blob: d0e9fe1fd8138ff454e93d7f6c7b8489488fab79 [file] [log] [blame]
Amith Yamasani4b2e9342011-03-31 12:38:53 -07001/*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server.pm;
18
Jeff Sharkeyffe0cb42012-11-05 17:24:43 -080019import static android.text.format.DateUtils.MINUTE_IN_MILLIS;
Amith Yamasani4b2e9342011-03-31 12:38:53 -070020
Amith Yamasanidb6a14c2012-10-17 21:16:52 -070021import android.app.Activity;
Amith Yamasani2a003292012-08-14 18:25:45 -070022import android.app.ActivityManager;
Dianne Hackborn80a4af22012-08-27 19:18:31 -070023import android.app.ActivityManagerNative;
Amith Yamasani1a7472e2013-07-02 11:17:30 -070024import android.app.ActivityThread;
Dianne Hackborn80a4af22012-08-27 19:18:31 -070025import android.app.IStopUserCallback;
Amith Yamasanidb6a14c2012-10-17 21:16:52 -070026import android.content.BroadcastReceiver;
Amith Yamasani258848d2012-08-10 17:06:33 -070027import android.content.Context;
28import android.content.Intent;
Amith Yamasani1a7472e2013-07-02 11:17:30 -070029import android.content.pm.ApplicationInfo;
Amith Yamasani0b285492011-04-14 17:35:23 -070030import android.content.pm.PackageManager;
Amith Yamasanidf2e92a2013-03-01 17:04:38 -080031import android.content.pm.PackageManager.NameNotFoundException;
Amith Yamasani4b2e9342011-03-31 12:38:53 -070032import android.content.pm.UserInfo;
Amith Yamasanie928d7d2012-09-17 21:46:51 -070033import android.graphics.Bitmap;
34import android.graphics.BitmapFactory;
Amith Yamasani258848d2012-08-10 17:06:33 -070035import android.os.Binder;
Amith Yamasanie4cf7342012-12-17 11:12:09 -080036import android.os.Bundle;
Amith Yamasani4b2e9342011-03-31 12:38:53 -070037import android.os.Environment;
38import android.os.FileUtils;
Jeff Sharkeyffe0cb42012-11-05 17:24:43 -080039import android.os.Handler;
Amith Yamasani258848d2012-08-10 17:06:33 -070040import android.os.IUserManager;
Amith Yamasani258848d2012-08-10 17:06:33 -070041import android.os.Process;
Dianne Hackborn80a4af22012-08-27 19:18:31 -070042import android.os.RemoteException;
Dianne Hackbornf02b60a2012-08-16 10:48:27 -070043import android.os.UserHandle;
Jeff Sharkey27bd34d2012-09-16 12:49:00 -070044import android.os.UserManager;
Amith Yamasani2a003292012-08-14 18:25:45 -070045import android.util.AtomicFile;
Amith Yamasani655d0e22013-06-12 14:19:10 -070046import android.util.Log;
Amith Yamasani4b2e9342011-03-31 12:38:53 -070047import android.util.Slog;
48import android.util.SparseArray;
Jeff Sharkeyffe0cb42012-11-05 17:24:43 -080049import android.util.SparseBooleanArray;
Amith Yamasani920ace02012-09-20 22:15:37 -070050import android.util.TimeUtils;
Amith Yamasani4b2e9342011-03-31 12:38:53 -070051import android.util.Xml;
52
Amith Yamasani1a7472e2013-07-02 11:17:30 -070053import com.android.internal.content.PackageMonitor;
Jeff Sharkeyffe0cb42012-11-05 17:24:43 -080054import com.android.internal.util.ArrayUtils;
55import com.android.internal.util.FastXmlSerializer;
56
57import org.xmlpull.v1.XmlPullParser;
58import org.xmlpull.v1.XmlPullParserException;
59import org.xmlpull.v1.XmlSerializer;
60
Amith Yamasani4b2e9342011-03-31 12:38:53 -070061import java.io.BufferedOutputStream;
62import java.io.File;
Amith Yamasani920ace02012-09-20 22:15:37 -070063import java.io.FileDescriptor;
Amith Yamasani4b2e9342011-03-31 12:38:53 -070064import java.io.FileInputStream;
Amith Yamasanib8151ec2012-04-18 18:02:48 -070065import java.io.FileNotFoundException;
Amith Yamasani4b2e9342011-03-31 12:38:53 -070066import java.io.FileOutputStream;
67import java.io.IOException;
Amith Yamasani920ace02012-09-20 22:15:37 -070068import java.io.PrintWriter;
Amith Yamasani655d0e22013-06-12 14:19:10 -070069import java.security.MessageDigest;
70import java.security.NoSuchAlgorithmException;
71import java.security.SecureRandom;
Amith Yamasani4b2e9342011-03-31 12:38:53 -070072import java.util.ArrayList;
73import java.util.List;
74
Amith Yamasani258848d2012-08-10 17:06:33 -070075public class UserManagerService extends IUserManager.Stub {
Amith Yamasanib8151ec2012-04-18 18:02:48 -070076
Amith Yamasani2a003292012-08-14 18:25:45 -070077 private static final String LOG_TAG = "UserManagerService";
Amith Yamasanib8151ec2012-04-18 18:02:48 -070078
Amith Yamasani16389312012-10-17 21:20:14 -070079 private static final boolean DBG = false;
80
Amith Yamasani4b2e9342011-03-31 12:38:53 -070081 private static final String TAG_NAME = "name";
Amith Yamasani4b2e9342011-03-31 12:38:53 -070082 private static final String ATTR_FLAGS = "flags";
Amith Yamasanib8151ec2012-04-18 18:02:48 -070083 private static final String ATTR_ICON_PATH = "icon";
Amith Yamasani4b2e9342011-03-31 12:38:53 -070084 private static final String ATTR_ID = "id";
Amith Yamasani920ace02012-09-20 22:15:37 -070085 private static final String ATTR_CREATION_TIME = "created";
86 private static final String ATTR_LAST_LOGGED_IN_TIME = "lastLoggedIn";
Amith Yamasani655d0e22013-06-12 14:19:10 -070087 private static final String ATTR_SALT = "salt";
88 private static final String ATTR_PIN_HASH = "pinHash";
89 private static final String ATTR_FAILED_ATTEMPTS = "failedAttempts";
90 private static final String ATTR_LAST_RETRY_MS = "lastAttemptMs";
Amith Yamasani2a003292012-08-14 18:25:45 -070091 private static final String ATTR_SERIAL_NO = "serialNumber";
92 private static final String ATTR_NEXT_SERIAL_NO = "nextSerialNumber";
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -070093 private static final String ATTR_PARTIAL = "partial";
Amith Yamasani6f34b412012-10-22 18:19:27 -070094 private static final String ATTR_USER_VERSION = "version";
Amith Yamasani4b2e9342011-03-31 12:38:53 -070095 private static final String TAG_USERS = "users";
Amith Yamasani4b2e9342011-03-31 12:38:53 -070096 private static final String TAG_USER = "user";
Amith Yamasanie4cf7342012-12-17 11:12:09 -080097 private static final String TAG_RESTRICTIONS = "restrictions";
Amith Yamasanidf2e92a2013-03-01 17:04:38 -080098 private static final String TAG_ENTRY = "entry";
99 private static final String TAG_VALUE = "value";
100 private static final String ATTR_KEY = "key";
Amith Yamasani7e99bc02013-04-16 18:24:51 -0700101 private static final String ATTR_VALUE_TYPE = "type";
Amith Yamasanidf2e92a2013-03-01 17:04:38 -0800102 private static final String ATTR_MULTIPLE = "m";
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700103
Amith Yamasani7e99bc02013-04-16 18:24:51 -0700104 private static final String ATTR_TYPE_STRING_ARRAY = "sa";
105 private static final String ATTR_TYPE_STRING = "s";
106 private static final String ATTR_TYPE_BOOLEAN = "b";
107
Amith Yamasani0b285492011-04-14 17:35:23 -0700108 private static final String USER_INFO_DIR = "system" + File.separator + "users";
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700109 private static final String USER_LIST_FILENAME = "userlist.xml";
Amith Yamasanib8151ec2012-04-18 18:02:48 -0700110 private static final String USER_PHOTO_FILENAME = "photo.png";
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700111
Amith Yamasanidf2e92a2013-03-01 17:04:38 -0800112 private static final String RESTRICTIONS_FILE_PREFIX = "res_";
113
Amith Yamasani634cf312012-10-04 17:34:21 -0700114 private static final int MIN_USER_ID = 10;
115
Amith Yamasani5e486f52013-08-07 11:06:44 -0700116 private static final int USER_VERSION = 4;
Amith Yamasani6f34b412012-10-22 18:19:27 -0700117
Amith Yamasani920ace02012-09-20 22:15:37 -0700118 private static final long EPOCH_PLUS_30_YEARS = 30L * 365 * 24 * 60 * 60 * 1000L; // ms
119
Amith Yamasani655d0e22013-06-12 14:19:10 -0700120 // Number of attempts before jumping to the next BACKOFF_TIMES slot
121 private static final int BACKOFF_INC_INTERVAL = 5;
122
123 // Amount of time to force the user to wait before entering the PIN again, after failing
124 // BACKOFF_INC_INTERVAL times.
125 private static final int[] BACKOFF_TIMES = { 0, 30*1000, 60*1000, 5*60*1000, 30*60*1000 };
126
Dianne Hackborn4428e172012-08-24 17:43:05 -0700127 private final Context mContext;
128 private final PackageManagerService mPm;
129 private final Object mInstallLock;
130 private final Object mPackagesLock;
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700131
Jeff Sharkeyffe0cb42012-11-05 17:24:43 -0800132 private final Handler mHandler;
133
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700134 private final File mUsersDir;
135 private final File mUserListFile;
Dianne Hackborn4428e172012-08-24 17:43:05 -0700136 private final File mBaseUserPath;
137
Jeff Sharkeyffe0cb42012-11-05 17:24:43 -0800138 private final SparseArray<UserInfo> mUsers = new SparseArray<UserInfo>();
Amith Yamasanie4cf7342012-12-17 11:12:09 -0800139 private final SparseArray<Bundle> mUserRestrictions = new SparseArray<Bundle>();
Jeff Sharkeyffe0cb42012-11-05 17:24:43 -0800140
Amith Yamasani655d0e22013-06-12 14:19:10 -0700141 class RestrictionsPinState {
142 long salt;
143 String pinHash;
144 int failedAttempts;
145 long lastAttemptTime;
146 }
147
148 private final SparseArray<RestrictionsPinState> mRestrictionsPinStates =
149 new SparseArray<RestrictionsPinState>();
150
Jeff Sharkeyffe0cb42012-11-05 17:24:43 -0800151 /**
152 * Set of user IDs being actively removed. Removed IDs linger in this set
153 * for several seconds to work around a VFS caching issue.
