CameraService.cpp revision cd8fce8fbe0f515e53a0ea0f50b739cf42ee57a4
1/* 2 * Copyright (C) 2008 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17#define LOG_TAG "CameraService" 18//#define LOG_NDEBUG 0 19 20#include <stdio.h> 21#include <string.h> 22#include <sys/types.h> 23#include <pthread.h> 24 25#include <binder/AppOpsManager.h> 26#include <binder/IPCThreadState.h> 27#include <binder/IServiceManager.h> 28#include <binder/MemoryBase.h> 29#include <binder/MemoryHeapBase.h> 30#include <cutils/atomic.h> 31#include <cutils/properties.h> 32#include <gui/Surface.h> 33#include <hardware/hardware.h> 34#include <media/AudioSystem.h> 35#include <media/IMediaHTTPService.h> 36#include <media/mediaplayer.h> 37#include <utils/Errors.h> 38#include <utils/Log.h> 39#include <utils/String16.h> 40#include <utils/Trace.h> 41#include <system/camera_vendor_tags.h> 42#include <system/camera_metadata.h> 43#include <system/camera.h> 44 45#include "CameraService.h" 46#include "api1/CameraClient.h" 47#include "api1/Camera2Client.h" 48#include "api_pro/ProCamera2Client.h" 49#include "api2/CameraDeviceClient.h" 50#include "utils/CameraTraces.h" 51#include "CameraDeviceFactory.h" 52 53namespace android { 54 55// ---------------------------------------------------------------------------- 56// Logging support -- this is for debugging only 57// Use "adb shell dumpsys media.camera -v 1" to change it. 58volatile int32_t gLogLevel = 0; 59 60#define LOG1(...) ALOGD_IF(gLogLevel >= 1, __VA_ARGS__); 61#define LOG2(...) ALOGD_IF(gLogLevel >= 2, __VA_ARGS__); 62 63static void setLogLevel(int level) { 64 android_atomic_write(level, &gLogLevel); 65} 66 67// ---------------------------------------------------------------------------- 68 69static int getCallingPid() { 70 return IPCThreadState::self()->getCallingPid(); 71} 72 73static int getCallingUid() { 74 return IPCThreadState::self()->getCallingUid(); 75} 76 77extern "C" { 78static void camera_device_status_change( 79 const struct camera_module_callbacks* callbacks, 80 int camera_id, 81 int new_status) { 82 sp<CameraService> cs = const_cast<CameraService*>( 83 static_cast<const CameraService*>(callbacks)); 84 85 cs->onDeviceStatusChanged( 86 camera_id, 87 new_status); 88} 89} // extern "C" 90 91// ---------------------------------------------------------------------------- 92 93// This is ugly and only safe if we never re-create the CameraService, but 94// should be ok for now. 95static CameraService *gCameraService; 96 97CameraService::CameraService() 98 :mSoundRef(0), mModule(0) 99{ 100 ALOGI("CameraService started (pid=%d)", getpid()); 101 gCameraService = this; 102 103 for (size_t i = 0; i < MAX_CAMERAS; ++i) { 104 mStatusList[i] = ICameraServiceListener::STATUS_PRESENT; 105 } 106 107 this->camera_device_status_change = android::camera_device_status_change; 108} 109 110void CameraService::onFirstRef() 111{ 112 LOG1("CameraService::onFirstRef"); 113 114 BnCameraService::onFirstRef(); 115 116 if (hw_get_module(CAMERA_HARDWARE_MODULE_ID, 117 (const hw_module_t **)&mModule) < 0) { 118 ALOGE("Could not load camera HAL module"); 119 mNumberOfCameras = 0; 120 } 121 else { 122 ALOGI("Loaded \"%s\" camera module", mModule->common.name); 123 mNumberOfCameras = mModule->get_number_of_cameras(); 124 if (mNumberOfCameras > MAX_CAMERAS) { 125 ALOGE("Number of cameras(%d) > MAX_CAMERAS(%d).", 126 mNumberOfCameras, MAX_CAMERAS); 127 mNumberOfCameras = MAX_CAMERAS; 128 } 129 for (int i = 0; i < mNumberOfCameras; i++) { 130 setCameraFree(i); 131 } 132 133 if (mModule->common.module_api_version >= 134 CAMERA_MODULE_API_VERSION_2_1) { 135 mModule->set_callbacks(this); 136 } 137 138 VendorTagDescriptor::clearGlobalVendorTagDescriptor(); 139 140 if (mModule->common.module_api_version >= CAMERA_MODULE_API_VERSION_2_2) { 141 setUpVendorTags(); 142 } 143 144 CameraDeviceFactory::registerService(this); 145 } 146} 147 148CameraService::~CameraService() { 149 for (int i = 0; i < mNumberOfCameras; i++) { 150 if (mBusy[i]) { 151 ALOGE("camera %d is still in use in destructor!", i); 152 } 153 } 154 155 VendorTagDescriptor::clearGlobalVendorTagDescriptor(); 156 gCameraService = NULL; 157} 158 159void CameraService::onDeviceStatusChanged(int cameraId, 160 int newStatus) 161{ 162 ALOGI("%s: Status changed for cameraId=%d, newStatus=%d", __FUNCTION__, 163 cameraId, newStatus); 164 165 if (cameraId < 0 || cameraId >= MAX_CAMERAS) { 166 ALOGE("%s: Bad camera ID %d", __FUNCTION__, cameraId); 167 return; 168 } 169 170 if ((int)getStatus(cameraId) == newStatus) { 171 ALOGE("%s: State transition to the same status 0x%x not allowed", 172 __FUNCTION__, (uint32_t)newStatus); 173 return; 174 } 175 176 /* don't do this in updateStatus 177 since it is also called from connect and we could get into a deadlock */ 178 if (newStatus == CAMERA_DEVICE_STATUS_NOT_PRESENT) { 179 Vector<sp<BasicClient> > clientsToDisconnect; 180 { 181 Mutex::Autolock al(mServiceLock); 182 183 /* Remove cached parameters from shim cache */ 184 mShimParams.removeItem(cameraId); 185 186 /* Find all clients that we need to disconnect */ 187 sp<BasicClient> client = mClient[cameraId].promote(); 188 if (client.get() != NULL) { 189 clientsToDisconnect.push_back(client); 190 } 191 192 int i = cameraId; 193 for (size_t j = 0; j < mProClientList[i].size(); ++j) { 194 sp<ProClient> cl = mProClientList[i][j].promote(); 195 if (cl != NULL) { 196 clientsToDisconnect.push_back(cl); 197 } 198 } 199 } 200 201 /* now disconnect them. don't hold the lock 202 or we can get into a deadlock */ 203 204 for (size_t i = 0; i < clientsToDisconnect.size(); ++i) { 205 sp<BasicClient> client = clientsToDisconnect[i]; 206 207 client->disconnect(); 208 /** 209 * The remote app will no longer be able to call methods on the 210 * client since the client PID will be reset to 0 211 */ 212 } 213 214 ALOGV("%s: After unplug, disconnected %zu clients", 215 __FUNCTION__, clientsToDisconnect.size()); 216 } 217 218 updateStatus( 219 static_cast<ICameraServiceListener::Status>(newStatus), cameraId); 220 221} 222 223int32_t CameraService::getNumberOfCameras() { 224 return mNumberOfCameras; 225} 226 227status_t CameraService::getCameraInfo(int cameraId, 228 struct CameraInfo* cameraInfo) { 229 if (!mModule) { 230 return -ENODEV; 231 } 232 233 if (cameraId < 0 || cameraId >= mNumberOfCameras) { 234 return BAD_VALUE; 235 } 236 237 struct camera_info info; 238 status_t rc = mModule->get_camera_info(cameraId, &info); 239 cameraInfo->facing = info.facing; 240 cameraInfo->orientation = info.orientation; 241 return rc; 242} 243 244 245status_t CameraService::generateShimMetadata(int cameraId, /*out*/CameraMetadata* cameraInfo) { 246 status_t ret = OK; 247 struct CameraInfo info; 248 if ((ret = getCameraInfo(cameraId, &info)) != OK) { 249 return ret; 250 } 251 252 CameraMetadata shimInfo; 253 int32_t orientation = static_cast<int32_t>(info.orientation); 254 if ((ret = shimInfo.update(ANDROID_SENSOR_ORIENTATION, &orientation, 1)) != OK) { 255 return ret; 256 } 257 258 uint8_t facing = (info.facing == CAMERA_FACING_FRONT) ? 