blob: eebd1c5e9642a1373d260678639b0cad136d2ec5 [file] [log] [blame]
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2007 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server;
18
Dianne Hackborna06de0f2012-12-11 16:34:47 -080019import android.app.AppOpsManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080020import android.app.PendingIntent;
Victoria Lease38389b62012-09-30 11:44:22 -070021import android.content.BroadcastReceiver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080022import android.content.ContentResolver;
23import android.content.Context;
24import android.content.Intent;
Victoria Lease38389b62012-09-30 11:44:22 -070025import android.content.IntentFilter;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070026import android.content.pm.ApplicationInfo;
Jeff Hamiltonfbadb692012-10-05 14:21:58 -050027import android.content.pm.PackageInfo;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080028import android.content.pm.PackageManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070029import android.content.pm.PackageManager.NameNotFoundException;
Jeff Hamiltonfbadb692012-10-05 14:21:58 -050030import android.content.pm.ResolveInfo;
31import android.content.pm.Signature;
Mike Lockwood628fd6d2010-01-25 22:46:13 -050032import android.content.res.Resources;
Brian Muramatsubb95cb92012-08-29 10:43:21 -070033import android.database.ContentObserver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080034import android.location.Address;
Mike Lockwood03ca2162010-04-01 08:10:09 -070035import android.location.Criteria;
Mike Lockwood34901402010-01-04 12:14:21 -050036import android.location.GeocoderParams;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070037import android.location.Geofence;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080038import android.location.IGpsStatusListener;
Mike Lockwood15e3d0f2009-05-01 07:53:28 -040039import android.location.IGpsStatusProvider;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080040import android.location.ILocationListener;
41import android.location.ILocationManager;
Danke Xie22d1f9f2009-08-18 18:28:45 -040042import android.location.INetInitiatedListener;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080043import android.location.Location;
44import android.location.LocationManager;
45import android.location.LocationProvider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070046import android.location.LocationRequest;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080047import android.os.Binder;
48import android.os.Bundle;
49import android.os.Handler;
50import android.os.IBinder;
Mike Lockwood3d12b512009-04-21 23:25:35 -070051import android.os.Looper;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080052import android.os.Message;
53import android.os.PowerManager;
Mike Lockwoode932f7f2009-04-06 10:51:26 -070054import android.os.Process;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080055import android.os.RemoteException;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070056import android.os.SystemClock;
Dianne Hackborn5ac72a22012-08-29 18:32:08 -070057import android.os.UserHandle;
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -070058import android.os.WorkSource;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080059import android.provider.Settings;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080060import android.util.Log;
Joe Onorato8a9b2202010-02-26 18:56:32 -080061import android.util.Slog;
Mike Lockwoode97ae402010-09-29 15:23:46 -040062import com.android.internal.content.PackageMonitor;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070063import com.android.internal.location.ProviderProperties;
64import com.android.internal.location.ProviderRequest;
Dianne Hackborn8d044e82013-04-30 17:24:15 -070065import com.android.internal.os.BackgroundThread;
destradaa1af4b022013-07-12 15:43:36 -070066import com.android.server.location.FlpHardwareProvider;
67import com.android.server.location.FusedProxy;
Mike Lockwood43e33f22010-03-26 10:41:48 -040068import com.android.server.location.GeocoderProxy;
Jaikumar Ganesh8ce470d2013-04-03 12:22:18 -070069import com.android.server.location.GeofenceProxy;
Nick Pellye0fd6932012-07-11 10:26:13 -070070import com.android.server.location.GeofenceManager;
Mike Lockwood43e33f22010-03-26 10:41:48 -040071import com.android.server.location.GpsLocationProvider;
Nick Pelly4035f5a2012-08-17 14:43:49 -070072import com.android.server.location.LocationBlacklist;
Nick Pelly74fa7ea2012-08-13 19:36:38 -070073import com.android.server.location.LocationFudger;
Mike Lockwood43e33f22010-03-26 10:41:48 -040074import com.android.server.location.LocationProviderInterface;
75import com.android.server.location.LocationProviderProxy;
76import com.android.server.location.MockProvider;
77import com.android.server.location.PassiveProvider;
78
79import java.io.FileDescriptor;
80import java.io.PrintWriter;
81import java.util.ArrayList;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070082import java.util.Arrays;
Mike Lockwood43e33f22010-03-26 10:41:48 -040083import java.util.HashMap;
84import java.util.HashSet;
85import java.util.List;
86import java.util.Map;
Mike Lockwood43e33f22010-03-26 10:41:48 -040087import java.util.Set;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080088
89/**
90 * The service class that manages LocationProviders and issues location
91 * updates and alerts.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080092 */
Victoria Lease5cd731a2012-12-19 15:04:21 -080093public class LocationManagerService extends ILocationManager.Stub {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080094 private static final String TAG = "LocationManagerService";
JP Abgrallf79811e72013-02-01 18:45:05 -080095 public static final boolean D = Log.isLoggable(TAG, Log.DEBUG);
Nick Pelly6fa9ad42012-07-16 12:18:23 -070096
97 private static final String WAKELOCK_KEY = TAG;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080098
Victoria Lease37425c32012-10-16 16:08:48 -070099 // Location resolution level: no location data whatsoever
100 private static final int RESOLUTION_LEVEL_NONE = 0;
101 // Location resolution level: coarse location data only
102 private static final int RESOLUTION_LEVEL_COARSE = 1;
103 // Location resolution level: fine location data
104 private static final int RESOLUTION_LEVEL_FINE = 2;
105
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800106 private static final String ACCESS_MOCK_LOCATION =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700107 android.Manifest.permission.ACCESS_MOCK_LOCATION;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800108 private static final String ACCESS_LOCATION_EXTRA_COMMANDS =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700109 android.Manifest.permission.ACCESS_LOCATION_EXTRA_COMMANDS;
Mike Lockwood275555c2009-05-01 11:30:34 -0400110 private static final String INSTALL_LOCATION_PROVIDER =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700111 android.Manifest.permission.INSTALL_LOCATION_PROVIDER;
112
113 private static final String NETWORK_LOCATION_SERVICE_ACTION =
Stan Chesnutt39062dd2013-07-22 14:33:30 -0700114 "com.android.location.service.v3.NetworkLocationProvider";
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700115 private static final String FUSED_LOCATION_SERVICE_ACTION =
116 "com.android.location.service.FusedLocationProvider";
117
118 private static final int MSG_LOCATION_CHANGED = 1;
119
David Christie1b9b7b12013-04-15 15:31:11 -0700120 private static final long NANOS_PER_MILLI = 1000000L;
121
David Christie0b837452013-07-29 16:02:13 -0700122 // The maximum interval a location request can have and still be considered "high power".
123 private static final long HIGH_POWER_INTERVAL_MS = 5 * 60 * 1000;
124
Nick Pellyf1be6862012-05-15 10:53:42 -0700125 // Location Providers may sometimes deliver location updates
126 // slightly faster that requested - provide grace period so
127 // we don't unnecessarily filter events that are otherwise on
128 // time
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700129 private static final int MAX_PROVIDER_SCHEDULING_JITTER_MS = 100;
Nick Pellyf1be6862012-05-15 10:53:42 -0700130
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700131 private static final LocationRequest DEFAULT_LOCATION_REQUEST = new LocationRequest();
132
133 private final Context mContext;
Dianne Hackborna06de0f2012-12-11 16:34:47 -0800134 private final AppOpsManager mAppOps;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700135
136 // used internally for synchronization
137 private final Object mLock = new Object();
138
Victoria Lease5cd731a2012-12-19 15:04:21 -0800139 // --- fields below are final after systemReady() ---
Nick Pelly74fa7ea2012-08-13 19:36:38 -0700140 private LocationFudger mLocationFudger;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700141 private GeofenceManager mGeofenceManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700142 private PackageManager mPackageManager;
Victoria Lease0aa28602013-05-29 15:28:26 -0700143 private PowerManager mPowerManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700144 private GeocoderProxy mGeocodeProvider;
145 private IGpsStatusProvider mGpsStatusProvider;
146 private INetInitiatedListener mNetInitiatedListener;
147 private LocationWorkerHandler mLocationHandler;
Nick Pelly4035f5a2012-08-17 14:43:49 -0700148 private PassiveProvider mPassiveProvider; // track passive provider for special cases
149 private LocationBlacklist mBlacklist;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700150
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700151 // --- fields below are protected by mLock ---
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800152 // Set of providers that are explicitly enabled
153 private final Set<String> mEnabledProviders = new HashSet<String>();
154
155 // Set of providers that are explicitly disabled
156 private final Set<String> mDisabledProviders = new HashSet<String>();
157
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700158 // Mock (test) providers
159 private final HashMap<String, MockProvider> mMockProviders =
160 new HashMap<String, MockProvider>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800161
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700162 // all receivers
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400163 private final HashMap<Object, Receiver> mReceivers = new HashMap<Object, Receiver>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800164
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700165 // currently installed providers (with mocks replacing real providers)
Mike Lockwoodd03ff942010-02-09 08:46:14 -0500166 private final ArrayList<LocationProviderInterface> mProviders =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700167 new ArrayList<LocationProviderInterface>();
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400168
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700169 // real providers, saved here when mocked out
170 private final HashMap<String, LocationProviderInterface> mRealProviders =
171 new HashMap<String, LocationProviderInterface>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800172
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700173 // mapping from provider name to provider
174 private final HashMap<String, LocationProviderInterface> mProvidersByName =
175 new HashMap<String, LocationProviderInterface>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800176
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700177 // mapping from provider name to all its UpdateRecords
178 private final HashMap<String, ArrayList<UpdateRecord>> mRecordsByProvider =
179 new HashMap<String, ArrayList<UpdateRecord>>();
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -0700180
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700181 // mapping from provider name to last known location
182 private final HashMap<String, Location> mLastLocation = new HashMap<String, Location>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800183
David Christie1b9b7b12013-04-15 15:31:11 -0700184 // same as mLastLocation, but is not updated faster than LocationFudger.FASTEST_INTERVAL_MS.
185 // locations stored here are not fudged for coarse permissions.
186 private final HashMap<String, Location> mLastLocationCoarseInterval =
187 new HashMap<String, Location>();
188
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700189 // all providers that operate over proxy, for authorizing incoming location
190 private final ArrayList<LocationProviderProxy> mProxyProviders =
191 new ArrayList<LocationProviderProxy>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800192
Victoria Lease38389b62012-09-30 11:44:22 -0700193 // current active user on the device - other users are denied location data
194 private int mCurrentUserId = UserHandle.USER_OWNER;
195
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700196 public LocationManagerService(Context context) {
197 super();
198 mContext = context;
Dianne Hackborna06de0f2012-12-11 16:34:47 -0800199 mAppOps = (AppOpsManager)context.getSystemService(Context.APP_OPS_SERVICE);
The Android Open Source Project4df24232009-03-05 14:34:35 -0800200
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700201 if (D) Log.d(TAG, "Constructed");
202
203 // most startup is deferred until systemReady()
204 }
205
Svetoslav Ganova0027152013-06-25 14:59:53 -0700206 public void systemRunning() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700207 synchronized (mLock) {
Victoria Lease5cd731a2012-12-19 15:04:21 -0800208 if (D) Log.d(TAG, "systemReady()");
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700209
Victoria Lease5cd731a2012-12-19 15:04:21 -0800210 // fetch package manager
211 mPackageManager = mContext.getPackageManager();
212
Victoria Lease0aa28602013-05-29 15:28:26 -0700213 // fetch power manager
214 mPowerManager = (PowerManager) mContext.getSystemService(Context.POWER_SERVICE);
Victoria Lease5cd731a2012-12-19 15:04:21 -0800215
216 // prepare worker thread
Dianne Hackborn8d044e82013-04-30 17:24:15 -0700217 mLocationHandler = new LocationWorkerHandler(BackgroundThread.get().getLooper());
Victoria Lease5cd731a2012-12-19 15:04:21 -0800218
219 // prepare mLocationHandler's dependents
220 mLocationFudger = new LocationFudger(mContext, mLocationHandler);
221 mBlacklist = new LocationBlacklist(mContext, mLocationHandler);
222 mBlacklist.init();
223 mGeofenceManager = new GeofenceManager(mContext, mBlacklist);
224
Dianne Hackbornc2293022013-02-06 23:14:49 -0800225 // Monitor for app ops mode changes.
Dianne Hackborn9bb0ee92013-09-22 12:31:38 -0700226 AppOpsManager.OnOpChangedListener callback
227 = new AppOpsManager.OnOpChangedInternalListener() {
228 public void onOpChanged(int op, String packageName) {
Dianne Hackbornc2293022013-02-06 23:14:49 -0800229 synchronized (mLock) {
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700230 for (Receiver receiver : mReceivers.values()) {
231 receiver.updateMonitoring(true);
232 }
Dianne Hackbornc2293022013-02-06 23:14:49 -0800233 applyAllProviderRequirementsLocked();
234 }
235 }
236 };
237 mAppOps.startWatchingMode(AppOpsManager.OP_COARSE_LOCATION, null, callback);
238
Victoria Lease5cd731a2012-12-19 15:04:21 -0800239 // prepare providers
240 loadProvidersLocked();
241 updateProvidersLocked();
242 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700243
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700244 // listen for settings changes
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700245 mContext.getContentResolver().registerContentObserver(
Laurent Tu75defb62012-11-01 16:21:52 -0700246 Settings.Secure.getUriFor(Settings.Secure.LOCATION_PROVIDERS_ALLOWED), true,
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700247 new ContentObserver(mLocationHandler) {
Victoria Lease5cd731a2012-12-19 15:04:21 -0800248 @Override
249 public void onChange(boolean selfChange) {
250 synchronized (mLock) {
251 updateProvidersLocked();
252 }
253 }
254 }, UserHandle.USER_ALL);
255 mPackageMonitor.register(mContext, mLocationHandler.getLooper(), true);
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700256
Victoria Lease38389b62012-09-30 11:44:22 -0700257 // listen for user change
258 IntentFilter intentFilter = new IntentFilter();
259 intentFilter.addAction(Intent.ACTION_USER_SWITCHED);
260
261 mContext.registerReceiverAsUser(new BroadcastReceiver() {
262 @Override
263 public void onReceive(Context context, Intent intent) {
264 String action = intent.getAction();
265 if (Intent.ACTION_USER_SWITCHED.equals(action)) {
266 switchUser(intent.getIntExtra(Intent.EXTRA_USER_HANDLE, 0));
267 }
268 }
Victoria Lease5cd731a2012-12-19 15:04:21 -0800269 }, UserHandle.ALL, intentFilter, null, mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700270 }
271
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500272 private void ensureFallbackFusedProviderPresentLocked(ArrayList<String> pkgs) {
273 PackageManager pm = mContext.getPackageManager();
274 String systemPackageName = mContext.getPackageName();
275 ArrayList<HashSet<Signature>> sigSets = ServiceWatcher.getSignatureSets(mContext, pkgs);
276
277 List<ResolveInfo> rInfos = pm.queryIntentServicesAsUser(
278 new Intent(FUSED_LOCATION_SERVICE_ACTION),
279 PackageManager.GET_META_DATA, mCurrentUserId);
280 for (ResolveInfo rInfo : rInfos) {
281 String packageName = rInfo.serviceInfo.packageName;
282
283 // Check that the signature is in the list of supported sigs. If it's not in
284 // this list the standard provider binding logic won't bind to it.