154 */
155 // @GuardedBy("mPackagesLock")
156 private final SparseBooleanArray mRemovingUserIds = new SparseBooleanArray();
Dianne Hackborn4428e172012-08-24 17:43:05 -0700157
Amith Yamasani0b285492011-04-14 17:35:23 -0700158 private int[] mUserIds;
Amith Yamasani258848d2012-08-10 17:06:33 -0700159 private boolean mGuestEnabled;
Amith Yamasani2a003292012-08-14 18:25:45 -0700160 private int mNextSerialNumber;
Amith Yamasani6f34b412012-10-22 18:19:27 -0700161 private int mUserVersion = 0;
Amith Yamasani0b285492011-04-14 17:35:23 -0700162
Amith Yamasani258848d2012-08-10 17:06:33 -0700163 private static UserManagerService sInstance;
Amith Yamasani258848d2012-08-10 17:06:33 -0700164
Dianne Hackborn4428e172012-08-24 17:43:05 -0700165 public static UserManagerService getInstance() {
166 synchronized (UserManagerService.class) {
167 return sInstance;
Amith Yamasani258848d2012-08-10 17:06:33 -0700168 }
Amith Yamasani258848d2012-08-10 17:06:33 -0700169 }
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700170
171 /**
172 * Available for testing purposes.
173 */
Amith Yamasani258848d2012-08-10 17:06:33 -0700174 UserManagerService(File dataDir, File baseUserPath) {
Dianne Hackborn4428e172012-08-24 17:43:05 -0700175 this(null, null, new Object(), new Object(), dataDir, baseUserPath);
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700176 }
177
Dianne Hackborn4428e172012-08-24 17:43:05 -0700178 /**
179 * Called by package manager to create the service. This is closely
180 * associated with the package manager, and the given lock is the
181 * package manager's own lock.
182 */
183 UserManagerService(Context context, PackageManagerService pm,
184 Object installLock, Object packagesLock) {
185 this(context, pm, installLock, packagesLock,
186 Environment.getDataDirectory(),
187 new File(Environment.getDataDirectory(), "user"));
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700188 }
189
Dianne Hackborn4428e172012-08-24 17:43:05 -0700190 /**
191 * Available for testing purposes.
192 */
193 private UserManagerService(Context context, PackageManagerService pm,
194 Object installLock, Object packagesLock,
195 File dataDir, File baseUserPath) {
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700196 mContext = context;
197 mPm = pm;
198 mInstallLock = installLock;
199 mPackagesLock = packagesLock;
Jeff Sharkeyffe0cb42012-11-05 17:24:43 -0800200 mHandler = new Handler();
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700201 synchronized (mInstallLock) {
202 synchronized (mPackagesLock) {
203 mUsersDir = new File(dataDir, USER_INFO_DIR);
204 mUsersDir.mkdirs();
205 // Make zeroth user directory, for services to migrate their files to that location
206 File userZeroDir = new File(mUsersDir, "0");
207 userZeroDir.mkdirs();
208 mBaseUserPath = baseUserPath;
209 FileUtils.setPermissions(mUsersDir.toString(),
210 FileUtils.S_IRWXU|FileUtils.S_IRWXG
211 |FileUtils.S_IROTH|FileUtils.S_IXOTH,
212 -1, -1);
213 mUserListFile = new File(mUsersDir, USER_LIST_FILENAME);
214 readUserListLocked();
Amith Yamasani756901d2012-10-12 12:30:07 -0700215 // Prune out any partially created/partially removed users.
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700216 ArrayList<UserInfo> partials = new ArrayList<UserInfo>();
217 for (int i = 0; i < mUsers.size(); i++) {
218 UserInfo ui = mUsers.valueAt(i);
219 if (ui.partial && i != 0) {
220 partials.add(ui);
221 }
222 }
223 for (int i = 0; i < partials.size(); i++) {
224 UserInfo ui = partials.get(i);
225 Slog.w(LOG_TAG, "Removing partially created user #" + i
226 + " (name=" + ui.name + ")");
227 removeUserStateLocked(ui.id);
228 }
229 sInstance = this;
230 }
Dianne Hackborn4428e172012-08-24 17:43:05 -0700231 }
Amith Yamasani1a7472e2013-07-02 11:17:30 -0700232 }
233
234 void systemReady() {
Amith Yamasani5e486f52013-08-07 11:06:44 -0700235 final Context context = ActivityThread.systemMain().getSystemContext();
236 mUserPackageMonitor.register(context,
Amith Yamasani1a7472e2013-07-02 11:17:30 -0700237 null, UserHandle.ALL, false);
238 userForeground(UserHandle.USER_OWNER);
Amith Yamasani258848d2012-08-10 17:06:33 -0700239 }
240
241 @Override
Amith Yamasani920ace02012-09-20 22:15:37 -0700242 public List<UserInfo> getUsers(boolean excludeDying) {
Amith Yamasani2a003292012-08-14 18:25:45 -0700243 checkManageUsersPermission("query users");
Dianne Hackborn4428e172012-08-24 17:43:05 -0700244 synchronized (mPackagesLock) {
Amith Yamasani13593602012-03-22 16:16:17 -0700245 ArrayList<UserInfo> users = new ArrayList<UserInfo>(mUsers.size());
246 for (int i = 0; i < mUsers.size(); i++) {
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700247 UserInfo ui = mUsers.valueAt(i);
248 if (ui.partial) {
249 continue;
250 }
Jeff Sharkeyffe0cb42012-11-05 17:24:43 -0800251 if (!excludeDying || !mRemovingUserIds.get(ui.id)) {
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700252 users.add(ui);
Amith Yamasani920ace02012-09-20 22:15:37 -0700253 }
Amith Yamasani13593602012-03-22 16:16:17 -0700254 }
255 return users;
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700256 }
Amith Yamasani13593602012-03-22 16:16:17 -0700257 }
258
Amith Yamasani258848d2012-08-10 17:06:33 -0700259 @Override
260 public UserInfo getUserInfo(int userId) {
Amith Yamasani2a003292012-08-14 18:25:45 -0700261 checkManageUsersPermission("query user");
Dianne Hackborn4428e172012-08-24 17:43:05 -0700262 synchronized (mPackagesLock) {
Amith Yamasani195263742012-08-21 15:40:12 -0700263 return getUserInfoLocked(userId);
Amith Yamasani13593602012-03-22 16:16:17 -0700264 }
265 }
266
Amith Yamasani71e6c692013-03-24 17:39:28 -0700267 @Override
268 public boolean isRestricted() {
269 synchronized (mPackagesLock) {
270 return getUserInfoLocked(UserHandle.getCallingUserId()).isRestricted();
271 }
272 }
273
Amith Yamasani195263742012-08-21 15:40:12 -0700274 /*
275 * Should be locked on mUsers before calling this.
276 */
277 private UserInfo getUserInfoLocked(int userId) {
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700278 UserInfo ui = mUsers.get(userId);
Amith Yamasani16389312012-10-17 21:20:14 -0700279 // If it is partial and not in the process of being removed, return as unknown user.
Jeff Sharkeyffe0cb42012-11-05 17:24:43 -0800280 if (ui != null && ui.partial && !mRemovingUserIds.get(userId)) {
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700281 Slog.w(LOG_TAG, "getUserInfo: unknown user #" + userId);
282 return null;
283 }
284 return ui;
Amith Yamasani195263742012-08-21 15:40:12 -0700285 }
286
Amith Yamasani13593602012-03-22 16:16:17 -0700287 public boolean exists(int userId) {
Dianne Hackborn4428e172012-08-24 17:43:05 -0700288 synchronized (mPackagesLock) {
Amith Yamasani13593602012-03-22 16:16:17 -0700289 return ArrayUtils.contains(mUserIds, userId);
290 }
291 }
292
Amith Yamasani258848d2012-08-10 17:06:33 -0700293 @Override
Amith Yamasanib8151ec2012-04-18 18:02:48 -0700294 public void setUserName(int userId, String name) {
Amith Yamasani2a003292012-08-14 18:25:45 -0700295 checkManageUsersPermission("rename users");
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700296 boolean changed = false;
Dianne Hackborn4428e172012-08-24 17:43:05 -0700297 synchronized (mPackagesLock) {
Amith Yamasani13593602012-03-22 16:16:17 -0700298 UserInfo info = mUsers.get(userId);
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700299 if (info == null || info.partial) {
300 Slog.w(LOG_TAG, "setUserName: unknown user #" + userId);
301 return;
302 }
Amith Yamasani13593602012-03-22 16:16:17 -0700303 if (name != null && !name.equals(info.name)) {
304 info.name = name;
305 writeUserLocked(info);
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700306 changed = true;
Amith Yamasani13593602012-03-22 16:16:17 -0700307 }
308 }
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700309 if (changed) {
310 sendUserInfoChangedBroadcast(userId);
311 }
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700312 }
313
Amith Yamasani258848d2012-08-10 17:06:33 -0700314 @Override
Amith Yamasanie928d7d2012-09-17 21:46:51 -0700315 public void setUserIcon(int userId, Bitmap bitmap) {
Amith Yamasani2a003292012-08-14 18:25:45 -0700316 checkManageUsersPermission("update users");
Dianne Hackborn4428e172012-08-24 17:43:05 -0700317 synchronized (mPackagesLock) {
Amith Yamasanib8151ec2012-04-18 18:02:48 -0700318 UserInfo info = mUsers.get(userId);
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700319 if (info == null || info.partial) {
320 Slog.w(LOG_TAG, "setUserIcon: unknown user #" + userId);
321 return;
322 }
Amith Yamasanie928d7d2012-09-17 21:46:51 -0700323 writeBitmapLocked(info, bitmap);
324 writeUserLocked(info);
Amith Yamasanib8151ec2012-04-18 18:02:48 -0700325 }
Amith Yamasanie928d7d2012-09-17 21:46:51 -0700326 sendUserInfoChangedBroadcast(userId);
327 }
328
329 private void sendUserInfoChangedBroadcast(int userId) {
330 Intent changedIntent = new Intent(Intent.ACTION_USER_INFO_CHANGED);
331 changedIntent.putExtra(Intent.EXTRA_USER_HANDLE, userId);
332 changedIntent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY);
Amith Yamasani6fc1d4e2013-05-08 16:43:58 -0700333 mContext.sendBroadcastAsUser(changedIntent, UserHandle.ALL);
Amith Yamasanib8151ec2012-04-18 18:02:48 -0700334 }
335
Amith Yamasani258848d2012-08-10 17:06:33 -0700336 @Override
Amith Yamasanie928d7d2012-09-17 21:46:51 -0700337 public Bitmap getUserIcon(int userId) {
Amith Yamasani3b49f072012-09-17 10:21:43 -0700338 checkManageUsersPermission("read users");
339 synchronized (mPackagesLock) {
340 UserInfo info = mUsers.get(userId);
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700341 if (info == null || info.partial) {
342 Slog.w(LOG_TAG, "getUserIcon: unknown user #" + userId);
343 return null;
344 }
345 if (info.iconPath == null) {
346 return null;
347 }
