Snap for 6185678 from 39dcf2a1485411d5f9e91ddb1117908df1daf800 to rvc-release
Change-Id: I3bfec3a7d34bb9ccc3b7898dbf6b5e0bb460e0eb
This commit is contained in:
@@ -676,7 +676,8 @@ public class ConnectivityDiagnosticsManager {
|
||||
}
|
||||
|
||||
try {
|
||||
mService.registerConnectivityDiagnosticsCallback(binder, request);
|
||||
mService.registerConnectivityDiagnosticsCallback(
|
||||
binder, request, mContext.getOpPackageName());
|
||||
} catch (RemoteException exception) {
|
||||
exception.rethrowFromSystemServer();
|
||||
}
|
||||
|
||||
@@ -222,7 +222,7 @@ interface IConnectivityManager
|
||||
boolean isCallerCurrentAlwaysOnVpnLockdownApp();
|
||||
|
||||
void registerConnectivityDiagnosticsCallback(in IConnectivityDiagnosticsCallback callback,
|
||||
in NetworkRequest request);
|
||||
in NetworkRequest request, String callingPackageName);
|
||||
void unregisterConnectivityDiagnosticsCallback(in IConnectivityDiagnosticsCallback callback);
|
||||
|
||||
IBinder startOrGetTestNetworkService();
|
||||
|
||||
@@ -858,8 +858,8 @@ public final class NetworkCapabilities implements Parcelable {
|
||||
*
|
||||
* <p>In general, user-supplied networks (such as WiFi networks) do not have an administrator.
|
||||
*
|
||||
* <p>An app is granted owner privileges over Networks that it supplies. Owner privileges
|
||||
* implicitly include administrator privileges.
|
||||
* <p>An app is granted owner privileges over Networks that it supplies. The owner UID MUST
|
||||
* always be included in administratorUids.
|
||||
*
|
||||
* @param administratorUids the UIDs to be set as administrators of this Network.
|
||||
* @hide
|
||||
|
||||
@@ -48,8 +48,11 @@ import static android.os.Process.INVALID_UID;
|
||||
import static android.system.OsConstants.IPPROTO_TCP;
|
||||
import static android.system.OsConstants.IPPROTO_UDP;
|
||||
|
||||
import static java.util.Map.Entry;
|
||||
|
||||
import android.annotation.NonNull;
|
||||
import android.annotation.Nullable;
|
||||
import android.app.AppOpsManager;
|
||||
import android.app.BroadcastOptions;
|
||||
import android.app.NotificationManager;
|
||||
import android.app.PendingIntent;
|
||||
@@ -62,6 +65,8 @@ import android.content.res.Configuration;
|
||||
import android.database.ContentObserver;
|
||||
import android.net.CaptivePortal;
|
||||
import android.net.ConnectionInfo;
|
||||
import android.net.ConnectivityDiagnosticsManager.ConnectivityReport;
|
||||
import android.net.ConnectivityDiagnosticsManager.DataStallReport;
|
||||
import android.net.ConnectivityManager;
|
||||
import android.net.ICaptivePortal;
|
||||
import android.net.IConnectivityDiagnosticsCallback;
|
||||
@@ -130,6 +135,7 @@ import android.os.Message;
|
||||
import android.os.Messenger;
|
||||
import android.os.ParcelFileDescriptor;
|
||||
import android.os.Parcelable;
|
||||
import android.os.PersistableBundle;
|
||||
import android.os.PowerManager;
|
||||
import android.os.Process;
|
||||
import android.os.RemoteException;
|
||||
@@ -170,6 +176,7 @@ import com.android.internal.util.ArrayUtils;
|
||||
import com.android.internal.util.AsyncChannel;
|
||||
import com.android.internal.util.DumpUtils;
|
||||
import com.android.internal.util.IndentingPrintWriter;
|
||||
import com.android.internal.util.LocationPermissionChecker;
|
||||
import com.android.internal.util.MessageUtils;
|
||||
import com.android.internal.util.XmlUtils;
|
||||
import com.android.server.am.BatteryStatsService;
|
||||
@@ -492,9 +499,9 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
/**
|
||||
* Event for NetworkMonitor/NetworkAgentInfo to inform ConnectivityService that the network has
|
||||
* been tested.
|
||||
* obj = String representing URL that Internet probe was redirect to, if it was redirected.
|
||||
* arg1 = One of the NETWORK_TESTED_RESULT_* constants.
|
||||
* arg2 = NetID.
|
||||
* obj = {@link NetworkTestedResults} representing information sent from NetworkMonitor.
|
||||
* data = PersistableBundle of extras passed from NetworkMonitor. If {@link
|
||||
* NetworkMonitorCallbacks#notifyNetworkTested} is called, this will be null.
|
||||
*/
|
||||
private static final int EVENT_NETWORK_TESTED = 41;
|
||||
|
||||
@@ -596,6 +603,9 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
private Set<String> mWolSupportedInterfaces;
|
||||
|
||||
private TelephonyManager mTelephonyManager;
|
||||
private final AppOpsManager mAppOpsManager;
|
||||
|
||||
private final LocationPermissionChecker mLocationPermissionChecker;
|
||||
|
||||
private KeepaliveTracker mKeepaliveTracker;
|
||||
private NetworkNotificationManager mNotifier;
|
||||
@@ -992,6 +1002,8 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
mNetd = netd;
|
||||
mKeyStore = KeyStore.getInstance();
|
||||
mTelephonyManager = (TelephonyManager) mContext.getSystemService(Context.TELEPHONY_SERVICE);
|
||||
mAppOpsManager = (AppOpsManager) mContext.getSystemService(Context.APP_OPS_SERVICE);
|
||||
mLocationPermissionChecker = new LocationPermissionChecker(mContext);
|
||||
|
||||
// To ensure uid rules are synchronized with Network Policy, register for
|
||||
// NetworkPolicyManagerService events must happen prior to NetworkPolicyManagerService
|
||||
@@ -2101,6 +2113,12 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK);
|
||||
}
|
||||
|
||||
private boolean checkNetworkStackPermission(int pid, int uid) {
|
||||
return checkAnyPermissionOf(pid, uid,
|
||||
android.Manifest.permission.NETWORK_STACK,
|
||||
NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK);
|
||||
}
|
||||
|
||||
private boolean checkNetworkSignalStrengthWakeupPermission(int pid, int uid) {
|
||||
return checkAnyPermissionOf(pid, uid,
|
||||
android.Manifest.permission.NETWORK_SIGNAL_STRENGTH_WAKEUP,
|
||||
@@ -2747,88 +2765,21 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
break;
|
||||
}
|
||||
case EVENT_NETWORK_TESTED: {
|
||||
final NetworkAgentInfo nai = getNetworkAgentInfoForNetId(msg.arg2);
|
||||
final NetworkTestedResults results = (NetworkTestedResults) msg.obj;
|
||||
|
||||
final NetworkAgentInfo nai = getNetworkAgentInfoForNetId(results.mNetId);
|
||||
if (nai == null) break;
|
||||
|
||||
final boolean wasPartial = nai.partialConnectivity;
|
||||
nai.partialConnectivity = ((msg.arg1 & NETWORK_VALIDATION_RESULT_PARTIAL) != 0);
|
||||
final boolean partialConnectivityChanged =
|
||||
(wasPartial != nai.partialConnectivity);
|
||||
handleNetworkTested(nai, results.mTestResult,
|
||||
(results.mRedirectUrl == null) ? "" : results.mRedirectUrl);
|
||||
|
||||
final boolean valid = ((msg.arg1 & NETWORK_VALIDATION_RESULT_VALID) != 0);
|
||||
final boolean wasValidated = nai.lastValidated;
|
||||
final boolean wasDefault = isDefaultNetwork(nai);
|
||||
// Only show a connected notification if the network is pending validation
|
||||
// after the captive portal app was open, and it has now validated.
|
||||
if (nai.captivePortalValidationPending && valid) {
|
||||
// User is now logged in, network validated.
