1 /* 2 * Copyright (C) 2008 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 #define LOG_TAG "CameraService" 18 //#define LOG_NDEBUG 0 19 20 #include <stdio.h> 21 #include <string.h> 22 #include <sys/types.h> 23 #include <pthread.h> 24 25 #include <binder/AppOpsManager.h> 26 #include <binder/IPCThreadState.h> 27 #include <binder/IServiceManager.h> 28 #include <binder/MemoryBase.h> 29 #include <binder/MemoryHeapBase.h> 30 #include <cutils/atomic.h> 31 #include <cutils/properties.h> 32 #include <gui/Surface.h> 33 #include <hardware/hardware.h> 34 #include <media/AudioSystem.h> 35 #include <media/IMediaHTTPService.h> 36 #include <media/mediaplayer.h> 37 #include <utils/Errors.h> 38 #include <utils/Log.h> 39 #include <utils/String16.h> 40 #include <utils/Trace.h> 41 #include <system/camera_vendor_tags.h> 42 #include <system/camera_metadata.h> 43 #include <system/camera.h> 44 45 #include "CameraService.h" 46 #include "api1/CameraClient.h" 47 #include "api1/Camera2Client.h" 48 #include "api_pro/ProCamera2Client.h" 49 #include "api2/CameraDeviceClient.h" 50 #include "utils/CameraTraces.h" 51 #include "CameraDeviceFactory.h" 52 53 namespace android { 54 55 // ---------------------------------------------------------------------------- 56 // Logging support -- this is for debugging only 57 // Use "adb shell dumpsys media.camera -v 1" to change it. 58 volatile int32_t gLogLevel = 0; 59 60 #define LOG1(...) ALOGD_IF(gLogLevel >= 1, __VA_ARGS__); 61 #define LOG2(...) ALOGD_IF(gLogLevel >= 2, __VA_ARGS__); 62 63 static void setLogLevel(int level) { 64 android_atomic_write(level, &gLogLevel); 65 } 66 67 // ---------------------------------------------------------------------------- 68 69 static int getCallingPid() { 70 return IPCThreadState::self()->getCallingPid(); 71 } 72 73 static int getCallingUid() { 74 return IPCThreadState::self()->getCallingUid(); 75 } 76 77 extern "C" { 78 static void camera_device_status_change( 79 const struct camera_module_callbacks* callbacks, 80 int camera_id, 81 int new_status) { 82 sp<CameraService> cs = const_cast<CameraService*>( 83 static_cast<const CameraService*>(callbacks)); 84 85 cs->onDeviceStatusChanged( 86 camera_id, 87 new_status); 88 } 89 } // extern "C" 90 91 // ---------------------------------------------------------------------------- 92 93 // This is ugly and only safe if we never re-create the CameraService, but 94 // should be ok for now. 95 static CameraService *gCameraService; 96 97 CameraService::CameraService() 98 :mSoundRef(0), mModule(0) 99 { 100 ALOGI("CameraService started (pid=%d)", getpid()); 101 gCameraService = this; 102 103 for (size_t i = 0; i < MAX_CAMERAS; ++i) { 104 mStatusList[i] = ICameraServiceListener::STATUS_PRESENT; 105 } 106 107 this->camera_device_status_change = android::camera_device_status_change; 108 } 109 110 void CameraService::onFirstRef() 111 { 112 LOG1("CameraService::onFirstRef"); 113 114 BnCameraService::onFirstRef(); 115 116 if (hw_get_module(CAMERA_HARDWARE_MODULE_ID, 117 (const hw_module_t **)&mModule) < 0) { 118 ALOGE("Could not load camera HAL module"); 119 mNumberOfCameras = 0; 120 } 121 else { 122 ALOGI("Loaded \"%s\" camera module", mModule->common.name); 123 mNumberOfCameras = mModule->get_number_of_cameras(); 124 if (mNumberOfCameras > MAX_CAMERAS) { 125 ALOGE("Number of cameras(%d) > MAX_CAMERAS(%d).", 126 mNumberOfCameras, MAX_CAMERAS); 127 mNumberOfCameras = MAX_CAMERAS; 128 } 129 for (int i = 0; i < mNumberOfCameras; i++) { 130 setCameraFree(i); 131 } 132 133 if (mModule->common.module_api_version >= 134 CAMERA_MODULE_API_VERSION_2_1) { 135 mModule->set_callbacks(this); 136 } 137 138 VendorTagDescriptor::clearGlobalVendorTagDescriptor(); 139 140 if (mModule->common.module_api_version >= CAMERA_MODULE_API_VERSION_2_2) { 141 setUpVendorTags(); 142 } 143 144 CameraDeviceFactory::registerService(this); 145 } 146 } 147 148 CameraService::~CameraService() { 149 for (int i = 0; i < mNumberOfCameras; i++) { 150 if (mBusy[i]) { 151 ALOGE("camera %d is still in use in destructor!", i); 152 } 153 } 154 155 VendorTagDescriptor::clearGlobalVendorTagDescriptor(); 156 gCameraService = NULL; 157 } 158 159 void CameraService::onDeviceStatusChanged(int cameraId, 160 int newStatus) 161 { 162 ALOGI("%s: Status changed for cameraId=%d, newStatus=%d", __FUNCTION__, 163 cameraId, newStatus); 164 165 if (cameraId < 0 || cameraId >= MAX_CAMERAS) { 166 ALOGE("%s: Bad camera ID %d", __FUNCTION__, cameraId); 167 return; 168 } 169 170 if ((int)getStatus(cameraId) == newStatus) { 171 ALOGE("%s: State transition to the same status 0x%x not allowed", 172 __FUNCTION__, (uint32_t)newStatus); 173 return; 174 } 175 176 /* don't do this in updateStatus 177 since it is also called from connect and we could get into a deadlock */ 178 if (newStatus == CAMERA_DEVICE_STATUS_NOT_PRESENT) { 179 Vector<sp<BasicClient> > clientsToDisconnect; 180 { 181 Mutex::Autolock al(mServiceLock); 182 183 /* Remove cached parameters from shim cache */ 184 mShimParams.removeItem(cameraId); 185 186 /* Find all clients that we need to disconnect */ 187 sp<BasicClient> client = mClient[cameraId].promote(); 188 if (client.get() != NULL) { 189 clientsToDisconnect.push_back(client); 190 } 191 192 int i = cameraId; 193 for (size_t j = 0; j < mProClientList[i].size(); ++j) { 194 sp<ProClient> cl = mProClientList[i][j].promote(); 195 if (cl != NULL) { 196 clientsToDisconnect.push_back(cl); 197 } 198 } 199 } 200 201 /* now disconnect them. don't hold the lock 202 or we can get into a deadlock */ 203 204 for (size_t i = 0; i < clientsToDisconnect.size(); ++i) { 205 sp<BasicClient> client = clientsToDisconnect[i]; 206 207 client->disconnect(); 208 /** 209 * The remote app will no longer be able to call methods on the 210 * client since the client PID will be reset to 0 211 */ 212 } 213 214 ALOGV("%s: After unplug, disconnected %zu clients", 215 __FUNCTION__, clientsToDisconnect.size()); 216 } 217 218 updateStatus( 219 static_cast<ICameraServiceListener::Status>(newStatus), cameraId); 220 221 } 222 223 int32_t CameraService::getNumberOfCameras() { 224 return mNumberOfCameras; 225 } 226 227 status_t CameraService::getCameraInfo(int cameraId, 228 struct CameraInfo* cameraInfo) { 229 if (!mModule) { 230 return -ENODEV; 231 } 232 233 if (cameraId < 0 || cameraId >= mNumberOfCameras) { 234 return BAD_VALUE; 235 } 236 237 struct camera_info info; 238 status_t rc = filterGetInfoErrorCode( 239 mModule->get_camera_info(cameraId, &info)); 240 cameraInfo->facing = info.facing; 241 cameraInfo->orientation = info.orientation; 242 return rc; 243 } 244 245 246 status_t CameraService::generateShimMetadata(int cameraId, /*out*/CameraMetadata* cameraInfo) { 247 status_t ret = OK; 248 struct CameraInfo info; 249 if ((ret = getCameraInfo(cameraId, &info)) != OK) { 250 return ret; 251 } 252 253 CameraMetadata shimInfo; 254 int32_t orientation = static_cast<int32_t>(info.orientation); 255 if ((ret = shimInfo.update(ANDROID_SENSOR_ORIENTATION, &orientation, 1)) != OK) { 256 return ret; 257 } 258 259 uint8_t facing = (info.facing == CAMERA_FACING_FRONT) ? 