blob: 28a6917cb0c7464a80b039de1b85616a40c8159e [file] [log] [blame]
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2007 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server;
18
destradaaea8a8a62014-06-23 18:19:03 -070019import com.android.internal.content.PackageMonitor;
20import com.android.internal.location.ProviderProperties;
21import com.android.internal.location.ProviderRequest;
22import com.android.internal.os.BackgroundThread;
destradaaa4fa3b52014-07-09 10:46:39 -070023import com.android.server.location.ActivityRecognitionProxy;
destradaaea8a8a62014-06-23 18:19:03 -070024import com.android.server.location.FlpHardwareProvider;
25import com.android.server.location.FusedProxy;
26import com.android.server.location.GeocoderProxy;
27import com.android.server.location.GeofenceManager;
28import com.android.server.location.GeofenceProxy;
29import com.android.server.location.GpsLocationProvider;
30import com.android.server.location.GpsMeasurementsProvider;
destradaa4b3e3932014-07-21 18:01:47 -070031import com.android.server.location.GpsNavigationMessageProvider;
destradaaea8a8a62014-06-23 18:19:03 -070032import com.android.server.location.LocationBlacklist;
33import com.android.server.location.LocationFudger;
34import com.android.server.location.LocationProviderInterface;
35import com.android.server.location.LocationProviderProxy;
36import com.android.server.location.LocationRequestStatistics;
37import com.android.server.location.LocationRequestStatistics.PackageProviderKey;
38import com.android.server.location.LocationRequestStatistics.PackageStatistics;
39import com.android.server.location.MockProvider;
40import com.android.server.location.PassiveProvider;
41
Dianne Hackborna06de0f2012-12-11 16:34:47 -080042import android.app.AppOpsManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080043import android.app.PendingIntent;
Victoria Lease38389b62012-09-30 11:44:22 -070044import android.content.BroadcastReceiver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080045import android.content.ContentResolver;
46import android.content.Context;
47import android.content.Intent;
Victoria Lease38389b62012-09-30 11:44:22 -070048import android.content.IntentFilter;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070049import android.content.pm.ApplicationInfo;
Jeff Hamiltonfbadb692012-10-05 14:21:58 -050050import android.content.pm.PackageInfo;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080051import android.content.pm.PackageManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070052import android.content.pm.PackageManager.NameNotFoundException;
Jeff Hamiltonfbadb692012-10-05 14:21:58 -050053import android.content.pm.ResolveInfo;
54import android.content.pm.Signature;
Amith Yamasanib27528d2014-06-05 15:02:10 -070055import android.content.pm.UserInfo;
Mike Lockwood628fd6d2010-01-25 22:46:13 -050056import android.content.res.Resources;
Brian Muramatsubb95cb92012-08-29 10:43:21 -070057import android.database.ContentObserver;
destradaaa4fa3b52014-07-09 10:46:39 -070058import android.hardware.location.ActivityRecognitionHardware;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080059import android.location.Address;
Mike Lockwood03ca2162010-04-01 08:10:09 -070060import android.location.Criteria;
Mike Lockwood34901402010-01-04 12:14:21 -050061import android.location.GeocoderParams;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070062import android.location.Geofence;
destradaaea8a8a62014-06-23 18:19:03 -070063import android.location.IGpsMeasurementsListener;
destradaa4b3e3932014-07-21 18:01:47 -070064import android.location.IGpsNavigationMessageListener;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080065import android.location.IGpsStatusListener;
Mike Lockwood15e3d0f2009-05-01 07:53:28 -040066import android.location.IGpsStatusProvider;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080067import android.location.ILocationListener;
68import android.location.ILocationManager;
Danke Xie22d1f9f2009-08-18 18:28:45 -040069import android.location.INetInitiatedListener;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080070import android.location.Location;
71import android.location.LocationManager;
72import android.location.LocationProvider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070073import android.location.LocationRequest;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080074import android.os.Binder;
75import android.os.Bundle;
76import android.os.Handler;
77import android.os.IBinder;
Mike Lockwood3d12b512009-04-21 23:25:35 -070078import android.os.Looper;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080079import android.os.Message;
80import android.os.PowerManager;
Mike Lockwoode932f7f2009-04-06 10:51:26 -070081import android.os.Process;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080082import android.os.RemoteException;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070083import android.os.SystemClock;
Dianne Hackborn5ac72a22012-08-29 18:32:08 -070084import android.os.UserHandle;
Amith Yamasanib27528d2014-06-05 15:02:10 -070085import android.os.UserManager;
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -070086import android.os.WorkSource;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080087import android.provider.Settings;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080088import android.util.Log;
Joe Onorato8a9b2202010-02-26 18:56:32 -080089import android.util.Slog;
Amith Yamasanib27528d2014-06-05 15:02:10 -070090
Mike Lockwood43e33f22010-03-26 10:41:48 -040091import java.io.FileDescriptor;
92import java.io.PrintWriter;
93import java.util.ArrayList;
Nick Pelly6fa9ad42012-07-16 12:18:23 -070094import java.util.Arrays;
Mike Lockwood43e33f22010-03-26 10:41:48 -040095import java.util.HashMap;
96import java.util.HashSet;
97import java.util.List;
98import java.util.Map;
Mike Lockwood43e33f22010-03-26 10:41:48 -040099import java.util.Set;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800100
101/**
102 * The service class that manages LocationProviders and issues location
103 * updates and alerts.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800104 */
Victoria Lease5cd731a2012-12-19 15:04:21 -0800105public class LocationManagerService extends ILocationManager.Stub {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800106 private static final String TAG = "LocationManagerService";
JP Abgrallf79811e72013-02-01 18:45:05 -0800107 public static final boolean D = Log.isLoggable(TAG, Log.DEBUG);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700108
109 private static final String WAKELOCK_KEY = TAG;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800110
Victoria Lease37425c32012-10-16 16:08:48 -0700111 // Location resolution level: no location data whatsoever
112 private static final int RESOLUTION_LEVEL_NONE = 0;
113 // Location resolution level: coarse location data only
114 private static final int RESOLUTION_LEVEL_COARSE = 1;
115 // Location resolution level: fine location data
116 private static final int RESOLUTION_LEVEL_FINE = 2;
117
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800118 private static final String ACCESS_MOCK_LOCATION =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700119 android.Manifest.permission.ACCESS_MOCK_LOCATION;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800120 private static final String ACCESS_LOCATION_EXTRA_COMMANDS =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700121 android.Manifest.permission.ACCESS_LOCATION_EXTRA_COMMANDS;
Mike Lockwood275555c2009-05-01 11:30:34 -0400122 private static final String INSTALL_LOCATION_PROVIDER =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700123 android.Manifest.permission.INSTALL_LOCATION_PROVIDER;
124
125 private static final String NETWORK_LOCATION_SERVICE_ACTION =
Stan Chesnutt39062dd2013-07-22 14:33:30 -0700126 "com.android.location.service.v3.NetworkLocationProvider";
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700127 private static final String FUSED_LOCATION_SERVICE_ACTION =
128 "com.android.location.service.FusedLocationProvider";
129
130 private static final int MSG_LOCATION_CHANGED = 1;
131
David Christie1b9b7b12013-04-15 15:31:11 -0700132 private static final long NANOS_PER_MILLI = 1000000L;
133
David Christie0b837452013-07-29 16:02:13 -0700134 // The maximum interval a location request can have and still be considered "high power".
135 private static final long HIGH_POWER_INTERVAL_MS = 5 * 60 * 1000;
136
Nick Pellyf1be6862012-05-15 10:53:42 -0700137 // Location Providers may sometimes deliver location updates
138 // slightly faster that requested - provide grace period so
139 // we don't unnecessarily filter events that are otherwise on
140 // time
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700141 private static final int MAX_PROVIDER_SCHEDULING_JITTER_MS = 100;
Nick Pellyf1be6862012-05-15 10:53:42 -0700142
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700143 private static final LocationRequest DEFAULT_LOCATION_REQUEST = new LocationRequest();
144
145 private final Context mContext;
Dianne Hackborna06de0f2012-12-11 16:34:47 -0800146 private final AppOpsManager mAppOps;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700147
148 // used internally for synchronization
149 private final Object mLock = new Object();
150
Victoria Lease5cd731a2012-12-19 15:04:21 -0800151 // --- fields below are final after systemReady() ---
Nick Pelly74fa7ea2012-08-13 19:36:38 -0700152 private LocationFudger mLocationFudger;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700153 private GeofenceManager mGeofenceManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700154 private PackageManager mPackageManager;
Victoria Lease0aa28602013-05-29 15:28:26 -0700155 private PowerManager mPowerManager;
Amith Yamasanib27528d2014-06-05 15:02:10 -0700156 private UserManager mUserManager;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700157 private GeocoderProxy mGeocodeProvider;
158 private IGpsStatusProvider mGpsStatusProvider;
159 private INetInitiatedListener mNetInitiatedListener;
160 private LocationWorkerHandler mLocationHandler;
Nick Pelly4035f5a2012-08-17 14:43:49 -0700161 private PassiveProvider mPassiveProvider; // track passive provider for special cases
162 private LocationBlacklist mBlacklist;
destradaaea8a8a62014-06-23 18:19:03 -0700163 private GpsMeasurementsProvider mGpsMeasurementsProvider;
destradaa4b3e3932014-07-21 18:01:47 -0700164 private GpsNavigationMessageProvider mGpsNavigationMessageProvider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700165
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700166 // --- fields below are protected by mLock ---
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800167 // Set of providers that are explicitly enabled
168 private final Set<String> mEnabledProviders = new HashSet<String>();
169
170 // Set of providers that are explicitly disabled
171 private final Set<String> mDisabledProviders = new HashSet<String>();
172
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700173 // Mock (test) providers
174 private final HashMap<String, MockProvider> mMockProviders =
175 new HashMap<String, MockProvider>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800176
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700177 // all receivers
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400178 private final HashMap<Object, Receiver> mReceivers = new HashMap<Object, Receiver>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800179
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700180 // currently installed providers (with mocks replacing real providers)
Mike Lockwoodd03ff942010-02-09 08:46:14 -0500181 private final ArrayList<LocationProviderInterface> mProviders =
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700182 new ArrayList<LocationProviderInterface>();
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400183
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700184 // real providers, saved here when mocked out
185 private final HashMap<String, LocationProviderInterface> mRealProviders =
186 new HashMap<String, LocationProviderInterface>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800187
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700188 // mapping from provider name to provider
189 private final HashMap<String, LocationProviderInterface> mProvidersByName =
190 new HashMap<String, LocationProviderInterface>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800191
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700192 // mapping from provider name to all its UpdateRecords
193 private final HashMap<String, ArrayList<UpdateRecord>> mRecordsByProvider =
194 new HashMap<String, ArrayList<UpdateRecord>>();
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -0700195
David Christie2ff96af2014-01-30 16:09:37 -0800196 private final LocationRequestStatistics mRequestStatistics = new LocationRequestStatistics();
197
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700198 // mapping from provider name to last known location
199 private final HashMap<String, Location> mLastLocation = new HashMap<String, Location>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800200
David Christie1b9b7b12013-04-15 15:31:11 -0700201 // same as mLastLocation, but is not updated faster than LocationFudger.FASTEST_INTERVAL_MS.
202 // locations stored here are not fudged for coarse permissions.
203 private final HashMap<String, Location> mLastLocationCoarseInterval =
204 new HashMap<String, Location>();
205
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700206 // all providers that operate over proxy, for authorizing incoming location
207 private final ArrayList<LocationProviderProxy> mProxyProviders =
208 new ArrayList<LocationProviderProxy>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800209
Victoria Lease38389b62012-09-30 11:44:22 -0700210 // current active user on the device - other users are denied location data
211 private int mCurrentUserId = UserHandle.USER_OWNER;
Amith Yamasanib27528d2014-06-05 15:02:10 -0700212 private int[] mCurrentUserProfiles = new int[] { UserHandle.USER_OWNER };
Victoria Lease38389b62012-09-30 11:44:22 -0700213
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700214 public LocationManagerService(Context context) {
215 super();
216 mContext = context;
Dianne Hackborna06de0f2012-12-11 16:34:47 -0800217 mAppOps = (AppOpsManager)context.getSystemService(Context.APP_OPS_SERVICE);
The Android Open Source Project4df24232009-03-05 14:34:35 -0800218
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700219 if (D) Log.d(TAG, "Constructed");
220
221 // most startup is deferred until systemReady()
222 }
223
Svetoslav Ganova0027152013-06-25 14:59:53 -0700224 public void systemRunning() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700225 synchronized (mLock) {
Victoria Lease5cd731a2012-12-19 15:04:21 -0800226 if (D) Log.d(TAG, "systemReady()");
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700227
Victoria Lease5cd731a2012-12-19 15:04:21 -0800228 // fetch package manager
229 mPackageManager = mContext.getPackageManager();
230
Victoria Lease0aa28602013-05-29 15:28:26 -0700231 // fetch power manager
232 mPowerManager = (PowerManager) mContext.getSystemService(Context.POWER_SERVICE);
Victoria Lease5cd731a2012-12-19 15:04:21 -0800233
234 // prepare worker thread
Dianne Hackborn8d044e82013-04-30 17:24:15 -0700235 mLocationHandler = new LocationWorkerHandler(BackgroundThread.get().getLooper());
Victoria Lease5cd731a2012-12-19 15:04:21 -0800236
237 // prepare mLocationHandler's dependents
238 mLocationFudger = new LocationFudger(mContext, mLocationHandler);
239 mBlacklist = new LocationBlacklist(mContext, mLocationHandler);
240 mBlacklist.init();
241 mGeofenceManager = new GeofenceManager(mContext, mBlacklist);
242
Dianne Hackbornc2293022013-02-06 23:14:49 -0800243 // Monitor for app ops mode changes.
Dianne Hackborn9bb0ee92013-09-22 12:31:38 -0700244 AppOpsManager.OnOpChangedListener callback
245 = new AppOpsManager.OnOpChangedInternalListener() {
246 public void onOpChanged(int op, String packageName) {
Dianne Hackbornc2293022013-02-06 23:14:49 -0800247 synchronized (mLock) {
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700248 for (Receiver receiver : mReceivers.values()) {
249 receiver.updateMonitoring(true);
250 }
Dianne Hackbornc2293022013-02-06 23:14:49 -0800251 applyAllProviderRequirementsLocked();
252 }
253 }
254 };
255 mAppOps.startWatchingMode(AppOpsManager.OP_COARSE_LOCATION, null, callback);
256
Amith Yamasanib27528d2014-06-05 15:02:10 -0700257 mUserManager = (UserManager) mContext.getSystemService(Context.USER_SERVICE);
258 updateUserProfiles(mCurrentUserId);
259
Victoria Lease5cd731a2012-12-19 15:04:21 -0800260 // prepare providers
261 loadProvidersLocked();
262 updateProvidersLocked();
263 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700264
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700265 // listen for settings changes
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700266 mContext.getContentResolver().registerContentObserver(
Laurent Tu75defb62012-11-01 16:21:52 -0700267 Settings.Secure.getUriFor(Settings.Secure.LOCATION_PROVIDERS_ALLOWED), true,
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700268 new ContentObserver(mLocationHandler) {
Victoria Lease5cd731a2012-12-19 15:04:21 -0800269 @Override
270 public void onChange(boolean selfChange) {
271 synchronized (mLock) {
272 updateProvidersLocked();
273 }
274 }
275 }, UserHandle.USER_ALL);
276 mPackageMonitor.register(mContext, mLocationHandler.getLooper(), true);
Brian Muramatsubb95cb92012-08-29 10:43:21 -0700277
Victoria Lease38389b62012-09-30 11:44:22 -0700278 // listen for user change
279 IntentFilter intentFilter = new IntentFilter();
280 intentFilter.addAction(Intent.ACTION_USER_SWITCHED);
Amith Yamasanib27528d2014-06-05 15:02:10 -0700281 intentFilter.addAction(Intent.ACTION_MANAGED_PROFILE_ADDED);
282 intentFilter.addAction(Intent.ACTION_MANAGED_PROFILE_REMOVED);
Victoria Lease38389b62012-09-30 11:44:22 -0700283
284 mContext.registerReceiverAsUser(new BroadcastReceiver() {
285 @Override
286 public void onReceive(Context context, Intent intent) {
287 String action = intent.getAction();
288 if (Intent.ACTION_USER_SWITCHED.equals(action)) {
289 switchUser(intent.getIntExtra(Intent.EXTRA_USER_HANDLE, 0));
Amith Yamasanib27528d2014-06-05 15:02:10 -0700290 } else if (Intent.ACTION_MANAGED_PROFILE_ADDED.equals(action)
291 || Intent.ACTION_MANAGED_PROFILE_REMOVED.equals(action)) {
292 updateUserProfiles(mCurrentUserId);
Victoria Lease38389b62012-09-30 11:44:22 -0700293 }
294 }
Victoria Lease5cd731a2012-12-19 15:04:21 -0800295 }, UserHandle.ALL, intentFilter, null, mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700296 }
297
Amith Yamasanib27528d2014-06-05 15:02:10 -0700298 /**
299 * Makes a list of userids that are related to the current user. This is
300 * relevant when using managed profiles. Otherwise the list only contains
301 * the current user.