259 ANDROID_LENS_FACING_FRONT : ANDROID_LENS_FACING_BACK; 260 if ((ret = shimInfo.update(ANDROID_LENS_FACING, &facing, 1)) != OK) { 261 return ret; 262 } 263 264 CameraParameters shimParams; 265 if ((ret = getLegacyParametersLazy(cameraId, /*out*/&shimParams)) != OK) { 266 // Error logged by callee 267 return ret; 268 } 269 270 Vector<Size> sizes; 271 Vector<Size> jpegSizes; 272 Vector<int32_t> formats; 273 const char* supportedPreviewFormats; 274 { 275 shimParams.getSupportedPreviewSizes(/*out*/sizes); 276 shimParams.getSupportedPreviewFormats(/*out*/formats); 277 shimParams.getSupportedPictureSizes(/*out*/jpegSizes); 278 } 279 280 // Always include IMPLEMENTATION_DEFINED 281 formats.add(HAL_PIXEL_FORMAT_IMPLEMENTATION_DEFINED); 282 283 const size_t INTS_PER_CONFIG = 4; 284 285 // Build available stream configurations metadata 286 size_t streamConfigSize = (sizes.size() * formats.size() + jpegSizes.size()) * INTS_PER_CONFIG; 287 288 Vector<int32_t> streamConfigs; 289 streamConfigs.setCapacity(streamConfigSize); 290 291 for (size_t i = 0; i < formats.size(); ++i) { 292 for (size_t j = 0; j < sizes.size(); ++j) { 293 streamConfigs.add(formats[i]); 294 streamConfigs.add(sizes[j].width); 295 streamConfigs.add(sizes[j].height); 296 streamConfigs.add(ANDROID_SCALER_AVAILABLE_STREAM_CONFIGURATIONS_OUTPUT); 297 } 298 } 299 300 for (size_t i = 0; i < jpegSizes.size(); ++i) { 301 streamConfigs.add(HAL_PIXEL_FORMAT_BLOB); 302 streamConfigs.add(jpegSizes[i].width); 303 streamConfigs.add(jpegSizes[i].height); 304 streamConfigs.add(ANDROID_SCALER_AVAILABLE_STREAM_CONFIGURATIONS_OUTPUT); 305 } 306 307 if ((ret = shimInfo.update(ANDROID_SCALER_AVAILABLE_STREAM_CONFIGURATIONS, 308 streamConfigs.array(), streamConfigSize)) != OK) { 309 return ret; 310 } 311 312 int64_t fakeMinFrames[0]; 313 // TODO: Fixme, don't fake min frame durations. 314 if ((ret = shimInfo.update(ANDROID_SCALER_AVAILABLE_MIN_FRAME_DURATIONS, 315 fakeMinFrames, 0)) != OK) { 316 return ret; 317 } 318 319 int64_t fakeStalls[0]; 320 // TODO: Fixme, don't fake stall durations. 321 if ((ret = shimInfo.update(ANDROID_SCALER_AVAILABLE_STALL_DURATIONS, 322 fakeStalls, 0)) != OK) { 323 return ret; 324 } 325 326 *cameraInfo = shimInfo; 327 return OK; 328} 329 330status_t CameraService::getCameraCharacteristics(int cameraId, 331 CameraMetadata* cameraInfo) { 332 if (!cameraInfo) { 333 ALOGE("%s: cameraInfo is NULL", __FUNCTION__); 334 return BAD_VALUE; 335 } 336 337 if (!mModule) { 338 ALOGE("%s: camera hardware module doesn't exist", __FUNCTION__); 339 return -ENODEV; 340 } 341 342 if (cameraId < 0 || cameraId >= mNumberOfCameras) { 343 ALOGE("%s: Invalid camera id: %d", __FUNCTION__, cameraId); 344 return BAD_VALUE; 345 } 346 347 int facing; 348 status_t ret = OK; 349 if (mModule->common.module_api_version < CAMERA_MODULE_API_VERSION_2_0 || 350 getDeviceVersion(cameraId, &facing) <= CAMERA_DEVICE_API_VERSION_2_1 ) { 351 /** 352 * Backwards compatibility mode for old HALs: 353 * - Convert CameraInfo into static CameraMetadata properties. 354 * - Retrieve cached CameraParameters for this camera. If none exist, 355 * attempt to open CameraClient and retrieve the CameraParameters. 356 * - Convert cached CameraParameters into static CameraMetadata 357 * properties. 358 */ 359 ALOGI("%s: Switching to HAL1 shim implementation...", __FUNCTION__); 360 361 if ((ret = generateShimMetadata(cameraId, cameraInfo)) != OK) { 362 return ret; 363 } 364 365 } else { 366 /** 367 * Normal HAL 2.1+ codepath. 