Amith Yamasanie928d7d2012-09-17 21:46:51 -0700348 return BitmapFactory.decodeFile(info.iconPath);
Amith Yamasani3b49f072012-09-17 10:21:43 -0700349 }
350 }
351
352 @Override
Amith Yamasani258848d2012-08-10 17:06:33 -0700353 public void setGuestEnabled(boolean enable) {
Amith Yamasani2a003292012-08-14 18:25:45 -0700354 checkManageUsersPermission("enable guest users");
Dianne Hackborn4428e172012-08-24 17:43:05 -0700355 synchronized (mPackagesLock) {
Amith Yamasani258848d2012-08-10 17:06:33 -0700356 if (mGuestEnabled != enable) {
357 mGuestEnabled = enable;
358 // Erase any guest user that currently exists
359 for (int i = 0; i < mUsers.size(); i++) {
360 UserInfo user = mUsers.valueAt(i);
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700361 if (!user.partial && user.isGuest()) {
Amith Yamasani258848d2012-08-10 17:06:33 -0700362 if (!enable) {
363 removeUser(user.id);
364 }
365 return;
366 }
367 }
368 // No guest was found
369 if (enable) {
370 createUser("Guest", UserInfo.FLAG_GUEST);
371 }
372 }
373 }
374 }
375
376 @Override
377 public boolean isGuestEnabled() {
Dianne Hackborn4428e172012-08-24 17:43:05 -0700378 synchronized (mPackagesLock) {
Amith Yamasani258848d2012-08-10 17:06:33 -0700379 return mGuestEnabled;
380 }
381 }
382
383 @Override
384 public void wipeUser(int userHandle) {
Amith Yamasani2a003292012-08-14 18:25:45 -0700385 checkManageUsersPermission("wipe user");
Amith Yamasani258848d2012-08-10 17:06:33 -0700386 // TODO:
387 }
388
Dianne Hackborn5dc5a002012-09-15 19:33:48 -0700389 public void makeInitialized(int userId) {
390 checkManageUsersPermission("makeInitialized");
391 synchronized (mPackagesLock) {
392 UserInfo info = mUsers.get(userId);
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700393 if (info == null || info.partial) {
394 Slog.w(LOG_TAG, "makeInitialized: unknown user #" + userId);
395 }
396 if ((info.flags&UserInfo.FLAG_INITIALIZED) == 0) {
Dianne Hackborn5dc5a002012-09-15 19:33:48 -0700397 info.flags |= UserInfo.FLAG_INITIALIZED;
398 writeUserLocked(info);
399 }
400 }
401 }
402
Amith Yamasanie4cf7342012-12-17 11:12:09 -0800403 @Override
404 public Bundle getUserRestrictions(int userId) {
405 // checkManageUsersPermission("getUserRestrictions");
406
407 synchronized (mPackagesLock) {
408 Bundle restrictions = mUserRestrictions.get(userId);
409 return restrictions != null ? restrictions : Bundle.EMPTY;
410 }
411 }
412
413 @Override
414 public void setUserRestrictions(Bundle restrictions, int userId) {
415 checkManageUsersPermission("setUserRestrictions");
Amith Yamasani0343ec32013-07-22 14:52:06 -0700416 if (restrictions == null) return;
Amith Yamasanie4cf7342012-12-17 11:12:09 -0800417
418 synchronized (mPackagesLock) {
Amith Yamasani350962c2013-08-06 11:18:53 -0700419 mUserRestrictions.get(userId).clear();
Amith Yamasanie4cf7342012-12-17 11:12:09 -0800420 mUserRestrictions.get(userId).putAll(restrictions);
421 writeUserLocked(mUsers.get(userId));
422 }
423 }
424
Amith Yamasani258848d2012-08-10 17:06:33 -0700425 /**
Amith Yamasanifaea76f2012-09-11 10:59:48 -0700426 * Check if we've hit the limit of how many users can be created.
427 */
Dianne Hackborn5dc5a002012-09-15 19:33:48 -0700428 private boolean isUserLimitReachedLocked() {
429 int nUsers = mUsers.size();
Jeff Sharkey27bd34d2012-09-16 12:49:00 -0700430 return nUsers >= UserManager.getMaxSupportedUsers();
Amith Yamasanifaea76f2012-09-11 10:59:48 -0700431 }
432
433 /**
Amith Yamasani195263742012-08-21 15:40:12 -0700434 * Enforces that only the system UID or root's UID or apps that have the
435 * {@link android.Manifest.permission.MANAGE_USERS MANAGE_USERS}
436 * permission can make certain calls to the UserManager.
Amith Yamasani258848d2012-08-10 17:06:33 -0700437 *
438 * @param message used as message if SecurityException is thrown
439 * @throws SecurityException if the caller is not system or root
440 */
Amith Yamasani2a003292012-08-14 18:25:45 -0700441 private static final void checkManageUsersPermission(String message) {
Amith Yamasani258848d2012-08-10 17:06:33 -0700442 final int uid = Binder.getCallingUid();
Amith Yamasani2a003292012-08-14 18:25:45 -0700443 if (uid != Process.SYSTEM_UID && uid != 0
444 && ActivityManager.checkComponentPermission(
445 android.Manifest.permission.MANAGE_USERS,
446 uid, -1, true) != PackageManager.PERMISSION_GRANTED) {
447 throw new SecurityException("You need MANAGE_USERS permission to: " + message);
Amith Yamasani258848d2012-08-10 17:06:33 -0700448 }
449 }
450
Amith Yamasanie928d7d2012-09-17 21:46:51 -0700451 private void writeBitmapLocked(UserInfo info, Bitmap bitmap) {
Amith Yamasanib8151ec2012-04-18 18:02:48 -0700452 try {
453 File dir = new File(mUsersDir, Integer.toString(info.id));
454 File file = new File(dir, USER_PHOTO_FILENAME);
455 if (!dir.exists()) {
456 dir.mkdir();
457 FileUtils.setPermissions(
458 dir.getPath(),
459 FileUtils.S_IRWXU|FileUtils.S_IRWXG|FileUtils.S_IXOTH,
460 -1, -1);
461 }
Amith Yamasanie928d7d2012-09-17 21:46:51 -0700462 FileOutputStream os;
463 if (bitmap.compress(Bitmap.CompressFormat.PNG, 100, os = new FileOutputStream(file))) {
Amith Yamasani3b49f072012-09-17 10:21:43 -0700464 info.iconPath = file.getAbsolutePath();
465 }
Amith Yamasanie928d7d2012-09-17 21:46:51 -0700466 try {
467 os.close();
468 } catch (IOException ioe) {
469 // What the ... !
470 }
Amith Yamasanib8151ec2012-04-18 18:02:48 -0700471 } catch (FileNotFoundException e) {
Amith Yamasani2a003292012-08-14 18:25:45 -0700472 Slog.w(LOG_TAG, "Error setting photo for user ", e);
Amith Yamasanib8151ec2012-04-18 18:02:48 -0700473 }
Amith Yamasanib8151ec2012-04-18 18:02:48 -0700474 }
475
Amith Yamasani0b285492011-04-14 17:35:23 -0700476 /**
477 * Returns an array of user ids. This array is cached here for quick access, so do not modify or
478 * cache it elsewhere.
479 * @return the array of user ids.
480 */
Dianne Hackborn1676c852012-09-10 14:52:30 -0700481 public int[] getUserIds() {
Dianne Hackborn4428e172012-08-24 17:43:05 -0700482 synchronized (mPackagesLock) {
Dianne Hackborn7767eac2012-08-23 18:25:40 -0700483 return mUserIds;
484 }
Amith Yamasani0b285492011-04-14 17:35:23 -0700485 }
486
Dianne Hackborn4428e172012-08-24 17:43:05 -0700487 int[] getUserIdsLPr() {
488 return mUserIds;
489 }
490
Amith Yamasani13593602012-03-22 16:16:17 -0700491 private void readUserListLocked() {
Amith Yamasani258848d2012-08-10 17:06:33 -0700492 mGuestEnabled = false;
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700493 if (!mUserListFile.exists()) {
Amith Yamasani13593602012-03-22 16:16:17 -0700494 fallbackToSingleUserLocked();
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700495 return;
496 }
497 FileInputStream fis = null;
Amith Yamasani2a003292012-08-14 18:25:45 -0700498 AtomicFile userListFile = new AtomicFile(mUserListFile);
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700499 try {
Amith Yamasani2a003292012-08-14 18:25:45 -0700500 fis = userListFile.openRead();
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700501 XmlPullParser parser = Xml.newPullParser();
502 parser.setInput(fis, null);
503 int type;
504 while ((type = parser.next()) != XmlPullParser.START_TAG
505 && type != XmlPullParser.END_DOCUMENT) {
506 ;
507 }
508
509 if (type != XmlPullParser.START_TAG) {
Amith Yamasani0b285492011-04-14 17:35:23 -0700510 Slog.e(LOG_TAG, "Unable to read user list");
Amith Yamasani13593602012-03-22 16:16:17 -0700511 fallbackToSingleUserLocked();
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700512 return;
513 }
514
Amith Yamasani2a003292012-08-14 18:25:45 -0700515 mNextSerialNumber = -1;
516 if (parser.getName().equals(TAG_USERS)) {
517 String lastSerialNumber = parser.getAttributeValue(null, ATTR_NEXT_SERIAL_NO);
518 if (lastSerialNumber != null) {
519 mNextSerialNumber = Integer.parseInt(lastSerialNumber);
520 }
Amith Yamasani6f34b412012-10-22 18:19:27 -0700521 String versionNumber = parser.getAttributeValue(null, ATTR_USER_VERSION);
522 if (versionNumber != null) {
523 mUserVersion = Integer.parseInt(versionNumber);
524 }
Amith Yamasani2a003292012-08-14 18:25:45 -0700525 }
526
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700527 while ((type = parser.next()) != XmlPullParser.END_DOCUMENT) {
528 if (type == XmlPullParser.START_TAG && parser.getName().equals(TAG_USER)) {
529 String id = parser.getAttributeValue(null, ATTR_ID);
Amith Yamasanie4cf7342012-12-17 11:12:09 -0800530 UserInfo user = readUserLocked(Integer.parseInt(id));
Amith Yamasani6f34b412012-10-22 18:19:27 -0700531
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700532 if (user != null) {
533 mUsers.put(user.id, user);
Amith Yamasani2a003292012-08-14 18:25:45 -0700534 if (user.isGuest()) {
535 mGuestEnabled = true;
536 }
537 if (mNextSerialNumber < 0 || mNextSerialNumber <= user.id) {
538 mNextSerialNumber = user.id + 1;
539 }
Amith Yamasani258848d2012-08-10 17:06:33 -0700540 }
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700541 }
542 }
Amith Yamasani13593602012-03-22 16:16:17 -0700543 updateUserIdsLocked();
Amith Yamasani350962c2013-08-06 11:18:53 -0700544 upgradeIfNecessaryLocked();
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700545 } catch (IOException ioe) {
Amith Yamasani13593602012-03-22 16:16:17 -0700546 fallbackToSingleUserLocked();
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700547 } catch (XmlPullParserException pe) {
Amith Yamasani13593602012-03-22 16:16:17 -0700548 fallbackToSingleUserLocked();
Dianne Hackbornbfd89b32011-12-15 18:22:54 -0800549 } finally {
550 if (fis != null) {
551 try {
552 fis.close();
553 } catch (IOException e) {
554 }
555 }
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700556 }
557 }
558
Amith Yamasani6f34b412012-10-22 18:19:27 -0700559 /**
Amith Yamasanibc9625052012-11-15 14:39:18 -0800560 * Upgrade steps between versions, either for fixing bugs or changing the data format.
