-02 17:15:00 -07003733 /**
Jeff Sharkey82f85212012-08-24 11:17:25 -07003734 * Start legacy VPN, controlling native daemons as needed. Creates a
3735 * secondary thread to perform connection work, returning quickly.
Chia-chi Yeh77fd4852011-07-02 17:15:00 -07003736 */
3737 @Override
Jeff Sharkey82f85212012-08-24 11:17:25 -07003738 public void startLegacyVpn(VpnProfile profile) {
Jeff Sharkey69ddab42012-08-25 00:05:46 -07003739 throwIfLockdownEnabled();
Jeff Sharkey82f85212012-08-24 11:17:25 -07003740 final LinkProperties egress = getActiveLinkProperties();
3741 if (egress == null) {
3742 throw new IllegalStateException("Missing active network connection");
3743 }
Chad Brubaker4ca19e82013-06-14 11:16:51 -07003744 int user = UserHandle.getUserId(Binder.getCallingUid());
3745 synchronized(mVpns) {
3746 mVpns.get(user).startLegacyVpn(profile, mKeyStore, egress);
3747 }
Chia-chi Yeh2e467642011-07-04 03:23:12 -07003748 }
3749
3750 /**
3751 * Return the information of the ongoing legacy VPN. This method is used
3752 * by VpnSettings and not available in ConnectivityManager. Permissions
3753 * are checked in Vpn class.
3754 * @hide
3755 */
3756 @Override
3757 public LegacyVpnInfo getLegacyVpnInfo() {
Jeff Sharkey69ddab42012-08-25 00:05:46 -07003758 throwIfLockdownEnabled();
Chad Brubaker4ca19e82013-06-14 11:16:51 -07003759 int user = UserHandle.getUserId(Binder.getCallingUid());
3760 synchronized(mVpns) {
3761 return mVpns.get(user).getLegacyVpnInfo();
3762 }
Chia-chi Yeh77fd4852011-07-02 17:15:00 -07003763 }
3764
Chia-chi Yehff3bdca2011-05-23 17:26:46 -07003765 /**
Chad Brubakerbf6ff2c2013-07-16 18:59:12 -07003766 * Returns the information of the ongoing VPN. This method is used by VpnDialogs and
3767 * not available in ConnectivityManager.
3768 * Permissions are checked in Vpn class.
3769 * @hide
3770 */
3771 @Override
3772 public VpnConfig getVpnConfig() {
3773 int user = UserHandle.getUserId(Binder.getCallingUid());
3774 synchronized(mVpns) {
3775 return mVpns.get(user).getVpnConfig();
3776 }
3777 }
3778
3779 /**
Chia-chi Yehff3bdca2011-05-23 17:26:46 -07003780 * Callback for VPN subsystem. Currently VPN is not adapted to the service
3781 * through NetworkStateTracker since it works differently. For example, it
3782 * needs to override DNS servers but never takes the default routes. It
3783 * relies on another data network, and it could keep existing connections
3784 * alive after reconnecting, switching between networks, or even resuming
3785 * from deep sleep. Calls from applications should be done synchronously
3786 * to avoid race conditions. As these are all hidden APIs, refactoring can
3787 * be done whenever a better abstraction is developed.
3788 */
3789 public class VpnCallback {
Chia-chi Yehff3bdca2011-05-23 17:26:46 -07003790 private VpnCallback() {
3791 }
3792
Jeff Sharkey899223b2012-08-04 15:24:58 -07003793 public void onStateChanged(NetworkInfo info) {
Jeff Sharkey69ddab42012-08-25 00:05:46 -07003794 mHandler.obtainMessage(EVENT_VPN_STATE_CHANGED, info).sendToTarget();
Jeff Sharkey899223b2012-08-04 15:24:58 -07003795 }
3796
Chad Brubaker4ca19e82013-06-14 11:16:51 -07003797 public void override(String iface, List<String> dnsServers, List<String> searchDomains) {
Chia-chi Yeh44bb2512011-07-14 18:01:57 -07003798 if (dnsServers == null) {
3799 restore();
3800 return;
3801 }
3802
3803 // Convert DNS servers into addresses.
3804 List<InetAddress> addresses = new ArrayList<InetAddress>();
3805 for (String address : dnsServers) {
3806 // Double check the addresses and remove invalid ones.
3807 try {
3808 addresses.add(InetAddress.parseNumericAddress(address));
3809 } catch (Exception e) {
3810 // ignore
3811 }
3812 }
3813 if (addresses.isEmpty()) {
3814 restore();
3815 return;
3816 }
3817
3818 // Concatenate search domains into a string.
3819 StringBuilder buffer = new StringBuilder();
3820 if (searchDomains != null) {
3821 for (String domain : searchDomains) {
3822 buffer.append(domain).append(' ');
3823 }
3824 }
3825 String domains = buffer.toString().trim();
3826
3827 // Apply DNS changes.
Chia-chi Yeh44bb2512011-07-14 18:01:57 -07003828 synchronized (mDnsLock) {
Chad Brubaker20a7e882013-07-23 17:13:36 -07003829 updateDnsLocked("VPN", iface, addresses, domains, false);
Chia-chi Yeh44bb2512011-07-14 18:01:57 -07003830 }
Chia-chi Yeh44bb2512011-07-14 18:01:57 -07003831
Robert Greenwalt00e8d4c2013-04-05 17:14:19 -07003832 // Temporarily disable the default proxy (not global).
3833 synchronized (mProxyLock) {
Chia-chi Yeh4c12a472011-10-03 15:34:04 -07003834 mDefaultProxyDisabled = true;
Robert Greenwalt00e8d4c2013-04-05 17:14:19 -07003835 if (mGlobalProxy == null && mDefaultProxy != null) {
Chia-chi Yeh4c12a472011-10-03 15:34:04 -07003836 sendProxyBroadcast(null);
3837 }
3838 }
3839
3840 // TODO: support proxy per network.
Chia-chi Yehff3bdca2011-05-23 17:26:46 -07003841 }
3842
Chia-chi Yeh44bb2512011-07-14 18:01:57 -07003843 public void restore() {
Robert Greenwalt00e8d4c2013-04-05 17:14:19 -07003844 synchronized (mProxyLock) {
Chia-chi Yeh4c12a472011-10-03 15:34:04 -07003845 mDefaultProxyDisabled = false;
Robert Greenwalt00e8d4c2013-04-05 17:14:19 -07003846 if (mGlobalProxy == null && mDefaultProxy != null) {
Chia-chi Yeh4c12a472011-10-03 15:34:04 -07003847 sendProxyBroadcast(mDefaultProxy);
3848 }
3849 }
Chia-chi Yehff3bdca2011-05-23 17:26:46 -07003850 }
Chad Brubaker4ca19e82013-06-14 11:16:51 -07003851
3852 public void protect(ParcelFileDescriptor socket) {
3853 try {
3854 final int mark = mNetd.getMarkForProtect();
3855 NetworkUtils.markSocket(socket.getFd(), mark);
3856 } catch (RemoteException e) {
3857 }
3858 }
3859
3860 public void setRoutes(String interfaze, List<RouteInfo> routes) {
3861 for (RouteInfo route : routes) {
3862 try {
3863 mNetd.setMarkedForwardingRoute(interfaze, route);
3864 } catch (RemoteException e) {
3865 }
3866 }
3867 }
3868
3869 public void setMarkedForwarding(String interfaze) {
3870 try {
3871 mNetd.setMarkedForwarding(interfaze);
3872 } catch (RemoteException e) {
3873 }
3874 }
3875
3876 public void clearMarkedForwarding(String interfaze) {
3877 try {
3878 mNetd.clearMarkedForwarding(interfaze);
3879 } catch (RemoteException e) {
3880 }
3881 }
3882
Robert Greenwalt69887e82013-09-24 11:05:57 -07003883 public void addUserForwarding(String interfaze, int uid, boolean forwardDns) {
Chad Brubaker4ca19e82013-06-14 11:16:51 -07003884 int uidStart = uid * UserHandle.PER_USER_RANGE;
3885 int uidEnd = uidStart + UserHandle.PER_USER_RANGE - 1;
Robert Greenwalt69887e82013-09-24 11:05:57 -07003886 addUidForwarding(interfaze, uidStart, uidEnd, forwardDns);
Chad Brubaker4ca19e82013-06-14 11:16:51 -07003887 }
3888
Robert Greenwalt69887e82013-09-24 11:05:57 -07003889 public void clearUserForwarding(String interfaze, int uid, boolean forwardDns) {
Chad Brubaker4ca19e82013-06-14 11:16:51 -07003890 int uidStart = uid * UserHandle.PER_USER_RANGE;
3891 int uidEnd = uidStart + UserHandle.PER_USER_RANGE - 1;
Robert Greenwalt69887e82013-09-24 11:05:57 -07003892 clearUidForwarding(interfaze, uidStart, uidEnd, forwardDns);
Chad Brubaker4ca19e82013-06-14 11:16:51 -07003893 }
3894
Robert Greenwalt69887e82013-09-24 11:05:57 -07003895 public void addUidForwarding(String interfaze, int uidStart, int uidEnd,
