You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

958 lines
34 KiB

/*
* Copyright (C) 2017 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#ifndef FARF_MEDIUM
#define FARF_MEDIUM 1
#endif
#include "HAP_farf.h"
#include "timer.h"
#include "chre/core/event_loop_manager.h"
#include "chre/core/host_comms_manager.h"
#include "chre/core/settings.h"
#include "chre/platform/fatal_error.h"
#include "chre/platform/log.h"
#include "chre/platform/memory.h"
#include "chre/platform/shared/host_protocol_chre.h"
#include "chre/platform/shared/nanoapp_load_manager.h"
#ifdef CHRE_USE_BUFFERED_LOGGING
#include "chre/platform/shared/log_buffer_manager.h"
#endif
#include "chre/platform/slpi/fastrpc.h"
#include "chre/platform/slpi/power_control_util.h"
#include "chre/platform/slpi/system_time.h"
#include "chre/platform/system_time.h"
#include "chre/platform/system_timer.h"
#include "chre/util/fixed_size_blocking_queue.h"
#include "chre/util/flatbuffers/helpers.h"
#include "chre/util/macros.h"
#include "chre/util/nested_data_ptr.h"
#include "chre/util/unique_ptr.h"
#include "chre_api/chre/version.h"
#include <inttypes.h>
#include <limits.h>
namespace chre {
namespace {
constexpr size_t kOutboundQueueSize = 32;
//! The last time a time sync request message has been sent.
//! TODO: Make this a member of HostLinkBase
Nanoseconds gLastTimeSyncRequestNanos(0);
struct LoadNanoappCallbackData {
uint64_t appId;
uint32_t transactionId;
uint16_t hostClientId;
UniquePtr<Nanoapp> nanoapp;
uint32_t fragmentId;
};
struct NanoappListData {
ChreFlatBufferBuilder *builder;
DynamicVector<NanoappListEntryOffset> nanoappEntries;
uint16_t hostClientId;
};
enum class PendingMessageType {
Shutdown,
NanoappMessageToHost,
HubInfoResponse,
NanoappListResponse,
LoadNanoappResponse,
UnloadNanoappResponse,
DebugDumpData,
DebugDumpResponse,
TimeSyncRequest,
LowPowerMicAccessRequest,
LowPowerMicAccessRelease,
EncodedLogMessage,
SelfTestResponse,
};
struct PendingMessage {
PendingMessage(PendingMessageType msgType, uint16_t hostClientId) {
type = msgType;
data.hostClientId = hostClientId;
}
PendingMessage(PendingMessageType msgType,
const MessageToHost *msgToHost = nullptr) {
type = msgType;
data.msgToHost = msgToHost;
}
PendingMessage(PendingMessageType msgType, ChreFlatBufferBuilder *builder) {
type = msgType;
data.builder = builder;
}
PendingMessageType type;
union {
const MessageToHost *msgToHost;
uint16_t hostClientId;
ChreFlatBufferBuilder *builder;
} data;
};
struct UnloadNanoappCallbackData {
uint64_t appId;
uint32_t transactionId;
uint16_t hostClientId;
bool allowSystemNanoappUnload;
};
/**
* @see buildAndEnqueueMessage()
*/
typedef void(MessageBuilderFunction)(ChreFlatBufferBuilder &builder,
void *cookie);
FixedSizeBlockingQueue<PendingMessage, kOutboundQueueSize> gOutboundQueue;
int copyToHostBuffer(const ChreFlatBufferBuilder &builder,
unsigned char *buffer, size_t bufferSize,
unsigned int *messageLen) {
uint8_t *data = builder.GetBufferPointer();
size_t size = builder.GetSize();
int result;
if (size > bufferSize) {
LOGE("Encoded structure size %zu too big for host buffer %zu; dropping",
size, bufferSize);
result = CHRE_FASTRPC_ERROR;
} else {
memcpy(buffer, data, size);
*messageLen = size;
result = CHRE_FASTRPC_SUCCESS;
}
return result;
}
/**
* Wrapper function to enqueue a message on the outbound message queue. All
* outgoing message to the host must be called through this function.
*
* @param message The message to send to host.
*
* @return true if the message was successfully added to the queue.
*/
bool enqueueMessage(PendingMessage message) {
// Vote for big image temporarily when waking up the main thread waiting for
// the message
bool voteSuccess = slpiForceBigImage();
bool success = gOutboundQueue.push(message);
// Remove the vote only if we successfully made a big image transition
if (voteSuccess) {
slpiRemoveBigImageVote();
}
return success;
}
/**
* Helper function that takes care of the boilerplate for allocating a
* ChreFlatBufferBuilder on the heap and adding it to the outbound message
* queue.
