/* * Copyright (C) 2016 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package android.hardware.location; import java.io.FileDescriptor; import java.io.PrintWriter; import java.nio.ByteBuffer; import java.nio.ByteOrder; import java.util.ArrayList; import java.util.HashMap; import android.Manifest; import android.content.Context; import android.content.pm.PackageManager; import android.os.RemoteCallbackList; import android.os.RemoteException; import android.os.ServiceManager; import android.service.vr.IVrManager; import android.service.vr.IVrStateCallbacks; import android.util.Log; import java.io.FileDescriptor; import java.io.PrintWriter; import java.util.ArrayList; import java.util.concurrent.ConcurrentHashMap; /** * @hide */ public class ContextHubService extends IContextHubService.Stub { public static final String CONTEXTHUB_SERVICE = "contexthub_service"; private static final String TAG = "ContextHubService"; private static final String HARDWARE_PERMISSION = Manifest.permission.LOCATION_HARDWARE; private static final String ENFORCE_HW_PERMISSION_MESSAGE = "Permission '" + HARDWARE_PERMISSION + "' not granted to access ContextHub Hardware"; public static final int ANY_HUB = -1; public static final int MSG_LOAD_NANO_APP = 3; public static final int MSG_UNLOAD_NANO_APP = 4; private static final String PRE_LOADED_GENERIC_UNKNOWN = "Preloaded app, unknown"; private static final String PRE_LOADED_APP_NAME = PRE_LOADED_GENERIC_UNKNOWN; private static final String PRE_LOADED_APP_PUBLISHER = PRE_LOADED_GENERIC_UNKNOWN; private static final int PRE_LOADED_APP_MEM_REQ = 0; private static final int MSG_HEADER_SIZE = 4; private static final int HEADER_FIELD_MSG_TYPE = 0; private static final int HEADER_FIELD_MSG_VERSION = 1; private static final int HEADER_FIELD_HUB_HANDLE = 2; private static final int HEADER_FIELD_APP_INSTANCE = 3; private static final int HEADER_FIELD_LOAD_APP_ID_LO = MSG_HEADER_SIZE; private static final int HEADER_FIELD_LOAD_APP_ID_HI = MSG_HEADER_SIZE + 1; private static final int MSG_LOAD_APP_HEADER_SIZE = MSG_HEADER_SIZE + 2; private static final int OS_APP_INSTANCE = -1; private static final long APP_ID_ACTIVITY_RECOGNITION = 0x476f6f676c001000L; private final Context mContext; private final ConcurrentHashMap<Integer, NanoAppInstanceInfo> mNanoAppHash = new ConcurrentHashMap<>(); private final ContextHubInfo[] mContextHubInfo; private final RemoteCallbackList<IContextHubCallback> mCallbacksList = new RemoteCallbackList<>(); private native int nativeSendMessage(int[] header, byte[] data); private native ContextHubInfo[] nativeInitialize(); private final IVrStateCallbacks mVrStateCallbacks = new IVrStateCallbacks.Stub() { @Override public void onVrStateChanged(boolean enabled) { for (NanoAppInstanceInfo app : mNanoAppHash.values()) { if (app.getAppId() == APP_ID_ACTIVITY_RECOGNITION) { sendVrStateChangeMessageToApp(app, enabled); break; } } } }; public ContextHubService(Context context) { mContext = context; mContextHubInfo = nativeInitialize(); for (int i = 0; i < mContextHubInfo.length; i++) { Log.d(TAG, "ContextHub[" + i + "] id: " + mContextHubInfo[i].getId() + ", name: " + mContextHubInfo[i].getName()); } if (context.getPackageManager().hasSystemFeature(PackageManager.FEATURE_VR_MODE)) { IVrManager vrManager = IVrManager.Stub.asInterface(ServiceManager.getService("vrmanager")); if (vrManager != null) { try { vrManager.registerListener(mVrStateCallbacks); } catch (RemoteException e) { Log.e(TAG, "VR state listener registration failed", e); } } } } @Override public int registerCallback(IContextHubCallback callback) throws RemoteException { checkPermissions(); mCallbacksList.register(callback); return 0; } @Override public int[] getContextHubHandles() throws RemoteException { checkPermissions(); int[] returnArray = new int[mContextHubInfo.length]; for (int i = 0; i < returnArray.length; ++i) { returnArray[i] = i; Log.d(TAG, String.format("Hub %s is mapped to %d", mContextHubInfo[i].getName(), returnArray[i])); } return returnArray; } @Override public ContextHubInfo getContextHubInfo(int contextHubHandle) throws RemoteException { checkPermissions(); if (!