Home | History | Annotate | Download | only in server
      1 /*
      2  * Copyright (C) 2012 The Android Open Source Project
      3  *
      4  * Licensed under the Apache License, Version 2.0 (the "License");
      5  * you may not use this file except in compliance with the License.
      6  * You may obtain a copy of the License at
      7  *
      8  *      http://www.apache.org/licenses/LICENSE-2.0
      9  *
     10  * Unless required by applicable law or agreed to in writing, software
     11  * distributed under the License is distributed on an "AS IS" BASIS,
     12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     13  * See the License for the specific language governing permissions and
     14  * limitations under the License.
     15  */
     16 
     17 package com.android.server;
     18 
     19 import android.content.Context;
     20 import android.content.Intent;
     21 import android.content.pm.PackageManager;
     22 import android.os.Binder;
     23 import android.os.Handler;
     24 import android.os.IBinder;
     25 import android.os.IUpdateLock;
     26 import android.os.RemoteException;
     27 import android.os.SystemClock;
     28 import android.os.TokenWatcher;
     29 import android.os.UpdateLock;
     30 import android.os.UserHandle;
     31 import android.util.Slog;
     32 
     33 import java.io.FileDescriptor;
     34 import java.io.PrintWriter;
     35 
     36 public class UpdateLockService extends IUpdateLock.Stub {
     37     static final boolean DEBUG = false;
     38     static final String TAG = "UpdateLockService";
     39 
     40     // signatureOrSystem required to use update locks
     41     static final String PERMISSION = "android.permission.UPDATE_LOCK";
     42 
     43     Context mContext;
     44     LockWatcher mLocks;
     45 
     46     class LockWatcher extends TokenWatcher {
     47         LockWatcher(Handler h, String tag) {
     48             super(h, tag);
     49         }
     50 
     51         public void acquired() {
     52             if (DEBUG) {
     53                 Slog.d(TAG, "first acquire; broadcasting convenient=false");
     54             }
     55             sendLockChangedBroadcast(false);
     56         }
     57         public void released() {
     58             if (DEBUG) {
     59                 Slog.d(TAG, "last release; broadcasting convenient=true");
     60             }
     61             sendLockChangedBroadcast(true);
     62         }
     63     }
     64 
     65     UpdateLockService(Context context) {
     66         mContext = context;
     67         mLocks = new LockWatcher(new Handler(), "UpdateLocks");
     68 
     69         // Consider just-booting to be a reasonable time to allow
     70         // interruptions for update installation etc.
     71         sendLockChangedBroadcast(true);
     72     }
     73 
     74     void sendLockChangedBroadcast(boolean state) {
     75         // Safe early during boot because this broadcast only goes to registered receivers.
     76         long oldIdent = Binder.clearCallingIdentity();
     77         try {
     78             Intent intent = new Intent(UpdateLock.UPDATE_LOCK_CHANGED)
     79                     .putExtra(UpdateLock.NOW_IS_CONVENIENT, state)
     80                     .putExtra(UpdateLock.TIMESTAMP, System.currentTimeMillis())
     81                     .addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY_BEFORE_BOOT);
     82             mContext.sendStickyBroadcastAsUser(intent, UserHandle.ALL);
     83         } finally {
     84             Binder.restoreCallingIdentity(oldIdent);
     85         }
     86     }
     87 
     88     @Override
     89     public void acquireUpdateLock(IBinder token, String tag) throws RemoteException {
     90         if (DEBUG) {
     91             Slog.d(TAG, "acquire(" + token + ") by " + makeTag(tag));
     92         }
     93 
     94         mContext.enforceCallingOrSelfPermission(PERMISSION, "acquireUpdateLock");
     95         mLocks.acquire(token, makeTag(tag));
     96     }
     97 
     98     @Override
     99     public void releaseUpdateLock(IBinder token) throws RemoteException {
    100         if (DEBUG) {
    101             Slog.d(TAG, "release(" + token + ')');
    102         }
    103 
    104         mContext.enforceCallingOrSelfPermission(PERMISSION, "releaseUpdateLock");
    105         mLocks.release(token);
    106     };
    107 
    108     private String makeTag(String tag) {
    109         return "{tag=" + tag
    110                 + " uid=" + Binder.getCallingUid()
    111                 + " pid=" + Binder.getCallingPid() + '}';
    112     }
    113 
    114     @Override
    115     public void dump(FileDescriptor fd, PrintWriter pw, String[] args) {
    116         if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
    117                 != PackageManager.PERMISSION_GRANTED) {
    118             pw.println("Permission Denial: can't dump update lock service from from pid="
    119                     + Binder.getCallingPid()
    120                     + ", uid=" + Binder.getCallingUid());
    121             return;
    122         }
    123 
    124         mLocks.dump(pw);
    125     }
    126 }
    127