285 try {
286 PackageInfo pInfo;
287 pInfo = pm.getPackageInfo(packageName, PackageManager.GET_SIGNATURES);
288 if (!ServiceWatcher.isSignatureMatch(pInfo.signatures, sigSets)) {
289 Log.w(TAG, packageName + " resolves service " + FUSED_LOCATION_SERVICE_ACTION +
290 ", but has wrong signature, ignoring");
291 continue;
292 }
293 } catch (NameNotFoundException e) {
294 Log.e(TAG, "missing package: " + packageName);
295 continue;
296 }
297
298 // Get the version info
299 if (rInfo.serviceInfo.metaData == null) {
300 Log.w(TAG, "Found fused provider without metadata: " + packageName);
301 continue;
302 }
303
304 int version = rInfo.serviceInfo.metaData.getInt(
305 ServiceWatcher.EXTRA_SERVICE_VERSION, -1);
306 if (version == 0) {
307 // This should be the fallback fused location provider.
308
309 // Make sure it's in the system partition.
310 if ((rInfo.serviceInfo.applicationInfo.flags & ApplicationInfo.FLAG_SYSTEM) == 0) {
311 if (D) Log.d(TAG, "Fallback candidate not in /system: " + packageName);
312 continue;
313 }
314
315 // Check that the fallback is signed the same as the OS
316 // as a proxy for coreApp="true"
317 if (pm.checkSignatures(systemPackageName, packageName)
318 != PackageManager.SIGNATURE_MATCH) {
319 if (D) Log.d(TAG, "Fallback candidate not signed the same as system: "
320 + packageName);
321 continue;
322 }
323
324 // Found a valid fallback.
325 if (D) Log.d(TAG, "Found fallback provider: " + packageName);
326 return;
327 } else {
328 if (D) Log.d(TAG, "Fallback candidate not version 0: " + packageName);
329 }
330 }
331
332 throw new IllegalStateException("Unable to find a fused location provider that is in the "
333 + "system partition with version 0 and signed with the platform certificate. "
334 + "Such a package is needed to provide a default fused location provider in the "
335 + "event that no other fused location provider has been installed or is currently "
336 + "available. For example, coreOnly boot mode when decrypting the data "
337 + "partition. The fallback must also be marked coreApp=\"true\" in the manifest");
338 }
339
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700340 private void loadProvidersLocked() {
Victoria Lease5c24fd02012-10-01 11:00:50 -0700341 // create a passive location provider, which is always enabled
342 PassiveProvider passiveProvider = new PassiveProvider(this);
343 addProviderLocked(passiveProvider);
344 mEnabledProviders.add(passiveProvider.getName());
345 mPassiveProvider = passiveProvider;
Jaikumar Ganesh8ce470d2013-04-03 12:22:18 -0700346 // Create a gps location provider
347 GpsLocationProvider gpsProvider = new GpsLocationProvider(mContext, this,
348 mLocationHandler.getLooper());
Victoria Lease5c24fd02012-10-01 11:00:50 -0700349
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700350 if (GpsLocationProvider.isSupported()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700351 mGpsStatusProvider = gpsProvider.getGpsStatusProvider();
352 mNetInitiatedListener = gpsProvider.getNetInitiatedListener();
353 addProviderLocked(gpsProvider);
354 mRealProviders.put(LocationManager.GPS_PROVIDER, gpsProvider);
355 }
356
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700357 /*
358 Load package name(s) containing location provider support.
359 These packages can contain services implementing location providers:
360 Geocoder Provider, Network Location Provider, and
361 Fused Location Provider. They will each be searched for
362 service components implementing these providers.
363 The location framework also has support for installation
364 of new location providers at run-time. The new package does not
365 have to be explicitly listed here, however it must have a signature
366 that matches the signature of at least one package on this list.
367 */
368 Resources resources = mContext.getResources();
369 ArrayList<String> providerPackageNames = new ArrayList<String>();
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500370 String[] pkgs = resources.getStringArray(
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700371 com.android.internal.R.array.config_locationProviderPackageNames);
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500372 if (D) Log.d(TAG, "certificates for location providers pulled from: " +
373 Arrays.toString(pkgs));
374 if (pkgs != null) providerPackageNames.addAll(Arrays.asList(pkgs));
375
376 ensureFallbackFusedProviderPresentLocked(providerPackageNames);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700377
378 // bind to network provider
379 LocationProviderProxy networkProvider = LocationProviderProxy.createAndBind(
380 mContext,
381 LocationManager.NETWORK_PROVIDER,
382 NETWORK_LOCATION_SERVICE_ACTION,
Zhentao Sunc5fc9982013-04-17 17:47:53 -0700383 com.android.internal.R.bool.config_enableNetworkLocationOverlay,
384 com.android.internal.R.string.config_networkLocationProviderPackageName,
385 com.android.internal.R.array.config_locationProviderPackageNames,
386 mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700387 if (networkProvider != null) {
388 mRealProviders.put(LocationManager.NETWORK_PROVIDER, networkProvider);
389 mProxyProviders.add(networkProvider);
390 addProviderLocked(networkProvider);
391 } else {
392 Slog.w(TAG, "no network location provider found");
393 }
394
395 // bind to fused provider
396 LocationProviderProxy fusedLocationProvider = LocationProviderProxy.createAndBind(
397 mContext,
398 LocationManager.FUSED_PROVIDER,
399 FUSED_LOCATION_SERVICE_ACTION,
Zhentao Sunc5fc9982013-04-17 17:47:53 -0700400 com.android.internal.R.bool.config_enableFusedLocationOverlay,
401 com.android.internal.R.string.config_fusedLocationProviderPackageName,
402 com.android.internal.R.array.config_locationProviderPackageNames,
403 mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700404 if (fusedLocationProvider != null) {
405 addProviderLocked(fusedLocationProvider);
406 mProxyProviders.add(fusedLocationProvider);
407 mEnabledProviders.add(fusedLocationProvider.getName());
Kenny Rootc3575182012-10-09 12:44:40 -0700408 mRealProviders.put(LocationManager.FUSED_PROVIDER, fusedLocationProvider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700409 } else {
410 Slog.e(TAG, "no fused location provider found",
411 new IllegalStateException("Location service needs a fused location provider"));
412 }
413
414 // bind to geocoder provider
Zhentao Sunc5fc9982013-04-17 17:47:53 -0700415 mGeocodeProvider = GeocoderProxy.createAndBind(mContext,
416 com.android.internal.R.bool.config_enableGeocoderOverlay,
417 com.android.internal.R.string.config_geocoderProviderPackageName,
418 com.android.internal.R.array.config_locationProviderPackageNames,
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800419 mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700420 if (mGeocodeProvider == null) {
421 Slog.e(TAG, "no geocoder provider found");
422 }
Jaikumar Ganesh8ce470d2013-04-03 12:22:18 -0700423
destradaa1af4b022013-07-12 15:43:36 -0700424 // bind to fused provider
destradaa1af4b022013-07-12 15:43:36 -0700425 FlpHardwareProvider flpHardwareProvider = FlpHardwareProvider.getInstance(mContext);
426 FusedProxy fusedProxy = FusedProxy.createAndBind(
427 mContext,
428 mLocationHandler,
destradaa64be0c62013-08-09 15:01:49 -0700429 flpHardwareProvider.getLocationHardware(),
430 com.android.internal.R.bool.config_enableFusedLocationOverlay,
431 com.android.internal.R.string.config_fusedLocationProviderPackageName,
432 com.android.internal.R.array.config_locationProviderPackageNames);
destradaa1af4b022013-07-12 15:43:36 -0700433 if(fusedProxy == null) {
434 Slog.e(TAG, "No FusedProvider found.");
435 }
destradaa0682809a2013-08-12 18:50:30 -0700436
437 // bind to geofence provider
438 GeofenceProxy provider = GeofenceProxy.createAndBind(mContext,
439 com.android.internal.R.bool.config_enableGeofenceOverlay,
440 com.android.internal.R.string.config_geofenceProviderPackageName,
441 com.android.internal.R.array.config_locationProviderPackageNames,
442 mLocationHandler,
443 gpsProvider.getGpsGeofenceProxy(),
444 flpHardwareProvider.getGeofenceHardware());
445 if (provider == null) {
446 Slog.e(TAG, "no geofence provider found");
447 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700448 }
Mike Lockwood9637d472009-04-02 21:41:57 -0700449
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800450 /**
Victoria Lease38389b62012-09-30 11:44:22 -0700451 * Called when the device's active user changes.
452 * @param userId the new active user's UserId
453 */
454 private void switchUser(int userId) {
Victoria Lease83762d22012-10-03 13:51:17 -0700455 mBlacklist.switchUser(userId);
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800456 mLocationHandler.removeMessages(MSG_LOCATION_CHANGED);
Victoria Lease38389b62012-09-30 11:44:22 -0700457 synchronized (mLock) {
Victoria Leaseb711d572012-10-02 13:14:11 -0700458 mLastLocation.clear();
David Christie1b9b7b12013-04-15 15:31:11 -0700459 mLastLocationCoarseInterval.clear();
Victoria Leaseb711d572012-10-02 13:14:11 -0700460 for (LocationProviderInterface p : mProviders) {
461 updateProviderListenersLocked(p.getName(), false, mCurrentUserId);
Victoria Leaseb711d572012-10-02 13:14:11 -0700462 }
Victoria Lease38389b62012-09-30 11:44:22 -0700463 mCurrentUserId = userId;
Victoria Leaseb711d572012-10-02 13:14:11 -0700464 updateProvidersLocked();
Victoria Lease38389b62012-09-30 11:44:22 -0700465 }
466 }
467
468 /**
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800469 * A wrapper class holding either an ILocationListener or a PendingIntent to receive
470 * location updates.
471 */
Mike Lockwood48f17512009-04-23 09:12:08 -0700472 private final class Receiver implements IBinder.DeathRecipient, PendingIntent.OnFinished {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700473 final int mUid; // uid of receiver
474 final int mPid; // pid of receiver
475 final String mPackageName; // package name of receiver
Victoria Lease37425c32012-10-16 16:08:48 -0700476 final int mAllowedResolutionLevel; // resolution level allowed to receiver
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700477
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800478 final ILocationListener mListener;
479 final PendingIntent mPendingIntent;
David Christie82edc9b2013-07-19 11:31:42 -0700480 final WorkSource mWorkSource; // WorkSource for battery blame, or null to assign to caller.
David Christie40e57822013-07-30 11:36:48 -0700481 final boolean mHideFromAppOps; // True if AppOps should not monitor this receiver.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800482 final Object mKey;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700483
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400484 final HashMap<String,UpdateRecord> mUpdateRecords = new HashMap<String,UpdateRecord>();
Nick Pellyf1be6862012-05-15 10:53:42 -0700485
David Christie0b837452013-07-29 16:02:13 -0700486 // True if app ops has started monitoring this receiver for locations.
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700487 boolean mOpMonitoring;
David Christie0b837452013-07-29 16:02:13 -0700488 // True if app ops has started monitoring this receiver for high power (gps) locations.
489 boolean mOpHighPowerMonitoring;
Mike Lockwood48f17512009-04-23 09:12:08 -0700490 int mPendingBroadcasts;
Victoria Lease0aa28602013-05-29 15:28:26 -0700491 PowerManager.WakeLock mWakeLock;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800492
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700493 Receiver(ILocationListener listener, PendingIntent intent, int pid, int uid,
David Christie40e57822013-07-30 11:36:48 -0700494 String packageName, WorkSource workSource, boolean hideFromAppOps) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800495 mListener = listener;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800496 mPendingIntent = intent;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700497 if (listener != null) {
498 mKey = listener.asBinder();
499 } else {
500 mKey = intent;
501 }
Victoria Lease37425c32012-10-16 16:08:48 -0700502 mAllowedResolutionLevel = getAllowedResolutionLevel(pid, uid);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700503 mUid = uid;
504 mPid = pid;
505 mPackageName = packageName;
David Christie82edc9b2013-07-19 11:31:42 -0700506 if (workSource != null && workSource.size() <= 0) {
507 workSource = null;
508 }
509 mWorkSource = workSource;
David Christie40e57822013-07-30 11:36:48 -0700510 mHideFromAppOps = hideFromAppOps;
Victoria Lease0aa28602013-05-29 15:28:26 -0700511
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700512 updateMonitoring(true);
513
Victoria Lease0aa28602013-05-29 15:28:26 -0700514 // construct/configure wakelock
515 mWakeLock = mPowerManager.newWakeLock(PowerManager.PARTIAL_WAKE_LOCK, WAKELOCK_KEY);
David Christie82edc9b2013-07-19 11:31:42 -0700516 if (workSource == null) {
517 workSource = new WorkSource(mUid, mPackageName);
518 }
519 mWakeLock.setWorkSource(workSource);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800520 }
521
522 @Override
523 public boolean equals(Object otherObj) {
524 if (otherObj instanceof Receiver) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700525 return mKey.equals(((Receiver)otherObj).mKey);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800526 }
527 return false;
528 }
529
530 @Override
531 public int hashCode() {
532 return mKey.hashCode();
533 }
Mike Lockwood3681f262009-05-12 10:52:03 -0400534
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800535 @Override
536 public String toString() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700537 StringBuilder s = new StringBuilder();
538 s.append("Reciever[");
539 s.append(Integer.toHexString(System.identityHashCode(this)));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800540 if (mListener != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700541 s.append(" listener");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800542 } else {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700543 s.append(" intent");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800544 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700545 for (String p : mUpdateRecords.keySet()) {
546 s.append(" ").append(mUpdateRecords.get(p).toString());
547 }
548 s.append("]");
549 return s.toString();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800550 }
551
David Christie15b31912013-08-13 15:54:32 -0700552 /**
553 * Update AppOp monitoring for this receiver.