Amith Yamasani6f34b412012-10-22 18:19:27 -0700561 */
Amith Yamasani350962c2013-08-06 11:18:53 -0700562 private void upgradeIfNecessaryLocked() {
Amith Yamasani6f34b412012-10-22 18:19:27 -0700563 int userVersion = mUserVersion;
564 if (userVersion < 1) {
565 // Assign a proper name for the owner, if not initialized correctly before
566 UserInfo user = mUsers.get(UserHandle.USER_OWNER);
567 if ("Primary".equals(user.name)) {
568 user.name = mContext.getResources().getString(com.android.internal.R.string.owner_name);
569 writeUserLocked(user);
570 }
571 userVersion = 1;
572 }
573
Amith Yamasanibc9625052012-11-15 14:39:18 -0800574 if (userVersion < 2) {
575 // Owner should be marked as initialized
576 UserInfo user = mUsers.get(UserHandle.USER_OWNER);
577 if ((user.flags & UserInfo.FLAG_INITIALIZED) == 0) {
578 user.flags |= UserInfo.FLAG_INITIALIZED;
579 writeUserLocked(user);
580 }
581 userVersion = 2;
582 }
583
Amith Yamasani350962c2013-08-06 11:18:53 -0700584
Amith Yamasani5e486f52013-08-07 11:06:44 -0700585 if (userVersion < 4) {
Amith Yamasani5e486f52013-08-07 11:06:44 -0700586 userVersion = 4;
587 }
588
Amith Yamasani6f34b412012-10-22 18:19:27 -0700589 if (userVersion < USER_VERSION) {
590 Slog.w(LOG_TAG, "User version " + mUserVersion + " didn't upgrade as expected to "
591 + USER_VERSION);
592 } else {
593 mUserVersion = userVersion;
594 writeUserListLocked();
595 }
596 }
597
Amith Yamasani13593602012-03-22 16:16:17 -0700598 private void fallbackToSingleUserLocked() {
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700599 // Create the primary user
Amith Yamasani67df64b2012-12-14 12:09:36 -0800600 UserInfo primary = new UserInfo(UserHandle.USER_OWNER,
Amith Yamasani6f34b412012-10-22 18:19:27 -0700601 mContext.getResources().getString(com.android.internal.R.string.owner_name), null,
Amith Yamasani756901d2012-10-12 12:30:07 -0700602 UserInfo.FLAG_ADMIN | UserInfo.FLAG_PRIMARY | UserInfo.FLAG_INITIALIZED);
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700603 mUsers.put(0, primary);
Amith Yamasani634cf312012-10-04 17:34:21 -0700604 mNextSerialNumber = MIN_USER_ID;
Geoffrey Borggaard15b8b2c2013-08-28 22:11:10 -0400605 mUserVersion = USER_VERSION;
Amith Yamasani67df64b2012-12-14 12:09:36 -0800606
Geoffrey Borggaarde45e45e32013-01-24 10:03:20 -0500607 Bundle restrictions = new Bundle();
Amith Yamasani67df64b2012-12-14 12:09:36 -0800608 mUserRestrictions.append(UserHandle.USER_OWNER, restrictions);
609
Amith Yamasani13593602012-03-22 16:16:17 -0700610 updateUserIdsLocked();
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700611
Amith Yamasani13593602012-03-22 16:16:17 -0700612 writeUserListLocked();
613 writeUserLocked(primary);
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700614 }
615
616 /*
617 * Writes the user file in this format:
618 *
619 * <user flags="20039023" id="0">
620 * <name>Primary</name>
621 * </user>
622 */
Amith Yamasani13593602012-03-22 16:16:17 -0700623 private void writeUserLocked(UserInfo userInfo) {
Amith Yamasani742a6712011-05-04 14:49:28 -0700624 FileOutputStream fos = null;
Amith Yamasani2a003292012-08-14 18:25:45 -0700625 AtomicFile userFile = new AtomicFile(new File(mUsersDir, userInfo.id + ".xml"));
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700626 try {
Amith Yamasani2a003292012-08-14 18:25:45 -0700627 fos = userFile.startWrite();
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700628 final BufferedOutputStream bos = new BufferedOutputStream(fos);
629
630 // XmlSerializer serializer = XmlUtils.serializerInstance();
631 final XmlSerializer serializer = new FastXmlSerializer();
632 serializer.setOutput(bos, "utf-8");
633 serializer.startDocument(null, true);
634 serializer.setFeature("http://xmlpull.org/v1/doc/features.html#indent-output", true);
635
636 serializer.startTag(null, TAG_USER);
637 serializer.attribute(null, ATTR_ID, Integer.toString(userInfo.id));
Amith Yamasani2a003292012-08-14 18:25:45 -0700638 serializer.attribute(null, ATTR_SERIAL_NO, Integer.toString(userInfo.serialNumber));
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700639 serializer.attribute(null, ATTR_FLAGS, Integer.toString(userInfo.flags));
Amith Yamasani920ace02012-09-20 22:15:37 -0700640 serializer.attribute(null, ATTR_CREATION_TIME, Long.toString(userInfo.creationTime));
641 serializer.attribute(null, ATTR_LAST_LOGGED_IN_TIME,
642 Long.toString(userInfo.lastLoggedInTime));
Amith Yamasani655d0e22013-06-12 14:19:10 -0700643 RestrictionsPinState pinState = mRestrictionsPinStates.get(userInfo.id);
644 if (pinState != null) {
645 if (pinState.salt != 0) {
646 serializer.attribute(null, ATTR_SALT, Long.toString(pinState.salt));
647 }
648 if (pinState.pinHash != null) {
649 serializer.attribute(null, ATTR_PIN_HASH, pinState.pinHash);
650 }
651 if (pinState.failedAttempts != 0) {
652 serializer.attribute(null, ATTR_FAILED_ATTEMPTS,
653 Integer.toString(pinState.failedAttempts));
654 serializer.attribute(null, ATTR_LAST_RETRY_MS,
655 Long.toString(pinState.lastAttemptTime));
656 }
657 }
Amith Yamasanib8151ec2012-04-18 18:02:48 -0700658 if (userInfo.iconPath != null) {
659 serializer.attribute(null, ATTR_ICON_PATH, userInfo.iconPath);
660 }
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700661 if (userInfo.partial) {
662 serializer.attribute(null, ATTR_PARTIAL, "true");
663 }
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700664
665 serializer.startTag(null, TAG_NAME);
666 serializer.text(userInfo.name);
667 serializer.endTag(null, TAG_NAME);
668
Amith Yamasanie4cf7342012-12-17 11:12:09 -0800669 Bundle restrictions = mUserRestrictions.get(userInfo.id);
670 if (restrictions != null) {
671 serializer.startTag(null, TAG_RESTRICTIONS);
Amith Yamasani71e6c692013-03-24 17:39:28 -0700672 writeBoolean(serializer, restrictions, UserManager.DISALLOW_CONFIG_WIFI);
673 writeBoolean(serializer, restrictions, UserManager.DISALLOW_MODIFY_ACCOUNTS);
674 writeBoolean(serializer, restrictions, UserManager.DISALLOW_INSTALL_APPS);
675 writeBoolean(serializer, restrictions, UserManager.DISALLOW_UNINSTALL_APPS);
676 writeBoolean(serializer, restrictions, UserManager.DISALLOW_SHARE_LOCATION);
Maggie Benthalla12fccf2013-03-14 18:02:12 -0400677 writeBoolean(serializer, restrictions,
678 UserManager.DISALLOW_INSTALL_UNKNOWN_SOURCES);
679 writeBoolean(serializer, restrictions, UserManager.DISALLOW_CONFIG_BLUETOOTH);
680 writeBoolean(serializer, restrictions, UserManager.DISALLOW_USB_FILE_TRANSFER);
Emily Bernierb223f732013-04-11 15:46:36 -0400681 writeBoolean(serializer, restrictions, UserManager.DISALLOW_CONFIG_CREDENTIALS);
682 writeBoolean(serializer, restrictions, UserManager.DISALLOW_REMOVE_USER);
Amith Yamasanie4cf7342012-12-17 11:12:09 -0800683 serializer.endTag(null, TAG_RESTRICTIONS);
684 }
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700685 serializer.endTag(null, TAG_USER);
686
687 serializer.endDocument();
Amith Yamasani2a003292012-08-14 18:25:45 -0700688 userFile.finishWrite(fos);
689 } catch (Exception ioe) {
Amith Yamasani0b285492011-04-14 17:35:23 -0700690 Slog.e(LOG_TAG, "Error writing user info " + userInfo.id + "\n" + ioe);
Amith Yamasani2a003292012-08-14 18:25:45 -0700691 userFile.failWrite(fos);
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700692 }
693 }
694
695 /*
696 * Writes the user list file in this format:
697 *
Amith Yamasani2a003292012-08-14 18:25:45 -0700698 * <users nextSerialNumber="3">
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700699 * <user id="0"></user>
700 * <user id="2"></user>
701 * </users>
702 */
Amith Yamasani13593602012-03-22 16:16:17 -0700703 private void writeUserListLocked() {
Amith Yamasani742a6712011-05-04 14:49:28 -0700704 FileOutputStream fos = null;
Amith Yamasani2a003292012-08-14 18:25:45 -0700705 AtomicFile userListFile = new AtomicFile(mUserListFile);
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700706 try {
Amith Yamasani2a003292012-08-14 18:25:45 -0700707 fos = userListFile.startWrite();
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700708 final BufferedOutputStream bos = new BufferedOutputStream(fos);
709
710 // XmlSerializer serializer = XmlUtils.serializerInstance();
711 final XmlSerializer serializer = new FastXmlSerializer();
712 serializer.setOutput(bos, "utf-8");
713 serializer.startDocument(null, true);
714 serializer.setFeature("http://xmlpull.org/v1/doc/features.html#indent-output", true);
715
716 serializer.startTag(null, TAG_USERS);
Amith Yamasani2a003292012-08-14 18:25:45 -0700717 serializer.attribute(null, ATTR_NEXT_SERIAL_NO, Integer.toString(mNextSerialNumber));
Amith Yamasani6f34b412012-10-22 18:19:27 -0700718 serializer.attribute(null, ATTR_USER_VERSION, Integer.toString(mUserVersion));
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700719
720 for (int i = 0; i < mUsers.size(); i++) {
721 UserInfo user = mUsers.valueAt(i);
722 serializer.startTag(null, TAG_USER);
723 serializer.attribute(null, ATTR_ID, Integer.toString(user.id));
724 serializer.endTag(null, TAG_USER);
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700725 }
726
727 serializer.endTag(null, TAG_USERS);
728
729 serializer.endDocument();
Amith Yamasani2a003292012-08-14 18:25:45 -0700730 userListFile.finishWrite(fos);