302 *
303 * @param currentUserId the current user, who might have an alter-ego.
304 */
305 void updateUserProfiles(int currentUserId) {
306 List<UserInfo> profiles = mUserManager.getProfiles(currentUserId);
307 synchronized (mLock) {
308 mCurrentUserProfiles = new int[profiles.size()];
309 for (int i = 0; i < mCurrentUserProfiles.length; i++) {
310 mCurrentUserProfiles[i] = profiles.get(i).id;
311 }
312 }
313 }
314
315 /**
316 * Checks if the specified userId matches any of the current foreground
317 * users stored in mCurrentUserProfiles.
318 */
319 private boolean isCurrentProfile(int userId) {
320 synchronized (mLock) {
321 for (int i = 0; i < mCurrentUserProfiles.length; i++) {
322 if (mCurrentUserProfiles[i] == userId) {
323 return true;
324 }
325 }
326 return false;
327 }
328 }
329
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500330 private void ensureFallbackFusedProviderPresentLocked(ArrayList<String> pkgs) {
331 PackageManager pm = mContext.getPackageManager();
332 String systemPackageName = mContext.getPackageName();
333 ArrayList<HashSet<Signature>> sigSets = ServiceWatcher.getSignatureSets(mContext, pkgs);
334
335 List<ResolveInfo> rInfos = pm.queryIntentServicesAsUser(
336 new Intent(FUSED_LOCATION_SERVICE_ACTION),
337 PackageManager.GET_META_DATA, mCurrentUserId);
338 for (ResolveInfo rInfo : rInfos) {
339 String packageName = rInfo.serviceInfo.packageName;
340
341 // Check that the signature is in the list of supported sigs. If it's not in
342 // this list the standard provider binding logic won't bind to it.
343 try {
344 PackageInfo pInfo;
345 pInfo = pm.getPackageInfo(packageName, PackageManager.GET_SIGNATURES);
346 if (!ServiceWatcher.isSignatureMatch(pInfo.signatures, sigSets)) {
347 Log.w(TAG, packageName + " resolves service " + FUSED_LOCATION_SERVICE_ACTION +
348 ", but has wrong signature, ignoring");
349 continue;
350 }
351 } catch (NameNotFoundException e) {
352 Log.e(TAG, "missing package: " + packageName);
353 continue;
354 }
355
356 // Get the version info
357 if (rInfo.serviceInfo.metaData == null) {
358 Log.w(TAG, "Found fused provider without metadata: " + packageName);
359 continue;
360 }
361
362 int version = rInfo.serviceInfo.metaData.getInt(
363 ServiceWatcher.EXTRA_SERVICE_VERSION, -1);
364 if (version == 0) {
365 // This should be the fallback fused location provider.
366
367 // Make sure it's in the system partition.
368 if ((rInfo.serviceInfo.applicationInfo.flags & ApplicationInfo.FLAG_SYSTEM) == 0) {
369 if (D) Log.d(TAG, "Fallback candidate not in /system: " + packageName);
370 continue;
371 }
372
373 // Check that the fallback is signed the same as the OS
374 // as a proxy for coreApp="true"
375 if (pm.checkSignatures(systemPackageName, packageName)
376 != PackageManager.SIGNATURE_MATCH) {
377 if (D) Log.d(TAG, "Fallback candidate not signed the same as system: "
378 + packageName);
379 continue;
380 }
381
382 // Found a valid fallback.
383 if (D) Log.d(TAG, "Found fallback provider: " + packageName);
384 return;
385 } else {
386 if (D) Log.d(TAG, "Fallback candidate not version 0: " + packageName);
387 }
388 }
389
390 throw new IllegalStateException("Unable to find a fused location provider that is in the "
391 + "system partition with version 0 and signed with the platform certificate. "
392 + "Such a package is needed to provide a default fused location provider in the "
393 + "event that no other fused location provider has been installed or is currently "
394 + "available. For example, coreOnly boot mode when decrypting the data "
395 + "partition. The fallback must also be marked coreApp=\"true\" in the manifest");
396 }
397
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700398 private void loadProvidersLocked() {
Victoria Lease5c24fd02012-10-01 11:00:50 -0700399 // create a passive location provider, which is always enabled
400 PassiveProvider passiveProvider = new PassiveProvider(this);
401 addProviderLocked(passiveProvider);
402 mEnabledProviders.add(passiveProvider.getName());
403 mPassiveProvider = passiveProvider;
Jaikumar Ganesh8ce470d2013-04-03 12:22:18 -0700404 // Create a gps location provider
405 GpsLocationProvider gpsProvider = new GpsLocationProvider(mContext, this,
406 mLocationHandler.getLooper());
Victoria Lease5c24fd02012-10-01 11:00:50 -0700407
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700408 if (GpsLocationProvider.isSupported()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700409 mGpsStatusProvider = gpsProvider.getGpsStatusProvider();
410 mNetInitiatedListener = gpsProvider.getNetInitiatedListener();
411 addProviderLocked(gpsProvider);
412 mRealProviders.put(LocationManager.GPS_PROVIDER, gpsProvider);
413 }
destradaaea8a8a62014-06-23 18:19:03 -0700414 mGpsMeasurementsProvider = gpsProvider.getGpsMeasurementsProvider();
destradaa4b3e3932014-07-21 18:01:47 -0700415 mGpsNavigationMessageProvider = gpsProvider.getGpsNavigationMessageProvider();
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700416
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700417 /*
418 Load package name(s) containing location provider support.
419 These packages can contain services implementing location providers:
420 Geocoder Provider, Network Location Provider, and
421 Fused Location Provider. They will each be searched for
422 service components implementing these providers.
423 The location framework also has support for installation
424 of new location providers at run-time. The new package does not
425 have to be explicitly listed here, however it must have a signature
426 that matches the signature of at least one package on this list.
427 */
428 Resources resources = mContext.getResources();
429 ArrayList<String> providerPackageNames = new ArrayList<String>();
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500430 String[] pkgs = resources.getStringArray(
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700431 com.android.internal.R.array.config_locationProviderPackageNames);
Jeff Hamiltonfbadb692012-10-05 14:21:58 -0500432 if (D) Log.d(TAG, "certificates for location providers pulled from: " +
433 Arrays.toString(pkgs));
434 if (pkgs != null) providerPackageNames.addAll(Arrays.asList(pkgs));
435
436 ensureFallbackFusedProviderPresentLocked(providerPackageNames);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700437
438 // bind to network provider
439 LocationProviderProxy networkProvider = LocationProviderProxy.createAndBind(
440 mContext,
441 LocationManager.NETWORK_PROVIDER,
442 NETWORK_LOCATION_SERVICE_ACTION,
Zhentao Sunc5fc9982013-04-17 17:47:53 -0700443 com.android.internal.R.bool.config_enableNetworkLocationOverlay,
444 com.android.internal.R.string.config_networkLocationProviderPackageName,
445 com.android.internal.R.array.config_locationProviderPackageNames,
446 mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700447 if (networkProvider != null) {
448 mRealProviders.put(LocationManager.NETWORK_PROVIDER, networkProvider);
449 mProxyProviders.add(networkProvider);
450 addProviderLocked(networkProvider);
451 } else {
452 Slog.w(TAG, "no network location provider found");
453 }
454
455 // bind to fused provider
456 LocationProviderProxy fusedLocationProvider = LocationProviderProxy.createAndBind(
457 mContext,
458 LocationManager.FUSED_PROVIDER,
459 FUSED_LOCATION_SERVICE_ACTION,
Zhentao Sunc5fc9982013-04-17 17:47:53 -0700460 com.android.internal.R.bool.config_enableFusedLocationOverlay,
461 com.android.internal.R.string.config_fusedLocationProviderPackageName,
462 com.android.internal.R.array.config_locationProviderPackageNames,
463 mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700464 if (fusedLocationProvider != null) {
465 addProviderLocked(fusedLocationProvider);
466 mProxyProviders.add(fusedLocationProvider);
467 mEnabledProviders.add(fusedLocationProvider.getName());
Kenny Rootc3575182012-10-09 12:44:40 -0700468 mRealProviders.put(LocationManager.FUSED_PROVIDER, fusedLocationProvider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700469 } else {
470 Slog.e(TAG, "no fused location provider found",
471 new IllegalStateException("Location service needs a fused location provider"));
472 }
473
474 // bind to geocoder provider
Zhentao Sunc5fc9982013-04-17 17:47:53 -0700475 mGeocodeProvider = GeocoderProxy.createAndBind(mContext,
476 com.android.internal.R.bool.config_enableGeocoderOverlay,
477 com.android.internal.R.string.config_geocoderProviderPackageName,
478 com.android.internal.R.array.config_locationProviderPackageNames,
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800479 mLocationHandler);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700480 if (mGeocodeProvider == null) {
481 Slog.e(TAG, "no geocoder provider found");
482 }
Jaikumar Ganesh8ce470d2013-04-03 12:22:18 -0700483
destradaaa4fa3b52014-07-09 10:46:39 -0700484 // bind to fused hardware provider if supported
destradaabeea4422014-07-30 18:17:21 -0700485 // in devices without support, requesting an instance of FlpHardwareProvider will raise an
486 // exception, so make sure we only do that when supported
487 FlpHardwareProvider flpHardwareProvider;
destradaa5ce66d82014-05-28 18:24:08 -0700488 if (FlpHardwareProvider.isSupported()) {
destradaabeea4422014-07-30 18:17:21 -0700489 flpHardwareProvider = FlpHardwareProvider.getInstance(mContext);
destradaaf9a274c2014-07-25 15:11:56 -0700490 FusedProxy fusedProxy = FusedProxy.createAndBind(
491 mContext,
492 mLocationHandler,
493 flpHardwareProvider.getLocationHardware(),
494 com.android.internal.R.bool.config_enableHardwareFlpOverlay,
495 com.android.internal.R.string.config_hardwareFlpPackageName,
496 com.android.internal.R.array.config_locationProviderPackageNames);
497 if (fusedProxy == null) {
498 Slog.e(TAG, "Unable to bind FusedProxy.");
499 }
destradaacfbdcd22014-04-30 11:29:11 -0700500 } else {
destradaabeea4422014-07-30 18:17:21 -0700501 flpHardwareProvider = null;
destradaaf9a274c2014-07-25 15:11:56 -0700502 Slog.e(TAG, "FLP HAL not supported");
503 }
504
505 // bind to geofence provider
506 GeofenceProxy provider = GeofenceProxy.createAndBind(
507 mContext,com.android.internal.R.bool.config_enableGeofenceOverlay,
508 com.android.internal.R.string.config_geofenceProviderPackageName,
509 com.android.internal.R.array.config_locationProviderPackageNames,
510 mLocationHandler,
511 gpsProvider.getGpsGeofenceProxy(),
destradaabeea4422014-07-30 18:17:21 -0700512 flpHardwareProvider != null ? flpHardwareProvider.getGeofenceHardware() : null);
destradaaf9a274c2014-07-25 15:11:56 -0700513 if (provider == null) {
514 Slog.e(TAG, "Unable to bind FLP Geofence proxy.");
destradaa0682809a2013-08-12 18:50:30 -0700515 }
Ji-Hwan Lee26bdb8f2014-04-21 20:48:19 +0900516
destradaaa4fa3b52014-07-09 10:46:39 -0700517 // bind to the hardware activity recognition if supported
518 if (ActivityRecognitionHardware.isSupported()) {
519 ActivityRecognitionProxy proxy = ActivityRecognitionProxy.createAndBind(
520 mContext,
521 mLocationHandler,
522 ActivityRecognitionHardware.getInstance(mContext),
523 com.android.internal.R.bool.config_enableActivityRecognitionHardwareOverlay,
524 com.android.internal.R.string.config_activityRecognitionHardwarePackageName,
525 com.android.internal.R.array.config_locationProviderPackageNames);
526
527 if (proxy == null) {
528 Slog.e(TAG, "Unable to bind ActivityRecognitionProxy.");
529 }
530 } else {
531 Slog.e(TAG, "Hardware Activity-Recognition not supported.");
532 }
533
Ji-Hwan Lee26bdb8f2014-04-21 20:48:19 +0900534 String[] testProviderStrings = resources.getStringArray(
535 com.android.internal.R.array.config_testLocationProviders);
536 for (String testProviderString : testProviderStrings) {
537 String fragments[] = testProviderString.split(",");
538 String name = fragments[0].trim();
539 if (mProvidersByName.get(name) != null) {
540 throw new IllegalArgumentException("Provider \"" + name + "\" already exists");
541 }
542 ProviderProperties properties = new ProviderProperties(
543 Boolean.parseBoolean(fragments[1]) /* requiresNetwork */,
544 Boolean.parseBoolean(fragments[2]) /* requiresSatellite */,
545 Boolean.parseBoolean(fragments[3]) /* requiresCell */,
546 Boolean.parseBoolean(fragments[4]) /* hasMonetaryCost */,
547 Boolean.parseBoolean(fragments[5]) /* supportsAltitude */,
548 Boolean.parseBoolean(fragments[6]) /* supportsSpeed */,
549 Boolean.parseBoolean(fragments[7]) /* supportsBearing */,
550 Integer.parseInt(fragments[8]) /* powerRequirement */,
551 Integer.parseInt(fragments[9]) /* accuracy */);
552 addTestProviderLocked(name, properties);
553 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700554 }
Mike Lockwood9637d472009-04-02 21:41:57 -0700555
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800556 /**
Victoria Lease38389b62012-09-30 11:44:22 -0700557 * Called when the device's active user changes.
558 * @param userId the new active user's UserId
559 */
560 private void switchUser(int userId) {
Jianzheng Zhoud5c69462013-10-10 14:02:09 +0800561 if (mCurrentUserId == userId) {
562 return;
563 }
Victoria Lease83762d22012-10-03 13:51:17 -0700564 mBlacklist.switchUser(userId);
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800565 mLocationHandler.removeMessages(MSG_LOCATION_CHANGED);
Victoria Lease38389b62012-09-30 11:44:22 -0700566 synchronized (mLock) {
Victoria Leaseb711d572012-10-02 13:14:11 -0700567 mLastLocation.clear();
David Christie1b9b7b12013-04-15 15:31:11 -0700568 mLastLocationCoarseInterval.clear();
Victoria Leaseb711d572012-10-02 13:14:11 -0700569 for (LocationProviderInterface p : mProviders) {
Amith Yamasanib27528d2014-06-05 15:02:10 -0700570 updateProviderListenersLocked(p.getName(), false);
Victoria Leaseb711d572012-10-02 13:14:11 -0700571 }
Victoria Lease38389b62012-09-30 11:44:22 -0700572 mCurrentUserId = userId;
Amith Yamasanib27528d2014-06-05 15:02:10 -0700573 updateUserProfiles(userId);
Victoria Leaseb711d572012-10-02 13:14:11 -0700574 updateProvidersLocked();
Victoria Lease38389b62012-09-30 11:44:22 -0700575 }
576 }
577
578 /**
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800579 * A wrapper class holding either an ILocationListener or a PendingIntent to receive
580 * location updates.
581 */
Mike Lockwood48f17512009-04-23 09:12:08 -0700582 private final class Receiver implements IBinder.DeathRecipient, PendingIntent.OnFinished {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700583 final int mUid; // uid of receiver
584 final int mPid; // pid of receiver
585 final String mPackageName; // package name of receiver
Victoria Lease37425c32012-10-16 16:08:48 -0700586 final int mAllowedResolutionLevel; // resolution level allowed to receiver
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700587
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800588 final ILocationListener mListener;
589 final PendingIntent mPendingIntent;
David Christie82edc9b2013-07-19 11:31:42 -0700590 final WorkSource mWorkSource; // WorkSource for battery blame, or null to assign to caller.