368 */ 369 struct camera_info info; 370 ret = mModule->get_camera_info(cameraId, &info); 371 *cameraInfo = info.static_camera_characteristics; 372 } 373 374 return ret; 375} 376 377status_t CameraService::getCameraVendorTagDescriptor(/*out*/sp<VendorTagDescriptor>& desc) { 378 if (!mModule) { 379 ALOGE("%s: camera hardware module doesn't exist", __FUNCTION__); 380 return -ENODEV; 381 } 382 383 desc = VendorTagDescriptor::getGlobalVendorTagDescriptor(); 384 return OK; 385} 386 387int CameraService::getDeviceVersion(int cameraId, int* facing) { 388 struct camera_info info; 389 if (mModule->get_camera_info(cameraId, &info) != OK) { 390 return -1; 391 } 392 393 int deviceVersion; 394 if (mModule->common.module_api_version >= CAMERA_MODULE_API_VERSION_2_0) { 395 deviceVersion = info.device_version; 396 } else { 397 deviceVersion = CAMERA_DEVICE_API_VERSION_1_0; 398 } 399 400 if (facing) { 401 *facing = info.facing; 402 } 403 404 return deviceVersion; 405} 406 407bool CameraService::isValidCameraId(int cameraId) { 408 int facing; 409 int deviceVersion = getDeviceVersion(cameraId, &facing); 410 411 switch(deviceVersion) { 412 case CAMERA_DEVICE_API_VERSION_1_0: 413 case CAMERA_DEVICE_API_VERSION_2_0: 414 case CAMERA_DEVICE_API_VERSION_2_1: 415 case CAMERA_DEVICE_API_VERSION_3_0: 416 case CAMERA_DEVICE_API_VERSION_3_1: 417 case CAMERA_DEVICE_API_VERSION_3_2: 418 return true; 419 default: 420 return false; 421 } 422 423 return false; 424} 425 426bool CameraService::setUpVendorTags() { 427 vendor_tag_ops_t vOps = vendor_tag_ops_t(); 428 429 // Check if vendor operations have been implemented 430 if (mModule->get_vendor_tag_ops == NULL) { 431 ALOGI("%s: No vendor tags defined for this device.", __FUNCTION__); 432 return false; 433 } 434 435 ATRACE_BEGIN("camera3->get_metadata_vendor_tag_ops"); 436 mModule->get_vendor_tag_ops(&vOps); 437 ATRACE_END(); 438 439 // Ensure all vendor operations are present 440 if (vOps.get_tag_count == NULL || vOps.get_all_tags == NULL || 441 vOps.get_section_name == NULL || vOps.get_tag_name == NULL || 442 vOps.get_tag_type == NULL) { 443 ALOGE("%s: Vendor tag operations not fully defined. Ignoring definitions." 444 , __FUNCTION__); 445 return false; 446 } 447 448 // Read all vendor tag definitions into a descriptor 449 sp<VendorTagDescriptor> desc; 450 status_t res; 451 if ((res = VendorTagDescriptor::createDescriptorFromOps(&vOps, /*out*/desc)) 452 != OK) { 453 ALOGE("%s: Could not generate descriptor from vendor tag operations," 454 "received error %s (%d). Camera clients will not be able to use" 455 "vendor tags", __FUNCTION__, strerror(res), res); 456 return false; 457 } 458 459 // Set the global descriptor to use with camera metadata 460 VendorTagDescriptor::setAsGlobalVendorTagDescriptor(desc); 461 return true; 462} 463 464status_t CameraService::initializeShimMetadata(int cameraId) { 465 int pid = getCallingPid(); 466 int uid = getCallingUid(); 467 status_t ret = validateConnect(cameraId, uid); 468 if (ret != OK) { 469 // Error already logged by callee 470 return ret; 471 } 472 473 bool needsNewClient = false; 474 sp<Client> client; 475 476 String16 internalPackageName("media"); 477 { // Scope for service lock 478 Mutex::Autolock lock(mServiceLock); 479 if (mClient[cameraId] != NULL) { 480 client = static_cast<Client*>(mClient[cameraId].promote().get()); 481 } 482 if (client == NULL) { 483 needsNewClient = true; 484 ret = connectHelperLocked(/*cameraClient*/NULL, // Empty binder callbacks 485 cameraId, 486 internalPackageName, 487 uid, 488 pid, 489 client); 490 491 if (ret != OK) { 492 // Error already logged by callee 493 return ret; 494 } 495 } 496 497 