1 /*
2  * Copyright (C) 2008 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 package android.net;
17 
18 import static com.android.internal.util.Preconditions.checkNotNull;
19 
20 import android.annotation.IntDef;
21 import android.annotation.Nullable;
22 import android.annotation.SdkConstant;
23 import android.annotation.SdkConstant.SdkConstantType;
24 import android.annotation.SystemApi;
25 import android.app.PendingIntent;
26 import android.content.Context;
27 import android.content.Intent;
28 import android.content.pm.PackageManager;
29 import android.os.Binder;
30 import android.os.Build.VERSION_CODES;
31 import android.os.Bundle;
32 import android.os.Handler;
33 import android.os.HandlerThread;
34 import android.os.IBinder;
35 import android.os.INetworkActivityListener;
36 import android.os.INetworkManagementService;
37 import android.os.Looper;
38 import android.os.Message;
39 import android.os.Messenger;
40 import android.os.Process;
41 import android.os.RemoteException;
42 import android.os.ResultReceiver;
43 import android.os.ServiceManager;
44 import android.provider.Settings;
45 import android.telephony.SubscriptionManager;
46 import android.util.ArrayMap;
47 import android.util.Log;
48 import android.util.SparseArray;
49 
50 import com.android.internal.telephony.ITelephony;
51 import com.android.internal.telephony.PhoneConstants;
52 import com.android.internal.util.Protocol;
53 import com.android.internal.util.MessageUtils;
54 
55 import libcore.net.event.NetworkEventDispatcher;
56 
57 import java.lang.annotation.Retention;
58 import java.lang.annotation.RetentionPolicy;
59 import java.net.InetAddress;
60 import java.util.HashMap;
61 import java.util.concurrent.atomic.AtomicInteger;
62 
63 /**
64  * Class that answers queries about the state of network connectivity. It also
65  * notifies applications when network connectivity changes. Get an instance
66  * of this class by calling
67  * {@link android.content.Context#getSystemService(String) Context.getSystemService(Context.CONNECTIVITY_SERVICE)}.
68  * <p>
69  * The primary responsibilities of this class are to:
70  * <ol>
71  * <li>Monitor network connections (Wi-Fi, GPRS, UMTS, etc.)</li>
72  * <li>Send broadcast intents when network connectivity changes</li>
73  * <li>Attempt to "fail over" to another network when connectivity to a network
74  * is lost</li>
75  * <li>Provide an API that allows applications to query the coarse-grained or fine-grained
76  * state of the available networks</li>
77  * <li>Provide an API that allows applications to request and select networks for their data
78  * traffic</li>
79  * </ol>
80  */
81 public class ConnectivityManager {
82     private static final String TAG = "ConnectivityManager";
83 
84     /**
85      * A change in network connectivity has occurred. A default connection has either
86      * been established or lost. The NetworkInfo for the affected network is
87      * sent as an extra; it should be consulted to see what kind of
88      * connectivity event occurred.
89      * <p/>
90      * If this is a connection that was the result of failing over from a
91      * disconnected network, then the FAILOVER_CONNECTION boolean extra is
92      * set to true.
93      * <p/>
94      * For a loss of connectivity, if the connectivity manager is attempting
95      * to connect (or has already connected) to another network, the
96      * NetworkInfo for the new network is also passed as an extra. This lets
97      * any receivers of the broadcast know that they should not necessarily
98      * tell the user that no data traffic will be possible. Instead, the
99      * receiver should expect another broadcast soon, indicating either that
100      * the failover attempt succeeded (and so there is still overall data
101      * connectivity), or that the failover attempt failed, meaning that all
102      * connectivity has been lost.
103      * <p/>
104      * For a disconnect event, the boolean extra EXTRA_NO_CONNECTIVITY
105      * is set to {@code true} if there are no connected networks at all.
106      */
107     @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
108     public static final String CONNECTIVITY_ACTION = "android.net.conn.CONNECTIVITY_CHANGE";
109 
110     /**
111      * A temporary hack until SUPL system can get off the legacy APIS.
112      * They do too many network requests and the long list of apps listening
113      * and waking due to the CONNECTIVITY_ACTION bcast makes it expensive.
114      * Use this bcast intent instead for SUPL requests.
115      * @hide
116      */
117     public static final String CONNECTIVITY_ACTION_SUPL =
118             "android.net.conn.CONNECTIVITY_CHANGE_SUPL";
119 
120     /**
121      * The device has connected to a network that has presented a captive
122      * portal, which is blocking Internet connectivity. The user was presented
123      * with a notification that network sign in is required,
124      * and the user invoked the notification's action indicating they
125      * desire to sign in to the network. Apps handling this activity should
126      * facilitate signing in to the network. This action includes a
127      * {@link Network} typed extra called {@link #EXTRA_NETWORK} that represents
128      * the network presenting the captive portal; all communication with the
129      * captive portal must be done using this {@code Network} object.
130      * <p/>
131      * This activity includes a {@link CaptivePortal} extra named
132      * {@link #EXTRA_CAPTIVE_PORTAL} that can be used to indicate different
133      * outcomes of the captive portal sign in to the system:
134      * <ul>
135      * <li> When the app handling this action believes the user has signed in to
136      * the network and the captive portal has been dismissed, the app should
137      * call {@link CaptivePortal#reportCaptivePortalDismissed} so the system can
138      * reevaluate the network. If reevaluation finds the network no longer
139      * subject to a captive portal, the network may become the default active
140      * data network. </li>
141      * <li> When the app handling this action believes the user explicitly wants
142      * to ignore the captive portal and the network, the app should call
143      * {@link CaptivePortal#ignoreNetwork}. </li>
144      * </ul>
145      */
146     @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION)
147     public static final String ACTION_CAPTIVE_PORTAL_SIGN_IN = "android.net.conn.CAPTIVE_PORTAL";
148 
149     /**
150      * The lookup key for a {@link NetworkInfo} object. Retrieve with
151      * {@link android.content.Intent#getParcelableExtra(String)}.
152      *
153      * @deprecated Since {@link NetworkInfo} can vary based on UID, applications
154      *             should always obtain network information through
155      *             {@link #getActiveNetworkInfo()}.
156      * @see #EXTRA_NETWORK_TYPE
157      */
158     @Deprecated
159     public static final String EXTRA_NETWORK_INFO = "networkInfo";
160 
161     /**
162      * Network type which triggered a {@link #CONNECTIVITY_ACTION} broadcast.
163      *
164      * @see android.content.Intent#getIntExtra(String, int)
165      */
166     public static final String EXTRA_NETWORK_TYPE = "networkType";
167 
168     /**
169      * The lookup key for a boolean that indicates whether a connect event
170      * is for a network to which the connectivity manager was failing over
171      * following a disconnect on another network.
172      * Retrieve it with {@link android.content.Intent#getBooleanExtra(String,boolean)}.
173      */
174     public static final String EXTRA_IS_FAILOVER = "isFailover";
175     /**
176      * The lookup key for a {@link NetworkInfo} object. This is supplied when
177      * there is another network that it may be possible to connect to. Retrieve with
178      * {@link android.content.Intent#getParcelableExtra(String)}.
179      */
180     public static final String EXTRA_OTHER_NETWORK_INFO = "otherNetwork";
181     /**
182      * The lookup key for a boolean that indicates whether there is a
183      * complete lack of connectivity, i.e., no network is available.
184      * Retrieve it with {@link android.content.Intent#getBooleanExtra(String,boolean)}.
185      */
186     public static final String EXTRA_NO_CONNECTIVITY = "noConnectivity";
187     /**
188      * The lookup key for a string that indicates why an attempt to connect
189      * to a network failed. The string has no particular structure. It is
190      * intended to be used in notifications presented to users. Retrieve
191      * it with {@link android.content.Intent#getStringExtra(String)}.
192      */
193     public static final String EXTRA_REASON = "reason";
194     /**
195      * The lookup key for a string that provides optionally supplied
196      * extra information about the network state. The information
197      * may be passed up from the lower networking layers, and its
198      * meaning may be specific to a particular network type. Retrieve
199      * it with {@link android.content.Intent#getStringExtra(String)}.
200      */
201     public static final String EXTRA_EXTRA_INFO = "extraInfo";
202     /**
203      * The lookup key for an int that provides information about
204      * our connection to the internet at large.  0 indicates no connection,
205      * 100 indicates a great connection.  Retrieve it with
206      * {@link android.content.Intent#getIntExtra(String, int)}.
207      * {@hide}
208      */
209     public static final String EXTRA_INET_CONDITION = "inetCondition";
210     /**
211      * The lookup key for a {@link CaptivePortal} object included with the
212      * {@link #ACTION_CAPTIVE_PORTAL_SIGN_IN} intent.  The {@code CaptivePortal}
213      * object can be used to either indicate to the system that the captive
214      * portal has been dismissed or that the user does not want to pursue
215      * signing in to captive portal.  Retrieve it with
216      * {@link android.content.Intent#getParcelableExtra(String)}.
217      */
218     public static final String EXTRA_CAPTIVE_PORTAL = "android.net.extra.CAPTIVE_PORTAL";
219 
220     /**
221      * Key for passing a URL to the captive portal login activity.
222      */
223     public static final String EXTRA_CAPTIVE_PORTAL_URL = "android.net.extra.CAPTIVE_PORTAL_URL";
224 
225     /**
226      * Broadcast action to indicate the change of data activity status
227      * (idle or active) on a network in a recent period.
228      * The network becomes active when data transmission is started, or
229      * idle if there is no data transmission for a period of time.
230      * {@hide}
231      */
232     @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
233     public static final String ACTION_DATA_ACTIVITY_CHANGE = "android.net.conn.DATA_ACTIVITY_CHANGE";
234     /**
235      * The lookup key for an enum that indicates the network device type on which this data activity
236      * change happens.
237      * {@hide}
238      */
239     public static final String EXTRA_DEVICE_TYPE = "deviceType";
240     /**
241      * The lookup key for a boolean that indicates the device is active or not. {@code true} means
242      * it is actively sending or receiving data and {@code false} means it is idle.
243      * {@hide}
244      */
245     public static final String EXTRA_IS_ACTIVE = "isActive";
246     /**
247      * The lookup key for a long that contains the timestamp (nanos) of the radio state change.
248      * {@hide}
249      */
250     public static final String EXTRA_REALTIME_NS = "tsNanos";
251 
252     /**
253      * Broadcast Action: The setting for background data usage has changed
254      * values. Use {@link #getBackgroundDataSetting()} to get the current value.
255      * <p>
256      * If an application uses the network in the background, it should listen
257      * for this broadcast and stop using the background data if the value is
258      * {@code false}.
259      * <p>
260      *
261      * @deprecated As of {@link VERSION_CODES#ICE_CREAM_SANDWICH}, availability
262      *             of background data depends on several combined factors, and
263      *             this broadcast is no longer sent. Instead, when background
264      *             data is unavailable, {@link #getActiveNetworkInfo()} will now
265      *             appear disconnected. During first boot after a platform
266      *             upgrade, this broadcast will be sent once if
267      *             {@link #getBackgroundDataSetting()} was {@code false} before
268      *             the upgrade.
269      */
270     @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
271     @Deprecated
272     public static final String ACTION_BACKGROUND_DATA_SETTING_CHANGED =
273             "android.net.conn.BACKGROUND_DATA_SETTING_CHANGED";
274 
275     /**
276      * Broadcast Action: The network connection may not be good
277      * uses {@code ConnectivityManager.EXTRA_INET_CONDITION} and
278      * {@code ConnectivityManager.EXTRA_NETWORK_INFO} to specify
279      * the network and it's condition.
280      * @hide
281      */
282     @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
283     public static final String INET_CONDITION_ACTION =
284             "android.net.conn.INET_CONDITION_ACTION";
285 
286     /**
287      * Broadcast Action: A tetherable connection has come or gone.
288      * Uses {@code ConnectivityManager.EXTRA_AVAILABLE_TETHER},
289      * {@code ConnectivityManager.EXTRA_ACTIVE_TETHER} and
290      * {@code ConnectivityManager.EXTRA_ERRORED_TETHER} to indicate
291      * the current state of tethering.  Each include a list of
292      * interface names in that state (may be empty).
293      * @hide
294      */
295     @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
296     public static final String ACTION_TETHER_STATE_CHANGED =
297             "android.net.conn.TETHER_STATE_CHANGED";
298 
299     /**
300      * @hide
301      * gives a String[] listing all the interfaces configured for
302      * tethering and currently available for tethering.
303      */
304     public static final String EXTRA_AVAILABLE_TETHER = "availableArray";
305 
306     /**
307      * @hide
308      * gives a String[] listing all the interfaces currently tethered
309      * (ie, has dhcp support and packets potentially forwarded/NATed)
310      */
311     public static final String EXTRA_ACTIVE_TETHER = "activeArray";
312 
313     /**
314      * @hide
315      * gives a String[] listing all the interfaces we tried to tether and
316      * failed.  Use {@link #getLastTetherError} to find the error code
317      * for any interfaces listed here.
318      */
319     public static final String EXTRA_ERRORED_TETHER = "erroredArray";
320 
321     /**
322      * Broadcast Action: The captive portal tracker has finished its test.
323      * Sent only while running Setup Wizard, in lieu of showing a user
324      * notification.
325      * @hide
326      */
327     @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
328     public static final String ACTION_CAPTIVE_PORTAL_TEST_COMPLETED =
329             "android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED";
330     /**
331      * The lookup key for a boolean that indicates whether a captive portal was detected.
332      * Retrieve it with {@link android.content.Intent#getBooleanExtra(String,boolean)}.
333      * @hide
334      */
335     public static final String EXTRA_IS_CAPTIVE_PORTAL = "captivePortal";
336 
337     /**
338      * Action used to display a dialog that asks the user whether to connect to a network that is
339      * not validated. This intent is used to start the dialog in settings via startActivity.
340      *
341      * @hide
342      */
343     public static final String ACTION_PROMPT_UNVALIDATED = "android.net.conn.PROMPT_UNVALIDATED";
344 
345     /**
346      * Invalid tethering type.
347      * @see #startTethering(int, OnStartTetheringCallback, boolean)
348      * @hide
349      */
350     public static final int TETHERING_INVALID   = -1;
351 
352     /**
353      * Wifi tethering type.
354      * @see #startTethering(int, OnStartTetheringCallback, boolean)
355      * @hide
356      */
357     @SystemApi
358     public static final int TETHERING_WIFI      = 0;
359 
360     /**
361      * USB tethering type.
362      * @see #startTethering(int, OnStartTetheringCallback, boolean)
363      * @hide
364      */
365     @SystemApi
366     public static final int TETHERING_USB       = 1;
367 
368     /**
369      * Bluetooth tethering type.
370      * @see #startTethering(int, OnStartTetheringCallback, boolean)
371      * @hide
372      */
373     @SystemApi
374     public static final int TETHERING_BLUETOOTH = 2;
375 
376     /**
377      * Extra used for communicating with the TetherService. Includes the type of tethering to
378      * enable if any.
379      * @hide
380      */
381     public static final String EXTRA_ADD_TETHER_TYPE = "extraAddTetherType";
382 
383     /**
384      * Extra used for communicating with the TetherService. Includes the type of tethering for
385      * which to cancel provisioning.
386      * @hide
387      */
388     public static final String EXTRA_REM_TETHER_TYPE = "extraRemTetherType";
389 
390     /**
391      * Extra used for communicating with the TetherService. True to schedule a recheck of tether
392      * provisioning.
393      * @hide
394      */
395     public static final String EXTRA_SET_ALARM = "extraSetAlarm";
396 
397     /**
398      * Tells the TetherService to run a provision check now.
399      * @hide
400      */
401     public static final String EXTRA_RUN_PROVISION = "extraRunProvision";
402 
403     /**
404      * Extra used for communicating with the TetherService. Contains the {@link ResultReceiver}
405      * which will receive provisioning results. Can be left empty.
406      * @hide
407      */
408     public static final String EXTRA_PROVISION_CALLBACK = "extraProvisionCallback";
409 
410     /**
411      * The absence of a connection type.
412      * @hide
413      */
414     public static final int TYPE_NONE        = -1;
415 
416     /**
417      * The Mobile data connection.  When active, all data traffic
418      * will use this network type's interface by default
419      * (it has a default route)
420      */
421     public static final int TYPE_MOBILE      = 0;
422     /**
423      * The WIFI data connection.  When active, all data traffic
424      * will use this network type's interface by default
425      * (it has a default route).
426      */
427     public static final int TYPE_WIFI        = 1;
428     /**
429      * An MMS-specific Mobile data connection.  This network type may use the
430      * same network interface as {@link #TYPE_MOBILE} or it may use a different
431      * one.  This is used by applications needing to talk to the carrier's
432      * Multimedia Messaging Service servers.
433      *
434      * @deprecated Applications should instead use
435      *         {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request a network that
436      *         provides the {@link NetworkCapabilities#NET_CAPABILITY_MMS} capability.
437      */
438     public static final int TYPE_MOBILE_MMS  = 2;
439     /**
440      * A SUPL-specific Mobile data connection.  This network type may use the
441      * same network interface as {@link #TYPE_MOBILE} or it may use a different
442      * one.  This is used by applications needing to talk to the carrier's
443      * Secure User Plane Location servers for help locating the device.
444      *
445      * @deprecated Applications should instead use
446      *         {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request a network that
447      *         provides the {@link NetworkCapabilities#NET_CAPABILITY_SUPL} capability.