3896 boolean forwardDns) {
Chad Brubaker4ca19e82013-06-14 11:16:51 -07003897 try {
3898 mNetd.setUidRangeRoute(interfaze,uidStart, uidEnd);
Robert Greenwalt69887e82013-09-24 11:05:57 -07003899 if (forwardDns) mNetd.setDnsInterfaceForUidRange(interfaze, uidStart, uidEnd);
Chad Brubaker4ca19e82013-06-14 11:16:51 -07003900 } catch (RemoteException e) {
3901 }
3902
3903 }
3904
Robert Greenwalt69887e82013-09-24 11:05:57 -07003905 public void clearUidForwarding(String interfaze, int uidStart, int uidEnd,
3906 boolean forwardDns) {
Chad Brubaker4ca19e82013-06-14 11:16:51 -07003907 try {
3908 mNetd.clearUidRangeRoute(interfaze, uidStart, uidEnd);
Robert Greenwalt69887e82013-09-24 11:05:57 -07003909 if (forwardDns) mNetd.clearDnsInterfaceForUidRange(uidStart, uidEnd);
Chad Brubaker4ca19e82013-06-14 11:16:51 -07003910 } catch (RemoteException e) {
3911 }
3912
3913 }
Chia-chi Yehff3bdca2011-05-23 17:26:46 -07003914 }
Jeff Sharkey69ddab42012-08-25 00:05:46 -07003915
3916 @Override
3917 public boolean updateLockdownVpn() {
Jeff Sharkey3671b1e2013-01-31 17:22:26 -08003918 if (Binder.getCallingUid() != Process.SYSTEM_UID) {
3919 Slog.w(TAG, "Lockdown VPN only available to AID_SYSTEM");
3920 return false;
3921 }
Jeff Sharkey69ddab42012-08-25 00:05:46 -07003922
3923 // Tear down existing lockdown if profile was removed
3924 mLockdownEnabled = LockdownVpnTracker.isEnabled();
3925 if (mLockdownEnabled) {
Kenny Rootb9594ce2013-02-14 10:18:38 -08003926 if (!mKeyStore.isUnlocked()) {
Jeff Sharkey69ddab42012-08-25 00:05:46 -07003927 Slog.w(TAG, "KeyStore locked; unable to create LockdownTracker");
3928 return false;
3929 }
3930
3931 final String profileName = new String(mKeyStore.get(Credentials.LOCKDOWN_VPN));
3932 final VpnProfile profile = VpnProfile.decode(
3933 profileName, mKeyStore.get(Credentials.VPN + profileName));
Chad Brubaker4ca19e82013-06-14 11:16:51 -07003934 int user = UserHandle.getUserId(Binder.getCallingUid());
3935 synchronized(mVpns) {
3936 setLockdownTracker(new LockdownVpnTracker(mContext, mNetd, this, mVpns.get(user),
3937 profile));
3938 }
Jeff Sharkey69ddab42012-08-25 00:05:46 -07003939 } else {
3940 setLockdownTracker(null);
3941 }
3942
3943 return true;
3944 }
3945
3946 /**
3947 * Internally set new {@link LockdownVpnTracker}, shutting down any existing
3948 * {@link LockdownVpnTracker}. Can be {@code null} to disable lockdown.
3949 */
3950 private void setLockdownTracker(LockdownVpnTracker tracker) {
3951 // Shutdown any existing tracker
3952 final LockdownVpnTracker existing = mLockdownTracker;
3953 mLockdownTracker = null;
3954 if (existing != null) {
3955 existing.shutdown();
3956 }
3957
3958 try {
3959 if (tracker != null) {
3960 mNetd.setFirewallEnabled(true);
Jeff Sharkey812085b2013-02-28 16:57:58 -08003961 mNetd.setFirewallInterfaceRule("lo", true);
Jeff Sharkey69ddab42012-08-25 00:05:46 -07003962 mLockdownTracker = tracker;
3963 mLockdownTracker.init();
3964 } else {
3965 mNetd.setFirewallEnabled(false);
3966 }
3967 } catch (RemoteException e) {
3968 // ignored; NMS lives inside system_server
3969 }
3970 }
3971
3972 private void throwIfLockdownEnabled() {
3973 if (mLockdownEnabled) {
3974 throw new IllegalStateException("Unavailable in lockdown mode");
3975 }
3976 }
Robert Greenwalt665e1ae2012-08-21 19:27:00 -07003977
3978 public void supplyMessenger(int networkType, Messenger messenger) {
3979 enforceConnectivityInternalPermission();
3980
3981 if (isNetworkTypeValid(networkType) && mNetTrackers[networkType] != null) {
3982 mNetTrackers[networkType].supplyMessenger(messenger);
3983 }
3984 }
Robert Greenwalt1b0ca9d2013-04-22 11:13:02 -07003985
3986 public int findConnectionTypeForIface(String iface) {
3987 enforceConnectivityInternalPermission();
3988
3989 if (TextUtils.isEmpty(iface)) return ConnectivityManager.TYPE_NONE;
3990 for (NetworkStateTracker tracker : mNetTrackers) {
3991 if (tracker != null) {
3992 LinkProperties lp = tracker.getLinkProperties();
3993 if (lp != null && iface.equals(lp.getInterfaceName())) {
3994 return tracker.getNetworkInfo().getType();
3995 }
3996 }
3997 }
3998 return ConnectivityManager.TYPE_NONE;
3999 }
Wink Savilleab9321d2013-06-29 21:10:57 -07004000
4001 /**
4002 * Have mobile data fail fast if enabled.
4003 *
4004 * @param enabled DctConstants.ENABLED/DISABLED
4005 */
4006 private void setEnableFailFastMobileData(int enabled) {
4007 int tag;
4008
4009 if (enabled == DctConstants.ENABLED) {
4010 tag = mEnableFailFastMobileDataTag.incrementAndGet();
4011 } else {
4012 tag = mEnableFailFastMobileDataTag.get();
4013 }
4014 mHandler.sendMessage(mHandler.obtainMessage(EVENT_ENABLE_FAIL_FAST_MOBILE_DATA, tag,
4015 enabled));
4016 }
4017
Wink Savilledce52cd2013-08-16 17:17:28 -07004018 private boolean isMobileDataStateTrackerReady() {
4019 MobileDataStateTracker mdst =
Wink Saville948282b2013-08-29 08:55:16 -07004020 (MobileDataStateTracker) mNetTrackers[ConnectivityManager.TYPE_MOBILE_HIPRI];
Wink Savilledce52cd2013-08-16 17:17:28 -07004021 return (mdst != null) && (mdst.isReady());
4022 }
4023
Wink Saville948282b2013-08-29 08:55:16 -07004024 /**
4025 * The ResultReceiver resultCode for checkMobileProvisioning (CMP_RESULT_CODE)
4026 */
4027
4028 /**
4029 * No connection was possible to the network.
Wink Saville4fea0412013-09-06 09:53:08 -07004030 * This is NOT a warm sim.
Wink Saville948282b2013-08-29 08:55:16 -07004031 */
Wink Saville4fea0412013-09-06 09:53:08 -07004032 private static final int CMP_RESULT_CODE_NO_CONNECTION = 0;
Wink Saville948282b2013-08-29 08:55:16 -07004033
4034 /**
4035 * A connection was made to the internet, all is well.
Wink Saville4fea0412013-09-06 09:53:08 -07004036 * This is NOT a warm sim.
Wink Saville948282b2013-08-29 08:55:16 -07004037 */
Wink Saville4fea0412013-09-06 09:53:08 -07004038 private static final int CMP_RESULT_CODE_CONNECTABLE = 1;
Wink Saville948282b2013-08-29 08:55:16 -07004039
4040 /**
4041 * A connection was made but no dns server was available to resolve a name to address.
Wink Saville4fea0412013-09-06 09:53:08 -07004042 * This is NOT a warm sim since provisioning network is supported.
Wink Saville948282b2013-08-29 08:55:16 -07004043 */
Wink Saville4fea0412013-09-06 09:53:08 -07004044 private static final int CMP_RESULT_CODE_NO_DNS = 2;
Wink Saville948282b2013-08-29 08:55:16 -07004045
4046 /**
4047 * A connection was made but could not open a TCP connection.
Wink Saville4fea0412013-09-06 09:53:08 -07004048 * This is NOT a warm sim since provisioning network is supported.
Wink Saville948282b2013-08-29 08:55:16 -07004049 */
Wink Saville4fea0412013-09-06 09:53:08 -07004050 private static final int CMP_RESULT_CODE_NO_TCP_CONNECTION = 3;
4051
4052 /**
4053 * A connection was made but there was a redirection, we appear to be in walled garden.
4054 * This is an indication of a warm sim on a mobile network such as T-Mobile.
4055 */
4056 private static final int CMP_RESULT_CODE_REDIRECTED = 4;
Wink Saville948282b2013-08-29 08:55:16 -07004057
4058 /**
4059 * The mobile network is a provisioning network.
Wink Saville4fea0412013-09-06 09:53:08 -07004060 * This is an indication of a warm sim on a mobile network such as AT&T.