*
* @param msgType Identifies the message while in the outboud queue
* @param initialBufferSize Number of bytes to reserve when first allocating the
* ChreFlatBufferBuilder
* @param buildMsgFunc Synchronous callback used to encode the FlatBuffer
* message. Will not be invoked if allocation fails.
* @param cookie Opaque pointer that will be passed through to buildMsgFunc
*
* @return true if the message was successfully added to the queue
*/
bool buildAndEnqueueMessage(PendingMessageType msgType,
size_t initialBufferSize,
MessageBuilderFunction *msgBuilder, void *cookie) {
bool pushed = false;
auto builder = MakeUnique<ChreFlatBufferBuilder>(initialBufferSize);
if (builder.isNull()) {
LOGE("Couldn't allocate memory for message type %d",
static_cast<int>(msgType));
} else {
msgBuilder(*builder, cookie);
// TODO: if this fails, ideally we should block for some timeout until
// there's space in the queue
if (!enqueueMessage(PendingMessage(msgType, builder.get()))) {
LOGE("Couldn't push message type %d to outbound queue",
static_cast<int>(msgType));
} else {
builder.release();
pushed = true;
}
}
return pushed;
}
/**
* FlatBuffer message builder callback used with handleNanoappListRequest()
*/
void buildNanoappListResponse(ChreFlatBufferBuilder &builder, void *cookie) {
auto nanoappAdderCallback = [](const Nanoapp *nanoapp, void *data) {
auto *cbData = static_cast<NanoappListData *>(data);
HostProtocolChre::addNanoappListEntry(
*(cbData->builder), cbData->nanoappEntries, nanoapp->getAppId(),
nanoapp->getAppVersion(), true /*enabled*/, nanoapp->isSystemNanoapp(),
nanoapp->getAppPermissions());
};
// Add a NanoappListEntry to the FlatBuffer for each nanoapp
auto *cbData = static_cast<NanoappListData *>(cookie);
cbData->builder = &builder;
EventLoop &eventLoop = EventLoopManagerSingleton::get()->getEventLoop();
eventLoop.forEachNanoapp(nanoappAdderCallback, cbData);
HostProtocolChre::finishNanoappListResponse(builder, cbData->nanoappEntries,
cbData->hostClientId);
}
void finishLoadingNanoappCallback(SystemCallbackType /*type*/,
UniquePtr<LoadNanoappCallbackData> &&data) {
auto msgBuilder = [](ChreFlatBufferBuilder &builder, void *cookie) {
auto *cbData = static_cast<LoadNanoappCallbackData *>(cookie);
EventLoop &eventLoop = EventLoopManagerSingleton::get()->getEventLoop();
bool success =
cbData->nanoapp->isLoaded() && eventLoop.startNanoapp(cbData->nanoapp);
HostProtocolChre::encodeLoadNanoappResponse(builder, cbData->hostClientId,
cbData->transactionId, success,
cbData->fragmentId);
};
constexpr size_t kInitialBufferSize = 48;
buildAndEnqueueMessage(PendingMessageType::LoadNanoappResponse,
kInitialBufferSize, msgBuilder, data.get());
}
void handleUnloadNanoappCallback(SystemCallbackType /*type*/,
UniquePtr<UnloadNanoappCallbackData> &&data) {
auto msgBuilder = [](ChreFlatBufferBuilder &builder, void *cookie) {
auto *cbData = static_cast<UnloadNanoappCallbackData *>(cookie);
bool success = false;
uint32_t instanceId;
EventLoop &eventLoop = EventLoopManagerSingleton::get()->getEventLoop();
if (!eventLoop.findNanoappInstanceIdByAppId(cbData->appId, &instanceId)) {
LOGE("Couldn't unload app ID 0x%016" PRIx64 ": not found", cbData->appId);
} else {
success =
eventLoop.unloadNanoapp(instanceId, cbData->allowSystemNanoappUnload);
}
HostProtocolChre::encodeUnloadNanoappResponse(
builder, cbData->hostClientId, cbData->transactionId, success);
};
constexpr size_t kInitialBufferSize = 52;
buildAndEnqueueMessage(PendingMessageType::UnloadNanoappResponse,
kInitialBufferSize, msgBuilder, data.get());