448      */
449     public static final int TYPE_MOBILE_SUPL = 3;
450     /**
451      * A DUN-specific Mobile data connection.  This network type may use the
452      * same network interface as {@link #TYPE_MOBILE} or it may use a different
453      * one.  This is sometimes by the system when setting up an upstream connection
454      * for tethering so that the carrier is aware of DUN traffic.
455      */
456     public static final int TYPE_MOBILE_DUN  = 4;
457     /**
458      * A High Priority Mobile data connection.  This network type uses the
459      * same network interface as {@link #TYPE_MOBILE} but the routing setup
460      * is different.
461      *
462      * @deprecated Applications should instead use
463      *         {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request a network that
464      *         uses the {@link NetworkCapabilities#TRANSPORT_CELLULAR} transport.
465      */
466     public static final int TYPE_MOBILE_HIPRI = 5;
467     /**
468      * The WiMAX data connection.  When active, all data traffic
469      * will use this network type's interface by default
470      * (it has a default route).
471      */
472     public static final int TYPE_WIMAX       = 6;
473 
474     /**
475      * The Bluetooth data connection.  When active, all data traffic
476      * will use this network type's interface by default
477      * (it has a default route).
478      */
479     public static final int TYPE_BLUETOOTH   = 7;
480 
481     /**
482      * Dummy data connection.  This should not be used on shipping devices.
483      */
484     public static final int TYPE_DUMMY       = 8;
485 
486     /**
487      * The Ethernet data connection.  When active, all data traffic
488      * will use this network type's interface by default
489      * (it has a default route).
490      */
491     public static final int TYPE_ETHERNET    = 9;
492 
493     /**
494      * Over the air Administration.
495      * {@hide}
496      */
497     public static final int TYPE_MOBILE_FOTA = 10;
498 
499     /**
500      * IP Multimedia Subsystem.
501      * {@hide}
502      */
503     public static final int TYPE_MOBILE_IMS  = 11;
504 
505     /**
506      * Carrier Branded Services.
507      * {@hide}
508      */
509     public static final int TYPE_MOBILE_CBS  = 12;
510 
511     /**
512      * A Wi-Fi p2p connection. Only requesting processes will have access to
513      * the peers connected.
514      * {@hide}
515      */
516     public static final int TYPE_WIFI_P2P    = 13;
517 
518     /**
519      * The network to use for initially attaching to the network
520      * {@hide}
521      */
522     public static final int TYPE_MOBILE_IA = 14;
523 
524     /**
525      * Emergency PDN connection for emergency services.  This
526      * may include IMS and MMS in emergency situations.
527      * {@hide}
528      */
529     public static final int TYPE_MOBILE_EMERGENCY = 15;
530 
531     /**
532      * The network that uses proxy to achieve connectivity.
533      * {@hide}
534      */
535     public static final int TYPE_PROXY = 16;
536 
537     /**
538      * A virtual network using one or more native bearers.
539      * It may or may not be providing security services.
540      */
541     public static final int TYPE_VPN = 17;
542 
543     /** {@hide} */
544     public static final int MAX_RADIO_TYPE   = TYPE_VPN;
545 
546     /** {@hide} */
547     public static final int MAX_NETWORK_TYPE = TYPE_VPN;
548 
549     /**
550      * If you want to set the default network preference,you can directly
551      * change the networkAttributes array in framework's config.xml.
552      *
553      * @deprecated Since we support so many more networks now, the single
554      *             network default network preference can't really express
555      *             the hierarchy.  Instead, the default is defined by the
556      *             networkAttributes in config.xml.  You can determine
557      *             the current value by calling {@link #getNetworkPreference()}
558      *             from an App.
559      */
560     @Deprecated
561     public static final int DEFAULT_NETWORK_PREFERENCE = TYPE_WIFI;
562 
563     /**
564      * @hide
565      */
566     public final static int REQUEST_ID_UNSET = 0;
567 
568     /**
569      * A NetID indicating no Network is selected.
570      * Keep in sync with bionic/libc/dns/include/resolv_netid.h
571      * @hide
572      */
573     public static final int NETID_UNSET = 0;
574 
575     private final IConnectivityManager mService;
576     /**
577      * A kludge to facilitate static access where a Context pointer isn't available, like in the
578      * case of the static set/getProcessDefaultNetwork methods and from the Network class.
579      * TODO: Remove this after deprecating the static methods in favor of non-static methods or
580      * methods that take a Context argument.
581      */
582     private static ConnectivityManager sInstance;
583 
584     private final Context mContext;
585 
586     private INetworkManagementService mNMService;
587     private INetworkPolicyManager mNPManager;
588 
589     /**
590      * Tests if a given integer represents a valid network type.
591      * @param networkType the type to be tested
592      * @return a boolean.  {@code true} if the type is valid, else {@code false}
593      * @deprecated All APIs accepting a network type are deprecated. There should be no need to
594      *             validate a network type.
595      */
isNetworkTypeValid(int networkType)596     public static boolean isNetworkTypeValid(int networkType) {
597         return networkType >= 0 && networkType <= MAX_NETWORK_TYPE;
598     }
599 
600     /**
601      * Returns a non-localized string representing a given network type.
602      * ONLY used for debugging output.
603      * @param type the type needing naming
604      * @return a String for the given type, or a string version of the type ("87")
605      * if no name is known.
606      * {@hide}
607      */
getNetworkTypeName(int type)608     public static String getNetworkTypeName(int type) {
609         switch (type) {
610             case TYPE_MOBILE:
611                 return "MOBILE";
612             case TYPE_WIFI:
613                 return "WIFI";
614             case TYPE_MOBILE_MMS:
615                 return "MOBILE_MMS";
616             case TYPE_MOBILE_SUPL:
617                 return "MOBILE_SUPL";
618             case TYPE_MOBILE_DUN:
619                 return "MOBILE_DUN";
620             case TYPE_MOBILE_HIPRI:
621                 return "MOBILE_HIPRI";
622             case TYPE_WIMAX:
623                 return "WIMAX";
624             case TYPE_BLUETOOTH:
625                 return "BLUETOOTH";
626             case TYPE_DUMMY:
627                 return "DUMMY";
628             case TYPE_ETHERNET:
629                 return "ETHERNET";
630             case TYPE_MOBILE_FOTA:
631                 return "MOBILE_FOTA";
632             case TYPE_MOBILE_IMS:
633                 return "MOBILE_IMS";
634             case TYPE_MOBILE_CBS:
635                 return "MOBILE_CBS";
636             case TYPE_WIFI_P2P:
637                 return "WIFI_P2P";
638             case TYPE_MOBILE_IA:
639                 return "MOBILE_IA";
640             case TYPE_MOBILE_EMERGENCY:
641                 return "MOBILE_EMERGENCY";
642             case TYPE_PROXY:
643                 return "PROXY";
644             case TYPE_VPN:
645                 return "VPN";
646             default:
647                 return Integer.toString(type);
648         }
649     }
650 
651     /**
652      * Checks if a given type uses the cellular data connection.
653      * This should be replaced in the future by a network property.
654      * @param networkType the type to check
655      * @return a boolean - {@code true} if uses cellular network, else {@code false}
656      * {@hide}
657      */
isNetworkTypeMobile(int networkType)658     public static boolean isNetworkTypeMobile(int networkType) {
659         switch (networkType) {
660             case TYPE_MOBILE:
661             case TYPE_MOBILE_MMS:
662             case TYPE_MOBILE_SUPL:
663             case TYPE_MOBILE_DUN:
664             case TYPE_MOBILE_HIPRI:
665             case TYPE_MOBILE_FOTA:
666             case TYPE_MOBILE_IMS:
667             case TYPE_MOBILE_CBS:
668             case TYPE_MOBILE_IA:
669             case TYPE_MOBILE_EMERGENCY:
670                 return true;
671             default:
672                 return false;
673         }
674     }
675 
676     /**
677      * Checks if the given network type is backed by a Wi-Fi radio.
678      *
679      * @hide
680      */
isNetworkTypeWifi(int networkType)681     public static boolean isNetworkTypeWifi(int networkType) {
682         switch (networkType) {
683             case TYPE_WIFI:
684             case TYPE_WIFI_P2P:
685                 return true;
686             default:
687                 return false;
688         }
689     }
690 
691     /**
692      * Specifies the preferred network type.  When the device has more
693      * than one type available the preferred network type will be used.
694      *
695      * @param preference the network type to prefer over all others.  It is
696      *         unspecified what happens to the old preferred network in the
697      *         overall ordering.
698      * @deprecated Functionality has been removed as it no longer makes sense,
699      *             with many more than two networks - we'd need an array to express
700      *             preference.  Instead we use dynamic network properties of
701      *             the networks to describe their precedence.
702      */
setNetworkPreference(int preference)703     public void setNetworkPreference(int preference) {
704     }
705 
706     /**
707      * Retrieves the current preferred network type.
708      * <p>This method requires the caller to hold the permission
709      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
710      *
711      * @return an integer representing the preferred network type
712      *
713      * @deprecated Functionality has been removed as it no longer makes sense,
714      *             with many more than two networks - we'd need an array to express
715      *             preference.  Instead we use dynamic network properties of
716      *             the networks to describe their precedence.
717      */
getNetworkPreference()718     public int getNetworkPreference() {
719         return TYPE_NONE;
720     }
721 
722     /**
723      * Returns details about the currently active default data network. When
724      * connected, this network is the default route for outgoing connections.
725      * You should always check {@link NetworkInfo#isConnected()} before initiating
726      * network traffic. This may return {@code null} when there is no default
727      * network.
728      * <p>This method requires the caller to hold the permission
729      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
730      *
731      * @return a {@link NetworkInfo} object for the current default network
732      *        or {@code null} if no default network is currently active
733      */
getActiveNetworkInfo()734     public NetworkInfo getActiveNetworkInfo() {
735         try {
736             return mService.getActiveNetworkInfo();
737         } catch (RemoteException e) {
738             throw e.rethrowFromSystemServer();
739         }
740     }
741 
742     /**
743      * Returns a {@link Network} object corresponding to the currently active
744      * default data network.  In the event that the current active default data
745      * network disconnects, the returned {@code Network} object will no longer
746      * be usable.  This will return {@code null} when there is no default
747      * network.
748      * <p>This method requires the caller to hold the permission
749      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
750      *
751      * @return a {@link Network} object for the current default network or
752      *        {@code null} if no default network is currently active
753      */
getActiveNetwork()754     public Network getActiveNetwork() {
755         try {
756             return mService.getActiveNetwork();
757         } catch (RemoteException e) {
758             throw e.rethrowFromSystemServer();
759         }
760     }
761 
762     /**
763      * Returns a {@link Network} object corresponding to the currently active
764      * default data network for a specific UID.  In the event that the default data
765      * network disconnects, the returned {@code Network} object will no longer
766      * be usable.  This will return {@code null} when there is no default
767      * network for the UID.
768      * <p>This method requires the caller to hold the permission
769      * {@link android.Manifest.permission#CONNECTIVITY_INTERNAL}.
770      *
771      * @return a {@link Network} object for the current default network for the
772      *         given UID or {@code null} if no default network is currently active
773      *
774      * @hide
775      */
getActiveNetworkForUid(int uid)776     public Network getActiveNetworkForUid(int uid) {
777         return getActiveNetworkForUid(uid, false);
778     }
779 
780     /** {@hide} */
getActiveNetworkForUid(int uid, boolean ignoreBlocked)781     public Network getActiveNetworkForUid(int uid, boolean ignoreBlocked) {
782         try {
783             return mService.getActiveNetworkForUid(uid, ignoreBlocked);
784         } catch (RemoteException e) {
785             throw e.rethrowFromSystemServer();
786         }
787     }
788 
789     /**
790      * Configures an always-on VPN connection through a specific application.
791      * This connection is automatically granted and persisted after a reboot.
792      *
793      * <p>The designated package should declare a {@link VpnService} in its
794      *    manifest guarded by {@link android.Manifest.permission.BIND_VPN_SERVICE},
795      *    otherwise the call will fail.
796      *
797      * @param userId The identifier of the user to set an always-on VPN for.
798      * @param vpnPackage The package name for an installed VPN app on the device, or {@code null}
799      *                   to remove an existing always-on VPN configuration.
800      * @param lockdownEnabled {@code true} to disallow networking when the VPN is not connected or
801      *        {@code false} otherwise.
802      * @return {@code true} if the package is set as always-on VPN controller;
803      *         {@code false} otherwise.
804      * @hide
805      */
setAlwaysOnVpnPackageForUser(int userId, @Nullable String vpnPackage, boolean lockdownEnabled)806     public boolean setAlwaysOnVpnPackageForUser(int userId, @Nullable String vpnPackage,
807             boolean lockdownEnabled) {
808         try {
809             return mService.setAlwaysOnVpnPackage(userId, vpnPackage, lockdownEnabled);
810         } catch (RemoteException e) {
811             throw e.rethrowFromSystemServer();
812         }
813     }
814 
815     /**
816      * Returns the package name of the currently set always-on VPN application.
817      * If there is no always-on VPN set, or the VPN is provided by the system instead
818      * of by an app, {@code null} will be returned.
819      *
820      * @return Package name of VPN controller responsible for always-on VPN,
821      *         or {@code null} if none is set.
822      * @hide
823      */
getAlwaysOnVpnPackageForUser(int userId)824     public String getAlwaysOnVpnPackageForUser(int userId) {
825         try {
826             return mService.getAlwaysOnVpnPackage(userId);
827         } catch (RemoteException e) {
828             throw e.rethrowFromSystemServer();
829         }
830     }
831 
832     /**
833      * Returns details about the currently active default data network
834      * for a given uid.  This is for internal use only to avoid spying
835      * other apps.
836      * <p>This method requires the caller to hold the permission
837      * {@link android.Manifest.permission#CONNECTIVITY_INTERNAL}
838      *
839      * @return a {@link NetworkInfo} object for the current default network
840      *        for the given uid or {@code null} if no default network is
841      *        available for the specified uid.
842      *
843      * {@hide}
844      */
getActiveNetworkInfoForUid(int uid)845     public NetworkInfo getActiveNetworkInfoForUid(int uid) {
846         return getActiveNetworkInfoForUid(uid, false);
847     }
848 
849     /** {@hide} */
getActiveNetworkInfoForUid(int uid, boolean ignoreBlocked)850     public NetworkInfo getActiveNetworkInfoForUid(int uid, boolean ignoreBlocked) {
851         try {
852             return mService.getActiveNetworkInfoForUid(uid, ignoreBlocked);
853         } catch (RemoteException e) {
854             throw e.rethrowFromSystemServer();
855         }
856     }
857 
858     /**
859      * Returns connection status information about a particular
860      * network type.
861      * <p>This method requires the caller to hold the permission
862      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
863      *
864      * @param networkType integer specifying which networkType in
865      *        which you're interested.
866      * @return a {@link NetworkInfo} object for the requested
867      *        network type or {@code null} if the type is not
868      *        supported by the device.
869      *
870      * @deprecated This method does not support multiple connected networks
871      *             of the same type. Use {@link #getAllNetworks} and
872      *             {@link #getNetworkInfo(android.net.Network)} instead.
873      */
getNetworkInfo(int networkType)874     public NetworkInfo getNetworkInfo(int networkType) {
875         try {
876             return mService.getNetworkInfo(networkType);
877         } catch (RemoteException e) {
878             throw e.rethrowFromSystemServer();
879         }
880     }
881 
882     /**
883      * Returns connection status information about a particular
884      * Network.
885      * <p>This method requires the caller to hold the permission
886      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
887      *
888      * @param network {@link Network} specifying which network
889      *        in which you're interested.
890      * @return a {@link NetworkInfo} object for the requested
891      *        network or {@code null} if the {@code Network}
892      *        is not valid.
893      */
getNetworkInfo(Network network)894     public NetworkInfo getNetworkInfo(Network network) {
895         return getNetworkInfoForUid(network, Process.myUid(), false);
896     }
897 
898     /** {@hide} */
getNetworkInfoForUid(Network network, int uid, boolean ignoreBlocked)899     public NetworkInfo getNetworkInfoForUid(Network network, int uid, boolean ignoreBlocked) {
900         try {
901             return mService.getNetworkInfoForUid(network, uid, ignoreBlocked);
902         } catch (RemoteException e) {
903             throw e.rethrowFromSystemServer();
904         }
905     }
906 
907     /**
908      * Returns connection status information about all network
909      * types supported by the device.
910      * <p>This method requires the caller to hold the permission
911      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
912      *
913      * @return an array of {@link NetworkInfo} objects.  Check each
914      * {@link NetworkInfo#getType} for which type each applies.
915      *
916      * @deprecated This method does not support multiple connected networks
917      *             of the same type. Use {@link #getAllNetworks} and
918      *             {@link #getNetworkInfo(android.net.Network)} instead.
919      */
getAllNetworkInfo()920     public NetworkInfo[] getAllNetworkInfo() {
921         try {
922             return mService.getAllNetworkInfo();
923         } catch (RemoteException e) {
924             throw e.rethrowFromSystemServer();
925         }
926     }
927 
928     /**
929      * Returns the {@link Network} object currently serving a given type, or
930      * null if the given type is not connected.
931      *
932      * <p>This method requires the caller to hold the permission
933      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
934      *
935      * @hide
936      * @deprecated This method does not support multiple connected networks
937      *             of the same type. Use {@link #getAllNetworks} and
938      *             {@link #getNetworkInfo(android.net.Network)} instead.
939      */
getNetworkForType(int networkType)940     public Network getNetworkForType(int networkType) {
941         try {
942             return mService.getNetworkForType(networkType);
943         } catch (RemoteException e) {
944             throw e.rethrowFromSystemServer();
945         }
946     }
947 
948     /**
949      * Returns an array of all {@link Network} currently tracked by the
950      * framework.