Wink Saville948282b2013-08-29 08:55:16 -07004061 */
Wink Saville4fea0412013-09-06 09:53:08 -07004062 private static final int CMP_RESULT_CODE_PROVISIONING_NETWORK = 5;
Wink Saville948282b2013-08-29 08:55:16 -07004063
Wink Saville4fea0412013-09-06 09:53:08 -07004064 private AtomicBoolean mIsCheckingMobileProvisioning = new AtomicBoolean(false);
Wink Saville948282b2013-08-29 08:55:16 -07004065
Wink Savilleab9321d2013-06-29 21:10:57 -07004066 @Override
Wink Saville948282b2013-08-29 08:55:16 -07004067 public int checkMobileProvisioning(int suggestedTimeOutMs) {
4068 int timeOutMs = -1;
4069 if (DBG) log("checkMobileProvisioning: E suggestedTimeOutMs=" + suggestedTimeOutMs);
4070 enforceConnectivityInternalPermission();
Wink Saville68e6c642013-07-02 10:55:14 -07004071
Wink Savilleab9321d2013-06-29 21:10:57 -07004072 final long token = Binder.clearCallingIdentity();
4073 try {
Wink Saville948282b2013-08-29 08:55:16 -07004074 timeOutMs = suggestedTimeOutMs;
4075 if (suggestedTimeOutMs > CheckMp.MAX_TIMEOUT_MS) {
4076 timeOutMs = CheckMp.MAX_TIMEOUT_MS;
4077 }
4078
4079 // Check that mobile networks are supported
4080 if (!isNetworkSupported(ConnectivityManager.TYPE_MOBILE)
4081 || !isNetworkSupported(ConnectivityManager.TYPE_MOBILE_HIPRI)) {
4082 if (DBG) log("checkMobileProvisioning: X no mobile network");
4083 return timeOutMs;
4084 }
4085
4086 // If we're already checking don't do it again
4087 // TODO: Add a queue of results...
4088 if (mIsCheckingMobileProvisioning.getAndSet(true)) {
4089 if (DBG) log("checkMobileProvisioning: X already checking ignore for the moment");
4090 return timeOutMs;
4091 }
4092
Wink Saville3ec8e7f2013-10-03 08:34:46 -07004093 // Start off with mobile notification off
4094 setProvNotificationVisible(false, ConnectivityManager.TYPE_MOBILE_HIPRI, null, null);
Wink Saville948282b2013-08-29 08:55:16 -07004095
Wink Savilleab9321d2013-06-29 21:10:57 -07004096 CheckMp checkMp = new CheckMp(mContext, this);
4097 CheckMp.CallBack cb = new CheckMp.CallBack() {
4098 @Override
4099 void onComplete(Integer result) {
Wink Saville948282b2013-08-29 08:55:16 -07004100 if (DBG) log("CheckMp.onComplete: result=" + result);
Wink Savilleab9321d2013-06-29 21:10:57 -07004101 NetworkInfo ni =
4102 mNetTrackers[ConnectivityManager.TYPE_MOBILE_HIPRI].getNetworkInfo();
4103 switch(result) {
Wink Saville948282b2013-08-29 08:55:16 -07004104 case CMP_RESULT_CODE_CONNECTABLE:
Wink Saville4fea0412013-09-06 09:53:08 -07004105 case CMP_RESULT_CODE_NO_CONNECTION:
4106 case CMP_RESULT_CODE_NO_DNS:
4107 case CMP_RESULT_CODE_NO_TCP_CONNECTION: {
Wink Saville948282b2013-08-29 08:55:16 -07004108 if (DBG) log("CheckMp.onComplete: ignore, connected or no connection");
Wink Savilleab9321d2013-06-29 21:10:57 -07004109 break;
4110 }
Wink Saville948282b2013-08-29 08:55:16 -07004111 case CMP_RESULT_CODE_REDIRECTED: {
4112 if (DBG) log("CheckMp.onComplete: warm sim");
Robert Greenwalte182bfe2013-07-16 12:06:09 -07004113 String url = getMobileProvisioningUrl();
Wink Savilleab9321d2013-06-29 21:10:57 -07004114 if (TextUtils.isEmpty(url)) {
Robert Greenwalte182bfe2013-07-16 12:06:09 -07004115 url = getMobileRedirectedProvisioningUrl();
Wink Savilleab9321d2013-06-29 21:10:57 -07004116 }
4117 if (TextUtils.isEmpty(url) == false) {
Wink Saville948282b2013-08-29 08:55:16 -07004118 if (DBG) log("CheckMp.onComplete: warm (redirected), url=" + url);
Wink Saville3ec8e7f2013-10-03 08:34:46 -07004119 setProvNotificationVisible(true,
4120 ConnectivityManager.TYPE_MOBILE_HIPRI, ni.getExtraInfo(),
Wink Saville948282b2013-08-29 08:55:16 -07004121 url);
Wink Savilleab9321d2013-06-29 21:10:57 -07004122 } else {
Wink Saville948282b2013-08-29 08:55:16 -07004123 if (DBG) log("CheckMp.onComplete: warm (redirected), no url");
Wink Savilleab9321d2013-06-29 21:10:57 -07004124 }
4125 break;
4126 }
Wink Saville4fea0412013-09-06 09:53:08 -07004127 case CMP_RESULT_CODE_PROVISIONING_NETWORK: {
Robert Greenwalte182bfe2013-07-16 12:06:09 -07004128 String url = getMobileProvisioningUrl();
Wink Savilleab9321d2013-06-29 21:10:57 -07004129 if (TextUtils.isEmpty(url) == false) {
Wink Saville948282b2013-08-29 08:55:16 -07004130 if (DBG) log("CheckMp.onComplete: warm (no dns/tcp), url=" + url);
Wink Saville3ec8e7f2013-10-03 08:34:46 -07004131 setProvNotificationVisible(true,
4132 ConnectivityManager.TYPE_MOBILE_HIPRI, ni.getExtraInfo(),
Wink Saville948282b2013-08-29 08:55:16 -07004133 url);
Wink Savilleab9321d2013-06-29 21:10:57 -07004134 } else {
Wink Saville948282b2013-08-29 08:55:16 -07004135 if (DBG) log("CheckMp.onComplete: warm (no dns/tcp), no url");
Wink Savilleab9321d2013-06-29 21:10:57 -07004136 }
4137 break;
4138 }
4139 default: {
4140 loge("CheckMp.onComplete: ignore unexpected result=" + result);
4141 break;
4142 }
4143 }
Wink Saville948282b2013-08-29 08:55:16 -07004144 mIsCheckingMobileProvisioning.set(false);
Wink Savilleab9321d2013-06-29 21:10:57 -07004145 }
4146 };
4147 CheckMp.Params params =
4148 new CheckMp.Params(checkMp.getDefaultUrl(), timeOutMs, cb);
Wink Saville948282b2013-08-29 08:55:16 -07004149 if (DBG) log("checkMobileProvisioning: params=" + params);
Wink Savilleab9321d2013-06-29 21:10:57 -07004150 checkMp.execute(params);
4151 } finally {
4152 Binder.restoreCallingIdentity(token);
Wink Saville948282b2013-08-29 08:55:16 -07004153 if (DBG) log("checkMobileProvisioning: X");
Wink Savilleab9321d2013-06-29 21:10:57 -07004154 }
4155 return timeOutMs;
4156 }
4157
4158 static class CheckMp extends
4159 AsyncTask<CheckMp.Params, Void, Integer> {
4160 private static final String CHECKMP_TAG = "CheckMp";
Wink Saville1d3a89e2013-10-31 06:35:22 -07004161
4162 // adb shell setprop persist.checkmp.testfailures 1 to enable testing failures
4163 private static boolean mTestingFailures;
4164
4165 // Choosing 4 loops as half of them will use HTTPS and the other half HTTP
4166 private static final int MAX_LOOPS = 4;
4167
4168 // Number of milli-seconds to complete all of the retires
Wink Savilleab9321d2013-06-29 21:10:57 -07004169 public static final int MAX_TIMEOUT_MS = 60000;
Wink Saville1d3a89e2013-10-31 06:35:22 -07004170
4171 // The socket should retry only 5 seconds, the default is longer
Wink Savilleab9321d2013-06-29 21:10:57 -07004172 private static final int SOCKET_TIMEOUT_MS = 5000;
Wink Saville1d3a89e2013-10-31 06:35:22 -07004173
4174 // Sleep time for network errors
4175 private static final int NET_ERROR_SLEEP_SEC = 3;
4176
4177 // Sleep time for network route establishment
4178 private static final int NET_ROUTE_ESTABLISHMENT_SLEEP_SEC = 3;
4179
4180 // Short sleep time for polling :(
4181 private static final int POLLING_SLEEP_SEC = 1;
4182
Wink Savilleab9321d2013-06-29 21:10:57 -07004183 private Context mContext;
4184 private ConnectivityService mCs;
4185 private TelephonyManager mTm;
4186 private Params mParams;
4187
4188 /**
4189 * Parameters for AsyncTask.execute
4190 */
4191 static class Params {
4192 private String mUrl;
4193 private long mTimeOutMs;
4194 private CallBack mCb;
4195
4196 Params(String url, long timeOutMs, CallBack cb) {
4197 mUrl = url;
4198 mTimeOutMs = timeOutMs;
4199 mCb = cb;
4200 }
4201
4202 @Override
4203 public String toString() {
4204 return "{" + " url=" + mUrl + " mTimeOutMs=" + mTimeOutMs + " mCb=" + mCb + "}";
4205 }
4206 }
4207
Wink Saville1d3a89e2013-10-31 06:35:22 -07004208 // As explained to me by Brian Carlstrom and Kenny Root, Certificates can be
4209 // issued by name or ip address, for Google its by name so when we construct
4210 // this HostnameVerifier we'll pass the original Uri and use it to verify
4211 // the host. If the host name in the original uril fails we'll test the
4212 // hostname parameter just incase things change.