554 *
555 * @param allow If true receiver is currently active, if false it's been removed.
556 */
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700557 public void updateMonitoring(boolean allow) {
David Christie40e57822013-07-30 11:36:48 -0700558 if (mHideFromAppOps) {
559 return;
560 }
561
David Christie15b31912013-08-13 15:54:32 -0700562 boolean requestingLocation = false;
563 boolean requestingHighPowerLocation = false;
564 if (allow) {
565 // See if receiver has any enabled update records. Also note if any update records
566 // are high power (has a high power provider with an interval under a threshold).
567 for (UpdateRecord updateRecord : mUpdateRecords.values()) {
568 if (isAllowedByCurrentUserSettingsLocked(updateRecord.mProvider)) {
569 requestingLocation = true;
570 LocationProviderInterface locationProvider
571 = mProvidersByName.get(updateRecord.mProvider);
572 ProviderProperties properties = locationProvider != null
573 ? locationProvider.getProperties() : null;
574 if (properties != null
575 && properties.mPowerRequirement == Criteria.POWER_HIGH
576 && updateRecord.mRequest.getInterval() < HIGH_POWER_INTERVAL_MS) {
577 requestingHighPowerLocation = true;
578 break;
579 }
580 }
581 }
582 }
583
David Christie0b837452013-07-29 16:02:13 -0700584 // First update monitoring of any location request (including high power).
David Christie15b31912013-08-13 15:54:32 -0700585 mOpMonitoring = updateMonitoring(
586 requestingLocation,
587 mOpMonitoring,
David Christie0b837452013-07-29 16:02:13 -0700588 AppOpsManager.OP_MONITOR_LOCATION);
589
590 // Now update monitoring of high power requests only.
David Christiec750c1f2013-08-08 12:56:57 -0700591 boolean wasHighPowerMonitoring = mOpHighPowerMonitoring;
David Christie15b31912013-08-13 15:54:32 -0700592 mOpHighPowerMonitoring = updateMonitoring(
593 requestingHighPowerLocation,
594 mOpHighPowerMonitoring,
David Christie0b837452013-07-29 16:02:13 -0700595 AppOpsManager.OP_MONITOR_HIGH_POWER_LOCATION);
David Christiec750c1f2013-08-08 12:56:57 -0700596 if (mOpHighPowerMonitoring != wasHighPowerMonitoring) {
David Christie15b31912013-08-13 15:54:32 -0700597 // Send an intent to notify that a high power request has been added/removed.
David Christiec750c1f2013-08-08 12:56:57 -0700598 Intent intent = new Intent(LocationManager.HIGH_POWER_REQUEST_CHANGE_ACTION);
599 mContext.sendBroadcastAsUser(intent, UserHandle.ALL);
600 }
David Christie0b837452013-07-29 16:02:13 -0700601 }
602
603 /**
604 * Update AppOps monitoring for a single location request and op type.
605 *
606 * @param allowMonitoring True if monitoring is allowed for this request/op.
607 * @param currentlyMonitoring True if AppOps is currently monitoring this request/op.
608 * @param op AppOps code for the op to update.
609 * @return True if monitoring is on for this request/op after updating.
610 */
611 private boolean updateMonitoring(boolean allowMonitoring, boolean currentlyMonitoring,
612 int op) {
613 if (!currentlyMonitoring) {
614 if (allowMonitoring) {
615 return mAppOps.startOpNoThrow(op, mUid, mPackageName)
616 == AppOpsManager.MODE_ALLOWED;
617 }
618 } else {
619 if (!allowMonitoring || mAppOps.checkOpNoThrow(op, mUid, mPackageName)
620 != AppOpsManager.MODE_ALLOWED) {
621 mAppOps.finishOp(op, mUid, mPackageName);
622 return false;
623 }
624 }
625
626 return currentlyMonitoring;
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700627 }
628
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800629 public boolean isListener() {
630 return mListener != null;
631 }
632
633 public boolean isPendingIntent() {
634 return mPendingIntent != null;
635 }
636
637 public ILocationListener getListener() {
638 if (mListener != null) {
639 return mListener;
640 }
641 throw new IllegalStateException("Request for non-existent listener");
642 }
643
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800644 public boolean callStatusChangedLocked(String provider, int status, Bundle extras) {
645 if (mListener != null) {
646 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700647 synchronized (this) {
648 // synchronize to ensure incrementPendingBroadcastsLocked()
649 // is called before decrementPendingBroadcasts()
650 mListener.onStatusChanged(provider, status, extras);
Nick Pellye0fd6932012-07-11 10:26:13 -0700651 // call this after broadcasting so we do not increment
652 // if we throw an exeption.
653 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700654 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800655 } catch (RemoteException e) {
656 return false;
657 }
658 } else {
659 Intent statusChanged = new Intent();
Victoria Lease61ecb022012-11-13 15:12:51 -0800660 statusChanged.putExtras(new Bundle(extras));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800661 statusChanged.putExtra(LocationManager.KEY_STATUS_CHANGED, status);
662 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700663 synchronized (this) {
664 // synchronize to ensure incrementPendingBroadcastsLocked()
665 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700666 mPendingIntent.send(mContext, 0, statusChanged, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700667 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700668 // call this after broadcasting so we do not increment
669 // if we throw an exeption.
670 incrementPendingBroadcastsLocked();
671 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800672 } catch (PendingIntent.CanceledException e) {
673 return false;
674 }
675 }
676 return true;
677 }
678
679 public boolean callLocationChangedLocked(Location location) {
680 if (mListener != null) {
681 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700682 synchronized (this) {
683 // synchronize to ensure incrementPendingBroadcastsLocked()
684 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c5406a2012-11-29 16:18:01 -0800685 mListener.onLocationChanged(new Location(location));
Nick Pellye0fd6932012-07-11 10:26:13 -0700686 // call this after broadcasting so we do not increment
687 // if we throw an exeption.
688 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700689 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800690 } catch (RemoteException e) {
691 return false;
692 }
693 } else {
694 Intent locationChanged = new Intent();
Victoria Lease61ecb022012-11-13 15:12:51 -0800695 locationChanged.putExtra(LocationManager.KEY_LOCATION_CHANGED, new Location(location));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800696 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700697 synchronized (this) {
698 // synchronize to ensure incrementPendingBroadcastsLocked()
699 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700700 mPendingIntent.send(mContext, 0, locationChanged, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700701 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700702 // call this after broadcasting so we do not increment
703 // if we throw an exeption.
704 incrementPendingBroadcastsLocked();
705 }
706 } catch (PendingIntent.CanceledException e) {
707 return false;
708 }
709 }
710 return true;
711 }
712
713 public boolean callProviderEnabledLocked(String provider, boolean enabled) {
David Christie15b31912013-08-13 15:54:32 -0700714 // First update AppOp monitoring.
715 // An app may get/lose location access as providers are enabled/disabled.
716 updateMonitoring(true);
717
Mike Lockwood48f17512009-04-23 09:12:08 -0700718 if (mListener != null) {
719 try {
720 synchronized (this) {
721 // synchronize to ensure incrementPendingBroadcastsLocked()
722 // is called before decrementPendingBroadcasts()
723 if (enabled) {
724 mListener.onProviderEnabled(provider);
725 } else {
726 mListener.onProviderDisabled(provider);
727 }
Nick Pellye0fd6932012-07-11 10:26:13 -0700728 // call this after broadcasting so we do not increment
729 // if we throw an exeption.
730 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700731 }
732 } catch (RemoteException e) {
733 return false;
734 }
735 } else {
736 Intent providerIntent = new Intent();
737 providerIntent.putExtra(LocationManager.KEY_PROVIDER_ENABLED, enabled);
738 try {
739 synchronized (this) {
740 // synchronize to ensure incrementPendingBroadcastsLocked()
741 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700742 mPendingIntent.send(mContext, 0, providerIntent, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700743 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700744 // call this after broadcasting so we do not increment
745 // if we throw an exeption.
746 incrementPendingBroadcastsLocked();
747 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800748 } catch (PendingIntent.CanceledException e) {
749 return false;
750 }
751 }
752 return true;
753 }
754
Nick Pellyf1be6862012-05-15 10:53:42 -0700755 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800756 public void binderDied() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700757 if (D) Log.d(TAG, "Location listener died");
758
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400759 synchronized (mLock) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800760 removeUpdatesLocked(this);
761 }
Mike Lockwood48f17512009-04-23 09:12:08 -0700762 synchronized (this) {
Victoria Lease0aa28602013-05-29 15:28:26 -0700763 clearPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700764 }
765 }
766
Nick Pellye0fd6932012-07-11 10:26:13 -0700767 @Override
Mike Lockwood48f17512009-04-23 09:12:08 -0700768 public void onSendFinished(PendingIntent pendingIntent, Intent intent,
769 int resultCode, String resultData, Bundle resultExtras) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400770 synchronized (this) {
771 decrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700772 }
773 }
774
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400775 // this must be called while synchronized by caller in a synchronized block
776 // containing the sending of the broadcaset
777 private void incrementPendingBroadcastsLocked() {
778 if (mPendingBroadcasts++ == 0) {
Victoria Lease0aa28602013-05-29 15:28:26 -0700779 mWakeLock.acquire();
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400780 }
781 }
782
783 private void decrementPendingBroadcastsLocked() {
784 if (--mPendingBroadcasts == 0) {
Victoria Lease0aa28602013-05-29 15:28:26 -0700785 if (mWakeLock.isHeld()) {
786 mWakeLock.release();
787 }
788 }
789 }
790
791 public void clearPendingBroadcastsLocked() {
792 if (mPendingBroadcasts > 0) {
793 mPendingBroadcasts = 0;
794 if (mWakeLock.isHeld()) {
795 mWakeLock.release();
796 }
Mike Lockwood48f17512009-04-23 09:12:08 -0700797 }
798 }
799 }
800
Nick Pellye0fd6932012-07-11 10:26:13 -0700801 @Override
Mike Lockwood48f17512009-04-23 09:12:08 -0700802 public void locationCallbackFinished(ILocationListener listener) {
Dianne Hackbornf5fdca92013-06-05 14:53:33 -0700803 //Do not use getReceiverLocked here as that will add the ILocationListener to
Joshua Bartel080b61b2009-10-05 12:44:46 -0400804 //the receiver list if it is not found. If it is not found then the
805 //LocationListener was removed when it had a pending broadcast and should
806 //not be added back.
Dianne Hackbornf5fdca92013-06-05 14:53:33 -0700807 synchronized (mLock) {
808 IBinder binder = listener.asBinder();
809 Receiver receiver = mReceivers.get(binder);
810 if (receiver != null) {
811 synchronized (receiver) {
812 // so wakelock calls will succeed
813 long identity = Binder.clearCallingIdentity();
814 receiver.decrementPendingBroadcastsLocked();
815 Binder.restoreCallingIdentity(identity);
816 }
817 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800818 }
819 }
820
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700821 private void addProviderLocked(LocationProviderInterface provider) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400822 mProviders.add(provider);
823 mProvidersByName.put(provider.getName(), provider);
824 }
825
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700826 private void removeProviderLocked(LocationProviderInterface provider) {
827 provider.disable();
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400828 mProviders.remove(provider);
829 mProvidersByName.remove(provider.getName());
830 }
831
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800832 /**
Victoria Lease09eeaec2013-02-05 11:34:13 -0800833 * Returns "true" if access to the specified location provider is allowed by the current
834 * user's settings. Access to all location providers is forbidden to non-location-provider
835 * processes belonging to background users.
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800836 *
837 * @param provider the name of the location provider
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800838 * @return
839 */
Victoria Lease09eeaec2013-02-05 11:34:13 -0800840 private boolean isAllowedByCurrentUserSettingsLocked(String provider) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800841 if (mEnabledProviders.contains(provider)) {
842 return true;
843 }
844 if (mDisabledProviders.contains(provider)) {
845 return false;
846 }
847 // Use system settings
848 ContentResolver resolver = mContext.getContentResolver();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800849
Victoria Leaseb711d572012-10-02 13:14:11 -0700850 return Settings.Secure.isLocationProviderEnabledForUser(resolver, provider, mCurrentUserId);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800851 }
852
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700853 /**
Victoria Lease09eeaec2013-02-05 11:34:13 -0800854 * Returns "true" if access to the specified location provider is allowed by the specified
855 * user's settings. Access to all location providers is forbidden to non-location-provider
856 * processes belonging to background users.
857 *
858 * @param provider the name of the location provider
859 * @param uid the requestor's UID
860 * @return
861 */
862 private boolean isAllowedByUserSettingsLocked(String provider, int uid) {
863 if (UserHandle.getUserId(uid) != mCurrentUserId && !isUidALocationProvider(uid)) {
864 return false;
865 }
866 return isAllowedByCurrentUserSettingsLocked(provider);
867 }
868
869 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700870 * Returns the permission string associated with the specified resolution level.
871 *
872 * @param resolutionLevel the resolution level
873 * @return the permission string
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700874 */
Victoria Lease37425c32012-10-16 16:08:48 -0700875 private String getResolutionPermission(int resolutionLevel) {
876 switch (resolutionLevel) {
877 case RESOLUTION_LEVEL_FINE:
878 return android.Manifest.permission.ACCESS_FINE_LOCATION;
879 case RESOLUTION_LEVEL_COARSE:
880 return android.Manifest.permission.ACCESS_COARSE_LOCATION;
881 default:
882 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800883 }
Victoria Leaseda479c52012-10-15 15:24:16 -0700884 }
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700885
Victoria Leaseda479c52012-10-15 15:24:16 -0700886 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700887 * Returns the resolution level allowed to the given PID/UID pair.