if (client == NULL) { 498 ALOGE("%s: Could not connect to client camera device.", __FUNCTION__); 499 return BAD_VALUE; 500 } 501 502 String8 rawParams = client->getParameters(); 503 CameraParameters params(rawParams); 504 mShimParams.add(cameraId, params); 505 } 506 507 // Close client if one was opened solely for this call 508 if (needsNewClient) { 509 client->disconnect(); 510 } 511 return OK; 512} 513 514status_t CameraService::getLegacyParametersLazy(int cameraId, 515 /*out*/ 516 CameraParameters* parameters) { 517 518 ALOGV("%s: for cameraId: %d", __FUNCTION__, cameraId); 519 520 status_t ret = 0; 521 522 if (parameters == NULL) { 523 ALOGE("%s: parameters must not be null", __FUNCTION__); 524 return BAD_VALUE; 525 } 526 527 ssize_t index = -1; 528 { // Scope for service lock 529 Mutex::Autolock lock(mServiceLock); 530 index = mShimParams.indexOfKey(cameraId); 531 // Release service lock so initializeShimMetadata can be called correctly. 532 533 if (index >= 0) { 534 *parameters = mShimParams[index]; 535 } 536 } 537 538 if (index < 0) { 539 int64_t token = IPCThreadState::self()->clearCallingIdentity(); 540 ret = initializeShimMetadata(cameraId); 541 IPCThreadState::self()->restoreCallingIdentity(token); 542 if (ret != OK) { 543 // Error already logged by callee 544 return ret; 545 } 546 547 { // Scope for service lock 548 Mutex::Autolock lock(mServiceLock); 549 index = mShimParams.indexOfKey(cameraId); 550 551 LOG_ALWAYS_FATAL_IF(index < 0, "index should have been initialized"); 552 553 *parameters = mShimParams[index]; 554 } 555 } 556 557 return OK; 558} 559 560status_t CameraService::validateConnect(int cameraId, 561 /*inout*/ 562 int& clientUid) const { 563 564 int callingPid = getCallingPid(); 565 566 if (clientUid == USE_CALLING_UID) { 567 clientUid = getCallingUid(); 568 } else { 569 // We only trust our own process to forward client UIDs 570 if (callingPid != getpid()) { 571 ALOGE("CameraService::connect X (pid %d) rejected (don't trust clientUid)", 572 callingPid); 573 return PERMISSION_DENIED; 574 } 575 } 576 577 if (!mModule) { 578 ALOGE("Camera HAL module not loaded"); 579 return -ENODEV; 580 } 581 582 if (cameraId < 0 || cameraId >= mNumberOfCameras) { 583 ALOGE("CameraService::connect X (pid %d) rejected (invalid cameraId %d).", 584 callingPid, cameraId); 585 return -ENODEV; 586 } 587 588 char value[PROPERTY_VALUE_MAX]; 589 property_get("sys.secpolicy.camera.disabled", value, "0"); 590 if (strcmp(value, "1") == 0) { 591 // Camera is disabled by DevicePolicyManager. 592 ALOGI("Camera is disabled. connect X (pid %d) rejected", callingPid); 593 return -EACCES; 594 } 595 596 ICameraServiceListener::Status currentStatus = getStatus(cameraId); 597 if (currentStatus == ICameraServiceListener::STATUS_NOT_PRESENT) { 598 ALOGI("Camera is not plugged in," 599 " connect X (pid %d) rejected", callingPid); 600 return -ENODEV; 601 } else if (currentStatus == ICameraServiceListener::STATUS_ENUMERATING) { 602 ALOGI("Camera is enumerating," 603 " connect X (pid %d) rejected", callingPid); 604 return -EBUSY; 605 } 606 // Else don't check for STATUS_NOT_AVAILABLE. 