4213 static class CheckMpHostnameVerifier implements HostnameVerifier {
4214 Uri mOrgUri;
4215
4216 CheckMpHostnameVerifier(Uri orgUri) {
4217 mOrgUri = orgUri;
4218 }
4219
4220 @Override
4221 public boolean verify(String hostname, SSLSession session) {
4222 HostnameVerifier hv = HttpsURLConnection.getDefaultHostnameVerifier();
4223 String orgUriHost = mOrgUri.getHost();
4224 boolean retVal = hv.verify(orgUriHost, session) || hv.verify(hostname, session);
4225 if (DBG) {
4226 log("isMobileOk: hostnameVerify retVal=" + retVal + " hostname=" + hostname
4227 + " orgUriHost=" + orgUriHost);
4228 }
4229 return retVal;
4230 }
4231 }
4232
Wink Savilleab9321d2013-06-29 21:10:57 -07004233 /**
4234 * The call back object passed in Params. onComplete will be called
4235 * on the main thread.
4236 */
4237 abstract static class CallBack {
4238 // Called on the main thread.
4239 abstract void onComplete(Integer result);
4240 }
4241
4242 public CheckMp(Context context, ConnectivityService cs) {
Wink Saville1d3a89e2013-10-31 06:35:22 -07004243 if (Build.IS_DEBUGGABLE) {
4244 mTestingFailures =
4245 SystemProperties.getInt("persist.checkmp.testfailures", 0) == 1;
4246 } else {
4247 mTestingFailures = false;
4248 }
4249
Wink Savilleab9321d2013-06-29 21:10:57 -07004250 mContext = context;
4251 mCs = cs;
4252
4253 // Setup access to TelephonyService we'll be using.
4254 mTm = (TelephonyManager) mContext.getSystemService(
4255 Context.TELEPHONY_SERVICE);
4256 }
4257
4258 /**
4259 * Get the default url to use for the test.
4260 */
4261 public String getDefaultUrl() {
4262 // See http://go/clientsdns for usage approval
4263 String server = Settings.Global.getString(mContext.getContentResolver(),
4264 Settings.Global.CAPTIVE_PORTAL_SERVER);
4265 if (server == null) {
4266 server = "clients3.google.com";
4267 }
4268 return "http://" + server + "/generate_204";
4269 }
4270
4271 /**
4272 * Detect if its possible to connect to the http url. DNS based detection techniques
4273 * do not work at all hotspots. The best way to check is to perform a request to
4274 * a known address that fetches the data we expect.
4275 */
4276 private synchronized Integer isMobileOk(Params params) {
Wink Saville948282b2013-08-29 08:55:16 -07004277 Integer result = CMP_RESULT_CODE_NO_CONNECTION;
Wink Savilleab9321d2013-06-29 21:10:57 -07004278 Uri orgUri = Uri.parse(params.mUrl);
4279 Random rand = new Random();
4280 mParams = params;
4281
Wink Savilleafe58b02013-08-13 12:41:06 -07004282 if (mCs.isNetworkSupported(ConnectivityManager.TYPE_MOBILE) == false) {
Wink Saville948282b2013-08-29 08:55:16 -07004283 result = CMP_RESULT_CODE_NO_CONNECTION;
Wink Savilled95ccc52013-09-13 12:40:11 -07004284 log("isMobileOk: X not mobile capable result=" + result);
4285 return result;
4286 }
4287
4288 // See if we've already determined we've got a provisioning connection,
4289 // if so we don't need to do anything active.
4290 MobileDataStateTracker mdstDefault = (MobileDataStateTracker)
4291 mCs.mNetTrackers[ConnectivityManager.TYPE_MOBILE];
4292 boolean isDefaultProvisioning = mdstDefault.isProvisioningNetwork();
4293 log("isMobileOk: isDefaultProvisioning=" + isDefaultProvisioning);
4294
4295 MobileDataStateTracker mdstHipri = (MobileDataStateTracker)
4296 mCs.mNetTrackers[ConnectivityManager.TYPE_MOBILE_HIPRI];
4297 boolean isHipriProvisioning = mdstHipri.isProvisioningNetwork();
4298 log("isMobileOk: isHipriProvisioning=" + isHipriProvisioning);
4299
4300 if (isDefaultProvisioning || isHipriProvisioning) {
4301 result = CMP_RESULT_CODE_PROVISIONING_NETWORK;
4302 log("isMobileOk: X default || hipri is provisioning result=" + result);
Wink Savilleafe58b02013-08-13 12:41:06 -07004303 return result;
4304 }
Wink Savilleab9321d2013-06-29 21:10:57 -07004305
Wink Savilleafe58b02013-08-13 12:41:06 -07004306 try {
Wink Savilleab9321d2013-06-29 21:10:57 -07004307 // Continue trying to connect until time has run out
4308 long endTime = SystemClock.elapsedRealtime() + params.mTimeOutMs;
Wink Saville7f6ee2e2013-08-07 11:02:57 -07004309
Wink Savilledce52cd2013-08-16 17:17:28 -07004310 if (!mCs.isMobileDataStateTrackerReady()) {
4311 // Wait for MobileDataStateTracker to be ready.
4312 if (DBG) log("isMobileOk: mdst is not ready");
4313 while(SystemClock.elapsedRealtime() < endTime) {
4314 if (mCs.isMobileDataStateTrackerReady()) {
4315 // Enable fail fast as we'll do retries here and use a
4316 // hipri connection so the default connection stays active.
4317 if (DBG) log("isMobileOk: mdst ready, enable fail fast of mobile data");
4318 mCs.setEnableFailFastMobileData(DctConstants.ENABLED);
4319 break;
4320 }
Wink Saville1d3a89e2013-10-31 06:35:22 -07004321 sleep(POLLING_SLEEP_SEC);
Wink Savilledce52cd2013-08-16 17:17:28 -07004322 }
4323 }
4324
4325 log("isMobileOk: start hipri url=" + params.mUrl);
4326
Wink Saville7f6ee2e2013-08-07 11:02:57 -07004327 // First wait until we can start using hipri
4328 Binder binder = new Binder();
4329 while(SystemClock.elapsedRealtime() < endTime) {
4330 int ret = mCs.startUsingNetworkFeature(ConnectivityManager.TYPE_MOBILE,
4331 Phone.FEATURE_ENABLE_HIPRI, binder);
4332 if ((ret == PhoneConstants.APN_ALREADY_ACTIVE)
4333 || (ret == PhoneConstants.APN_REQUEST_STARTED)) {
4334 log("isMobileOk: hipri started");
4335 break;
4336 }
4337 if (VDBG) log("isMobileOk: hipri not started yet");
Wink Saville948282b2013-08-29 08:55:16 -07004338 result = CMP_RESULT_CODE_NO_CONNECTION;
Wink Saville1d3a89e2013-10-31 06:35:22 -07004339 sleep(POLLING_SLEEP_SEC);
Wink Saville7f6ee2e2013-08-07 11:02:57 -07004340 }
4341
4342 // Continue trying to connect until time has run out
Wink Savilleab9321d2013-06-29 21:10:57 -07004343 while(SystemClock.elapsedRealtime() < endTime) {
4344 try {
4345 // Wait for hipri to connect.