260 ANDROID_LENS_FACING_FRONT : ANDROID_LENS_FACING_BACK; 261 if ((ret = shimInfo.update(ANDROID_LENS_FACING, &facing, 1)) != OK) { 262 return ret; 263 } 264 265 CameraParameters shimParams; 266 if ((ret = getLegacyParametersLazy(cameraId, /*out*/&shimParams)) != OK) { 267 // Error logged by callee 268 return ret; 269 } 270 271 Vector<Size> sizes; 272 Vector<Size> jpegSizes; 273 Vector<int32_t> formats; 274 const char* supportedPreviewFormats; 275 { 276 shimParams.getSupportedPreviewSizes(/*out*/sizes); 277 shimParams.getSupportedPreviewFormats(/*out*/formats); 278 shimParams.getSupportedPictureSizes(/*out*/jpegSizes); 279 } 280 281 // Always include IMPLEMENTATION_DEFINED 282 formats.add(HAL_PIXEL_FORMAT_IMPLEMENTATION_DEFINED); 283 284 const size_t INTS_PER_CONFIG = 4; 285 286 // Build available stream configurations metadata 287 size_t streamConfigSize = (sizes.size() * formats.size() + jpegSizes.size()) * INTS_PER_CONFIG; 288 289 Vector<int32_t> streamConfigs; 290 streamConfigs.setCapacity(streamConfigSize); 291 292 for (size_t i = 0; i < formats.size(); ++i) { 293 for (size_t j = 0; j < sizes.size(); ++j) { 294 streamConfigs.add(formats[i]); 295 streamConfigs.add(sizes[j].width); 296 streamConfigs.add(sizes[j].height); 297 streamConfigs.add(ANDROID_SCALER_AVAILABLE_STREAM_CONFIGURATIONS_OUTPUT); 298 } 299 } 300 301 for (size_t i = 0; i < jpegSizes.size(); ++i) { 302 streamConfigs.add(HAL_PIXEL_FORMAT_BLOB); 303 streamConfigs.add(jpegSizes[i].width); 304 streamConfigs.add(jpegSizes[i].height); 305 streamConfigs.add(ANDROID_SCALER_AVAILABLE_STREAM_CONFIGURATIONS_OUTPUT); 306 } 307 308 if ((ret = shimInfo.update(ANDROID_SCALER_AVAILABLE_STREAM_CONFIGURATIONS, 309 streamConfigs.array(), streamConfigSize)) != OK) { 310 return ret; 311 } 312 313 int64_t fakeMinFrames[0]; 314 // TODO: Fixme, don't fake min frame durations. 315 if ((ret = shimInfo.update(ANDROID_SCALER_AVAILABLE_MIN_FRAME_DURATIONS, 316 fakeMinFrames, 0)) != OK) { 317 return ret; 318 } 319 320 int64_t fakeStalls[0]; 321 // TODO: Fixme, don't fake stall durations. 322 if ((ret = shimInfo.update(ANDROID_SCALER_AVAILABLE_STALL_DURATIONS, 323 fakeStalls, 0)) != OK) { 324 return ret; 325 } 326 327 *cameraInfo = shimInfo; 328 return OK; 329 } 330 331 status_t CameraService::getCameraCharacteristics(int cameraId, 332 CameraMetadata* cameraInfo) { 333 if (!cameraInfo) { 334 ALOGE("%s: cameraInfo is NULL", __FUNCTION__); 335 return BAD_VALUE; 336 } 337 338 if (!mModule) { 339 ALOGE("%s: camera hardware module doesn't exist", __FUNCTION__); 340 return -ENODEV; 341 } 342 343 if (cameraId < 0 || cameraId >= mNumberOfCameras) { 344 ALOGE("%s: Invalid camera id: %d", __FUNCTION__, cameraId); 345 return BAD_VALUE; 346 } 347 348 int facing; 349 status_t ret = OK; 350 if (mModule->common.module_api_version < CAMERA_MODULE_API_VERSION_2_0 || 351 getDeviceVersion(cameraId, &facing) <= CAMERA_DEVICE_API_VERSION_2_1 ) { 352 /** 353 * Backwards compatibility mode for old HALs: 354 * - Convert CameraInfo into static CameraMetadata properties. 355 * - Retrieve cached CameraParameters for this camera. If none exist, 356 * attempt to open CameraClient and retrieve the CameraParameters. 357 * - Convert cached CameraParameters into static CameraMetadata 358 * properties. 359 */ 360 ALOGI("%s: Switching to HAL1 shim implementation...", __FUNCTION__); 361 362 if ((ret = generateShimMetadata(cameraId, cameraInfo)) != OK) { 363 return ret; 364 } 365 366 } else { 367 /** 368 * Normal HAL 2.1+ codepath. 369 */ 370 struct camera_info info; 371 ret = filterGetInfoErrorCode(mModule->get_camera_info(cameraId, &info)); 372 *cameraInfo = info.static_camera_characteristics; 373 } 374 375 return ret; 376 } 377 378 status_t CameraService::getCameraVendorTagDescriptor(/*out*/sp<VendorTagDescriptor>& desc) { 379 if (!mModule) { 380 ALOGE("%s: camera hardware module doesn't exist", __FUNCTION__); 381 return -ENODEV; 382 } 383 384 desc = VendorTagDescriptor::getGlobalVendorTagDescriptor(); 385 return OK; 386 } 387 388 int CameraService::getDeviceVersion(int cameraId, int* facing) { 389 struct camera_info info; 390 if (mModule->get_camera_info(cameraId, &info) != OK) { 391 return -1; 392 } 393 394 int deviceVersion; 395 if (mModule->common.module_api_version >= CAMERA_MODULE_API_VERSION_2_0) { 396 deviceVersion = info.device_version; 397 } else { 398 deviceVersion = CAMERA_DEVICE_API_VERSION_1_0; 399 } 400 401 if (facing) { 402 *facing = info.facing; 403 } 404 405 return deviceVersion; 406 } 407 408 status_t CameraService::filterOpenErrorCode(status_t err) { 409 switch(err) { 410 case NO_ERROR: 411 case -EBUSY: 412 case -EINVAL: 413 case -EUSERS: 414 return err; 415 default: 416 break; 417 } 418 return -ENODEV; 419 } 420 421 status_t CameraService::filterGetInfoErrorCode(status_t err) { 422 switch(err) { 423 case NO_ERROR: 424 case -EINVAL: 425 return err; 426 default: 427 break; 428 } 429 return -ENODEV; 430 } 431 432 bool CameraService::setUpVendorTags() { 433 vendor_tag_ops_t vOps = vendor_tag_ops_t(); 434 435 // Check if vendor operations have been implemented 436 if (mModule->get_vendor_tag_ops == NULL) { 437 ALOGI("%s: No vendor tags defined for this device.", __FUNCTION__); 438 return false; 439 } 440 441 ATRACE_BEGIN("camera3->get_metadata_vendor_tag_ops"); 442 mModule->get_vendor_tag_ops(&vOps); 443 ATRACE_END(); 444 445 // Ensure all vendor operations are present 446 if (vOps.get_tag_count == NULL || vOps.get_all_tags == NULL || 447 vOps.get_section_name == NULL || vOps.get_tag_name == NULL || 448 vOps.get_tag_type == NULL) { 449 ALOGE("%s: Vendor tag operations not fully defined. Ignoring definitions." 450 , __FUNCTION__); 451 return false; 452 } 453 454 // Read all vendor tag definitions into a descriptor 455 sp<VendorTagDescriptor> desc; 456 status_t res; 457 if ((res = VendorTagDescriptor::createDescriptorFromOps(&vOps, /*out*/desc)) 458 != OK) { 459 ALOGE("%s: Could not generate descriptor from vendor tag operations," 460 "received error %s (%d). Camera clients will not be able to use" 461 "vendor tags", __FUNCTION__, strerror(res), res); 462 return false; 463 } 464 465 // Set the global descriptor to use with camera metadata 466 VendorTagDescriptor::setAsGlobalVendorTagDescriptor(desc); 467 return true; 468 } 469 470 status_t CameraService::initializeShimMetadata(int cameraId) { 471 int pid = getCallingPid(); 472 int uid = getCallingUid(); 473 status_t ret = validateConnect(cameraId, uid); 474 if (ret != OK) { 475 // Error already logged by callee 476 return ret; 477 } 478 479 bool needsNewClient = false; 480 sp<Client> client; 481 482 String16 internalPackageName("media"); 483 { // Scope for service lock 484 Mutex::Autolock lock(mServiceLock); 485 if (mClient[cameraId] != NULL) { 486 client = static_cast<Client*>(mClient[cameraId].promote().get()); 487 } 488 if (client == NULL) { 489 needsNewClient = true; 490 ret = connectHelperLocked(/*out*/client, 