(contextHubHandle >= 0 && contextHubHandle < mContextHubInfo.length)) { return null; // null means fail } return mContextHubInfo[contextHubHandle]; } // TODO(b/30808791): Remove this when NanoApp's API is correctly treating // app IDs as 64-bits. private static long parseAppId(NanoApp app) { // NOTE: If this shifting seems odd (since it's actually "ONAN"), note // that it matches how this is defined in context_hub.h. final int HEADER_MAGIC = (((int)'N' << 0) | ((int)'A' << 8) | ((int)'N' << 16) | ((int)'O' << 24)); final int HEADER_MAGIC_OFFSET = 4; final int HEADER_APP_ID_OFFSET = 8; ByteBuffer header = ByteBuffer.wrap(app.getAppBinary()) .order(ByteOrder.LITTLE_ENDIAN); try { if (header.getInt(HEADER_MAGIC_OFFSET) == HEADER_MAGIC) { // This is a legitimate nanoapp header. Let's grab the app ID. return header.getLong(HEADER_APP_ID_OFFSET); } } catch (IndexOutOfBoundsException e) { // The header is undersized. We'll fall through to our code // path below, which handles being unable to parse the header. } // We failed to parse the header. Even through it's probably wrong, // let's give NanoApp's idea of our ID. This is at least consistent. return app.getAppId(); } @Override public int loadNanoApp(int contextHubHandle, NanoApp app) throws RemoteException { checkPermissions(); if (!(contextHubHandle >= 0 && contextHubHandle < mContextHubInfo.length)) { Log.e(TAG, "Invalid contextHubhandle " + contextHubHandle); return -1; } int[] msgHeader = new int[MSG_LOAD_APP_HEADER_SIZE]; msgHeader[HEADER_FIELD_HUB_HANDLE] = contextHubHandle; msgHeader[HEADER_FIELD_APP_INSTANCE] = OS_APP_INSTANCE; msgHeader[HEADER_FIELD_MSG_VERSION] = 0; msgHeader[HEADER_FIELD_MSG_TYPE] = MSG_LOAD_NANO_APP; long appId = app.getAppId(); // TODO(b/30808791): Remove this hack when the NanoApp API is fixed, // and getAppId() returns a 'long' instead of an 'int'. if ((appId >> 32) != 0) { // We're unlikely to notice this warning, but at least // we can avoid running our hack logic. Log.w(TAG, "Code has not been updated since API fix."); } else { appId = parseAppId(app); } msgHeader[HEADER_FIELD_LOAD_APP_ID_LO] = (int)(appId & 0xFFFFFFFF); msgHeader[HEADER_FIELD_LOAD_APP_ID_HI] = (int)((appId >> 32) & 0xFFFFFFFF); int errVal = nativeSendMessage(msgHeader, app.getAppBinary()); if (errVal != 0) { Log.e(TAG, "Send Message returns error" + contextHubHandle); return -1; } // Do not add an entry to mNanoAppInstance Hash yet. The HAL may reject the app return 0; } @Override public int unloadNanoApp(int nanoAppInstanceHandle) throws RemoteException { checkPermissions(); NanoAppInstanceInfo info = mNanoAppHash.get(nanoAppInstanceHandle); if (info == null) { return -1; //means failed } // Call Native interface here int[] msgHeader = new int[MSG_HEADER_SIZE]; msgHeader[HEADER_FIELD_HUB_HANDLE] = ANY_HUB; msgHeader[HEADER_FIELD_APP_INSTANCE] = nanoAppInstanceHandle; msgHeader[HEADER_FIELD_MSG_VERSION] = 0; msgHeader[HEADER_FIELD_MSG_TYPE] = MSG_UNLOAD_NANO_APP; byte msg[] = new byte[0]; if (nativeSendMessage(msgHeader, msg) != 0) { return -1; } // Do not add an entry to mNanoAppInstance Hash yet. The HAL may reject the app return 0; } @Override public NanoAppInstanceInfo getNanoAppInstanceInfo(int nanoAppInstanceHandle) throws RemoteException { checkPermissions(); // This assumes that all the nanoAppInfo is current. This is reasonable // for the use cases for tightly controlled nanoApps. if (mNanoAppHash.containsKey(nanoAppInstanceHandle)) { return mNanoAppHash.get(nanoAppInstanceHandle); } else { return null; } } @Override public int[] findNanoAppOnHub(int hubHandle, NanoAppFilter filter) throws RemoteException { checkPermissions(); ArrayList<Integer> foundInstances = new ArrayList<Integer>(); for (Integer nanoAppInstance: mNanoAppHash.keySet()) { NanoAppInstanceInfo