}
int generateMessageToHost(const MessageToHost *msgToHost, unsigned char *buffer,
size_t bufferSize, unsigned int *messageLen) {
// TODO: ideally we'd construct our flatbuffer directly in the
// host-supplied buffer
constexpr size_t kFixedSizePortion = 80;
ChreFlatBufferBuilder builder(msgToHost->message.size() + kFixedSizePortion);
HostProtocolChre::encodeNanoappMessage(
builder, msgToHost->appId, msgToHost->toHostData.messageType,
msgToHost->toHostData.hostEndpoint, msgToHost->message.data(),
msgToHost->message.size(), msgToHost->toHostData.appPermissions,
msgToHost->toHostData.messagePermissions);
int result = copyToHostBuffer(builder, buffer, bufferSize, messageLen);
auto &hostCommsManager =
EventLoopManagerSingleton::get()->getHostCommsManager();
hostCommsManager.onMessageToHostComplete(msgToHost);
return result;
}
int generateHubInfoResponse(uint16_t hostClientId, unsigned char *buffer,
size_t bufferSize, unsigned int *messageLen) {
constexpr size_t kInitialBufferSize = 192;
constexpr char kHubName[] = "CHRE on SLPI";
constexpr char kVendor[] = "Google";
constexpr char kToolchain[] =
"Hexagon Tools 8.x (clang " STRINGIFY(__clang_major__) "." STRINGIFY(
__clang_minor__) "." STRINGIFY(__clang_patchlevel__) ")";
constexpr uint32_t kLegacyPlatformVersion = 0;
constexpr uint32_t kLegacyToolchainVersion =
((__clang_major__ & 0xFF) << 24) | ((__clang_minor__ & 0xFF) << 16) |
(__clang_patchlevel__ & 0xFFFF);
constexpr float kPeakMips = 350;
constexpr float kStoppedPower = 0;
constexpr float kSleepPower = 1;
constexpr float kPeakPower = 15;
// Note that this may execute prior to EventLoopManager::lateInit() completing
ChreFlatBufferBuilder builder(kInitialBufferSize);
HostProtocolChre::encodeHubInfoResponse(
builder, kHubName, kVendor, kToolchain, kLegacyPlatformVersion,
kLegacyToolchainVersion, kPeakMips, kStoppedPower, kSleepPower,
kPeakPower, CHRE_MESSAGE_TO_HOST_MAX_SIZE, chreGetPlatformId(),
chreGetVersion(), hostClientId);
return copyToHostBuffer(builder, buffer, bufferSize, messageLen);
}
int generateMessageFromBuilder(ChreFlatBufferBuilder *builder,
unsigned char *buffer, size_t bufferSize,
unsigned int *messageLen,
bool isEncodedLogMessage) {
CHRE_ASSERT(builder != nullptr);
int result = copyToHostBuffer(*builder, buffer, bufferSize, messageLen);
#ifdef CHRE_USE_BUFFERED_LOGGING
if (isEncodedLogMessage && LogBufferManagerSingleton::isInitialized()) {
LogBufferManagerSingleton::get()->onLogsSentToHost();
}
#else
UNUSED_VAR(isEncodedLogMessage);
#endif
builder->~ChreFlatBufferBuilder();
memoryFree(builder);
return result;
}
void sendDebugDumpData(uint16_t hostClientId, const char *debugStr,
size_t debugStrSize) {
struct DebugDumpMessageData {
uint16_t hostClientId;
const char *debugStr;
size_t debugStrSize;
};
auto msgBuilder = [](ChreFlatBufferBuilder &builder, void *cookie) {
const auto *data = static_cast<const DebugDumpMessageData *>(cookie);
HostProtocolChre::encodeDebugDumpData(builder, data->hostClientId,
data->debugStr, data->debugStrSize);
};
constexpr size_t kFixedSizePortion = 52;
DebugDumpMessageData data;
data.hostClientId = hostClientId;
data.debugStr = debugStr;
data.debugStrSize = debugStrSize;
buildAndEnqueueMessage(PendingMessageType::DebugDumpData,
kFixedSizePortion + debugStrSize, msgBuilder, &data);
}
void sendDebugDumpResponse(uint16_t hostClientId, bool success,
uint32_t dataCount) {
struct DebugDumpResponseData {
uint16_t hostClientId;
bool success;
uint32_t dataCount;
};
auto msgBuilder = [](ChreFlatBufferBuilder &builder, void *cookie) {