607 // -- It's done implicitly in canConnectUnsafe /w the mBusy array 608 609 return OK; 610} 611 612bool CameraService::canConnectUnsafe(int cameraId, 613 const String16& clientPackageName, 614 const sp<IBinder>& remoteCallback, 615 sp<BasicClient> &client) { 616 String8 clientName8(clientPackageName); 617 int callingPid = getCallingPid(); 618 619 if (mClient[cameraId] != 0) { 620 client = mClient[cameraId].promote(); 621 if (client != 0) { 622 if (remoteCallback == client->getRemote()) { 623 LOG1("CameraService::connect X (pid %d) (the same client)", 624 callingPid); 625 return true; 626 } else { 627 // TODOSC: need to support 1 regular client, 628 // multiple shared clients here 629 ALOGW("CameraService::connect X (pid %d) rejected" 630 " (existing client).", callingPid); 631 return false; 632 } 633 } 634 mClient[cameraId].clear(); 635 } 636 637 /* 638 mBusy is set to false as the last step of the Client destructor, 639 after which it is guaranteed that the Client destructor has finished ( 640 including any inherited destructors) 641 642 We only need this for a Client subclasses since we don't allow 643 multiple Clents to be opened concurrently, but multiple BasicClient 644 would be fine 645 */ 646 if (mBusy[cameraId]) { 647 ALOGW("CameraService::connect X (pid %d, \"%s\") rejected" 648 " (camera %d is still busy).", callingPid, 649 clientName8.string(), cameraId); 650 return false; 651 } 652 653 return true; 654} 655 656status_t CameraService::connectHelperLocked(const sp<ICameraClient>& cameraClient, 657 int cameraId, 658 const String16& clientPackageName, 659 int clientUid, 660 int callingPid, 661 /*out*/ 662 sp<Client>& client, 663 int halVersion) { 664 665 int facing = -1; 666 int deviceVersion = getDeviceVersion(cameraId, &facing); 667 668 // If there are other non-exclusive users of the camera, 669 // this will tear them down before we can reuse the camera 670 if (isValidCameraId(cameraId)) { 671 // transition from PRESENT -> NOT_AVAILABLE 672 updateStatus(ICameraServiceListener::STATUS_NOT_AVAILABLE, 673 cameraId); 674 } 675 676 if (halVersion < 0 || halVersion == deviceVersion) { 677 // Default path: HAL version is unspecified by caller, create CameraClient 678 // based on device version reported by the HAL. 679 switch(deviceVersion) { 680 case CAMERA_DEVICE_API_VERSION_1_0: 681 client = new CameraClient(this, cameraClient, 682 clientPackageName, cameraId, 683 facing, callingPid, clientUid, getpid()); 684 break; 685 case CAMERA_DEVICE_API_VERSION_2_0: 686 case CAMERA_DEVICE_API_VERSION_2_1: 687 case CAMERA_DEVICE_API_VERSION_3_0: 688 case CAMERA_DEVICE_API_VERSION_3_1: 689 case CAMERA_DEVICE_API_VERSION_3_2: 690 client = new Camera2Client(this, cameraClient, 691 clientPackageName, cameraId, 692 facing, callingPid, clientUid, getpid()); 693 break; 694 case -1: 695 ALOGE("Invalid camera id %d", cameraId); 696 return BAD_VALUE; 697 default: 698 ALOGE("Unknown camera device HAL version: %d", deviceVersion); 699 return INVALID_OPERATION; 700 } 701 } else { 702 // A particular HAL version is requested by caller. Create CameraClient 703 // based on the requested HAL version. 704 if (deviceVersion > CAMERA_DEVICE_API_VERSION_1_0 && 705 halVersion == CAMERA_DEVICE_API_VERSION_1_0) { 706 // Only support higher HAL version device opened as HAL1.0 device. 707 client = new CameraClient(this, cameraClient, 708 clientPackageName, cameraId, 709 facing, callingPid, clientUid, getpid()); 710 } else { 711 // Other combinations (e.g. HAL3.x open as HAL2.x) are not supported yet. 712 ALOGE("Invalid camera HAL version %x: HAL %x device can only be" 713 " opened as HAL %x device", halVersion, deviceVersion, 714 CAMERA_DEVICE_API_VERSION_1_0); 715 return INVALID_OPERATION; 716 } 717 } 718 719 status_t status = connectFinishUnsafe(client, client->getRemote()); 720 if (status != OK) { 721 // this is probably not recoverable.. maybe the client can try again 722 // OK: we can only get here if we were originally in PRESENT