4346 // TODO: Don't poll and handle situation where hipri fails
4347 // because default is retrying. See b/9569540
4348 NetworkInfo.State state = mCs
4349 .getNetworkInfo(ConnectivityManager.TYPE_MOBILE_HIPRI).getState();
4350 if (state != NetworkInfo.State.CONNECTED) {
Wink Saville948282b2013-08-29 08:55:16 -07004351 if (true/*VDBG*/) {
Wink Saville1aef7fc2013-07-31 15:49:04 -07004352 log("isMobileOk: not connected ni=" +
Wink Savilleab9321d2013-06-29 21:10:57 -07004353 mCs.getNetworkInfo(ConnectivityManager.TYPE_MOBILE_HIPRI));
Wink Saville1aef7fc2013-07-31 15:49:04 -07004354 }
Wink Saville1d3a89e2013-10-31 06:35:22 -07004355 sleep(POLLING_SLEEP_SEC);
Wink Saville948282b2013-08-29 08:55:16 -07004356 result = CMP_RESULT_CODE_NO_CONNECTION;
Wink Savilleab9321d2013-06-29 21:10:57 -07004357 continue;
4358 }
4359
Wink Saville948282b2013-08-29 08:55:16 -07004360 // Hipri has started check if this is a provisioning url
4361 MobileDataStateTracker mdst = (MobileDataStateTracker)
4362 mCs.mNetTrackers[ConnectivityManager.TYPE_MOBILE_HIPRI];
4363 if (mdst.isProvisioningNetwork()) {
Wink Saville4fea0412013-09-06 09:53:08 -07004364 result = CMP_RESULT_CODE_PROVISIONING_NETWORK;
Wink Savilled95ccc52013-09-13 12:40:11 -07004365 if (DBG) log("isMobileOk: X isProvisioningNetwork result=" + result);
Wink Saville948282b2013-08-29 08:55:16 -07004366 return result;
4367 } else {
4368 if (DBG) log("isMobileOk: isProvisioningNetwork is false, continue");
4369 }
4370
Wink Savilleab9321d2013-06-29 21:10:57 -07004371 // Get of the addresses associated with the url host. We need to use the
4372 // address otherwise HttpURLConnection object will use the name to get
Wink Saville1d3a89e2013-10-31 06:35:22 -07004373 // the addresses and will try every address but that will bypass the
Wink Savilleab9321d2013-06-29 21:10:57 -07004374 // route to host we setup and the connection could succeed as the default
4375 // interface might be connected to the internet via wifi or other interface.
4376 InetAddress[] addresses;
4377 try {
4378 addresses = InetAddress.getAllByName(orgUri.getHost());
4379 } catch (UnknownHostException e) {
Wink Saville948282b2013-08-29 08:55:16 -07004380 result = CMP_RESULT_CODE_NO_DNS;
Wink Savilled95ccc52013-09-13 12:40:11 -07004381 log("isMobileOk: X UnknownHostException result=" + result);
Wink Savilleab9321d2013-06-29 21:10:57 -07004382 return result;
4383 }
4384 log("isMobileOk: addresses=" + inetAddressesToString(addresses));
4385
4386 // Get the type of addresses supported by this link
4387 LinkProperties lp = mCs.getLinkProperties(
4388 ConnectivityManager.TYPE_MOBILE_HIPRI);
Lorenzo Colitti4faa0272013-08-08 11:00:12 +09004389 boolean linkHasIpv4 = lp.hasIPv4Address();
4390 boolean linkHasIpv6 = lp.hasIPv6Address();
Wink Savilleab9321d2013-06-29 21:10:57 -07004391 log("isMobileOk: linkHasIpv4=" + linkHasIpv4
4392 + " linkHasIpv6=" + linkHasIpv6);
4393
Robert Greenwaltb9acff32013-10-14 18:03:02 -07004394 final ArrayList<InetAddress> validAddresses =
4395 new ArrayList<InetAddress>(addresses.length);
Wink Savilleab9321d2013-06-29 21:10:57 -07004396
Robert Greenwaltb9acff32013-10-14 18:03:02 -07004397 for (InetAddress addr : addresses) {
4398 if (((addr instanceof Inet4Address) && linkHasIpv4) ||
4399 ((addr instanceof Inet6Address) && linkHasIpv6)) {
4400 validAddresses.add(addr);
Wink Savilleab9321d2013-06-29 21:10:57 -07004401 }
Robert Greenwaltb9acff32013-10-14 18:03:02 -07004402 }
4403
4404 if (validAddresses.size() == 0) {
4405 return CMP_RESULT_CODE_NO_CONNECTION;
4406 }
4407
4408 int addrTried = 0;
4409 while (true) {
Wink Saville1d3a89e2013-10-31 06:35:22 -07004410 // Loop through at most MAX_LOOPS valid addresses or until
Robert Greenwaltb9acff32013-10-14 18:03:02 -07004411 // we run out of time
Wink Saville1d3a89e2013-10-31 06:35:22 -07004412 if (addrTried++ >= MAX_LOOPS) {
4413 log("isMobileOk: too many loops tried - giving up");
Robert Greenwaltb9acff32013-10-14 18:03:02 -07004414 break;
4415 }
4416 if (SystemClock.elapsedRealtime() >= endTime) {
Wink Saville1d3a89e2013-10-31 06:35:22 -07004417 log("isMobileOk: spend too much time - giving up");
Robert Greenwaltb9acff32013-10-14 18:03:02 -07004418 break;
4419 }
4420
4421 InetAddress hostAddr = validAddresses.get(rand.nextInt(
4422 validAddresses.size()));
Wink Savilleab9321d2013-06-29 21:10:57 -07004423
4424 // Make a route to host so we check the specific interface.
4425 if (mCs.requestRouteToHostAddress(ConnectivityManager.TYPE_MOBILE_HIPRI,
Chad Brubakerf5729a62014-03-13 18:18:36 +00004426 hostAddr.getAddress(), null)) {
Wink Savilleab9321d2013-06-29 21:10:57 -07004427 // Wait a short time to be sure the route is established ??
4428 log("isMobileOk:"
4429 + " wait to establish route to hostAddr=" + hostAddr);
Wink Saville1d3a89e2013-10-31 06:35:22 -07004430 sleep(NET_ROUTE_ESTABLISHMENT_SLEEP_SEC);
Wink Savilleab9321d2013-06-29 21:10:57 -07004431 } else {
4432 log("isMobileOk:"
4433 + " could not establish route to hostAddr=" + hostAddr);
Wink Saville1d3a89e2013-10-31 06:35:22 -07004434 // Wait a short time before the next attempt
4435 sleep(NET_ERROR_SLEEP_SEC);
Wink Savilleab9321d2013-06-29 21:10:57 -07004436 continue;
4437 }
4438
Wink Saville1d3a89e2013-10-31 06:35:22 -07004439 // Rewrite the url to have numeric address to use the specific route
4440 // using http for half the attempts and https for the other half.
4441 // Doing https first and http second as on a redirected walled garden
4442 // such as t-mobile uses we get a SocketTimeoutException: "SSL
4443 // handshake timed out" which we declare as
4444 // CMP_RESULT_CODE_NO_TCP_CONNECTION. We could change this, but by
4445 // having http second we will be using logic used for some time.
4446 URL newUrl;
4447 String scheme = (addrTried <= (MAX_LOOPS/2)) ? "https" : "http";
4448 newUrl = new URL(scheme, hostAddr.getHostAddress(),
4449 orgUri.getPath());
Wink Savilleab9321d2013-06-29 21:10:57 -07004450 log("isMobileOk: newUrl=" + newUrl);
4451
4452 HttpURLConnection urlConn = null;
4453 try {
Wink Saville1d3a89e2013-10-31 06:35:22 -07004454 // Open the connection set the request headers and get the response
4455 urlConn = (HttpURLConnection)newUrl.openConnection(
Wink Savilleab9321d2013-06-29 21:10:57 -07004456 java.net.Proxy.NO_PROXY);
Wink Saville1d3a89e2013-10-31 06:35:22 -07004457 if (scheme.equals("https")) {
4458 ((HttpsURLConnection)urlConn).setHostnameVerifier(
4459 new CheckMpHostnameVerifier(orgUri));
4460 }
Wink Savilleab9321d2013-06-29 21:10:57 -07004461 urlConn.setInstanceFollowRedirects(false);
4462 urlConn.setConnectTimeout(SOCKET_TIMEOUT_MS);
4463 urlConn.setReadTimeout(SOCKET_TIMEOUT_MS);
4464 urlConn.setUseCaches(false);
4465 urlConn.setAllowUserInteraction(false);
Lorenzo Colitti143a2cf2013-10-08 10:41:25 +09004466 // Set the "Connection" to "Close" as by default "Keep-Alive"
4467 // is used which is useless in this case.
Wink Savilleab9321d2013-06-29 21:10:57 -07004468 urlConn.setRequestProperty("Connection", "close");
4469 int responseCode = urlConn.getResponseCode();
Wink Saville4fea0412013-09-06 09:53:08 -07004470
4471 // For debug display the headers
4472 Map<String, List<String>> headers = urlConn.getHeaderFields();
4473 log("isMobileOk: headers=" + headers);
4474
4475 // Close the connection
Wink Savilleab9321d2013-06-29 21:10:57 -07004476 urlConn.disconnect();
4477 urlConn = null;
Wink Saville4fea0412013-09-06 09:53:08 -07004478
Wink Saville1d3a89e2013-10-31 06:35:22 -07004479 if (mTestingFailures) {
4480 // Pretend no connection, this tests using http and https
4481 result = CMP_RESULT_CODE_NO_CONNECTION;
4482 log("isMobileOk: TESTING_FAILURES, pretend no connction");
4483 continue;
4484 }
4485
Wink Saville4fea0412013-09-06 09:53:08 -07004486 if (responseCode == 204) {
4487 // Return
Wink Saville4fea0412013-09-06 09:53:08 -07004488 result = CMP_RESULT_CODE_CONNECTABLE;
Wink Saville1d3a89e2013-10-31 06:35:22 -07004489 log("isMobileOk: X got expected responseCode=" + responseCode
Wink Savilled95ccc52013-09-13 12:40:11 -07004490 + " result=" + result);
Wink Saville4fea0412013-09-06 09:53:08 -07004491 return result;
4492 } else {
4493 // Retry to be sure this was redirected, we've gotten
4494 // occasions where a server returned 200 even though
4495 // the device didn't have a "warm" sim.