491 /*cameraClient*/NULL, // Empty binder callbacks 492 cameraId, 493 internalPackageName, 494 uid, 495 pid); 496 497 if (ret != OK) { 498 // Error already logged by callee 499 return ret; 500 } 501 } 502 503 if (client == NULL) { 504 ALOGE("%s: Could not connect to client camera device.", __FUNCTION__); 505 return BAD_VALUE; 506 } 507 508 String8 rawParams = client->getParameters(); 509 CameraParameters params(rawParams); 510 mShimParams.add(cameraId, params); 511 } 512 513 // Close client if one was opened solely for this call 514 if (needsNewClient) { 515 client->disconnect(); 516 } 517 return OK; 518 } 519 520 status_t CameraService::getLegacyParametersLazy(int cameraId, 521 /*out*/ 522 CameraParameters* parameters) { 523 524 ALOGV("%s: for cameraId: %d", __FUNCTION__, cameraId); 525 526 status_t ret = 0; 527 528 if (parameters == NULL) { 529 ALOGE("%s: parameters must not be null", __FUNCTION__); 530 return BAD_VALUE; 531 } 532 533 ssize_t index = -1; 534 { // Scope for service lock 535 Mutex::Autolock lock(mServiceLock); 536 index = mShimParams.indexOfKey(cameraId); 537 // Release service lock so initializeShimMetadata can be called correctly. 538 539 if (index >= 0) { 540 *parameters = mShimParams[index]; 541 } 542 } 543 544 if (index < 0) { 545 int64_t token = IPCThreadState::self()->clearCallingIdentity(); 546 ret = initializeShimMetadata(cameraId); 547 IPCThreadState::self()->restoreCallingIdentity(token); 548 if (ret != OK) { 549 // Error already logged by callee 550 return ret; 551 } 552 553 { // Scope for service lock 554 Mutex::Autolock lock(mServiceLock); 555 index = mShimParams.indexOfKey(cameraId); 556 557 LOG_ALWAYS_FATAL_IF(index < 0, "index should have been initialized"); 558 559 *parameters = mShimParams[index]; 560 } 561 } 562 563 return OK; 564 } 565 566 status_t CameraService::validateConnect(int cameraId, 567 /*inout*/ 568 int& clientUid) const { 569 570 int callingPid = getCallingPid(); 571 572 if (clientUid == USE_CALLING_UID) { 573 clientUid = getCallingUid(); 574 } else { 575 // We only trust our own process to forward client UIDs 576 if (callingPid != getpid()) { 577 ALOGE("CameraService::connect X (pid %d) rejected (don't trust clientUid)", 578 callingPid); 579 return PERMISSION_DENIED; 580 } 581 } 582 583 if (!mModule) { 584 ALOGE("Camera HAL module not loaded"); 585 return -ENODEV; 586 } 587 588 if (cameraId < 0 || cameraId >= mNumberOfCameras) { 589 ALOGE("CameraService::connect X (pid %d) rejected (invalid cameraId %d).", 590 callingPid, cameraId); 591 return -ENODEV; 592 } 593 594 char value[PROPERTY_VALUE_MAX]; 595 property_get("sys.secpolicy.camera.disabled", value, "0"); 596 if (strcmp(value, "1") == 0) { 597 // Camera is disabled by DevicePolicyManager. 598 ALOGI("Camera is disabled. connect X (pid %d) rejected", callingPid); 599 return -EACCES; 600 } 601 602 ICameraServiceListener::Status currentStatus = getStatus(cameraId); 603 if (currentStatus == ICameraServiceListener::STATUS_NOT_PRESENT) { 604 ALOGI("Camera is not plugged in," 605 " connect X (pid %d) rejected", callingPid); 606 return -ENODEV; 607 } else if (currentStatus == ICameraServiceListener::STATUS_ENUMERATING) { 608 ALOGI("Camera is enumerating," 609 " connect X (pid %d) rejected", callingPid); 610 return -EBUSY; 611 } 612 // Else don't check for STATUS_NOT_AVAILABLE. 613 // -- It's done implicitly in canConnectUnsafe /w the mBusy array 614 615 return OK; 616 } 617 618 bool CameraService::canConnectUnsafe(int cameraId, 619 const String16& clientPackageName, 620 const sp<IBinder>& remoteCallback, 621 sp<BasicClient> &client) { 622 String8 clientName8(clientPackageName); 623 int callingPid = getCallingPid(); 624 625 if (mClient[cameraId] != 0) { 626 client = mClient[cameraId].promote(); 627 if (client != 0) { 628 if (remoteCallback == client->getRemote()) { 629 LOG1("CameraService::connect X (pid %d) (the same client)", 630 callingPid); 631 return true; 632 } else { 633 // TODOSC: need to support 1 regular client, 634 // multiple shared clients here 635 ALOGW("CameraService::connect X (pid %d) rejected" 636 " (existing client).", callingPid); 637 return false; 638 } 639 } 640 mClient[cameraId].clear(); 641 } 642 643 /* 644 mBusy is set to false as the last step of the Client destructor, 645 after which it is guaranteed that the Client destructor has finished ( 646 including any inherited destructors) 647 648 We only need this for a Client subclasses since we don't allow 649 multiple Clents to be opened concurrently, but multiple BasicClient 650 would be fine 651 */ 652 if (mBusy[cameraId]) { 653 ALOGW("CameraService::connect X (pid %d, \"%s\") rejected" 654 " (camera %d is still busy).", callingPid, 655 clientName8.string(), cameraId); 656 return false; 657 } 658 659 return true; 660 } 661 662 status_t CameraService::connectHelperLocked( 663 /*out*/ 664 sp<Client>& client, 665 /*in*/ 666 const sp<ICameraClient>& cameraClient, 667 int cameraId, 668 const String16& clientPackageName, 669 int clientUid, 670 int callingPid, 671 int halVersion, 672 bool legacyMode) { 673 674 int facing = -1; 675 int deviceVersion = getDeviceVersion(cameraId, &facing); 676 677 if (halVersion < 0 || halVersion == deviceVersion) { 678 // Default path: HAL version is unspecified by caller, create CameraClient 679 // based on device version reported by the HAL. 680 switch(deviceVersion) { 681 case CAMERA_DEVICE_API_VERSION_1_0: 682 client = new CameraClient(this, cameraClient, 683 clientPackageName, cameraId, 684 facing, callingPid, clientUid, getpid(), legacyMode); 685 break; 686 case CAMERA_DEVICE_API_VERSION_2_0: 687 case CAMERA_DEVICE_API_VERSION_2_1: 688 case CAMERA_DEVICE_API_VERSION_3_0: 689 case CAMERA_DEVICE_API_VERSION_3_1: 690 case CAMERA_DEVICE_API_VERSION_3_2: 691 client = new Camera2Client(this, cameraClient, 692 clientPackageName, cameraId, 693 facing, callingPid, clientUid, getpid(), legacyMode); 694 break; 695 case -1: 696 ALOGE("Invalid camera id %d", cameraId); 697 return BAD_VALUE; 698 default: 699 ALOGE("Unknown camera device HAL version: %d", deviceVersion); 700 return INVALID_OPERATION; 701 } 702 } else { 703 // A particular HAL version is requested by caller. Create CameraClient 704 // based on the requested HAL version. 705 if (deviceVersion > CAMERA_DEVICE_API_VERSION_1_0 && 706 halVersion == CAMERA_DEVICE_API_VERSION_1_0) { 707 // Only support higher HAL version device opened as HAL1.0 device. 