888 *
889 * @param pid the PID
890 * @param uid the UID
891 * @return resolution level allowed to the pid/uid pair
Victoria Leaseda479c52012-10-15 15:24:16 -0700892 */
Victoria Lease37425c32012-10-16 16:08:48 -0700893 private int getAllowedResolutionLevel(int pid, int uid) {
894 if (mContext.checkPermission(android.Manifest.permission.ACCESS_FINE_LOCATION,
895 pid, uid) == PackageManager.PERMISSION_GRANTED) {
896 return RESOLUTION_LEVEL_FINE;
897 } else if (mContext.checkPermission(android.Manifest.permission.ACCESS_COARSE_LOCATION,
898 pid, uid) == PackageManager.PERMISSION_GRANTED) {
899 return RESOLUTION_LEVEL_COARSE;
900 } else {
901 return RESOLUTION_LEVEL_NONE;
Victoria Leaseda479c52012-10-15 15:24:16 -0700902 }
Victoria Lease4fab68b2012-09-13 13:20:59 -0700903 }
904
905 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700906 * Returns the resolution level allowed to the caller
907 *
908 * @return resolution level allowed to caller
Victoria Lease4fab68b2012-09-13 13:20:59 -0700909 */
Victoria Lease37425c32012-10-16 16:08:48 -0700910 private int getCallerAllowedResolutionLevel() {
911 return getAllowedResolutionLevel(Binder.getCallingPid(), Binder.getCallingUid());
912 }
913
914 /**
915 * Throw SecurityException if specified resolution level is insufficient to use geofences.
916 *
917 * @param allowedResolutionLevel resolution level allowed to caller
918 */
919 private void checkResolutionLevelIsSufficientForGeofenceUse(int allowedResolutionLevel) {
920 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
Victoria Lease4fab68b2012-09-13 13:20:59 -0700921 throw new SecurityException("Geofence usage requires ACCESS_FINE_LOCATION permission");
922 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800923 }
924
Victoria Lease37425c32012-10-16 16:08:48 -0700925 /**
926 * Return the minimum resolution level required to use the specified location provider.
927 *
928 * @param provider the name of the location provider
929 * @return minimum resolution level required for provider
930 */
931 private int getMinimumResolutionLevelForProviderUse(String provider) {
Victoria Lease8dbb6342012-09-21 16:55:53 -0700932 if (LocationManager.GPS_PROVIDER.equals(provider) ||
933 LocationManager.PASSIVE_PROVIDER.equals(provider)) {
934 // gps and passive providers require FINE permission
Victoria Lease37425c32012-10-16 16:08:48 -0700935 return RESOLUTION_LEVEL_FINE;
Victoria Lease8dbb6342012-09-21 16:55:53 -0700936 } else if (LocationManager.NETWORK_PROVIDER.equals(provider) ||
937 LocationManager.FUSED_PROVIDER.equals(provider)) {
938 // network and fused providers are ok with COARSE or FINE
Victoria Lease37425c32012-10-16 16:08:48 -0700939 return RESOLUTION_LEVEL_COARSE;
Laurent Tu941221c2012-10-04 14:21:52 -0700940 } else {
941 // mock providers
942 LocationProviderInterface lp = mMockProviders.get(provider);
943 if (lp != null) {
944 ProviderProperties properties = lp.getProperties();
945 if (properties != null) {
946 if (properties.mRequiresSatellite) {
947 // provider requiring satellites require FINE permission
Victoria Lease37425c32012-10-16 16:08:48 -0700948 return RESOLUTION_LEVEL_FINE;
Laurent Tu941221c2012-10-04 14:21:52 -0700949 } else if (properties.mRequiresNetwork || properties.mRequiresCell) {
950 // provider requiring network and or cell require COARSE or FINE
Victoria Lease37425c32012-10-16 16:08:48 -0700951 return RESOLUTION_LEVEL_COARSE;
Laurent Tu941221c2012-10-04 14:21:52 -0700952 }
953 }
954 }
Victoria Lease8dbb6342012-09-21 16:55:53 -0700955 }
Victoria Lease37425c32012-10-16 16:08:48 -0700956 return RESOLUTION_LEVEL_FINE; // if in doubt, require FINE
Victoria Leaseda479c52012-10-15 15:24:16 -0700957 }
958
Victoria Lease37425c32012-10-16 16:08:48 -0700959 /**
960 * Throw SecurityException if specified resolution level is insufficient to use the named
961 * location provider.
962 *
963 * @param allowedResolutionLevel resolution level allowed to caller
964 * @param providerName the name of the location provider
965 */
966 private void checkResolutionLevelIsSufficientForProviderUse(int allowedResolutionLevel,
967 String providerName) {
968 int requiredResolutionLevel = getMinimumResolutionLevelForProviderUse(providerName);
969 if (allowedResolutionLevel < requiredResolutionLevel) {
970 switch (requiredResolutionLevel) {
971 case RESOLUTION_LEVEL_FINE:
972 throw new SecurityException("\"" + providerName + "\" location provider " +
973 "requires ACCESS_FINE_LOCATION permission.");
974 case RESOLUTION_LEVEL_COARSE:
975 throw new SecurityException("\"" + providerName + "\" location provider " +
976 "requires ACCESS_COARSE_LOCATION or ACCESS_FINE_LOCATION permission.");
977 default:
978 throw new SecurityException("Insufficient permission for \"" + providerName +
979 "\" location provider.");
Victoria Leaseda479c52012-10-15 15:24:16 -0700980 }
981 }
Victoria Lease8dbb6342012-09-21 16:55:53 -0700982 }
983
David Christie82edc9b2013-07-19 11:31:42 -0700984 /**
985 * Throw SecurityException if WorkSource use is not allowed (i.e. can't blame other packages
986 * for battery).
987 */
David Christie40e57822013-07-30 11:36:48 -0700988 private void checkDeviceStatsAllowed() {
David Christie82edc9b2013-07-19 11:31:42 -0700989 mContext.enforceCallingOrSelfPermission(
990 android.Manifest.permission.UPDATE_DEVICE_STATS, null);
991 }
992
David Christie40e57822013-07-30 11:36:48 -0700993 private void checkUpdateAppOpsAllowed() {
994 mContext.enforceCallingOrSelfPermission(
995 android.Manifest.permission.UPDATE_APP_OPS_STATS, null);
996 }
997
Dianne Hackborn5e45ee62013-01-24 19:13:44 -0800998 public static int resolutionLevelToOp(int allowedResolutionLevel) {
Dianne Hackborn35654b62013-01-14 17:38:02 -0800999 if (allowedResolutionLevel != RESOLUTION_LEVEL_NONE) {
1000 if (allowedResolutionLevel == RESOLUTION_LEVEL_COARSE) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001001 return AppOpsManager.OP_COARSE_LOCATION;
Dianne Hackborn35654b62013-01-14 17:38:02 -08001002 } else {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001003 return AppOpsManager.OP_FINE_LOCATION;
Dianne Hackborn35654b62013-01-14 17:38:02 -08001004 }
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001005 }
1006 return -1;
1007 }
1008
1009 boolean reportLocationAccessNoThrow(int uid, String packageName, int allowedResolutionLevel) {
1010 int op = resolutionLevelToOp(allowedResolutionLevel);
1011 if (op >= 0) {
Dianne Hackborn35654b62013-01-14 17:38:02 -08001012 if (mAppOps.noteOpNoThrow(op, uid, packageName) != AppOpsManager.MODE_ALLOWED) {
1013 return false;
1014 }
1015 }
1016 return true;
1017 }
1018
1019 boolean checkLocationAccess(int uid, String packageName, int allowedResolutionLevel) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001020 int op = resolutionLevelToOp(allowedResolutionLevel);
1021 if (op >= 0) {
Dianne Hackborn35654b62013-01-14 17:38:02 -08001022 if (mAppOps.checkOp(op, uid, packageName) != AppOpsManager.MODE_ALLOWED) {
1023 return false;
1024 }
1025 }
1026 return true;
1027 }
1028
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001029 /**
1030 * Returns all providers by name, including passive, but excluding
Laurent Tu0d21e212012-10-02 15:33:48 -07001031 * fused, also including ones that are not permitted to
1032 * be accessed by the calling activity or are currently disabled.
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001033 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001034 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001035 public List<String> getAllProviders() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001036 ArrayList<String> out;
1037 synchronized (mLock) {
1038 out = new ArrayList<String>(mProviders.size());
1039 for (LocationProviderInterface provider : mProviders) {
1040 String name = provider.getName();
1041 if (LocationManager.FUSED_PROVIDER.equals(name)) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07001042 continue;
1043 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001044 out.add(name);
1045 }
1046 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001047
1048 if (D) Log.d(TAG, "getAllProviders()=" + out);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001049 return out;
1050 }
1051
Mike Lockwood03ca2162010-04-01 08:10:09 -07001052 /**
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001053 * Return all providers by name, that match criteria and are optionally
1054 * enabled.
1055 * Can return passive provider, but never returns fused provider.
Mike Lockwood03ca2162010-04-01 08:10:09 -07001056 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001057 @Override
1058 public List<String> getProviders(Criteria criteria, boolean enabledOnly) {
Victoria Lease37425c32012-10-16 16:08:48 -07001059 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001060 ArrayList<String> out;
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001061 int uid = Binder.getCallingUid();;
Victoria Lease269518e2012-10-29 08:25:39 -07001062 long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001063 try {
1064 synchronized (mLock) {
1065 out = new ArrayList<String>(mProviders.size());
1066 for (LocationProviderInterface provider : mProviders) {
1067 String name = provider.getName();
1068 if (LocationManager.FUSED_PROVIDER.equals(name)) {
Victoria Lease8dbb6342012-09-21 16:55:53 -07001069 continue;
1070 }
Victoria Lease37425c32012-10-16 16:08:48 -07001071 if (allowedResolutionLevel >= getMinimumResolutionLevelForProviderUse(name)) {
Victoria Lease09eeaec2013-02-05 11:34:13 -08001072 if (enabledOnly && !isAllowedByUserSettingsLocked(name, uid)) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001073 continue;
1074 }
1075 if (criteria != null && !LocationProvider.propertiesMeetCriteria(
1076 name, provider.getProperties(), criteria)) {
1077 continue;
1078 }
1079 out.add(name);
Victoria Lease8dbb6342012-09-21 16:55:53 -07001080 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001081 }
Mike Lockwood03ca2162010-04-01 08:10:09 -07001082 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001083 } finally {
1084 Binder.restoreCallingIdentity(identity);
Mike Lockwood03ca2162010-04-01 08:10:09 -07001085 }
1086
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001087 if (D) Log.d(TAG, "getProviders()=" + out);
1088 return out;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001089 }
1090
1091 /**
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001092 * Return the name of the best provider given a Criteria object.
1093 * This method has been deprecated from the public API,
Victoria Lease8dbb6342012-09-21 16:55:53 -07001094 * and the whole LocationProvider (including #meetsCriteria)
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001095 * has been deprecated as well. So this method now uses
1096 * some simplified logic.
Mike Lockwood03ca2162010-04-01 08:10:09 -07001097 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001098 @Override
Mike Lockwood03ca2162010-04-01 08:10:09 -07001099 public String getBestProvider(Criteria criteria, boolean enabledOnly) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001100 String result = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001101
1102 List<String> providers = getProviders(criteria, enabledOnly);
Victoria Lease8dbb6342012-09-21 16:55:53 -07001103 if (!providers.isEmpty()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001104 result = pickBest(providers);
1105 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
1106 return result;
1107 }
1108 providers = getProviders(null, enabledOnly);
Victoria Lease8dbb6342012-09-21 16:55:53 -07001109 if (!providers.isEmpty()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001110 result = pickBest(providers);
1111 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
1112 return result;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001113 }
1114
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001115 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
Mike Lockwood03ca2162010-04-01 08:10:09 -07001116 return null;
1117 }
1118
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001119 private String pickBest(List<String> providers) {
Victoria Lease1925e292012-09-24 17:00:18 -07001120 if (providers.contains(LocationManager.GPS_PROVIDER)) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001121 return LocationManager.GPS_PROVIDER;
Victoria Lease1925e292012-09-24 17:00:18 -07001122 } else if (providers.contains(LocationManager.NETWORK_PROVIDER)) {
1123 return LocationManager.NETWORK_PROVIDER;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001124 } else {
1125 return providers.get(0);
1126 }
1127 }
1128
Nick Pellye0fd6932012-07-11 10:26:13 -07001129 @Override
Mike Lockwood03ca2162010-04-01 08:10:09 -07001130 public boolean providerMeetsCriteria(String provider, Criteria criteria) {
1131 LocationProviderInterface p = mProvidersByName.get(provider);
1132 if (p == null) {
1133 throw new IllegalArgumentException("provider=" + provider);
1134 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001135
1136 boolean result = LocationProvider.propertiesMeetCriteria(
1137 p.getName(), p.getProperties(), criteria);
1138 if (D) Log.d(TAG, "providerMeetsCriteria(" + provider + ", " + criteria + ")=" + result);
1139 return result;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001140 }
1141
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001142 private void updateProvidersLocked() {
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001143 boolean changesMade = false;
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001144 for (int i = mProviders.size() - 1; i >= 0; i--) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001145 LocationProviderInterface p = mProviders.get(i);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001146 boolean isEnabled = p.isEnabled();
1147 String name = p.getName();
Victoria Lease09eeaec2013-02-05 11:34:13 -08001148 boolean shouldBeEnabled = isAllowedByCurrentUserSettingsLocked(name);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001149 if (isEnabled && !shouldBeEnabled) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001150 updateProviderListenersLocked(name, false, mCurrentUserId);
David Christieb084fef2013-12-18 14:33:57 -08001151 // If any provider has been disabled, clear all last locations for all providers.
1152 // This is to be on the safe side in case a provider has location derived from
1153 // this disabled provider.