const auto *data = static_cast<const DebugDumpResponseData *>(cookie);
HostProtocolChre::encodeDebugDumpResponse(builder, data->hostClientId,
data->success, data->dataCount);
};
constexpr size_t kInitialSize = 52;
DebugDumpResponseData data;
data.hostClientId = hostClientId;
data.success = success;
data.dataCount = dataCount;
buildAndEnqueueMessage(PendingMessageType::DebugDumpResponse, kInitialSize,
msgBuilder, &data);
}
void sendSelfTestResponse(uint16_t hostClientId, bool success) {
struct SelfTestResponseData {
uint16_t hostClientId;
bool success;
};
auto msgBuilder = [](ChreFlatBufferBuilder &builder, void *cookie) {
const auto *data = static_cast<const SelfTestResponseData *>(cookie);
HostProtocolChre::encodeSelfTestResponse(builder, data->hostClientId,
data->success);
};
constexpr size_t kInitialSize = 52;
SelfTestResponseData data;
data.hostClientId = hostClientId;
data.success = success;
buildAndEnqueueMessage(PendingMessageType::SelfTestResponse, kInitialSize,
msgBuilder, &data);
}
void sendFragmentResponse(uint16_t hostClientId, uint32_t transactionId,
uint32_t fragmentId, bool success) {
struct FragmentedLoadInfoResponse {
uint16_t hostClientId;
uint32_t transactionId;
uint32_t fragmentId;
bool success;
};
auto msgBuilder = [](ChreFlatBufferBuilder &builder, void *cookie) {
auto *cbData = static_cast<FragmentedLoadInfoResponse *>(cookie);
HostProtocolChre::encodeLoadNanoappResponse(
builder, cbData->hostClientId, cbData->transactionId, cbData->success,
cbData->fragmentId);
};
FragmentedLoadInfoResponse response = {
.hostClientId = hostClientId,
.transactionId = transactionId,
.fragmentId = fragmentId,
.success = success,
};
constexpr size_t kInitialBufferSize = 48;
buildAndEnqueueMessage(PendingMessageType::LoadNanoappResponse,
kInitialBufferSize, msgBuilder, &response);
}
/**
* Sends a request to the host for a time sync message.
*/
void sendTimeSyncRequest() {
auto msgBuilder = [](ChreFlatBufferBuilder &builder, void *cookie) {
HostProtocolChre::encodeTimeSyncRequest(builder);
};
constexpr size_t kInitialSize = 52;
buildAndEnqueueMessage(PendingMessageType::TimeSyncRequest, kInitialSize,
msgBuilder, nullptr);
gLastTimeSyncRequestNanos = SystemTime::getMonotonicTime();
}
void setTimeSyncRequestTimer(Nanoseconds delay) {
static SystemTimer sTimeSyncRequestTimer;
static bool sTimeSyncRequestTimerInitialized = false;
// Check for timer init since this method might be called before CHRE
// init is called.
if (!sTimeSyncRequestTimerInitialized) {
if (!sTimeSyncRequestTimer.init()) {
FATAL_ERROR("Failed to initialize time sync request timer.");
} else {
sTimeSyncRequestTimerInitialized = true;
}
}
if (sTimeSyncRequestTimer.isActive()) {
sTimeSyncRequestTimer.cancel();
}
auto callback = [](void * /* data */) { sendTimeSyncRequest(); };
if (!sTimeSyncRequestTimer.set(callback, nullptr /* data */, delay)) {
LOGE("Failed to set time sync request timer.");
}
}
/**
* Helper function that prepares a nanoapp that can be loaded into the system
* from a file stored on disk.
*
* @param hostClientId the ID of client that originated this transaction
* @param transactionId the ID of the transaction
* @param appId the ID of the app to load
* @param appVersion the version of the app to load
* @param targetApiVersion the API version this nanoapp is targeted for
* @param appFilename Null-terminated ASCII string containing the file name that
* contains the app binary to be loaded.
*
* @return A valid pointer to a nanoapp that can be loaded into the system. A
* nullptr if the preparation process fails.