708 client = new CameraClient(this, cameraClient, 709 clientPackageName, cameraId, 710 facing, callingPid, clientUid, getpid(), legacyMode); 711 } else { 712 // Other combinations (e.g. HAL3.x open as HAL2.x) are not supported yet. 713 ALOGE("Invalid camera HAL version %x: HAL %x device can only be" 714 " opened as HAL %x device", halVersion, deviceVersion, 715 CAMERA_DEVICE_API_VERSION_1_0); 716 return INVALID_OPERATION; 717 } 718 } 719 720 status_t status = connectFinishUnsafe(client, client->getRemote()); 721 if (status != OK) { 722 // this is probably not recoverable.. maybe the client can try again 723 return status; 724 } 725 726 mClient[cameraId] = client; 727 LOG1("CameraService::connect X (id %d, this pid is %d)", cameraId, 728 getpid()); 729 730 return OK; 731 } 732 733 status_t CameraService::connect( 734 const sp<ICameraClient>& cameraClient, 735 int cameraId, 736 const String16& clientPackageName, 737 int clientUid, 738 /*out*/ 739 sp<ICamera>& device) { 740 741 String8 clientName8(clientPackageName); 742 int callingPid = getCallingPid(); 743 744 LOG1("CameraService::connect E (pid %d \"%s\", id %d)", callingPid, 745 clientName8.string(), cameraId); 746 747 status_t status = validateConnect(cameraId, /*inout*/clientUid); 748 if (status != OK) { 749 return status; 750 } 751 752 753 sp<Client> client; 754 { 755 Mutex::Autolock lock(mServiceLock); 756 sp<BasicClient> clientTmp; 757 if (!canConnectUnsafe(cameraId, clientPackageName, 758 cameraClient->asBinder(), 759 /*out*/clientTmp)) { 760 return -EBUSY; 761 } else if (client.get() != NULL) { 762 device = static_cast<Client*>(clientTmp.get()); 763 return OK; 764 } 765 766 status = connectHelperLocked(/*out*/client, 767 cameraClient, 768 cameraId, 769 clientPackageName, 770 clientUid, 771 callingPid); 772 if (status != OK) { 773 return status; 774 } 775 776 } 777 // important: release the mutex here so the client can call back 778 // into the service from its destructor (can be at the end of the call) 779 780 device = client; 781 return OK; 782 } 783 784 status_t CameraService::connectLegacy( 785 const sp<ICameraClient>& cameraClient, 786 int cameraId, int halVersion, 787 const String16& clientPackageName, 788 int clientUid, 789 /*out*/ 790 sp<ICamera>& device) { 791 792 if (halVersion != CAMERA_HAL_API_VERSION_UNSPECIFIED && 793 mModule->common.module_api_version < CAMERA_MODULE_API_VERSION_2_3) { 794 /* 795 * Either the HAL version is unspecified in which case this just creates 796 * a camera client selected by the latest device version, or 797 * it's a particular version in which case the HAL must supported 798 * the open_legacy call 799 */ 800 ALOGE("%s: camera HAL module version %x doesn't support connecting to legacy HAL devices!", 801 __FUNCTION__, mModule->common.module_api_version); 802 return INVALID_OPERATION; 803 } 804 805 String8 clientName8(clientPackageName); 806 int callingPid = getCallingPid(); 807 808 LOG1("CameraService::connect legacy E (pid %d \"%s\", id %d)", callingPid, 809 clientName8.string(), cameraId); 810 811 status_t status = validateConnect(cameraId, /*inout*/clientUid); 812 if (status != OK) { 813 return status; 814 } 815 816 sp<Client> client; 817 { 818 Mutex::Autolock lock(mServiceLock); 819 sp<BasicClient> clientTmp; 820 if (!canConnectUnsafe(cameraId, clientPackageName, 821 cameraClient->asBinder(), 822 /*out*/clientTmp)) { 823 return -EBUSY; 824 } else if (client.get() != NULL) { 825 device = static_cast<Client*>(clientTmp.get()); 826 return OK; 827 } 828 829 status = connectHelperLocked(/*out*/client, 830 cameraClient, 831 cameraId, 832 clientPackageName, 833 clientUid, 834 callingPid, 835 halVersion, 836 /*legacyMode*/true); 837 if (status != OK) { 838 return status; 839 } 840 841 } 842 // important: release the mutex here so the client can call back 843 // into the service from its destructor (can be at the end of the call) 844 845 device = client; 846 return OK; 847 } 848 849 status_t CameraService::connectFinishUnsafe(const sp<BasicClient>& client, 850 const sp<IBinder>& remoteCallback) { 851 status_t status = client->initialize(mModule); 852 if (status != OK) { 853 return status; 854 } 855 if (remoteCallback != NULL) { 856 remoteCallback->linkToDeath(this); 857 } 858 859 return OK; 860 } 861 862 status_t CameraService::connectPro( 863 const sp<IProCameraCallbacks>& cameraCb, 864 int cameraId, 865 const String16& clientPackageName, 866 int clientUid, 867 /*out*/ 868 sp<IProCameraUser>& device) 869 { 870 if (cameraCb == 0) { 871 ALOGE("%s: Callback must not be null", __FUNCTION__); 872 return BAD_VALUE; 873 } 874 875 String8 clientName8(clientPackageName); 876 int callingPid = getCallingPid(); 877 878 LOG1("CameraService::connectPro E (pid %d \"%s\", id %d)", callingPid, 879 clientName8.string(), cameraId); 880 status_t status = validateConnect(cameraId, /*inout*/clientUid); 881 if (status != OK) { 882 return status; 883 } 884 885 sp<ProClient> client; 886 { 887 Mutex::Autolock lock(mServiceLock); 888 { 889 sp<BasicClient> client; 890 if (!canConnectUnsafe(cameraId, clientPackageName, 891 cameraCb->asBinder(), 892 /*out*/client)) { 893 return -EBUSY; 894 } 895 } 896 897 int facing = -1; 898 int deviceVersion = getDeviceVersion(cameraId, &facing); 899 900 switch(deviceVersion) { 901 case CAMERA_DEVICE_API_VERSION_1_0: 902 ALOGE("Camera id %d uses HALv1, doesn't support ProCamera", 903 cameraId); 904 return -EOPNOTSUPP; 905 break; 906 case CAMERA_DEVICE_API_VERSION_2_0: 907 case CAMERA_DEVICE_API_VERSION_2_1: 908 case CAMERA_DEVICE_API_VERSION_3_0: 909 case CAMERA_DEVICE_API_VERSION_3_1: 910 case CAMERA_DEVICE_API_VERSION_3_2: 911 client = new ProCamera2Client(this, cameraCb, clientPackageName, 912 cameraId, facing, callingPid, clientUid, getpid()); 913 break; 914 case -1: 915 ALOGE("Invalid camera id %d", cameraId); 916 return BAD_VALUE; 917 default: 918 ALOGE("Unknown camera device HAL version: %d", deviceVersion); 919 return INVALID_OPERATION; 920 } 921 922 status_t status = connectFinishUnsafe(client, client->getRemote()); 923 if (status != OK) { 924 return status; 925 } 926 927 mProClientList[cameraId].push(client); 928 929 LOG1("CameraService::connectPro X (id %d, this pid is %d)", cameraId, 930 getpid()); 931 } 932 // important: release the mutex here so the client can call back 933 // into the service from its destructor (can be at the end of the call) 934 device = client; 935 return OK; 936 } 937 938 status_t CameraService::connectDevice( 939 const sp<ICameraDeviceCallbacks>& cameraCb, 940 int cameraId, 941 const String16& clientPackageName, 942 int clientUid, 943 /*out*/ 944 sp<ICameraDeviceUser>& device) 945 { 946 947 String8 clientName8(clientPackageName); 948 int callingPid = getCallingPid(); 949 950 LOG1("CameraService::connectDevice E (pid %d \"%s\", id %d)", callingPid, 951 clientName8.string(), cameraId); 952 953 status_t status = validateConnect(cameraId, /*inout*/clientUid); 954 if (status != OK) { 955 return status; 956 } 957 958 sp<CameraDeviceClient> client; 959 { 960 Mutex::Autolock lock(mServiceLock); 961 { 962 sp<BasicClient> client; 963 if (!canConnectUnsafe(cameraId, clientPackageName, 964 cameraCb->asBinder(), 965 /*out*/client)) { 966 return -EBUSY; 967 } 968 } 969 970 int facing = -1; 971 int deviceVersion = getDeviceVersion(cameraId, &facing); 972 973 switch(deviceVersion) { 974 case CAMERA_DEVICE_API_VERSION_1_0: 975 ALOGW("Camera using old HAL version: %d", deviceVersion); 976 return -EOPNOTSUPP; 977 // TODO: don't allow 2.0 Only allow 2.1 and higher 978 case CAMERA_DEVICE_API_VERSION_2_0: 