731 } catch (Exception e) {
732 userListFile.failWrite(fos);
Amith Yamasani0b285492011-04-14 17:35:23 -0700733 Slog.e(LOG_TAG, "Error writing user list");
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700734 }
735 }
736
Amith Yamasanie4cf7342012-12-17 11:12:09 -0800737 private UserInfo readUserLocked(int id) {
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700738 int flags = 0;
Amith Yamasani2a003292012-08-14 18:25:45 -0700739 int serialNumber = id;
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700740 String name = null;
Amith Yamasanib8151ec2012-04-18 18:02:48 -0700741 String iconPath = null;
Amith Yamasani920ace02012-09-20 22:15:37 -0700742 long creationTime = 0L;
743 long lastLoggedInTime = 0L;
Amith Yamasani655d0e22013-06-12 14:19:10 -0700744 long salt = 0L;
745 String pinHash = null;
746 int failedAttempts = 0;
747 long lastAttemptTime = 0L;
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700748 boolean partial = false;
Amith Yamasanie4cf7342012-12-17 11:12:09 -0800749 Bundle restrictions = new Bundle();
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700750
751 FileInputStream fis = null;
752 try {
Amith Yamasani2a003292012-08-14 18:25:45 -0700753 AtomicFile userFile =
754 new AtomicFile(new File(mUsersDir, Integer.toString(id) + ".xml"));
755 fis = userFile.openRead();
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700756 XmlPullParser parser = Xml.newPullParser();
757 parser.setInput(fis, null);
758 int type;
759 while ((type = parser.next()) != XmlPullParser.START_TAG
760 && type != XmlPullParser.END_DOCUMENT) {
761 ;
762 }
763
764 if (type != XmlPullParser.START_TAG) {
Amith Yamasani0b285492011-04-14 17:35:23 -0700765 Slog.e(LOG_TAG, "Unable to read user " + id);
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700766 return null;
767 }
768
769 if (type == XmlPullParser.START_TAG && parser.getName().equals(TAG_USER)) {
Amith Yamasani920ace02012-09-20 22:15:37 -0700770 int storedId = readIntAttribute(parser, ATTR_ID, -1);
771 if (storedId != id) {
Amith Yamasani0b285492011-04-14 17:35:23 -0700772 Slog.e(LOG_TAG, "User id does not match the file name");
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700773 return null;
774 }
Amith Yamasani920ace02012-09-20 22:15:37 -0700775 serialNumber = readIntAttribute(parser, ATTR_SERIAL_NO, id);
776 flags = readIntAttribute(parser, ATTR_FLAGS, 0);
Amith Yamasanib8151ec2012-04-18 18:02:48 -0700777 iconPath = parser.getAttributeValue(null, ATTR_ICON_PATH);
Amith Yamasani920ace02012-09-20 22:15:37 -0700778 creationTime = readLongAttribute(parser, ATTR_CREATION_TIME, 0);
779 lastLoggedInTime = readLongAttribute(parser, ATTR_LAST_LOGGED_IN_TIME, 0);
Amith Yamasani655d0e22013-06-12 14:19:10 -0700780 salt = readLongAttribute(parser, ATTR_SALT, 0L);
781 pinHash = parser.getAttributeValue(null, ATTR_PIN_HASH);
782 failedAttempts = readIntAttribute(parser, ATTR_FAILED_ATTEMPTS, 0);
783 lastAttemptTime = readLongAttribute(parser, ATTR_LAST_RETRY_MS, 0L);
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700784 String valueString = parser.getAttributeValue(null, ATTR_PARTIAL);
785 if ("true".equals(valueString)) {
786 partial = true;
787 }
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700788
Amith Yamasanie4cf7342012-12-17 11:12:09 -0800789 int outerDepth = parser.getDepth();
790 while ((type = parser.next()) != XmlPullParser.END_DOCUMENT
791 && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) {
792 if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) {
793 continue;
794 }
795 String tag = parser.getName();
796 if (TAG_NAME.equals(tag)) {
797 type = parser.next();
798 if (type == XmlPullParser.TEXT) {
799 name = parser.getText();
800 }
801 } else if (TAG_RESTRICTIONS.equals(tag)) {
Amith Yamasani71e6c692013-03-24 17:39:28 -0700802 readBoolean(parser, restrictions, UserManager.DISALLOW_CONFIG_WIFI);
803 readBoolean(parser, restrictions, UserManager.DISALLOW_MODIFY_ACCOUNTS);
804 readBoolean(parser, restrictions, UserManager.DISALLOW_INSTALL_APPS);
805 readBoolean(parser, restrictions, UserManager.DISALLOW_UNINSTALL_APPS);
806 readBoolean(parser, restrictions, UserManager.DISALLOW_SHARE_LOCATION);
Maggie Benthalla12fccf2013-03-14 18:02:12 -0400807 readBoolean(parser, restrictions,
808 UserManager.DISALLOW_INSTALL_UNKNOWN_SOURCES);
809 readBoolean(parser, restrictions, UserManager.DISALLOW_CONFIG_BLUETOOTH);
810 readBoolean(parser, restrictions, UserManager.DISALLOW_USB_FILE_TRANSFER);
Emily Bernierb223f732013-04-11 15:46:36 -0400811 readBoolean(parser, restrictions, UserManager.DISALLOW_CONFIG_CREDENTIALS);
812 readBoolean(parser, restrictions, UserManager.DISALLOW_REMOVE_USER);
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700813 }
814 }
815 }
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700816
Amith Yamasanib8151ec2012-04-18 18:02:48 -0700817 UserInfo userInfo = new UserInfo(id, name, iconPath, flags);
Amith Yamasani2a003292012-08-14 18:25:45 -0700818 userInfo.serialNumber = serialNumber;
Amith Yamasani920ace02012-09-20 22:15:37 -0700819 userInfo.creationTime = creationTime;
820 userInfo.lastLoggedInTime = lastLoggedInTime;
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700821 userInfo.partial = partial;
Amith Yamasanie4cf7342012-12-17 11:12:09 -0800822 mUserRestrictions.append(id, restrictions);
Amith Yamasani655d0e22013-06-12 14:19:10 -0700823 if (salt != 0L) {
824 RestrictionsPinState pinState = mRestrictionsPinStates.get(id);
825 if (pinState == null) {
826 pinState = new RestrictionsPinState();
827 mRestrictionsPinStates.put(id, pinState);
828 }
829 pinState.salt = salt;
830 pinState.pinHash = pinHash;
831 pinState.failedAttempts = failedAttempts;
832 pinState.lastAttemptTime = lastAttemptTime;
833 }
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700834 return userInfo;
835
836 } catch (IOException ioe) {
837 } catch (XmlPullParserException pe) {
Dianne Hackbornbfd89b32011-12-15 18:22:54 -0800838 } finally {
839 if (fis != null) {
840 try {
841 fis.close();
842 } catch (IOException e) {
843 }
844 }
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700845 }
846 return null;
847 }
848
Amith Yamasanie4cf7342012-12-17 11:12:09 -0800849 private void readBoolean(XmlPullParser parser, Bundle restrictions,
850 String restrictionKey) {
851 String value = parser.getAttributeValue(null, restrictionKey);
Amith Yamasani71e6c692013-03-24 17:39:28 -0700852 if (value != null) {
853 restrictions.putBoolean(restrictionKey, Boolean.parseBoolean(value));
854 }
Amith Yamasanie4cf7342012-12-17 11:12:09 -0800855 }
856
857 private void writeBoolean(XmlSerializer xml, Bundle restrictions, String restrictionKey)
858 throws IOException {
859 if (restrictions.containsKey(restrictionKey)) {
860 xml.attribute(null, restrictionKey,
861 Boolean.toString(restrictions.getBoolean(restrictionKey)));
862 }
863 }
864
Amith Yamasani920ace02012-09-20 22:15:37 -0700865 private int readIntAttribute(XmlPullParser parser, String attr, int defaultValue) {
866 String valueString = parser.getAttributeValue(null, attr);
867 if (valueString == null) return defaultValue;
868 try {
869 return Integer.parseInt(valueString);
870 } catch (NumberFormatException nfe) {
871 return defaultValue;
872 }
873 }
874
875 private long readLongAttribute(XmlPullParser parser, String attr, long defaultValue) {
876 String valueString = parser.getAttributeValue(null, attr);
877 if (valueString == null) return defaultValue;
878 try {
879 return Long.parseLong(valueString);
880 } catch (NumberFormatException nfe) {
881 return defaultValue;
882 }
883 }
884
Amith Yamasani1a7472e2013-07-02 11:17:30 -0700885 private boolean isPackageInstalled(String pkg, int userId) {
886 final ApplicationInfo info = mPm.getApplicationInfo(pkg,
887 PackageManager.GET_UNINSTALLED_PACKAGES,
888 userId);
889 if (info == null || (info.flags&ApplicationInfo.FLAG_INSTALLED) == 0) {
890 return false;
891 }
892 return true;
893 }
894
Amith Yamasanib82add22013-07-09 11:24:44 -0700895 /**
Amith Yamasani1a7472e2013-07-02 11:17:30 -0700896 * Removes all the restrictions files (res_<packagename>) for a given user, if all is true,
897 * else removes only those packages that have been uninstalled.
Amith Yamasanib82add22013-07-09 11:24:44 -0700898 * Does not do any permissions checking.
899 */
Amith Yamasani1a7472e2013-07-02 11:17:30 -0700900 private void cleanAppRestrictions(int userId, boolean all) {
Amith Yamasanib82add22013-07-09 11:24:44 -0700901 synchronized (mPackagesLock) {
902 File dir = Environment.getUserSystemDirectory(userId);
903 String[] files = dir.list();
904 if (files == null) return;
905 for (String fileName : files) {
906 if (fileName.startsWith(RESTRICTIONS_FILE_PREFIX)) {
907 File resFile = new File(dir, fileName);
908 if (resFile.exists()) {
Amith Yamasani1a7472e2013-07-02 11:17:30 -0700909 if (all) {
910 resFile.delete();
911 } else {
912 String pkg = fileName.substring(RESTRICTIONS_FILE_PREFIX.length());
913 if (!isPackageInstalled(pkg, userId)) {
914 resFile.delete();
915 }
916 }
Amith Yamasanib82add22013-07-09 11:24:44 -0700917 }
918 }
919 }
920 }
921 }
922
Amith Yamasani1a7472e2013-07-02 11:17:30 -0700923 /**
924 * Removes the app restrictions file for a specific package and user id, if it exists.