951      * <p>This method requires the caller to hold the permission
952      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
953      *
954      * @return an array of {@link Network} objects.
955      */
getAllNetworks()956     public Network[] getAllNetworks() {
957         try {
958             return mService.getAllNetworks();
959         } catch (RemoteException e) {
960             throw e.rethrowFromSystemServer();
961         }
962     }
963 
964     /**
965      * Returns an array of {@link android.net.NetworkCapabilities} objects, representing
966      * the Networks that applications run by the given user will use by default.
967      * @hide
968      */
getDefaultNetworkCapabilitiesForUser(int userId)969     public NetworkCapabilities[] getDefaultNetworkCapabilitiesForUser(int userId) {
970         try {
971             return mService.getDefaultNetworkCapabilitiesForUser(userId);
972         } catch (RemoteException e) {
973             throw e.rethrowFromSystemServer();
974         }
975     }
976 
977     /**
978      * Returns the IP information for the current default network.
979      * <p>This method requires the caller to hold the permission
980      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
981      *
982      * @return a {@link LinkProperties} object describing the IP info
983      *        for the current default network, or {@code null} if there
984      *        is no current default network.
985      *
986      * {@hide}
987      */
getActiveLinkProperties()988     public LinkProperties getActiveLinkProperties() {
989         try {
990             return mService.getActiveLinkProperties();
991         } catch (RemoteException e) {
992             throw e.rethrowFromSystemServer();
993         }
994     }
995 
996     /**
997      * Returns the IP information for a given network type.
998      * <p>This method requires the caller to hold the permission
999      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
1000      *
1001      * @param networkType the network type of interest.
1002      * @return a {@link LinkProperties} object describing the IP info
1003      *        for the given networkType, or {@code null} if there is
1004      *        no current default network.
1005      *
1006      * {@hide}
1007      * @deprecated This method does not support multiple connected networks
1008      *             of the same type. Use {@link #getAllNetworks},
1009      *             {@link #getNetworkInfo(android.net.Network)}, and
1010      *             {@link #getLinkProperties(android.net.Network)} instead.
1011      */
getLinkProperties(int networkType)1012     public LinkProperties getLinkProperties(int networkType) {
1013         try {
1014             return mService.getLinkPropertiesForType(networkType);
1015         } catch (RemoteException e) {
1016             throw e.rethrowFromSystemServer();
1017         }
1018     }
1019 
1020     /**
1021      * Get the {@link LinkProperties} for the given {@link Network}.  This
1022      * will return {@code null} if the network is unknown.
1023      * <p>This method requires the caller to hold the permission
1024      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
1025      *
1026      * @param network The {@link Network} object identifying the network in question.
1027      * @return The {@link LinkProperties} for the network, or {@code null}.
1028      */
getLinkProperties(Network network)1029     public LinkProperties getLinkProperties(Network network) {
1030         try {
1031             return mService.getLinkProperties(network);
1032         } catch (RemoteException e) {
1033             throw e.rethrowFromSystemServer();
1034         }
1035     }
1036 
1037     /**
1038      * Get the {@link android.net.NetworkCapabilities} for the given {@link Network}.  This
1039      * will return {@code null} if the network is unknown.
1040      * <p>This method requires the caller to hold the permission
1041      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
1042      *
1043      * @param network The {@link Network} object identifying the network in question.
1044      * @return The {@link android.net.NetworkCapabilities} for the network, or {@code null}.
1045      */
getNetworkCapabilities(Network network)1046     public NetworkCapabilities getNetworkCapabilities(Network network) {
1047         try {
1048             return mService.getNetworkCapabilities(network);
1049         } catch (RemoteException e) {
1050             throw e.rethrowFromSystemServer();
1051         }
1052     }
1053 
1054     /**
1055      * Gets the URL that should be used for resolving whether a captive portal is present.
1056      * 1. This URL should respond with a 204 response to a GET request to indicate no captive
1057      *    portal is present.
1058      * 2. This URL must be HTTP as redirect responses are used to find captive portal
1059      *    sign-in pages. Captive portals cannot respond to HTTPS requests with redirects.
1060      *
1061      * @hide
1062      */
1063     @SystemApi
getCaptivePortalServerUrl()1064     public String getCaptivePortalServerUrl() {
1065         try {
1066             return mService.getCaptivePortalServerUrl();
1067         } catch (RemoteException e) {
1068             throw e.rethrowFromSystemServer();
1069         }
1070     }
1071 
1072     /**
1073      * Tells the underlying networking system that the caller wants to
1074      * begin using the named feature. The interpretation of {@code feature}
1075      * is completely up to each networking implementation.
1076      *
1077      * <p>This method requires the caller to hold either the
1078      * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
1079      * or the ability to modify system settings as determined by
1080      * {@link android.provider.Settings.System#canWrite}.</p>
1081      *
1082      * @param networkType specifies which network the request pertains to
1083      * @param feature the name of the feature to be used
1084      * @return an integer value representing the outcome of the request.
1085      * The interpretation of this value is specific to each networking
1086      * implementation+feature combination, except that the value {@code -1}
1087      * always indicates failure.
1088      *
1089      * @deprecated Deprecated in favor of the cleaner
1090      *             {@link #requestNetwork(NetworkRequest, NetworkCallback)} API.
1091      *             In {@link VERSION_CODES#M}, and above, this method is unsupported and will
1092      *             throw {@code UnsupportedOperationException} if called.
1093      */
startUsingNetworkFeature(int networkType, String feature)1094     public int startUsingNetworkFeature(int networkType, String feature) {
1095         checkLegacyRoutingApiAccess();
1096         NetworkCapabilities netCap = networkCapabilitiesForFeature(networkType, feature);
1097         if (netCap == null) {
1098             Log.d(TAG, "Can't satisfy startUsingNetworkFeature for " + networkType + ", " +
1099                     feature);
1100             return PhoneConstants.APN_REQUEST_FAILED;
1101         }
1102 
1103         NetworkRequest request = null;
1104         synchronized (sLegacyRequests) {
1105             LegacyRequest l = sLegacyRequests.get(netCap);
1106             if (l != null) {
1107                 Log.d(TAG, "renewing startUsingNetworkFeature request " + l.networkRequest);
1108                 renewRequestLocked(l);
1109                 if (l.currentNetwork != null) {
1110                     return PhoneConstants.APN_ALREADY_ACTIVE;
1111                 } else {
1112                     return PhoneConstants.APN_REQUEST_STARTED;
1113                 }
1114             }
1115 
1116             request = requestNetworkForFeatureLocked(netCap);
1117         }
1118         if (request != null) {
1119             Log.d(TAG, "starting startUsingNetworkFeature for request " + request);
1120             return PhoneConstants.APN_REQUEST_STARTED;
1121         } else {
1122             Log.d(TAG, " request Failed");
1123             return PhoneConstants.APN_REQUEST_FAILED;
1124         }
1125     }
1126 
1127     /**
1128      * Tells the underlying networking system that the caller is finished
1129      * using the named feature. The interpretation of {@code feature}
1130      * is completely up to each networking implementation.
1131      *
1132      * <p>This method requires the caller to hold either the
1133      * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
1134      * or the ability to modify system settings as determined by
1135      * {@link android.provider.Settings.System#canWrite}.</p>
1136      *
1137      * @param networkType specifies which network the request pertains to
1138      * @param feature the name of the feature that is no longer needed
1139      * @return an integer value representing the outcome of the request.
1140      * The interpretation of this value is specific to each networking
1141      * implementation+feature combination, except that the value {@code -1}
1142      * always indicates failure.
1143      *
1144      * @deprecated Deprecated in favor of the cleaner
1145      *             {@link #unregisterNetworkCallback(NetworkCallback)} API.
1146      *             In {@link VERSION_CODES#M}, and above, this method is unsupported and will
1147      *             throw {@code UnsupportedOperationException} if called.
1148      */
stopUsingNetworkFeature(int networkType, String feature)1149     public int stopUsingNetworkFeature(int networkType, String feature) {
1150         checkLegacyRoutingApiAccess();
1151         NetworkCapabilities netCap = networkCapabilitiesForFeature(networkType, feature);
1152         if (netCap == null) {
1153             Log.d(TAG, "Can't satisfy stopUsingNetworkFeature for " + networkType + ", " +
1154                     feature);
1155             return -1;
1156         }
1157 
1158         if (removeRequestForFeature(netCap)) {
1159             Log.d(TAG, "stopUsingNetworkFeature for " + networkType + ", " + feature);
1160         }
1161         return 1;
1162     }
1163 
networkCapabilitiesForFeature(int networkType, String feature)1164     private NetworkCapabilities networkCapabilitiesForFeature(int networkType, String feature) {
1165         if (networkType == TYPE_MOBILE) {
1166             int cap = -1;
1167             if ("enableMMS".equals(feature)) {
1168                 cap = NetworkCapabilities.NET_CAPABILITY_MMS;
1169             } else if ("enableSUPL".equals(feature)) {
1170                 cap = NetworkCapabilities.NET_CAPABILITY_SUPL;
1171             } else if ("enableDUN".equals(feature) || "enableDUNAlways".equals(feature)) {
1172                 cap = NetworkCapabilities.NET_CAPABILITY_DUN;
1173             } else if ("enableHIPRI".equals(feature)) {
1174                 cap = NetworkCapabilities.NET_CAPABILITY_INTERNET;
1175             } else if ("enableFOTA".equals(feature)) {
1176                 cap = NetworkCapabilities.NET_CAPABILITY_FOTA;
1177             } else if ("enableIMS".equals(feature)) {
1178                 cap = NetworkCapabilities.NET_CAPABILITY_IMS;
1179             } else if ("enableCBS".equals(feature)) {
1180                 cap = NetworkCapabilities.NET_CAPABILITY_CBS;
1181             } else {
1182                 return null;
1183             }
1184             NetworkCapabilities netCap = new NetworkCapabilities();
1185             netCap.addTransportType(NetworkCapabilities.TRANSPORT_CELLULAR).addCapability(cap);
1186             netCap.maybeMarkCapabilitiesRestricted();
1187             return netCap;
1188         } else if (networkType == TYPE_WIFI) {
1189             if ("p2p".equals(feature)) {
1190                 NetworkCapabilities netCap = new NetworkCapabilities();
1191                 netCap.addTransportType(NetworkCapabilities.TRANSPORT_WIFI);
1192                 netCap.addCapability(NetworkCapabilities.NET_CAPABILITY_WIFI_P2P);
1193                 netCap.maybeMarkCapabilitiesRestricted();
1194                 return netCap;
1195             }
1196         }
1197         return null;
1198     }
1199 
1200     /**
1201      * Guess what the network request was trying to say so that the resulting
1202      * network is accessible via the legacy (deprecated) API such as
1203      * requestRouteToHost.
1204      *
1205      * This means we should try to be fairly precise about transport and
1206      * capability but ignore things such as networkSpecifier.
1207      * If the request has more than one transport or capability it doesn't
1208      * match the old legacy requests (they selected only single transport/capability)
1209      * so this function cannot map the request to a single legacy type and
1210      * the resulting network will not be available to the legacy APIs.
1211      *
1212      * This code is only called from the requestNetwork API (L and above).
1213      *
1214      * Setting a legacy type causes CONNECTIVITY_ACTION broadcasts, which are expensive
1215      * because they wake up lots of apps - see http://b/23350688 . So we currently only
1216      * do this for SUPL requests, which are the only ones that we know need it. If
1217      * omitting these broadcasts causes unacceptable app breakage, then for backwards
1218      * compatibility we can send them:
1219      *
1220      * if (targetSdkVersion < Build.VERSION_CODES.M) &&        // legacy API unsupported >= M
1221      *     targetSdkVersion >= Build.VERSION_CODES.LOLLIPOP))  // requestNetwork not present < L
1222      *
1223      * TODO - This should be removed when the legacy APIs are removed.
1224      */
inferLegacyTypeForNetworkCapabilities(NetworkCapabilities netCap)1225     private int inferLegacyTypeForNetworkCapabilities(NetworkCapabilities netCap) {
1226         if (netCap == null) {
1227             return TYPE_NONE;
1228         }
1229 
1230         if (!netCap.hasTransport(NetworkCapabilities.TRANSPORT_CELLULAR)) {
1231             return TYPE_NONE;
1232         }
1233 
1234         // Do this only for SUPL, until GnssLocationProvider is fixed. http://b/25876485 .
1235         if (!netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_SUPL)) {
1236             // NOTE: if this causes app breakage, we should not just comment out this early return;
1237             // instead, we should make this early return conditional on the requesting app's target
1238             // SDK version, as described in the comment above.
1239             return TYPE_NONE;
1240         }
1241 
1242         String type = null;
1243         int result = TYPE_NONE;
1244 
1245         if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_CBS)) {
1246             type = "enableCBS";
1247             result = TYPE_MOBILE_CBS;
1248         } else if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_IMS)) {
1249             type = "enableIMS";
1250             result = TYPE_MOBILE_IMS;
1251         } else if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_FOTA)) {
1252             type = "enableFOTA";
1253             result = TYPE_MOBILE_FOTA;
1254         } else if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_DUN)) {
1255             type = "enableDUN";
1256             result = TYPE_MOBILE_DUN;
1257         } else if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_SUPL)) {
1258             type = "enableSUPL";
1259             result = TYPE_MOBILE_SUPL;
1260         // back out this hack for mms as they no longer need this and it's causing
1261         // device slowdowns - b/23350688 (note, supl still needs this)
1262         //} else if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_MMS)) {
1263         //    type = "enableMMS";
1264         //    result = TYPE_MOBILE_MMS;
1265         } else if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_INTERNET)) {
1266             type = "enableHIPRI";
1267             result = TYPE_MOBILE_HIPRI;
1268         }
1269         if (type != null) {
1270             NetworkCapabilities testCap = networkCapabilitiesForFeature(TYPE_MOBILE, type);
1271             if (testCap.equalsNetCapabilities(netCap) && testCap.equalsTransportTypes(netCap)) {
1272                 return result;
1273             }
1274         }
1275         return TYPE_NONE;
1276     }
1277 
legacyTypeForNetworkCapabilities(NetworkCapabilities netCap)1278     private int legacyTypeForNetworkCapabilities(NetworkCapabilities netCap) {
1279         if (netCap == null) return TYPE_NONE;
1280         if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_CBS)) {
1281             return TYPE_MOBILE_CBS;
1282         }
1283         if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_IMS)) {
1284             return TYPE_MOBILE_IMS;
1285         }
1286         if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_FOTA)) {
1287             return TYPE_MOBILE_FOTA;
1288         }
1289         if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_DUN)) {
1290             return TYPE_MOBILE_DUN;
1291         }
1292         if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_SUPL)) {
1293             return TYPE_MOBILE_SUPL;
1294         }
1295         if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_MMS)) {
1296             return TYPE_MOBILE_MMS;
1297         }
1298         if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_INTERNET)) {
1299             return TYPE_MOBILE_HIPRI;
1300         }
1301         if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_WIFI_P2P)) {
1302             return TYPE_WIFI_P2P;
1303         }
1304         return TYPE_NONE;
1305     }
1306 
1307     private static class LegacyRequest {
1308         NetworkCapabilities networkCapabilities;
1309         NetworkRequest networkRequest;
1310         int expireSequenceNumber;
1311         Network currentNetwork;
1312         int delay = -1;
1313 
clearDnsBinding()1314         private void clearDnsBinding() {
1315             if (currentNetwork != null) {
1316                 currentNetwork = null;
1317                 setProcessDefaultNetworkForHostResolution(null);
1318             }
1319         }
1320 
1321         NetworkCallback networkCallback = new NetworkCallback() {
1322             @Override
1323             public void onAvailable(Network network) {
1324                 currentNetwork = network;
1325                 Log.d(TAG, "startUsingNetworkFeature got Network:" + network);
1326                 setProcessDefaultNetworkForHostResolution(network);
1327             }
1328             @Override
1329             public void onLost(Network network) {
1330                 if (network.equals(currentNetwork)) clearDnsBinding();
1331                 Log.d(TAG, "startUsingNetworkFeature lost Network:" + network);
1332             }
1333         };
1334     }
1335 
1336     private static HashMap<NetworkCapabilities, LegacyRequest> sLegacyRequests =
1337             new HashMap<NetworkCapabilities, LegacyRequest>();
1338 
findRequestForFeature(NetworkCapabilities netCap)1339     private NetworkRequest findRequestForFeature(NetworkCapabilities netCap) {
1340         synchronized (sLegacyRequests) {
1341             LegacyRequest l = sLegacyRequests.get(netCap);
1342             if (l != null) return l.networkRequest;
1343         }
1344         return null;
1345     }
1346 
renewRequestLocked(LegacyRequest l)1347     private void renewRequestLocked(LegacyRequest l) {
1348         l.expireSequenceNumber++;
1349         Log.d(TAG, "renewing request to seqNum " + l.expireSequenceNumber);
1350         sendExpireMsgForFeature(l.networkCapabilities, l.expireSequenceNumber, l.delay);
1351     }
1352 
expireRequest(NetworkCapabilities netCap, int sequenceNum)1353     private void expireRequest(NetworkCapabilities netCap, int sequenceNum) {
1354         int ourSeqNum = -1;
1355         synchronized (sLegacyRequests) {
1356             LegacyRequest l = sLegacyRequests.get(netCap);
1357             if (l == null) return;
1358             ourSeqNum = l.expireSequenceNumber;
1359             if (l.expireSequenceNumber == sequenceNum) removeRequestForFeature(netCap);
1360         }
1361         Log.d(TAG, "expireRequest with " + ourSeqNum + ", " + sequenceNum);
1362     }
1363 
requestNetworkForFeatureLocked(NetworkCapabilities netCap)1364     private NetworkRequest requestNetworkForFeatureLocked(NetworkCapabilities netCap) {
1365         int delay = -1;
1366         int type = legacyTypeForNetworkCapabilities(netCap);
1367         try {
1368             delay = mService.getRestoreDefaultNetworkDelay(type);
1369         } catch (RemoteException e) {
1370             throw e.rethrowFromSystemServer();
1371         }
1372         LegacyRequest l = new LegacyRequest();
1373         l.networkCapabilities = netCap;
1374         l.delay = delay;
1375         l.expireSequenceNumber = 0;
1376         l.networkRequest = sendRequestForNetwork(netCap, l.networkCallback, 0,
1377                 REQUEST, type);
1378         if (l.networkRequest == null) return null;
1379         sLegacyRequests.put(netCap, l);
1380         sendExpireMsgForFeature(netCap, l.expireSequenceNumber, delay);
1381         return l.networkRequest;
1382     }
1383 
sendExpireMsgForFeature(NetworkCapabilities netCap, int seqNum, int delay)1384     private void sendExpireMsgForFeature(NetworkCapabilities netCap, int seqNum, int delay) {
1385         if (delay >= 0) {
1386             Log.d(TAG, "sending expire msg with seqNum " + seqNum + " and delay " + delay);
1387             Message msg = sCallbackHandler.obtainMessage(EXPIRE_LEGACY_REQUEST, seqNum, 0, netCap);
1388             sCallbackHandler.sendMessageDelayed(msg, delay);
1389         }
1390     }
1391 
removeRequestForFeature(NetworkCapabilities netCap)1392     private boolean removeRequestForFeature(NetworkCapabilities netCap) {
1393         final LegacyRequest l;
1394         synchronized (sLegacyRequests) {
1395             l = sLegacyRequests.remove(netCap);
1396         }
1397         if (l == null) return false;
1398         unregisterNetworkCallback(l.networkCallback);
1399         l.clearDnsBinding();
1400         return true;
1401     }
1402 
1403     /** @hide */
1404     public static class PacketKeepaliveCallback {
1405         /** The requested keepalive was successfully started. */
onStarted()1406         public void onStarted() {}
1407         /** The keepalive was successfully stopped. */
onStopped()1408         public void onStopped() {}
1409         /** An error occurred. */
onError(int error)1410         public void onError(int error) {}
1411     }
1412 
1413     /**
1414      * Allows applications to request that the system periodically send specific packets on their
1415      * behalf, using hardware offload to save battery power.