979 case CAMERA_DEVICE_API_VERSION_2_1: 980 case CAMERA_DEVICE_API_VERSION_3_0: 981 case CAMERA_DEVICE_API_VERSION_3_1: 982 case CAMERA_DEVICE_API_VERSION_3_2: 983 client = new CameraDeviceClient(this, cameraCb, clientPackageName, 984 cameraId, facing, callingPid, clientUid, getpid()); 985 break; 986 case -1: 987 ALOGE("Invalid camera id %d", cameraId); 988 return BAD_VALUE; 989 default: 990 ALOGE("Unknown camera device HAL version: %d", deviceVersion); 991 return INVALID_OPERATION; 992 } 993 994 status_t status = connectFinishUnsafe(client, client->getRemote()); 995 if (status != OK) { 996 // this is probably not recoverable.. maybe the client can try again 997 return status; 998 } 999 1000 LOG1("CameraService::connectDevice X (id %d, this pid is %d)", cameraId, 1001 getpid()); 1002 1003 mClient[cameraId] = client; 1004 } 1005 // important: release the mutex here so the client can call back 1006 // into the service from its destructor (can be at the end of the call) 1007 1008 device = client; 1009 return OK; 1010 } 1011 1012 1013 status_t CameraService::addListener( 1014 const sp<ICameraServiceListener>& listener) { 1015 ALOGV("%s: Add listener %p", __FUNCTION__, listener.get()); 1016 1017 if (listener == 0) { 1018 ALOGE("%s: Listener must not be null", __FUNCTION__); 1019 return BAD_VALUE; 1020 } 1021 1022 Mutex::Autolock lock(mServiceLock); 1023 1024 Vector<sp<ICameraServiceListener> >::iterator it, end; 1025 for (it = mListenerList.begin(); it != mListenerList.end(); ++it) { 1026 if ((*it)->asBinder() == listener->asBinder()) { 1027 ALOGW("%s: Tried to add listener %p which was already subscribed", 1028 __FUNCTION__, listener.get()); 1029 return ALREADY_EXISTS; 1030 } 1031 } 1032 1033 mListenerList.push_back(listener); 1034 1035 /* Immediately signal current status to this listener only */ 1036 { 1037 Mutex::Autolock m(mStatusMutex) ; 1038 int numCams = getNumberOfCameras(); 1039 for (int i = 0; i < numCams; ++i) { 1040 listener->onStatusChanged(mStatusList[i], i); 1041 } 1042 } 1043 1044 return OK; 1045 } 1046 status_t CameraService::removeListener( 1047 const sp<ICameraServiceListener>& listener) { 1048 ALOGV("%s: Remove listener %p", __FUNCTION__, listener.get()); 1049 1050 if (listener == 0) { 1051 ALOGE("%s: Listener must not be null", __FUNCTION__); 1052 return BAD_VALUE; 1053 } 1054 1055 Mutex::Autolock lock(mServiceLock); 1056 1057 Vector<sp<ICameraServiceListener> >::iterator it; 1058 for (it = mListenerList.begin(); it != mListenerList.end(); ++it) { 1059 if ((*it)->asBinder() == listener->asBinder()) { 1060 mListenerList.erase(it); 1061 return OK; 1062 } 1063 } 1064 1065 ALOGW("%s: Tried to remove a listener %p which was not subscribed", 1066 __FUNCTION__, listener.get()); 1067 1068 return BAD_VALUE; 1069 } 1070 1071 status_t CameraService::getLegacyParameters( 1072 int cameraId, 1073 /*out*/ 1074 String16* parameters) { 1075 ALOGV("%s: for camera ID = %d", __FUNCTION__, cameraId); 1076 1077 if (parameters == NULL) { 1078 ALOGE("%s: parameters must not be null", __FUNCTION__); 1079 return BAD_VALUE; 1080 } 1081 1082 status_t ret = 0; 1083 1084 CameraParameters shimParams; 1085 if ((ret = getLegacyParametersLazy(cameraId, /*out*/&shimParams)) != OK) { 1086 // Error logged by caller 1087 return ret; 1088 } 1089 1090 String8 shimParamsString8 = shimParams.flatten(); 1091 String16 shimParamsString16 = String16(shimParamsString8); 1092 1093 *parameters = shimParamsString16; 1094 1095 return OK; 1096 } 1097 1098 status_t CameraService::supportsCameraApi(int cameraId, int apiVersion) { 1099 ALOGV("%s: for camera ID = %d", __FUNCTION__, cameraId); 1100 1101 switch (apiVersion) { 1102 case API_VERSION_1: 1103 case API_VERSION_2: 1104 break; 1105 default: 1106 ALOGE("%s: Bad API version %d", __FUNCTION__, apiVersion); 1107 return BAD_VALUE; 1108 } 1109 1110 int facing = -1; 1111 int deviceVersion = getDeviceVersion(cameraId, &facing); 1112 1113 switch(deviceVersion) { 1114 case CAMERA_DEVICE_API_VERSION_1_0: 1115 case CAMERA_DEVICE_API_VERSION_2_0: 1116 case CAMERA_DEVICE_API_VERSION_2_1: 1117 case CAMERA_DEVICE_API_VERSION_3_0: 1118 case CAMERA_DEVICE_API_VERSION_3_1: 1119 if (apiVersion == API_VERSION_2) { 1120 ALOGV("%s: Camera id %d uses HAL prior to HAL3.2, doesn't support api2 without shim", 1121 __FUNCTION__, cameraId); 1122 return -EOPNOTSUPP; 1123 } else { // if (apiVersion == API_VERSION_1) { 1124 ALOGV("%s: Camera id %d uses older HAL before 3.2, but api1 is always supported", 1125 __FUNCTION__, cameraId); 1126 return OK; 1127 } 1128 case CAMERA_DEVICE_API_VERSION_3_2: 1129 ALOGV("%s: Camera id %d uses HAL3.2 or newer, supports api1/api2 directly", 1130 __FUNCTION__, cameraId); 1131 return OK; 1132 case -1: 1133 ALOGE("%s: Invalid camera id %d", __FUNCTION__, cameraId); 1134 return BAD_VALUE; 1135 default: 1136 ALOGE("%s: Unknown camera device HAL version: %d", __FUNCTION__, deviceVersion); 1137 return INVALID_OPERATION; 1138 } 1139 1140 return OK; 1141 } 1142 1143 void CameraService::removeClientByRemote(const wp<IBinder>& remoteBinder) { 1144 int callingPid = getCallingPid(); 1145 LOG1("CameraService::removeClientByRemote E (pid %d)", callingPid); 1146 1147 // Declare this before the lock to make absolutely sure the 1148 // destructor won't be called with the lock held. 1149 Mutex::Autolock lock(mServiceLock); 1150 1151 int outIndex; 1152 sp<BasicClient> client = findClientUnsafe(remoteBinder, outIndex); 1153 1154 if (client != 0) { 1155 // Found our camera, clear and leave. 1156 LOG1("removeClient: clear camera %d", outIndex); 1157 1158 sp<IBinder> remote = client->getRemote(); 1159 if (remote != NULL) { 1160 remote->unlinkToDeath(this); 1161 } 1162 1163 mClient[outIndex].clear(); 1164 } else { 1165 1166 sp<ProClient> clientPro = findProClientUnsafe(remoteBinder); 1167 1168 if (clientPro != NULL) { 1169 // Found our camera, clear and leave. 1170 LOG1("removeClient: clear pro %p", clientPro.get()); 1171 1172 clientPro->getRemoteCallback()->asBinder()->unlinkToDeath(this); 1173 } 1174 } 1175 1176 LOG1("CameraService::removeClientByRemote X (pid %d)", callingPid); 1177 } 1178 1179 sp<CameraService::ProClient> CameraService::findProClientUnsafe( 1180 const wp<IBinder>& cameraCallbacksRemote) 1181 { 1182 sp<ProClient> clientPro; 1183 1184 for (int i = 0; i < mNumberOfCameras; ++i) { 1185 Vector<size_t> removeIdx; 1186 1187 for (size_t j = 0; j < mProClientList[i].size(); ++j) { 1188 wp<ProClient> cl = mProClientList[i][j]; 1189 1190 sp<ProClient> clStrong = cl.promote(); 1191 if (clStrong != NULL && clStrong->getRemote() == cameraCallbacksRemote) { 1192 clientPro = clStrong; 1193 break; 1194 } else if (clStrong == NULL) { 1195 // mark to clean up dead ptr 1196 removeIdx.push(j); 1197 } 1198 } 1199 1200 // remove stale ptrs (in reverse so the indices dont change) 1201 for (ssize_t j = (ssize_t)removeIdx.size() - 1; j >= 0; --j) { 1202 mProClientList[i].removeAt(removeIdx[j]); 1203 } 1204 1205 } 1206 1207 return clientPro; 1208 } 1209 1210 sp<CameraService::BasicClient> CameraService::findClientUnsafe( 1211 const wp<IBinder>& cameraClient, int& outIndex) { 1212 sp<BasicClient> client; 1213 1214 for (int i = 0; i < mNumberOfCameras; i++) { 1215 1216 // This happens when we have already disconnected (or this is 1217 // just another unused camera). 