David Christie40e57822013-07-30 11:36:48 -0700591 final boolean mHideFromAppOps; // True if AppOps should not monitor this receiver.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800592 final Object mKey;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700593
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400594 final HashMap<String,UpdateRecord> mUpdateRecords = new HashMap<String,UpdateRecord>();
Nick Pellyf1be6862012-05-15 10:53:42 -0700595
David Christie0b837452013-07-29 16:02:13 -0700596 // True if app ops has started monitoring this receiver for locations.
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700597 boolean mOpMonitoring;
David Christie0b837452013-07-29 16:02:13 -0700598 // True if app ops has started monitoring this receiver for high power (gps) locations.
599 boolean mOpHighPowerMonitoring;
Mike Lockwood48f17512009-04-23 09:12:08 -0700600 int mPendingBroadcasts;
Victoria Lease0aa28602013-05-29 15:28:26 -0700601 PowerManager.WakeLock mWakeLock;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800602
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700603 Receiver(ILocationListener listener, PendingIntent intent, int pid, int uid,
David Christie40e57822013-07-30 11:36:48 -0700604 String packageName, WorkSource workSource, boolean hideFromAppOps) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800605 mListener = listener;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800606 mPendingIntent = intent;
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700607 if (listener != null) {
608 mKey = listener.asBinder();
609 } else {
610 mKey = intent;
611 }
Victoria Lease37425c32012-10-16 16:08:48 -0700612 mAllowedResolutionLevel = getAllowedResolutionLevel(pid, uid);
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700613 mUid = uid;
614 mPid = pid;
615 mPackageName = packageName;
David Christie82edc9b2013-07-19 11:31:42 -0700616 if (workSource != null && workSource.size() <= 0) {
617 workSource = null;
618 }
619 mWorkSource = workSource;
David Christie40e57822013-07-30 11:36:48 -0700620 mHideFromAppOps = hideFromAppOps;
Victoria Lease0aa28602013-05-29 15:28:26 -0700621
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700622 updateMonitoring(true);
623
Victoria Lease0aa28602013-05-29 15:28:26 -0700624 // construct/configure wakelock
625 mWakeLock = mPowerManager.newWakeLock(PowerManager.PARTIAL_WAKE_LOCK, WAKELOCK_KEY);
David Christie82edc9b2013-07-19 11:31:42 -0700626 if (workSource == null) {
627 workSource = new WorkSource(mUid, mPackageName);
628 }
629 mWakeLock.setWorkSource(workSource);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800630 }
631
632 @Override
633 public boolean equals(Object otherObj) {
634 if (otherObj instanceof Receiver) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700635 return mKey.equals(((Receiver)otherObj).mKey);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800636 }
637 return false;
638 }
639
640 @Override
641 public int hashCode() {
642 return mKey.hashCode();
643 }
Mike Lockwood3681f262009-05-12 10:52:03 -0400644
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800645 @Override
646 public String toString() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700647 StringBuilder s = new StringBuilder();
648 s.append("Reciever[");
649 s.append(Integer.toHexString(System.identityHashCode(this)));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800650 if (mListener != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700651 s.append(" listener");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800652 } else {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700653 s.append(" intent");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800654 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700655 for (String p : mUpdateRecords.keySet()) {
656 s.append(" ").append(mUpdateRecords.get(p).toString());
657 }
658 s.append("]");
659 return s.toString();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800660 }
661
David Christie15b31912013-08-13 15:54:32 -0700662 /**
663 * Update AppOp monitoring for this receiver.
664 *
665 * @param allow If true receiver is currently active, if false it's been removed.
666 */
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700667 public void updateMonitoring(boolean allow) {
David Christie40e57822013-07-30 11:36:48 -0700668 if (mHideFromAppOps) {
669 return;
670 }
671
David Christie15b31912013-08-13 15:54:32 -0700672 boolean requestingLocation = false;
673 boolean requestingHighPowerLocation = false;
674 if (allow) {
675 // See if receiver has any enabled update records. Also note if any update records
676 // are high power (has a high power provider with an interval under a threshold).
677 for (UpdateRecord updateRecord : mUpdateRecords.values()) {
678 if (isAllowedByCurrentUserSettingsLocked(updateRecord.mProvider)) {
679 requestingLocation = true;
680 LocationProviderInterface locationProvider
David Christie2ff96af2014-01-30 16:09:37 -0800681 = mProvidersByName.get(updateRecord.mProvider);
David Christie15b31912013-08-13 15:54:32 -0700682 ProviderProperties properties = locationProvider != null
683 ? locationProvider.getProperties() : null;
684 if (properties != null
685 && properties.mPowerRequirement == Criteria.POWER_HIGH
686 && updateRecord.mRequest.getInterval() < HIGH_POWER_INTERVAL_MS) {
687 requestingHighPowerLocation = true;
688 break;
689 }
690 }
691 }
692 }
693
David Christie0b837452013-07-29 16:02:13 -0700694 // First update monitoring of any location request (including high power).
David Christie15b31912013-08-13 15:54:32 -0700695 mOpMonitoring = updateMonitoring(
696 requestingLocation,
697 mOpMonitoring,
David Christie0b837452013-07-29 16:02:13 -0700698 AppOpsManager.OP_MONITOR_LOCATION);
699
700 // Now update monitoring of high power requests only.
David Christiec750c1f2013-08-08 12:56:57 -0700701 boolean wasHighPowerMonitoring = mOpHighPowerMonitoring;
David Christie15b31912013-08-13 15:54:32 -0700702 mOpHighPowerMonitoring = updateMonitoring(
703 requestingHighPowerLocation,
704 mOpHighPowerMonitoring,
David Christie0b837452013-07-29 16:02:13 -0700705 AppOpsManager.OP_MONITOR_HIGH_POWER_LOCATION);
David Christiec750c1f2013-08-08 12:56:57 -0700706 if (mOpHighPowerMonitoring != wasHighPowerMonitoring) {
David Christie15b31912013-08-13 15:54:32 -0700707 // Send an intent to notify that a high power request has been added/removed.
David Christiec750c1f2013-08-08 12:56:57 -0700708 Intent intent = new Intent(LocationManager.HIGH_POWER_REQUEST_CHANGE_ACTION);
709 mContext.sendBroadcastAsUser(intent, UserHandle.ALL);
710 }
David Christie0b837452013-07-29 16:02:13 -0700711 }
712
713 /**
714 * Update AppOps monitoring for a single location request and op type.
715 *
716 * @param allowMonitoring True if monitoring is allowed for this request/op.
717 * @param currentlyMonitoring True if AppOps is currently monitoring this request/op.
718 * @param op AppOps code for the op to update.
719 * @return True if monitoring is on for this request/op after updating.
720 */
721 private boolean updateMonitoring(boolean allowMonitoring, boolean currentlyMonitoring,
722 int op) {
723 if (!currentlyMonitoring) {
724 if (allowMonitoring) {
725 return mAppOps.startOpNoThrow(op, mUid, mPackageName)
726 == AppOpsManager.MODE_ALLOWED;
727 }
728 } else {
729 if (!allowMonitoring || mAppOps.checkOpNoThrow(op, mUid, mPackageName)
730 != AppOpsManager.MODE_ALLOWED) {
731 mAppOps.finishOp(op, mUid, mPackageName);
732 return false;
733 }
734 }
735
736 return currentlyMonitoring;
Dianne Hackborn1304f4a2013-07-09 18:17:27 -0700737 }
738
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800739 public boolean isListener() {
740 return mListener != null;
741 }
742
743 public boolean isPendingIntent() {
744 return mPendingIntent != null;
745 }
746
747 public ILocationListener getListener() {
748 if (mListener != null) {
749 return mListener;
750 }
751 throw new IllegalStateException("Request for non-existent listener");
752 }
753
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800754 public boolean callStatusChangedLocked(String provider, int status, Bundle extras) {
755 if (mListener != null) {
756 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700757 synchronized (this) {
758 // synchronize to ensure incrementPendingBroadcastsLocked()
759 // is called before decrementPendingBroadcasts()
760 mListener.onStatusChanged(provider, status, extras);
Nick Pellye0fd6932012-07-11 10:26:13 -0700761 // call this after broadcasting so we do not increment
762 // if we throw an exeption.
763 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700764 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800765 } catch (RemoteException e) {
766 return false;
767 }
768 } else {
769 Intent statusChanged = new Intent();
Victoria Lease61ecb022012-11-13 15:12:51 -0800770 statusChanged.putExtras(new Bundle(extras));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800771 statusChanged.putExtra(LocationManager.KEY_STATUS_CHANGED, status);
772 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700773 synchronized (this) {
774 // synchronize to ensure incrementPendingBroadcastsLocked()
775 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700776 mPendingIntent.send(mContext, 0, statusChanged, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700777 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700778 // call this after broadcasting so we do not increment
779 // if we throw an exeption.
780 incrementPendingBroadcastsLocked();
781 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800782 } catch (PendingIntent.CanceledException e) {
783 return false;
784 }
785 }
786 return true;
787 }
788
789 public boolean callLocationChangedLocked(Location location) {
790 if (mListener != null) {
791 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700792 synchronized (this) {
793 // synchronize to ensure incrementPendingBroadcastsLocked()
794 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c5406a2012-11-29 16:18:01 -0800795 mListener.onLocationChanged(new Location(location));
Nick Pellye0fd6932012-07-11 10:26:13 -0700796 // call this after broadcasting so we do not increment
797 // if we throw an exeption.
798 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700799 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800800 } catch (RemoteException e) {
801 return false;
802 }
803 } else {
804 Intent locationChanged = new Intent();
Victoria Lease61ecb022012-11-13 15:12:51 -0800805 locationChanged.putExtra(LocationManager.KEY_LOCATION_CHANGED, new Location(location));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800806 try {
Mike Lockwood48f17512009-04-23 09:12:08 -0700807 synchronized (this) {
808 // synchronize to ensure incrementPendingBroadcastsLocked()
809 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700810 mPendingIntent.send(mContext, 0, locationChanged, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700811 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700812 // call this after broadcasting so we do not increment
813 // if we throw an exeption.
814 incrementPendingBroadcastsLocked();
815 }
816 } catch (PendingIntent.CanceledException e) {
817 return false;
818 }
819 }
820 return true;
821 }
822
823 public boolean callProviderEnabledLocked(String provider, boolean enabled) {
David Christie15b31912013-08-13 15:54:32 -0700824 // First update AppOp monitoring.
825 // An app may get/lose location access as providers are enabled/disabled.
826 updateMonitoring(true);
827
Mike Lockwood48f17512009-04-23 09:12:08 -0700828 if (mListener != null) {
829 try {
830 synchronized (this) {
831 // synchronize to ensure incrementPendingBroadcastsLocked()
832 // is called before decrementPendingBroadcasts()
833 if (enabled) {
834 mListener.onProviderEnabled(provider);
835 } else {
836 mListener.onProviderDisabled(provider);
837 }
Nick Pellye0fd6932012-07-11 10:26:13 -0700838 // call this after broadcasting so we do not increment
839 // if we throw an exeption.
840 incrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700841 }
842 } catch (RemoteException e) {
843 return false;
844 }
845 } else {
846 Intent providerIntent = new Intent();
847 providerIntent.putExtra(LocationManager.KEY_PROVIDER_ENABLED, enabled);
848 try {
849 synchronized (this) {
850 // synchronize to ensure incrementPendingBroadcastsLocked()
851 // is called before decrementPendingBroadcasts()
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700852 mPendingIntent.send(mContext, 0, providerIntent, this, mLocationHandler,
Victoria Lease37425c32012-10-16 16:08:48 -0700853 getResolutionPermission(mAllowedResolutionLevel));
Mike Lockwood48f17512009-04-23 09:12:08 -0700854 // call this after broadcasting so we do not increment
855 // if we throw an exeption.
856 incrementPendingBroadcastsLocked();
857 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800858 } catch (PendingIntent.CanceledException e) {
859 return false;
860 }
861 }
862 return true;
863 }
864
Nick Pellyf1be6862012-05-15 10:53:42 -0700865 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800866 public void binderDied() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700867 if (D) Log.d(TAG, "Location listener died");
868
Mike Lockwood2f82c4e2009-04-17 08:24:10 -0400869 synchronized (mLock) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800870 removeUpdatesLocked(this);
871 }
Mike Lockwood48f17512009-04-23 09:12:08 -0700872 synchronized (this) {
Victoria Lease0aa28602013-05-29 15:28:26 -0700873 clearPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700874 }
875 }
876
Nick Pellye0fd6932012-07-11 10:26:13 -0700877 @Override
Mike Lockwood48f17512009-04-23 09:12:08 -0700878 public void onSendFinished(PendingIntent pendingIntent, Intent intent,
879 int resultCode, String resultData, Bundle resultExtras) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400880 synchronized (this) {
881 decrementPendingBroadcastsLocked();
Mike Lockwood48f17512009-04-23 09:12:08 -0700882 }
883 }
884
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400885 // this must be called while synchronized by caller in a synchronized block
886 // containing the sending of the broadcaset
887 private void incrementPendingBroadcastsLocked() {
888 if (mPendingBroadcasts++ == 0) {
Victoria Lease0aa28602013-05-29 15:28:26 -0700889 mWakeLock.acquire();
Mike Lockwood0528b9b2009-05-07 10:12:54 -0400890 }
891 }
892
893 private void decrementPendingBroadcastsLocked() {
894 if (--mPendingBroadcasts == 0) {
Victoria Lease0aa28602013-05-29 15:28:26 -0700895 if (mWakeLock.isHeld()) {
896 mWakeLock.release();
897 }
898 }
899 }
900
901 public void clearPendingBroadcastsLocked() {
902 if (mPendingBroadcasts > 0) {
903 mPendingBroadcasts = 0;
904 if (mWakeLock.isHeld()) {
905 mWakeLock.release();
906 }
Mike Lockwood48f17512009-04-23 09:12:08 -0700907 }
908 }
909 }
910
Nick Pellye0fd6932012-07-11 10:26:13 -0700911 @Override
Mike Lockwood48f17512009-04-23 09:12:08 -0700912 public void locationCallbackFinished(ILocationListener listener) {
Dianne Hackbornf5fdca92013-06-05 14:53:33 -0700913 //Do not use getReceiverLocked here as that will add the ILocationListener to
Joshua Bartel080b61b2009-10-05 12:44:46 -0400914 //the receiver list if it is not found. If it is not found then the
915 //LocationListener was removed when it had a pending broadcast and should
916 //not be added back.
Dianne Hackbornf5fdca92013-06-05 14:53:33 -0700917 synchronized (mLock) {
918 IBinder binder = listener.asBinder();
919 Receiver receiver = mReceivers.get(binder);
920 if (receiver != null) {
921 synchronized (receiver) {
922 // so wakelock calls will succeed
923 long identity = Binder.clearCallingIdentity();
924 receiver.decrementPendingBroadcastsLocked();
925 Binder.restoreCallingIdentity(identity);
David Christie2ff96af2014-01-30 16:09:37 -0800926 }
Dianne Hackbornf5fdca92013-06-05 14:53:33 -0700927 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800928 }
929 }
930
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700931 private void addProviderLocked(LocationProviderInterface provider) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400932 mProviders.add(provider);
933 mProvidersByName.put(provider.getName(), provider);
934 }
935
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700936 private void removeProviderLocked(LocationProviderInterface provider) {
937 provider.disable();
Mike Lockwood15e3d0f2009-05-01 07:53:28 -0400938 mProviders.remove(provider);
939 mProvidersByName.remove(provider.getName());
940 }
941
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800942 /**
Victoria Lease09eeaec2013-02-05 11:34:13 -0800943 * Returns "true" if access to the specified location provider is allowed by the current
944 * user's settings. Access to all location providers is forbidden to non-location-provider
945 * processes belonging to background users.