1416      *
1417      * To request that the system send keepalives, call one of the methods that return a
1418      * {@link ConnectivityManager.PacketKeepalive} object, such as {@link #startNattKeepalive},
1419      * passing in a non-null callback. If the callback is successfully started, the callback's
1420      * {@code onStarted} method will be called. If an error occurs, {@code onError} will be called,
1421      * specifying one of the {@code ERROR_*} constants in this class.
1422      *
1423      * To stop an existing keepalive, call {@link stop}. The system will call {@code onStopped} if
1424      * the operation was successfull or {@code onError} if an error occurred.
1425      *
1426      * @hide
1427      */
1428     public class PacketKeepalive {
1429 
1430         private static final String TAG = "PacketKeepalive";
1431 
1432         /** @hide */
1433         public static final int SUCCESS = 0;
1434 
1435         /** @hide */
1436         public static final int NO_KEEPALIVE = -1;
1437 
1438         /** @hide */
1439         public static final int BINDER_DIED = -10;
1440 
1441         /** The specified {@code Network} is not connected. */
1442         public static final int ERROR_INVALID_NETWORK = -20;
1443         /** The specified IP addresses are invalid. For example, the specified source IP address is
1444           * not configured on the specified {@code Network}. */
1445         public static final int ERROR_INVALID_IP_ADDRESS = -21;
1446         /** The requested port is invalid. */
1447         public static final int ERROR_INVALID_PORT = -22;
1448         /** The packet length is invalid (e.g., too long). */
1449         public static final int ERROR_INVALID_LENGTH = -23;
1450         /** The packet transmission interval is invalid (e.g., too short). */
1451         public static final int ERROR_INVALID_INTERVAL = -24;
1452 
1453         /** The hardware does not support this request. */
1454         public static final int ERROR_HARDWARE_UNSUPPORTED = -30;
1455         /** The hardware returned an error. */
1456         public static final int ERROR_HARDWARE_ERROR = -31;
1457 
1458         public static final int NATT_PORT = 4500;
1459 
1460         private final Network mNetwork;
1461         private final PacketKeepaliveCallback mCallback;
1462         private final Looper mLooper;
1463         private final Messenger mMessenger;
1464 
1465         private volatile Integer mSlot;
1466 
stopLooper()1467         void stopLooper() {
1468             mLooper.quit();
1469         }
1470 
stop()1471         public void stop() {
1472             try {
1473                 mService.stopKeepalive(mNetwork, mSlot);
1474             } catch (RemoteException e) {
1475                 Log.e(TAG, "Error stopping packet keepalive: ", e);
1476                 stopLooper();
1477             }
1478         }
1479 
PacketKeepalive(Network network, PacketKeepaliveCallback callback)1480         private PacketKeepalive(Network network, PacketKeepaliveCallback callback) {
1481             checkNotNull(network, "network cannot be null");
1482             checkNotNull(callback, "callback cannot be null");
1483             mNetwork = network;
1484             mCallback = callback;
1485             HandlerThread thread = new HandlerThread(TAG);
1486             thread.start();
1487             mLooper = thread.getLooper();
1488             mMessenger = new Messenger(new Handler(mLooper) {
1489                 @Override
1490                 public void handleMessage(Message message) {
1491                     switch (message.what) {
1492                         case NetworkAgent.EVENT_PACKET_KEEPALIVE:
1493                             int error = message.arg2;
1494                             try {
1495                                 if (error == SUCCESS) {
1496                                     if (mSlot == null) {
1497                                         mSlot = message.arg1;
1498                                         mCallback.onStarted();
1499                                     } else {
1500                                         mSlot = null;
1501                                         stopLooper();
1502                                         mCallback.onStopped();
1503                                     }
1504                                 } else {
1505                                     stopLooper();
1506                                     mCallback.onError(error);
1507                                 }
1508                             } catch (Exception e) {
1509                                 Log.e(TAG, "Exception in keepalive callback(" + error + ")", e);
1510                             }
1511                             break;
1512                         default:
1513                             Log.e(TAG, "Unhandled message " + Integer.toHexString(message.what));
1514                             break;
1515                     }
1516                 }
1517             });
1518         }
1519     }
1520 
1521     /**
1522      * Starts an IPsec NAT-T keepalive packet with the specified parameters.
1523      *
1524      * @hide
1525      */
startNattKeepalive( Network network, int intervalSeconds, PacketKeepaliveCallback callback, InetAddress srcAddr, int srcPort, InetAddress dstAddr)1526     public PacketKeepalive startNattKeepalive(
1527             Network network, int intervalSeconds, PacketKeepaliveCallback callback,
1528             InetAddress srcAddr, int srcPort, InetAddress dstAddr) {
1529         final PacketKeepalive k = new PacketKeepalive(network, callback);
1530         try {
1531             mService.startNattKeepalive(network, intervalSeconds, k.mMessenger, new Binder(),
1532                     srcAddr.getHostAddress(), srcPort, dstAddr.getHostAddress());
1533         } catch (RemoteException e) {
1534             Log.e(TAG, "Error starting packet keepalive: ", e);
1535             k.stopLooper();
1536             return null;
1537         }
1538         return k;
1539     }
1540 
1541     /**
1542      * Ensure that a network route exists to deliver traffic to the specified
1543      * host via the specified network interface. An attempt to add a route that
1544      * already exists is ignored, but treated as successful.
1545      *
1546      * <p>This method requires the caller to hold either the
1547      * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
1548      * or the ability to modify system settings as determined by
1549      * {@link android.provider.Settings.System#canWrite}.</p>
1550      *
1551      * @param networkType the type of the network over which traffic to the specified
1552      * host is to be routed
1553      * @param hostAddress the IP address of the host to which the route is desired
1554      * @return {@code true} on success, {@code false} on failure
1555      *
1556      * @deprecated Deprecated in favor of the
1557      *             {@link #requestNetwork(NetworkRequest, NetworkCallback)},
1558      *             {@link #bindProcessToNetwork} and {@link Network#getSocketFactory} API.
1559      *             In {@link VERSION_CODES#M}, and above, this method is unsupported and will
1560      *             throw {@code UnsupportedOperationException} if called.
1561      */
requestRouteToHost(int networkType, int hostAddress)1562     public boolean requestRouteToHost(int networkType, int hostAddress) {
1563         return requestRouteToHostAddress(networkType, NetworkUtils.intToInetAddress(hostAddress));
1564     }
1565 
1566     /**
1567      * Ensure that a network route exists to deliver traffic to the specified
1568      * host via the specified network interface. An attempt to add a route that
1569      * already exists is ignored, but treated as successful.
1570      *
1571      * <p>This method requires the caller to hold either the
1572      * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
1573      * or the ability to modify system settings as determined by
1574      * {@link android.provider.Settings.System#canWrite}.</p>
1575      *
1576      * @param networkType the type of the network over which traffic to the specified
1577      * host is to be routed
1578      * @param hostAddress the IP address of the host to which the route is desired
1579      * @return {@code true} on success, {@code false} on failure
1580      * @hide
1581      * @deprecated Deprecated in favor of the {@link #requestNetwork} and
1582      *             {@link #bindProcessToNetwork} API.
1583      */
requestRouteToHostAddress(int networkType, InetAddress hostAddress)1584     public boolean requestRouteToHostAddress(int networkType, InetAddress hostAddress) {
1585         checkLegacyRoutingApiAccess();
1586         try {
1587             return mService.requestRouteToHostAddress(networkType, hostAddress.getAddress());
1588         } catch (RemoteException e) {
1589             throw e.rethrowFromSystemServer();
1590         }
1591     }
1592 
1593     /**
1594      * Returns the value of the setting for background data usage. If false,
1595      * applications should not use the network if the application is not in the
1596      * foreground. Developers should respect this setting, and check the value
1597      * of this before performing any background data operations.
1598      * <p>
1599      * All applications that have background services that use the network
1600      * should listen to {@link #ACTION_BACKGROUND_DATA_SETTING_CHANGED}.
1601      * <p>
1602      * @deprecated As of {@link VERSION_CODES#ICE_CREAM_SANDWICH}, availability of
1603      * background data depends on several combined factors, and this method will
1604      * always return {@code true}. Instead, when background data is unavailable,
1605      * {@link #getActiveNetworkInfo()} will now appear disconnected.
1606      *
1607      * @return Whether background data usage is allowed.
1608      */
1609     @Deprecated
getBackgroundDataSetting()1610     public boolean getBackgroundDataSetting() {
1611         // assume that background data is allowed; final authority is
1612         // NetworkInfo which may be blocked.
1613         return true;
1614     }
1615 
1616     /**
1617      * Sets the value of the setting for background data usage.
1618      *
1619      * @param allowBackgroundData Whether an application should use data while
1620      *            it is in the background.
1621      *
1622      * @attr ref android.Manifest.permission#CHANGE_BACKGROUND_DATA_SETTING
1623      * @see #getBackgroundDataSetting()
1624      * @hide
1625      */
1626     @Deprecated
setBackgroundDataSetting(boolean allowBackgroundData)1627     public void setBackgroundDataSetting(boolean allowBackgroundData) {
1628         // ignored
1629     }
1630 
1631     /**
1632      * Return quota status for the current active network, or {@code null} if no
1633      * network is active. Quota status can change rapidly, so these values
1634      * shouldn't be cached.
1635      *
1636      * <p>This method requires the caller to hold the permission
1637      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
1638      *
1639      * @hide
1640      */
getActiveNetworkQuotaInfo()1641     public NetworkQuotaInfo getActiveNetworkQuotaInfo() {
1642         try {
1643             return mService.getActiveNetworkQuotaInfo();
1644         } catch (RemoteException e) {
1645             throw e.rethrowFromSystemServer();
1646         }
1647     }
1648 
1649     /**
1650      * @hide
1651      * @deprecated Talk to TelephonyManager directly
1652      */
getMobileDataEnabled()1653     public boolean getMobileDataEnabled() {
1654         IBinder b = ServiceManager.getService(Context.TELEPHONY_SERVICE);
1655         if (b != null) {
1656             try {
1657                 ITelephony it = ITelephony.Stub.asInterface(b);
1658                 int subId = SubscriptionManager.getDefaultDataSubscriptionId();
1659                 Log.d("ConnectivityManager", "getMobileDataEnabled()+ subId=" + subId);
1660                 boolean retVal = it.getDataEnabled(subId);
1661                 Log.d("ConnectivityManager", "getMobileDataEnabled()- subId=" + subId
1662                         + " retVal=" + retVal);
1663                 return retVal;
1664             } catch (RemoteException e) {
1665                 throw e.rethrowFromSystemServer();
1666             }
1667         }
1668         Log.d("ConnectivityManager", "getMobileDataEnabled()- remote exception retVal=false");
1669         return false;
1670     }
1671 
1672     /**
1673      * Callback for use with {@link ConnectivityManager#addDefaultNetworkActiveListener}
1674      * to find out when the system default network has gone in to a high power state.
1675      */
1676     public interface OnNetworkActiveListener {
1677         /**
1678          * Called on the main thread of the process to report that the current data network
1679          * has become active, and it is now a good time to perform any pending network
1680          * operations.  Note that this listener only tells you when the network becomes
1681          * active; if at any other time you want to know whether it is active (and thus okay
1682          * to initiate network traffic), you can retrieve its instantaneous state with
1683          * {@link ConnectivityManager#isDefaultNetworkActive}.
1684          */
onNetworkActive()1685         public void onNetworkActive();
1686     }
1687 
getNetworkManagementService()1688     private INetworkManagementService getNetworkManagementService() {
1689         synchronized (this) {
1690             if (mNMService != null) {
1691                 return mNMService;
1692             }
1693             IBinder b = ServiceManager.getService(Context.NETWORKMANAGEMENT_SERVICE);
1694             mNMService = INetworkManagementService.Stub.asInterface(b);
1695             return mNMService;
1696         }
1697     }
1698 
1699     private final ArrayMap<OnNetworkActiveListener, INetworkActivityListener>
1700             mNetworkActivityListeners
1701                     = new ArrayMap<OnNetworkActiveListener, INetworkActivityListener>();
1702 
1703     /**
1704      * Start listening to reports when the system's default data network is active, meaning it is
1705      * a good time to perform network traffic.  Use {@link #isDefaultNetworkActive()}
1706      * to determine the current state of the system's default network after registering the
1707      * listener.
1708      * <p>
1709      * If the process default network has been set with
1710      * {@link ConnectivityManager#bindProcessToNetwork} this function will not
1711      * reflect the process's default, but the system default.
1712      *
1713      * @param l The listener to be told when the network is active.
1714      */
addDefaultNetworkActiveListener(final OnNetworkActiveListener l)1715     public void addDefaultNetworkActiveListener(final OnNetworkActiveListener l) {
1716         INetworkActivityListener rl = new INetworkActivityListener.Stub() {
1717             @Override
1718             public void onNetworkActive() throws RemoteException {
1719                 l.onNetworkActive();
1720             }
1721         };
1722 
1723         try {
1724             getNetworkManagementService().registerNetworkActivityListener(rl);
1725             mNetworkActivityListeners.put(l, rl);
1726         } catch (RemoteException e) {
1727             throw e.rethrowFromSystemServer();
1728         }
1729     }
1730 
1731     /**
1732      * Remove network active listener previously registered with
1733      * {@link #addDefaultNetworkActiveListener}.
1734      *
1735      * @param l Previously registered listener.
1736      */
removeDefaultNetworkActiveListener(OnNetworkActiveListener l)1737     public void removeDefaultNetworkActiveListener(OnNetworkActiveListener l) {
1738         INetworkActivityListener rl = mNetworkActivityListeners.get(l);
1739         if (rl == null) {
1740             throw new IllegalArgumentException("Listener not registered: " + l);
1741         }
1742         try {
1743             getNetworkManagementService().unregisterNetworkActivityListener(rl);
1744         } catch (RemoteException e) {
1745             throw e.rethrowFromSystemServer();
1746         }
1747     }
1748 
1749     /**
1750      * Return whether the data network is currently active.  An active network means that
1751      * it is currently in a high power state for performing data transmission.  On some
1752      * types of networks, it may be expensive to move and stay in such a state, so it is
1753      * more power efficient to batch network traffic together when the radio is already in
1754      * this state.  This method tells you whether right now is currently a good time to
1755      * initiate network traffic, as the network is already active.