1218 if (mClient[i] == 0) continue; 1219 1220 // Promote mClient. It can fail if we are called from this path: 1221 // Client::~Client() -> disconnect() -> removeClientByRemote(). 1222 client = mClient[i].promote(); 1223 1224 // Clean up stale client entry 1225 if (client == NULL) { 1226 mClient[i].clear(); 1227 continue; 1228 } 1229 1230 if (cameraClient == client->getRemote()) { 1231 // Found our camera 1232 outIndex = i; 1233 return client; 1234 } 1235 } 1236 1237 outIndex = -1; 1238 return NULL; 1239 } 1240 1241 CameraService::BasicClient* CameraService::getClientByIdUnsafe(int cameraId) { 1242 if (cameraId < 0 || cameraId >= mNumberOfCameras) return NULL; 1243 return mClient[cameraId].unsafe_get(); 1244 } 1245 1246 Mutex* CameraService::getClientLockById(int cameraId) { 1247 if (cameraId < 0 || cameraId >= mNumberOfCameras) return NULL; 1248 return &mClientLock[cameraId]; 1249 } 1250 1251 sp<CameraService::BasicClient> CameraService::getClientByRemote( 1252 const wp<IBinder>& cameraClient) { 1253 1254 // Declare this before the lock to make absolutely sure the 1255 // destructor won't be called with the lock held. 1256 sp<BasicClient> client; 1257 1258 Mutex::Autolock lock(mServiceLock); 1259 1260 int outIndex; 1261 client = findClientUnsafe(cameraClient, outIndex); 1262 1263 return client; 1264 } 1265 1266 status_t CameraService::onTransact( 1267 uint32_t code, const Parcel& data, Parcel* reply, uint32_t flags) { 1268 // Permission checks 1269 switch (code) { 1270 case BnCameraService::CONNECT: 1271 case BnCameraService::CONNECT_PRO: 1272 case BnCameraService::CONNECT_DEVICE: 1273 case BnCameraService::CONNECT_LEGACY: 1274 const int pid = getCallingPid(); 1275 const int self_pid = getpid(); 1276 if (pid != self_pid) { 1277 // we're called from a different process, do the real check 1278 if (!checkCallingPermission( 1279 String16("android.permission.CAMERA"))) { 1280 const int uid = getCallingUid(); 1281 ALOGE("Permission Denial: " 1282 "can't use the camera pid=%d, uid=%d", pid, uid); 1283 return PERMISSION_DENIED; 1284 } 1285 } 1286 break; 1287 } 1288 1289 return BnCameraService::onTransact(code, data, reply, flags); 1290 } 1291 1292 // The reason we need this busy bit is a new CameraService::connect() request 1293 // may come in while the previous Client's destructor has not been run or is 1294 // still running. If the last strong reference of the previous Client is gone 1295 // but the destructor has not been finished, we should not allow the new Client 1296 // to be created because we need to wait for the previous Client to tear down 1297 // the hardware first. 1298 void CameraService::setCameraBusy(int cameraId) { 1299 android_atomic_write(1, &mBusy[cameraId]); 1300 1301 ALOGV("setCameraBusy cameraId=%d", cameraId); 1302 } 1303 1304 void CameraService::setCameraFree(int cameraId) { 1305 android_atomic_write(0, &mBusy[cameraId]); 1306 1307 ALOGV("setCameraFree cameraId=%d", cameraId); 1308 } 1309 1310 // We share the media players for shutter and recording sound for all clients. 1311 // A reference count is kept to determine when we will actually release the 1312 // media players. 1313 1314 MediaPlayer* CameraService::newMediaPlayer(const char *file) { 1315 MediaPlayer* mp = new MediaPlayer(); 1316 if (mp->setDataSource(NULL /* httpService */, file, NULL) == NO_ERROR) { 1317 mp->setAudioStreamType(AUDIO_STREAM_ENFORCED_AUDIBLE); 1318 mp->prepare(); 1319 } else { 1320 ALOGE("Failed to load CameraService sounds: %s", file); 1321 return NULL; 1322 } 1323 return mp; 1324 } 1325 1326 void CameraService::loadSound() { 1327 Mutex::Autolock lock(mSoundLock); 1328 LOG1("CameraService::loadSound ref=%d", mSoundRef); 1329 if (mSoundRef++) return; 1330 1331 mSoundPlayer[SOUND_SHUTTER] = newMediaPlayer("/system/media/audio/ui/camera_click.ogg"); 1332 mSoundPlayer[SOUND_RECORDING] = newMediaPlayer("/system/media/audio/ui/VideoRecord.ogg"); 1333 } 1334 1335 void CameraService::releaseSound() { 1336 Mutex::Autolock lock(mSoundLock); 1337 LOG1("CameraService::releaseSound ref=%d", mSoundRef); 1338 if (--mSoundRef) return; 1339 1340 for (int i = 0; i < NUM_SOUNDS; i++) { 1341 if (mSoundPlayer[i] != 0) { 1342 mSoundPlayer[i]->disconnect(); 1343 mSoundPlayer[i].clear(); 1344 } 1345 } 1346 } 1347 1348 void CameraService::playSound(sound_kind kind) { 1349 LOG1("playSound(%d)", kind); 1350 Mutex::Autolock lock(mSoundLock); 1351 sp<MediaPlayer> player = mSoundPlayer[kind]; 1352 if (player != 0) { 1353 player->seekTo(0); 1354 player->start(); 1355 } 1356 } 1357 1358 // ---------------------------------------------------------------------------- 1359 1360 CameraService::Client::Client(const sp<CameraService>& cameraService, 1361 const sp<ICameraClient>& cameraClient, 1362 const String16& clientPackageName, 1363 int cameraId, int cameraFacing, 1364 int clientPid, uid_t clientUid, 1365 int servicePid) : 1366 CameraService::BasicClient(cameraService, cameraClient->asBinder(), 1367 clientPackageName, 1368 cameraId, cameraFacing, 1369 clientPid, clientUid, 1370 servicePid) 1371 { 1372 int callingPid = getCallingPid(); 1373 LOG1("Client::Client E (pid %d, id %d)", callingPid, cameraId); 1374 1375 mRemoteCallback = cameraClient; 1376 1377 cameraService->setCameraBusy(cameraId); 1378 cameraService->loadSound(); 1379 1380 LOG1("Client::Client X (pid %d, id %d)", callingPid, cameraId); 1381 } 1382 1383 // tear down the client 1384 CameraService::Client::~Client() { 1385 ALOGV("~Client"); 1386 mDestructionStarted = true; 1387 1388 mCameraService->releaseSound(); 1389 // unconditionally disconnect. function is idempotent 1390 Client::disconnect(); 1391 } 1392 1393 CameraService::BasicClient::BasicClient(const sp<CameraService>& cameraService, 1394 const sp<IBinder>& remoteCallback, 1395 const String16& clientPackageName, 1396 int cameraId, int cameraFacing, 1397 int clientPid, uid_t clientUid, 1398 int servicePid): 1399 mClientPackageName(clientPackageName) 1400 { 1401 mCameraService = cameraService; 1402 mRemoteBinder = remoteCallback; 1403 mCameraId = cameraId; 1404 mCameraFacing = cameraFacing; 1405 mClientPid = clientPid; 1406 mClientUid = clientUid; 1407 mServicePid = servicePid; 1408 mOpsActive = false; 1409 mDestructionStarted = false; 1410 } 1411 1412 CameraService::BasicClient::~BasicClient() { 1413 ALOGV("~BasicClient"); 1414 mDestructionStarted = true; 1415 } 1416 1417 void CameraService::BasicClient::disconnect() { 1418 ALOGV("BasicClient::disconnect"); 1419 mCameraService->removeClientByRemote(mRemoteBinder); 1420 1421 finishCameraOps(); 1422 // client shouldn't be able to call into us anymore 1423 mClientPid = 0; 1424 } 1425 1426 status_t