|
||||
nai.captivePortalValidationPending = false;
|
||||
showNetworkNotification(nai, NotificationType.LOGGED_IN);
|
||||
}
|
||||
|
||||
final String redirectUrl = (msg.obj instanceof String) ? (String) msg.obj : "";
|
||||
|
||||
if (DBG) {
|
||||
final String logMsg = !TextUtils.isEmpty(redirectUrl)
|
||||
? " with redirect to " + redirectUrl
|
||||
: "";
|
||||
log(nai.name() + " validation " + (valid ? "passed" : "failed") + logMsg);
|
||||
}
|
||||
if (valid != nai.lastValidated) {
|
||||
if (wasDefault) {
|
||||
mDeps.getMetricsLogger()
|
||||
.defaultNetworkMetrics().logDefaultNetworkValidity(
|
||||
SystemClock.elapsedRealtime(), valid);
|
||||
}
|
||||
final int oldScore = nai.getCurrentScore();
|
||||
nai.lastValidated = valid;
|
||||
nai.everValidated |= valid;
|
||||
updateCapabilities(oldScore, nai, nai.networkCapabilities);
|
||||
// If score has changed, rebroadcast to NetworkProviders. b/17726566
|
||||
if (oldScore != nai.getCurrentScore()) sendUpdatedScoreToFactories(nai);
|
||||
if (valid) {
|
||||
handleFreshlyValidatedNetwork(nai);
|
||||
// Clear NO_INTERNET, PRIVATE_DNS_BROKEN, PARTIAL_CONNECTIVITY and
|
||||
// LOST_INTERNET notifications if network becomes valid.
|
||||
mNotifier.clearNotification(nai.network.netId,
|
||||
NotificationType.NO_INTERNET);
|
||||
mNotifier.clearNotification(nai.network.netId,
|
||||
NotificationType.LOST_INTERNET);
|
||||
mNotifier.clearNotification(nai.network.netId,
|
||||
NotificationType.PARTIAL_CONNECTIVITY);
|
||||
mNotifier.clearNotification(nai.network.netId,
|
||||
NotificationType.PRIVATE_DNS_BROKEN);
|
||||
// If network becomes valid, the hasShownBroken should be reset for
|
||||
// that network so that the notification will be fired when the private
|
||||
// DNS is broken again.
|
||||
nai.networkAgentConfig.hasShownBroken = false;
|
||||
}
|
||||
} else if (partialConnectivityChanged) {
|
||||
updateCapabilities(nai.getCurrentScore(), nai, nai.networkCapabilities);
|
||||
}
|
||||
updateInetCondition(nai);
|
||||
// Let the NetworkAgent know the state of its network
|
||||
Bundle redirectUrlBundle = new Bundle();
|
||||
redirectUrlBundle.putString(NetworkAgent.REDIRECT_URL_KEY, redirectUrl);
|
||||
// TODO: Evaluate to update partial connectivity to status to NetworkAgent.
|
||||
nai.asyncChannel.sendMessage(
|
||||
NetworkAgent.CMD_REPORT_NETWORK_STATUS,
|
||||
(valid ? NetworkAgent.VALID_NETWORK : NetworkAgent.INVALID_NETWORK),
|
||||
0, redirectUrlBundle);
|
||||
|
||||
// If NetworkMonitor detects partial connectivity before
|
||||
// EVENT_PROMPT_UNVALIDATED arrives, show the partial connectivity notification
|
||||
// immediately. Re-notify partial connectivity silently if no internet
|
||||
// notification already there.
|
||||
if (!wasPartial && nai.partialConnectivity) {
|
||||
// Remove delayed message if there is a pending message.
|
||||
mHandler.removeMessages(EVENT_PROMPT_UNVALIDATED, nai.network);
|
||||
handlePromptUnvalidated(nai.network);
|
||||
}
|
||||
|
||||
if (wasValidated && !nai.lastValidated) {
|
||||
handleNetworkUnvalidated(nai);
|
||||
}
|
||||
// Invoke ConnectivityReport generation for this Network test event.
|
||||
final Message m =
|
||||
mConnectivityDiagnosticsHandler.obtainMessage(
|
||||
ConnectivityDiagnosticsHandler.EVENT_NETWORK_TESTED,
|
||||
new ConnectivityReportEvent(results.mTimestampMillis, nai));
|
||||
m.setData(msg.getData());
|
||||
mConnectivityDiagnosticsHandler.sendMessage(m);
|
||||
break;
|
||||
}
|
||||
case EVENT_PROVISIONING_NOTIFICATION: {
|
||||
@@ -2879,6 +2830,87 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
return true;
|
||||
}
|
||||
|
||||
private void handleNetworkTested(
|
||||
@NonNull NetworkAgentInfo nai, int testResult, @NonNull String redirectUrl) {
|
||||
final boolean wasPartial = nai.partialConnectivity;
|
||||
nai.partialConnectivity = ((testResult & NETWORK_VALIDATION_RESULT_PARTIAL) != 0);
|
||||
final boolean partialConnectivityChanged =
|
||||
(wasPartial != nai.partialConnectivity);
|
||||
|
||||
final boolean valid = ((testResult & NETWORK_VALIDATION_RESULT_VALID) != 0);
|
||||
final boolean wasValidated = nai.lastValidated;
|
||||
final boolean wasDefault = isDefaultNetwork(nai);
|
||||
// Only show a connected notification if the network is pending validation
|
||||
// after the captive portal app was open, and it has now validated.
|
||||
if (nai.captivePortalValidationPending && valid) {
|
||||
// User is now logged in, network validated.
|
||||
nai.captivePortalValidationPending = false;
|
||||
showNetworkNotification(nai, NotificationType.LOGGED_IN);
|
||||
}
|
||||
|
||||
if (DBG) {
|
||||
final String logMsg = !TextUtils.isEmpty(redirectUrl)
|
||||
? " with redirect to " + redirectUrl
|
||||
: "";
|
||||
log(nai.name() + " validation " + (valid ? "passed" : "failed") + logMsg);
|
||||
}
|
||||
if (valid != nai.lastValidated) {
|
||||
if (wasDefault) {
|
||||
mDeps.getMetricsLogger()
|
||||
.defaultNetworkMetrics().logDefaultNetworkValidity(
|
||||
SystemClock.elapsedRealtime(), valid);
|
||||
}
|
||||
final int oldScore = nai.getCurrentScore();
|
||||
nai.lastValidated = valid;
|
||||
nai.everValidated |= valid;
|
||||
updateCapabilities(oldScore, nai, nai.networkCapabilities);
|
||||
// If score has changed, rebroadcast to NetworkProviders. b/17726566
|
||||
if (oldScore != nai.getCurrentScore()) sendUpdatedScoreToFactories(nai);
|
||||
if (valid) {
|
||||
handleFreshlyValidatedNetwork(nai);
|
||||
// Clear NO_INTERNET, PRIVATE_DNS_BROKEN, PARTIAL_CONNECTIVITY and
|
||||
// LOST_INTERNET notifications if network becomes valid.
|
||||
mNotifier.clearNotification(nai.network.netId,
|
||||
NotificationType.NO_INTERNET);
|
||||
mNotifier.clearNotification(nai.network.netId,
|
||||
NotificationType.LOST_INTERNET);
|
||||
mNotifier.clearNotification(nai.network.netId,
|
||||
NotificationType.PARTIAL_CONNECTIVITY);
|
||||
mNotifier.clearNotification(nai.network.netId,
|
||||
NotificationType.PRIVATE_DNS_BROKEN);
|
||||
// If network becomes valid, the hasShownBroken should be reset for
|
||||
// that network so that the notification will be fired when the private
|
||||
// DNS is broken again.
|
||||
nai.networkAgentConfig.hasShownBroken = false;
|
||||
}
|
||||
} else if (partialConnectivityChanged) {
|
||||
updateCapabilities(nai.getCurrentScore(), nai, nai.networkCapabilities);
|
||||
}
|
||||
updateInetCondition(nai);
|
||||
// Let the NetworkAgent know the state of its network
|
||||
Bundle redirectUrlBundle = new Bundle();
|
||||
redirectUrlBundle.putString(NetworkAgent.REDIRECT_URL_KEY, redirectUrl);
|
||||
// TODO: Evaluate to update partial connectivity to status to NetworkAgent.