4496 log("isMobileOk: not expected responseCode=" + responseCode);
Robert Greenwaltb9acff32013-10-14 18:03:02 -07004497 // TODO - it would be nice in the single-address case to do
4498 // another DNS resolve here, but flushing the cache is a bit
4499 // heavy-handed.
Wink Saville4fea0412013-09-06 09:53:08 -07004500 result = CMP_RESULT_CODE_REDIRECTED;
4501 }
Wink Savilleab9321d2013-06-29 21:10:57 -07004502 } catch (Exception e) {
Wink Saville1d3a89e2013-10-31 06:35:22 -07004503 log("isMobileOk: HttpURLConnection Exception" + e);
Wink Saville4fea0412013-09-06 09:53:08 -07004504 result = CMP_RESULT_CODE_NO_TCP_CONNECTION;
Wink Savilleab9321d2013-06-29 21:10:57 -07004505 if (urlConn != null) {
4506 urlConn.disconnect();
4507 urlConn = null;
4508 }
Wink Saville1d3a89e2013-10-31 06:35:22 -07004509 sleep(NET_ERROR_SLEEP_SEC);
4510 continue;
Wink Savilleab9321d2013-06-29 21:10:57 -07004511 }
4512 }
Wink Savilled95ccc52013-09-13 12:40:11 -07004513 log("isMobileOk: X loops|timed out result=" + result);
Wink Savilleab9321d2013-06-29 21:10:57 -07004514 return result;
4515 } catch (Exception e) {
4516 log("isMobileOk: Exception e=" + e);
4517 continue;
4518 }
4519 }
4520 log("isMobileOk: timed out");
4521 } finally {
4522 log("isMobileOk: F stop hipri");
4523 mCs.setEnableFailFastMobileData(DctConstants.DISABLED);
4524 mCs.stopUsingNetworkFeature(ConnectivityManager.TYPE_MOBILE,
4525 Phone.FEATURE_ENABLE_HIPRI);
Wink Saville948282b2013-08-29 08:55:16 -07004526
4527 // Wait for hipri to disconnect.
4528 long endTime = SystemClock.elapsedRealtime() + 5000;
4529
4530 while(SystemClock.elapsedRealtime() < endTime) {
4531 NetworkInfo.State state = mCs
4532 .getNetworkInfo(ConnectivityManager.TYPE_MOBILE_HIPRI).getState();
4533 if (state != NetworkInfo.State.DISCONNECTED) {
4534 if (VDBG) {
4535 log("isMobileOk: connected ni=" +
4536 mCs.getNetworkInfo(ConnectivityManager.TYPE_MOBILE_HIPRI));
4537 }
Wink Saville1d3a89e2013-10-31 06:35:22 -07004538 sleep(POLLING_SLEEP_SEC);
Wink Saville948282b2013-08-29 08:55:16 -07004539 continue;
4540 }
4541 }
4542
Wink Savilleab9321d2013-06-29 21:10:57 -07004543 log("isMobileOk: X result=" + result);
4544 }
4545 return result;
4546 }
4547
4548 @Override
4549 protected Integer doInBackground(Params... params) {
4550 return isMobileOk(params[0]);
4551 }
4552
4553 @Override
4554 protected void onPostExecute(Integer result) {
4555 log("onPostExecute: result=" + result);
4556 if ((mParams != null) && (mParams.mCb != null)) {
4557 mParams.mCb.onComplete(result);
4558 }
4559 }
4560
4561 private String inetAddressesToString(InetAddress[] addresses) {
4562 StringBuffer sb = new StringBuffer();
4563 boolean firstTime = true;
4564 for(InetAddress addr : addresses) {
4565 if (firstTime) {
4566 firstTime = false;
4567 } else {
4568 sb.append(",");
4569 }
4570 sb.append(addr);
4571 }
4572 return sb.toString();
4573 }
4574
4575 private void printNetworkInfo() {
4576 boolean hasIccCard = mTm.hasIccCard();
4577 int simState = mTm.getSimState();
4578 log("hasIccCard=" + hasIccCard
4579 + " simState=" + simState);
4580 NetworkInfo[] ni = mCs.getAllNetworkInfo();
4581 if (ni != null) {
4582 log("ni.length=" + ni.length);
4583 for (NetworkInfo netInfo: ni) {
4584 log("netInfo=" + netInfo.toString());
4585 }
4586 } else {
4587 log("no network info ni=null");
4588 }
4589 }
4590
4591 /**
4592 * Sleep for a few seconds then return.
4593 * @param seconds
4594 */
4595 private static void sleep(int seconds) {
4596 try {
4597 Thread.sleep(seconds * 1000);
4598 } catch (InterruptedException e) {
4599 e.printStackTrace();
4600 }
4601 }
4602
Wink Saville1d3a89e2013-10-31 06:35:22 -07004603 private static void log(String s) {
Wink Savilleab9321d2013-06-29 21:10:57 -07004604 Slog.d(ConnectivityService.TAG, "[" + CHECKMP_TAG + "] " + s);
4605 }
4606 }
4607
Wink Saville948282b2013-08-29 08:55:16 -07004608 // TODO: Move to ConnectivityManager and make public?
4609 private static final String CONNECTED_TO_PROVISIONING_NETWORK_ACTION =
4610 "com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION";
Wink Savilleab9321d2013-06-29 21:10:57 -07004611
Wink Saville948282b2013-08-29 08:55:16 -07004612 private BroadcastReceiver mProvisioningReceiver = new BroadcastReceiver() {
4613 @Override
4614 public void onReceive(Context context, Intent intent) {
4615 if (intent.getAction().equals(CONNECTED_TO_PROVISIONING_NETWORK_ACTION)) {
4616 handleMobileProvisioningAction(intent.getStringExtra("EXTRA_URL"));
4617 }
4618 }
4619 };
4620
4621 private void handleMobileProvisioningAction(String url) {
4622 // Notication mark notification as not visible
Wink Saville3ec8e7f2013-10-03 08:34:46 -07004623 setProvNotificationVisible(false, ConnectivityManager.TYPE_MOBILE_HIPRI, null, null);
Wink Saville948282b2013-08-29 08:55:16 -07004624
4625 // If provisioning network handle as a special case,
4626 // otherwise launch browser with the intent directly.