CameraService::BasicClient::startCameraOps() { 1427 int32_t res; 1428 // Notify app ops that the camera is not available 1429 mOpsCallback = new OpsCallback(this); 1430 1431 { 1432 ALOGV("%s: Start camera ops, package name = %s, client UID = %d", 1433 __FUNCTION__, String8(mClientPackageName).string(), mClientUid); 1434 } 1435 1436 mAppOpsManager.startWatchingMode(AppOpsManager::OP_CAMERA, 1437 mClientPackageName, mOpsCallback); 1438 res = mAppOpsManager.startOp(AppOpsManager::OP_CAMERA, 1439 mClientUid, mClientPackageName); 1440 1441 if (res != AppOpsManager::MODE_ALLOWED) { 1442 ALOGI("Camera %d: Access for \"%s\" has been revoked", 1443 mCameraId, String8(mClientPackageName).string()); 1444 return PERMISSION_DENIED; 1445 } 1446 1447 mOpsActive = true; 1448 1449 // Transition device availability listeners from PRESENT -> NOT_AVAILABLE 1450 mCameraService->updateStatus(ICameraServiceListener::STATUS_NOT_AVAILABLE, 1451 mCameraId); 1452 1453 return OK; 1454 } 1455 1456 status_t CameraService::BasicClient::finishCameraOps() { 1457 // Check if startCameraOps succeeded, and if so, finish the camera op 1458 if (mOpsActive) { 1459 // Notify app ops that the camera is available again 1460 mAppOpsManager.finishOp(AppOpsManager::OP_CAMERA, mClientUid, 1461 mClientPackageName); 1462 mOpsActive = false; 1463 1464 // Notify device availability listeners that this camera is available 1465 // again 1466 1467 StatusVector rejectSourceStates; 1468 rejectSourceStates.push_back(ICameraServiceListener::STATUS_NOT_PRESENT); 1469 rejectSourceStates.push_back(ICameraServiceListener::STATUS_ENUMERATING); 1470 1471 // Transition to PRESENT if the camera is not in either of above 2 1472 // states 1473 mCameraService->updateStatus(ICameraServiceListener::STATUS_PRESENT, 1474 mCameraId, 1475 &rejectSourceStates); 1476 1477 } 1478 // Always stop watching, even if no camera op is active 1479 mAppOpsManager.stopWatchingMode(mOpsCallback); 1480 mOpsCallback.clear(); 1481 1482 return OK; 1483 } 1484 1485 void CameraService::BasicClient::opChanged(int32_t op, const String16& packageName) { 1486 String8 name(packageName); 1487 String8 myName(mClientPackageName); 1488 1489 if (op != AppOpsManager::OP_CAMERA) { 1490 ALOGW("Unexpected app ops notification received: %d", op); 1491 return; 1492 } 1493 1494 int32_t res; 1495 res = mAppOpsManager.checkOp(AppOpsManager::OP_CAMERA, 1496 mClientUid, mClientPackageName); 1497 ALOGV("checkOp returns: %d, %s ", res, 1498 res == AppOpsManager::MODE_ALLOWED ? "ALLOWED" : 1499 res == AppOpsManager::MODE_IGNORED ? "IGNORED" : 1500 res == AppOpsManager::MODE_ERRORED ? "ERRORED" : 1501 "UNKNOWN"); 1502 1503 if (res != AppOpsManager::MODE_ALLOWED) { 1504 ALOGI("Camera %d: Access for \"%s\" revoked", mCameraId, 1505 myName.string()); 1506 // Reset the client PID to allow server-initiated disconnect, 1507 // and to prevent further calls by client. 1508 mClientPid = getCallingPid(); 1509 CaptureResultExtras resultExtras; // a dummy result (invalid) 1510 notifyError(ICameraDeviceCallbacks::ERROR_CAMERA_SERVICE, resultExtras); 1511 disconnect(); 1512 } 1513 } 1514 1515 // ---------------------------------------------------------------------------- 1516 1517 Mutex* CameraService::Client::getClientLockFromCookie(void* user) { 1518 return gCameraService->getClientLockById((int)(intptr_t) user); 1519 } 1520 1521 // Provide client pointer for callbacks. Client lock returned from getClientLockFromCookie should 1522 // be acquired for this to be safe 1523 CameraService::Client* CameraService::Client::getClientFromCookie(void* user) { 1524 BasicClient *basicClient = gCameraService->getClientByIdUnsafe((int)(intptr_t) user); 1525 // OK: only CameraClient calls this, and they already cast anyway. 1526 Client* client = static_cast<Client*>(basicClient); 1527 1528 // This could happen if the Client is in the process of shutting down (the 1529 // last strong reference is gone, but the destructor hasn't finished 1530 // stopping the hardware). 1531 if (client == NULL) return NULL; 1532 1533 // destruction already started, so should not be accessed 1534 if (client->mDestructionStarted) return NULL; 1535 1536 return client; 1537 } 1538 1539 void CameraService::Client::notifyError(ICameraDeviceCallbacks::CameraErrorCode errorCode, 1540 const CaptureResultExtras& resultExtras) { 1541 mRemoteCallback->notifyCallback(CAMERA_MSG_ERROR, CAMERA_ERROR_RELEASED, 0); 1542 } 1543 1544 // NOTE: function is idempotent 1545 void CameraService::Client::disconnect() { 1546 ALOGV("Client::disconnect"); 1547 BasicClient::disconnect(); 1548 mCameraService->setCameraFree(mCameraId); 1549 } 1550 1551 CameraService::Client::OpsCallback::OpsCallback(wp<BasicClient> client): 1552 mClient(client) { 1553 } 1554 1555 void CameraService::Client::OpsCallback::opChanged(int32_t op, 1556 const String16& packageName) { 1557 sp<BasicClient> client = mClient.promote(); 1558 if (client != NULL) { 1559 client->opChanged(op, packageName); 1560 } 1561 } 1562 1563 // ---------------------------------------------------------------------------- 1564 // IProCamera 1565 // ---------------------------------------------------------------------------- 1566 1567 CameraService::ProClient::ProClient(const sp<CameraService>& cameraService, 1568 const sp<IProCameraCallbacks>& remoteCallback, 1569 const String16& clientPackageName, 1570 int cameraId, 1571 int cameraFacing, 1572 int clientPid, 1573 uid_t clientUid, 1574 int servicePid) 1575 : CameraService::BasicClient(cameraService, remoteCallback->asBinder(), 1576 clientPackageName, cameraId, cameraFacing, 1577 clientPid, clientUid, servicePid) 1578 { 1579 mRemoteCallback = remoteCallback; 1580 } 1581 1582 CameraService::ProClient::~ProClient() { 1583 } 1584 1585 void CameraService::ProClient::notifyError(ICameraDeviceCallbacks::CameraErrorCode errorCode, 1586 const CaptureResultExtras& resultExtras) { 1587 mRemoteCallback->notifyCallback(CAMERA_MSG_ERROR, CAMERA_ERROR_RELEASED, 0); 1588 } 1589 1590 // ---------------------------------------------------------------------------- 1591 1592 static const int kDumpLockRetries = 50; 1593 static const int kDumpLockSleep = 60000; 1594 1595 static bool tryLock(Mutex& mutex) 1596 { 1597 bool locked = false; 1598 for (int i = 0; i < kDumpLockRetries; ++i) { 1599 if (mutex.tryLock() == NO_ERROR) { 1600 locked = true; 1601 break; 1602 } 1603 usleep(kDumpLockSleep); 1604 } 1605 return locked; 1606 } 1607 1608 status_t CameraService::dump(int fd, const Vector<String16>& args) { 1609 String8 result; 1610 if (checkCallingPermission(String16("android.permission.DUMP")) == false) { 1611 result.appendFormat("Permission Denial: " 1612 "can't dump CameraService from pid=%d, uid=%d\n", 1613 getCallingPid(), 1614 getCallingUid()); 1615 write(fd, result.string(), result.size()); 1616 } else { 1617 bool locked = tryLock(mServiceLock); 1618 // failed to lock - CameraService is probably deadlocked 1619 if (!locked) { 1620 result.append("CameraService may be deadlocked\n"); 1621 write(fd, result.string(), result.size()); 1622 } 1623 1624 bool hasClient = false; 1625 if (!mModule) { 1626 result = String8::format("No camera module available!