*/
UniquePtr<Nanoapp> handleLoadNanoappFile(uint16_t hostClientId,
uint32_t transactionId, uint64_t appId,
uint32_t appVersion,
uint32_t targetApiVersion,
const char *appFilename) {
LOGD("Load nanoapp request for app ID 0x%016" PRIx64 " ver 0x%" PRIx32
" target API 0x%08" PRIx32 " (txnId %" PRIu32 " client %" PRIu16 ")",
appId, appVersion, targetApiVersion, transactionId, hostClientId);
auto nanoapp = MakeUnique<Nanoapp>();
if (nanoapp.isNull()) {
LOG_OOM();
} else if (!nanoapp->setAppInfo(appId, appVersion, appFilename,
targetApiVersion) ||
!nanoapp->isLoaded()) {
nanoapp.reset(nullptr);
}
return nanoapp;
}
/**
* Helper function that prepares a nanoapp that can be loaded into the system
* from a buffer sent over in 1 or more fragments.
*
* @param hostClientId the ID of client that originated this transaction
* @param transactionId the ID of the transaction
* @param appId the ID of the app to load
* @param appVersion the version of the app to load
* @param appFlags The flags provided by the app being loaded
* @param targetApiVersion the API version this nanoapp is targeted for
* @param buffer the nanoapp binary data. May be only part of the nanoapp's
* binary if it's being sent over multiple fragments
* @param bufferLen the size of buffer in bytes
* @param fragmentId the identifier indicating which fragment is being loaded
* @param appBinaryLen the full size of the nanoapp binary to be loaded
*
* @return A valid pointer to a nanoapp that can be loaded into the system. A
* nullptr if the preparation process fails.
*/
UniquePtr<Nanoapp> handleLoadNanoappData(uint16_t hostClientId,
uint32_t transactionId, uint64_t appId,
uint32_t appVersion, uint32_t appFlags,
uint32_t targetApiVersion,
const void *buffer, size_t bufferLen,
uint32_t fragmentId,
size_t appBinaryLen) {
static NanoappLoadManager sLoadManager;
bool success = true;
if (fragmentId == 0 || fragmentId == 1) { // first fragment
size_t totalAppBinaryLen = (fragmentId == 0) ? bufferLen : appBinaryLen;
LOGD("Load nanoapp request for app ID 0x%016" PRIx64 " ver 0x%" PRIx32
" flags 0x%" PRIx32 " target API 0x%08" PRIx32
" size %zu (txnId %" PRIu32 " client %" PRIu16 ")",
appId, appVersion, appFlags, targetApiVersion, totalAppBinaryLen,
transactionId, hostClientId);
if (sLoadManager.hasPendingLoadTransaction()) {
FragmentedLoadInfo info = sLoadManager.getTransactionInfo();
sendFragmentResponse(info.hostClientId, info.transactionId,
0 /* fragmentId */, false /* success */);
sLoadManager.markFailure();
}
success = sLoadManager.prepareForLoad(hostClientId, transactionId, appId,
appVersion, appFlags,
totalAppBinaryLen, targetApiVersion);
}
success &= sLoadManager.copyNanoappFragment(
hostClientId, transactionId, (fragmentId == 0) ? 1 : fragmentId, buffer,
bufferLen);
UniquePtr<Nanoapp> nanoapp;
if (!sLoadManager.isLoadComplete()) {
sendFragmentResponse(hostClientId, transactionId, fragmentId, success);
} else {
nanoapp = sLoadManager.releaseNanoapp();
}
return nanoapp;
}
/**
* FastRPC method invoked by the host to block on messages
*
* @param buffer Output buffer to populate with message data
* @param bufferLen Size of the buffer, in bytes
* @param messageLen Output parameter to populate with the size of the message
* in bytes upon success
*
* @return 0 on success, nonzero on failure
*/
extern "C" int chre_slpi_get_message_to_host(unsigned char *buffer,
int bufferLen,
unsigned int *messageLen) {
CHRE_ASSERT(buffer != nullptr);
CHRE_ASSERT(bufferLen > 0);
CHRE_ASSERT(messageLen != nullptr);
int result = CHRE_FASTRPC_ERROR;
if (bufferLen <= 0 || buffer == nullptr || messageLen == nullptr) {
// Note that we can't use regular logs here as they can result in sending
// a message, leading to an infinite loop if the error is persistent
FARF(FATAL, "Invalid buffer size %d or bad pointers (buf %d len %d)",
bufferLen, (buffer == nullptr), (messageLen == nullptr));