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800946 *
947 * @param provider the name of the location provider
Victoria Lease03cdd3d2013-02-01 15:15:54 -0800948 * @return
949 */
Victoria Lease09eeaec2013-02-05 11:34:13 -0800950 private boolean isAllowedByCurrentUserSettingsLocked(String provider) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800951 if (mEnabledProviders.contains(provider)) {
952 return true;
953 }
954 if (mDisabledProviders.contains(provider)) {
955 return false;
956 }
957 // Use system settings
958 ContentResolver resolver = mContext.getContentResolver();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800959
Victoria Leaseb711d572012-10-02 13:14:11 -0700960 return Settings.Secure.isLocationProviderEnabledForUser(resolver, provider, mCurrentUserId);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800961 }
962
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700963 /**
Victoria Lease09eeaec2013-02-05 11:34:13 -0800964 * Returns "true" if access to the specified location provider is allowed by the specified
965 * user's settings. Access to all location providers is forbidden to non-location-provider
966 * processes belonging to background users.
967 *
968 * @param provider the name of the location provider
969 * @param uid the requestor's UID
970 * @return
971 */
972 private boolean isAllowedByUserSettingsLocked(String provider, int uid) {
Amith Yamasanib27528d2014-06-05 15:02:10 -0700973 if (!isCurrentProfile(UserHandle.getUserId(uid)) && !isUidALocationProvider(uid)) {
Victoria Lease09eeaec2013-02-05 11:34:13 -0800974 return false;
975 }
976 return isAllowedByCurrentUserSettingsLocked(provider);
977 }
978
979 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700980 * Returns the permission string associated with the specified resolution level.
981 *
982 * @param resolutionLevel the resolution level
983 * @return the permission string
Nick Pelly6fa9ad42012-07-16 12:18:23 -0700984 */
Victoria Lease37425c32012-10-16 16:08:48 -0700985 private String getResolutionPermission(int resolutionLevel) {
986 switch (resolutionLevel) {
987 case RESOLUTION_LEVEL_FINE:
988 return android.Manifest.permission.ACCESS_FINE_LOCATION;
989 case RESOLUTION_LEVEL_COARSE:
990 return android.Manifest.permission.ACCESS_COARSE_LOCATION;
991 default:
992 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800993 }
Victoria Leaseda479c52012-10-15 15:24:16 -0700994 }
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700995
Victoria Leaseda479c52012-10-15 15:24:16 -0700996 /**
Victoria Lease37425c32012-10-16 16:08:48 -0700997 * Returns the resolution level allowed to the given PID/UID pair.
998 *
999 * @param pid the PID
1000 * @param uid the UID
1001 * @return resolution level allowed to the pid/uid pair
Victoria Leaseda479c52012-10-15 15:24:16 -07001002 */
Victoria Lease37425c32012-10-16 16:08:48 -07001003 private int getAllowedResolutionLevel(int pid, int uid) {
1004 if (mContext.checkPermission(android.Manifest.permission.ACCESS_FINE_LOCATION,
1005 pid, uid) == PackageManager.PERMISSION_GRANTED) {
1006 return RESOLUTION_LEVEL_FINE;
1007 } else if (mContext.checkPermission(android.Manifest.permission.ACCESS_COARSE_LOCATION,
1008 pid, uid) == PackageManager.PERMISSION_GRANTED) {
1009 return RESOLUTION_LEVEL_COARSE;
1010 } else {
1011 return RESOLUTION_LEVEL_NONE;
Victoria Leaseda479c52012-10-15 15:24:16 -07001012 }
Victoria Lease4fab68b2012-09-13 13:20:59 -07001013 }
1014
1015 /**
Victoria Lease37425c32012-10-16 16:08:48 -07001016 * Returns the resolution level allowed to the caller
1017 *
1018 * @return resolution level allowed to caller
Victoria Lease4fab68b2012-09-13 13:20:59 -07001019 */
Victoria Lease37425c32012-10-16 16:08:48 -07001020 private int getCallerAllowedResolutionLevel() {
1021 return getAllowedResolutionLevel(Binder.getCallingPid(), Binder.getCallingUid());
1022 }
1023
1024 /**
1025 * Throw SecurityException if specified resolution level is insufficient to use geofences.
1026 *
1027 * @param allowedResolutionLevel resolution level allowed to caller
1028 */
1029 private void checkResolutionLevelIsSufficientForGeofenceUse(int allowedResolutionLevel) {
1030 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
Victoria Lease4fab68b2012-09-13 13:20:59 -07001031 throw new SecurityException("Geofence usage requires ACCESS_FINE_LOCATION permission");
1032 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001033 }
1034
Victoria Lease37425c32012-10-16 16:08:48 -07001035 /**
1036 * Return the minimum resolution level required to use the specified location provider.
1037 *
1038 * @param provider the name of the location provider
1039 * @return minimum resolution level required for provider
1040 */
1041 private int getMinimumResolutionLevelForProviderUse(String provider) {
Victoria Lease8dbb6342012-09-21 16:55:53 -07001042 if (LocationManager.GPS_PROVIDER.equals(provider) ||
1043 LocationManager.PASSIVE_PROVIDER.equals(provider)) {
1044 // gps and passive providers require FINE permission
Victoria Lease37425c32012-10-16 16:08:48 -07001045 return RESOLUTION_LEVEL_FINE;
Victoria Lease8dbb6342012-09-21 16:55:53 -07001046 } else if (LocationManager.NETWORK_PROVIDER.equals(provider) ||
1047 LocationManager.FUSED_PROVIDER.equals(provider)) {
1048 // network and fused providers are ok with COARSE or FINE
Victoria Lease37425c32012-10-16 16:08:48 -07001049 return RESOLUTION_LEVEL_COARSE;
Laurent Tu941221c2012-10-04 14:21:52 -07001050 } else {
1051 // mock providers
1052 LocationProviderInterface lp = mMockProviders.get(provider);
1053 if (lp != null) {
1054 ProviderProperties properties = lp.getProperties();
1055 if (properties != null) {
1056 if (properties.mRequiresSatellite) {
1057 // provider requiring satellites require FINE permission
Victoria Lease37425c32012-10-16 16:08:48 -07001058 return RESOLUTION_LEVEL_FINE;
Laurent Tu941221c2012-10-04 14:21:52 -07001059 } else if (properties.mRequiresNetwork || properties.mRequiresCell) {
1060 // provider requiring network and or cell require COARSE or FINE
Victoria Lease37425c32012-10-16 16:08:48 -07001061 return RESOLUTION_LEVEL_COARSE;
Laurent Tu941221c2012-10-04 14:21:52 -07001062 }
1063 }
1064 }
Victoria Lease8dbb6342012-09-21 16:55:53 -07001065 }
Victoria Lease37425c32012-10-16 16:08:48 -07001066 return RESOLUTION_LEVEL_FINE; // if in doubt, require FINE
Victoria Leaseda479c52012-10-15 15:24:16 -07001067 }
1068
Victoria Lease37425c32012-10-16 16:08:48 -07001069 /**
1070 * Throw SecurityException if specified resolution level is insufficient to use the named
1071 * location provider.
1072 *
1073 * @param allowedResolutionLevel resolution level allowed to caller
1074 * @param providerName the name of the location provider
1075 */
1076 private void checkResolutionLevelIsSufficientForProviderUse(int allowedResolutionLevel,
1077 String providerName) {
1078 int requiredResolutionLevel = getMinimumResolutionLevelForProviderUse(providerName);
1079 if (allowedResolutionLevel < requiredResolutionLevel) {
1080 switch (requiredResolutionLevel) {
1081 case RESOLUTION_LEVEL_FINE:
1082 throw new SecurityException("\"" + providerName + "\" location provider " +
1083 "requires ACCESS_FINE_LOCATION permission.");
1084 case RESOLUTION_LEVEL_COARSE:
1085 throw new SecurityException("\"" + providerName + "\" location provider " +
1086 "requires ACCESS_COARSE_LOCATION or ACCESS_FINE_LOCATION permission.");
1087 default:
1088 throw new SecurityException("Insufficient permission for \"" + providerName +
1089 "\" location provider.");
Victoria Leaseda479c52012-10-15 15:24:16 -07001090 }
1091 }
Victoria Lease8dbb6342012-09-21 16:55:53 -07001092 }
1093
David Christie82edc9b2013-07-19 11:31:42 -07001094 /**
1095 * Throw SecurityException if WorkSource use is not allowed (i.e. can't blame other packages
1096 * for battery).
1097 */
David Christie40e57822013-07-30 11:36:48 -07001098 private void checkDeviceStatsAllowed() {
David Christie82edc9b2013-07-19 11:31:42 -07001099 mContext.enforceCallingOrSelfPermission(
1100 android.Manifest.permission.UPDATE_DEVICE_STATS, null);
1101 }
1102
David Christie40e57822013-07-30 11:36:48 -07001103 private void checkUpdateAppOpsAllowed() {
1104 mContext.enforceCallingOrSelfPermission(
1105 android.Manifest.permission.UPDATE_APP_OPS_STATS, null);
1106 }
1107
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001108 public static int resolutionLevelToOp(int allowedResolutionLevel) {
Dianne Hackborn35654b62013-01-14 17:38:02 -08001109 if (allowedResolutionLevel != RESOLUTION_LEVEL_NONE) {
1110 if (allowedResolutionLevel == RESOLUTION_LEVEL_COARSE) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001111 return AppOpsManager.OP_COARSE_LOCATION;
Dianne Hackborn35654b62013-01-14 17:38:02 -08001112 } else {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001113 return AppOpsManager.OP_FINE_LOCATION;
Dianne Hackborn35654b62013-01-14 17:38:02 -08001114 }
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001115 }
1116 return -1;
1117 }
1118
1119 boolean reportLocationAccessNoThrow(int uid, String packageName, int allowedResolutionLevel) {
1120 int op = resolutionLevelToOp(allowedResolutionLevel);
1121 if (op >= 0) {
Dianne Hackborn35654b62013-01-14 17:38:02 -08001122 if (mAppOps.noteOpNoThrow(op, uid, packageName) != AppOpsManager.MODE_ALLOWED) {
1123 return false;
1124 }
1125 }
1126 return true;
1127 }
1128
1129 boolean checkLocationAccess(int uid, String packageName, int allowedResolutionLevel) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001130 int op = resolutionLevelToOp(allowedResolutionLevel);
1131 if (op >= 0) {
Dianne Hackborn35654b62013-01-14 17:38:02 -08001132 if (mAppOps.checkOp(op, uid, packageName) != AppOpsManager.MODE_ALLOWED) {
1133 return false;
1134 }
1135 }
1136 return true;
1137 }
1138
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001139 /**
1140 * Returns all providers by name, including passive, but excluding
Laurent Tu0d21e212012-10-02 15:33:48 -07001141 * fused, also including ones that are not permitted to
1142 * be accessed by the calling activity or are currently disabled.
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001143 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001144 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001145 public List<String> getAllProviders() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001146 ArrayList<String> out;
1147 synchronized (mLock) {
1148 out = new ArrayList<String>(mProviders.size());
1149 for (LocationProviderInterface provider : mProviders) {
1150 String name = provider.getName();
1151 if (LocationManager.FUSED_PROVIDER.equals(name)) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07001152 continue;
1153 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001154 out.add(name);
1155 }
1156 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001157
1158 if (D) Log.d(TAG, "getAllProviders()=" + out);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001159 return out;
1160 }
1161
Mike Lockwood03ca2162010-04-01 08:10:09 -07001162 /**
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001163 * Return all providers by name, that match criteria and are optionally
1164 * enabled.
1165 * Can return passive provider, but never returns fused provider.
Mike Lockwood03ca2162010-04-01 08:10:09 -07001166 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001167 @Override
1168 public List<String> getProviders(Criteria criteria, boolean enabledOnly) {
Victoria Lease37425c32012-10-16 16:08:48 -07001169 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001170 ArrayList<String> out;
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001171 int uid = Binder.getCallingUid();;
Victoria Lease269518e2012-10-29 08:25:39 -07001172 long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001173 try {
1174 synchronized (mLock) {
1175 out = new ArrayList<String>(mProviders.size());
1176 for (LocationProviderInterface provider : mProviders) {
1177 String name = provider.getName();
1178 if (LocationManager.FUSED_PROVIDER.equals(name)) {
Victoria Lease8dbb6342012-09-21 16:55:53 -07001179 continue;
1180 }
Victoria Lease37425c32012-10-16 16:08:48 -07001181 if (allowedResolutionLevel >= getMinimumResolutionLevelForProviderUse(name)) {
Victoria Lease09eeaec2013-02-05 11:34:13 -08001182 if (enabledOnly && !isAllowedByUserSettingsLocked(name, uid)) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001183 continue;
1184 }
1185 if (criteria != null && !LocationProvider.propertiesMeetCriteria(
1186 name, provider.getProperties(), criteria)) {
1187 continue;
1188 }
1189 out.add(name);
Victoria Lease8dbb6342012-09-21 16:55:53 -07001190 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001191 }
Mike Lockwood03ca2162010-04-01 08:10:09 -07001192 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001193 } finally {
1194 Binder.restoreCallingIdentity(identity);
Mike Lockwood03ca2162010-04-01 08:10:09 -07001195 }
1196
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001197 if (D) Log.d(TAG, "getProviders()=" + out);
1198 return out;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001199 }
1200
1201 /**
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001202 * Return the name of the best provider given a Criteria object.
1203 * This method has been deprecated from the public API,
Victoria Lease8dbb6342012-09-21 16:55:53 -07001204 * and the whole LocationProvider (including #meetsCriteria)
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001205 * has been deprecated as well. So this method now uses
1206 * some simplified logic.
Mike Lockwood03ca2162010-04-01 08:10:09 -07001207 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001208 @Override
Mike Lockwood03ca2162010-04-01 08:10:09 -07001209 public String getBestProvider(Criteria criteria, boolean enabledOnly) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001210 String result = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001211
1212 List<String> providers = getProviders(criteria, enabledOnly);
Victoria Lease8dbb6342012-09-21 16:55:53 -07001213 if (!providers.isEmpty()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001214 result = pickBest(providers);
1215 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
1216 return result;
1217 }
1218 providers = getProviders(null, enabledOnly);
Victoria Lease8dbb6342012-09-21 16:55:53 -07001219 if (!providers.isEmpty()) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001220 result = pickBest(providers);
1221 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
1222 return result;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001223 }
1224
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001225 if (D) Log.d(TAG, "getBestProvider(" + criteria + ", " + enabledOnly + ")=" + result);
Mike Lockwood03ca2162010-04-01 08:10:09 -07001226 return null;
1227 }
1228
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001229 private String pickBest(List<String> providers) {
Victoria Lease1925e292012-09-24 17:00:18 -07001230 if (providers.contains(LocationManager.GPS_PROVIDER)) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001231 return LocationManager.GPS_PROVIDER;
Victoria Lease1925e292012-09-24 17:00:18 -07001232 } else if (providers.contains(LocationManager.NETWORK_PROVIDER)) {
1233 return LocationManager.NETWORK_PROVIDER;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001234 } else {
1235 return providers.get(0);
1236 }
1237 }
1238
Nick Pellye0fd6932012-07-11 10:26:13 -07001239 @Override
Mike Lockwood03ca2162010-04-01 08:10:09 -07001240 public boolean providerMeetsCriteria(String provider, Criteria criteria) {
1241 LocationProviderInterface p = mProvidersByName.get(provider);
1242 if (p == null) {
1243 throw new IllegalArgumentException("provider=" + provider);
1244 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001245
1246 boolean result = LocationProvider.propertiesMeetCriteria(
1247 p.getName(), p.getProperties(), criteria);
1248 if (D) Log.d(TAG, "providerMeetsCriteria(" + provider + ", " + criteria + ")=" + result);
1249 return result;
Mike Lockwood03ca2162010-04-01 08:10:09 -07001250 }
1251
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001252 private void updateProvidersLocked() {
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001253 boolean changesMade = false;
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001254 for (int i = mProviders.size() - 1; i >= 0; i--) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001255 LocationProviderInterface p = mProviders.get(i);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001256 boolean isEnabled = p.isEnabled();
1257 String name = p.getName();
Victoria Lease09eeaec2013-02-05 11:34:13 -08001258 boolean shouldBeEnabled = isAllowedByCurrentUserSettingsLocked(name);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001259 if (isEnabled && !shouldBeEnabled) {
Amith Yamasanib27528d2014-06-05 15:02:10 -07001260 updateProviderListenersLocked(name, false);
David Christieb084fef2013-12-18 14:33:57 -08001261 // If any provider has been disabled, clear all last locations for all providers.
1262 // This is to be on the safe side in case a provider has location derived from
1263 // this disabled provider.