925 */
926 private void cleanAppRestrictionsForPackage(String pkg, int userId) {
927 synchronized (mPackagesLock) {
928 File dir = Environment.getUserSystemDirectory(userId);
929 File resFile = new File(dir, RESTRICTIONS_FILE_PREFIX + pkg);
930 if (resFile.exists()) {
931 resFile.delete();
932 }
933 }
934 }
935
Amith Yamasani258848d2012-08-10 17:06:33 -0700936 @Override
Amith Yamasani13593602012-03-22 16:16:17 -0700937 public UserInfo createUser(String name, int flags) {
Amith Yamasani2a003292012-08-14 18:25:45 -0700938 checkManageUsersPermission("Only the system can create users");
Amith Yamasanifaea76f2012-09-11 10:59:48 -0700939
Dianne Hackborn5dc5a002012-09-15 19:33:48 -0700940 final long ident = Binder.clearCallingIdentity();
941 final UserInfo userInfo;
942 try {
943 synchronized (mInstallLock) {
944 synchronized (mPackagesLock) {
945 if (isUserLimitReachedLocked()) return null;
946 int userId = getNextAvailableIdLocked();
947 userInfo = new UserInfo(userId, name, null, flags);
948 File userPath = new File(mBaseUserPath, Integer.toString(userId));
949 userInfo.serialNumber = mNextSerialNumber++;
Amith Yamasani920ace02012-09-20 22:15:37 -0700950 long now = System.currentTimeMillis();
951 userInfo.creationTime = (now > EPOCH_PLUS_30_YEARS) ? now : 0;
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700952 userInfo.partial = true;
Amith Yamasani16389312012-10-17 21:20:14 -0700953 Environment.getUserSystemDirectory(userInfo.id).mkdirs();
Dianne Hackborn5dc5a002012-09-15 19:33:48 -0700954 mUsers.put(userId, userInfo);
955 writeUserListLocked();
956 writeUserLocked(userInfo);
Dianne Hackborn5dc5a002012-09-15 19:33:48 -0700957 mPm.createNewUserLILPw(userId, userPath);
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -0700958 userInfo.partial = false;
959 writeUserLocked(userInfo);
960 updateUserIdsLocked();
Geoffrey Borggaarde45e45e32013-01-24 10:03:20 -0500961 Bundle restrictions = new Bundle();
Geoffrey Borggaarde45e45e32013-01-24 10:03:20 -0500962 mUserRestrictions.append(userId, restrictions);
Dianne Hackborn5dc5a002012-09-15 19:33:48 -0700963 }
Dianne Hackborn4428e172012-08-24 17:43:05 -0700964 }
Dianne Hackborn5dc5a002012-09-15 19:33:48 -0700965 if (userInfo != null) {
966 Intent addedIntent = new Intent(Intent.ACTION_USER_ADDED);
967 addedIntent.putExtra(Intent.EXTRA_USER_HANDLE, userInfo.id);
968 mContext.sendBroadcastAsUser(addedIntent, UserHandle.ALL,
969 android.Manifest.permission.MANAGE_USERS);
970 }
971 } finally {
972 Binder.restoreCallingIdentity(ident);
Amith Yamasani258848d2012-08-10 17:06:33 -0700973 }
Amith Yamasani4b2e9342011-03-31 12:38:53 -0700974 return userInfo;
975 }
976
Amith Yamasani0b285492011-04-14 17:35:23 -0700977 /**
978 * Removes a user and all data directories created for that user. This method should be called
979 * after the user's processes have been terminated.
980 * @param id the user's id
981 */
Amith Yamasani258848d2012-08-10 17:06:33 -0700982 public boolean removeUser(int userHandle) {
Amith Yamasani2a003292012-08-14 18:25:45 -0700983 checkManageUsersPermission("Only the system can remove users");
Dianne Hackborn80a4af22012-08-27 19:18:31 -0700984 final UserInfo user;
985 synchronized (mPackagesLock) {
986 user = mUsers.get(userHandle);
987 if (userHandle == 0 || user == null) {
988 return false;
989 }
Jeff Sharkeyffe0cb42012-11-05 17:24:43 -0800990 mRemovingUserIds.put(userHandle, true);
Amith Yamasani756901d2012-10-12 12:30:07 -0700991 // Set this to a partially created user, so that the user will be purged
992 // on next startup, in case the runtime stops now before stopping and
993 // removing the user completely.
994 user.partial = true;
995 writeUserLocked(user);
Dianne Hackborn80a4af22012-08-27 19:18:31 -0700996 }
Amith Yamasani16389312012-10-17 21:20:14 -0700997 if (DBG) Slog.i(LOG_TAG, "Stopping user " + userHandle);
Dianne Hackborn80a4af22012-08-27 19:18:31 -0700998 int res;
999 try {
1000 res = ActivityManagerNative.getDefault().stopUser(userHandle,
1001 new IStopUserCallback.Stub() {
1002 @Override
1003 public void userStopped(int userId) {
1004 finishRemoveUser(userId);
1005 }
1006 @Override
1007 public void userStopAborted(int userId) {
1008 }
1009 });
1010 } catch (RemoteException e) {
1011 return false;
1012 }
1013
1014 return res == ActivityManager.USER_OP_SUCCESS;
1015 }
1016
Amith Yamasanidb6a14c2012-10-17 21:16:52 -07001017 void finishRemoveUser(final int userHandle) {
Amith Yamasani16389312012-10-17 21:20:14 -07001018 if (DBG) Slog.i(LOG_TAG, "finishRemoveUser " + userHandle);
Amith Yamasanidb6a14c2012-10-17 21:16:52 -07001019 // Let other services shutdown any activity and clean up their state before completely
1020 // wiping the user's system directory and removing from the user list
Dianne Hackborn5dc5a002012-09-15 19:33:48 -07001021 long ident = Binder.clearCallingIdentity();
1022 try {
1023 Intent addedIntent = new Intent(Intent.ACTION_USER_REMOVED);
1024 addedIntent.putExtra(Intent.EXTRA_USER_HANDLE, userHandle);
Amith Yamasanidb6a14c2012-10-17 21:16:52 -07001025 mContext.sendOrderedBroadcastAsUser(addedIntent, UserHandle.ALL,
1026 android.Manifest.permission.MANAGE_USERS,
1027
1028 new BroadcastReceiver() {
1029 @Override
1030 public void onReceive(Context context, Intent intent) {
1031 if (DBG) {
1032 Slog.i(LOG_TAG,
1033 "USER_REMOVED broadcast sent, cleaning up user data "
1034 + userHandle);
1035 }
1036 new Thread() {
1037 public void run() {
1038 synchronized (mInstallLock) {
1039 synchronized (mPackagesLock) {
1040 removeUserStateLocked(userHandle);
1041 }
1042 }
1043 }
1044 }.start();
1045 }
1046 },
1047
1048 null, Activity.RESULT_OK, null, null);
Dianne Hackborn5dc5a002012-09-15 19:33:48 -07001049 } finally {
1050 Binder.restoreCallingIdentity(ident);
1051 }
Amith Yamasani2a003292012-08-14 18:25:45 -07001052 }
1053
Jeff Sharkeyffe0cb42012-11-05 17:24:43 -08001054 private void removeUserStateLocked(final int userHandle) {
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -07001055 // Cleanup package manager settings
1056 mPm.cleanUpUserLILPw(userHandle);
1057
1058 // Remove this user from the list
1059 mUsers.remove(userHandle);
Jeff Sharkeyffe0cb42012-11-05 17:24:43 -08001060
1061 // Have user ID linger for several seconds to let external storage VFS
1062 // cache entries expire. This must be greater than the 'entry_valid'
1063 // timeout used by the FUSE daemon.
1064 mHandler.postDelayed(new Runnable() {
1065 @Override
1066 public void run() {
1067 synchronized (mPackagesLock) {
1068 mRemovingUserIds.delete(userHandle);
1069 }
1070 }
1071 }, MINUTE_IN_MILLIS);
1072
Amith Yamasani655d0e22013-06-12 14:19:10 -07001073 mRestrictionsPinStates.remove(userHandle);
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -07001074 // Remove user file
1075 AtomicFile userFile = new AtomicFile(new File(mUsersDir, userHandle + ".xml"));
1076 userFile.delete();
1077 // Update the user list
1078 writeUserListLocked();
1079 updateUserIdsLocked();
1080 removeDirectoryRecursive(Environment.getUserSystemDirectory(userHandle));
1081 }
1082
Amith Yamasani61f57372012-08-31 12:12:28 -07001083 private void removeDirectoryRecursive(File parent) {
1084 if (parent.isDirectory()) {
1085 String[] files = parent.list();
1086 for (String filename : files) {
1087 File child = new File(parent, filename);
1088 removeDirectoryRecursive(child);
1089 }
1090 }
1091 parent.delete();
1092 }
1093
Amith Yamasani2a003292012-08-14 18:25:45 -07001094 @Override
Amith Yamasani7e99bc02013-04-16 18:24:51 -07001095 public Bundle getApplicationRestrictions(String packageName) {
1096 return getApplicationRestrictionsForUser(packageName, UserHandle.getCallingUserId());
1097 }
1098
1099 @Override
1100 public Bundle getApplicationRestrictionsForUser(String packageName, int userId) {
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001101 if (UserHandle.getCallingUserId() != userId
Amith Yamasani9429afb2013-04-10 18:40:51 -07001102 || !UserHandle.isSameApp(Binder.getCallingUid(), getUidForPackage(packageName))) {
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001103 checkManageUsersPermission("Only system can get restrictions for other users/apps");
1104 }
1105 synchronized (mPackagesLock) {
1106 // Read the restrictions from XML
1107 return readApplicationRestrictionsLocked(packageName, userId);
1108 }
1109 }
1110
1111 @Override
Amith Yamasani7e99bc02013-04-16 18:24:51 -07001112 public void setApplicationRestrictions(String packageName, Bundle restrictions,
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001113 int userId) {
1114 if (UserHandle.getCallingUserId() != userId
Amith Yamasani9429afb2013-04-10 18:40:51 -07001115 || !UserHandle.isSameApp(Binder.getCallingUid(), getUidForPackage(packageName))) {
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001116 checkManageUsersPermission("Only system can set restrictions for other users/apps");
1117 }
1118 synchronized (mPackagesLock) {
1119 // Write the restrictions to XML
Amith Yamasani7e99bc02013-04-16 18:24:51 -07001120 writeApplicationRestrictionsLocked(packageName, restrictions, userId);
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001121 }
1122 }
1123
Amith Yamasani655d0e22013-06-12 14:19:10 -07001124 @Override
Amith Yamasanid304af62013-09-05 09:30:23 -07001125 public boolean setRestrictionsChallenge(String newPin) {
Amith Yamasani655d0e22013-06-12 14:19:10 -07001126 checkManageUsersPermission("Only system can modify the restrictions pin");
1127 int userId = UserHandle.getCallingUserId();
1128 synchronized (mPackagesLock) {
1129 RestrictionsPinState pinState = mRestrictionsPinStates.get(userId);
1130 if (pinState == null) {
1131 pinState = new RestrictionsPinState();
1132 }
1133 if (newPin == null) {
1134 pinState.salt = 0;
1135 pinState.pinHash = null;
1136 } else {
1137 try {
1138 pinState.salt = SecureRandom.getInstance("SHA1PRNG").nextLong();
1139 } catch (NoSuchAlgorithmException e) {
1140 pinState.salt = (long) (Math.random() * Long.MAX_VALUE);
1141 }
1142 pinState.pinHash = passwordToHash(newPin, pinState.salt);
1143 pinState.failedAttempts = 0;
1144 }
1145 mRestrictionsPinStates.put(userId, pinState);
1146 writeUserLocked(mUsers.get(userId));
1147 }
1148 return true;
1149 }
1150
1151 @Override
Amith Yamasanid304af62013-09-05 09:30:23 -07001152 public int checkRestrictionsChallenge(String pin) {
Amith Yamasani655d0e22013-06-12 14:19:10 -07001153 checkManageUsersPermission("Only system can verify the restrictions pin");
1154 int userId = UserHandle.getCallingUserId();
1155 synchronized (mPackagesLock) {
1156 RestrictionsPinState pinState = mRestrictionsPinStates.get(userId);
1157 // If there's no pin set, return error code
1158 if (pinState == null || pinState.salt == 0 || pinState.pinHash == null) {
1159 return UserManager.PIN_VERIFICATION_FAILED_NOT_SET;
1160 } else if (pin == null) {
1161 // If just checking if user can be prompted, return remaining time
1162 int waitTime = getRemainingTimeForPinAttempt(pinState);
1163 Slog.d(LOG_TAG, "Remaining waittime peek=" + waitTime);
1164 return waitTime;
1165 } else {
1166 int waitTime = getRemainingTimeForPinAttempt(pinState);
1167 Slog.d(LOG_TAG, "Remaining waittime=" + waitTime);
1168 if (waitTime > 0) {
1169 return waitTime;
1170 }
1171 if (passwordToHash(pin, pinState.salt).equals(pinState.pinHash)) {
1172 pinState.failedAttempts = 0;
1173 writeUserLocked(mUsers.get(userId));
1174 return UserManager.PIN_VERIFICATION_SUCCESS;
1175 } else {
1176 pinState.failedAttempts++;
1177 pinState.lastAttemptTime = System.currentTimeMillis();
1178 writeUserLocked(mUsers.get(userId));
1179 return waitTime;
1180 }
1181 }
1182 }
1183 }
1184
1185 private int getRemainingTimeForPinAttempt(RestrictionsPinState pinState) {
1186 int backoffIndex = Math.min(pinState.failedAttempts / BACKOFF_INC_INTERVAL,
1187 BACKOFF_TIMES.length - 1);
1188 int backoffTime = (pinState.failedAttempts % BACKOFF_INC_INTERVAL) == 0 ?