|
||||
nai.asyncChannel.sendMessage(
|
||||
NetworkAgent.CMD_REPORT_NETWORK_STATUS,
|
||||
(valid ? NetworkAgent.VALID_NETWORK : NetworkAgent.INVALID_NETWORK),
|
||||
0, redirectUrlBundle);
|
||||
|
||||
// If NetworkMonitor detects partial connectivity before
|
||||
// EVENT_PROMPT_UNVALIDATED arrives, show the partial connectivity notification
|
||||
// immediately. Re-notify partial connectivity silently if no internet
|
||||
// notification already there.
|
||||
if (!wasPartial && nai.partialConnectivity) {
|
||||
// Remove delayed message if there is a pending message.
|
||||
mHandler.removeMessages(EVENT_PROMPT_UNVALIDATED, nai.network);
|
||||
handlePromptUnvalidated(nai.network);
|
||||
}
|
||||
|
||||
if (wasValidated && !nai.lastValidated) {
|
||||
handleNetworkUnvalidated(nai);
|
||||
}
|
||||
}
|
||||
|
||||
private int getCaptivePortalMode() {
|
||||
return Settings.Global.getInt(mContext.getContentResolver(),
|
||||
Settings.Global.CAPTIVE_PORTAL_MODE,
|
||||
@@ -2927,8 +2959,23 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
|
||||
@Override
|
||||
public void notifyNetworkTested(int testResult, @Nullable String redirectUrl) {
|
||||
mTrackerHandler.sendMessage(mTrackerHandler.obtainMessage(EVENT_NETWORK_TESTED,
|
||||
testResult, mNetId, redirectUrl));
|
||||
notifyNetworkTestedWithExtras(testResult, redirectUrl, SystemClock.elapsedRealtime(),
|
||||
PersistableBundle.EMPTY);
|
||||
}
|
||||
|
||||
@Override
|
||||
public void notifyNetworkTestedWithExtras(
|
||||
int testResult,
|
||||
@Nullable String redirectUrl,
|
||||
long timestampMillis,
|
||||
@NonNull PersistableBundle extras) {
|
||||
final Message msg =
|
||||
mTrackerHandler.obtainMessage(
|
||||
EVENT_NETWORK_TESTED,
|
||||
new NetworkTestedResults(
|
||||
mNetId, testResult, timestampMillis, redirectUrl));
|
||||
msg.setData(new Bundle(extras));
|
||||
mTrackerHandler.sendMessage(msg);
|
||||
}
|
||||
|
||||
@Override
|
||||
@@ -2969,6 +3016,21 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
EVENT_PROVISIONING_NOTIFICATION, PROVISIONING_NOTIFICATION_HIDE, mNetId));
|
||||
}
|
||||
|
||||
@Override
|
||||
public void notifyDataStallSuspected(
|
||||
long timestampMillis, int detectionMethod, PersistableBundle extras) {
|
||||
final Message msg =
|
||||
mConnectivityDiagnosticsHandler.obtainMessage(
|
||||
ConnectivityDiagnosticsHandler.EVENT_DATA_STALL_SUSPECTED,
|
||||
detectionMethod, mNetId, timestampMillis);
|
||||
msg.setData(new Bundle(extras));
|
||||
|
||||
// NetworkStateTrackerHandler currently doesn't take any actions based on data
|
||||
// stalls so send the message directly to ConnectivityDiagnosticsHandler and avoid
|
||||
// the cost of going through two handlers.
|
||||
mConnectivityDiagnosticsHandler.sendMessage(msg);
|
||||
}
|
||||
|
||||
@Override
|
||||
public int getInterfaceVersion() {
|
||||
return this.VERSION;
|
||||
@@ -4143,6 +4205,19 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
final int connectivityInfo = encodeBool(hasConnectivity);
|
||||
mHandler.sendMessage(
|
||||
mHandler.obtainMessage(EVENT_REVALIDATE_NETWORK, uid, connectivityInfo, network));
|
||||
|
||||
final NetworkAgentInfo nai;
|
||||
if (network == null) {
|
||||
nai = getDefaultNetwork();
|
||||
} else {
|
||||
nai = getNetworkAgentInfoForNetwork(network);
|
||||
}
|
||||
if (nai != null) {
|
||||
mConnectivityDiagnosticsHandler.sendMessage(
|
||||
mConnectivityDiagnosticsHandler.obtainMessage(
|
||||
ConnectivityDiagnosticsHandler.EVENT_NETWORK_CONNECTIVITY_REPORTED,
|
||||
connectivityInfo, 0, nai));
|
||||
}
|
||||
}
|
||||
|
||||
private void handleReportNetworkConnectivity(
|
||||
@@ -6447,18 +6522,37 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
}
|
||||
|
||||
@NonNull private final Set<NetworkBgStatePair> mRematchedNetworks = new ArraySet<>();
|
||||
@NonNull private final List<RequestReassignment> mReassignments = new ArrayList<>();
|
||||
@NonNull private final Map<NetworkRequestInfo, RequestReassignment> mReassignments =
|
||||
new ArrayMap<>();
|
||||
|
||||
@NonNull Iterable<NetworkBgStatePair> getRematchedNetworks() {
|
||||
return mRematchedNetworks;
|
||||
}
|
||||
|
||||
@NonNull Iterable<RequestReassignment> getRequestReassignments() {
|
||||
return mReassignments;
|
||||
return mReassignments.values();
|
||||
}
|
||||
|
||||
void addRequestReassignment(@NonNull final RequestReassignment reassignment) {
|
||||
mReassignments.add(reassignment);
|
||||
final RequestReassignment oldChange = mReassignments.get(reassignment.mRequest);
|
||||
if (null == oldChange) {
|
||||
mReassignments.put(reassignment.mRequest, reassignment);
|
||||
return;
|
||||
}
|
||||
if (oldChange.mNewNetwork != reassignment.mOldNetwork) {
|
||||
throw new IllegalArgumentException("Reassignment <" + reassignment.mRequest + "> ["
|
||||
+ reassignment.mOldNetwork + " -> " + reassignment.mNewNetwork
|
||||
+ "] conflicts with ["
|
||||
+ oldChange.mOldNetwork + " -> " + oldChange.mNewNetwork + "]");
|
||||
}
|
||||
// There was already a note to reassign this request from a network A to a network B,
|
||||
// and a reassignment is added from network B to some other network C. The following
|
||||
// synthesizes the merged reassignment that goes A -> C. An interesting (but not
|
||||
// special) case to think about is when B is null, which can happen when the rematch
|
||||
// loop notices the current satisfier doesn't satisfy the request any more, but
|
||||
// hasn't yet encountered another network that could.
|
||||
mReassignments.put(reassignment.mRequest, new RequestReassignment(reassignment.mRequest,
|
||||
oldChange.mOldNetwork, reassignment.mNewNetwork));
|
||||
}
|
||||
|
||||
void addRematchedNetwork(@NonNull final NetworkBgStatePair network) {
|
||||
@@ -6476,6 +6570,16 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
}
|
||||
}
|
||||
|
||||
// TODO : remove this when it's useless
|
||||
@NonNull private NetworkReassignment computeInitialReassignment() {
|
||||
final NetworkReassignment change = new NetworkReassignment();
|
||||
for (NetworkRequestInfo nri : mNetworkRequests.values()) {
|
||||
change.addRequestReassignment(new NetworkReassignment.RequestReassignment(nri,
|
||||
nri.mSatisfier, nri.mSatisfier));
|
||||
}
|
||||
return change;
|
||||
}
|
||||
|
||||
private ArrayMap<NetworkRequestInfo, NetworkAgentInfo> computeRequestReassignmentForNetwork(
|
||||
@NonNull final NetworkAgentInfo newNetwork) {
|
||||
final int score = newNetwork.getCurrentScore();
|
||||
@@ -6504,7 +6608,7 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
if (currentNetwork == null || currentNetwork.getCurrentScore() < score) {
|
||||
reassignedRequests.put(nri, newNetwork);
|
||||
}
|
||||
} else if (newNetwork.isSatisfyingRequest(nri.request.requestId)) {
|
||||
} else if (newNetwork == currentNetwork) {
|
||||
reassignedRequests.put(nri, null);
|
||||
}
|
||||
}
|
||||
@@ -6517,19 +6621,9 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
// satisfied by newNetwork, and reassigns to newNetwork
|
||||
// any such requests for which newNetwork is the best.