1264 mLastLocation.clear();
1265 mLastLocationCoarseInterval.clear();
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001266 changesMade = true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001267 } else if (!isEnabled && shouldBeEnabled) {
Amith Yamasanib27528d2014-06-05 15:02:10 -07001268 updateProviderListenersLocked(name, true);
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001269 changesMade = true;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001270 }
Brad Fitzpatrick0c5a0402010-08-27 14:01:23 -07001271 }
1272 if (changesMade) {
Dianne Hackborn5ac72a22012-08-29 18:32:08 -07001273 mContext.sendBroadcastAsUser(new Intent(LocationManager.PROVIDERS_CHANGED_ACTION),
1274 UserHandle.ALL);
Tom O'Neill40a86c22013-09-03 18:05:13 -07001275 mContext.sendBroadcastAsUser(new Intent(LocationManager.MODE_CHANGED_ACTION),
1276 UserHandle.ALL);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001277 }
1278 }
1279
Amith Yamasanib27528d2014-06-05 15:02:10 -07001280 private void updateProviderListenersLocked(String provider, boolean enabled) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001281 int listeners = 0;
1282
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001283 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001284 if (p == null) return;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001285
1286 ArrayList<Receiver> deadReceivers = null;
Nick Pellye0fd6932012-07-11 10:26:13 -07001287
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001288 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1289 if (records != null) {
1290 final int N = records.size();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001291 for (int i = 0; i < N; i++) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001292 UpdateRecord record = records.get(i);
Amith Yamasanib27528d2014-06-05 15:02:10 -07001293 if (isCurrentProfile(UserHandle.getUserId(record.mReceiver.mUid))) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001294 // Sends a notification message to the receiver
1295 if (!record.mReceiver.callProviderEnabledLocked(provider, enabled)) {
1296 if (deadReceivers == null) {
1297 deadReceivers = new ArrayList<Receiver>();
1298 }
1299 deadReceivers.add(record.mReceiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001300 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001301 listeners++;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001302 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001303 }
1304 }
1305
1306 if (deadReceivers != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001307 for (int i = deadReceivers.size() - 1; i >= 0; i--) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001308 removeUpdatesLocked(deadReceivers.get(i));
1309 }
1310 }
Nick Pellye0fd6932012-07-11 10:26:13 -07001311
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001312 if (enabled) {
1313 p.enable();
1314 if (listeners > 0) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001315 applyRequirementsLocked(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001316 }
1317 } else {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001318 p.disable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001319 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001320 }
1321
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001322 private void applyRequirementsLocked(String provider) {
1323 LocationProviderInterface p = mProvidersByName.get(provider);
1324 if (p == null) return;
1325
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001326 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001327 WorkSource worksource = new WorkSource();
1328 ProviderRequest providerRequest = new ProviderRequest();
1329
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001330 if (records != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001331 for (UpdateRecord record : records) {
Amith Yamasanib27528d2014-06-05 15:02:10 -07001332 if (isCurrentProfile(UserHandle.getUserId(record.mReceiver.mUid))) {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001333 if (checkLocationAccess(record.mReceiver.mUid, record.mReceiver.mPackageName,
1334 record.mReceiver.mAllowedResolutionLevel)) {
1335 LocationRequest locationRequest = record.mRequest;
1336 providerRequest.locationRequests.add(locationRequest);
1337 if (locationRequest.getInterval() < providerRequest.interval) {
1338 providerRequest.reportLocation = true;
1339 providerRequest.interval = locationRequest.getInterval();
1340 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001341 }
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -07001342 }
1343 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001344
1345 if (providerRequest.reportLocation) {
1346 // calculate who to blame for power
1347 // This is somewhat arbitrary. We pick a threshold interval
1348 // that is slightly higher that the minimum interval, and
1349 // spread the blame across all applications with a request
1350 // under that threshold.
1351 long thresholdInterval = (providerRequest.interval + 1000) * 3 / 2;
1352 for (UpdateRecord record : records) {
Amith Yamasanib27528d2014-06-05 15:02:10 -07001353 if (isCurrentProfile(UserHandle.getUserId(record.mReceiver.mUid))) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001354 LocationRequest locationRequest = record.mRequest;
1355 if (locationRequest.getInterval() <= thresholdInterval) {
David Christiee55c9682013-08-22 10:10:34 -07001356 if (record.mReceiver.mWorkSource != null
1357 && record.mReceiver.mWorkSource.size() > 0
1358 && record.mReceiver.mWorkSource.getName(0) != null) {
David Christie82edc9b2013-07-19 11:31:42 -07001359 // Assign blame to another work source.
David Christiee55c9682013-08-22 10:10:34 -07001360 // Can only assign blame if the WorkSource contains names.
David Christie82edc9b2013-07-19 11:31:42 -07001361 worksource.add(record.mReceiver.mWorkSource);
1362 } else {
1363 // Assign blame to caller.
1364 worksource.add(
1365 record.mReceiver.mUid,
1366 record.mReceiver.mPackageName);
1367 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001368 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001369 }
Dianne Hackborn7e9f4eb2010-09-10 18:43:00 -07001370 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001371 }
1372 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001373
1374 if (D) Log.d(TAG, "provider request: " + provider + " " + providerRequest);
1375 p.setRequest(providerRequest, worksource);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001376 }
1377
1378 private class UpdateRecord {
1379 final String mProvider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001380 final LocationRequest mRequest;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001381 final Receiver mReceiver;
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001382 Location mLastFixBroadcast;
1383 long mLastStatusBroadcast;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001384
1385 /**
1386 * Note: must be constructed with lock held.
1387 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001388 UpdateRecord(String provider, LocationRequest request, Receiver receiver) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001389 mProvider = provider;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001390 mRequest = request;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001391 mReceiver = receiver;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001392
1393 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
1394 if (records == null) {
1395 records = new ArrayList<UpdateRecord>();
1396 mRecordsByProvider.put(provider, records);
1397 }
1398 if (!records.contains(this)) {
1399 records.add(this);
1400 }
David Christie2ff96af2014-01-30 16:09:37 -08001401
1402 // Update statistics for historical location requests by package/provider
1403 mRequestStatistics.startRequesting(
1404 mReceiver.mPackageName, provider, request.getInterval());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001405 }
1406
1407 /**
David Christie2ff96af2014-01-30 16:09:37 -08001408 * Method to be called when a record will no longer be used.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001409 */
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001410 void disposeLocked(boolean removeReceiver) {
David Christie2ff96af2014-01-30 16:09:37 -08001411 mRequestStatistics.stopRequesting(mReceiver.mPackageName, mProvider);
1412
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001413 // remove from mRecordsByProvider
1414 ArrayList<UpdateRecord> globalRecords = mRecordsByProvider.get(this.mProvider);
1415 if (globalRecords != null) {
1416 globalRecords.remove(this);
1417 }
1418
1419 if (!removeReceiver) return; // the caller will handle the rest
1420
1421 // remove from Receiver#mUpdateRecords
1422 HashMap<String, UpdateRecord> receiverRecords = mReceiver.mUpdateRecords;
1423 if (receiverRecords != null) {
1424 receiverRecords.remove(this.mProvider);
1425
1426 // and also remove the Receiver if it has no more update records
1427 if (removeReceiver && receiverRecords.size() == 0) {
1428 removeUpdatesLocked(mReceiver);
1429 }
Mike Lockwood3a76fd62009-09-01 07:26:56 -04001430 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001431 }
1432
1433 @Override
1434 public String toString() {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001435 StringBuilder s = new StringBuilder();
1436 s.append("UpdateRecord[");
1437 s.append(mProvider);
1438 s.append(' ').append(mReceiver.mPackageName).append('(');
1439 s.append(mReceiver.mUid).append(')');
1440 s.append(' ').append(mRequest);
1441 s.append(']');
1442 return s.toString();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001443 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001444 }
1445
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001446 private Receiver getReceiverLocked(ILocationListener listener, int pid, int uid,
David Christie40e57822013-07-30 11:36:48 -07001447 String packageName, WorkSource workSource, boolean hideFromAppOps) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001448 IBinder binder = listener.asBinder();
1449 Receiver receiver = mReceivers.get(binder);
1450 if (receiver == null) {
David Christie40e57822013-07-30 11:36:48 -07001451 receiver = new Receiver(listener, null, pid, uid, packageName, workSource,
1452 hideFromAppOps);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001453 mReceivers.put(binder, receiver);
1454
1455 try {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001456 receiver.getListener().asBinder().linkToDeath(receiver, 0);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001457 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001458 Slog.e(TAG, "linkToDeath failed:", e);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001459 return null;
1460 }
1461 }
1462 return receiver;
1463 }
1464
David Christie82edc9b2013-07-19 11:31:42 -07001465 private Receiver getReceiverLocked(PendingIntent intent, int pid, int uid, String packageName,
David Christie40e57822013-07-30 11:36:48 -07001466 WorkSource workSource, boolean hideFromAppOps) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001467 Receiver receiver = mReceivers.get(intent);
1468 if (receiver == null) {
David Christie40e57822013-07-30 11:36:48 -07001469 receiver = new Receiver(null, intent, pid, uid, packageName, workSource,
1470 hideFromAppOps);
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001471 mReceivers.put(intent, receiver);
1472 }
1473 return receiver;
1474 }
1475
Victoria Lease37425c32012-10-16 16:08:48 -07001476 /**
1477 * Creates a LocationRequest based upon the supplied LocationRequest that to meets resolution
1478 * and consistency requirements.
1479 *
1480 * @param request the LocationRequest from which to create a sanitized version
Victoria Lease37425c32012-10-16 16:08:48 -07001481 * @return a version of request that meets the given resolution and consistency requirements
1482 * @hide
1483 */
1484 private LocationRequest createSanitizedRequest(LocationRequest request, int resolutionLevel) {
1485 LocationRequest sanitizedRequest = new LocationRequest(request);
1486 if (resolutionLevel < RESOLUTION_LEVEL_FINE) {
1487 switch (sanitizedRequest.getQuality()) {
Victoria Lease09016ab2012-09-16 12:33:15 -07001488 case LocationRequest.ACCURACY_FINE:
Victoria Lease37425c32012-10-16 16:08:48 -07001489 sanitizedRequest.setQuality(LocationRequest.ACCURACY_BLOCK);
Victoria Lease09016ab2012-09-16 12:33:15 -07001490 break;
1491 case LocationRequest.POWER_HIGH:
Victoria Lease37425c32012-10-16 16:08:48 -07001492 sanitizedRequest.setQuality(LocationRequest.POWER_LOW);
Victoria Lease09016ab2012-09-16 12:33:15 -07001493 break;
1494 }
1495 // throttle
Victoria Lease37425c32012-10-16 16:08:48 -07001496 if (sanitizedRequest.getInterval() < LocationFudger.FASTEST_INTERVAL_MS) {
1497 sanitizedRequest.setInterval(LocationFudger.FASTEST_INTERVAL_MS);
Victoria Lease09016ab2012-09-16 12:33:15 -07001498 }
Victoria Lease37425c32012-10-16 16:08:48 -07001499 if (sanitizedRequest.getFastestInterval() < LocationFudger.FASTEST_INTERVAL_MS) {
1500 sanitizedRequest.setFastestInterval(LocationFudger.FASTEST_INTERVAL_MS);
Victoria Lease09016ab2012-09-16 12:33:15 -07001501 }
Nick Pelly74fa7ea2012-08-13 19:36:38 -07001502 }
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001503 // make getFastestInterval() the minimum of interval and fastest interval
Victoria Lease37425c32012-10-16 16:08:48 -07001504 if (sanitizedRequest.getFastestInterval() > sanitizedRequest.getInterval()) {
Nick Pelly4e31c4f2012-08-13 19:35:39 -07001505 request.setFastestInterval(request.getInterval());
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001506 }
Victoria Lease37425c32012-10-16 16:08:48 -07001507 return sanitizedRequest;
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001508 }
1509
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001510 private void checkPackageName(String packageName) {
Nick Pellye0fd6932012-07-11 10:26:13 -07001511 if (packageName == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001512 throw new SecurityException("invalid package name: " + packageName);
Nick Pellye0fd6932012-07-11 10:26:13 -07001513 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001514 int uid = Binder.getCallingUid();
Nick Pellye0fd6932012-07-11 10:26:13 -07001515 String[] packages = mPackageManager.getPackagesForUid(uid);
1516 if (packages == null) {
1517 throw new SecurityException("invalid UID " + uid);
1518 }
1519 for (String pkg : packages) {
1520 if (packageName.equals(pkg)) return;
1521 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001522 throw new SecurityException("invalid package name: " + packageName);
Nick Pellye0fd6932012-07-11 10:26:13 -07001523 }
1524
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001525 private void checkPendingIntent(PendingIntent intent) {
1526 if (intent == null) {
1527 throw new IllegalArgumentException("invalid pending intent: " + intent);
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001528 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001529 }
1530
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001531 private Receiver checkListenerOrIntentLocked(ILocationListener listener, PendingIntent intent,
David Christie40e57822013-07-30 11:36:48 -07001532 int pid, int uid, String packageName, WorkSource workSource, boolean hideFromAppOps) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001533 if (intent == null && listener == null) {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001534 throw new IllegalArgumentException("need either listener or intent");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001535 } else if (intent != null && listener != null) {
1536 throw new IllegalArgumentException("cannot register both listener and intent");
1537 } else if (intent != null) {
1538 checkPendingIntent(intent);
David Christie40e57822013-07-30 11:36:48 -07001539 return getReceiverLocked(intent, pid, uid, packageName, workSource, hideFromAppOps);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001540 } else {
David Christie40e57822013-07-30 11:36:48 -07001541 return getReceiverLocked(listener, pid, uid, packageName, workSource, hideFromAppOps);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001542 }
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001543 }
1544
Nick Pellye0fd6932012-07-11 10:26:13 -07001545 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001546 public void requestLocationUpdates(LocationRequest request, ILocationListener listener,
1547 PendingIntent intent, String packageName) {
1548 if (request == null) request = DEFAULT_LOCATION_REQUEST;
1549 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001550 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1551 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1552 request.getProvider());
David Christie82edc9b2013-07-19 11:31:42 -07001553 WorkSource workSource = request.getWorkSource();
1554 if (workSource != null && workSource.size() > 0) {
David Christie40e57822013-07-30 11:36:48 -07001555 checkDeviceStatsAllowed();
1556 }
1557 boolean hideFromAppOps = request.getHideFromAppOps();
1558 if (hideFromAppOps) {
1559 checkUpdateAppOpsAllowed();
David Christie82edc9b2013-07-19 11:31:42 -07001560 }
Victoria Lease37425c32012-10-16 16:08:48 -07001561 LocationRequest sanitizedRequest = createSanitizedRequest(request, allowedResolutionLevel);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001562
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001563 final int pid = Binder.getCallingPid();
1564 final int uid = Binder.getCallingUid();
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001565 // providers may use public location API's, need to clear identity
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001566 long identity = Binder.clearCallingIdentity();
1567 try {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001568 // We don't check for MODE_IGNORED here; we will do that when we go to deliver
1569 // a location.
Dianne Hackborn35654b62013-01-14 17:38:02 -08001570 checkLocationAccess(uid, packageName, allowedResolutionLevel);
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001571
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001572 synchronized (mLock) {
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001573 Receiver recevier = checkListenerOrIntentLocked(listener, intent, pid, uid,
David Christie40e57822013-07-30 11:36:48 -07001574 packageName, workSource, hideFromAppOps);
Victoria Lease37425c32012-10-16 16:08:48 -07001575 requestLocationUpdatesLocked(sanitizedRequest, recevier, pid, uid, packageName);
Mike Lockwood2d4d1bf2010-10-18 17:06:26 -04001576 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001577 } finally {
1578 Binder.restoreCallingIdentity(identity);
1579 }
1580 }
1581
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001582 private void requestLocationUpdatesLocked(LocationRequest request, Receiver receiver,
1583 int pid, int uid, String packageName) {
1584 // Figure out the provider. Either its explicitly request (legacy use cases), or
1585 // use the fused provider
1586 if (request == null) request = DEFAULT_LOCATION_REQUEST;
1587 String name = request.getProvider();
Victoria Lease09016ab2012-09-16 12:33:15 -07001588 if (name == null) {
1589 throw new IllegalArgumentException("provider name must not be null");
1590 }
Zhentao Sunc5fc9982013-04-17 17:47:53 -07001591
1592 if (D) Log.d(TAG, "request " + Integer.toHexString(System.identityHashCode(receiver))
1593 + " " + name + " " + request + " from " + packageName + "(" + uid + ")");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001594 LocationProviderInterface provider = mProvidersByName.get(name);
1595 if (provider == null) {
Victoria Leaseb30f3832013-10-13 12:15:40 -07001596 throw new IllegalArgumentException("provider doesn't exist: " + name);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001597 }
1598
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001599 UpdateRecord record = new UpdateRecord(name, request, receiver);
1600 UpdateRecord oldRecord = receiver.mUpdateRecords.put(name, record);
1601 if (oldRecord != null) {
1602 oldRecord.disposeLocked(false);
1603 }
1604
Victoria Lease09eeaec2013-02-05 11:34:13 -08001605 boolean isProviderEnabled = isAllowedByUserSettingsLocked(name, uid);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001606 if (isProviderEnabled) {
1607 applyRequirementsLocked(name);
1608 } else {
1609 // Notify the listener that updates are currently disabled
1610 receiver.callProviderEnabledLocked(name, false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001611 }
David Christie0b837452013-07-29 16:02:13 -07001612 // Update the monitoring here just in case multiple location requests were added to the
1613 // same receiver (this request may be high power and the initial might not have been).