1756      */
isDefaultNetworkActive()1757     public boolean isDefaultNetworkActive() {
1758         try {
1759             return getNetworkManagementService().isNetworkActive();
1760         } catch (RemoteException e) {
1761             throw e.rethrowFromSystemServer();
1762         }
1763     }
1764 
1765     /**
1766      * {@hide}
1767      */
ConnectivityManager(Context context, IConnectivityManager service)1768     public ConnectivityManager(Context context, IConnectivityManager service) {
1769         mContext = checkNotNull(context, "missing context");
1770         mService = checkNotNull(service, "missing IConnectivityManager");
1771         sInstance = this;
1772     }
1773 
1774     /** {@hide} */
from(Context context)1775     public static ConnectivityManager from(Context context) {
1776         return (ConnectivityManager) context.getSystemService(Context.CONNECTIVITY_SERVICE);
1777     }
1778 
1779     /** {@hide} */
enforceChangePermission(Context context)1780     public static final void enforceChangePermission(Context context) {
1781         int uid = Binder.getCallingUid();
1782         Settings.checkAndNoteChangeNetworkStateOperation(context, uid, Settings
1783                 .getPackageNameForUid(context, uid), true /* throwException */);
1784     }
1785 
1786     /** {@hide */
enforceTetherChangePermission(Context context)1787     public static final void enforceTetherChangePermission(Context context) {
1788         if (context.getResources().getStringArray(
1789                 com.android.internal.R.array.config_mobile_hotspot_provision_app).length == 2) {
1790             // Have a provisioning app - must only let system apps (which check this app)
1791             // turn on tethering
1792             context.enforceCallingOrSelfPermission(
1793                     android.Manifest.permission.TETHER_PRIVILEGED, "ConnectivityService");
1794         } else {
1795             int uid = Binder.getCallingUid();
1796             Settings.checkAndNoteWriteSettingsOperation(context, uid, Settings
1797                     .getPackageNameForUid(context, uid), true /* throwException */);
1798         }
1799     }
1800 
1801     /**
1802      * @deprecated - use getSystemService. This is a kludge to support static access in certain
1803      *               situations where a Context pointer is unavailable.
1804      * @hide
1805      */
getInstanceOrNull()1806     static ConnectivityManager getInstanceOrNull() {
1807         return sInstance;
1808     }
1809 
1810     /**
1811      * @deprecated - use getSystemService. This is a kludge to support static access in certain
1812      *               situations where a Context pointer is unavailable.
1813      * @hide
1814      */
getInstance()1815     private static ConnectivityManager getInstance() {
1816         if (getInstanceOrNull() == null) {
1817             throw new IllegalStateException("No ConnectivityManager yet constructed");
1818         }
1819         return getInstanceOrNull();
1820     }
1821 
1822     /**
1823      * Get the set of tetherable, available interfaces.  This list is limited by
1824      * device configuration and current interface existence.
1825      * <p>This method requires the caller to hold the permission
1826      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
1827      *
1828      * @return an array of 0 or more Strings of tetherable interface names.
1829      *
1830      * {@hide}
1831      */
getTetherableIfaces()1832     public String[] getTetherableIfaces() {
1833         try {
1834             return mService.getTetherableIfaces();
1835         } catch (RemoteException e) {
1836             throw e.rethrowFromSystemServer();
1837         }
1838     }
1839 
1840     /**
1841      * Get the set of tethered interfaces.
1842      * <p>This method requires the caller to hold the permission
1843      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
1844      *
1845      * @return an array of 0 or more String of currently tethered interface names.
1846      *
1847      * {@hide}
1848      */
getTetheredIfaces()1849     public String[] getTetheredIfaces() {
1850         try {
1851             return mService.getTetheredIfaces();
1852         } catch (RemoteException e) {
1853             throw e.rethrowFromSystemServer();
1854         }
1855     }
1856 
1857     /**
1858      * Get the set of interface names which attempted to tether but
1859      * failed.  Re-attempting to tether may cause them to reset to the Tethered
1860      * state.  Alternatively, causing the interface to be destroyed and recreated
1861      * may cause them to reset to the available state.
1862      * {@link ConnectivityManager#getLastTetherError} can be used to get more
1863      * information on the cause of the errors.
1864      * <p>This method requires the caller to hold the permission
1865      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
1866      *
1867      * @return an array of 0 or more String indicating the interface names
1868      *        which failed to tether.
1869      *
1870      * {@hide}
1871      */
getTetheringErroredIfaces()1872     public String[] getTetheringErroredIfaces() {
1873         try {
1874             return mService.getTetheringErroredIfaces();
1875         } catch (RemoteException e) {
1876             throw e.rethrowFromSystemServer();
1877         }
1878     }
1879 
1880     /**
1881      * Get the set of tethered dhcp ranges.
1882      *
1883      * @return an array of 0 or more {@code String} of tethered dhcp ranges.
1884      * {@hide}
1885      */
getTetheredDhcpRanges()1886     public String[] getTetheredDhcpRanges() {
1887         try {
1888             return mService.getTetheredDhcpRanges();
1889         } catch (RemoteException e) {
1890             throw e.rethrowFromSystemServer();
1891         }
1892     }
1893 
1894     /**
1895      * Attempt to tether the named interface.  This will setup a dhcp server
1896      * on the interface, forward and NAT IP packets and forward DNS requests
1897      * to the best active upstream network interface.  Note that if no upstream
1898      * IP network interface is available, dhcp will still run and traffic will be
1899      * allowed between the tethered devices and this device, though upstream net
1900      * access will of course fail until an upstream network interface becomes
1901      * active.
1902      *
1903      * <p>This method requires the caller to hold either the
1904      * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
1905      * or the ability to modify system settings as determined by
1906      * {@link android.provider.Settings.System#canWrite}.</p>
1907      *
1908      * <p>WARNING: New clients should not use this function. The only usages should be in PanService
1909      * and WifiStateMachine which need direct access. All other clients should use
1910      * {@link #startTethering} and {@link #stopTethering} which encapsulate proper provisioning
1911      * logic.</p>
1912      *
1913      * @param iface the interface name to tether.
1914      * @return error a {@code TETHER_ERROR} value indicating success or failure type
1915      *
1916      * {@hide}
1917      */
tether(String iface)1918     public int tether(String iface) {
1919         try {
1920             return mService.tether(iface);
1921         } catch (RemoteException e) {
1922             throw e.rethrowFromSystemServer();
1923         }
1924     }
1925 
1926     /**
1927      * Stop tethering the named interface.
1928      *
1929      * <p>This method requires the caller to hold either the
1930      * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
1931      * or the ability to modify system settings as determined by
1932      * {@link android.provider.Settings.System#canWrite}.</p>
1933      *
1934      * <p>WARNING: New clients should not use this function. The only usages should be in PanService
1935      * and WifiStateMachine which need direct access. All other clients should use
1936      * {@link #startTethering} and {@link #stopTethering} which encapsulate proper provisioning
1937      * logic.</p>
1938      *
1939      * @param iface the interface name to untether.
1940      * @return error a {@code TETHER_ERROR} value indicating success or failure type
1941      *
1942      * {@hide}
1943      */
untether(String iface)1944     public int untether(String iface) {
1945         try {
1946             return mService.untether(iface);
1947         } catch (RemoteException e) {
1948             throw e.rethrowFromSystemServer();
1949         }
1950     }
1951 
1952     /**
1953      * Check if the device allows for tethering.  It may be disabled via
1954      * {@code ro.tether.denied} system property, Settings.TETHER_SUPPORTED or
1955      * due to device configuration.
1956      * <p>This method requires the caller to hold the permission
1957      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
1958      *
1959      * @return a boolean - {@code true} indicating Tethering is supported.
1960      *
1961      * {@hide}
1962      */
1963     @SystemApi
isTetheringSupported()1964     public boolean isTetheringSupported() {
1965         try {
1966             return mService.isTetheringSupported();
1967         } catch (RemoteException e) {
1968             throw e.rethrowFromSystemServer();
1969         }
1970     }
1971 
1972     /**
1973      * Callback for use with {@link #startTethering} to find out whether tethering succeeded.
1974      * @hide
1975      */
1976     @SystemApi
1977     public static abstract class OnStartTetheringCallback {
1978         /**
1979          * Called when tethering has been successfully started.
1980          */
onTetheringStarted()1981         public void onTetheringStarted() {};
1982 
1983         /**
1984          * Called when starting tethering failed.
1985          */
onTetheringFailed()1986         public void onTetheringFailed() {};
1987     }
1988 
1989     /**
1990      * Convenient overload for
1991      * {@link #startTethering(int, boolean, OnStartTetheringCallback, Handler)} which passes a null
1992      * handler to run on the current thread's {@link Looper}.
1993      * @hide
1994      */
1995     @SystemApi
startTethering(int type, boolean showProvisioningUi, final OnStartTetheringCallback callback)1996     public void startTethering(int type, boolean showProvisioningUi,
1997             final OnStartTetheringCallback callback) {
1998         startTethering(type, showProvisioningUi, callback, null);
1999     }
2000 
2001     /**
2002      * Runs tether provisioning for the given type if needed and then starts tethering if
2003      * the check succeeds. If no carrier provisioning is required for tethering, tethering is
2004      * enabled immediately. If provisioning fails, tethering will not be enabled. It also
2005      * schedules tether provisioning re-checks if appropriate.
2006      *
2007      * @param type The type of tethering to start. Must be one of
2008      *         {@link ConnectivityManager.TETHERING_WIFI},
2009      *         {@link ConnectivityManager.TETHERING_USB}, or
2010      *         {@link ConnectivityManager.TETHERING_BLUETOOTH}.
2011      * @param showProvisioningUi a boolean indicating to show the provisioning app UI if there
2012      *         is one. This should be true the first time this function is called and also any time
2013      *         the user can see this UI. It gives users information from their carrier about the
2014      *         check failing and how they can sign up for tethering if possible.
2015      * @param callback an {@link OnStartTetheringCallback} which will be called to notify the caller
2016      *         of the result of trying to tether.
2017      * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
2018      * @hide
2019      */
2020     @SystemApi
startTethering(int type, boolean showProvisioningUi, final OnStartTetheringCallback callback, Handler handler)2021     public void startTethering(int type, boolean showProvisioningUi,
2022             final OnStartTetheringCallback callback, Handler handler) {
2023         ResultReceiver wrappedCallback = new ResultReceiver(handler) {
2024             @Override
2025             protected void onReceiveResult(int resultCode, Bundle resultData) {
2026                 if (resultCode == TETHER_ERROR_NO_ERROR) {
2027                     callback.onTetheringStarted();
2028                 } else {
2029                     callback.onTetheringFailed();
2030                 }
2031             }
2032         };
2033         try {
2034             mService.startTethering(type, wrappedCallback, showProvisioningUi);
2035         } catch (RemoteException e) {
2036             Log.e(TAG, "Exception trying to start tethering.", e);
2037             wrappedCallback.send(TETHER_ERROR_SERVICE_UNAVAIL, null);
2038         }
2039     }
2040 
2041     /**
2042      * Stops tethering for the given type. Also cancels any provisioning rechecks for that type if
2043      * applicable.
2044      *
2045      * @param type The type of tethering to stop. Must be one of
2046      *         {@link ConnectivityManager.TETHERING_WIFI},
2047      *         {@link ConnectivityManager.TETHERING_USB}, or
2048      *         {@link ConnectivityManager.TETHERING_BLUETOOTH}.
2049      * @hide
2050      */
2051     @SystemApi
stopTethering(int type)2052     public void stopTethering(int type) {
2053         try {
2054             mService.stopTethering(type);
2055         } catch (RemoteException e) {
2056             throw e.rethrowFromSystemServer();
2057         }
2058     }
2059 
2060     /**
2061      * Get the list of regular expressions that define any tetherable
2062      * USB network interfaces.  If USB tethering is not supported by the
2063      * device, this list should be empty.
2064      * <p>This method requires the caller to hold the permission
2065      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
2066      *
2067      * @return an array of 0 or more regular expression Strings defining
2068      *        what interfaces are considered tetherable usb interfaces.
2069      *
2070      * {@hide}
2071      */
getTetherableUsbRegexs()2072     public String[] getTetherableUsbRegexs() {
2073         try {
2074             return mService.getTetherableUsbRegexs();
2075         } catch (RemoteException e) {
2076             throw e.rethrowFromSystemServer();
2077         }
2078     }
2079 
2080     /**
2081      * Get the list of regular expressions that define any tetherable
2082      * Wifi network interfaces.  If Wifi tethering is not supported by the
2083      * device, this list should be empty.
2084      * <p>This method requires the caller to hold the permission
2085      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
2086      *
2087      * @return an array of 0 or more regular expression Strings defining
2088      *        what interfaces are considered tetherable wifi interfaces.
2089      *
2090      * {@hide}
2091      */
getTetherableWifiRegexs()2092     public String[] getTetherableWifiRegexs() {
2093         try {
2094             return mService.getTetherableWifiRegexs();
2095         } catch (RemoteException e) {
2096             throw e.rethrowFromSystemServer();
2097         }
2098     }
2099 
2100     /**
2101      * Get the list of regular expressions that define any tetherable
2102      * Bluetooth network interfaces.  If Bluetooth tethering is not supported by the
2103      * device, this list should be empty.
2104      * <p>This method requires the caller to hold the permission
2105      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
2106      *
2107      * @return an array of 0 or more regular expression Strings defining
2108      *        what interfaces are considered tetherable bluetooth interfaces.
2109      *
2110      * {@hide}
2111      */
getTetherableBluetoothRegexs()2112     public String[] getTetherableBluetoothRegexs() {
2113         try {
2114             return mService.getTetherableBluetoothRegexs();
2115         } catch (RemoteException e) {
2116             throw e.rethrowFromSystemServer();
2117         }
2118     }
2119 
2120     /**
2121      * Attempt to both alter the mode of USB and Tethering of USB.  A
2122      * utility method to deal with some of the complexity of USB - will
2123      * attempt to switch to Rndis and subsequently tether the resulting
2124      * interface on {@code true} or turn off tethering and switch off
2125      * Rndis on {@code false}.
2126      *
2127      * <p>This method requires the caller to hold either the
2128      * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2129      * or the ability to modify system settings as determined by
2130      * {@link android.provider.Settings.System#canWrite}.</p>
2131      *
2132      * @param enable a boolean - {@code true} to enable tethering
2133      * @return error a {@code TETHER_ERROR} value indicating success or failure type
2134      *
2135      * {@hide}
2136      */
setUsbTethering(boolean enable)2137     public int setUsbTethering(boolean enable) {
2138         try {
2139             return mService.setUsbTethering(enable);
2140         } catch (RemoteException e) {
2141             throw e.rethrowFromSystemServer();
2142         }
2143     }
2144 
2145     /** {@hide} */
2146     public static final int TETHER_ERROR_NO_ERROR           = 0;
2147     /** {@hide} */
2148     public static final int TETHER_ERROR_UNKNOWN_IFACE      = 1;
2149     /** {@hide} */
2150     public static final int TETHER_ERROR_SERVICE_UNAVAIL    = 2;
2151     /** {@hide} */
2152     public static final int TETHER_ERROR_UNSUPPORTED        = 3;
2153     /** {@hide} */
2154     public static final int TETHER_ERROR_UNAVAIL_IFACE      = 4;
2155     /** {@hide} */
2156     public static final int TETHER_ERROR_MASTER_ERROR       = 5;
2157     /** {@hide} */
2158     public static final int TETHER_ERROR_TETHER_IFACE_ERROR = 6;
2159     /** {@hide} */
2160     public static final int TETHER_ERROR_UNTETHER_IFACE_ERROR = 7;
2161     /** {@hide} */
2162     public static final int TETHER_ERROR_ENABLE_NAT_ERROR     = 8;
2163     /** {@hide} */
2164     public static final int TETHER_ERROR_DISABLE_NAT_ERROR    = 9;
2165     /** {@hide} */
2166     public static final int TETHER_ERROR_IFACE_CFG_ERROR      = 10;
2167     /** {@hide} */
2168     public static final int TETHER_ERROR_PROVISION_FAILED     = 11;
2169 
2170     /**
2171      * Get a more detailed error code after a Tethering or Untethering
2172      * request asynchronously failed.
2173      * <p>This method requires the caller to hold the permission
2174      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
2175      *
2176      * @param iface The name of the interface of interest
2177      * @return error The error code of the last error tethering or untethering the named
2178      *               interface
2179      *
2180      * {@hide}
2181      */
getLastTetherError(String iface)2182     public int getLastTetherError(String iface) {
2183         try {
2184             return mService.getLastTetherError(iface);
2185         } catch (RemoteException e) {
2186             throw e.rethrowFromSystemServer();
2187         }
2188     }
2189 
2190     /**
2191      * Report network connectivity status.  This is currently used only
2192      * to alter status bar UI.
2193      * <p>This method requires the caller to hold the permission
2194      * {@link android.Manifest.permission#STATUS_BAR}.
2195      *
2196      * @param networkType The type of network you want to report on
2197      * @param percentage The quality of the connection 0 is bad, 100 is good
2198      * {@hide}
2199      */
reportInetCondition(int networkType, int percentage)2200     public void reportInetCondition(int networkType, int percentage) {
2201         try {
2202             mService.reportInetCondition(networkType, percentage);
2203         } catch (RemoteException e) {
2204             throw e.rethrowFromSystemServer();
2205         }
2206     }
2207 
2208     /**
2209      * Report a problem network to the framework.  This provides a hint to the system
2210      * that there might be connectivity problems on this network and may cause
2211      * the framework to re-evaluate network connectivity and/or switch to another
2212      * network.
2213      *
2214      * @param network The {@link Network} the application was attempting to use
2215      *                or {@code null} to indicate the current default network.
2216      * @deprecated Use {@link #reportNetworkConnectivity} which allows reporting both
2217      *             working and non-working connectivity.
2218      */
reportBadNetwork(Network network)2219     public void reportBadNetwork(Network network) {
2220         try {
2221             // One of these will be ignored because it matches system's current state.
2222             // The other will trigger the necessary reevaluation.