1154 mLastLocation.clear();
1155 mLastLocationCoarseInterval.clear();
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001156 changesMade = true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001157 } else if (!isEnabled && shouldBeEnabled) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001158 updateProviderListenersLocked(name, true, mCurrentUserId);
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001159 changesMade = true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001160 }
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001161 }
1162 if (changesMade) {
Dianne Hackborn5ac72a22012-08-29 18:32:08 -07001163 mContext.sendBroadcastAsUser(new Intent(LocationManager.PROVIDERS_CHANGED_ACTION),
1164 UserHandle.ALL);
Tom O'Neill40a86c22013-09-03 18:05:13 -07001165 mContext.sendBroadcastAsUser(new Intent(LocationManager.MODE_CHANGED_ACTION),
1166 UserHandle.ALL);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001167 }
1168 }
1169
Victoria Leaseb711d572012-10-02 13:14:11 -07001170 private void updateProviderListenersLocked(String provider, boolean enabled, int userId) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001171 int listeners = 0;
1172
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001173 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001174 if (p == null) return;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001175
1176 ArrayList<Receiver> deadReceivers = null;
Nick Pellye0fd6932012-07-11 10:26:13 -07001177
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001178 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1179 if (records != null) {
1180 final int N = records.size();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001181 for (int i = 0; i < N; i++) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001182 UpdateRecord record = records.get(i);
Victoria Lease269518e2012-10-29 08:25:39 -07001183 if (UserHandle.getUserId(record.mReceiver.mUid) == userId) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001184 // Sends a notification message to the receiver
1185 if (!record.mReceiver.callProviderEnabledLocked(provider, enabled)) {
1186 if (deadReceivers == null) {
1187 deadReceivers = new ArrayList<Receiver>();
1188 }
1189 deadReceivers.add(record.mReceiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001190 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001191 listeners++;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001192 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001193 }
1194 }
1195
1196 if (deadReceivers != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001197 for (int i = deadReceivers.size() - 1; i >= 0; i--) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001198 removeUpdatesLocked(deadReceivers.get(i));
1199 }
1200 }
Nick Pellye0fd6932012-07-11 10:26:13 -07001201
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001202 if (enabled) {
1203 p.enable();
1204 if (listeners > 0) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001205 applyRequirementsLocked(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001206 }
1207 } else {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001208 p.disable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001209 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001210 }
1211
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001212 private void applyRequirementsLocked(String provider) {
1213 LocationProviderInterface p = mProvidersByName.get(provider);
1214 if (p == null) return;
1215
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001216 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001217 WorkSource worksource = new WorkSource();
1218 ProviderRequest providerRequest = new ProviderRequest();
1219
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001220 if (records != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001221 for (UpdateRecord record : records) {
Victoria Lease269518e2012-10-29 08:25:39 -07001222 if (UserHandle.getUserId(record.mReceiver.mUid) == mCurrentUserId) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001223 if (checkLocationAccess(record.mReceiver.mUid, record.mReceiver.mPackageName,
1224 record.mReceiver.mAllowedResolutionLevel)) {
1225 LocationRequest locationRequest = record.mRequest;
1226 providerRequest.locationRequests.add(locationRequest);
1227 if (locationRequest.getInterval() < providerRequest.interval) {
1228 providerRequest.reportLocation = true;
1229 providerRequest.interval = locationRequest.getInterval();
1230 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001231 }
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -07001232 }
1233 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001234
1235 if (providerRequest.reportLocation) {
1236 // calculate who to blame for power
1237 // This is somewhat arbitrary. We pick a threshold interval
1238 // that is slightly higher that the minimum interval, and
1239 // spread the blame across all applications with a request
1240 // under that threshold.
1241 long thresholdInterval = (providerRequest.interval + 1000) * 3 / 2;
1242 for (UpdateRecord record : records) {
Victoria Lease269518e2012-10-29 08:25:39 -07001243 if (UserHandle.getUserId(record.mReceiver.mUid) == mCurrentUserId) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001244 LocationRequest locationRequest = record.mRequest;
1245 if (locationRequest.getInterval() <= thresholdInterval) {
David Christiee55c9682013-08-22 10:10:34 -07001246 if (record.mReceiver.mWorkSource != null
1247 && record.mReceiver.mWorkSource.size() > 0
1248 && record.mReceiver.mWorkSource.getName(0) != null) {
David Christie82edc9b2013-07-19 11:31:42 -07001249 // Assign blame to another work source.
David Christiee55c9682013-08-22 10:10:34 -07001250 // Can only assign blame if the WorkSource contains names.
David Christie82edc9b2013-07-19 11:31:42 -07001251 worksource.add(record.mReceiver.mWorkSource);
1252 } else {
1253 // Assign blame to caller.
1254 worksource.add(
1255 record.mReceiver.mUid,
1256 record.mReceiver.mPackageName);
1257 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001258 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001259 }
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -07001260 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001261 }
1262 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001263
1264 if (D) Log.d(TAG, "provider request: " + provider + " " + providerRequest);
1265 p.setRequest(providerRequest, worksource);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001266 }
1267
1268 private class UpdateRecord {
1269 final String mProvider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001270 final LocationRequest mRequest;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001271 final Receiver mReceiver;
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001272 Location mLastFixBroadcast;
1273 long mLastStatusBroadcast;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001274
1275 /**
1276 * Note: must be constructed with lock held.
1277 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001278 UpdateRecord(String provider, LocationRequest request, Receiver receiver) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001279 mProvider = provider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001280 mRequest = request;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001281 mReceiver = receiver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001282
1283 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1284 if (records == null) {
1285 records = new ArrayList<UpdateRecord>();
1286 mRecordsByProvider.put(provider, records);
1287 }
1288 if (!records.contains(this)) {
1289 records.add(this);
1290 }
1291 }
1292
1293 /**
1294 * Method to be called when a record will no longer be used. Calling this multiple times
1295 * must have the same effect as calling it once.
1296 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001297 void disposeLocked(boolean removeReceiver) {
1298 // remove from mRecordsByProvider
1299 ArrayList<UpdateRecord> globalRecords = mRecordsByProvider.get(this.mProvider);
1300 if (globalRecords != null) {
1301 globalRecords.remove(this);
1302 }
1303
1304 if (!removeReceiver) return; // the caller will handle the rest
1305
1306 // remove from Receiver#mUpdateRecords
1307 HashMap<String, UpdateRecord> receiverRecords = mReceiver.mUpdateRecords;
1308 if (receiverRecords != null) {
1309 receiverRecords.remove(this.mProvider);
1310
1311 // and also remove the Receiver if it has no more update records
1312 if (removeReceiver && receiverRecords.size() == 0) {
1313 removeUpdatesLocked(mReceiver);
1314 }
Mike Lockwood3a76fd62009-09-01 07:26:56 -04001315 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001316 }
1317
1318 @Override
1319 public String toString() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001320 StringBuilder s = new StringBuilder();
1321 s.append("UpdateRecord[");
1322 s.append(mProvider);
1323 s.append(' ').append(mReceiver.mPackageName).append('(');
1324 s.append(mReceiver.mUid).append(')');
1325 s.append(' ').append(mRequest);
1326 s.append(']');
1327 return s.toString();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001328 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001329 }
1330
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001331 private Receiver getReceiverLocked(ILocationListener listener, int pid, int uid,
David Christie40e57822013-07-30 11:36:48 -07001332 String packageName, WorkSource workSource, boolean hideFromAppOps) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001333 IBinder binder = listener.asBinder();
1334 Receiver receiver = mReceivers.get(binder);
1335 if (receiver == null) {
David Christie40e57822013-07-30 11:36:48 -07001336 receiver = new Receiver(listener, null, pid, uid, packageName, workSource,
1337 hideFromAppOps);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001338 mReceivers.put(binder, receiver);
1339
1340 try {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001341 receiver.getListener().asBinder().linkToDeath(receiver, 0);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001342 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001343 Slog.e(TAG, "linkToDeath failed:", e);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001344 return null;
1345 }
1346 }
1347 return receiver;
1348 }
1349
David Christie82edc9b2013-07-19 11:31:42 -07001350 private Receiver getReceiverLocked(PendingIntent intent, int pid, int uid, String packageName,
David Christie40e57822013-07-30 11:36:48 -07001351 WorkSource workSource, boolean hideFromAppOps) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001352 Receiver receiver = mReceivers.get(intent);
1353 if (receiver == null) {
David Christie40e57822013-07-30 11:36:48 -07001354 receiver = new Receiver(null, intent, pid, uid, packageName, workSource,
1355 hideFromAppOps);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001356 mReceivers.put(intent, receiver);
1357 }
1358 return receiver;
1359 }
1360
Victoria Lease37425c32012-10-16 16:08:48 -07001361 /**
1362 * Creates a LocationRequest based upon the supplied LocationRequest that to meets resolution
1363 * and consistency requirements.
1364 *
1365 * @param request the LocationRequest from which to create a sanitized version
Victoria Lease37425c32012-10-16 16:08:48 -07001366 * @return a version of request that meets the given resolution and consistency requirements
1367 * @hide
1368 */
1369 private LocationRequest createSanitizedRequest(LocationRequest request, int resolutionLevel) {
1370 LocationRequest sanitizedRequest = new LocationRequest(request);
1371 if (resolutionLevel < RESOLUTION_LEVEL_FINE) {
1372 switch (sanitizedRequest.getQuality()) {
Victoria Lease09016ab2012-09-16 12:33:15 -07001373 case LocationRequest.ACCURACY_FINE:
Victoria Lease37425c32012-10-16 16:08:48 -07001374 sanitizedRequest.setQuality(LocationRequest.ACCURACY_BLOCK);
Victoria Lease09016ab2012-09-16 12:33:15 -07001375 break;
1376 case LocationRequest.POWER_HIGH:
Victoria Lease37425c32012-10-16 16:08:48 -07001377 sanitizedRequest.setQuality(LocationRequest.POWER_LOW);
Victoria Lease09016ab2012-09-16 12:33:15 -07001378 break;
1379 }
1380 // throttle
Victoria Lease37425c32012-10-16 16:08:48 -07001381 if (sanitizedRequest.getInterval() < LocationFudger.FASTEST_INTERVAL_MS) {
1382 sanitizedRequest.setInterval(LocationFudger.FASTEST_INTERVAL_MS);
Victoria Lease09016ab2012-09-16 12:33:15 -07001383 }
Victoria Lease37425c32012-10-16 16:08:48 -07001384 if (sanitizedRequest.getFastestInterval() < LocationFudger.FASTEST_INTERVAL_MS) {
1385 sanitizedRequest.setFastestInterval(LocationFudger.FASTEST_INTERVAL_MS);
Victoria Lease09016ab2012-09-16 12:33:15 -07001386 }
Nick Pelly74fa7ea2012-08-13 19:36:38 -07001387 }
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001388 // make getFastestInterval() the minimum of interval and fastest interval
Victoria Lease37425c32012-10-16 16:08:48 -07001389 if (sanitizedRequest.getFastestInterval() > sanitizedRequest.getInterval()) {
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001390 request.setFastestInterval(request.getInterval());
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001391 }
Victoria Lease37425c32012-10-16 16:08:48 -07001392 return sanitizedRequest;
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001393 }
1394
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001395 private void checkPackageName(String packageName) {
Nick Pellye0fd6932012-07-11 10:26:13 -07001396 if (packageName == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001397 throw new SecurityException("invalid package name: " + packageName);
Nick Pellye0fd6932012-07-11 10:26:13 -07001398 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001399 int uid = Binder.getCallingUid();
Nick Pellye0fd6932012-07-11 10:26:13 -07001400 String[] packages = mPackageManager.getPackagesForUid(uid);
1401 if (packages == null) {
1402 throw new SecurityException("invalid UID " + uid);
1403 }
1404 for (String pkg : packages) {
1405 if (packageName.equals(pkg)) return;
1406 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001407 throw new SecurityException("invalid package name: " + packageName);
Nick Pellye0fd6932012-07-11 10:26:13 -07001408 }
1409
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001410 private void checkPendingIntent(PendingIntent intent) {
1411 if (intent == null) {
1412 throw new IllegalArgumentException("invalid pending intent: " + intent);
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001413 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001414 }
1415
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001416 private Receiver checkListenerOrIntentLocked(ILocationListener listener, PendingIntent intent,
David Christie40e57822013-07-30 11:36:48 -07001417 int pid, int uid, String packageName, WorkSource workSource, boolean hideFromAppOps) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001418 if (intent == null && listener == null) {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001419 throw new IllegalArgumentException("need either listener or intent");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001420 } else if (intent != null && listener != null) {
1421 throw new IllegalArgumentException("cannot register both listener and intent");
1422 } else if (intent != null) {
1423 checkPendingIntent(intent);
David Christie40e57822013-07-30 11:36:48 -07001424 return getReceiverLocked(intent, pid, uid, packageName, workSource, hideFromAppOps);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001425 } else {
David Christie40e57822013-07-30 11:36:48 -07001426 return getReceiverLocked(listener, pid, uid, packageName, workSource, hideFromAppOps);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001427 }
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001428 }
1429
Nick Pellye0fd6932012-07-11 10:26:13 -07001430 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001431 public void requestLocationUpdates(LocationRequest request, ILocationListener listener,
1432 PendingIntent intent, String packageName) {
1433 if (request == null) request = DEFAULT_LOCATION_REQUEST;
1434 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001435 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1436 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1437 request.getProvider());
David Christie82edc9b2013-07-19 11:31:42 -07001438 WorkSource workSource = request.getWorkSource();
1439 if (workSource != null && workSource.size() > 0) {
David Christie40e57822013-07-30 11:36:48 -07001440 checkDeviceStatsAllowed();
1441 }
1442 boolean hideFromAppOps = request.getHideFromAppOps();
1443 if (hideFromAppOps) {
1444 checkUpdateAppOpsAllowed();
David Christie82edc9b2013-07-19 11:31:42 -07001445 }
Victoria Lease37425c32012-10-16 16:08:48 -07001446 LocationRequest sanitizedRequest = createSanitizedRequest(request, allowedResolutionLevel);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001447
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001448 final int pid = Binder.getCallingPid();
1449 final int uid = Binder.getCallingUid();
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001450 // providers may use public location API's, need to clear identity
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001451 long identity = Binder.clearCallingIdentity();
1452 try {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001453 // We don't check for MODE_IGNORED here; we will do that when we go to deliver
1454 // a location.