|
||||
//
|
||||
// - Lingers any validated Networks that as a result are no longer
|
||||
// needed. A network is needed if it is the best network for
|
||||
// one or more NetworkRequests, or if it is a VPN.
|
||||
//
|
||||
// - Writes into the passed reassignment object all changes that should be done for
|
||||
// rematching this network with all requests, to be applied later.
|
||||
//
|
||||
// NOTE: This function only adds NetworkRequests that "newNetwork" could satisfy,
|
||||
// it does not remove NetworkRequests that other Networks could better satisfy.
|
||||
// If you need to handle decreases in score, use {@link rematchAllNetworksAndRequests}.
|
||||
// This function should be used when possible instead of {@code rematchAllNetworksAndRequests}
|
||||
// as it performs better by a factor of the number of Networks.
|
||||
//
|
||||
// TODO : stop writing to the passed reassignment. This is temporarily more useful, but
|
||||
// it's unidiomatic Java and it's hard to read.
|
||||
//
|
||||
@@ -6610,7 +6704,7 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
// scoring network and then a higher scoring network, which could produce multiple
|
||||
// callbacks.
|
||||
Arrays.sort(nais);
|
||||
final NetworkReassignment changes = new NetworkReassignment();
|
||||
final NetworkReassignment changes = computeInitialReassignment();
|
||||
for (final NetworkAgentInfo nai : nais) {
|
||||
rematchNetworkAndRequests(changes, nai, now);
|
||||
}
|
||||
@@ -6639,6 +6733,8 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
// before LegacyTypeTracker sends legacy broadcasts
|
||||
for (final NetworkReassignment.RequestReassignment event :
|
||||
changes.getRequestReassignments()) {
|
||||
if (event.mOldNetwork == event.mNewNetwork) continue;
|
||||
|
||||
// Tell NetworkProviders about the new score, so they can stop
|
||||
// trying to connect if they know they cannot match it.
|
||||
// TODO - this could get expensive if there are a lot of outstanding requests for this
|
||||
@@ -6648,13 +6744,6 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
if (null != event.mNewNetwork) {
|
||||
notifyNetworkAvailable(event.mNewNetwork, event.mRequest);
|
||||
} else {
|
||||
// TODO: Technically, sending CALLBACK_LOST here is
|
||||
// incorrect if there is a replacement network currently
|
||||
// connected that can satisfy nri, which is a request
|
||||
// (not a listen). However, the only capability that can both
|
||||
// a) be requested and b) change is NET_CAPABILITY_TRUSTED,
|
||||
// so this code is only incorrect for a network that loses
|
||||
// the TRUSTED capability, which is a rare case.
|
||||
callCallbackForRequest(event.mRequest, event.mOldNetwork,
|
||||
ConnectivityManager.CALLBACK_LOST, 0);
|
||||
}
|
||||
@@ -7359,7 +7448,11 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
|
||||
@GuardedBy("mVpns")
|
||||
private Vpn getVpnIfOwner() {
|
||||
final int uid = Binder.getCallingUid();
|
||||
return getVpnIfOwner(Binder.getCallingUid());
|
||||
}
|
||||
|
||||
@GuardedBy("mVpns")
|
||||
private Vpn getVpnIfOwner(int uid) {
|
||||
final int user = UserHandle.getUserId(uid);
|
||||
|
||||
final Vpn vpn = mVpns.get(user);
|
||||
@@ -7455,6 +7548,8 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
*/
|
||||
@VisibleForTesting
|
||||
class ConnectivityDiagnosticsHandler extends Handler {
|
||||
private final String mTag = ConnectivityDiagnosticsHandler.class.getSimpleName();
|
||||
|
||||
/**
|
||||
* Used to handle ConnectivityDiagnosticsCallback registration events from {@link
|
||||
* android.net.ConnectivityDiagnosticsManager}.
|
||||
@@ -7471,6 +7566,37 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
*/
|
||||
private static final int EVENT_UNREGISTER_CONNECTIVITY_DIAGNOSTICS_CALLBACK = 2;
|
||||
|
||||
/**
|
||||
* Event for {@link NetworkStateTrackerHandler} to trigger ConnectivityReport callbacks
|
||||
* after processing {@link #EVENT_NETWORK_TESTED} events.
|
||||
* obj = {@link ConnectivityReportEvent} representing ConnectivityReport info reported from
|
||||
* NetworkMonitor.
|
||||
* data = PersistableBundle of extras passed from NetworkMonitor.
|
||||
*
|
||||
* <p>See {@link ConnectivityService#EVENT_NETWORK_TESTED}.
|
||||
*/
|
||||
private static final int EVENT_NETWORK_TESTED = ConnectivityService.EVENT_NETWORK_TESTED;
|
||||
|
||||
/**
|
||||
* Event for NetworkMonitor to inform ConnectivityService that a potential data stall has
|
||||
* been detected on the network.
|
||||
* obj = Long the timestamp (in millis) for when the suspected data stall was detected.
|
||||
* arg1 = {@link DataStallReport#DetectionMethod} indicating the detection method.
|
||||
* arg2 = NetID.
|
||||
* data = PersistableBundle of extras passed from NetworkMonitor.
|
||||
*/
|
||||
private static final int EVENT_DATA_STALL_SUSPECTED = 4;
|
||||
|
||||
/**
|
||||
* Event for ConnectivityDiagnosticsHandler to handle network connectivity being reported to
|
||||
* the platform. This event will invoke {@link
|
||||
* IConnectivityDiagnosticsCallback#onNetworkConnectivityReported} for permissioned
|
||||
* callbacks.
|
||||
* obj = Network that was reported on
|
||||
* arg1 = boolint for the quality reported
|
||||
*/
|
||||
private static final int EVENT_NETWORK_CONNECTIVITY_REPORTED = 5;
|
||||
|
||||
private ConnectivityDiagnosticsHandler(Looper looper) {
|
||||
super(looper);
|
||||
}
|
||||
@@ -7488,6 +7614,37 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
(IConnectivityDiagnosticsCallback) msg.obj, msg.arg1);
|
||||
break;
|
||||
}
|
||||
case EVENT_NETWORK_TESTED: {
|
||||
final ConnectivityReportEvent reportEvent =
|
||||
(ConnectivityReportEvent) msg.obj;
|
||||
|
||||
// This is safe because {@link
|
||||
// NetworkMonitorCallbacks#notifyNetworkTestedWithExtras} receives a
|
||||
// PersistableBundle and converts it to the Bundle in the incoming Message. If
|
||||
// {@link NetworkMonitorCallbacks#notifyNetworkTested} is called, msg.data will
|
||||
// not be set. This is also safe, as msg.getData() will return an empty Bundle.
|
||||
final PersistableBundle extras = new PersistableBundle(msg.getData());
|
||||
handleNetworkTestedWithExtras(reportEvent, extras);
|
||||
break;
|
||||
}
|
||||
case EVENT_DATA_STALL_SUSPECTED: {
|
||||
final NetworkAgentInfo nai = getNetworkAgentInfoForNetId(msg.arg2);
|
||||
if (nai == null) break;
|
||||
|
||||
// This is safe because NetworkMonitorCallbacks#notifyDataStallSuspected
|
||||
// receives a PersistableBundle and converts it to the Bundle in the incoming
|
||||
// Message.
|
||||
final PersistableBundle extras = new PersistableBundle(msg.getData());
|
||||
handleDataStallSuspected(nai, (long) msg.obj, msg.arg1, extras);
|
||||
break;
|
||||
}
|
||||
case EVENT_NETWORK_CONNECTIVITY_REPORTED: {
|
||||
handleNetworkConnectivityReported((NetworkAgentInfo) msg.obj, toBool(msg.arg1));
|
||||
break;
|
||||
}
|
||||
default: {
|
||||
Log.e(mTag, "Unrecognized event in ConnectivityDiagnostics: " + msg.what);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -7497,12 +7654,16 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
class ConnectivityDiagnosticsCallbackInfo implements Binder.DeathRecipient {
|
||||
@NonNull private final IConnectivityDiagnosticsCallback mCb;
|
||||
@NonNull private final NetworkRequestInfo mRequestInfo;
|
||||
@NonNull private final String mCallingPackageName;
|
||||
|
||||
@VisibleForTesting
|
||||
ConnectivityDiagnosticsCallbackInfo(
|
||||
@NonNull IConnectivityDiagnosticsCallback cb, @NonNull NetworkRequestInfo nri) {
|
||||
@NonNull IConnectivityDiagnosticsCallback cb,
|
||||
@NonNull NetworkRequestInfo nri,
|
||||
@NonNull String callingPackageName) {
|
||||
mCb = cb;
|
||||
mRequestInfo = nri;
|
||||
mCallingPackageName = callingPackageName;
|
||||
}
|
||||
|
||||
@Override
|
||||
@@ -7512,6 +7673,39 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Class used for sending information from {@link
|
||||
* NetworkMonitorCallbacks#notifyNetworkTestedWithExtras} to the handler for processing it.