2223             mService.reportNetworkConnectivity(network, true);
2224             mService.reportNetworkConnectivity(network, false);
2225         } catch (RemoteException e) {
2226             throw e.rethrowFromSystemServer();
2227         }
2228     }
2229 
2230     /**
2231      * Report to the framework whether a network has working connectivity.
2232      * This provides a hint to the system that a particular network is providing
2233      * working connectivity or not.  In response the framework may re-evaluate
2234      * the network's connectivity and might take further action thereafter.
2235      *
2236      * @param network The {@link Network} the application was attempting to use
2237      *                or {@code null} to indicate the current default network.
2238      * @param hasConnectivity {@code true} if the application was able to successfully access the
2239      *                        Internet using {@code network} or {@code false} if not.
2240      */
reportNetworkConnectivity(Network network, boolean hasConnectivity)2241     public void reportNetworkConnectivity(Network network, boolean hasConnectivity) {
2242         try {
2243             mService.reportNetworkConnectivity(network, hasConnectivity);
2244         } catch (RemoteException e) {
2245             throw e.rethrowFromSystemServer();
2246         }
2247     }
2248 
2249     /**
2250      * Set a network-independent global http proxy.  This is not normally what you want
2251      * for typical HTTP proxies - they are general network dependent.  However if you're
2252      * doing something unusual like general internal filtering this may be useful.  On
2253      * a private network where the proxy is not accessible, you may break HTTP using this.
2254      * <p>This method requires the caller to hold the permission
2255      * android.Manifest.permission#CONNECTIVITY_INTERNAL.
2256      *
2257      * @param p A {@link ProxyInfo} object defining the new global
2258      *        HTTP proxy.  A {@code null} value will clear the global HTTP proxy.
2259      * @hide
2260      */
setGlobalProxy(ProxyInfo p)2261     public void setGlobalProxy(ProxyInfo p) {
2262         try {
2263             mService.setGlobalProxy(p);
2264         } catch (RemoteException e) {
2265             throw e.rethrowFromSystemServer();
2266         }
2267     }
2268 
2269     /**
2270      * Retrieve any network-independent global HTTP proxy.
2271      *
2272      * @return {@link ProxyInfo} for the current global HTTP proxy or {@code null}
2273      *        if no global HTTP proxy is set.
2274      * @hide
2275      */
getGlobalProxy()2276     public ProxyInfo getGlobalProxy() {
2277         try {
2278             return mService.getGlobalProxy();
2279         } catch (RemoteException e) {
2280             throw e.rethrowFromSystemServer();
2281         }
2282     }
2283 
2284     /**
2285      * Retrieve the global HTTP proxy, or if no global HTTP proxy is set, a
2286      * network-specific HTTP proxy.  If {@code network} is null, the
2287      * network-specific proxy returned is the proxy of the default active
2288      * network.
2289      *
2290      * @return {@link ProxyInfo} for the current global HTTP proxy, or if no
2291      *         global HTTP proxy is set, {@code ProxyInfo} for {@code network},
2292      *         or when {@code network} is {@code null},
2293      *         the {@code ProxyInfo} for the default active network.  Returns
2294      *         {@code null} when no proxy applies or the caller doesn't have
2295      *         permission to use {@code network}.
2296      * @hide
2297      */
getProxyForNetwork(Network network)2298     public ProxyInfo getProxyForNetwork(Network network) {
2299         try {
2300             return mService.getProxyForNetwork(network);
2301         } catch (RemoteException e) {
2302             throw e.rethrowFromSystemServer();
2303         }
2304     }
2305 
2306     /**
2307      * Get the current default HTTP proxy settings.  If a global proxy is set it will be returned,
2308      * otherwise if this process is bound to a {@link Network} using
2309      * {@link #bindProcessToNetwork} then that {@code Network}'s proxy is returned, otherwise
2310      * the default network's proxy is returned.
2311      *
2312      * @return the {@link ProxyInfo} for the current HTTP proxy, or {@code null} if no
2313      *        HTTP proxy is active.
2314      */
getDefaultProxy()2315     public ProxyInfo getDefaultProxy() {
2316         return getProxyForNetwork(getBoundNetworkForProcess());
2317     }
2318 
2319     /**
2320      * Returns true if the hardware supports the given network type
2321      * else it returns false.  This doesn't indicate we have coverage
2322      * or are authorized onto a network, just whether or not the
2323      * hardware supports it.  For example a GSM phone without a SIM
2324      * should still return {@code true} for mobile data, but a wifi only
2325      * tablet would return {@code false}.
2326      * <p>This method requires the caller to hold the permission
2327      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
2328      *
2329      * @param networkType The network type we'd like to check
2330      * @return {@code true} if supported, else {@code false}
2331      *
2332      * @hide
2333      */
isNetworkSupported(int networkType)2334     public boolean isNetworkSupported(int networkType) {
2335         try {
2336             return mService.isNetworkSupported(networkType);
2337         } catch (RemoteException e) {
2338             throw e.rethrowFromSystemServer();
2339         }
2340     }
2341 
2342     /**
2343      * Returns if the currently active data network is metered. A network is
2344      * classified as metered when the user is sensitive to heavy data usage on
2345      * that connection due to monetary costs, data limitations or
2346      * battery/performance issues. You should check this before doing large
2347      * data transfers, and warn the user or delay the operation until another
2348      * network is available.
2349      * <p>This method requires the caller to hold the permission
2350      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
2351      *
2352      * @return {@code true} if large transfers should be avoided, otherwise
2353      *        {@code false}.
2354      */
isActiveNetworkMetered()2355     public boolean isActiveNetworkMetered() {
2356         try {
2357             return mService.isActiveNetworkMetered();
2358         } catch (RemoteException e) {
2359             throw e.rethrowFromSystemServer();
2360         }
2361     }
2362 
2363     /**
2364      * If the LockdownVpn mechanism is enabled, updates the vpn
2365      * with a reload of its profile.
2366      *
2367      * @return a boolean with {@code} indicating success
2368      *
2369      * <p>This method can only be called by the system UID
2370      * {@hide}
2371      */
updateLockdownVpn()2372     public boolean updateLockdownVpn() {
2373         try {
2374             return mService.updateLockdownVpn();
2375         } catch (RemoteException e) {
2376             throw e.rethrowFromSystemServer();
2377         }
2378     }
2379 
2380     /**
2381      * Check mobile provisioning.
2382      *
2383      * @param suggestedTimeOutMs, timeout in milliseconds
2384      *
2385      * @return time out that will be used, maybe less that suggestedTimeOutMs
2386      * -1 if an error.
2387      *
2388      * {@hide}
2389      */
checkMobileProvisioning(int suggestedTimeOutMs)2390     public int checkMobileProvisioning(int suggestedTimeOutMs) {
2391         int timeOutMs = -1;
2392         try {
2393             timeOutMs = mService.checkMobileProvisioning(suggestedTimeOutMs);
2394         } catch (RemoteException e) {
2395             throw e.rethrowFromSystemServer();
2396         }
2397         return timeOutMs;
2398     }
2399 
2400     /**
2401      * Get the mobile provisioning url.
2402      * {@hide}
2403      */
getMobileProvisioningUrl()2404     public String getMobileProvisioningUrl() {
2405         try {
2406             return mService.getMobileProvisioningUrl();
2407         } catch (RemoteException e) {
2408             throw e.rethrowFromSystemServer();
2409         }
2410     }
2411 
2412     /**
2413      * Set sign in error notification to visible or in visible
2414      *
2415      * @param visible
2416      * @param networkType
2417      *
2418      * {@hide}
2419      * @deprecated Doesn't properly deal with multiple connected networks of the same type.
2420      */
setProvisioningNotificationVisible(boolean visible, int networkType, String action)2421     public void setProvisioningNotificationVisible(boolean visible, int networkType,
2422             String action) {
2423         try {
2424             mService.setProvisioningNotificationVisible(visible, networkType, action);
2425         } catch (RemoteException e) {
2426             throw e.rethrowFromSystemServer();
2427         }
2428     }
2429 
2430     /**
2431      * Set the value for enabling/disabling airplane mode
2432      * <p>This method requires the caller to hold the permission
2433      * {@link android.Manifest.permission#CONNECTIVITY_INTERNAL}.
2434      *
2435      * @param enable whether to enable airplane mode or not
2436      *
2437      * @hide
2438      */
setAirplaneMode(boolean enable)2439     public void setAirplaneMode(boolean enable) {
2440         try {
2441             mService.setAirplaneMode(enable);
2442         } catch (RemoteException e) {
2443             throw e.rethrowFromSystemServer();
2444         }
2445     }
2446 
2447     /** {@hide} */
registerNetworkFactory(Messenger messenger, String name)2448     public void registerNetworkFactory(Messenger messenger, String name) {
2449         try {
2450             mService.registerNetworkFactory(messenger, name);
2451         } catch (RemoteException e) {
2452             throw e.rethrowFromSystemServer();
2453         }
2454     }
2455 
2456     /** {@hide} */
unregisterNetworkFactory(Messenger messenger)2457     public void unregisterNetworkFactory(Messenger messenger) {
2458         try {
2459             mService.unregisterNetworkFactory(messenger);
2460         } catch (RemoteException e) {
2461             throw e.rethrowFromSystemServer();
2462         }
2463     }
2464 
2465     /**
2466      * @hide
2467      * Register a NetworkAgent with ConnectivityService.
2468      * @return NetID corresponding to NetworkAgent.
2469      */
registerNetworkAgent(Messenger messenger, NetworkInfo ni, LinkProperties lp, NetworkCapabilities nc, int score, NetworkMisc misc)2470     public int registerNetworkAgent(Messenger messenger, NetworkInfo ni, LinkProperties lp,
2471             NetworkCapabilities nc, int score, NetworkMisc misc) {
2472         try {
2473             return mService.registerNetworkAgent(messenger, ni, lp, nc, score, misc);
2474         } catch (RemoteException e) {
2475             throw e.rethrowFromSystemServer();
2476         }
2477     }
2478 
2479     /**
2480      * Base class for NetworkRequest callbacks.  Used for notifications about network
2481      * changes.  Should be extended by applications wanting notifications.
2482      */
2483     public static class NetworkCallback {
2484         /**
2485          * Called when the framework connects to a new network to evaluate whether it satisfies this
2486          * request. If evaluation succeeds, this callback may be followed by an {@link #onAvailable}
2487          * callback. There is no guarantee that this new network will satisfy any requests, or that
2488          * the network will stay connected for longer than the time necessary to evaluate it.
2489          * <p>
2490          * Most applications <b>should not</b> act on this callback, and should instead use
2491          * {@link #onAvailable}. This callback is intended for use by applications that can assist
2492          * the framework in properly evaluating the network &mdash; for example, an application that
2493          * can automatically log in to a captive portal without user intervention.
2494          *
2495          * @param network The {@link Network} of the network that is being evaluated.
2496          *
2497          * @hide
2498          */
onPreCheck(Network network)2499         public void onPreCheck(Network network) {}
2500 
2501         /**
2502          * Called when the framework connects and has declared a new network ready for use.
2503          * This callback may be called more than once if the {@link Network} that is
2504          * satisfying the request changes.
2505          *
2506          * @param network The {@link Network} of the satisfying network.
2507          */
onAvailable(Network network)2508         public void onAvailable(Network network) {}
2509 
2510         /**
2511          * Called when the network is about to be disconnected.  Often paired with an
2512          * {@link NetworkCallback#onAvailable} call with the new replacement network
2513          * for graceful handover.  This may not be called if we have a hard loss
2514          * (loss without warning).  This may be followed by either a
2515          * {@link NetworkCallback#onLost} call or a
2516          * {@link NetworkCallback#onAvailable} call for this network depending
2517          * on whether we lose or regain it.
2518          *
2519          * @param network The {@link Network} that is about to be disconnected.
2520          * @param maxMsToLive The time in ms the framework will attempt to keep the
2521          *                     network connected.  Note that the network may suffer a
2522          *                     hard loss at any time.
2523          */
onLosing(Network network, int maxMsToLive)2524         public void onLosing(Network network, int maxMsToLive) {}
2525 
2526         /**
2527          * Called when the framework has a hard loss of the network or when the
2528          * graceful failure ends.
2529          *
2530          * @param network The {@link Network} lost.
2531          */
onLost(Network network)2532         public void onLost(Network network) {}
2533 
2534         /**
2535          * Called if no network is found in the given timeout time.  If no timeout is given,
2536          * this will not be called.
2537          * @hide
2538          */
onUnavailable()2539         public void onUnavailable() {}
2540 
2541         /**
2542          * Called when the network the framework connected to for this request
2543          * changes capabilities but still satisfies the stated need.
2544          *
2545          * @param network The {@link Network} whose capabilities have changed.
2546          * @param networkCapabilities The new {@link android.net.NetworkCapabilities} for this network.
2547          */
onCapabilitiesChanged(Network network, NetworkCapabilities networkCapabilities)2548         public void onCapabilitiesChanged(Network network,
2549                 NetworkCapabilities networkCapabilities) {}
2550 
2551         /**
2552          * Called when the network the framework connected to for this request
2553          * changes {@link LinkProperties}.
2554          *
2555          * @param network The {@link Network} whose link properties have changed.
2556          * @param linkProperties The new {@link LinkProperties} for this network.
2557          */
onLinkPropertiesChanged(Network network, LinkProperties linkProperties)2558         public void onLinkPropertiesChanged(Network network, LinkProperties linkProperties) {}
2559 
2560         /**
2561          * Called when the network the framework connected to for this request
2562          * goes into {@link NetworkInfo.DetailedState.SUSPENDED}.
2563          * This generally means that while the TCP connections are still live,
2564          * temporarily network data fails to transfer.  Specifically this is used
2565          * on cellular networks to mask temporary outages when driving through
2566          * a tunnel, etc.
2567          * @hide
2568          */
onNetworkSuspended(Network network)2569         public void onNetworkSuspended(Network network) {}
2570 
2571         /**
2572          * Called when the network the framework connected to for this request
2573          * returns from a {@link NetworkInfo.DetailedState.SUSPENDED} state.
2574          * This should always be preceeded by a matching {@code onNetworkSuspended}
2575          * call.