info = mNanoAppHash.get(nanoAppInstance); if (filter.testMatch(info)) { foundInstances.add(nanoAppInstance); } } int[] retArray = new int[foundInstances.size()]; for (int i = 0; i < foundInstances.size(); i++) { retArray[i] = foundInstances.get(i).intValue(); } return retArray; } @Override public int sendMessage(int hubHandle, int nanoAppHandle, ContextHubMessage msg) throws RemoteException { checkPermissions(); int[] msgHeader = new int[MSG_HEADER_SIZE]; msgHeader[HEADER_FIELD_HUB_HANDLE] = hubHandle; msgHeader[HEADER_FIELD_APP_INSTANCE] = nanoAppHandle; msgHeader[HEADER_FIELD_MSG_VERSION] = msg.getVersion(); msgHeader[HEADER_FIELD_MSG_TYPE] = msg.getMsgType(); return nativeSendMessage(msgHeader, msg.getData()); } @Override protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) { if (mContext.checkCallingOrSelfPermission("android.permission.DUMP") != PackageManager.PERMISSION_GRANTED) { pw.println("Permission Denial: can't dump contexthub_service"); return; } pw.println("Dumping ContextHub Service"); pw.println(""); // dump ContextHubInfo pw.println("=================== CONTEXT HUBS ===================="); for (int i = 0; i < mContextHubInfo.length; i++) { pw.println("Handle " + i + " : " + mContextHubInfo[i].toString()); } pw.println(""); pw.println("=================== NANOAPPS ===================="); // Dump nanoAppHash for (Integer nanoAppInstance: mNanoAppHash.keySet()) { pw.println(nanoAppInstance + " : " + mNanoAppHash.get(nanoAppInstance).toString()); } // dump eventLog } private void checkPermissions() { mContext.enforceCallingPermission(HARDWARE_PERMISSION, ENFORCE_HW_PERMISSION_MESSAGE); } private int onMessageReceipt(int[] header, byte[] data) { if (header == null || data == null || header.length < MSG_HEADER_SIZE) { return -1; } int callbacksCount = mCallbacksList.beginBroadcast(); if (callbacksCount < 1) { Log.v(TAG, "No message callbacks registered."); return 0; } ContextHubMessage msg = new ContextHubMessage(header[HEADER_FIELD_MSG_TYPE], header[HEADER_FIELD_MSG_VERSION], data); for (int i = 0; i < callbacksCount; ++i) { IContextHubCallback callback = mCallbacksList.getBroadcastItem(i); try { callback.onMessageReceipt( header[HEADER_FIELD_HUB_HANDLE], header[HEADER_FIELD_APP_INSTANCE], msg); } catch (RemoteException e) { Log.i(TAG, "Exception (" + e + ") calling remote callback (" + callback + ")."); continue; } } mCallbacksList.finishBroadcast(); return 0; } private int addAppInstance(int hubHandle, int appInstanceHandle, long appId, int appVersion) { // App Id encodes vendor & version NanoAppInstanceInfo appInfo = new NanoAppInstanceInfo(); appInfo.setAppId(appId); appInfo.setAppVersion(appVersion); appInfo.setName(PRE_LOADED_APP_NAME); appInfo.setContexthubId(hubHandle); appInfo.setHandle(appInstanceHandle); appInfo.setPublisher(PRE_LOADED_APP_PUBLISHER); appInfo.setNeededExecMemBytes(PRE_LOADED_APP_MEM_REQ); appInfo.setNeededReadMemBytes(PRE_LOADED_APP_MEM_REQ); appInfo.setNeededWriteMemBytes(PRE_LOADED_APP_MEM_REQ); String action; if (mNanoAppHash.containsKey(appInstanceHandle)) { action = "Updated"; } else { action = "Added"; } mNanoAppHash.put(appInstanceHandle, appInfo); Log.d(TAG, action + " app instance " + appInstanceHandle + " with id " + appId + " version " + appVersion); return 0; } private int deleteAppInstance(int appInstanceHandle) { if (mNanoAppHash.remove(appInstanceHandle) == null) { return -1; } return 0; } private void sendVrStateChangeMessageToApp(NanoAppInstanceInfo app, boolean vrModeEnabled) { int[] msgHeader = new int[MSG_HEADER_SIZE]; msgHeader[HEADER_FIELD_MSG_TYPE] = 0; msgHeader[HEADER_FIELD_MSG_VERSION] = 0; msgHeader[HEADER_FIELD_HUB_HANDLE] = ANY_HUB; msgHeader[HEADER_FIELD_APP_INSTANCE] = app.getHandle(); byte[] data = new byte[1]; data[0] = (byte) ((vrModeEnabled) ? 1 : 0); int ret = nativeSendMessage(msgHeader, data); if (ret != 0) { Log.e(TAG, "Couldn't send VR state change notification (" + ret + ")!"); } } }