|
||||
*/
|
||||
private static class NetworkTestedResults {
|
||||
private final int mNetId;
|
||||
private final int mTestResult;
|
||||
private final long mTimestampMillis;
|
||||
@Nullable private final String mRedirectUrl;
|
||||
|
||||
private NetworkTestedResults(
|
||||
int netId, int testResult, long timestampMillis, @Nullable String redirectUrl) {
|
||||
mNetId = netId;
|
||||
mTestResult = testResult;
|
||||
mTimestampMillis = timestampMillis;
|
||||
mRedirectUrl = redirectUrl;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Class used for sending information from {@link NetworkStateTrackerHandler} to {@link
|
||||
* ConnectivityDiagnosticsHandler}.
|
||||
*/
|
||||
private static class ConnectivityReportEvent {
|
||||
private final long mTimestampMillis;
|
||||
@NonNull private final NetworkAgentInfo mNai;
|
||||
|
||||
private ConnectivityReportEvent(long timestampMillis, @NonNull NetworkAgentInfo nai) {
|
||||
mTimestampMillis = timestampMillis;
|
||||
mNai = nai;
|
||||
}
|
||||
}
|
||||
|
||||
private void handleRegisterConnectivityDiagnosticsCallback(
|
||||
@NonNull ConnectivityDiagnosticsCallbackInfo cbInfo) {
|
||||
ensureRunningOnConnectivityServiceThread();
|
||||
@@ -7559,13 +7753,109 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
cb.asBinder().unlinkToDeath(mConnectivityDiagnosticsCallbacks.remove(cb), 0);
|
||||
}
|
||||
|
||||
private void handleNetworkTestedWithExtras(
|
||||
@NonNull ConnectivityReportEvent reportEvent, @NonNull PersistableBundle extras) {
|
||||
final NetworkAgentInfo nai = reportEvent.mNai;
|
||||
final ConnectivityReport report =
|
||||
new ConnectivityReport(
|
||||
reportEvent.mNai.network,
|
||||
reportEvent.mTimestampMillis,
|
||||
nai.linkProperties,
|
||||
nai.networkCapabilities,
|
||||
extras);
|
||||
final List<IConnectivityDiagnosticsCallback> results =
|
||||
getMatchingPermissionedCallbacks(nai);
|
||||
for (final IConnectivityDiagnosticsCallback cb : results) {
|
||||
try {
|
||||
cb.onConnectivityReport(report);
|
||||
} catch (RemoteException ex) {
|
||||
loge("Error invoking onConnectivityReport", ex);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
private void handleDataStallSuspected(
|
||||
@NonNull NetworkAgentInfo nai, long timestampMillis, int detectionMethod,
|
||||
@NonNull PersistableBundle extras) {
|
||||
final DataStallReport report =
|
||||
new DataStallReport(nai.network, timestampMillis, detectionMethod, extras);
|
||||
final List<IConnectivityDiagnosticsCallback> results =
|
||||
getMatchingPermissionedCallbacks(nai);
|
||||
for (final IConnectivityDiagnosticsCallback cb : results) {
|
||||
try {
|
||||
cb.onDataStallSuspected(report);
|
||||
} catch (RemoteException ex) {
|
||||
loge("Error invoking onDataStallSuspected", ex);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
private void handleNetworkConnectivityReported(
|
||||
@NonNull NetworkAgentInfo nai, boolean connectivity) {
|
||||
final List<IConnectivityDiagnosticsCallback> results =
|
||||
getMatchingPermissionedCallbacks(nai);
|
||||
for (final IConnectivityDiagnosticsCallback cb : results) {
|
||||
try {
|
||||
cb.onNetworkConnectivityReported(nai.network, connectivity);
|
||||
} catch (RemoteException ex) {
|
||||
loge("Error invoking onNetworkConnectivityReported", ex);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
private List<IConnectivityDiagnosticsCallback> getMatchingPermissionedCallbacks(
|
||||
@NonNull NetworkAgentInfo nai) {
|
||||
final List<IConnectivityDiagnosticsCallback> results = new ArrayList<>();
|
||||
for (Entry<IConnectivityDiagnosticsCallback, ConnectivityDiagnosticsCallbackInfo> entry :
|
||||
mConnectivityDiagnosticsCallbacks.entrySet()) {
|
||||
final ConnectivityDiagnosticsCallbackInfo cbInfo = entry.getValue();
|
||||
final NetworkRequestInfo nri = cbInfo.mRequestInfo;
|
||||
if (nai.satisfies(nri.request)) {
|
||||
if (checkConnectivityDiagnosticsPermissions(
|
||||
nri.mPid, nri.mUid, nai, cbInfo.mCallingPackageName)) {
|
||||
results.add(entry.getKey());
|
||||
}
|
||||
}
|
||||
}
|
||||
return results;
|
||||
}
|
||||
|
||||
@VisibleForTesting
|
||||
boolean checkConnectivityDiagnosticsPermissions(
|
||||
int callbackPid, int callbackUid, NetworkAgentInfo nai, String callbackPackageName) {
|
||||
if (checkNetworkStackPermission(callbackPid, callbackUid)) {
|
||||
return true;
|
||||
}
|
||||
|
||||
if (!mLocationPermissionChecker.checkLocationPermission(
|
||||
callbackPackageName, null /* featureId */, callbackUid, null /* message */)) {
|
||||
return false;
|
||||
}
|
||||
|
||||
synchronized (mVpns) {
|
||||
if (getVpnIfOwner(callbackUid) != null) {
|
||||
return true;
|
||||
}
|
||||
}
|
||||
|
||||
// Administrator UIDs also contains the Owner UID
|
||||
if (nai.networkCapabilities.getAdministratorUids().contains(callbackUid)) {
|
||||
return true;
|
||||
}
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void registerConnectivityDiagnosticsCallback(
|
||||
@NonNull IConnectivityDiagnosticsCallback callback, @NonNull NetworkRequest request) {
|
||||
@NonNull IConnectivityDiagnosticsCallback callback,
|
||||
@NonNull NetworkRequest request,
|
||||
@NonNull String callingPackageName) {
|
||||
if (request.legacyType != TYPE_NONE) {
|
||||
throw new IllegalArgumentException("ConnectivityManager.TYPE_* are deprecated."
|
||||
+ " Please use NetworkCapabilities instead.");
|
||||
}
|
||||
mAppOpsManager.checkPackage(Binder.getCallingUid(), callingPackageName);
|
||||
|
||||
// This NetworkCapabilities is only used for matching to Networks. Clear out its owner uid
|
||||
// and administrator uids to be safe.
|
||||
@@ -7583,7 +7873,7 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
||||
// callback's binder death.