Dianne Hackborn35654b62013-01-14 17:38:02 -08001455 checkLocationAccess(uid, packageName, allowedResolutionLevel);
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001456
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001457 synchronized (mLock) {
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001458 Receiver recevier = checkListenerOrIntentLocked(listener, intent, pid, uid,
David Christie40e57822013-07-30 11:36:48 -07001459 packageName, workSource, hideFromAppOps);
Victoria Lease37425c32012-10-16 16:08:48 -07001460 requestLocationUpdatesLocked(sanitizedRequest, recevier, pid, uid, packageName);
Mike Lockwood2d4d1bf2010-10-18 17:06:26 -04001461 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001462 } finally {
1463 Binder.restoreCallingIdentity(identity);
1464 }
1465 }
1466
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001467 private void requestLocationUpdatesLocked(LocationRequest request, Receiver receiver,
1468 int pid, int uid, String packageName) {
1469 // Figure out the provider. Either its explicitly request (legacy use cases), or
1470 // use the fused provider
1471 if (request == null) request = DEFAULT_LOCATION_REQUEST;
1472 String name = request.getProvider();
Victoria Lease09016ab2012-09-16 12:33:15 -07001473 if (name == null) {
1474 throw new IllegalArgumentException("provider name must not be null");
1475 }
Zhentao Sunc5fc9982013-04-17 17:47:53 -07001476
1477 if (D) Log.d(TAG, "request " + Integer.toHexString(System.identityHashCode(receiver))
1478 + " " + name + " " + request + " from " + packageName + "(" + uid + ")");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001479 LocationProviderInterface provider = mProvidersByName.get(name);
1480 if (provider == null) {
Victoria Leaseb30f3832013-10-13 12:15:40 -07001481 throw new IllegalArgumentException("provider doesn't exist: " + name);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001482 }
1483
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001484 UpdateRecord record = new UpdateRecord(name, request, receiver);
1485 UpdateRecord oldRecord = receiver.mUpdateRecords.put(name, record);
1486 if (oldRecord != null) {
1487 oldRecord.disposeLocked(false);
1488 }
1489
Victoria Lease09eeaec2013-02-05 11:34:13 -08001490 boolean isProviderEnabled = isAllowedByUserSettingsLocked(name, uid);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001491 if (isProviderEnabled) {
1492 applyRequirementsLocked(name);
1493 } else {
1494 // Notify the listener that updates are currently disabled
1495 receiver.callProviderEnabledLocked(name, false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001496 }
David Christie0b837452013-07-29 16:02:13 -07001497 // Update the monitoring here just in case multiple location requests were added to the
1498 // same receiver (this request may be high power and the initial might not have been).
1499 receiver.updateMonitoring(true);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001500 }
1501
Nick Pellye0fd6932012-07-11 10:26:13 -07001502 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001503 public void removeUpdates(ILocationListener listener, PendingIntent intent,
1504 String packageName) {
1505 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001506
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001507 final int pid = Binder.getCallingPid();
1508 final int uid = Binder.getCallingUid();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001509
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001510 synchronized (mLock) {
David Christie82edc9b2013-07-19 11:31:42 -07001511 WorkSource workSource = null;
David Christie40e57822013-07-30 11:36:48 -07001512 boolean hideFromAppOps = false;
1513 Receiver receiver = checkListenerOrIntentLocked(listener, intent, pid, uid,
1514 packageName, workSource, hideFromAppOps);
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001515
1516 // providers may use public location API's, need to clear identity
1517 long identity = Binder.clearCallingIdentity();
1518 try {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001519 removeUpdatesLocked(receiver);
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001520 } finally {
1521 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001522 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001523 }
1524 }
1525
1526 private void removeUpdatesLocked(Receiver receiver) {
Dianne Hackborn7ff30112012-11-08 11:12:09 -08001527 if (D) Log.i(TAG, "remove " + Integer.toHexString(System.identityHashCode(receiver)));
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001528
1529 if (mReceivers.remove(receiver.mKey) != null && receiver.isListener()) {
1530 receiver.getListener().asBinder().unlinkToDeath(receiver, 0);
1531 synchronized (receiver) {
Victoria Lease0aa28602013-05-29 15:28:26 -07001532 receiver.clearPendingBroadcastsLocked();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001533 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001534 }
1535
Dianne Hackborn1304f4a2013-07-09 18:17:27 -07001536 receiver.updateMonitoring(false);
1537
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001538 // Record which providers were associated with this listener
1539 HashSet<String> providers = new HashSet<String>();
1540 HashMap<String, UpdateRecord> oldRecords = receiver.mUpdateRecords;
1541 if (oldRecords != null) {
1542 // Call dispose() on the obsolete update records.
1543 for (UpdateRecord record : oldRecords.values()) {
1544 record.disposeLocked(false);
1545 }
1546 // Accumulate providers
1547 providers.addAll(oldRecords.keySet());
1548 }
1549
1550 // update provider
1551 for (String provider : providers) {
1552 // If provider is already disabled, don't need to do anything
Victoria Lease09eeaec2013-02-05 11:34:13 -08001553 if (!isAllowedByCurrentUserSettingsLocked(provider)) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001554 continue;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001555 }
1556
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001557 applyRequirementsLocked(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001558 }
1559 }
1560
Dianne Hackbornc2293022013-02-06 23:14:49 -08001561 private void applyAllProviderRequirementsLocked() {
1562 for (LocationProviderInterface p : mProviders) {
1563 // If provider is already disabled, don't need to do anything
Dianne Hackborn64d41d72013-02-07 00:33:31 -08001564 if (!isAllowedByCurrentUserSettingsLocked(p.getName())) {
Dianne Hackbornc2293022013-02-06 23:14:49 -08001565 continue;
1566 }
1567
1568 applyRequirementsLocked(p.getName());
1569 }
1570 }
1571
Nick Pellye0fd6932012-07-11 10:26:13 -07001572 @Override
Nick Pelly4035f5a2012-08-17 14:43:49 -07001573 public Location getLastLocation(LocationRequest request, String packageName) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001574 if (D) Log.d(TAG, "getLastLocation: " + request);
1575 if (request == null) request = DEFAULT_LOCATION_REQUEST;
Victoria Lease37425c32012-10-16 16:08:48 -07001576 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
Nick Pelly4035f5a2012-08-17 14:43:49 -07001577 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001578 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1579 request.getProvider());
1580 // no need to sanitize this request, as only the provider name is used
Nick Pelly4035f5a2012-08-17 14:43:49 -07001581
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001582 final int uid = Binder.getCallingUid();
1583 final long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001584 try {
1585 if (mBlacklist.isBlacklisted(packageName)) {
1586 if (D) Log.d(TAG, "not returning last loc for blacklisted app: " +
1587 packageName);
Victoria Lease09016ab2012-09-16 12:33:15 -07001588 return null;
1589 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001590
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001591 if (!reportLocationAccessNoThrow(uid, packageName, allowedResolutionLevel)) {
1592 if (D) Log.d(TAG, "not returning last loc for no op app: " +
1593 packageName);
1594 return null;
1595 }
1596
Victoria Leaseb711d572012-10-02 13:14:11 -07001597 synchronized (mLock) {
1598 // Figure out the provider. Either its explicitly request (deprecated API's),
1599 // or use the fused provider
1600 String name = request.getProvider();
1601 if (name == null) name = LocationManager.FUSED_PROVIDER;
1602 LocationProviderInterface provider = mProvidersByName.get(name);
1603 if (provider == null) return null;
1604
Victoria Lease09eeaec2013-02-05 11:34:13 -08001605 if (!isAllowedByUserSettingsLocked(name, uid)) return null;
Victoria Leaseb711d572012-10-02 13:14:11 -07001606
David Christie1b9b7b12013-04-15 15:31:11 -07001607 Location location;
1608 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
1609 // Make sure that an app with coarse permissions can't get frequent location
1610 // updates by calling LocationManager.getLastKnownLocation repeatedly.
1611 location = mLastLocationCoarseInterval.get(name);
1612 } else {
1613 location = mLastLocation.get(name);
1614 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001615 if (location == null) {
1616 return null;
1617 }
Victoria Lease37425c32012-10-16 16:08:48 -07001618 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001619 Location noGPSLocation = location.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1620 if (noGPSLocation != null) {
Dianne Hackborn6c5406a2012-11-29 16:18:01 -08001621 return new Location(mLocationFudger.getOrCreate(noGPSLocation));
Victoria Leaseb711d572012-10-02 13:14:11 -07001622 }
Victoria Lease37425c32012-10-16 16:08:48 -07001623 } else {
Dianne Hackborn6c5406a2012-11-29 16:18:01 -08001624 return new Location(location);
Victoria Lease09016ab2012-09-16 12:33:15 -07001625 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001626 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001627 return null;
1628 } finally {
1629 Binder.restoreCallingIdentity(identity);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001630 }
1631 }
1632
1633 @Override
1634 public void requestGeofence(LocationRequest request, Geofence geofence, PendingIntent intent,
1635 String packageName) {
1636 if (request == null) request = DEFAULT_LOCATION_REQUEST;
Victoria Lease37425c32012-10-16 16:08:48 -07001637 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1638 checkResolutionLevelIsSufficientForGeofenceUse(allowedResolutionLevel);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001639 checkPendingIntent(intent);
1640 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001641 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1642 request.getProvider());
1643 LocationRequest sanitizedRequest = createSanitizedRequest(request, allowedResolutionLevel);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001644
Victoria Lease37425c32012-10-16 16:08:48 -07001645 if (D) Log.d(TAG, "requestGeofence: " + sanitizedRequest + " " + geofence + " " + intent);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001646
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001647 // geo-fence manager uses the public location API, need to clear identity
1648 int uid = Binder.getCallingUid();
Victoria Lease56e675b2012-11-05 19:25:06 -08001649 if (UserHandle.getUserId(uid) != UserHandle.USER_OWNER) {
1650 // temporary measure until geofences work for secondary users
1651 Log.w(TAG, "proximity alerts are currently available only to the primary user");
1652 return;
1653 }
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001654 long identity = Binder.clearCallingIdentity();
1655 try {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001656 mGeofenceManager.addFence(sanitizedRequest, geofence, intent, allowedResolutionLevel,
1657 uid, packageName);
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001658 } finally {
1659 Binder.restoreCallingIdentity(identity);
1660 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001661 }
1662
1663 @Override
1664 public void removeGeofence(Geofence geofence, PendingIntent intent, String packageName) {
Victoria Lease37425c32012-10-16 16:08:48 -07001665 checkResolutionLevelIsSufficientForGeofenceUse(getCallerAllowedResolutionLevel());
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001666 checkPendingIntent(intent);
1667 checkPackageName(packageName);
1668
1669 if (D) Log.d(TAG, "removeGeofence: " + geofence + " " + intent);
1670
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001671 // geo-fence manager uses the public location API, need to clear identity
1672 long identity = Binder.clearCallingIdentity();
1673 try {
1674 mGeofenceManager.removeFence(geofence, intent);
1675 } finally {
1676 Binder.restoreCallingIdentity(identity);
1677 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001678 }
1679
1680
1681 @Override
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001682 public boolean addGpsStatusListener(IGpsStatusListener listener, String packageName) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001683 if (mGpsStatusProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001684 return false;
1685 }
Dianne Hackborn35654b62013-01-14 17:38:02 -08001686 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1687 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
Victoria Lease37425c32012-10-16 16:08:48 -07001688 LocationManager.GPS_PROVIDER);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001689
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001690 final int uid = Binder.getCallingUid();
1691 final long ident = Binder.clearCallingIdentity();
1692 try {
Victoria Lease3d5173d2013-02-05 16:07:32 -08001693 if (!checkLocationAccess(uid, packageName, allowedResolutionLevel)) {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001694 return false;
1695 }
1696 } finally {
1697 Binder.restoreCallingIdentity(ident);
1698 }
1699
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001700 try {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001701 mGpsStatusProvider.addGpsStatusListener(listener);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001702 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001703 Slog.e(TAG, "mGpsStatusProvider.addGpsStatusListener failed", e);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001704 return false;
1705 }
1706 return true;
1707 }
1708
Nick Pellye0fd6932012-07-11 10:26:13 -07001709 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001710 public void removeGpsStatusListener(IGpsStatusListener listener) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001711 synchronized (mLock) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001712 try {
1713 mGpsStatusProvider.removeGpsStatusListener(listener);
1714 } catch (Exception e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001715 Slog.e(TAG, "mGpsStatusProvider.removeGpsStatusListener failed", e);
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001716 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001717 }
1718 }
1719
Nick Pellye0fd6932012-07-11 10:26:13 -07001720 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001721 public boolean sendExtraCommand(String provider, String command, Bundle extras) {
Mike Lockwoodc6cc8362009-08-17 13:16:08 -04001722 if (provider == null) {
1723 // throw NullPointerException to remain compatible with previous implementation
1724 throw new NullPointerException();
1725 }
Victoria Lease37425c32012-10-16 16:08:48 -07001726 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1727 provider);
Mike Lockwoodc6cc8362009-08-17 13:16:08 -04001728
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001729 // and check for ACCESS_LOCATION_EXTRA_COMMANDS
Mike Lockwoodb7e99222009-07-07 13:18:21 -04001730 if ((mContext.checkCallingOrSelfPermission(ACCESS_LOCATION_EXTRA_COMMANDS)
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001731 != PackageManager.PERMISSION_GRANTED)) {
1732 throw new SecurityException("Requires ACCESS_LOCATION_EXTRA_COMMANDS permission");
1733 }
1734
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001735 synchronized (mLock) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001736 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001737 if (p == null) return false;
Nick Pellye0fd6932012-07-11 10:26:13 -07001738
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001739 return p.sendExtraCommand(command, extras);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001740 }
1741 }
1742
Nick Pellye0fd6932012-07-11 10:26:13 -07001743 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001744 public boolean sendNiResponse(int notifId, int userResponse) {
Mike Lockwood18ad9f62009-08-27 14:01:23 -07001745 if (Binder.getCallingUid() != Process.myUid()) {
1746 throw new SecurityException(
1747 "calling sendNiResponse from outside of the system is not allowed");
1748 }
Danke Xie22d1f9f2009-08-18 18:28:45 -04001749 try {
1750 return mNetInitiatedListener.sendNiResponse(notifId, userResponse);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001751 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001752 Slog.e(TAG, "RemoteException in LocationManagerService.sendNiResponse");
Danke Xie22d1f9f2009-08-18 18:28:45 -04001753 return false;
1754 }
1755 }
1756
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001757 /**
Mike Lockwood628fd6d2010-01-25 22:46:13 -05001758 * @return null if the provider does not exist
Alexey Tarasovf2db9fb2009-09-01 02:37:07 +11001759 * @throws SecurityException if the provider is not allowed to be
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001760 * accessed by the caller
1761 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001762 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001763 public ProviderProperties getProviderProperties(String provider) {
Laurent Tub7f9d252012-10-16 14:25:00 -07001764 if (mProvidersByName.get(provider) == null) {
1765 return null;
1766 }
1767
Victoria Lease37425c32012-10-16 16:08:48 -07001768 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1769 provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001770
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001771 LocationProviderInterface p;
1772 synchronized (mLock) {
1773 p = mProvidersByName.get(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001774 }
1775
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001776 if (p == null) return null;
1777 return p.getProperties();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001778 }
1779
Nick Pellye0fd6932012-07-11 10:26:13 -07001780 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001781 public boolean isProviderEnabled(String provider) {
Tom O'Neilld5759432013-09-11 11:03:03 -07001782 // TODO: remove this check in next release, see b/10696351
Victoria Lease37425c32012-10-16 16:08:48 -07001783 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1784 provider);
Tom O'Neilld5759432013-09-11 11:03:03 -07001785
1786 // Fused provider is accessed indirectly via criteria rather than the provider-based APIs,
1787 // so we discourage its use
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001788 if (LocationManager.FUSED_PROVIDER.equals(provider)) return false;
1789
Victoria Lease09eeaec2013-02-05 11:34:13 -08001790 int uid = Binder.getCallingUid();
Victoria Lease269518e2012-10-29 08:25:39 -07001791 long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001792 try {
1793 synchronized (mLock) {
1794 LocationProviderInterface p = mProvidersByName.get(provider);
1795 if (p == null) return false;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001796
Victoria Lease09eeaec2013-02-05 11:34:13 -08001797 return isAllowedByUserSettingsLocked(provider, uid);
Victoria Leaseb711d572012-10-02 13:14:11 -07001798 }
1799 } finally {
1800 Binder.restoreCallingIdentity(identity);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001801 }
1802 }
1803
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001804 /**
1805 * Returns "true" if the UID belongs to a bound location provider.