2576          * @hide
2577          */
onNetworkResumed(Network network)2578         public void onNetworkResumed(Network network) {}
2579 
2580         private NetworkRequest networkRequest;
2581     }
2582 
2583     private static final int BASE = Protocol.BASE_CONNECTIVITY_MANAGER;
2584     /** @hide */
2585     public static final int CALLBACK_PRECHECK            = BASE + 1;
2586     /** @hide */
2587     public static final int CALLBACK_AVAILABLE           = BASE + 2;
2588     /** @hide arg1 = TTL */
2589     public static final int CALLBACK_LOSING              = BASE + 3;
2590     /** @hide */
2591     public static final int CALLBACK_LOST                = BASE + 4;
2592     /** @hide */
2593     public static final int CALLBACK_UNAVAIL             = BASE + 5;
2594     /** @hide */
2595     public static final int CALLBACK_CAP_CHANGED         = BASE + 6;
2596     /** @hide */
2597     public static final int CALLBACK_IP_CHANGED          = BASE + 7;
2598     /** @hide */
2599     public static final int CALLBACK_RELEASED            = BASE + 8;
2600     /** @hide */
2601     public static final int CALLBACK_EXIT                = BASE + 9;
2602     /** @hide obj = NetworkCapabilities, arg1 = seq number */
2603     private static final int EXPIRE_LEGACY_REQUEST       = BASE + 10;
2604     /** @hide */
2605     public static final int CALLBACK_SUSPENDED           = BASE + 11;
2606     /** @hide */
2607     public static final int CALLBACK_RESUMED             = BASE + 12;
2608 
2609     private class CallbackHandler extends Handler {
2610         private final HashMap<NetworkRequest, NetworkCallback>mCallbackMap;
2611         private final AtomicInteger mRefCount;
2612         private static final String TAG = "ConnectivityManager.CallbackHandler";
2613         private final ConnectivityManager mCm;
2614         private static final boolean DBG = false;
2615 
CallbackHandler(Looper looper, HashMap<NetworkRequest, NetworkCallback>callbackMap, AtomicInteger refCount, ConnectivityManager cm)2616         CallbackHandler(Looper looper, HashMap<NetworkRequest, NetworkCallback>callbackMap,
2617                 AtomicInteger refCount, ConnectivityManager cm) {
2618             super(looper);
2619             mCallbackMap = callbackMap;
2620             mRefCount = refCount;
2621             mCm = cm;
2622         }
2623 
2624         @Override
handleMessage(Message message)2625         public void handleMessage(Message message) {
2626             NetworkRequest request = (NetworkRequest) getObject(message, NetworkRequest.class);
2627             Network network = (Network) getObject(message, Network.class);
2628             if (DBG) {
2629                 Log.d(TAG, whatToString(message.what) + " for network " + network);
2630             }
2631             switch (message.what) {
2632                 case CALLBACK_PRECHECK: {
2633                     NetworkCallback callback = getCallback(request, "PRECHECK");
2634                     if (callback != null) {
2635                         callback.onPreCheck(network);
2636                     }
2637                     break;
2638                 }
2639                 case CALLBACK_AVAILABLE: {
2640                     NetworkCallback callback = getCallback(request, "AVAILABLE");
2641                     if (callback != null) {
2642                         callback.onAvailable(network);
2643                     }
2644                     break;
2645                 }
2646                 case CALLBACK_LOSING: {
2647                     NetworkCallback callback = getCallback(request, "LOSING");
2648                     if (callback != null) {
2649                         callback.onLosing(network, message.arg1);
2650                     }
2651                     break;
2652                 }
2653                 case CALLBACK_LOST: {
2654                     NetworkCallback callback = getCallback(request, "LOST");
2655                     if (callback != null) {
2656                         callback.onLost(network);
2657                     }
2658                     break;
2659                 }
2660                 case CALLBACK_UNAVAIL: {
2661                     NetworkCallback callback = getCallback(request, "UNAVAIL");
2662                     if (callback != null) {
2663                         callback.onUnavailable();
2664                     }
2665                     break;
2666                 }
2667                 case CALLBACK_CAP_CHANGED: {
2668                     NetworkCallback callback = getCallback(request, "CAP_CHANGED");
2669                     if (callback != null) {
2670                         NetworkCapabilities cap = (NetworkCapabilities)getObject(message,
2671                                 NetworkCapabilities.class);
2672 
2673                         callback.onCapabilitiesChanged(network, cap);
2674                     }
2675                     break;
2676                 }
2677                 case CALLBACK_IP_CHANGED: {
2678                     NetworkCallback callback = getCallback(request, "IP_CHANGED");
2679                     if (callback != null) {
2680                         LinkProperties lp = (LinkProperties)getObject(message,
2681                                 LinkProperties.class);
2682 
2683                         callback.onLinkPropertiesChanged(network, lp);
2684                     }
2685                     break;
2686                 }
2687                 case CALLBACK_SUSPENDED: {
2688                     NetworkCallback callback = getCallback(request, "SUSPENDED");
2689                     if (callback != null) {
2690                         callback.onNetworkSuspended(network);
2691                     }
2692                     break;
2693                 }
2694                 case CALLBACK_RESUMED: {
2695                     NetworkCallback callback = getCallback(request, "RESUMED");
2696                     if (callback != null) {
2697                         callback.onNetworkResumed(network);
2698                     }
2699                     break;
2700                 }
2701                 case CALLBACK_RELEASED: {
2702                     NetworkCallback callback = null;
2703                     synchronized(mCallbackMap) {
2704                         callback = mCallbackMap.remove(request);
2705                     }
2706                     if (callback != null) {
2707                         synchronized(mRefCount) {
2708                             if (mRefCount.decrementAndGet() == 0) {
2709                                 getLooper().quit();
2710                             }
2711                         }
2712                     } else {
2713                         Log.e(TAG, "callback not found for RELEASED message");
2714                     }
2715                     break;
2716                 }
2717                 case CALLBACK_EXIT: {
2718                     Log.d(TAG, "Listener quitting");
2719                     getLooper().quit();
2720                     break;
2721                 }
2722                 case EXPIRE_LEGACY_REQUEST: {
2723                     expireRequest((NetworkCapabilities)message.obj, message.arg1);
2724                     break;
2725                 }
2726             }
2727         }
2728 
getObject(Message msg, Class c)2729         private Object getObject(Message msg, Class c) {
2730             return msg.getData().getParcelable(c.getSimpleName());
2731         }
2732 
getCallback(NetworkRequest req, String name)2733         private NetworkCallback getCallback(NetworkRequest req, String name) {
2734             NetworkCallback callback;
2735             synchronized(mCallbackMap) {
2736                 callback = mCallbackMap.get(req);
2737             }
2738             if (callback == null) {
2739                 Log.e(TAG, "callback not found for " + name + " message");
2740             }
2741             return callback;
2742         }
2743     }
2744 
incCallbackHandlerRefCount()2745     private void incCallbackHandlerRefCount() {
2746         synchronized(sCallbackRefCount) {
2747             if (sCallbackRefCount.incrementAndGet() == 1) {
2748                 // TODO: switch this to ConnectivityThread
2749                 HandlerThread callbackThread = new HandlerThread("ConnectivityManager");
2750                 callbackThread.start();
2751                 sCallbackHandler = new CallbackHandler(callbackThread.getLooper(),
2752                         sNetworkCallback, sCallbackRefCount, this);
2753             }
2754         }
2755     }
2756 
decCallbackHandlerRefCount()2757     private void decCallbackHandlerRefCount() {
2758         synchronized(sCallbackRefCount) {
2759             if (sCallbackRefCount.decrementAndGet() == 0) {
2760                 sCallbackHandler.obtainMessage(CALLBACK_EXIT).sendToTarget();
2761                 sCallbackHandler = null;
2762             }
2763         }
2764     }
2765 
2766     static final HashMap<NetworkRequest, NetworkCallback> sNetworkCallback =
2767             new HashMap<NetworkRequest, NetworkCallback>();
2768     static final AtomicInteger sCallbackRefCount = new AtomicInteger(0);
2769     static CallbackHandler sCallbackHandler = null;
2770 
2771     private final static int LISTEN  = 1;
2772     private final static int REQUEST = 2;
2773 
sendRequestForNetwork(NetworkCapabilities need, NetworkCallback networkCallback, int timeoutSec, int action, int legacyType)2774     private NetworkRequest sendRequestForNetwork(NetworkCapabilities need,
2775             NetworkCallback networkCallback, int timeoutSec, int action,
2776             int legacyType) {
2777         if (networkCallback == null) {
2778             throw new IllegalArgumentException("null NetworkCallback");
2779         }
2780         if (need == null && action != REQUEST) {
2781             throw new IllegalArgumentException("null NetworkCapabilities");
2782         }
2783         try {
2784             incCallbackHandlerRefCount();
2785             synchronized(sNetworkCallback) {
2786                 if (action == LISTEN) {
2787                     networkCallback.networkRequest = mService.listenForNetwork(need,
2788                             new Messenger(sCallbackHandler), new Binder());
2789                 } else {
2790                     networkCallback.networkRequest = mService.requestNetwork(need,
2791                             new Messenger(sCallbackHandler), timeoutSec, new Binder(), legacyType);
2792                 }
2793                 if (networkCallback.networkRequest != null) {
2794                     sNetworkCallback.put(networkCallback.networkRequest, networkCallback);
2795                 }
2796             }
2797         } catch (RemoteException e) {
2798             throw e.rethrowFromSystemServer();
2799         }
2800         if (networkCallback.networkRequest == null) decCallbackHandlerRefCount();
2801         return networkCallback.networkRequest;
2802     }
2803 
2804     /**
2805      * Helper function to request a network with a particular legacy type.
2806      *
2807      * This is temporarily public @hide so it can be called by system code that uses the
2808      * NetworkRequest API to request networks but relies on CONNECTIVITY_ACTION broadcasts for
2809      * instead network notifications.
2810      *
2811      * TODO: update said system code to rely on NetworkCallbacks and make this method private.
2812      *
2813      * @hide
2814      */
requestNetwork(NetworkRequest request, NetworkCallback networkCallback, int timeoutMs, int legacyType)2815     public void requestNetwork(NetworkRequest request, NetworkCallback networkCallback,
2816             int timeoutMs, int legacyType) {
2817         sendRequestForNetwork(request.networkCapabilities, networkCallback, timeoutMs, REQUEST,
2818                 legacyType);
2819     }
2820 
2821     /**
2822      * Request a network to satisfy a set of {@link android.net.NetworkCapabilities}.
2823      *
2824      * This {@link NetworkRequest} will live until released via
2825      * {@link #unregisterNetworkCallback(NetworkCallback)} or the calling application exits.
2826      * Status of the request can be followed by listening to the various
2827      * callbacks described in {@link NetworkCallback}.  The {@link Network}
2828      * can be used to direct traffic to the network.
2829      * <p>It is presently unsupported to request a network with mutable
2830      * {@link NetworkCapabilities} such as
2831      * {@link NetworkCapabilities#NET_CAPABILITY_VALIDATED} or
2832      * {@link NetworkCapabilities#NET_CAPABILITY_CAPTIVE_PORTAL}
2833      * as these {@code NetworkCapabilities} represent states that a particular
2834      * network may never attain, and whether a network will attain these states
2835      * is unknown prior to bringing up the network so the framework does not
2836      * know how to go about satisfing a request with these capabilities.
2837      *
2838      * <p>This method requires the caller to hold either the
2839      * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2840      * or the ability to modify system settings as determined by
2841      * {@link android.provider.Settings.System#canWrite}.</p>
2842      *
2843      * @param request {@link NetworkRequest} describing this request.
2844      * @param networkCallback The {@link NetworkCallback} to be utilized for this
2845      *                        request.  Note the callback must not be shared - they
2846      *                        uniquely specify this request.
2847      * @throws IllegalArgumentException if {@code request} specifies any mutable
2848      *         {@code NetworkCapabilities}.
2849      */
requestNetwork(NetworkRequest request, NetworkCallback networkCallback)2850     public void requestNetwork(NetworkRequest request, NetworkCallback networkCallback) {
2851         requestNetwork(request, networkCallback, 0,
2852                 inferLegacyTypeForNetworkCapabilities(request.networkCapabilities));
2853     }
2854 
2855     /**
2856      * Request a network to satisfy a set of {@link android.net.NetworkCapabilities}, limited
2857      * by a timeout.
2858      *
2859      * This function behaves identically to the non-timedout version, but if a suitable
2860      * network is not found within the given time (in milliseconds) the
2861      * {@link NetworkCallback#unavailable} callback is called.  The request must
2862      * still be released normally by calling {@link unregisterNetworkCallback(NetworkCallback)}.
2863      *
2864      * <p>This method requires the caller to hold either the
2865      * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2866      * or the ability to modify system settings as determined by
2867      * {@link android.provider.Settings.System#canWrite}.</p>
2868      *
2869      * @param request {@link NetworkRequest} describing this request.
2870      * @param networkCallback The callbacks to be utilized for this request.  Note
2871      *                        the callbacks must not be shared - they uniquely specify
2872      *                        this request.
2873      * @param timeoutMs The time in milliseconds to attempt looking for a suitable network
2874      *                  before {@link NetworkCallback#unavailable} is called.
2875      *
2876      * TODO: Make timeouts work and then unhide this method.
2877      *
2878      * @hide
2879      */
requestNetwork(NetworkRequest request, NetworkCallback networkCallback, int timeoutMs)2880     public void requestNetwork(NetworkRequest request, NetworkCallback networkCallback,
2881             int timeoutMs) {
2882         requestNetwork(request, networkCallback, timeoutMs,
2883                 inferLegacyTypeForNetworkCapabilities(request.networkCapabilities));
2884     }
2885 
2886     /**
2887      * The maximum number of milliseconds the framework will look for a suitable network
2888      * during a timeout-equiped call to {@link requestNetwork}.
2889      * {@hide}
2890      */
2891     public final static int MAX_NETWORK_REQUEST_TIMEOUT_MS = 100 * 60 * 1000;
2892 
2893     /**
2894      * The lookup key for a {@link Network} object included with the intent after
2895      * successfully finding a network for the applications request.  Retrieve it with
2896      * {@link android.content.Intent#getParcelableExtra(String)}.
2897      * <p>
2898      * Note that if you intend to invoke {@link Network#openConnection(java.net.URL)}
2899      * then you must get a ConnectivityManager instance before doing so.
2900      */
2901     public static final String EXTRA_NETWORK = "android.net.extra.NETWORK";
2902 
2903     /**
2904      * The lookup key for a {@link NetworkRequest} object included with the intent after
2905      * successfully finding a network for the applications request.  Retrieve it with
2906      * {@link android.content.Intent#getParcelableExtra(String)}.
2907      */
2908     public static final String EXTRA_NETWORK_REQUEST = "android.net.extra.NETWORK_REQUEST";
2909 
2910 
2911     /**
2912      * Request a network to satisfy a set of {@link android.net.NetworkCapabilities}.
2913      *
2914      * This function behaves identically to the version that takes a NetworkCallback, but instead
2915      * of {@link NetworkCallback} a {@link PendingIntent} is used.  This means
2916      * the request may outlive the calling application and get called back when a suitable
2917      * network is found.
2918      * <p>
2919      * The operation is an Intent broadcast that goes to a broadcast receiver that
2920      * you registered with {@link Context#registerReceiver} or through the
2921      * &lt;receiver&gt; tag in an AndroidManifest.xml file
2922      * <p>
2923      * The operation Intent is delivered with two extras, a {@link Network} typed
2924      * extra called {@link #EXTRA_NETWORK} and a {@link NetworkRequest}
2925      * typed extra called {@link #EXTRA_NETWORK_REQUEST} containing
2926      * the original requests parameters.  It is important to create a new,
2927      * {@link NetworkCallback} based request before completing the processing of the
2928      * Intent to reserve the network or it will be released shortly after the Intent
2929      * is processed.
2930      * <p>
2931      * If there is already a request for this Intent registered (with the equality of
2932      * two Intents defined by {@link Intent#filterEquals}), then it will be removed and
2933      * replaced by this one, effectively releasing the previous {@link NetworkRequest}.
2934      * <p>
2935      * The request may be released normally by calling
2936      * {@link #releaseNetworkRequest(android.app.PendingIntent)}.
2937      * <p>It is presently unsupported to request a network with either
2938      * {@link NetworkCapabilities#NET_CAPABILITY_VALIDATED} or
2939      * {@link NetworkCapabilities#NET_CAPABILITY_CAPTIVE_PORTAL}
2940      * as these {@code NetworkCapabilities} represent states that a particular
2941      * network may never attain, and whether a network will attain these states
2942      * is unknown prior to bringing up the network so the framework does not
2943      * know how to go about satisfing a request with these capabilities.
2944      *
2945      * <p>This method requires the caller to hold either the
2946      * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2947      * or the ability to modify system settings as determined by
2948      * {@link android.provider.Settings.System#canWrite}.</p>
2949      *
2950      * @param request {@link NetworkRequest} describing this request.
2951      * @param operation Action to perform when the network is available (corresponds
2952      *                  to the {@link NetworkCallback#onAvailable} call.  Typically
2953      *                  comes from {@link PendingIntent#getBroadcast}. Cannot be null.
2954      * @throws IllegalArgumentException if {@code request} contains either
2955      *         {@link NetworkCapabilities#NET_CAPABILITY_VALIDATED} or
2956      *         {@link NetworkCapabilities#NET_CAPABILITY_CAPTIVE_PORTAL}.
2957      */
requestNetwork(NetworkRequest request, PendingIntent operation)2958     public void requestNetwork(NetworkRequest request, PendingIntent operation) {
2959         checkPendingIntent(operation);
2960         try {
2961             mService.pendingRequestForNetwork(request.networkCapabilities, operation);
2962         } catch (RemoteException e) {
2963             throw e.rethrowFromSystemServer();
2964         }
2965     }
2966 
2967     /**
2968      * Removes a request made via {@link #requestNetwork(NetworkRequest, android.app.PendingIntent)}
2969      * <p>
2970      * This method has the same behavior as
2971      * {@link #unregisterNetworkCallback(android.app.PendingIntent)} with respect to
2972      * releasing network resources and disconnecting.
2973      *
2974      * @param operation A PendingIntent equal (as defined by {@link Intent#filterEquals}) to the
2975      *                  PendingIntent passed to
2976      *                  {@link #requestNetwork(NetworkRequest, android.app.PendingIntent)} with the
2977      *                  corresponding NetworkRequest you'd like to remove. Cannot be null.
2978      */
releaseNetworkRequest(PendingIntent operation)2979     public void releaseNetworkRequest(PendingIntent operation) {
2980         checkPendingIntent(operation);
2981         try {
2982             mService.releasePendingNetworkRequest(operation);
2983         } catch (RemoteException e) {
2984             throw e.rethrowFromSystemServer();
2985         }
2986     }
2987 
checkPendingIntent(PendingIntent intent)2988     private void checkPendingIntent(PendingIntent intent) {
2989         if (intent == null) {
2990             throw new IllegalArgumentException("PendingIntent cannot be null.");
2991         }
2992     }
2993 
2994     /**
2995      * Registers to receive notifications about all networks which satisfy the given
2996      * {@link NetworkRequest}.  The callbacks will continue to be called until
2997      * either the application exits or link #unregisterNetworkCallback(NetworkCallback)} is called.
2998      * <p>This method requires the caller to hold the permission
2999      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
3000      *
3001      * @param request {@link NetworkRequest} describing this request.
3002      * @param networkCallback The {@link NetworkCallback} that the system will call as suitable
3003      *                        networks change state.
3004      */
registerNetworkCallback(NetworkRequest request, NetworkCallback networkCallback)3005     public void registerNetworkCallback(NetworkRequest request, NetworkCallback networkCallback) {
3006         sendRequestForNetwork(request.networkCapabilities, networkCallback, 0, LISTEN, TYPE_NONE);
3007     }
3008 
3009     /**
3010      * Registers a PendingIntent to be sent when a network is available which satisfies the given
3011      * {@link NetworkRequest}.
3012      *
3013      * This function behaves identically to the version that takes a NetworkCallback, but instead
3014      * of {@link NetworkCallback} a {@link PendingIntent} is used.  This means
3015      * the request may outlive the calling application and get called back when a suitable
3016      * network is found.
3017      * <p>
3018      * The operation is an Intent broadcast that goes to a broadcast receiver that
3019      * you registered with {@link Context#registerReceiver} or through the
3020      * &lt;receiver&gt; tag in an AndroidManifest.xml file
3021      * <p>
3022      * The operation Intent is delivered with two extras, a {@link Network} typed
3023      * extra called {@link #EXTRA_NETWORK} and a {@link NetworkRequest}
3024      * typed extra called {@link #EXTRA_NETWORK_REQUEST} containing
3025      * the original requests parameters.
3026      * <p>
3027      * If there is already a request for this Intent registered (with the equality of
3028      * two Intents defined by {@link Intent#filterEquals}), then it will be removed and
3029      * replaced by this one, effectively releasing the previous {@link NetworkRequest}.