} else {
size_t bufferSize = static_cast<size_t>(bufferLen);
PendingMessage pendingMsg = gOutboundQueue.pop();
switch (pendingMsg.type) {
case PendingMessageType::Shutdown:
result = CHRE_FASTRPC_ERROR_SHUTTING_DOWN;
break;
case PendingMessageType::NanoappMessageToHost:
result = generateMessageToHost(pendingMsg.data.msgToHost, buffer,
bufferSize, messageLen);
break;
case PendingMessageType::HubInfoResponse:
result = generateHubInfoResponse(pendingMsg.data.hostClientId, buffer,
bufferSize, messageLen);
break;
case PendingMessageType::NanoappListResponse:
case PendingMessageType::LoadNanoappResponse:
case PendingMessageType::UnloadNanoappResponse:
case PendingMessageType::DebugDumpData:
case PendingMessageType::DebugDumpResponse:
case PendingMessageType::TimeSyncRequest:
case PendingMessageType::LowPowerMicAccessRequest:
case PendingMessageType::LowPowerMicAccessRelease:
case PendingMessageType::EncodedLogMessage:
case PendingMessageType::SelfTestResponse:
result = generateMessageFromBuilder(
pendingMsg.data.builder, buffer, bufferSize, messageLen,
pendingMsg.type == PendingMessageType::EncodedLogMessage);
break;
default:
CHRE_ASSERT_LOG(false, "Unexpected pending message type");
}
}
// Opportunistically send a time sync message (1 hour period threshold)
constexpr Seconds kOpportunisticTimeSyncPeriod = Seconds(60 * 60 * 1);
if (SystemTime::getMonotonicTime() >
gLastTimeSyncRequestNanos + kOpportunisticTimeSyncPeriod) {
sendTimeSyncRequest();
}
return result;
}
/**
* FastRPC method invoked by the host to send a message to the system
*
* @param buffer
* @param size
*
* @return 0 on success, nonzero on failure
*/
extern "C" int chre_slpi_deliver_message_from_host(const unsigned char *message,
int messageLen) {
CHRE_ASSERT(message != nullptr);
CHRE_ASSERT(messageLen > 0);
int result = CHRE_FASTRPC_ERROR;
if (message == nullptr || messageLen <= 0) {
LOGE("Got null or invalid size (%d) message from host", messageLen);
} else if (!HostProtocolChre::decodeMessageFromHost(
message, static_cast<size_t>(messageLen))) {
LOGE("Failed to decode/handle message");
} else {
result = CHRE_FASTRPC_SUCCESS;
}
return result;
}
} // anonymous namespace
void sendDebugDumpResultToHost(uint16_t hostClientId, const char *debugStr,
size_t debugStrSize, bool complete,
uint32_t dataCount) {
if (debugStrSize > 0) {
sendDebugDumpData(hostClientId, debugStr, debugStrSize);
}
if (complete) {
sendDebugDumpResponse(hostClientId, true /*success*/, dataCount);
}
}
void HostLink::flushMessagesSentByNanoapp(uint64_t /*appId*/) {
// TODO: this is not completely safe since it's timer-based, but should work
// well enough for the initial implementation. To be fully safe, we'd need
// some synchronization with the thread that runs
// chre_slpi_get_message_to_host(), e.g. a mutex that is held by that thread
// prior to calling pop() and only released after onMessageToHostComplete
// would've been called. If we acquire that mutex here, and hold it while
// purging any messages sent by the nanoapp in the queue, we can be certain
// that onMessageToHostComplete will not be called after this function returns
// for messages sent by that nanoapp
flushOutboundQueue();
// One extra sleep to try to ensure that any messages popped just before
// checking empty() are fully processed before we return
constexpr time_timetick_type kFinalDelayUsec = 10000;
timer_sleep(kFinalDelayUsec, T_USEC, true /* non_deferrable */);
}
bool HostLink::sendMessage(const MessageToHost *message) {
return enqueueMessage(
PendingMessage(PendingMessageType::NanoappMessageToHost, message));
}
bool HostLinkBase::flushOutboundQueue() {
int waitCount = 5;
FARF(MEDIUM, "Draining message queue");
while (!gOutboundQueue.empty() && waitCount-- > 0) {
timer_sleep(kPollingIntervalUsec, T_USEC, true /* non_deferrable */);
}
return (waitCount >= 0);
}
void HostLinkBase::sendLogMessage(const uint8_t *logMessage,