1614 receiver.updateMonitoring(true);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001615 }
1616
Nick Pellye0fd6932012-07-11 10:26:13 -07001617 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001618 public void removeUpdates(ILocationListener listener, PendingIntent intent,
1619 String packageName) {
1620 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001621
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001622 final int pid = Binder.getCallingPid();
1623 final int uid = Binder.getCallingUid();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001624
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001625 synchronized (mLock) {
David Christie82edc9b2013-07-19 11:31:42 -07001626 WorkSource workSource = null;
David Christie40e57822013-07-30 11:36:48 -07001627 boolean hideFromAppOps = false;
1628 Receiver receiver = checkListenerOrIntentLocked(listener, intent, pid, uid,
1629 packageName, workSource, hideFromAppOps);
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001630
1631 // providers may use public location API's, need to clear identity
1632 long identity = Binder.clearCallingIdentity();
1633 try {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001634 removeUpdatesLocked(receiver);
Dianne Hackbornf5fdca92013-06-05 14:53:33 -07001635 } finally {
1636 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001637 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001638 }
1639 }
1640
1641 private void removeUpdatesLocked(Receiver receiver) {
Dianne Hackborn7ff30112012-11-08 11:12:09 -08001642 if (D) Log.i(TAG, "remove " + Integer.toHexString(System.identityHashCode(receiver)));
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001643
1644 if (mReceivers.remove(receiver.mKey) != null && receiver.isListener()) {
1645 receiver.getListener().asBinder().unlinkToDeath(receiver, 0);
1646 synchronized (receiver) {
Victoria Lease0aa28602013-05-29 15:28:26 -07001647 receiver.clearPendingBroadcastsLocked();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001648 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001649 }
1650
Dianne Hackborn1304f4a2013-07-09 18:17:27 -07001651 receiver.updateMonitoring(false);
1652
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001653 // Record which providers were associated with this listener
1654 HashSet<String> providers = new HashSet<String>();
1655 HashMap<String, UpdateRecord> oldRecords = receiver.mUpdateRecords;
1656 if (oldRecords != null) {
1657 // Call dispose() on the obsolete update records.
1658 for (UpdateRecord record : oldRecords.values()) {
David Christie2ff96af2014-01-30 16:09:37 -08001659 // Update statistics for historical location requests by package/provider
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001660 record.disposeLocked(false);
1661 }
1662 // Accumulate providers
1663 providers.addAll(oldRecords.keySet());
1664 }
1665
1666 // update provider
1667 for (String provider : providers) {
1668 // If provider is already disabled, don't need to do anything
Victoria Lease09eeaec2013-02-05 11:34:13 -08001669 if (!isAllowedByCurrentUserSettingsLocked(provider)) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001670 continue;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001671 }
1672
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001673 applyRequirementsLocked(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001674 }
1675 }
1676
Dianne Hackbornc2293022013-02-06 23:14:49 -08001677 private void applyAllProviderRequirementsLocked() {
1678 for (LocationProviderInterface p : mProviders) {
1679 // If provider is already disabled, don't need to do anything
Dianne Hackborn64d41d72013-02-07 00:33:31 -08001680 if (!isAllowedByCurrentUserSettingsLocked(p.getName())) {
Dianne Hackbornc2293022013-02-06 23:14:49 -08001681 continue;
1682 }
1683
1684 applyRequirementsLocked(p.getName());
1685 }
1686 }
1687
Nick Pellye0fd6932012-07-11 10:26:13 -07001688 @Override
Nick Pelly4035f5a2012-08-17 14:43:49 -07001689 public Location getLastLocation(LocationRequest request, String packageName) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001690 if (D) Log.d(TAG, "getLastLocation: " + request);
1691 if (request == null) request = DEFAULT_LOCATION_REQUEST;
Victoria Lease37425c32012-10-16 16:08:48 -07001692 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
Nick Pelly4035f5a2012-08-17 14:43:49 -07001693 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001694 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1695 request.getProvider());
1696 // no need to sanitize this request, as only the provider name is used
Nick Pelly4035f5a2012-08-17 14:43:49 -07001697
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001698 final int uid = Binder.getCallingUid();
1699 final long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001700 try {
1701 if (mBlacklist.isBlacklisted(packageName)) {
1702 if (D) Log.d(TAG, "not returning last loc for blacklisted app: " +
1703 packageName);
Victoria Lease09016ab2012-09-16 12:33:15 -07001704 return null;
1705 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001706
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001707 if (!reportLocationAccessNoThrow(uid, packageName, allowedResolutionLevel)) {
1708 if (D) Log.d(TAG, "not returning last loc for no op app: " +
1709 packageName);
1710 return null;
1711 }
1712
Victoria Leaseb711d572012-10-02 13:14:11 -07001713 synchronized (mLock) {
1714 // Figure out the provider. Either its explicitly request (deprecated API's),
1715 // or use the fused provider
1716 String name = request.getProvider();
1717 if (name == null) name = LocationManager.FUSED_PROVIDER;
1718 LocationProviderInterface provider = mProvidersByName.get(name);
1719 if (provider == null) return null;
1720
Victoria Lease09eeaec2013-02-05 11:34:13 -08001721 if (!isAllowedByUserSettingsLocked(name, uid)) return null;
Victoria Leaseb711d572012-10-02 13:14:11 -07001722
David Christie1b9b7b12013-04-15 15:31:11 -07001723 Location location;
1724 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
1725 // Make sure that an app with coarse permissions can't get frequent location
1726 // updates by calling LocationManager.getLastKnownLocation repeatedly.
1727 location = mLastLocationCoarseInterval.get(name);
1728 } else {
1729 location = mLastLocation.get(name);
1730 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001731 if (location == null) {
1732 return null;
1733 }
Victoria Lease37425c32012-10-16 16:08:48 -07001734 if (allowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
Victoria Leaseb711d572012-10-02 13:14:11 -07001735 Location noGPSLocation = location.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
1736 if (noGPSLocation != null) {
Dianne Hackborn6c5406a2012-11-29 16:18:01 -08001737 return new Location(mLocationFudger.getOrCreate(noGPSLocation));
Victoria Leaseb711d572012-10-02 13:14:11 -07001738 }
Victoria Lease37425c32012-10-16 16:08:48 -07001739 } else {
Dianne Hackborn6c5406a2012-11-29 16:18:01 -08001740 return new Location(location);
Victoria Lease09016ab2012-09-16 12:33:15 -07001741 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001742 }
Victoria Leaseb711d572012-10-02 13:14:11 -07001743 return null;
1744 } finally {
1745 Binder.restoreCallingIdentity(identity);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001746 }
1747 }
1748
1749 @Override
1750 public void requestGeofence(LocationRequest request, Geofence geofence, PendingIntent intent,
1751 String packageName) {
1752 if (request == null) request = DEFAULT_LOCATION_REQUEST;
Victoria Lease37425c32012-10-16 16:08:48 -07001753 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1754 checkResolutionLevelIsSufficientForGeofenceUse(allowedResolutionLevel);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001755 checkPendingIntent(intent);
1756 checkPackageName(packageName);
Victoria Lease37425c32012-10-16 16:08:48 -07001757 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
1758 request.getProvider());
1759 LocationRequest sanitizedRequest = createSanitizedRequest(request, allowedResolutionLevel);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001760
Victoria Lease37425c32012-10-16 16:08:48 -07001761 if (D) Log.d(TAG, "requestGeofence: " + sanitizedRequest + " " + geofence + " " + intent);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001762
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001763 // geo-fence manager uses the public location API, need to clear identity
1764 int uid = Binder.getCallingUid();
Victoria Lease56e675b2012-11-05 19:25:06 -08001765 if (UserHandle.getUserId(uid) != UserHandle.USER_OWNER) {
1766 // temporary measure until geofences work for secondary users
1767 Log.w(TAG, "proximity alerts are currently available only to the primary user");
1768 return;
1769 }
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001770 long identity = Binder.clearCallingIdentity();
1771 try {
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08001772 mGeofenceManager.addFence(sanitizedRequest, geofence, intent, allowedResolutionLevel,
1773 uid, packageName);
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001774 } finally {
1775 Binder.restoreCallingIdentity(identity);
1776 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001777 }
1778
1779 @Override
1780 public void removeGeofence(Geofence geofence, PendingIntent intent, String packageName) {
Victoria Lease37425c32012-10-16 16:08:48 -07001781 checkResolutionLevelIsSufficientForGeofenceUse(getCallerAllowedResolutionLevel());
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001782 checkPendingIntent(intent);
1783 checkPackageName(packageName);
1784
1785 if (D) Log.d(TAG, "removeGeofence: " + geofence + " " + intent);
1786
Nick Pelly2b7a0d02012-08-17 15:09:44 -07001787 // geo-fence manager uses the public location API, need to clear identity
1788 long identity = Binder.clearCallingIdentity();
1789 try {
1790 mGeofenceManager.removeFence(geofence, intent);
1791 } finally {
1792 Binder.restoreCallingIdentity(identity);
1793 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001794 }
1795
1796
1797 @Override
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001798 public boolean addGpsStatusListener(IGpsStatusListener listener, String packageName) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001799 if (mGpsStatusProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001800 return false;
1801 }
Dianne Hackborn35654b62013-01-14 17:38:02 -08001802 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1803 checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
Victoria Lease37425c32012-10-16 16:08:48 -07001804 LocationManager.GPS_PROVIDER);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001805
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001806 final int uid = Binder.getCallingUid();
1807 final long ident = Binder.clearCallingIdentity();
1808 try {
Victoria Lease3d5173d2013-02-05 16:07:32 -08001809 if (!checkLocationAccess(uid, packageName, allowedResolutionLevel)) {
Dianne Hackborna06de0f2012-12-11 16:34:47 -08001810 return false;
1811 }
1812 } finally {
1813 Binder.restoreCallingIdentity(ident);
1814 }
1815
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001816 try {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001817 mGpsStatusProvider.addGpsStatusListener(listener);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001818 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001819 Slog.e(TAG, "mGpsStatusProvider.addGpsStatusListener failed", e);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001820 return false;
1821 }
1822 return true;
1823 }
1824
Nick Pellye0fd6932012-07-11 10:26:13 -07001825 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001826 public void removeGpsStatusListener(IGpsStatusListener listener) {
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001827 synchronized (mLock) {
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001828 try {
1829 mGpsStatusProvider.removeGpsStatusListener(listener);
1830 } catch (Exception e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001831 Slog.e(TAG, "mGpsStatusProvider.removeGpsStatusListener failed", e);
Mike Lockwood15e3d0f2009-05-01 07:53:28 -04001832 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001833 }
1834 }
1835
Nick Pellye0fd6932012-07-11 10:26:13 -07001836 @Override
destradaaea8a8a62014-06-23 18:19:03 -07001837 public boolean addGpsMeasurementsListener(
1838 IGpsMeasurementsListener listener,
1839 String packageName) {
1840 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1841 checkResolutionLevelIsSufficientForProviderUse(
1842 allowedResolutionLevel,
1843 LocationManager.GPS_PROVIDER);
1844
1845 int uid = Binder.getCallingUid();
1846 long identity = Binder.clearCallingIdentity();
1847 boolean hasLocationAccess;
1848 try {
1849 hasLocationAccess = checkLocationAccess(uid, packageName, allowedResolutionLevel);
1850 } finally {
1851 Binder.restoreCallingIdentity(identity);
1852 }
1853
1854 if (!hasLocationAccess) {
1855 return false;
1856 }
destradaaea8a8a62014-06-23 18:19:03 -07001857 return mGpsMeasurementsProvider.addListener(listener);
1858 }
1859
1860 @Override
1861 public boolean removeGpsMeasurementsListener(IGpsMeasurementsListener listener) {
1862 return mGpsMeasurementsProvider.removeListener(listener);
1863 }
1864
1865 @Override
destradaa4b3e3932014-07-21 18:01:47 -07001866 public boolean addGpsNavigationMessageListener(
1867 IGpsNavigationMessageListener listener,
1868 String packageName) {
1869 int allowedResolutionLevel = getCallerAllowedResolutionLevel();
1870 checkResolutionLevelIsSufficientForProviderUse(
1871 allowedResolutionLevel,
1872 LocationManager.GPS_PROVIDER);
1873
1874 int uid = Binder.getCallingUid();
1875 long identity = Binder.clearCallingIdentity();
1876 boolean hasLocationAccess;
1877 try {
1878 hasLocationAccess = checkLocationAccess(uid, packageName, allowedResolutionLevel);
1879 } finally {
1880 Binder.restoreCallingIdentity(identity);
1881 }
1882
1883 if (!hasLocationAccess) {
1884 return false;
1885 }
1886 return mGpsNavigationMessageProvider.addListener(listener);
1887 }
1888
1889 @Override
1890 public boolean removeGpsNavigationMessageListener(IGpsNavigationMessageListener listener) {
1891 return mGpsNavigationMessageProvider.removeListener(listener);
1892 }
1893
1894 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001895 public boolean sendExtraCommand(String provider, String command, Bundle extras) {
Mike Lockwoodc6cc8362009-08-17 13:16:08 -04001896 if (provider == null) {
1897 // throw NullPointerException to remain compatible with previous implementation
1898 throw new NullPointerException();
1899 }
Victoria Lease37425c32012-10-16 16:08:48 -07001900 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1901 provider);
Mike Lockwoodc6cc8362009-08-17 13:16:08 -04001902
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001903 // and check for ACCESS_LOCATION_EXTRA_COMMANDS
Mike Lockwoodb7e99222009-07-07 13:18:21 -04001904 if ((mContext.checkCallingOrSelfPermission(ACCESS_LOCATION_EXTRA_COMMANDS)
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001905 != PackageManager.PERMISSION_GRANTED)) {
1906 throw new SecurityException("Requires ACCESS_LOCATION_EXTRA_COMMANDS permission");
1907 }
1908
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04001909 synchronized (mLock) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001910 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001911 if (p == null) return false;
Nick Pellye0fd6932012-07-11 10:26:13 -07001912
Mike Lockwoodd03ff942010-02-09 08:46:14 -05001913 return p.sendExtraCommand(command, extras);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001914 }
1915 }
1916
Nick Pellye0fd6932012-07-11 10:26:13 -07001917 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001918 public boolean sendNiResponse(int notifId, int userResponse) {
Mike Lockwood18ad9f62009-08-27 14:01:23 -07001919 if (Binder.getCallingUid() != Process.myUid()) {
1920 throw new SecurityException(
1921 "calling sendNiResponse from outside of the system is not allowed");
1922 }
Danke Xie22d1f9f2009-08-18 18:28:45 -04001923 try {
1924 return mNetInitiatedListener.sendNiResponse(notifId, userResponse);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001925 } catch (RemoteException e) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08001926 Slog.e(TAG, "RemoteException in LocationManagerService.sendNiResponse");
Danke Xie22d1f9f2009-08-18 18:28:45 -04001927 return false;
1928 }
1929 }
1930
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001931 /**
Mike Lockwood628fd6d2010-01-25 22:46:13 -05001932 * @return null if the provider does not exist
Alexey Tarasovf2db9fb2009-09-01 02:37:07 +11001933 * @throws SecurityException if the provider is not allowed to be
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001934 * accessed by the caller
1935 */
Nick Pellye0fd6932012-07-11 10:26:13 -07001936 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001937 public ProviderProperties getProviderProperties(String provider) {
Laurent Tub7f9d252012-10-16 14:25:00 -07001938 if (mProvidersByName.get(provider) == null) {
David Christie2ff96af2014-01-30 16:09:37 -08001939 return null;
Laurent Tub7f9d252012-10-16 14:25:00 -07001940 }
1941
Victoria Lease37425c32012-10-16 16:08:48 -07001942 checkResolutionLevelIsSufficientForProviderUse(getCallerAllowedResolutionLevel(),
1943 provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001944
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001945 LocationProviderInterface p;
1946 synchronized (mLock) {
1947 p = mProvidersByName.get(provider);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001948 }
1949
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001950 if (p == null) return null;
1951 return p.getProperties();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001952 }
1953
Nick Pellye0fd6932012-07-11 10:26:13 -07001954 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001955 public boolean isProviderEnabled(String provider) {
Tom O'Neilld5759432013-09-11 11:03:03 -07001956 // Fused provider is accessed indirectly via criteria rather than the provider-based APIs,
1957 // so we discourage its use
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001958 if (LocationManager.FUSED_PROVIDER.equals(provider)) return false;
1959
Victoria Lease09eeaec2013-02-05 11:34:13 -08001960 int uid = Binder.getCallingUid();
Victoria Lease269518e2012-10-29 08:25:39 -07001961 long identity = Binder.clearCallingIdentity();
Victoria Leaseb711d572012-10-02 13:14:11 -07001962 try {
1963 synchronized (mLock) {
1964 LocationProviderInterface p = mProvidersByName.get(provider);
1965 if (p == null) return false;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001966
Victoria Lease09eeaec2013-02-05 11:34:13 -08001967 return isAllowedByUserSettingsLocked(provider, uid);
Victoria Leaseb711d572012-10-02 13:14:11 -07001968 }
1969 } finally {
1970 Binder.restoreCallingIdentity(identity);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001971 }
1972 }
1973
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001974 /**
1975 * Returns "true" if the UID belongs to a bound location provider.