\n"); 1627 write(fd, result.string(), result.size()); 1628 if (locked) mServiceLock.unlock(); 1629 return NO_ERROR; 1630 } 1631 1632 result = String8::format("Camera module HAL API version: 0x%x\n", 1633 mModule->common.hal_api_version); 1634 result.appendFormat("Camera module API version: 0x%x\n", 1635 mModule->common.module_api_version); 1636 result.appendFormat("Camera module name: %s\n", 1637 mModule->common.name); 1638 result.appendFormat("Camera module author: %s\n", 1639 mModule->common.author); 1640 result.appendFormat("Number of camera devices: %d\n\n", mNumberOfCameras); 1641 1642 sp<VendorTagDescriptor> desc = VendorTagDescriptor::getGlobalVendorTagDescriptor(); 1643 if (desc == NULL) { 1644 result.appendFormat("Vendor tags left unimplemented.\n"); 1645 } else { 1646 result.appendFormat("Vendor tag definitions:\n"); 1647 } 1648 1649 write(fd, result.string(), result.size()); 1650 1651 if (desc != NULL) { 1652 desc->dump(fd, /*verbosity*/2, /*indentation*/4); 1653 } 1654 1655 for (int i = 0; i < mNumberOfCameras; i++) { 1656 result = String8::format("Camera %d static information:\n", i); 1657 camera_info info; 1658 1659 status_t rc = mModule->get_camera_info(i, &info); 1660 if (rc != OK) { 1661 result.appendFormat(" Error reading static information!\n"); 1662 write(fd, result.string(), result.size()); 1663 } else { 1664 result.appendFormat(" Facing: %s\n", 1665 info.facing == CAMERA_FACING_BACK ? "BACK" : "FRONT"); 1666 result.appendFormat(" Orientation: %d\n", info.orientation); 1667 int deviceVersion; 1668 if (mModule->common.module_api_version < 1669 CAMERA_MODULE_API_VERSION_2_0) { 1670 deviceVersion = CAMERA_DEVICE_API_VERSION_1_0; 1671 } else { 1672 deviceVersion = info.device_version; 1673 } 1674 result.appendFormat(" Device version: 0x%x\n", deviceVersion); 1675 if (deviceVersion >= CAMERA_DEVICE_API_VERSION_2_0) { 1676 result.appendFormat(" Device static metadata:\n"); 1677 write(fd, result.string(), result.size()); 1678 dump_indented_camera_metadata(info.static_camera_characteristics, 1679 fd, /*verbosity*/2, /*indentation*/4); 1680 } else { 1681 write(fd, result.string(), result.size()); 1682 } 1683 } 1684 1685 sp<BasicClient> client = mClient[i].promote(); 1686 if (client == 0) { 1687 result = String8::format(" Device is closed, no client instance\n"); 1688 write(fd, result.string(), result.size()); 1689 continue; 1690 } 1691 hasClient = true; 1692 result = String8::format(" Device is open. Client instance dump:\n"); 1693 write(fd, result.string(), result.size()); 1694 client->dump(fd, args); 1695 } 1696 if (!hasClient) { 1697 result = String8::format("\nNo active camera clients yet.\n"); 1698 write(fd, result.string(), result.size()); 1699 } 1700 1701 if (locked) mServiceLock.unlock(); 1702 1703 // Dump camera traces if there were any 1704 write(fd, "\n", 1); 1705 camera3::CameraTraces::dump(fd, args); 1706 1707 // change logging level 1708 int n = args.size(); 1709 for (int i = 0; i + 1 < n; i++) { 1710 String16 verboseOption("-v"); 1711 if (args[i] == verboseOption) { 1712 String8 levelStr(args[i+1]); 1713 int level = atoi(levelStr.string()); 1714 result = String8::format("\nSetting log level to %d.\n", level); 1715 setLogLevel(level); 1716 write(fd, result.string(), result.size()); 1717 } 1718 } 1719 1720 } 1721 return NO_ERROR; 1722 } 1723 1724 /*virtual*/void CameraService::binderDied( 1725 const wp<IBinder> &who) { 1726 1727 /** 1728 * While tempting to promote the wp<IBinder> into a sp, 1729 * it's actually not supported by the binder driver 1730 */ 1731 1732 ALOGV("java clients' binder died"); 1733 1734 sp<BasicClient> cameraClient = getClientByRemote(who); 1735 1736 if (cameraClient == 0) { 1737 ALOGV("java clients' binder death already cleaned up (normal case)"); 1738 return; 1739 } 1740 1741 ALOGW("Disconnecting camera client %p since the binder for it " 1742 "died (this pid %d)", cameraClient.get(), getCallingPid()); 1743 1744 cameraClient->disconnect(); 1745 1746 } 1747 1748 void CameraService::updateStatus(ICameraServiceListener::Status status, 1749 int32_t cameraId, 1750 const StatusVector *rejectSourceStates) { 1751 // do not lock mServiceLock here or can get into a deadlock from 1752 // connect() -> ProClient::disconnect -> updateStatus 1753 Mutex::Autolock lock(mStatusMutex); 1754 1755 ICameraServiceListener::Status oldStatus = mStatusList[cameraId]; 1756 1757 mStatusList[cameraId] = status; 1758 1759 if (oldStatus != status) { 1760 ALOGV("%s: Status has changed for camera ID %d from 0x%x to 0x%x", 1761 __FUNCTION__, cameraId, (uint32_t)oldStatus, (uint32_t)status); 1762 1763 if (oldStatus == ICameraServiceListener::STATUS_NOT_PRESENT && 1764 (status != ICameraServiceListener::STATUS_PRESENT && 1765 status != ICameraServiceListener::STATUS_ENUMERATING)) { 1766 1767 ALOGW("%s: From NOT_PRESENT can only transition into PRESENT" 1768 " or ENUMERATING", __FUNCTION__); 1769 mStatusList[cameraId] = oldStatus; 1770 return; 1771 } 1772 1773 if (rejectSourceStates != NULL) { 1774 const StatusVector &rejectList = *rejectSourceStates; 1775 StatusVector::const_iterator it = rejectList.begin(); 1776 1777 /** 1778 * Sometimes we want to conditionally do a transition. 1779 * For example if a client disconnects, we want to go to PRESENT 1780 * only if we weren't already in NOT_PRESENT or ENUMERATING. 1781 */ 1782 for (; it != rejectList.end(); ++it) { 1783 if (oldStatus == *it) { 1784 ALOGV("%s: Rejecting status transition for Camera ID %d, " 1785 " since the source state was was in one of the bad " 1786 " states.", __FUNCTION__, cameraId); 1787 mStatusList[cameraId] = oldStatus; 1788 return; 1789 } 1790 } 1791 } 1792 1793 /** 1794 * ProClients lose their exclusive lock. 1795 * - Done before the CameraClient can initialize the HAL device, 1796 * since we want to be able to close it before they get to initialize 1797 */ 1798 if (status == ICameraServiceListener::STATUS_NOT_AVAILABLE) { 1799 Vector<wp<ProClient> > proClients(mProClientList[cameraId]); 1800 Vector<wp<ProClient> >::const_iterator it; 1801 1802 for (it = proClients.begin(); it != proClients.end(); ++it) { 1803 sp<ProClient> proCl = it->promote(); 1804 if (proCl.get() != NULL) { 1805 proCl->onExclusiveLockStolen(); 1806 } 1807 } 1808 } 1809 1810 Vector<sp<ICameraServiceListener> >::const_iterator it; 1811 for (it = mListenerList.begin(); it != mListenerList.end(); ++it) { 1812 (*it)->onStatusChanged(status, cameraId); 1813 } 1814 } 1815 } 1816 1817 ICameraServiceListener::Status CameraService::getStatus(int cameraId) const { 1818 if (cameraId < 0 || cameraId >= MAX_CAMERAS) { 1819 ALOGE("%s: Invalid camera ID %d", __FUNCTION__, cameraId); 1820 return ICameraServiceListener::STATUS_UNKNOWN; 1821 } 1822 1823 Mutex::Autolock al(mStatusMutex); 1824 return mStatusList[cameraId]; 1825 } 1826 1827 }; // namespace android 1828