1806 *
1807 * @param uid the uid
1808 * @return true if uid belongs to a bound location provider
1809 */
1810 private boolean isUidALocationProvider(int uid) {
1811 if (uid == Process.SYSTEM_UID) {
1812 return true;
1813 }
1814 if (mGeocodeProvider != null) {
1815 if (doesPackageHaveUid(uid, mGeocodeProvider.getConnectedPackageName())) return true;
1816 }
1817 for (LocationProviderProxy proxy : mProxyProviders) {
1818 if (doesPackageHaveUid(uid, proxy.getConnectedPackageName())) return true;
1819 }
1820 return false;
1821 }
1822
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001823 private void checkCallerIsProvider() {
1824 if (mContext.checkCallingOrSelfPermission(INSTALL_LOCATION_PROVIDER)
1825 == PackageManager.PERMISSION_GRANTED) {
1826 return;
1827 }
1828
1829 // Previously we only used the INSTALL_LOCATION_PROVIDER
1830 // check. But that is system or signature
1831 // protection level which is not flexible enough for
1832 // providers installed oustide the system image. So
1833 // also allow providers with a UID matching the
1834 // currently bound package name
1835
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001836 if (isUidALocationProvider(Binder.getCallingUid())) {
1837 return;
1838 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001839
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001840 throw new SecurityException("need INSTALL_LOCATION_PROVIDER permission, " +
1841 "or UID of a currently bound location provider");
1842 }
1843
1844 private boolean doesPackageHaveUid(int uid, String packageName) {
1845 if (packageName == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001846 return false;
1847 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001848 try {
1849 ApplicationInfo appInfo = mPackageManager.getApplicationInfo(packageName, 0);
1850 if (appInfo.uid != uid) {
1851 return false;
1852 }
1853 } catch (NameNotFoundException e) {
1854 return false;
1855 }
1856 return true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001857 }
1858
Nick Pellye0fd6932012-07-11 10:26:13 -07001859 @Override
Mike Lockwooda4903f22010-02-17 06:42:23 -05001860 public void reportLocation(Location location, boolean passive) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001861 checkCallerIsProvider();
Mike Lockwood275555c2009-05-01 11:30:34 -04001862
Nick Pelly2eeeec22012-07-18 13:13:37 -07001863 if (!location.isComplete()) {
1864 Log.w(TAG, "Dropping incomplete location: " + location);
1865 return;
1866 }
1867
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001868 mLocationHandler.removeMessages(MSG_LOCATION_CHANGED, location);
1869 Message m = Message.obtain(mLocationHandler, MSG_LOCATION_CHANGED, location);
Mike Lockwooda4903f22010-02-17 06:42:23 -05001870 m.arg1 = (passive ? 1 : 0);
Mike Lockwood4e50b782009-04-03 08:24:43 -07001871 mLocationHandler.sendMessageAtFrontOfQueue(m);
1872 }
1873
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001874
Laurent Tu75defb62012-11-01 16:21:52 -07001875 private static boolean shouldBroadcastSafe(
1876 Location loc, Location lastLoc, UpdateRecord record, long now) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001877 // Always broadcast the first update
1878 if (lastLoc == null) {
1879 return true;
1880 }
1881
Nick Pellyf1be6862012-05-15 10:53:42 -07001882 // Check whether sufficient time has passed
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001883 long minTime = record.mRequest.getFastestInterval();
David Christie1b9b7b12013-04-15 15:31:11 -07001884 long delta = (loc.getElapsedRealtimeNanos() - lastLoc.getElapsedRealtimeNanos())
1885 / NANOS_PER_MILLI;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001886 if (delta < minTime - MAX_PROVIDER_SCHEDULING_JITTER_MS) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001887 return false;
1888 }
1889
1890 // Check whether sufficient distance has been traveled
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001891 double minDistance = record.mRequest.getSmallestDisplacement();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001892 if (minDistance > 0.0) {
1893 if (loc.distanceTo(lastLoc) <= minDistance) {
1894 return false;
1895 }
1896 }
1897
Laurent Tu75defb62012-11-01 16:21:52 -07001898 // Check whether sufficient number of udpates is left
1899 if (record.mRequest.getNumUpdates() <= 0) {
1900 return false;
1901 }
1902
1903 // Check whether the expiry date has passed
1904 if (record.mRequest.getExpireAt() < now) {
1905 return false;
1906 }
1907
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001908 return true;
1909 }
1910
Mike Lockwooda4903f22010-02-17 06:42:23 -05001911 private void handleLocationChangedLocked(Location location, boolean passive) {
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001912 if (D) Log.d(TAG, "incoming location: " + location);
1913
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001914 long now = SystemClock.elapsedRealtime();
Mike Lockwooda4903f22010-02-17 06:42:23 -05001915 String provider = (passive ? LocationManager.PASSIVE_PROVIDER : location.getProvider());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001916
Laurent Tu60ec50a2012-10-04 17:00:10 -07001917 // Skip if the provider is unknown.
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001918 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001919 if (p == null) return;
1920
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001921 // Update last known locations
Victoria Lease09016ab2012-09-16 12:33:15 -07001922 Location noGPSLocation = location.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1923 Location lastNoGPSLocation = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001924 Location lastLocation = mLastLocation.get(provider);
Mike Lockwood4e50b782009-04-03 08:24:43 -07001925 if (lastLocation == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001926 lastLocation = new Location(provider);
1927 mLastLocation.put(provider, lastLocation);
Victoria Lease09016ab2012-09-16 12:33:15 -07001928 } else {
1929 lastNoGPSLocation = lastLocation.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1930 if (noGPSLocation == null && lastNoGPSLocation != null) {
1931 // New location has no no-GPS location: adopt last no-GPS location. This is set
1932 // directly into location because we do not want to notify COARSE clients.
1933 location.setExtraLocation(Location.EXTRA_NO_GPS_LOCATION, lastNoGPSLocation);
1934 }
Mike Lockwood4e50b782009-04-03 08:24:43 -07001935 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001936 lastLocation.set(location);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001937
David Christie1b9b7b12013-04-15 15:31:11 -07001938 // Update last known coarse interval location if enough time has passed.
1939 Location lastLocationCoarseInterval = mLastLocationCoarseInterval.get(provider);
1940 if (lastLocationCoarseInterval == null) {
1941 lastLocationCoarseInterval = new Location(location);
1942 mLastLocationCoarseInterval.put(provider, lastLocationCoarseInterval);
1943 }
1944 long timeDiffNanos = location.getElapsedRealtimeNanos()
1945 - lastLocationCoarseInterval.getElapsedRealtimeNanos();
1946 if (timeDiffNanos > LocationFudger.FASTEST_INTERVAL_MS * NANOS_PER_MILLI) {
1947 lastLocationCoarseInterval.set(location);
1948 }
1949 // Don't ever return a coarse location that is more recent than the allowed update
1950 // interval (i.e. don't allow an app to keep registering and unregistering for
1951 // location updates to overcome the minimum interval).
1952 noGPSLocation =
1953 lastLocationCoarseInterval.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1954
Laurent Tu60ec50a2012-10-04 17:00:10 -07001955 // Skip if there are no UpdateRecords for this provider.
1956 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1957 if (records == null || records.size() == 0) return;
1958
Victoria Lease09016ab2012-09-16 12:33:15 -07001959 // Fetch coarse location
1960 Location coarseLocation = null;
David Christie1b9b7b12013-04-15 15:31:11 -07001961 if (noGPSLocation != null) {
Victoria Lease09016ab2012-09-16 12:33:15 -07001962 coarseLocation = mLocationFudger.getOrCreate(noGPSLocation);
1963 }
1964
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001965 // Fetch latest status update time
1966 long newStatusUpdateTime = p.getStatusUpdateTime();
1967
Mike Lockwood7ec434e2009-03-27 07:46:48 -07001968 // Get latest status
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001969 Bundle extras = new Bundle();
1970 int status = p.getStatus(extras);
1971
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001972 ArrayList<Receiver> deadReceivers = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001973 ArrayList<UpdateRecord> deadUpdateRecords = null;
Nick Pellye0fd6932012-07-11 10:26:13 -07001974
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001975 // Broadcast location or status to all listeners
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001976 for (UpdateRecord r : records) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001977 Receiver receiver = r.mReceiver;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001978 boolean receiverDead = false;
Nick Pelly4035f5a2012-08-17 14:43:49 -07001979
Victoria Lease269518e2012-10-29 08:25:39 -07001980 int receiverUserId = UserHandle.getUserId(receiver.mUid);
Victoria Lease2f5b97c2013-05-07 14:22:02 -07001981 if (receiverUserId != mCurrentUserId && !isUidALocationProvider(receiver.mUid)) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001982 if (D) {
Victoria Lease269518e2012-10-29 08:25:39 -07001983 Log.d(TAG, "skipping loc update for background user " + receiverUserId +
Victoria Leaseb711d572012-10-02 13:14:11 -07001984 " (current user: " + mCurrentUserId + ", app: " +
1985 receiver.mPackageName + ")");
1986 }
1987 continue;
1988 }
1989
Nick Pelly4035f5a2012-08-17 14:43:49 -07001990 if (mBlacklist.isBlacklisted(receiver.mPackageName)) {
1991 if (D) Log.d(TAG, "skipping loc update for blacklisted app: " +
1992 receiver.mPackageName);
1993 continue;
1994 }
1995
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001996 if (!reportLocationAccessNoThrow(receiver.mUid, receiver.mPackageName,
1997 receiver.mAllowedResolutionLevel)) {
1998 if (D) Log.d(TAG, "skipping loc update for no op app: " +
1999 receiver.mPackageName);
2000 continue;
2001 }
2002
Victoria Lease09016ab2012-09-16 12:33:15 -07002003 Location notifyLocation = null;
Victoria Lease37425c32012-10-16 16:08:48 -07002004 if (receiver.mAllowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
2005 notifyLocation = coarseLocation; // use coarse location
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002006 } else {
Victoria Lease37425c32012-10-16 16:08:48 -07002007 notifyLocation = lastLocation; // use fine location
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002008 }
Victoria Lease09016ab2012-09-16 12:33:15 -07002009 if (notifyLocation != null) {
2010 Location lastLoc = r.mLastFixBroadcast;
Laurent Tu75defb62012-11-01 16:21:52 -07002011 if ((lastLoc == null) || shouldBroadcastSafe(notifyLocation, lastLoc, r, now)) {
Victoria Lease09016ab2012-09-16 12:33:15 -07002012 if (lastLoc == null) {
2013 lastLoc = new Location(notifyLocation);
2014 r.mLastFixBroadcast = lastLoc;
2015 } else {
2016 lastLoc.set(notifyLocation);
2017 }
2018 if (!receiver.callLocationChangedLocked(notifyLocation)) {
2019 Slog.w(TAG, "RemoteException calling onLocationChanged on " + receiver);
2020 receiverDead = true;
2021 }
Laurent Tu75defb62012-11-01 16:21:52 -07002022 r.mRequest.decrementNumUpdates();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002023 }
2024 }
2025
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002026 long prevStatusUpdateTime = r.mLastStatusBroadcast;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002027 if ((newStatusUpdateTime > prevStatusUpdateTime) &&
Victoria Lease09016ab2012-09-16 12:33:15 -07002028 (prevStatusUpdateTime != 0 || status != LocationProvider.AVAILABLE)) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002029
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002030 r.mLastStatusBroadcast = newStatusUpdateTime;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002031 if (!receiver.callStatusChangedLocked(provider, status, extras)) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07002032 receiverDead = true;
Joe Onorato8a9b2202010-02-26 18:56:32 -08002033 Slog.w(TAG, "RemoteException calling onStatusChanged on " + receiver);
Mike Lockwood03ca2162010-04-01 08:10:09 -07002034 }
2035 }
2036
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002037 // track expired records
Laurent Tu75defb62012-11-01 16:21:52 -07002038 if (r.mRequest.getNumUpdates() <= 0 || r.mRequest.getExpireAt() < now) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002039 if (deadUpdateRecords == null) {
2040 deadUpdateRecords = new ArrayList<UpdateRecord>();
2041 }
2042 deadUpdateRecords.add(r);
2043 }
2044 // track dead receivers
2045 if (receiverDead) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07002046 if (deadReceivers == null) {
2047 deadReceivers = new ArrayList<Receiver>();
2048 }
2049 if (!deadReceivers.contains(receiver)) {
2050 deadReceivers.add(receiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002051 }
2052 }
2053 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002054
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002055 // remove dead records and receivers outside the loop
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002056 if (deadReceivers != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002057 for (Receiver receiver : deadReceivers) {
2058 removeUpdatesLocked(receiver);
2059 }
2060 }
2061 if (deadUpdateRecords != null) {
2062 for (UpdateRecord r : deadUpdateRecords) {
2063 r.disposeLocked(true);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002064 }
Victoria Lease8b38b292012-12-04 15:04:43 -08002065 applyRequirementsLocked(provider);
2066 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002067 }
2068
2069 private class LocationWorkerHandler extends Handler {
Victoria Lease5cd731a2012-12-19 15:04:21 -08002070 public LocationWorkerHandler(Looper looper) {
2071 super(looper, null, true);
2072 }
2073
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002074 @Override
2075 public void handleMessage(Message msg) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002076 switch (msg.what) {
2077 case MSG_LOCATION_CHANGED:
2078 handleLocationChanged((Location) msg.obj, msg.arg1 == 1);
2079 break;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002080 }
2081 }
2082 }
2083
Victoria Lease54ca7ae2013-01-08 09:39:50 -08002084 private boolean isMockProvider(String provider) {
2085 synchronized (mLock) {
2086 return mMockProviders.containsKey(provider);
2087 }
2088 }
2089
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002090 private void handleLocationChanged(Location location, boolean passive) {
Victoria Lease54ca7ae2013-01-08 09:39:50 -08002091 // create a working copy of the incoming Location so that the service can modify it without
2092 // disturbing the caller's copy
2093 Location myLocation = new Location(location);
2094 String provider = myLocation.getProvider();
2095
2096 // set "isFromMockProvider" bit if location came from a mock provider. we do not clear this
2097 // bit if location did not come from a mock provider because passive/fused providers can
2098 // forward locations from mock providers, and should not grant them legitimacy in doing so.