|
||||
final NetworkRequestInfo nri = new NetworkRequestInfo(requestWithId);
|
||||
final ConnectivityDiagnosticsCallbackInfo cbInfo =
|
||||
new ConnectivityDiagnosticsCallbackInfo(callback, nri);
|
||||
new ConnectivityDiagnosticsCallbackInfo(callback, nri, callingPackageName);
|
||||
|
||||
mConnectivityDiagnosticsHandler.sendMessage(
|
||||
mConnectivityDiagnosticsHandler.obtainMessage(
|
||||
|
||||
@@ -38,6 +38,8 @@ import static org.mockito.Mockito.verifyNoMoreInteractions;
|
||||
import android.content.Context;
|
||||
import android.os.PersistableBundle;
|
||||
|
||||
import androidx.test.InstrumentationRegistry;
|
||||
|
||||
import org.junit.After;
|
||||
import org.junit.Before;
|
||||
import org.junit.Test;
|
||||
@@ -58,21 +60,26 @@ public class ConnectivityDiagnosticsManagerTest {
|
||||
|
||||
private static final Executor INLINE_EXECUTOR = x -> x.run();
|
||||
|
||||
@Mock private Context mContext;
|
||||
@Mock private IConnectivityManager mService;
|
||||
@Mock private ConnectivityDiagnosticsCallback mCb;
|
||||
|
||||
private Context mContext;
|
||||
private ConnectivityDiagnosticsBinder mBinder;
|
||||
private ConnectivityDiagnosticsManager mManager;
|
||||
|
||||
private String mPackageName;
|
||||
|
||||
@Before
|
||||
public void setUp() {
|
||||
mContext = mock(Context.class);
|
||||
mContext = InstrumentationRegistry.getContext();
|
||||
|
||||
mService = mock(IConnectivityManager.class);
|
||||
mCb = mock(ConnectivityDiagnosticsCallback.class);
|
||||
|
||||
mBinder = new ConnectivityDiagnosticsBinder(mCb, INLINE_EXECUTOR);
|
||||
mManager = new ConnectivityDiagnosticsManager(mContext, mService);
|
||||
|
||||
mPackageName = mContext.getOpPackageName();
|
||||
}
|
||||
|
||||
@After
|
||||
@@ -271,7 +278,7 @@ public class ConnectivityDiagnosticsManagerTest {
|
||||
mManager.registerConnectivityDiagnosticsCallback(request, INLINE_EXECUTOR, mCb);
|
||||
|
||||
verify(mService).registerConnectivityDiagnosticsCallback(
|
||||
any(ConnectivityDiagnosticsBinder.class), eq(request));
|
||||
any(ConnectivityDiagnosticsBinder.class), eq(request), eq(mPackageName));
|
||||
assertTrue(ConnectivityDiagnosticsManager.sCallbacks.containsKey(mCb));
|
||||
}
|
||||
|
||||
@@ -302,7 +309,7 @@ public class ConnectivityDiagnosticsManagerTest {
|
||||
// verify that re-registering is successful
|
||||
mManager.registerConnectivityDiagnosticsCallback(request, INLINE_EXECUTOR, mCb);
|
||||
verify(mService, times(2)).registerConnectivityDiagnosticsCallback(
|
||||
any(ConnectivityDiagnosticsBinder.class), eq(request));
|
||||
any(ConnectivityDiagnosticsBinder.class), eq(request), eq(mPackageName));
|
||||
assertTrue(ConnectivityDiagnosticsManager.sCallbacks.containsKey(mCb));
|
||||
}
|
||||
|
||||
|
||||
@@ -23,6 +23,8 @@ import static android.content.pm.PackageManager.GET_PERMISSIONS;
|
||||
import static android.content.pm.PackageManager.MATCH_ANY_USER;
|
||||
import static android.content.pm.PackageManager.PERMISSION_DENIED;
|
||||
import static android.content.pm.PackageManager.PERMISSION_GRANTED;
|
||||
import static android.net.ConnectivityDiagnosticsManager.ConnectivityReport;
|
||||
import static android.net.ConnectivityDiagnosticsManager.DataStallReport;
|
||||
import static android.net.ConnectivityManager.ACTION_CAPTIVE_PORTAL_SIGN_IN;
|
||||
import static android.net.ConnectivityManager.CONNECTIVITY_ACTION;
|
||||
import static android.net.ConnectivityManager.CONNECTIVITY_ACTION_SUPL;
|
||||
@@ -119,6 +121,7 @@ import static org.mockito.Mockito.when;
|
||||
import android.Manifest;
|
||||
import android.annotation.NonNull;
|
||||
import android.app.AlarmManager;
|
||||
import android.app.AppOpsManager;
|
||||
import android.app.NotificationManager;
|
||||
import android.app.PendingIntent;
|
||||
import android.content.BroadcastReceiver;
|
||||
@@ -132,6 +135,7 @@ import android.content.pm.PackageInfo;
|
||||
import android.content.pm.PackageManager;
|
||||
import android.content.pm.UserInfo;
|
||||
import android.content.res.Resources;
|
||||
import android.location.LocationManager;
|
||||
import android.net.CaptivePortalData;
|
||||
import android.net.ConnectivityManager;
|
||||
import android.net.ConnectivityManager.NetworkCallback;
|
||||
@@ -177,6 +181,7 @@ import android.net.shared.PrivateDnsConfig;
|
||||
import android.net.util.MultinetworkPolicyTracker;
|
||||
import android.os.BadParcelableException;
|
||||
import android.os.Binder;
|
||||
import android.os.Build;
|
||||
import android.os.Bundle;
|
||||
import android.os.ConditionVariable;
|
||||
import android.os.Handler;
|
||||
@@ -187,6 +192,7 @@ import android.os.Looper;
|
||||
import android.os.Parcel;
|
||||
import android.os.ParcelFileDescriptor;
|
||||
import android.os.Parcelable;
|
||||
import android.os.PersistableBundle;
|
||||
import android.os.Process;
|
||||
import android.os.RemoteException;
|
||||
import android.os.SystemClock;
|
||||
@@ -218,6 +224,7 @@ import com.android.server.connectivity.DefaultNetworkMetrics;
|
||||
import com.android.server.connectivity.IpConnectivityMetrics;
|
||||
import com.android.server.connectivity.MockableSystemProperties;
|
||||
import com.android.server.connectivity.Nat464Xlat;
|
||||
import com.android.server.connectivity.NetworkAgentInfo;
|
||||
import com.android.server.connectivity.NetworkNotificationManager.NotificationType;
|
||||
import com.android.server.connectivity.ProxyTracker;
|
||||
import com.android.server.connectivity.Vpn;
|
||||
@@ -292,6 +299,8 @@ public class ConnectivityServiceTest {
|
||||
|
||||
private static final int UNREASONABLY_LONG_ALARM_WAIT_MS = 1000;
|
||||
|
||||
private static final long TIMESTAMP = 1234L;
|
||||
|
||||
private static final String CLAT_PREFIX = "v4-";
|
||||
private static final String MOBILE_IFNAME = "test_rmnet_data0";
|
||||
private static final String WIFI_IFNAME = "test_wlan0";
|
||||
@@ -327,6 +336,8 @@ public class ConnectivityServiceTest {
|
||||
@Mock AlarmManager mAlarmManager;
|
||||
@Mock IConnectivityDiagnosticsCallback mConnectivityDiagnosticsCallback;
|
||||
@Mock IBinder mIBinder;
|
||||
@Mock LocationManager mLocationManager;
|
||||
@Mock AppOpsManager mAppOpsManager;
|
||||
|
||||
private ArgumentCaptor<ResolverParamsParcel> mResolverParamsParcelCaptor =
|
||||
ArgumentCaptor.forClass(ResolverParamsParcel.class);
|
||||
@@ -412,6 +423,8 @@ public class ConnectivityServiceTest {
|
||||
if (Context.NETWORK_STACK_SERVICE.equals(name)) return mNetworkStack;
|
||||
if (Context.USER_SERVICE.equals(name)) return mUserManager;
|
||||
if (Context.ALARM_SERVICE.equals(name)) return mAlarmManager;
|
||||
if (Context.LOCATION_SERVICE.equals(name)) return mLocationManager;
|
||||
if (Context.APP_OPS_SERVICE.equals(name)) return mAppOpsManager;
|
||||
return super.getSystemService(name);
|
||||
}
|
||||
|
||||
@@ -558,12 +571,17 @@ public class ConnectivityServiceTest {
|
||||
| NETWORK_VALIDATION_RESULT_PARTIAL;
|
||||
private static final int VALIDATION_RESULT_INVALID = 0;
|
||||
|
||||
private static final long DATA_STALL_TIMESTAMP = 10L;
|
||||
private static final int DATA_STALL_DETECTION_METHOD = 1;
|
||||
|
||||
private INetworkMonitor mNetworkMonitor;
|
||||
private INetworkMonitorCallbacks mNmCallbacks;
|
||||
private int mNmValidationResult = VALIDATION_RESULT_BASE;
|
||||
private int mProbesCompleted;
|
||||
private int mProbesSucceeded;
|
||||
private String mNmValidationRedirectUrl = null;
|
||||
private PersistableBundle mValidationExtras = PersistableBundle.EMPTY;
|
||||
private PersistableBundle mDataStallExtras = PersistableBundle.EMPTY;
|
||||
private boolean mNmProvNotificationRequested = false;
|
||||
|
||||
private final ConditionVariable mNetworkStatusReceived = new ConditionVariable();
|
||||
@@ -631,8 +649,8 @@ public class ConnectivityServiceTest {
|
||||
}
|
||||
|
||||
mNmCallbacks.notifyProbeStatusChanged(mProbesCompleted, mProbesSucceeded);
|
||||
mNmCallbacks.notifyNetworkTested(
|
||||
mNmValidationResult, mNmValidationRedirectUrl);
|
||||
mNmCallbacks.notifyNetworkTestedWithExtras(
|
||||
mNmValidationResult, mNmValidationRedirectUrl, TIMESTAMP, mValidationExtras);
|
||||
|
||||
if (mNmValidationRedirectUrl != null) {
|
||||
mNmCallbacks.showProvisioningNotification(
|
||||
@@ -791,6 +809,11 @@ public class ConnectivityServiceTest {
|
||||
public void expectPreventReconnectReceived() {
|
||||
expectPreventReconnectReceived(TIMEOUT_MS);
|
||||
}
|
||||
|
||||
void notifyDataStallSuspected() throws Exception {
|
||||
mNmCallbacks.notifyDataStallSuspected(
|
||||
DATA_STALL_TIMESTAMP, DATA_STALL_DETECTION_METHOD, mDataStallExtras);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
@@ -970,6 +993,8 @@ public class ConnectivityServiceTest {
|
||||
// not inherit from NetworkAgent.