4627 NetworkInfo ni = getProvisioningNetworkInfo();
Wink Saville67c38212013-09-05 12:02:25 -07004628 if ((ni != null) && ni.isConnectedToProvisioningNetwork()) {
Wink Saville948282b2013-08-29 08:55:16 -07004629 if (DBG) log("handleMobileProvisioningAction: on provisioning network");
4630 MobileDataStateTracker mdst = (MobileDataStateTracker)
4631 mNetTrackers[ConnectivityManager.TYPE_MOBILE];
4632 mdst.enableMobileProvisioning(url);
4633 } else {
4634 if (DBG) log("handleMobileProvisioningAction: on default network");
Robert Greenwalt536b3c22013-10-17 12:46:52 -07004635 Intent newIntent = Intent.makeMainSelectorActivity(Intent.ACTION_MAIN,
4636 Intent.CATEGORY_APP_BROWSER);
4637 newIntent.setData(Uri.parse(url));
Wink Saville948282b2013-08-29 08:55:16 -07004638 newIntent.setFlags(Intent.FLAG_ACTIVITY_BROUGHT_TO_FRONT |
4639 Intent.FLAG_ACTIVITY_NEW_TASK);
4640 try {
4641 mContext.startActivity(newIntent);
4642 } catch (ActivityNotFoundException e) {
4643 loge("handleMobileProvisioningAction: startActivity failed" + e);
4644 }
4645 }
4646 }
4647
4648 private static final String NOTIFICATION_ID = "CaptivePortal.Notification";
4649 private volatile boolean mIsNotificationVisible = false;
4650
4651 private void setProvNotificationVisible(boolean visible, int networkType, String extraInfo,
4652 String url) {
4653 if (DBG) {
4654 log("setProvNotificationVisible: E visible=" + visible + " networkType=" + networkType
4655 + " extraInfo=" + extraInfo + " url=" + url);
4656 }
Wink Savilleab9321d2013-06-29 21:10:57 -07004657
4658 Resources r = Resources.getSystem();
4659 NotificationManager notificationManager = (NotificationManager) mContext
4660 .getSystemService(Context.NOTIFICATION_SERVICE);
4661
4662 if (visible) {
4663 CharSequence title;
4664 CharSequence details;
4665 int icon;
Wink Saville948282b2013-08-29 08:55:16 -07004666 Intent intent;
4667 Notification notification = new Notification();
4668 switch (networkType) {
Wink Savilleab9321d2013-06-29 21:10:57 -07004669 case ConnectivityManager.TYPE_WIFI:
Wink Savilleab9321d2013-06-29 21:10:57 -07004670 title = r.getString(R.string.wifi_available_sign_in, 0);
4671 details = r.getString(R.string.network_available_sign_in_detailed,
Wink Saville948282b2013-08-29 08:55:16 -07004672 extraInfo);
Wink Savilleab9321d2013-06-29 21:10:57 -07004673 icon = R.drawable.stat_notify_wifi_in_range;
Wink Saville948282b2013-08-29 08:55:16 -07004674 intent = new Intent(Intent.ACTION_VIEW, Uri.parse(url));
4675 intent.setFlags(Intent.FLAG_ACTIVITY_BROUGHT_TO_FRONT |
4676 Intent.FLAG_ACTIVITY_NEW_TASK);
4677 notification.contentIntent = PendingIntent.getActivity(mContext, 0, intent, 0);
Wink Savilleab9321d2013-06-29 21:10:57 -07004678 break;
4679 case ConnectivityManager.TYPE_MOBILE:
4680 case ConnectivityManager.TYPE_MOBILE_HIPRI:
Wink Savilleab9321d2013-06-29 21:10:57 -07004681 title = r.getString(R.string.network_available_sign_in, 0);
4682 // TODO: Change this to pull from NetworkInfo once a printable
4683 // name has been added to it
4684 details = mTelephonyManager.getNetworkOperatorName();
4685 icon = R.drawable.stat_notify_rssi_in_range;
Wink Saville948282b2013-08-29 08:55:16 -07004686 intent = new Intent(CONNECTED_TO_PROVISIONING_NETWORK_ACTION);
4687 intent.putExtra("EXTRA_URL", url);
4688 intent.setFlags(0);
4689 notification.contentIntent = PendingIntent.getBroadcast(mContext, 0, intent, 0);
Wink Savilleab9321d2013-06-29 21:10:57 -07004690 break;
4691 default:
Wink Savilleab9321d2013-06-29 21:10:57 -07004692 title = r.getString(R.string.network_available_sign_in, 0);
4693 details = r.getString(R.string.network_available_sign_in_detailed,
Wink Saville948282b2013-08-29 08:55:16 -07004694 extraInfo);
Wink Savilleab9321d2013-06-29 21:10:57 -07004695 icon = R.drawable.stat_notify_rssi_in_range;
Wink Saville948282b2013-08-29 08:55:16 -07004696 intent = new Intent(Intent.ACTION_VIEW, Uri.parse(url));
4697 intent.setFlags(Intent.FLAG_ACTIVITY_BROUGHT_TO_FRONT |
4698 Intent.FLAG_ACTIVITY_NEW_TASK);
4699 notification.contentIntent = PendingIntent.getActivity(mContext, 0, intent, 0);
Wink Savilleab9321d2013-06-29 21:10:57 -07004700 break;
4701 }
4702
Wink Savilleab9321d2013-06-29 21:10:57 -07004703 notification.when = 0;
4704 notification.icon = icon;
4705 notification.flags = Notification.FLAG_AUTO_CANCEL;
Wink Savilleab9321d2013-06-29 21:10:57 -07004706 notification.tickerText = title;
4707 notification.setLatestEventInfo(mContext, title, details, notification.contentIntent);
4708
Wink Saville948282b2013-08-29 08:55:16 -07004709 try {
Wink Saville3ec8e7f2013-10-03 08:34:46 -07004710 notificationManager.notify(NOTIFICATION_ID, networkType, notification);
Wink Saville948282b2013-08-29 08:55:16 -07004711 } catch (NullPointerException npe) {
4712 loge("setNotificaitionVisible: visible notificationManager npe=" + npe);
4713 npe.printStackTrace();
4714 }
Wink Savilleab9321d2013-06-29 21:10:57 -07004715 } else {
Wink Saville948282b2013-08-29 08:55:16 -07004716 try {
Wink Saville3ec8e7f2013-10-03 08:34:46 -07004717 notificationManager.cancel(NOTIFICATION_ID, networkType);
Wink Saville948282b2013-08-29 08:55:16 -07004718 } catch (NullPointerException npe) {
4719 loge("setNotificaitionVisible: cancel notificationManager npe=" + npe);
4720 npe.printStackTrace();
4721 }
Wink Savilleab9321d2013-06-29 21:10:57 -07004722 }
Wink Saville948282b2013-08-29 08:55:16 -07004723 mIsNotificationVisible = visible;
Wink Savilleab9321d2013-06-29 21:10:57 -07004724 }
4725
Robert Greenwalte182bfe2013-07-16 12:06:09 -07004726 /** Location to an updatable file listing carrier provisioning urls.
4727 * An example:
4728 *
4729 * <?xml version="1.0" encoding="utf-8"?>
4730 * <provisioningUrls>
4731 * <provisioningUrl mcc="310" mnc="4">http://myserver.com/foo?mdn=%3$s&amp;iccid=%1$s&amp;imei=%2$s</provisioningUrl>
4732 * <redirectedUrl mcc="310" mnc="4">http://www.google.com</redirectedUrl>
4733 * </provisioningUrls>
4734 */
4735 private static final String PROVISIONING_URL_PATH =
4736 "/data/misc/radio/provisioning_urls.xml";
4737 private final File mProvisioningUrlFile = new File(PROVISIONING_URL_PATH);
Wink Savilleab9321d2013-06-29 21:10:57 -07004738
Robert Greenwalte182bfe2013-07-16 12:06:09 -07004739 /** XML tag for root element. */
4740 private static final String TAG_PROVISIONING_URLS = "provisioningUrls";
4741 /** XML tag for individual url */
4742 private static final String TAG_PROVISIONING_URL = "provisioningUrl";
4743 /** XML tag for redirected url */
4744 private static final String TAG_REDIRECTED_URL = "redirectedUrl";
4745 /** XML attribute for mcc */
4746 private static final String ATTR_MCC = "mcc";
4747 /** XML attribute for mnc */
4748 private static final String ATTR_MNC = "mnc";
4749
4750 private static final int REDIRECTED_PROVISIONING = 1;
4751 private static final int PROVISIONING = 2;
4752
4753 private String getProvisioningUrlBaseFromFile(int type) {
4754 FileReader fileReader = null;
4755 XmlPullParser parser = null;
4756 Configuration config = mContext.getResources().getConfiguration();
4757 String tagType;
4758
4759 switch (type) {
4760 case PROVISIONING:
4761 tagType = TAG_PROVISIONING_URL;
4762 break;
4763 case REDIRECTED_PROVISIONING:
4764 tagType = TAG_REDIRECTED_URL;
4765 break;
4766 default:
4767 throw new RuntimeException("getProvisioningUrlBaseFromFile: Unexpected parameter " +
4768 type);
4769 }
4770
4771 try {
4772 fileReader = new FileReader(mProvisioningUrlFile);
4773 parser = Xml.newPullParser();
4774 parser.setInput(fileReader);
4775 XmlUtils.beginDocument(parser, TAG_PROVISIONING_URLS);
4776
4777 while (true) {
4778 XmlUtils.nextElement(parser);
4779
4780 String element = parser.getName();
4781 if (element == null) break;
4782
4783 if (element.equals(tagType)) {
4784 String mcc = parser.getAttributeValue(null, ATTR_MCC);
4785 try {
4786 if (mcc != null && Integer.parseInt(mcc) == config.mcc) {
4787 String mnc = parser.getAttributeValue(null, ATTR_MNC);
4788 if (mnc != null && Integer.parseInt(mnc) == config.mnc) {
4789 parser.next();
4790 if (parser.getEventType() == XmlPullParser.TEXT) {
4791 return parser.getText();
4792 }
4793 }
4794 }
4795 } catch (NumberFormatException e) {
4796 loge("NumberFormatException in getProvisioningUrlBaseFromFile: " + e);
4797 }
4798 }
4799 }
4800 return null;
4801 } catch (FileNotFoundException e) {
4802 loge("Carrier Provisioning Urls file not found");
4803 } catch (XmlPullParserException e) {
4804 loge("Xml parser exception reading Carrier Provisioning Urls file: " + e);
4805 } catch (IOException e) {
4806 loge("I/O exception reading Carrier Provisioning Urls file: " + e);
4807 } finally {
4808 if (fileReader != null) {
4809 try {
4810 fileReader.close();
4811 } catch (IOException e) {}
4812 }
4813 }
4814 return null;
4815 }
4816
Wink Saville42d4f082013-07-20 20:31:59 -07004817 @Override
4818 public String getMobileRedirectedProvisioningUrl() {
4819 enforceConnectivityInternalPermission();
Robert Greenwalte182bfe2013-07-16 12:06:09 -07004820 String url = getProvisioningUrlBaseFromFile(REDIRECTED_PROVISIONING);
4821 if (TextUtils.isEmpty(url)) {
4822 url = mContext.getResources().getString(R.string.mobile_redirected_provisioning_url);
4823 }
4824 return url;
4825 }
4826
Wink Saville42d4f082013-07-20 20:31:59 -07004827 @Override
Robert Greenwalte182bfe2013-07-16 12:06:09 -07004828 public String getMobileProvisioningUrl() {
4829 enforceConnectivityInternalPermission();
4830 String url = getProvisioningUrlBaseFromFile(PROVISIONING);
4831 if (TextUtils.isEmpty(url)) {
4832 url = mContext.getResources().getString(R.string.mobile_provisioning_url);
Wink Saville42d4f082013-07-20 20:31:59 -07004833 log("getMobileProvisioningUrl: mobile_provisioining_url from resource =" + url);
Robert Greenwalte182bfe2013-07-16 12:06:09 -07004834 } else {
Wink Saville42d4f082013-07-20 20:31:59 -07004835 log("getMobileProvisioningUrl: mobile_provisioning_url from File =" + url);
Robert Greenwalte182bfe2013-07-16 12:06:09 -07004836 }
Wink Saville8cf35602013-07-10 23:00:07 -07004837 // populate the iccid, imei and phone number in the provisioning url.