1189 BACKOFF_TIMES[backoffIndex] : 0;
1190 return (int) Math.max(backoffTime + pinState.lastAttemptTime - System.currentTimeMillis(),
1191 0);
1192 }
1193
1194 @Override
Amith Yamasanid304af62013-09-05 09:30:23 -07001195 public boolean hasRestrictionsChallenge() {
Amith Yamasani655d0e22013-06-12 14:19:10 -07001196 int userId = UserHandle.getCallingUserId();
1197 synchronized (mPackagesLock) {
Amith Yamasani0343ec32013-07-22 14:52:06 -07001198 return hasRestrictionsPinLocked(userId);
1199 }
1200 }
1201
1202 private boolean hasRestrictionsPinLocked(int userId) {
1203 RestrictionsPinState pinState = mRestrictionsPinStates.get(userId);
1204 if (pinState == null || pinState.salt == 0 || pinState.pinHash == null) {
1205 return false;
Amith Yamasani655d0e22013-06-12 14:19:10 -07001206 }
1207 return true;
1208 }
1209
Amith Yamasani1a7472e2013-07-02 11:17:30 -07001210 @Override
1211 public void removeRestrictions() {
1212 checkManageUsersPermission("Only system can remove restrictions");
1213 final int userHandle = UserHandle.getCallingUserId();
Amith Yamasani5e486f52013-08-07 11:06:44 -07001214 removeRestrictionsForUser(userHandle, true);
Amith Yamasani350962c2013-08-06 11:18:53 -07001215 }
1216
Amith Yamasani5e486f52013-08-07 11:06:44 -07001217 private void removeRestrictionsForUser(final int userHandle, boolean unblockApps) {
Amith Yamasani1a7472e2013-07-02 11:17:30 -07001218 synchronized (mPackagesLock) {
1219 // Remove all user restrictions
1220 setUserRestrictions(new Bundle(), userHandle);
1221 // Remove restrictions pin
Amith Yamasanid304af62013-09-05 09:30:23 -07001222 setRestrictionsChallenge(null);
Amith Yamasani1a7472e2013-07-02 11:17:30 -07001223 // Remove any app restrictions
1224 cleanAppRestrictions(userHandle, true);
1225 }
Amith Yamasani5e486f52013-08-07 11:06:44 -07001226 if (unblockApps) {
1227 unblockAllAppsForUser(userHandle);
1228 }
1229 }
1230
1231 private void unblockAllAppsForUser(final int userHandle) {
Amith Yamasani1a7472e2013-07-02 11:17:30 -07001232 mHandler.post(new Runnable() {
1233 @Override
1234 public void run() {
1235 List<ApplicationInfo> apps =
1236 mPm.getInstalledApplications(PackageManager.GET_UNINSTALLED_PACKAGES,
1237 userHandle).getList();
1238 final long ident = Binder.clearCallingIdentity();
1239 try {
1240 for (ApplicationInfo appInfo : apps) {
1241 if ((appInfo.flags & ApplicationInfo.FLAG_INSTALLED) != 0
1242 && (appInfo.flags & ApplicationInfo.FLAG_BLOCKED) != 0) {
1243 mPm.setApplicationBlockedSettingAsUser(appInfo.packageName, false,
1244 userHandle);
1245 }
1246 }
1247 } finally {
1248 Binder.restoreCallingIdentity(ident);
1249 }
1250 }
1251 });
1252 }
1253
Amith Yamasani655d0e22013-06-12 14:19:10 -07001254 /*
1255 * Generate a hash for the given password. To avoid brute force attacks, we use a salted hash.
1256 * Not the most secure, but it is at least a second level of protection. First level is that
1257 * the file is in a location only readable by the system process.
1258 * @param password the password.
1259 * @param salt the randomly generated salt
1260 * @return the hash of the pattern in a String.
1261 */
1262 private String passwordToHash(String password, long salt) {
1263 if (password == null) {
1264 return null;
1265 }
1266 String algo = null;
1267 String hashed = salt + password;
1268 try {
1269 byte[] saltedPassword = (password + salt).getBytes();
1270 byte[] sha1 = MessageDigest.getInstance(algo = "SHA-1").digest(saltedPassword);
1271 byte[] md5 = MessageDigest.getInstance(algo = "MD5").digest(saltedPassword);
1272 hashed = toHex(sha1) + toHex(md5);
1273 } catch (NoSuchAlgorithmException e) {
1274 Log.w(LOG_TAG, "Failed to encode string because of missing algorithm: " + algo);
1275 }
1276 return hashed;
1277 }
1278
1279 private static String toHex(byte[] ary) {
1280 final String hex = "0123456789ABCDEF";
1281 String ret = "";
1282 for (int i = 0; i < ary.length; i++) {
1283 ret += hex.charAt((ary[i] >> 4) & 0xf);
1284 ret += hex.charAt(ary[i] & 0xf);
1285 }
1286 return ret;
1287 }
1288
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001289 private int getUidForPackage(String packageName) {
Amith Yamasani9429afb2013-04-10 18:40:51 -07001290 long ident = Binder.clearCallingIdentity();
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001291 try {
1292 return mContext.getPackageManager().getApplicationInfo(packageName,
1293 PackageManager.GET_UNINSTALLED_PACKAGES).uid;
1294 } catch (NameNotFoundException nnfe) {
1295 return -1;
Amith Yamasani9429afb2013-04-10 18:40:51 -07001296 } finally {
1297 Binder.restoreCallingIdentity(ident);
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001298 }
1299 }
1300
Amith Yamasani7e99bc02013-04-16 18:24:51 -07001301 private Bundle readApplicationRestrictionsLocked(String packageName,
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001302 int userId) {
Amith Yamasani7e99bc02013-04-16 18:24:51 -07001303 final Bundle restrictions = new Bundle();
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001304 final ArrayList<String> values = new ArrayList<String>();
1305
1306 FileInputStream fis = null;
1307 try {
1308 AtomicFile restrictionsFile =
1309 new AtomicFile(new File(Environment.getUserSystemDirectory(userId),
1310 RESTRICTIONS_FILE_PREFIX + packageName + ".xml"));
1311 fis = restrictionsFile.openRead();
1312 XmlPullParser parser = Xml.newPullParser();
1313 parser.setInput(fis, null);
1314 int type;
1315 while ((type = parser.next()) != XmlPullParser.START_TAG
1316 && type != XmlPullParser.END_DOCUMENT) {
1317 ;
1318 }
1319
1320 if (type != XmlPullParser.START_TAG) {
1321 Slog.e(LOG_TAG, "Unable to read restrictions file "
1322 + restrictionsFile.getBaseFile());
Amith Yamasani7e99bc02013-04-16 18:24:51 -07001323 return restrictions;
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001324 }
1325
1326 while ((type = parser.next()) != XmlPullParser.END_DOCUMENT) {
1327 if (type == XmlPullParser.START_TAG && parser.getName().equals(TAG_ENTRY)) {
1328 String key = parser.getAttributeValue(null, ATTR_KEY);
Amith Yamasani7e99bc02013-04-16 18:24:51 -07001329 String valType = parser.getAttributeValue(null, ATTR_VALUE_TYPE);
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001330 String multiple = parser.getAttributeValue(null, ATTR_MULTIPLE);
1331 if (multiple != null) {
1332 int count = Integer.parseInt(multiple);
1333 while (count > 0 && (type = parser.next()) != XmlPullParser.END_DOCUMENT) {
1334 if (type == XmlPullParser.START_TAG
1335 && parser.getName().equals(TAG_VALUE)) {
1336 values.add(parser.nextText().trim());
1337 count--;
1338 }
1339 }
1340 String [] valueStrings = new String[values.size()];
1341 values.toArray(valueStrings);
Amith Yamasani7e99bc02013-04-16 18:24:51 -07001342 restrictions.putStringArray(key, valueStrings);
1343 } else if (ATTR_TYPE_BOOLEAN.equals(valType)) {
1344 restrictions.putBoolean(key, Boolean.parseBoolean(
1345 parser.nextText().trim()));
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001346 } else {
1347 String value = parser.nextText().trim();
Amith Yamasani7e99bc02013-04-16 18:24:51 -07001348 restrictions.putString(key, value);
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001349 }
1350 }
1351 }
1352
1353 } catch (IOException ioe) {
1354 } catch (XmlPullParserException pe) {
1355 } finally {
1356 if (fis != null) {
1357 try {
1358 fis.close();
1359 } catch (IOException e) {
1360 }
1361 }
1362 }
Amith Yamasani7e99bc02013-04-16 18:24:51 -07001363 return restrictions;
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001364 }
1365
1366 private void writeApplicationRestrictionsLocked(String packageName,
Amith Yamasani7e99bc02013-04-16 18:24:51 -07001367 Bundle restrictions, int userId) {
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001368 FileOutputStream fos = null;
1369 AtomicFile restrictionsFile = new AtomicFile(
1370 new File(Environment.getUserSystemDirectory(userId),
1371 RESTRICTIONS_FILE_PREFIX + packageName + ".xml"));
1372 try {
1373 fos = restrictionsFile.startWrite();
1374 final BufferedOutputStream bos = new BufferedOutputStream(fos);
1375
1376 // XmlSerializer serializer = XmlUtils.serializerInstance();
1377 final XmlSerializer serializer = new FastXmlSerializer();
1378 serializer.setOutput(bos, "utf-8");
1379 serializer.startDocument(null, true);
1380 serializer.setFeature("http://xmlpull.org/v1/doc/features.html#indent-output", true);
1381
1382 serializer.startTag(null, TAG_RESTRICTIONS);
1383
Amith Yamasani7e99bc02013-04-16 18:24:51 -07001384 for (String key : restrictions.keySet()) {