|
||||
private TestNetworkAgentWrapper mMockNetworkAgent;
|
||||
|
||||
private VpnInfo mVpnInfo;
|
||||
|
||||
public MockVpn(int userId) {
|
||||
super(startHandlerThreadAndReturnLooper(), mServiceContext, mNetworkManagementService,
|
||||
userId);
|
||||
@@ -1041,6 +1066,17 @@ public class ConnectivityServiceTest {
|
||||
mConnected = false;
|
||||
mConfig = null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public synchronized VpnInfo getVpnInfo() {
|
||||
if (mVpnInfo != null) return mVpnInfo;
|
||||
|
||||
return super.getVpnInfo();
|
||||
}
|
||||
|
||||
private void setVpnInfo(VpnInfo vpnInfo) {
|
||||
mVpnInfo = vpnInfo;
|
||||
}
|
||||
}
|
||||
|
||||
private void mockVpn(int uid) {
|
||||
@@ -5753,20 +5789,18 @@ public class ConnectivityServiceTest {
|
||||
mCellNetworkAgent.connect(true);
|
||||
trustedCallback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent);
|
||||
verify(mNetworkManagementService).setDefaultNetId(eq(mCellNetworkAgent.getNetwork().netId));
|
||||
reset(mNetworkManagementService);
|
||||
|
||||
mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI);
|
||||
mWiFiNetworkAgent.connect(true);
|
||||
trustedCallback.expectAvailableDoubleValidatedCallbacks(mWiFiNetworkAgent);
|
||||
verify(mNetworkManagementService).setDefaultNetId(eq(mWiFiNetworkAgent.getNetwork().netId));
|
||||
reset(mNetworkManagementService);
|
||||
|
||||
mWiFiNetworkAgent.removeCapability(NET_CAPABILITY_TRUSTED);
|
||||
// There is currently a bug where losing the TRUSTED capability will send a LOST
|
||||
// callback to requests before the available callback, in spite of the semantics
|
||||
// of the requests dictating this should not happen. This is considered benign, but
|
||||
// ideally should be fixed in the future.
|
||||
trustedCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent);
|
||||
trustedCallback.expectAvailableCallbacksValidated(mCellNetworkAgent);
|
||||
verify(mNetworkManagementService).setDefaultNetId(eq(mCellNetworkAgent.getNetwork().netId));
|
||||
reset(mNetworkManagementService);
|
||||
|
||||
mCellNetworkAgent.removeCapability(NET_CAPABILITY_TRUSTED);
|
||||
trustedCallback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent);
|
||||
@@ -6402,7 +6436,7 @@ public class ConnectivityServiceTest {
|
||||
new NetworkCapabilities(), TYPE_ETHERNET, 0, NetworkRequest.Type.NONE);
|
||||
try {
|
||||
mService.registerConnectivityDiagnosticsCallback(
|
||||
mConnectivityDiagnosticsCallback, request);
|
||||
mConnectivityDiagnosticsCallback, request, mContext.getPackageName());
|
||||
fail("registerConnectivityDiagnosticsCallback should throw on invalid NetworkRequest");
|
||||
} catch (IllegalArgumentException expected) {
|
||||
}
|
||||
@@ -6416,7 +6450,7 @@ public class ConnectivityServiceTest {
|
||||
when(mConnectivityDiagnosticsCallback.asBinder()).thenReturn(mIBinder);
|
||||
|
||||
mService.registerConnectivityDiagnosticsCallback(
|
||||
mConnectivityDiagnosticsCallback, wifiRequest);
|
||||
mConnectivityDiagnosticsCallback, wifiRequest, mContext.getPackageName());
|
||||
|
||||
verify(mIBinder, timeout(TIMEOUT_MS))
|
||||
.linkToDeath(any(ConnectivityDiagnosticsCallbackInfo.class), anyInt());
|
||||
@@ -6440,7 +6474,7 @@ public class ConnectivityServiceTest {
|
||||
when(mConnectivityDiagnosticsCallback.asBinder()).thenReturn(mIBinder);
|
||||
|
||||
mService.registerConnectivityDiagnosticsCallback(
|
||||
mConnectivityDiagnosticsCallback, wifiRequest);
|
||||
mConnectivityDiagnosticsCallback, wifiRequest, mContext.getPackageName());
|
||||
|
||||
verify(mIBinder, timeout(TIMEOUT_MS))
|
||||
.linkToDeath(any(ConnectivityDiagnosticsCallbackInfo.class), anyInt());
|
||||
@@ -6451,7 +6485,7 @@ public class ConnectivityServiceTest {
|
||||
|
||||
// Register the same callback again
|
||||
mService.registerConnectivityDiagnosticsCallback(
|
||||
mConnectivityDiagnosticsCallback, wifiRequest);
|
||||
mConnectivityDiagnosticsCallback, wifiRequest, mContext.getPackageName());
|
||||
|
||||
// Block until all other events are done processing.