2099 if (!myLocation.isFromMockProvider() && isMockProvider(provider)) {
2100 myLocation.setIsFromMockProvider(true);
2101 }
Jeff Sharkey5e613312012-01-30 11:16:20 -08002102
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002103 synchronized (mLock) {
Victoria Lease09eeaec2013-02-05 11:34:13 -08002104 if (isAllowedByCurrentUserSettingsLocked(provider)) {
2105 if (!passive) {
2106 // notify passive provider of the new location
2107 mPassiveProvider.updateLocation(myLocation);
2108 }
Victoria Lease54ca7ae2013-01-08 09:39:50 -08002109 handleLocationChangedLocked(myLocation, passive);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002110 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002111 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002112 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002113
Mike Lockwoode97ae402010-09-29 15:23:46 -04002114 private final PackageMonitor mPackageMonitor = new PackageMonitor() {
2115 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002116 public void onPackageDisappeared(String packageName, int reason) {
2117 // remove all receivers associated with this package name
2118 synchronized (mLock) {
2119 ArrayList<Receiver> deadReceivers = null;
2120
2121 for (Receiver receiver : mReceivers.values()) {
2122 if (receiver.mPackageName.equals(packageName)) {
2123 if (deadReceivers == null) {
2124 deadReceivers = new ArrayList<Receiver>();
2125 }
2126 deadReceivers.add(receiver);
2127 }
2128 }
2129
2130 // perform removal outside of mReceivers loop
2131 if (deadReceivers != null) {
2132 for (Receiver receiver : deadReceivers) {
2133 removeUpdatesLocked(receiver);
2134 }
2135 }
2136 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002137 }
Mike Lockwoode97ae402010-09-29 15:23:46 -04002138 };
2139
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002140 // Geocoder
2141
Nick Pellye0fd6932012-07-11 10:26:13 -07002142 @Override
Mike Lockwoode15735a2010-09-20 17:48:47 -04002143 public boolean geocoderIsPresent() {
Mark Vandevoorde01ac80b2010-05-21 15:43:26 -07002144 return mGeocodeProvider != null;
2145 }
2146
Nick Pellye0fd6932012-07-11 10:26:13 -07002147 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002148 public String getFromLocation(double latitude, double longitude, int maxResults,
Mike Lockwood34901402010-01-04 12:14:21 -05002149 GeocoderParams params, List<Address> addrs) {
Mike Lockwooda55c3212009-04-15 11:10:11 -04002150 if (mGeocodeProvider != null) {
Mike Lockwood628fd6d2010-01-25 22:46:13 -05002151 return mGeocodeProvider.getFromLocation(latitude, longitude, maxResults,
2152 params, addrs);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002153 }
Mike Lockwooda55c3212009-04-15 11:10:11 -04002154 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002155 }
2156
Mike Lockwooda55c3212009-04-15 11:10:11 -04002157
Nick Pellye0fd6932012-07-11 10:26:13 -07002158 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002159 public String getFromLocationName(String locationName,
Mike Lockwooda55c3212009-04-15 11:10:11 -04002160 double lowerLeftLatitude, double lowerLeftLongitude,
2161 double upperRightLatitude, double upperRightLongitude, int maxResults,
Mike Lockwood34901402010-01-04 12:14:21 -05002162 GeocoderParams params, List<Address> addrs) {
Mike Lockwooda55c3212009-04-15 11:10:11 -04002163
2164 if (mGeocodeProvider != null) {
Mike Lockwood628fd6d2010-01-25 22:46:13 -05002165 return mGeocodeProvider.getFromLocationName(locationName, lowerLeftLatitude,
2166 lowerLeftLongitude, upperRightLatitude, upperRightLongitude,
2167 maxResults, params, addrs);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002168 }
Mike Lockwooda55c3212009-04-15 11:10:11 -04002169 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002170 }
2171
2172 // Mock Providers
2173
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002174 private void checkMockPermissionsSafe() {
2175 boolean allowMocks = Settings.Secure.getInt(mContext.getContentResolver(),
2176 Settings.Secure.ALLOW_MOCK_LOCATION, 0) == 1;
2177 if (!allowMocks) {
2178 throw new SecurityException("Requires ACCESS_MOCK_LOCATION secure setting");
2179 }
2180
2181 if (mContext.checkCallingPermission(ACCESS_MOCK_LOCATION) !=
2182 PackageManager.PERMISSION_GRANTED) {
2183 throw new SecurityException("Requires ACCESS_MOCK_LOCATION permission");
Nick Pellye0fd6932012-07-11 10:26:13 -07002184 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002185 }
2186
Nick Pellye0fd6932012-07-11 10:26:13 -07002187 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002188 public void addTestProvider(String name, ProviderProperties properties) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002189 checkMockPermissionsSafe();
2190
Mike Lockwooda4903f22010-02-17 06:42:23 -05002191 if (LocationManager.PASSIVE_PROVIDER.equals(name)) {
2192 throw new IllegalArgumentException("Cannot mock the passive location provider");
2193 }
2194
Mike Lockwood86328a92009-10-23 08:38:25 -04002195 long identity = Binder.clearCallingIdentity();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002196 synchronized (mLock) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002197 MockProvider provider = new MockProvider(name, this, properties);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07002198 // remove the real provider if we are replacing GPS or network provider
2199 if (LocationManager.GPS_PROVIDER.equals(name)
Nick Pelly1332b532012-08-21 16:25:47 -07002200 || LocationManager.NETWORK_PROVIDER.equals(name)
2201 || LocationManager.FUSED_PROVIDER.equals(name)) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05002202 LocationProviderInterface p = mProvidersByName.get(name);
2203 if (p != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002204 removeProviderLocked(p);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07002205 }
2206 }
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04002207 if (mProvidersByName.get(name) != null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002208 throw new IllegalArgumentException("Provider \"" + name + "\" already exists");
2209 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002210 addProviderLocked(provider);
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002211 mMockProviders.put(name, provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002212 mLastLocation.put(name, null);
David Christie1b9b7b12013-04-15 15:31:11 -07002213 mLastLocationCoarseInterval.put(name, null);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002214 updateProvidersLocked();
2215 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002216 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002217 }
2218
Nick Pellye0fd6932012-07-11 10:26:13 -07002219 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002220 public void removeTestProvider(String provider) {
2221 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002222 synchronized (mLock) {
You Kima6d0b6f2012-10-28 03:58:44 +09002223 MockProvider mockProvider = mMockProviders.remove(provider);
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002224 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002225 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2226 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002227 long identity = Binder.clearCallingIdentity();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002228 removeProviderLocked(mProvidersByName.get(provider));
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002229
2230 // reinstate real provider if available
2231 LocationProviderInterface realProvider = mRealProviders.get(provider);
2232 if (realProvider != null) {
2233 addProviderLocked(realProvider);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07002234 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002235 mLastLocation.put(provider, null);
David Christie1b9b7b12013-04-15 15:31:11 -07002236 mLastLocationCoarseInterval.put(provider, null);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002237 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002238 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002239 }
2240 }
2241
Nick Pellye0fd6932012-07-11 10:26:13 -07002242 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002243 public void setTestProviderLocation(String provider, Location loc) {
2244 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002245 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002246 MockProvider mockProvider = mMockProviders.get(provider);
2247 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002248 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2249 }
Mike Lockwood95427cd2009-05-07 13:27:54 -04002250 // clear calling identity so INSTALL_LOCATION_PROVIDER permission is not required
2251 long identity = Binder.clearCallingIdentity();
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002252 mockProvider.setLocation(loc);
Mike Lockwood95427cd2009-05-07 13:27:54 -04002253 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002254 }
2255 }
2256
Nick Pellye0fd6932012-07-11 10:26:13 -07002257 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002258 public void clearTestProviderLocation(String provider) {
2259 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002260 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002261 MockProvider mockProvider = mMockProviders.get(provider);
2262 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002263 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2264 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002265 mockProvider.clearLocation();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002266 }
2267 }
2268
Nick Pellye0fd6932012-07-11 10:26:13 -07002269 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002270 public void setTestProviderEnabled(String provider, boolean enabled) {
2271 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002272 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002273 MockProvider mockProvider = mMockProviders.get(provider);
2274 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002275 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2276 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002277 long identity = Binder.clearCallingIdentity();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002278 if (enabled) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002279 mockProvider.enable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002280 mEnabledProviders.add(provider);
2281 mDisabledProviders.remove(provider);
2282 } else {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002283 mockProvider.disable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002284 mEnabledProviders.remove(provider);
2285 mDisabledProviders.add(provider);
2286 }
2287 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002288 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002289 }
2290 }
2291
Nick Pellye0fd6932012-07-11 10:26:13 -07002292 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002293 public void clearTestProviderEnabled(String provider) {
2294 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002295 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002296 MockProvider mockProvider = mMockProviders.get(provider);
2297 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002298 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2299 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002300 long identity = Binder.clearCallingIdentity();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002301 mEnabledProviders.remove(provider);
2302 mDisabledProviders.remove(provider);
2303 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002304 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002305 }
2306 }
2307
Nick Pellye0fd6932012-07-11 10:26:13 -07002308 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002309 public void setTestProviderStatus(String provider, int status, Bundle extras, long updateTime) {
2310 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002311 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002312 MockProvider mockProvider = mMockProviders.get(provider);
2313 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002314 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2315 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002316 mockProvider.setStatus(status, extras, updateTime);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002317 }
2318 }
2319
Nick Pellye0fd6932012-07-11 10:26:13 -07002320 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002321 public void clearTestProviderStatus(String provider) {
2322 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002323 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002324 MockProvider mockProvider = mMockProviders.get(provider);
2325 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002326 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2327 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002328 mockProvider.clearStatus();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002329 }
2330 }
2331
2332 private void log(String log) {
2333 if (Log.isLoggable(TAG, Log.VERBOSE)) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08002334 Slog.d(TAG, log);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002335 }
2336 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002337
2338 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002339 protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) {
2340 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
2341 != PackageManager.PERMISSION_GRANTED) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -04002342 pw.println("Permission Denial: can't dump LocationManagerService from from pid="
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002343 + Binder.getCallingPid()
2344 + ", uid=" + Binder.getCallingUid());
2345 return;
2346 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002347
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002348 synchronized (mLock) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002349 pw.println("Current Location Manager state:");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002350 pw.println(" Location Listeners:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002351 for (Receiver receiver : mReceivers.values()) {
2352 pw.println(" " + receiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002353 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002354 pw.println(" Records by Provider:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002355 for (Map.Entry<String, ArrayList<UpdateRecord>> entry : mRecordsByProvider.entrySet()) {
2356 pw.println(" " + entry.getKey() + ":");
2357 for (UpdateRecord record : entry.getValue()) {
2358 pw.println(" " + record);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002359 }
2360 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002361 pw.println(" Last Known Locations:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002362 for (Map.Entry<String, Location> entry : mLastLocation.entrySet()) {
2363 String provider = entry.getKey();
2364 Location location = entry.getValue();
2365 pw.println(" " + provider + ": " + location);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002366 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002367
David Christie1b9b7b12013-04-15 15:31:11 -07002368 pw.println(" Last Known Locations Coarse Intervals:");
2369 for (Map.Entry<String, Location> entry : mLastLocationCoarseInterval.entrySet()) {
2370 String provider = entry.getKey();
2371 Location location = entry.getValue();
2372 pw.println(" " + provider + ": " + location);
2373 }
2374
Nick Pellye0fd6932012-07-11 10:26:13 -07002375 mGeofenceManager.dump(pw);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002376
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002377 if (mEnabledProviders.size() > 0) {
2378 pw.println(" Enabled Providers:");
2379 for (String i : mEnabledProviders) {
2380 pw.println(" " + i);
2381 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002382
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002383 }
2384 if (mDisabledProviders.size() > 0) {
2385 pw.println(" Disabled Providers:");
2386 for (String i : mDisabledProviders) {
2387 pw.println(" " + i);
2388 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002389 }
Nick Pelly4035f5a2012-08-17 14:43:49 -07002390 pw.append(" ");
2391 mBlacklist.dump(pw);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002392 if (mMockProviders.size() > 0) {
2393 pw.println(" Mock Providers:");
2394 for (Map.Entry<String, MockProvider> i : mMockProviders.entrySet()) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002395 i.getValue().dump(pw, " ");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002396 }
2397 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002398
Nick Pelly74fa7ea2012-08-13 19:36:38 -07002399 pw.append(" fudger: ");
2400 mLocationFudger.dump(fd, pw, args);
2401
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002402 if (args.length > 0 && "short".equals(args[0])) {
2403 return;
2404 }
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002405 for (LocationProviderInterface provider: mProviders) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002406 pw.print(provider.getName() + " Internal State");
2407 if (provider instanceof LocationProviderProxy) {
2408 LocationProviderProxy proxy = (LocationProviderProxy) provider;
2409 pw.print(" (" + proxy.getConnectedPackageName() + ")");
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002410 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002411 pw.println(":");
2412 provider.dump(fd, pw, args);
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002413 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002414 }
2415 }
2416}