1976 *
1977 * @param uid the uid
1978 * @return true if uid belongs to a bound location provider
1979 */
1980 private boolean isUidALocationProvider(int uid) {
1981 if (uid == Process.SYSTEM_UID) {
1982 return true;
1983 }
1984 if (mGeocodeProvider != null) {
David Christie1f141c12014-05-14 15:11:15 -07001985 if (doesUidHavePackage(uid, mGeocodeProvider.getConnectedPackageName())) return true;
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001986 }
1987 for (LocationProviderProxy proxy : mProxyProviders) {
David Christie1f141c12014-05-14 15:11:15 -07001988 if (doesUidHavePackage(uid, proxy.getConnectedPackageName())) return true;
Victoria Lease03cdd3d2013-02-01 15:15:54 -08001989 }
1990 return false;
1991 }
1992
Nick Pelly6fa9ad42012-07-16 12:18:23 -07001993 private void checkCallerIsProvider() {
1994 if (mContext.checkCallingOrSelfPermission(INSTALL_LOCATION_PROVIDER)
1995 == PackageManager.PERMISSION_GRANTED) {
1996 return;
1997 }
1998
1999 // Previously we only used the INSTALL_LOCATION_PROVIDER
2000 // check. But that is system or signature
2001 // protection level which is not flexible enough for
2002 // providers installed oustide the system image. So
2003 // also allow providers with a UID matching the
2004 // currently bound package name
2005
Victoria Lease03cdd3d2013-02-01 15:15:54 -08002006 if (isUidALocationProvider(Binder.getCallingUid())) {
2007 return;
2008 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002009
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002010 throw new SecurityException("need INSTALL_LOCATION_PROVIDER permission, " +
2011 "or UID of a currently bound location provider");
2012 }
2013
David Christie1f141c12014-05-14 15:11:15 -07002014 /**
2015 * Returns true if the given package belongs to the given uid.
2016 */
2017 private boolean doesUidHavePackage(int uid, String packageName) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002018 if (packageName == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002019 return false;
2020 }
David Christie1f141c12014-05-14 15:11:15 -07002021 String[] packageNames = mPackageManager.getPackagesForUid(uid);
2022 if (packageNames == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002023 return false;
2024 }
David Christie1f141c12014-05-14 15:11:15 -07002025 for (String name : packageNames) {
2026 if (packageName.equals(name)) {
2027 return true;
2028 }
2029 }
2030 return false;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002031 }
2032
Nick Pellye0fd6932012-07-11 10:26:13 -07002033 @Override
Mike Lockwooda4903f22010-02-17 06:42:23 -05002034 public void reportLocation(Location location, boolean passive) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002035 checkCallerIsProvider();
Mike Lockwood275555c2009-05-01 11:30:34 -04002036
Nick Pelly2eeeec22012-07-18 13:13:37 -07002037 if (!location.isComplete()) {
2038 Log.w(TAG, "Dropping incomplete location: " + location);
2039 return;
2040 }
2041
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002042 mLocationHandler.removeMessages(MSG_LOCATION_CHANGED, location);
2043 Message m = Message.obtain(mLocationHandler, MSG_LOCATION_CHANGED, location);
Mike Lockwooda4903f22010-02-17 06:42:23 -05002044 m.arg1 = (passive ? 1 : 0);
Mike Lockwood4e50b782009-04-03 08:24:43 -07002045 mLocationHandler.sendMessageAtFrontOfQueue(m);
2046 }
2047
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002048
Laurent Tu75defb62012-11-01 16:21:52 -07002049 private static boolean shouldBroadcastSafe(
2050 Location loc, Location lastLoc, UpdateRecord record, long now) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002051 // Always broadcast the first update
2052 if (lastLoc == null) {
2053 return true;
2054 }
2055
Nick Pellyf1be6862012-05-15 10:53:42 -07002056 // Check whether sufficient time has passed
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002057 long minTime = record.mRequest.getFastestInterval();
David Christie1b9b7b12013-04-15 15:31:11 -07002058 long delta = (loc.getElapsedRealtimeNanos() - lastLoc.getElapsedRealtimeNanos())
2059 / NANOS_PER_MILLI;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002060 if (delta < minTime - MAX_PROVIDER_SCHEDULING_JITTER_MS) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002061 return false;
2062 }
2063
2064 // Check whether sufficient distance has been traveled
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002065 double minDistance = record.mRequest.getSmallestDisplacement();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002066 if (minDistance > 0.0) {
2067 if (loc.distanceTo(lastLoc) <= minDistance) {
2068 return false;
2069 }
2070 }
2071
Laurent Tu75defb62012-11-01 16:21:52 -07002072 // Check whether sufficient number of udpates is left
2073 if (record.mRequest.getNumUpdates() <= 0) {
2074 return false;
2075 }
2076
2077 // Check whether the expiry date has passed
2078 if (record.mRequest.getExpireAt() < now) {
2079 return false;
2080 }
2081
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002082 return true;
2083 }
2084
Mike Lockwooda4903f22010-02-17 06:42:23 -05002085 private void handleLocationChangedLocked(Location location, boolean passive) {
Nick Pelly4e31c4f2012-08-13 19:35:39 -07002086 if (D) Log.d(TAG, "incoming location: " + location);
2087
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002088 long now = SystemClock.elapsedRealtime();
Mike Lockwooda4903f22010-02-17 06:42:23 -05002089 String provider = (passive ? LocationManager.PASSIVE_PROVIDER : location.getProvider());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002090
Laurent Tu60ec50a2012-10-04 17:00:10 -07002091 // Skip if the provider is unknown.
Mike Lockwoodd03ff942010-02-09 08:46:14 -05002092 LocationProviderInterface p = mProvidersByName.get(provider);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002093 if (p == null) return;
2094
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002095 // Update last known locations
Victoria Lease09016ab2012-09-16 12:33:15 -07002096 Location noGPSLocation = location.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
2097 Location lastNoGPSLocation = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002098 Location lastLocation = mLastLocation.get(provider);
Mike Lockwood4e50b782009-04-03 08:24:43 -07002099 if (lastLocation == null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002100 lastLocation = new Location(provider);
2101 mLastLocation.put(provider, lastLocation);
Victoria Lease09016ab2012-09-16 12:33:15 -07002102 } else {
2103 lastNoGPSLocation = lastLocation.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
2104 if (noGPSLocation == null && lastNoGPSLocation != null) {
2105 // New location has no no-GPS location: adopt last no-GPS location. This is set
2106 // directly into location because we do not want to notify COARSE clients.
2107 location.setExtraLocation(Location.EXTRA_NO_GPS_LOCATION, lastNoGPSLocation);
2108 }
Mike Lockwood4e50b782009-04-03 08:24:43 -07002109 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002110 lastLocation.set(location);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002111
David Christie1b9b7b12013-04-15 15:31:11 -07002112 // Update last known coarse interval location if enough time has passed.
2113 Location lastLocationCoarseInterval = mLastLocationCoarseInterval.get(provider);
2114 if (lastLocationCoarseInterval == null) {
2115 lastLocationCoarseInterval = new Location(location);
2116 mLastLocationCoarseInterval.put(provider, lastLocationCoarseInterval);
2117 }
2118 long timeDiffNanos = location.getElapsedRealtimeNanos()
2119 - lastLocationCoarseInterval.getElapsedRealtimeNanos();
2120 if (timeDiffNanos > LocationFudger.FASTEST_INTERVAL_MS * NANOS_PER_MILLI) {
2121 lastLocationCoarseInterval.set(location);
2122 }
2123 // Don't ever return a coarse location that is more recent than the allowed update
2124 // interval (i.e. don't allow an app to keep registering and unregistering for
2125 // location updates to overcome the minimum interval).
2126 noGPSLocation =
2127 lastLocationCoarseInterval.getExtraLocation(Location.EXTRA_NO_GPS_LOCATION);
2128
Laurent Tu60ec50a2012-10-04 17:00:10 -07002129 // Skip if there are no UpdateRecords for this provider.
2130 ArrayList<UpdateRecord> records = mRecordsByProvider.get(provider);
2131 if (records == null || records.size() == 0) return;
2132
Victoria Lease09016ab2012-09-16 12:33:15 -07002133 // Fetch coarse location
2134 Location coarseLocation = null;
David Christie1b9b7b12013-04-15 15:31:11 -07002135 if (noGPSLocation != null) {
Victoria Lease09016ab2012-09-16 12:33:15 -07002136 coarseLocation = mLocationFudger.getOrCreate(noGPSLocation);
2137 }
2138
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002139 // Fetch latest status update time
2140 long newStatusUpdateTime = p.getStatusUpdateTime();
2141
David Christie2ff96af2014-01-30 16:09:37 -08002142 // Get latest status
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002143 Bundle extras = new Bundle();
2144 int status = p.getStatus(extras);
2145
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002146 ArrayList<Receiver> deadReceivers = null;
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002147 ArrayList<UpdateRecord> deadUpdateRecords = null;
Nick Pellye0fd6932012-07-11 10:26:13 -07002148
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002149 // Broadcast location or status to all listeners
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002150 for (UpdateRecord r : records) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002151 Receiver receiver = r.mReceiver;
Mike Lockwood03ca2162010-04-01 08:10:09 -07002152 boolean receiverDead = false;
Nick Pelly4035f5a2012-08-17 14:43:49 -07002153
Victoria Lease269518e2012-10-29 08:25:39 -07002154 int receiverUserId = UserHandle.getUserId(receiver.mUid);
Amith Yamasanib27528d2014-06-05 15:02:10 -07002155 if (!isCurrentProfile(receiverUserId) && !isUidALocationProvider(receiver.mUid)) {
Victoria Leaseb711d572012-10-02 13:14:11 -07002156 if (D) {
Victoria Lease269518e2012-10-29 08:25:39 -07002157 Log.d(TAG, "skipping loc update for background user " + receiverUserId +
Victoria Leaseb711d572012-10-02 13:14:11 -07002158 " (current user: " + mCurrentUserId + ", app: " +
2159 receiver.mPackageName + ")");
2160 }
2161 continue;
2162 }
2163
Nick Pelly4035f5a2012-08-17 14:43:49 -07002164 if (mBlacklist.isBlacklisted(receiver.mPackageName)) {
2165 if (D) Log.d(TAG, "skipping loc update for blacklisted app: " +
2166 receiver.mPackageName);
2167 continue;
2168 }
2169
Dianne Hackborn5e45ee62013-01-24 19:13:44 -08002170 if (!reportLocationAccessNoThrow(receiver.mUid, receiver.mPackageName,
2171 receiver.mAllowedResolutionLevel)) {
2172 if (D) Log.d(TAG, "skipping loc update for no op app: " +
2173 receiver.mPackageName);
2174 continue;
2175 }
2176
Victoria Lease09016ab2012-09-16 12:33:15 -07002177 Location notifyLocation = null;
Victoria Lease37425c32012-10-16 16:08:48 -07002178 if (receiver.mAllowedResolutionLevel < RESOLUTION_LEVEL_FINE) {
2179 notifyLocation = coarseLocation; // use coarse location
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002180 } else {
Victoria Lease37425c32012-10-16 16:08:48 -07002181 notifyLocation = lastLocation; // use fine location
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002182 }
Victoria Lease09016ab2012-09-16 12:33:15 -07002183 if (notifyLocation != null) {
2184 Location lastLoc = r.mLastFixBroadcast;
Laurent Tu75defb62012-11-01 16:21:52 -07002185 if ((lastLoc == null) || shouldBroadcastSafe(notifyLocation, lastLoc, r, now)) {
Victoria Lease09016ab2012-09-16 12:33:15 -07002186 if (lastLoc == null) {
2187 lastLoc = new Location(notifyLocation);
2188 r.mLastFixBroadcast = lastLoc;
2189 } else {
2190 lastLoc.set(notifyLocation);
2191 }
2192 if (!receiver.callLocationChangedLocked(notifyLocation)) {
2193 Slog.w(TAG, "RemoteException calling onLocationChanged on " + receiver);
2194 receiverDead = true;
2195 }
Laurent Tu75defb62012-11-01 16:21:52 -07002196 r.mRequest.decrementNumUpdates();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002197 }
2198 }
2199
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002200 long prevStatusUpdateTime = r.mLastStatusBroadcast;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002201 if ((newStatusUpdateTime > prevStatusUpdateTime) &&
Victoria Lease09016ab2012-09-16 12:33:15 -07002202 (prevStatusUpdateTime != 0 || status != LocationProvider.AVAILABLE)) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002203
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002204 r.mLastStatusBroadcast = newStatusUpdateTime;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002205 if (!receiver.callStatusChangedLocked(provider, status, extras)) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07002206 receiverDead = true;
Joe Onorato8a9b2202010-02-26 18:56:32 -08002207 Slog.w(TAG, "RemoteException calling onStatusChanged on " + receiver);
Mike Lockwood03ca2162010-04-01 08:10:09 -07002208 }
2209 }
2210
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002211 // track expired records
Laurent Tu75defb62012-11-01 16:21:52 -07002212 if (r.mRequest.getNumUpdates() <= 0 || r.mRequest.getExpireAt() < now) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002213 if (deadUpdateRecords == null) {
2214 deadUpdateRecords = new ArrayList<UpdateRecord>();
2215 }
2216 deadUpdateRecords.add(r);
2217 }
2218 // track dead receivers
2219 if (receiverDead) {
Mike Lockwood03ca2162010-04-01 08:10:09 -07002220 if (deadReceivers == null) {
2221 deadReceivers = new ArrayList<Receiver>();
2222 }
2223 if (!deadReceivers.contains(receiver)) {
2224 deadReceivers.add(receiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002225 }
2226 }
2227 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002228
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002229 // remove dead records and receivers outside the loop
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002230 if (deadReceivers != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002231 for (Receiver receiver : deadReceivers) {
2232 removeUpdatesLocked(receiver);
2233 }
2234 }
2235 if (deadUpdateRecords != null) {
2236 for (UpdateRecord r : deadUpdateRecords) {
2237 r.disposeLocked(true);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002238 }
Victoria Lease8b38b292012-12-04 15:04:43 -08002239 applyRequirementsLocked(provider);
2240 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002241 }
2242
2243 private class LocationWorkerHandler extends Handler {
Victoria Lease5cd731a2012-12-19 15:04:21 -08002244 public LocationWorkerHandler(Looper looper) {
2245 super(looper, null, true);
2246 }
2247
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002248 @Override
2249 public void handleMessage(Message msg) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002250 switch (msg.what) {
2251 case MSG_LOCATION_CHANGED:
2252 handleLocationChanged((Location) msg.obj, msg.arg1 == 1);
2253 break;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002254 }
2255 }
2256 }
2257
Victoria Lease54ca7ae2013-01-08 09:39:50 -08002258 private boolean isMockProvider(String provider) {
2259 synchronized (mLock) {
2260 return mMockProviders.containsKey(provider);
2261 }
2262 }
2263
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002264 private void handleLocationChanged(Location location, boolean passive) {
Victoria Lease54ca7ae2013-01-08 09:39:50 -08002265 // create a working copy of the incoming Location so that the service can modify it without
2266 // disturbing the caller's copy
2267 Location myLocation = new Location(location);
2268 String provider = myLocation.getProvider();
2269
2270 // set "isFromMockProvider" bit if location came from a mock provider. we do not clear this
2271 // bit if location did not come from a mock provider because passive/fused providers can
2272 // forward locations from mock providers, and should not grant them legitimacy in doing so.