|
||||
HandlerUtilsKt.waitForIdle(mCsHandlerThread, TIMEOUT_MS);
|
||||
@@ -6460,4 +6494,182 @@ public class ConnectivityServiceTest {
|
||||
mService.mConnectivityDiagnosticsCallbacks.containsKey(
|
||||
mConnectivityDiagnosticsCallback));
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testCheckConnectivityDiagnosticsPermissionsNetworkStack() throws Exception {
|
||||
final NetworkAgentInfo naiWithoutUid =
|
||||
new NetworkAgentInfo(
|
||||
null, null, null, null, null, new NetworkCapabilities(), null,
|
||||
mServiceContext, null, null, mService, null, null, null, 0);
|
||||
|
||||
mServiceContext.setPermission(
|
||||
android.Manifest.permission.NETWORK_STACK, PERMISSION_GRANTED);
|
||||
assertTrue(
|
||||
"NetworkStack permission not applied",
|
||||
mService.checkConnectivityDiagnosticsPermissions(
|
||||
Process.myPid(), Process.myUid(), naiWithoutUid,
|
||||
mContext.getOpPackageName()));
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testCheckConnectivityDiagnosticsPermissionsNoLocationPermission() throws Exception {
|
||||
final NetworkAgentInfo naiWithoutUid =
|
||||
new NetworkAgentInfo(
|
||||
null, null, null, null, null, new NetworkCapabilities(), null,
|
||||
mServiceContext, null, null, mService, null, null, null, 0);
|
||||
|
||||
mServiceContext.setPermission(android.Manifest.permission.NETWORK_STACK, PERMISSION_DENIED);
|
||||
|
||||
assertFalse(
|
||||
"ACCESS_FINE_LOCATION permission necessary for Connectivity Diagnostics",
|
||||
mService.checkConnectivityDiagnosticsPermissions(
|
||||
Process.myPid(), Process.myUid(), naiWithoutUid,
|
||||
mContext.getOpPackageName()));
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testCheckConnectivityDiagnosticsPermissionsActiveVpn() throws Exception {
|
||||
final NetworkAgentInfo naiWithoutUid =
|
||||
new NetworkAgentInfo(
|
||||
null, null, null, null, null, new NetworkCapabilities(), null,
|
||||
mServiceContext, null, null, mService, null, null, null, 0);
|
||||
|
||||
setupLocationPermissions(Build.VERSION_CODES.Q, true, AppOpsManager.OPSTR_FINE_LOCATION,
|
||||
Manifest.permission.ACCESS_FINE_LOCATION);
|
||||
mServiceContext.setPermission(android.Manifest.permission.NETWORK_STACK, PERMISSION_DENIED);
|
||||
|
||||
// setUp() calls mockVpn() which adds a VPN with the Test Runner's uid. Configure it to be
|
||||
// active
|
||||
final VpnInfo info = new VpnInfo();
|
||||
info.ownerUid = Process.myUid();
|
||||
info.vpnIface = "interface";
|
||||
mMockVpn.setVpnInfo(info);
|
||||
assertTrue(
|
||||
"Active VPN permission not applied",
|
||||
mService.checkConnectivityDiagnosticsPermissions(
|
||||
Process.myPid(), Process.myUid(), naiWithoutUid,
|
||||
mContext.getOpPackageName()));
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testCheckConnectivityDiagnosticsPermissionsNetworkAdministrator() throws Exception {
|
||||
final NetworkCapabilities nc = new NetworkCapabilities();
|
||||
nc.setAdministratorUids(Arrays.asList(Process.myUid()));
|
||||
final NetworkAgentInfo naiWithUid =
|
||||
new NetworkAgentInfo(
|
||||
null, null, null, null, null, nc, null, mServiceContext, null, null,
|
||||
mService, null, null, null, 0);
|
||||
|
||||
setupLocationPermissions(Build.VERSION_CODES.Q, true, AppOpsManager.OPSTR_FINE_LOCATION,
|
||||
Manifest.permission.ACCESS_FINE_LOCATION);
|
||||
mServiceContext.setPermission(android.Manifest.permission.NETWORK_STACK, PERMISSION_DENIED);
|
||||
|
||||
// Disconnect mock vpn so the uid check on NetworkAgentInfo is tested
|
||||
mMockVpn.disconnect();
|
||||
assertTrue(
|
||||
"NetworkCapabilities administrator uid permission not applied",
|
||||
mService.checkConnectivityDiagnosticsPermissions(
|
||||
Process.myPid(), Process.myUid(), naiWithUid, mContext.getOpPackageName()));
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testCheckConnectivityDiagnosticsPermissionsFails() throws Exception {
|
||||
final NetworkCapabilities nc = new NetworkCapabilities();
|
||||
nc.setOwnerUid(Process.myUid());
|
||||
nc.setAdministratorUids(Arrays.asList(Process.myUid()));
|
||||
final NetworkAgentInfo naiWithUid =
|
||||
new NetworkAgentInfo(
|
||||
null, null, null, null, null, nc, null, mServiceContext, null, null,
|
||||
mService, null, null, null, 0);
|
||||
|
||||
setupLocationPermissions(Build.VERSION_CODES.Q, true, AppOpsManager.OPSTR_FINE_LOCATION,
|
||||
Manifest.permission.ACCESS_FINE_LOCATION);
|
||||
mServiceContext.setPermission(android.Manifest.permission.NETWORK_STACK, PERMISSION_DENIED);
|
||||
|
||||
// Use wrong pid and uid
|
||||
assertFalse(
|
||||
"Permissions allowed when they shouldn't be granted",
|
||||
mService.checkConnectivityDiagnosticsPermissions(
|
||||
Process.myPid() + 1, Process.myUid() + 1, naiWithUid,
|
||||
mContext.getOpPackageName()));
|
||||
}
|
||||
|
||||
private void setupLocationPermissions(
|
||||
int targetSdk, boolean locationToggle, String op, String perm) throws Exception {
|
||||
final ApplicationInfo applicationInfo = new ApplicationInfo();
|
||||
applicationInfo.targetSdkVersion = targetSdk;
|
||||
when(mPackageManager.getApplicationInfoAsUser(anyString(), anyInt(), any()))
|
||||
.thenReturn(applicationInfo);
|
||||
|
||||
when(mLocationManager.isLocationEnabledForUser(any())).thenReturn(locationToggle);
|
||||
|
||||
when(mAppOpsManager.noteOp(eq(op), eq(Process.myUid()), eq(mContext.getPackageName())))
|
||||
.thenReturn(AppOpsManager.MODE_ALLOWED);
|
||||
|
||||
mServiceContext.setPermission(perm, PERMISSION_GRANTED);
|
||||
}
|
||||
|
||||
private void setUpConnectivityDiagnosticsCallback() throws Exception {
|
||||
final NetworkRequest request = new NetworkRequest.Builder().build();
|
||||
when(mConnectivityDiagnosticsCallback.asBinder()).thenReturn(mIBinder);
|
||||
|
||||
mServiceContext.setPermission(
|
||||
android.Manifest.permission.NETWORK_STACK, PERMISSION_GRANTED);
|
||||
|
||||
mService.registerConnectivityDiagnosticsCallback(
|
||||
mConnectivityDiagnosticsCallback, request, mContext.getPackageName());
|
||||
|
||||
// Block until all other events are done processing.
|
||||
HandlerUtilsKt.waitForIdle(mCsHandlerThread, TIMEOUT_MS);
|
||||
|
||||
// Connect the cell agent verify that it notifies TestNetworkCallback that it is available
|
||||
final TestNetworkCallback callback = new TestNetworkCallback();
|
||||
mCm.registerDefaultNetworkCallback(callback);
|
||||
mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR);
|
||||
mCellNetworkAgent.connect(true);
|
||||
callback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent);
|
||||
callback.assertNoCallback();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testConnectivityDiagnosticsCallbackOnConnectivityReport() throws Exception {
|
||||
setUpConnectivityDiagnosticsCallback();
|
||||
|
||||
// Wait for onConnectivityReport to fire
|
||||
verify(mConnectivityDiagnosticsCallback, timeout(TIMEOUT_MS))
|
||||
.onConnectivityReport(any(ConnectivityReport.class));
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testConnectivityDiagnosticsCallbackOnDataStallSuspected() throws Exception {
|
||||
setUpConnectivityDiagnosticsCallback();
|
||||
|
||||
// Trigger notifyDataStallSuspected() on the INetworkMonitorCallbacks instance in the
|
||||
// cellular network agent
|
||||
mCellNetworkAgent.notifyDataStallSuspected();
|
||||
|
||||
// Wait for onDataStallSuspected to fire
|
||||
verify(mConnectivityDiagnosticsCallback, timeout(TIMEOUT_MS))
|
||||
.onDataStallSuspected(any(DataStallReport.class));
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testConnectivityDiagnosticsCallbackOnConnectivityReported() throws Exception {
|
||||
setUpConnectivityDiagnosticsCallback();
|
||||
|
||||
final Network n = mCellNetworkAgent.getNetwork();
|
||||
final boolean hasConnectivity = true;
|
||||
mService.reportNetworkConnectivity(n, hasConnectivity);
|
||||
|
||||
// Wait for onNetworkConnectivityReported to fire
|
||||
verify(mConnectivityDiagnosticsCallback, timeout(TIMEOUT_MS))
|
||||
.onNetworkConnectivityReported(eq(n), eq(hasConnectivity));
|
||||
|
||||
final boolean noConnectivity = false;
|
||||
mService.reportNetworkConnectivity(n, noConnectivity);
|
||||
|
||||
// Wait for onNetworkConnectivityReported to fire
|
||||
verify(mConnectivityDiagnosticsCallback, timeout(TIMEOUT_MS))
|
||||
.onNetworkConnectivityReported(eq(n), eq(noConnectivity));
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user