size_t logMessageSize) {
struct LogMessageData {
const uint8_t *logMsg;
size_t logMsgSize;
};
LogMessageData logMessageData;
logMessageData.logMsg = logMessage;
logMessageData.logMsgSize = logMessageSize;
auto msgBuilder = [](ChreFlatBufferBuilder &builder, void *cookie) {
const auto *data = static_cast<const LogMessageData *>(cookie);
HostProtocolChre::encodeLogMessages(builder, data->logMsg,
data->logMsgSize);
};
constexpr size_t kInitialSize = 128;
buildAndEnqueueMessage(PendingMessageType::EncodedLogMessage, kInitialSize,
msgBuilder, &logMessageData);
}
void HostLinkBase::sendLogMessageV2(const uint8_t *logMessage,
size_t logMessageSize,
uint32_t numLogsDropped) {
struct LogMessageData {
const uint8_t *logMsg;
size_t logMsgSize;
uint32_t numLogsDropped;
};
LogMessageData logMessageData{logMessage, logMessageSize, numLogsDropped};
auto msgBuilder = [](ChreFlatBufferBuilder &builder, void *cookie) {
const auto *data = static_cast<const LogMessageData *>(cookie);
HostProtocolChre::encodeLogMessagesV2(
builder, data->logMsg, data->logMsgSize, data->numLogsDropped);
};
constexpr size_t kInitialSize = 128;
buildAndEnqueueMessage(PendingMessageType::EncodedLogMessage, kInitialSize,
msgBuilder, &logMessageData);
}
void HostLinkBase::shutdown() {
// Push a null message so the blocking call in chre_slpi_get_message_to_host()
// returns and the host can exit cleanly. If the queue is full, try again to
// avoid getting stuck (no other new messages should be entering the queue at
// this time). Don't wait too long as the host-side binary may have died in
// a state where it's not blocked in chre_slpi_get_message_to_host().
int retryCount = 5;
FARF(MEDIUM, "Shutting down host link");
while (!enqueueMessage(PendingMessage(PendingMessageType::Shutdown)) &&
--retryCount > 0) {
timer_sleep(kPollingIntervalUsec, T_USEC, true /* non_deferrable */);
}
if (retryCount <= 0) {
// Don't use LOGE, as it may involve trying to send a message
FARF(ERROR,
"No room in outbound queue for shutdown message and host not "
"draining queue!");
} else {
// We were able to push the shutdown message. Wait for the queue to
// completely flush before returning.
if (!flushOutboundQueue()) {
FARF(ERROR, "Host took too long to drain outbound queue; exiting anyway");
} else {
FARF(MEDIUM, "Finished draining queue");
}
}
}
void sendAudioRequest() {
auto msgBuilder = [](ChreFlatBufferBuilder &builder, void *cookie) {
HostProtocolChre::encodeLowPowerMicAccessRequest(builder);
};
constexpr size_t kInitialSize = 32;
buildAndEnqueueMessage(PendingMessageType::LowPowerMicAccessRequest,
kInitialSize, msgBuilder, nullptr);
}
void sendAudioRelease() {
auto msgBuilder = [](ChreFlatBufferBuilder &builder, void *cookie) {
HostProtocolChre::encodeLowPowerMicAccessRelease(builder);
};
constexpr size_t kInitialSize = 32;
buildAndEnqueueMessage(PendingMessageType::LowPowerMicAccessRelease,
kInitialSize, msgBuilder, nullptr);
}
void HostMessageHandlers::handleNanoappMessage(uint64_t appId,
uint32_t messageType,
uint16_t hostEndpoint,
const void *messageData,
size_t messageDataLen) {
LOGD("Parsed nanoapp message from host: app ID 0x%016" PRIx64
", endpoint "
"0x%" PRIx16 ", msgType %" PRIu32 ", payload size %zu",
appId, hostEndpoint, messageType, messageDataLen);
HostCommsManager &manager =
EventLoopManagerSingleton::get()->getHostCommsManager();
manager.sendMessageToNanoappFromHost(appId, messageType, hostEndpoint,
messageData, messageDataLen);
}
void HostMessageHandlers::handleHubInfoRequest(uint16_t hostClientId) {
// We generate the response in the context of chre_slpi_get_message_to_host
LOGD("Hub info request from client ID %" PRIu16, hostClientId);
enqueueMessage(
PendingMessage(PendingMessageType::HubInfoResponse, hostClientId));
}
void HostMessageHandlers::handleNanoappListRequest(uint16_t hostClientId) {