Wink Savilleab9321d2013-06-29 21:10:57 -07004838 if (!TextUtils.isEmpty(url)) {
Wink Saville8cf35602013-07-10 23:00:07 -07004839 String phoneNumber = mTelephonyManager.getLine1Number();
4840 if (TextUtils.isEmpty(phoneNumber)) {
4841 phoneNumber = "0000000000";
4842 }
Wink Savilleab9321d2013-06-29 21:10:57 -07004843 url = String.format(url,
4844 mTelephonyManager.getSimSerialNumber() /* ICCID */,
4845 mTelephonyManager.getDeviceId() /* IMEI */,
Wink Saville8cf35602013-07-10 23:00:07 -07004846 phoneNumber /* Phone numer */);
Wink Savilleab9321d2013-06-29 21:10:57 -07004847 }
4848
Wink Savilleab9321d2013-06-29 21:10:57 -07004849 return url;
4850 }
Chad Brubaker4ca19e82013-06-14 11:16:51 -07004851
Wink Saville948282b2013-08-29 08:55:16 -07004852 @Override
4853 public void setProvisioningNotificationVisible(boolean visible, int networkType,
4854 String extraInfo, String url) {
4855 enforceConnectivityInternalPermission();
4856 setProvNotificationVisible(visible, networkType, extraInfo, url);
4857 }
Wink Saville7788c612013-08-29 14:57:08 -07004858
Yuhao Zheng5cd1a0e2013-09-09 17:00:04 -07004859 @Override
4860 public void setAirplaneMode(boolean enable) {
4861 enforceConnectivityInternalPermission();
Yuhao Zheng5cd1a0e2013-09-09 17:00:04 -07004862 final long ident = Binder.clearCallingIdentity();
4863 try {
Yuhao Zheng5530e4b2013-09-11 09:36:41 -07004864 final ContentResolver cr = mContext.getContentResolver();
4865 Settings.Global.putInt(cr, Settings.Global.AIRPLANE_MODE_ON, enable ? 1 : 0);
4866 Intent intent = new Intent(Intent.ACTION_AIRPLANE_MODE_CHANGED);
4867 intent.putExtra("state", enable);
Yuhao Zheng5cd1a0e2013-09-09 17:00:04 -07004868 mContext.sendBroadcast(intent);
4869 } finally {
4870 Binder.restoreCallingIdentity(ident);
4871 }
4872 }
4873
Chad Brubaker4ca19e82013-06-14 11:16:51 -07004874 private void onUserStart(int userId) {
4875 synchronized(mVpns) {
4876 Vpn userVpn = mVpns.get(userId);
4877 if (userVpn != null) {
4878 loge("Starting user already has a VPN");
4879 return;
4880 }
4881 userVpn = new Vpn(mContext, mVpnCallback, mNetd, this, userId);
4882 mVpns.put(userId, userVpn);
4883 userVpn.startMonitoring(mContext, mTrackerHandler);
4884 }
4885 }
4886
4887 private void onUserStop(int userId) {
4888 synchronized(mVpns) {
4889 Vpn userVpn = mVpns.get(userId);
4890 if (userVpn == null) {
4891 loge("Stopping user has no VPN");
4892 return;
4893 }
4894 mVpns.delete(userId);
4895 }
4896 }
4897
4898 private BroadcastReceiver mUserIntentReceiver = new BroadcastReceiver() {
4899 @Override
4900 public void onReceive(Context context, Intent intent) {
4901 final String action = intent.getAction();
4902 final int userId = intent.getIntExtra(Intent.EXTRA_USER_HANDLE, UserHandle.USER_NULL);
4903 if (userId == UserHandle.USER_NULL) return;
4904
4905 if (Intent.ACTION_USER_STARTING.equals(action)) {
4906 onUserStart(userId);
4907 } else if (Intent.ACTION_USER_STOPPING.equals(action)) {
4908 onUserStop(userId);
4909 }
4910 }
4911 };
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -07004912
4913 @Override
Vinit Deshapnde6a2d3252013-09-04 14:11:24 -07004914 public LinkQualityInfo getLinkQualityInfo(int networkType) {
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -07004915 enforceAccessPermission();
4916 if (isNetworkTypeValid(networkType)) {
Vinit Deshapnde6a2d3252013-09-04 14:11:24 -07004917 return mNetTrackers[networkType].getLinkQualityInfo();
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -07004918 } else {
4919 return null;
4920 }
4921 }
4922
4923 @Override
Vinit Deshapnde6a2d3252013-09-04 14:11:24 -07004924 public LinkQualityInfo getActiveLinkQualityInfo() {
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -07004925 enforceAccessPermission();
4926 if (isNetworkTypeValid(mActiveDefaultNetwork)) {
Vinit Deshapnde6a2d3252013-09-04 14:11:24 -07004927 return mNetTrackers[mActiveDefaultNetwork].getLinkQualityInfo();
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -07004928 } else {
4929 return null;
4930 }
4931 }
4932
4933 @Override
Vinit Deshapnde6a2d3252013-09-04 14:11:24 -07004934 public LinkQualityInfo[] getAllLinkQualityInfo() {
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -07004935 enforceAccessPermission();
Vinit Deshapnde6a2d3252013-09-04 14:11:24 -07004936 final ArrayList<LinkQualityInfo> result = Lists.newArrayList();
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -07004937 for (NetworkStateTracker tracker : mNetTrackers) {
4938 if (tracker != null) {
Vinit Deshapnde6a2d3252013-09-04 14:11:24 -07004939 LinkQualityInfo li = tracker.getLinkQualityInfo();
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -07004940 if (li != null) {
4941 result.add(li);
4942 }
4943 }
4944 }
4945
Vinit Deshapnde6a2d3252013-09-04 14:11:24 -07004946 return result.toArray(new LinkQualityInfo[result.size()]);
Vinit Deshapnde1f12cb52013-08-21 13:09:01 -07004947 }
4948
4949 /* Infrastructure for network sampling */
4950
4951 private void handleNetworkSamplingTimeout() {
4952
4953 log("Sampling interval elapsed, updating statistics ..");
4954
4955 // initialize list of interfaces ..
4956 Map<String, SamplingDataTracker.SamplingSnapshot> mapIfaceToSample =
4957 new HashMap<String, SamplingDataTracker.SamplingSnapshot>();
4958 for (NetworkStateTracker tracker : mNetTrackers) {
4959 if (tracker != null) {
4960 String ifaceName = tracker.getNetworkInterfaceName();
4961 if (ifaceName != null) {
4962 mapIfaceToSample.put(ifaceName, null);
4963 }
4964 }
4965 }
4966
4967 // Read samples for all interfaces
4968 SamplingDataTracker.getSamplingSnapshots(mapIfaceToSample);
4969
4970 // process samples for all networks
4971 for (NetworkStateTracker tracker : mNetTrackers) {
4972 if (tracker != null) {
4973 String ifaceName = tracker.getNetworkInterfaceName();
4974 SamplingDataTracker.SamplingSnapshot ss = mapIfaceToSample.get(ifaceName);
4975 if (ss != null) {
4976 // end the previous sampling cycle
4977 tracker.stopSampling(ss);
4978 // start a new sampling cycle ..
4979 tracker.startSampling(ss);
4980 }
4981 }
4982 }
4983
4984 log("Done.");
4985
4986 int samplingIntervalInSeconds = Settings.Global.getInt(mContext.getContentResolver(),
4987 Settings.Global.CONNECTIVITY_SAMPLING_INTERVAL_IN_SECONDS,
4988 DEFAULT_SAMPLING_INTERVAL_IN_SECONDS);
4989
4990 if (DBG) log("Setting timer for " + String.valueOf(samplingIntervalInSeconds) + "seconds");
4991
4992 setAlarm(samplingIntervalInSeconds * 1000, mSampleIntervalElapsedIntent);
4993 }
4994
4995 void setAlarm(int timeoutInMilliseconds, PendingIntent intent) {
4996 long wakeupTime = SystemClock.elapsedRealtime() + timeoutInMilliseconds;
4997 mAlarmManager.set(AlarmManager.ELAPSED_REALTIME_WAKEUP, wakeupTime, intent);
4998 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08004999}