3030      * <p>
3031      * The request may be released normally by calling
3032      * {@link #unregisterNetworkCallback(android.app.PendingIntent)}.
3033      * <p>This method requires the caller to hold the permission
3034      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
3035      * @param request {@link NetworkRequest} describing this request.
3036      * @param operation Action to perform when the network is available (corresponds
3037      *                  to the {@link NetworkCallback#onAvailable} call.  Typically
3038      *                  comes from {@link PendingIntent#getBroadcast}. Cannot be null.
3039      */
registerNetworkCallback(NetworkRequest request, PendingIntent operation)3040     public void registerNetworkCallback(NetworkRequest request, PendingIntent operation) {
3041         checkPendingIntent(operation);
3042         try {
3043             mService.pendingListenForNetwork(request.networkCapabilities, operation);
3044         } catch (RemoteException e) {
3045             throw e.rethrowFromSystemServer();
3046         }
3047     }
3048 
3049     /**
3050      * Registers to receive notifications about changes in the system default network. The callbacks
3051      * will continue to be called until either the application exits or
3052      * {@link #unregisterNetworkCallback(NetworkCallback)} is called.
3053      * <p>This method requires the caller to hold the permission
3054      * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
3055      *
3056      * @param networkCallback The {@link NetworkCallback} that the system will call as the
3057      *                        system default network changes.
3058      */
registerDefaultNetworkCallback(NetworkCallback networkCallback)3059     public void registerDefaultNetworkCallback(NetworkCallback networkCallback) {
3060         // This works because if the NetworkCapabilities are null,
3061         // ConnectivityService takes them from the default request.
3062         //
3063         // Since the capabilities are exactly the same as the default request's
3064         // capabilities, this request is guaranteed, at all times, to be
3065         // satisfied by the same network, if any, that satisfies the default
3066         // request, i.e., the system default network.
3067         sendRequestForNetwork(null, networkCallback, 0, REQUEST, TYPE_NONE);
3068     }
3069 
3070     /**
3071      * Requests bandwidth update for a given {@link Network} and returns whether the update request
3072      * is accepted by ConnectivityService. Once accepted, ConnectivityService will poll underlying
3073      * network connection for updated bandwidth information. The caller will be notified via
3074      * {@link ConnectivityManager.NetworkCallback} if there is an update. Notice that this
3075      * method assumes that the caller has previously called
3076      * {@link #registerNetworkCallback(NetworkRequest, NetworkCallback)} to listen for network
3077      * changes.
3078      *
3079      * @param network {@link Network} specifying which network you're interested.
3080      * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
3081      */
requestBandwidthUpdate(Network network)3082     public boolean requestBandwidthUpdate(Network network) {
3083         try {
3084             return mService.requestBandwidthUpdate(network);
3085         } catch (RemoteException e) {
3086             throw e.rethrowFromSystemServer();
3087         }
3088     }
3089 
3090     /**
3091      * Unregisters callbacks about and possibly releases networks originating from
3092      * {@link #requestNetwork(NetworkRequest, NetworkCallback)} and
3093      * {@link #registerNetworkCallback(NetworkRequest, NetworkCallback)} calls.
3094      * If the given {@code NetworkCallback} had previously been used with
3095      * {@code #requestNetwork}, any networks that had been connected to only to satisfy that request
3096      * will be disconnected.
3097      *
3098      * @param networkCallback The {@link NetworkCallback} used when making the request.
3099      */
unregisterNetworkCallback(NetworkCallback networkCallback)3100     public void unregisterNetworkCallback(NetworkCallback networkCallback) {
3101         if (networkCallback == null || networkCallback.networkRequest == null ||
3102                 networkCallback.networkRequest.requestId == REQUEST_ID_UNSET) {
3103             throw new IllegalArgumentException("Invalid NetworkCallback");
3104         }
3105         try {
3106             mService.releaseNetworkRequest(networkCallback.networkRequest);
3107         } catch (RemoteException e) {
3108             throw e.rethrowFromSystemServer();
3109         }
3110 
3111         synchronized (sNetworkCallback) {
3112             sNetworkCallback.remove(networkCallback.networkRequest);
3113         }
3114     }
3115 
3116     /**
3117      * Unregisters a callback previously registered via
3118      * {@link #registerNetworkCallback(NetworkRequest, android.app.PendingIntent)}.
3119      *
3120      * @param operation A PendingIntent equal (as defined by {@link Intent#filterEquals}) to the
3121      *                  PendingIntent passed to
3122      *                  {@link #registerNetworkCallback(NetworkRequest, android.app.PendingIntent)}.
3123      *                  Cannot be null.
3124      */
unregisterNetworkCallback(PendingIntent operation)3125     public void unregisterNetworkCallback(PendingIntent operation) {
3126         releaseNetworkRequest(operation);
3127     }
3128 
3129     /**
3130      * Informs the system whether it should switch to {@code network} regardless of whether it is
3131      * validated or not. If {@code accept} is true, and the network was explicitly selected by the
3132      * user (e.g., by selecting a Wi-Fi network in the Settings app), then the network will become
3133      * the system default network regardless of any other network that's currently connected. If
3134      * {@code always} is true, then the choice is remembered, so that the next time the user
3135      * connects to this network, the system will switch to it.
3136      *
3137      * <p>This method requires the caller to hold the permission
3138      * {@link android.Manifest.permission#CONNECTIVITY_INTERNAL}
3139      *
3140      * @param network The network to accept.
3141      * @param accept Whether to accept the network even if unvalidated.
3142      * @param always Whether to remember this choice in the future.
3143      *
3144      * @hide
3145      */
setAcceptUnvalidated(Network network, boolean accept, boolean always)3146     public void setAcceptUnvalidated(Network network, boolean accept, boolean always) {
3147         try {
3148             mService.setAcceptUnvalidated(network, accept, always);
3149         } catch (RemoteException e) {
3150             throw e.rethrowFromSystemServer();
3151         }
3152     }
3153 
3154     /**
3155      * Resets all connectivity manager settings back to factory defaults.
3156      * @hide
3157      */
factoryReset()3158     public void factoryReset() {
3159         try {
3160             mService.factoryReset();
3161         } catch (RemoteException e) {
3162             throw e.rethrowFromSystemServer();
3163         }
3164     }
3165 
3166     /**
3167      * Binds the current process to {@code network}.  All Sockets created in the future
3168      * (and not explicitly bound via a bound SocketFactory from
3169      * {@link Network#getSocketFactory() Network.getSocketFactory()}) will be bound to
3170      * {@code network}.  All host name resolutions will be limited to {@code network} as well.
3171      * Note that if {@code network} ever disconnects, all Sockets created in this way will cease to
3172      * work and all host name resolutions will fail.  This is by design so an application doesn't
3173      * accidentally use Sockets it thinks are still bound to a particular {@link Network}.
3174      * To clear binding pass {@code null} for {@code network}.  Using individually bound
3175      * Sockets created by Network.getSocketFactory().createSocket() and
3176      * performing network-specific host name resolutions via
3177      * {@link Network#getAllByName Network.getAllByName} is preferred to calling
3178      * {@code bindProcessToNetwork}.
3179      *
3180      * @param network The {@link Network} to bind the current process to, or {@code null} to clear
3181      *                the current binding.
3182      * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
3183      */
bindProcessToNetwork(Network network)3184     public boolean bindProcessToNetwork(Network network) {
3185         // Forcing callers to call thru non-static function ensures ConnectivityManager
3186         // instantiated.
3187         return setProcessDefaultNetwork(network);
3188     }
3189 
3190     /**
3191      * Binds the current process to {@code network}.  All Sockets created in the future
3192      * (and not explicitly bound via a bound SocketFactory from
3193      * {@link Network#getSocketFactory() Network.getSocketFactory()}) will be bound to
3194      * {@code network}.  All host name resolutions will be limited to {@code network} as well.
3195      * Note that if {@code network} ever disconnects, all Sockets created in this way will cease to
3196      * work and all host name resolutions will fail.  This is by design so an application doesn't
3197      * accidentally use Sockets it thinks are still bound to a particular {@link Network}.
3198      * To clear binding pass {@code null} for {@code network}.  Using individually bound
3199      * Sockets created by Network.getSocketFactory().createSocket() and
3200      * performing network-specific host name resolutions via
3201      * {@link Network#getAllByName Network.getAllByName} is preferred to calling
3202      * {@code setProcessDefaultNetwork}.
3203      *
3204      * @param network The {@link Network} to bind the current process to, or {@code null} to clear
3205      *                the current binding.
3206      * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
3207      * @deprecated This function can throw {@link IllegalStateException}.  Use
3208      *             {@link #bindProcessToNetwork} instead.  {@code bindProcessToNetwork}
3209      *             is a direct replacement.
3210      */
setProcessDefaultNetwork(Network network)3211     public static boolean setProcessDefaultNetwork(Network network) {
3212         int netId = (network == null) ? NETID_UNSET : network.netId;
3213         if (netId == NetworkUtils.getBoundNetworkForProcess()) {
3214             return true;
3215         }
3216         if (NetworkUtils.bindProcessToNetwork(netId)) {
3217             // Set HTTP proxy system properties to match network.
3218             // TODO: Deprecate this static method and replace it with a non-static version.
3219             try {
3220                 Proxy.setHttpProxySystemProperty(getInstance().getDefaultProxy());
3221             } catch (SecurityException e) {
3222                 // The process doesn't have ACCESS_NETWORK_STATE, so we can't fetch the proxy.
3223                 Log.e(TAG, "Can't set proxy properties", e);
3224             }
3225             // Must flush DNS cache as new network may have different DNS resolutions.
3226             InetAddress.clearDnsCache();
3227             // Must flush socket pool as idle sockets will be bound to previous network and may
3228             // cause subsequent fetches to be performed on old network.
3229             NetworkEventDispatcher.getInstance().onNetworkConfigurationChanged();
3230             return true;
3231         } else {
3232             return false;
3233         }
3234     }
3235 
3236     /**
3237      * Returns the {@link Network} currently bound to this process via
3238      * {@link #bindProcessToNetwork}, or {@code null} if no {@link Network} is explicitly bound.
3239      *
3240      * @return {@code Network} to which this process is bound, or {@code null}.
3241      */
getBoundNetworkForProcess()3242     public Network getBoundNetworkForProcess() {
3243         // Forcing callers to call thru non-static function ensures ConnectivityManager
3244         // instantiated.
3245         return getProcessDefaultNetwork();
3246     }
3247 
3248     /**
3249      * Returns the {@link Network} currently bound to this process via
3250      * {@link #bindProcessToNetwork}, or {@code null} if no {@link Network} is explicitly bound.
3251      *
3252      * @return {@code Network} to which this process is bound, or {@code null}.
3253      * @deprecated Using this function can lead to other functions throwing
3254      *             {@link IllegalStateException}.  Use {@link #getBoundNetworkForProcess} instead.
3255      *             {@code getBoundNetworkForProcess} is a direct replacement.
3256      */
getProcessDefaultNetwork()3257     public static Network getProcessDefaultNetwork() {
3258         int netId = NetworkUtils.getBoundNetworkForProcess();
3259         if (netId == NETID_UNSET) return null;
3260         return new Network(netId);
3261     }
3262 
unsupportedStartingFrom(int version)3263     private void unsupportedStartingFrom(int version) {
3264         if (Process.myUid() == Process.SYSTEM_UID) {
3265             // The getApplicationInfo() call we make below is not supported in system context, and
3266             // we want to allow the system to use these APIs anyway.
3267             return;
3268         }
3269 
3270         if (mContext.getApplicationInfo().targetSdkVersion >= version) {
3271             throw new UnsupportedOperationException(
3272                     "This method is not supported in target SDK version " + version + " and above");
3273         }
3274     }
3275 
3276     // Checks whether the calling app can use the legacy routing API (startUsingNetworkFeature,
3277     // stopUsingNetworkFeature, requestRouteToHost), and if not throw UnsupportedOperationException.
3278     // TODO: convert the existing system users (Tethering, GnssLocationProvider) to the new APIs and
3279     // remove these exemptions. Note that this check is not secure, and apps can still access these
3280     // functions by accessing ConnectivityService directly. However, it should be clear that doing
3281     // so is unsupported and may break in the future. http://b/22728205
checkLegacyRoutingApiAccess()3282     private void checkLegacyRoutingApiAccess() {
3283         if (mContext.checkCallingOrSelfPermission("com.android.permission.INJECT_OMADM_SETTINGS")
3284                 == PackageManager.PERMISSION_GRANTED) {
3285             return;
3286         }
3287 
3288         unsupportedStartingFrom(VERSION_CODES.M);
3289     }
3290 
3291     /**
3292      * Binds host resolutions performed by this process to {@code network}.
3293      * {@link #bindProcessToNetwork} takes precedence over this setting.
3294      *
3295      * @param network The {@link Network} to bind host resolutions from the current process to, or
3296      *                {@code null} to clear the current binding.
3297      * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
3298      * @hide
3299      * @deprecated This is strictly for legacy usage to support {@link #startUsingNetworkFeature}.
3300      */
setProcessDefaultNetworkForHostResolution(Network network)3301     public static boolean setProcessDefaultNetworkForHostResolution(Network network) {
3302         return NetworkUtils.bindProcessToNetworkForHostResolution(
3303                 network == null ? NETID_UNSET : network.netId);
3304     }
3305 
3306     /**
3307      * Device is not restricting metered network activity while application is running on
3308      * background.
3309      */
3310     public static final int RESTRICT_BACKGROUND_STATUS_DISABLED = 1;
3311 
3312     /**
3313      * Device is restricting metered network activity while application is running on background,
3314      * but application is allowed to bypass it.
3315      * <p>
3316      * In this state, application should take action to mitigate metered network access.
3317      * For example, a music streaming application should switch to a low-bandwidth bitrate.
3318      */
3319     public static final int RESTRICT_BACKGROUND_STATUS_WHITELISTED = 2;
3320 
3321     /**
3322      * Device is restricting metered network activity while application is running on background.
3323      * <p>
3324      * In this state, application should not try to use the network while running on background,
3325      * because it would be denied.
3326      */
3327     public static final int RESTRICT_BACKGROUND_STATUS_ENABLED = 3;
3328 
3329     /**
3330      * A change in the background metered network activity restriction has occurred.
3331      * <p>
3332      * Applications should call {@link #getRestrictBackgroundStatus()} to check if the restriction
3333      * applies to them.
3334      * <p>
3335      * This is only sent to registered receivers, not manifest receivers.
3336      */
3337     @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
3338     public static final String ACTION_RESTRICT_BACKGROUND_CHANGED =
3339             "android.net.conn.RESTRICT_BACKGROUND_CHANGED";
3340 
3341     /** @hide */
3342     @Retention(RetentionPolicy.SOURCE)
3343     @IntDef(flag = false, value = {
3344             RESTRICT_BACKGROUND_STATUS_DISABLED,
3345             RESTRICT_BACKGROUND_STATUS_WHITELISTED,
3346             RESTRICT_BACKGROUND_STATUS_ENABLED,
3347     })
3348     public @interface RestrictBackgroundStatus {
3349     }
3350 
getNetworkPolicyManager()3351     private INetworkPolicyManager getNetworkPolicyManager() {
3352         synchronized (this) {
3353             if (mNPManager != null) {
3354                 return mNPManager;
3355             }
3356             mNPManager = INetworkPolicyManager.Stub.asInterface(ServiceManager
3357                     .getService(Context.NETWORK_POLICY_SERVICE));
3358             return mNPManager;
3359         }
3360     }
3361 
3362     /**
3363      * Determines if the calling application is subject to metered network restrictions while
3364      * running on background.
3365      *
3366      * @return {@link #RESTRICT_BACKGROUND_STATUS_DISABLED},
3367      * {@link #RESTRICT_BACKGROUND_STATUS_ENABLED},
3368      * or {@link #RESTRICT_BACKGROUND_STATUS_WHITELISTED}
3369      */
getRestrictBackgroundStatus()3370     public @RestrictBackgroundStatus int getRestrictBackgroundStatus() {
3371         try {
3372             return getNetworkPolicyManager().getRestrictBackgroundByCaller();
3373         } catch (RemoteException e) {
3374             throw e.rethrowFromSystemServer();
3375         }
3376     }
3377 
3378     /**
3379      * A holder class for debug info (mapping CALLBACK values to field names). This is stored
3380      * in a holder for two reasons:
3381      * 1) The reflection necessary to establish the map can't be run at compile-time. Thus, this
3382      *    code will make the enclosing class not compile-time initializeable, deferring its
3383      *    initialization to zygote startup. This leads to dirty (but shared) memory.
3384      *    As this is debug info, use a holder that isn't initialized by default. This way the map
3385      *    will be created on demand, while ConnectivityManager can be compile-time initialized.
3386      * 2) Static initialization is still preferred for its strong thread safety guarantees without
3387      *    requiring a lock.
3388      */
3389     private static class NoPreloadHolder {
3390         public static final SparseArray<String> sMagicDecoderRing = MessageUtils.findMessageNames(
3391                 new Class[]{ConnectivityManager.class}, new String[]{"CALLBACK_"});
3392     }
3393 
3394     static {
3395         // When debug is enabled, aggressively initialize the holder by touching the field (which
3396         // will guarantee static initialization).
3397         if (CallbackHandler.DBG) {
3398             Object dummy = NoPreloadHolder.sMagicDecoderRing;
3399         }
3400     }
3401 
whatToString(int what)3402     private static final String whatToString(int what) {
3403         return NoPreloadHolder.sMagicDecoderRing.get(what, Integer.toString(what));
3404     }
3405 }
3406