auto callback = [](uint16_t /*type*/, void *data, void * /*extraData*/) {
uint16_t cbHostClientId = NestedDataPtr<uint16_t>(data);
NanoappListData cbData = {};
cbData.hostClientId = cbHostClientId;
size_t expectedNanoappCount =
EventLoopManagerSingleton::get()->getEventLoop().getNanoappCount();
if (!cbData.nanoappEntries.reserve(expectedNanoappCount)) {
LOG_OOM();
} else {
constexpr size_t kFixedOverhead = 48;
constexpr size_t kPerNanoappSize = 32;
size_t initialBufferSize =
(kFixedOverhead + expectedNanoappCount * kPerNanoappSize);
buildAndEnqueueMessage(PendingMessageType::NanoappListResponse,
initialBufferSize, buildNanoappListResponse,
&cbData);
}
};
LOGD("Nanoapp list request from client ID %" PRIu16, hostClientId);
EventLoopManagerSingleton::get()->deferCallback(
SystemCallbackType::NanoappListResponse,
NestedDataPtr<uint16_t>(hostClientId), callback);
}
void HostMessageHandlers::handleLoadNanoappRequest(
uint16_t hostClientId, uint32_t transactionId, uint64_t appId,
uint32_t appVersion, uint32_t appFlags, uint32_t targetApiVersion,
const void *buffer, size_t bufferLen, const char *appFileName,
uint32_t fragmentId, size_t appBinaryLen, bool respondBeforeStart) {
UniquePtr<Nanoapp> pendingNanoapp;
if (appFileName != nullptr) {
pendingNanoapp =
handleLoadNanoappFile(hostClientId, transactionId, appId, appVersion,
targetApiVersion, appFileName);
} else {
pendingNanoapp = handleLoadNanoappData(
hostClientId, transactionId, appId, appVersion, appFlags,
targetApiVersion, buffer, bufferLen, fragmentId, appBinaryLen);
}
if (!pendingNanoapp.isNull()) {
auto cbData = MakeUnique<LoadNanoappCallbackData>();
if (cbData.isNull()) {
LOG_OOM();
} else {
cbData->transactionId = transactionId;
cbData->hostClientId = hostClientId;
cbData->appId = appId;
cbData->fragmentId = fragmentId;
cbData->nanoapp = std::move(pendingNanoapp);
// Note that if this fails, we'll generate the error response in
// the normal deferred callback
EventLoopManagerSingleton::get()->deferCallback(
SystemCallbackType::FinishLoadingNanoapp, std::move(cbData),
finishLoadingNanoappCallback);
}
}
}
void HostMessageHandlers::handleUnloadNanoappRequest(
uint16_t hostClientId, uint32_t transactionId, uint64_t appId,
bool allowSystemNanoappUnload) {
LOGD("Unload nanoapp request (txnID %" PRIu32 ") for appId 0x%016" PRIx64
" system %d",
transactionId, appId, allowSystemNanoappUnload);
auto cbData = MakeUnique<UnloadNanoappCallbackData>();
if (cbData == nullptr) {
LOG_OOM();
} else {
cbData->appId = appId;
cbData->transactionId = transactionId;
cbData->hostClientId = hostClientId;
cbData->allowSystemNanoappUnload = allowSystemNanoappUnload;
EventLoopManagerSingleton::get()->deferCallback(
SystemCallbackType::HandleUnloadNanoapp, std::move(cbData),
handleUnloadNanoappCallback);
}
}
void HostMessageHandlers::handleTimeSyncMessage(int64_t offset) {
setEstimatedHostTimeOffset(offset);
// Schedule a time sync request since offset may drift
constexpr Seconds kClockDriftTimeSyncPeriod =
Seconds(60 * 60 * 6); // 6 hours
setTimeSyncRequestTimer(kClockDriftTimeSyncPeriod);
}
void HostMessageHandlers::handleDebugDumpRequest(uint16_t hostClientId) {
if (!chre::EventLoopManagerSingleton::get()
->getDebugDumpManager()
.onDebugDumpRequested(hostClientId)) {
LOGE("Couldn't trigger debug dump process");
sendDebugDumpResponse(hostClientId, false /*success*/, 0 /*dataCount*/);
}
}
void HostMessageHandlers::handleSettingChangeMessage(fbs::Setting setting,
fbs::SettingState state) {
Setting chreSetting;
SettingState chreSettingState;
if (HostProtocolChre::getSettingFromFbs(setting, &chreSetting) &&
HostProtocolChre::getSettingStateFromFbs(state, &chreSettingState)) {
postSettingChange(chreSetting, chreSettingState);
}
}
void HostMessageHandlers::handleSelfTestRequest(uint16_t hostClientId) {
// TODO(b/182201569): Run test
bool success = true;
sendSelfTestResponse(hostClientId, success);
}
} // namespace chre