2273 if (!myLocation.isFromMockProvider() && isMockProvider(provider)) {
2274 myLocation.setIsFromMockProvider(true);
2275 }
Jeff Sharkey5e613312012-01-30 11:16:20 -08002276
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002277 synchronized (mLock) {
Victoria Lease09eeaec2013-02-05 11:34:13 -08002278 if (isAllowedByCurrentUserSettingsLocked(provider)) {
2279 if (!passive) {
2280 // notify passive provider of the new location
2281 mPassiveProvider.updateLocation(myLocation);
2282 }
Victoria Lease54ca7ae2013-01-08 09:39:50 -08002283 handleLocationChangedLocked(myLocation, passive);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002284 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002285 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002286 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002287
Mike Lockwoode97ae402010-09-29 15:23:46 -04002288 private final PackageMonitor mPackageMonitor = new PackageMonitor() {
2289 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002290 public void onPackageDisappeared(String packageName, int reason) {
2291 // remove all receivers associated with this package name
2292 synchronized (mLock) {
2293 ArrayList<Receiver> deadReceivers = null;
2294
2295 for (Receiver receiver : mReceivers.values()) {
2296 if (receiver.mPackageName.equals(packageName)) {
2297 if (deadReceivers == null) {
2298 deadReceivers = new ArrayList<Receiver>();
2299 }
2300 deadReceivers.add(receiver);
2301 }
2302 }
2303
2304 // perform removal outside of mReceivers loop
2305 if (deadReceivers != null) {
2306 for (Receiver receiver : deadReceivers) {
2307 removeUpdatesLocked(receiver);
2308 }
2309 }
2310 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002311 }
Mike Lockwoode97ae402010-09-29 15:23:46 -04002312 };
2313
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002314 // Geocoder
2315
Nick Pellye0fd6932012-07-11 10:26:13 -07002316 @Override
Mike Lockwoode15735a2010-09-20 17:48:47 -04002317 public boolean geocoderIsPresent() {
Mark Vandevoorde01ac80b2010-05-21 15:43:26 -07002318 return mGeocodeProvider != null;
2319 }
2320
Nick Pellye0fd6932012-07-11 10:26:13 -07002321 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002322 public String getFromLocation(double latitude, double longitude, int maxResults,
Mike Lockwood34901402010-01-04 12:14:21 -05002323 GeocoderParams params, List<Address> addrs) {
Mike Lockwooda55c3212009-04-15 11:10:11 -04002324 if (mGeocodeProvider != null) {
Mike Lockwood628fd6d2010-01-25 22:46:13 -05002325 return mGeocodeProvider.getFromLocation(latitude, longitude, maxResults,
2326 params, addrs);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002327 }
Mike Lockwooda55c3212009-04-15 11:10:11 -04002328 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002329 }
2330
Mike Lockwooda55c3212009-04-15 11:10:11 -04002331
Nick Pellye0fd6932012-07-11 10:26:13 -07002332 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002333 public String getFromLocationName(String locationName,
Mike Lockwooda55c3212009-04-15 11:10:11 -04002334 double lowerLeftLatitude, double lowerLeftLongitude,
2335 double upperRightLatitude, double upperRightLongitude, int maxResults,
Mike Lockwood34901402010-01-04 12:14:21 -05002336 GeocoderParams params, List<Address> addrs) {
Mike Lockwooda55c3212009-04-15 11:10:11 -04002337
2338 if (mGeocodeProvider != null) {
Mike Lockwood628fd6d2010-01-25 22:46:13 -05002339 return mGeocodeProvider.getFromLocationName(locationName, lowerLeftLatitude,
2340 lowerLeftLongitude, upperRightLatitude, upperRightLongitude,
2341 maxResults, params, addrs);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002342 }
Mike Lockwooda55c3212009-04-15 11:10:11 -04002343 return null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002344 }
2345
2346 // Mock Providers
2347
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002348 private void checkMockPermissionsSafe() {
2349 boolean allowMocks = Settings.Secure.getInt(mContext.getContentResolver(),
2350 Settings.Secure.ALLOW_MOCK_LOCATION, 0) == 1;
2351 if (!allowMocks) {
2352 throw new SecurityException("Requires ACCESS_MOCK_LOCATION secure setting");
2353 }
2354
2355 if (mContext.checkCallingPermission(ACCESS_MOCK_LOCATION) !=
David Christie2ff96af2014-01-30 16:09:37 -08002356 PackageManager.PERMISSION_GRANTED) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002357 throw new SecurityException("Requires ACCESS_MOCK_LOCATION permission");
Nick Pellye0fd6932012-07-11 10:26:13 -07002358 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002359 }
2360
Nick Pellye0fd6932012-07-11 10:26:13 -07002361 @Override
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002362 public void addTestProvider(String name, ProviderProperties properties) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002363 checkMockPermissionsSafe();
2364
Mike Lockwooda4903f22010-02-17 06:42:23 -05002365 if (LocationManager.PASSIVE_PROVIDER.equals(name)) {
2366 throw new IllegalArgumentException("Cannot mock the passive location provider");
2367 }
2368
Mike Lockwood86328a92009-10-23 08:38:25 -04002369 long identity = Binder.clearCallingIdentity();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002370 synchronized (mLock) {
Mike Lockwood7566c1d2009-08-25 10:05:18 -07002371 // remove the real provider if we are replacing GPS or network provider
2372 if (LocationManager.GPS_PROVIDER.equals(name)
Nick Pelly1332b532012-08-21 16:25:47 -07002373 || LocationManager.NETWORK_PROVIDER.equals(name)
2374 || LocationManager.FUSED_PROVIDER.equals(name)) {
Mike Lockwoodd03ff942010-02-09 08:46:14 -05002375 LocationProviderInterface p = mProvidersByName.get(name);
2376 if (p != null) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002377 removeProviderLocked(p);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07002378 }
2379 }
Ji-Hwan Lee26bdb8f2014-04-21 20:48:19 +09002380 addTestProviderLocked(name, properties);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002381 updateProvidersLocked();
2382 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002383 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002384 }
2385
Ji-Hwan Lee26bdb8f2014-04-21 20:48:19 +09002386 private void addTestProviderLocked(String name, ProviderProperties properties) {
2387 if (mProvidersByName.get(name) != null) {
2388 throw new IllegalArgumentException("Provider \"" + name + "\" already exists");
2389 }
2390 MockProvider provider = new MockProvider(name, this, properties);
2391 addProviderLocked(provider);
2392 mMockProviders.put(name, provider);
2393 mLastLocation.put(name, null);
2394 mLastLocationCoarseInterval.put(name, null);
2395 }
2396
Nick Pellye0fd6932012-07-11 10:26:13 -07002397 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002398 public void removeTestProvider(String provider) {
2399 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002400 synchronized (mLock) {
Tom O'Neill07ee5d12014-03-03 17:48:35 -08002401
2402 // These methods can't be called after removing the test provider, so first make sure
Tom O'Neillfe6d3c52014-03-04 08:26:17 -08002403 // we don't leave anything dangling.
Tom O'Neill07ee5d12014-03-03 17:48:35 -08002404 clearTestProviderEnabled(provider);
2405 clearTestProviderLocation(provider);
2406 clearTestProviderStatus(provider);
2407
You Kima6d0b6f2012-10-28 03:58:44 +09002408 MockProvider mockProvider = mMockProviders.remove(provider);
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002409 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002410 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2411 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002412 long identity = Binder.clearCallingIdentity();
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002413 removeProviderLocked(mProvidersByName.get(provider));
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002414
2415 // reinstate real provider if available
2416 LocationProviderInterface realProvider = mRealProviders.get(provider);
2417 if (realProvider != null) {
2418 addProviderLocked(realProvider);
Mike Lockwood7566c1d2009-08-25 10:05:18 -07002419 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002420 mLastLocation.put(provider, null);
David Christie1b9b7b12013-04-15 15:31:11 -07002421 mLastLocationCoarseInterval.put(provider, null);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002422 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002423 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002424 }
2425 }
2426
Nick Pellye0fd6932012-07-11 10:26:13 -07002427 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002428 public void setTestProviderLocation(String provider, Location loc) {
2429 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002430 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002431 MockProvider mockProvider = mMockProviders.get(provider);
2432 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002433 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2434 }
Mike Lockwood95427cd2009-05-07 13:27:54 -04002435 // clear calling identity so INSTALL_LOCATION_PROVIDER permission is not required
2436 long identity = Binder.clearCallingIdentity();
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002437 mockProvider.setLocation(loc);
Mike Lockwood95427cd2009-05-07 13:27:54 -04002438 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002439 }
2440 }
2441
Nick Pellye0fd6932012-07-11 10:26:13 -07002442 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002443 public void clearTestProviderLocation(String provider) {
2444 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002445 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002446 MockProvider mockProvider = mMockProviders.get(provider);
2447 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002448 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2449 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002450 mockProvider.clearLocation();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002451 }
2452 }
2453
Nick Pellye0fd6932012-07-11 10:26:13 -07002454 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002455 public void setTestProviderEnabled(String provider, boolean enabled) {
2456 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002457 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002458 MockProvider mockProvider = mMockProviders.get(provider);
2459 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002460 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2461 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002462 long identity = Binder.clearCallingIdentity();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002463 if (enabled) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002464 mockProvider.enable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002465 mEnabledProviders.add(provider);
2466 mDisabledProviders.remove(provider);
2467 } else {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002468 mockProvider.disable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002469 mEnabledProviders.remove(provider);
2470 mDisabledProviders.add(provider);
2471 }
2472 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002473 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002474 }
2475 }
2476
Nick Pellye0fd6932012-07-11 10:26:13 -07002477 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002478 public void clearTestProviderEnabled(String provider) {
2479 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002480 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002481 MockProvider mockProvider = mMockProviders.get(provider);
2482 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002483 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2484 }
Mike Lockwood86328a92009-10-23 08:38:25 -04002485 long identity = Binder.clearCallingIdentity();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002486 mEnabledProviders.remove(provider);
2487 mDisabledProviders.remove(provider);
2488 updateProvidersLocked();
Mike Lockwood86328a92009-10-23 08:38:25 -04002489 Binder.restoreCallingIdentity(identity);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002490 }
2491 }
2492
Nick Pellye0fd6932012-07-11 10:26:13 -07002493 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002494 public void setTestProviderStatus(String provider, int status, Bundle extras, long updateTime) {
2495 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002496 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002497 MockProvider mockProvider = mMockProviders.get(provider);
2498 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002499 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2500 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002501 mockProvider.setStatus(status, extras, updateTime);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002502 }
2503 }
2504
Nick Pellye0fd6932012-07-11 10:26:13 -07002505 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002506 public void clearTestProviderStatus(String provider) {
2507 checkMockPermissionsSafe();
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002508 synchronized (mLock) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002509 MockProvider mockProvider = mMockProviders.get(provider);
2510 if (mockProvider == null) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002511 throw new IllegalArgumentException("Provider \"" + provider + "\" unknown");
2512 }
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002513 mockProvider.clearStatus();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002514 }
2515 }
2516
2517 private void log(String log) {
2518 if (Log.isLoggable(TAG, Log.VERBOSE)) {
Joe Onorato8a9b2202010-02-26 18:56:32 -08002519 Slog.d(TAG, log);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002520 }
2521 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002522
2523 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002524 protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) {
2525 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
2526 != PackageManager.PERMISSION_GRANTED) {
Mike Lockwood0528b9b2009-05-07 10:12:54 -04002527 pw.println("Permission Denial: can't dump LocationManagerService from from pid="
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002528 + Binder.getCallingPid()
2529 + ", uid=" + Binder.getCallingUid());
2530 return;
2531 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002532
Mike Lockwood2f82c4e2009-04-17 08:24:10 -04002533 synchronized (mLock) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002534 pw.println("Current Location Manager state:");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002535 pw.println(" Location Listeners:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002536 for (Receiver receiver : mReceivers.values()) {
2537 pw.println(" " + receiver);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002538 }
David Christie2ff96af2014-01-30 16:09:37 -08002539 pw.println(" Active Records by Provider:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002540 for (Map.Entry<String, ArrayList<UpdateRecord>> entry : mRecordsByProvider.entrySet()) {
2541 pw.println(" " + entry.getKey() + ":");
2542 for (UpdateRecord record : entry.getValue()) {
2543 pw.println(" " + record);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002544 }
2545 }
David Christie2ff96af2014-01-30 16:09:37 -08002546 pw.println(" Historical Records by Provider:");
2547 for (Map.Entry<PackageProviderKey, PackageStatistics> entry
2548 : mRequestStatistics.statistics.entrySet()) {
2549 PackageProviderKey key = entry.getKey();
2550 PackageStatistics stats = entry.getValue();
2551 pw.println(" " + key.packageName + ": " + key.providerName + ": " + stats);
2552 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002553 pw.println(" Last Known Locations:");
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002554 for (Map.Entry<String, Location> entry : mLastLocation.entrySet()) {
2555 String provider = entry.getKey();
2556 Location location = entry.getValue();
2557 pw.println(" " + provider + ": " + location);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002558 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002559
David Christie1b9b7b12013-04-15 15:31:11 -07002560 pw.println(" Last Known Locations Coarse Intervals:");
2561 for (Map.Entry<String, Location> entry : mLastLocationCoarseInterval.entrySet()) {
2562 String provider = entry.getKey();
2563 Location location = entry.getValue();
2564 pw.println(" " + provider + ": " + location);
2565 }
2566
Nick Pellye0fd6932012-07-11 10:26:13 -07002567 mGeofenceManager.dump(pw);
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002568
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002569 if (mEnabledProviders.size() > 0) {
2570 pw.println(" Enabled Providers:");
2571 for (String i : mEnabledProviders) {
2572 pw.println(" " + i);
2573 }
Nick Pellye0fd6932012-07-11 10:26:13 -07002574
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002575 }
2576 if (mDisabledProviders.size() > 0) {
2577 pw.println(" Disabled Providers:");
2578 for (String i : mDisabledProviders) {
2579 pw.println(" " + i);
2580 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002581 }
Nick Pelly4035f5a2012-08-17 14:43:49 -07002582 pw.append(" ");
2583 mBlacklist.dump(pw);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002584 if (mMockProviders.size() > 0) {
2585 pw.println(" Mock Providers:");
2586 for (Map.Entry<String, MockProvider> i : mMockProviders.entrySet()) {
Mike Lockwood7ec434e2009-03-27 07:46:48 -07002587 i.getValue().dump(pw, " ");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002588 }
2589 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002590
Nick Pelly74fa7ea2012-08-13 19:36:38 -07002591 pw.append(" fudger: ");
2592 mLocationFudger.dump(fd, pw, args);
2593
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002594 if (args.length > 0 && "short".equals(args[0])) {
2595 return;
2596 }
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002597 for (LocationProviderInterface provider: mProviders) {
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002598 pw.print(provider.getName() + " Internal State");
2599 if (provider instanceof LocationProviderProxy) {
2600 LocationProviderProxy proxy = (LocationProviderProxy) provider;
2601 pw.print(" (" + proxy.getConnectedPackageName() + ")");
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002602 }
Nick Pelly6fa9ad42012-07-16 12:18:23 -07002603 pw.println(":");
2604 provider.dump(fd, pw, args);
Fred Fettinger3c8fbdf2010-01-04 15:38:13 -06002605 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002606 }
2607 }
2608}