1385 Object value = restrictions.get(key);
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001386 serializer.startTag(null, TAG_ENTRY);
Amith Yamasani7e99bc02013-04-16 18:24:51 -07001387 serializer.attribute(null, ATTR_KEY, key);
1388
1389 if (value instanceof Boolean) {
1390 serializer.attribute(null, ATTR_VALUE_TYPE, ATTR_TYPE_BOOLEAN);
1391 serializer.text(value.toString());
1392 } else if (value == null || value instanceof String) {
1393 serializer.attribute(null, ATTR_VALUE_TYPE, ATTR_TYPE_STRING);
1394 serializer.text(value != null ? (String) value : "");
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001395 } else {
Amith Yamasani7e99bc02013-04-16 18:24:51 -07001396 serializer.attribute(null, ATTR_VALUE_TYPE, ATTR_TYPE_STRING_ARRAY);
1397 String[] values = (String[]) value;
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001398 serializer.attribute(null, ATTR_MULTIPLE, Integer.toString(values.length));
Amith Yamasani7e99bc02013-04-16 18:24:51 -07001399 for (String choice : values) {
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001400 serializer.startTag(null, TAG_VALUE);
Amith Yamasani7e99bc02013-04-16 18:24:51 -07001401 serializer.text(choice != null ? choice : "");
Amith Yamasanidf2e92a2013-03-01 17:04:38 -08001402 serializer.endTag(null, TAG_VALUE);
1403 }
1404 }
1405 serializer.endTag(null, TAG_ENTRY);
1406 }
1407
1408 serializer.endTag(null, TAG_RESTRICTIONS);
1409
1410 serializer.endDocument();
1411 restrictionsFile.finishWrite(fos);
1412 } catch (Exception e) {
1413 restrictionsFile.failWrite(fos);
1414 Slog.e(LOG_TAG, "Error writing application restrictions list");
1415 }
1416 }
1417
1418 @Override
Amith Yamasani2a003292012-08-14 18:25:45 -07001419 public int getUserSerialNumber(int userHandle) {
Dianne Hackborn4428e172012-08-24 17:43:05 -07001420 synchronized (mPackagesLock) {
Amith Yamasani2a003292012-08-14 18:25:45 -07001421 if (!exists(userHandle)) return -1;
Amith Yamasani195263742012-08-21 15:40:12 -07001422 return getUserInfoLocked(userHandle).serialNumber;
Amith Yamasani2a003292012-08-14 18:25:45 -07001423 }
1424 }
1425
1426 @Override
1427 public int getUserHandle(int userSerialNumber) {
Dianne Hackborn4428e172012-08-24 17:43:05 -07001428 synchronized (mPackagesLock) {
Amith Yamasani2a003292012-08-14 18:25:45 -07001429 for (int userId : mUserIds) {
Amith Yamasani195263742012-08-21 15:40:12 -07001430 if (getUserInfoLocked(userId).serialNumber == userSerialNumber) return userId;
Amith Yamasani2a003292012-08-14 18:25:45 -07001431 }
1432 // Not found
1433 return -1;
Amith Yamasani13593602012-03-22 16:16:17 -07001434 }
1435 }
1436
Amith Yamasani0b285492011-04-14 17:35:23 -07001437 /**
1438 * Caches the list of user ids in an array, adjusting the array size when necessary.
1439 */
Amith Yamasani13593602012-03-22 16:16:17 -07001440 private void updateUserIdsLocked() {
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -07001441 int num = 0;
Amith Yamasani0b285492011-04-14 17:35:23 -07001442 for (int i = 0; i < mUsers.size(); i++) {
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -07001443 if (!mUsers.valueAt(i).partial) {
1444 num++;
1445 }
1446 }
Amith Yamasani16389312012-10-17 21:20:14 -07001447 final int[] newUsers = new int[num];
1448 int n = 0;
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -07001449 for (int i = 0; i < mUsers.size(); i++) {
1450 if (!mUsers.valueAt(i).partial) {
Amith Yamasani16389312012-10-17 21:20:14 -07001451 newUsers[n++] = mUsers.keyAt(i);
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -07001452 }
Amith Yamasani0b285492011-04-14 17:35:23 -07001453 }
Dianne Hackborn7767eac2012-08-23 18:25:40 -07001454 mUserIds = newUsers;
Amith Yamasani0b285492011-04-14 17:35:23 -07001455 }
1456
1457 /**
Amith Yamasani1a7472e2013-07-02 11:17:30 -07001458 * Make a note of the last started time of a user and do some cleanup.
Amith Yamasani920ace02012-09-20 22:15:37 -07001459 * @param userId the user that was just foregrounded
1460 */
1461 public void userForeground(int userId) {
1462 synchronized (mPackagesLock) {
1463 UserInfo user = mUsers.get(userId);
1464 long now = System.currentTimeMillis();
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -07001465 if (user == null || user.partial) {
1466 Slog.w(LOG_TAG, "userForeground: unknown user #" + userId);
1467 return;
1468 }
1469 if (now > EPOCH_PLUS_30_YEARS) {
Amith Yamasani920ace02012-09-20 22:15:37 -07001470 user.lastLoggedInTime = now;
1471 writeUserLocked(user);
1472 }
Amith Yamasani1a7472e2013-07-02 11:17:30 -07001473 // If this is not a restricted profile and there is no restrictions pin, clean up
1474 // all restrictions files that might have been left behind, else clean up just the
1475 // ones with uninstalled packages
1476 RestrictionsPinState pinState = mRestrictionsPinStates.get(userId);
1477 final long salt = pinState == null ? 0 : pinState.salt;
1478 cleanAppRestrictions(userId, (!user.isRestricted() && salt == 0));
Amith Yamasani920ace02012-09-20 22:15:37 -07001479 }
1480 }
1481
1482 /**
Amith Yamasani0b285492011-04-14 17:35:23 -07001483 * Returns the next available user id, filling in any holes in the ids.
Amith Yamasani742a6712011-05-04 14:49:28 -07001484 * TODO: May not be a good idea to recycle ids, in case it results in confusion
1485 * for data and battery stats collection, or unexpected cross-talk.
Amith Yamasani0b285492011-04-14 17:35:23 -07001486 * @return
1487 */
Dianne Hackborn5dc5a002012-09-15 19:33:48 -07001488 private int getNextAvailableIdLocked() {
Dianne Hackborn4428e172012-08-24 17:43:05 -07001489 synchronized (mPackagesLock) {
Jeff Sharkeyffe0cb42012-11-05 17:24:43 -08001490 int i = MIN_USER_ID;
Amith Yamasani195263742012-08-21 15:40:12 -07001491 while (i < Integer.MAX_VALUE) {
Jeff Sharkeyffe0cb42012-11-05 17:24:43 -08001492 if (mUsers.indexOfKey(i) < 0 && !mRemovingUserIds.get(i)) {
Amith Yamasani195263742012-08-21 15:40:12 -07001493 break;
1494 }
1495 i++;
Amith Yamasani4b2e9342011-03-31 12:38:53 -07001496 }
Amith Yamasani195263742012-08-21 15:40:12 -07001497 return i;
Amith Yamasani4b2e9342011-03-31 12:38:53 -07001498 }
Amith Yamasani4b2e9342011-03-31 12:38:53 -07001499 }
Amith Yamasani920ace02012-09-20 22:15:37 -07001500
1501 @Override
1502 protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) {
1503 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
1504 != PackageManager.PERMISSION_GRANTED) {
1505 pw.println("Permission Denial: can't dump UserManager from from pid="
1506 + Binder.getCallingPid()
1507 + ", uid=" + Binder.getCallingUid()
1508 + " without permission "
1509 + android.Manifest.permission.DUMP);
1510 return;
1511 }
1512
1513 long now = System.currentTimeMillis();
1514 StringBuilder sb = new StringBuilder();
1515 synchronized (mPackagesLock) {
1516 pw.println("Users:");
1517 for (int i = 0; i < mUsers.size(); i++) {
1518 UserInfo user = mUsers.valueAt(i);
1519 if (user == null) continue;
Amith Yamasani634cf312012-10-04 17:34:21 -07001520 pw.print(" "); pw.print(user); pw.print(" serialNo="); pw.print(user.serialNumber);
Jeff Sharkeyffe0cb42012-11-05 17:24:43 -08001521 if (mRemovingUserIds.get(mUsers.keyAt(i))) pw.print(" <removing> ");
Dianne Hackbornd4ac8d72012-09-27 23:20:10 -07001522 if (user.partial) pw.print(" <partial>");
1523 pw.println();
Amith Yamasani920ace02012-09-20 22:15:37 -07001524 pw.print(" Created: ");
1525 if (user.creationTime == 0) {
1526 pw.println("<unknown>");
1527 } else {
1528 sb.setLength(0);
1529 TimeUtils.formatDuration(now - user.creationTime, sb);
1530 sb.append(" ago");
1531 pw.println(sb);
1532 }
1533 pw.print(" Last logged in: ");
1534 if (user.lastLoggedInTime == 0) {
1535 pw.println("<unknown>");
1536 } else {
1537 sb.setLength(0);
1538 TimeUtils.formatDuration(now - user.lastLoggedInTime, sb);
1539 sb.append(" ago");
1540 pw.println(sb);
1541 }
1542 }
1543 }
1544 }
Amith Yamasani1a7472e2013-07-02 11:17:30 -07001545
1546 private PackageMonitor mUserPackageMonitor = new PackageMonitor() {
1547 @Override
1548 public void onPackageRemoved(String pkg, int uid) {
1549 final int userId = this.getChangingUserId();
1550 // Package could be disappearing because it is being blocked, so also check if
1551 // it has been uninstalled.
1552 final boolean uninstalled = isPackageDisappearing(pkg) == PACKAGE_PERMANENT_CHANGE;
1553 if (uninstalled && userId >= 0 && !isPackageInstalled(pkg, userId)) {
1554 cleanAppRestrictionsForPackage(pkg, userId);
1555 }
1556 }
1557 };
Amith Yamasani4b2e9342011-03-31 12:38:53 -07001558}