state 723 updateStatus(ICameraServiceListener::STATUS_PRESENT, cameraId); 724 return status; 725 } 726 727 mClient[cameraId] = client; 728 LOG1("CameraService::connect X (id %d, this pid is %d)", cameraId, 729 getpid()); 730 731 return OK; 732} 733 734status_t CameraService::connect( 735 const sp<ICameraClient>& cameraClient, 736 int cameraId, 737 const String16& clientPackageName, 738 int clientUid, 739 /*out*/ 740 sp<ICamera>& device) { 741 742 String8 clientName8(clientPackageName); 743 int callingPid = getCallingPid(); 744 745 LOG1("CameraService::connect E (pid %d \"%s\", id %d)", callingPid, 746 clientName8.string(), cameraId); 747 748 status_t status = validateConnect(cameraId, /*inout*/clientUid); 749 if (status != OK) { 750 return status; 751 } 752 753 754 sp<Client> client; 755 { 756 Mutex::Autolock lock(mServiceLock); 757 sp<BasicClient> clientTmp; 758 if (!canConnectUnsafe(cameraId, clientPackageName, 759 cameraClient->asBinder(), 760 /*out*/clientTmp)) { 761 return -EBUSY; 762 } else if (client.get() != NULL) { 763 device = static_cast<Client*>(clientTmp.get()); 764 return OK; 765 } 766 767 status = connectHelperLocked(cameraClient, 768 cameraId, 769 clientPackageName, 770 clientUid, 771 callingPid, 772 client); 773 if (status != OK) { 774 return status; 775 } 776 777 } 778 // important: release the mutex here so the client can call back 779 // into the service from its destructor (can be at the end of the call) 780 781 device = client; 782 return OK; 783} 784 785status_t CameraService::connectLegacy( 786 const sp<ICameraClient>& cameraClient, 787 int cameraId, int halVersion, 788 const String16& clientPackageName, 789 int clientUid, 790 /*out*/ 791 sp<ICamera>& device) { 792 793 if (halVersion != CAMERA_HAL_API_VERSION_UNSPECIFIED && 794 mModule->common.module_api_version < CAMERA_MODULE_API_VERSION_2_3) { 795 /* 796 * Either the HAL version is unspecified in which case this just creates 797 * a camera client selected by the latest device version, or 798 * it's a particular version in which case the HAL must supported 799 * the open_legacy call 800 */ 801 ALOGE("%s: camera HAL module version %x doesn't support connecting to legacy HAL devices!", 802 __FUNCTION__, mModule->common.module_api_version); 803 return INVALID_OPERATION; 804 } 805 806 String8 clientName8(clientPackageName); 807 int callingPid = getCallingPid(); 808 809 LOG1("CameraService::connect legacy E (pid %d \"%s\", id %d)", callingPid, 810 clientName8.string(), cameraId); 811 812 status_t status = validateConnect(cameraId, /*inout*/clientUid); 813 if (status != OK) { 814 return status; 815 } 816 817 sp<Client> client; 818 { 819 Mutex::Autolock lock(mServiceLock); 820 sp<BasicClient> clientTmp; 821 if (!canConnectUnsafe(cameraId, clientPackageName, 822 cameraClient->asBinder(), 823 /*out*/clientTmp)) { 824 return -EBUSY; 825 } else if (client.get() != NULL) { 826 device = static_cast<Client*>(clientTmp.get()); 827 return OK; 828 } 829 830 status = connectHelperLocked(cameraClient, 831 cameraId, 832 clientPackageName, 833 clientUid, 834 callingPid, 835 client, 836 halVersion); 837 if (status != OK) { 838 return status; 839 } 840 841 } 842 // important: release the mutex here so the client can call back 843 // into the service from its destructor (can be at the end of the call) 844 845 device = client; 846 return OK; 847} 848 849status_t CameraService::connectFinishUnsafe(const sp<BasicClient>& client, 850 const sp<IBinder>& remoteCallback) { 851 status_t status = client->initialize(mModule); 852 if (status != OK) { 853 return status; 854 } 855 if (remoteCallback != NULL) { 856 remoteCallback->linkToDeath(this); 857 } 858 859 return OK; 860} 861 862status_t CameraService::connectPro( 863 const sp<IProCameraCallbacks>& cameraCb, 864 int cameraId, 865 const String16& clientPackageName, 866 int clientUid, 867 /*out*/ 868 sp<IProCameraUser>& device) 869{ 870 if (cameraCb == 0) { 871 ALOGE("%s: Callback must not be null", __FUNCTION__); 872 return BAD_VALUE; 873 } 874 875 String8 clientName8(clientPackageName); 876 int callingPid = getCallingPid(); 877 878 LOG1("CameraService::connectPro E (pid %d \"%s\", id %d)", callingPid, 879 clientName8.string(), cameraId); 880 status_t status = validateConnect(cameraId, /*inout*/clientUid); 881 if (status != OK) { 882 return status; 883 } 884 885 sp<ProClient> client; 886 { 887 Mutex::Autolock lock(mServiceLock); 888 { 889 sp<BasicClient> client; 890 if (!canConnectUnsafe(cameraId, clientPackageName, 891 cameraCb->asBinder(), 892 /*out*/client)) { 893 return -EBUSY; 894 } 895 } 896 897 int facing = -1; 898 int deviceVersion = getDeviceVersion(cameraId, &facing); 899 900 switch(deviceVersion) { 901 case CAMERA_DEVICE_API_VERSION_1_0: 902 ALOGE("Camera id %d uses HALv1, doesn't support ProCamera", 903 cameraId); 904 return -EOPNOTSUPP; 905 break; 906 case CAMERA_DEVICE_API_VERSION_2_0: 907 case CAMERA_DEVICE_API_VERSION_2_1: 908 case CAMERA_DEVICE_API_VERSION_3_0: 909 case CAMERA_DEVICE_API_VERSION_3_1: 910 case CAMERA_DEVICE_API_VERSION_3_2: 911 client = new ProCamera2Client(this, cameraCb, clientPackageName, 912 cameraId, facing, callingPid, clientUid, getpid()); 913 break; 914 case -1: 915 ALOGE("Invalid camera id %d", cameraId); 916 return BAD_VALUE; 917 default: 918 ALOGE("Unknown camera device HAL version: %d", deviceVersion); 919 return INVALID_OPERATION; 920 } 921 922 status_t status = connectFinishUnsafe(client, client->getRemote()); 923 if (status != OK) { 924 return status; 925 } 926 927 mProClientList[cameraId].push(client); 928 929 LOG1("CameraService::connectPro X (id %d, this pid is %d)", cameraId, 930 getpid()); 931 } 932 // important: release the mutex here so the client can call back 933 // into the service from its destructor (can be at the end of the call) 934 device = client; 935 return OK; 936} 937 938status_t CameraService::connectDevice( 939 const sp<ICameraDeviceCallbacks>& cameraCb, 940 int cameraId, 941 const String16& clientPackageName, 942 int clientUid, 943 /*out*/ 944 sp<ICameraDeviceUser>& device) 945{ 946 947 String8 clientName8(clientPackageName); 948 int callingPid = getCallingPid(); 949 950 LOG1("CameraService::connectDevice E (pid %d \"%s\", id %d)", callingPid, 951 clientName8.string(), cameraId); 952 953 status_t status = validateConnect(cameraId, /*inout*/clientUid); 954 if (status != OK) { 955 return status; 956 } 957 958 sp<CameraDeviceClient> client; 959 { 960 Mutex::Autolock lock(mServiceLock); 961 { 962 sp<BasicClient> client; 963 if (!canConnectUnsafe(cameraId, clientPackageName, 964 cameraCb->asBinder(), 965 /*out*/client)) { 966 return -EBUSY; 967 } 968 } 969 970 int facing = -1; 971 int deviceVersion = getDeviceVersion(cameraId, &facing); 972 973 // If there are other non-exclusive users of the camera, 974 // this will tear them down before we can reuse the camera 975 if (isValidCameraId(cameraId)) { 976 // transition from PRESENT -> NOT_AVAILABLE 977 updateStatus(ICameraServiceListener::STATUS_NOT_AVAILABLE, 978 cameraId); 979 } 980 981 switch(deviceVersion) { 982 case CAMERA_DEVICE_API_VERSION_1_0: 983 ALOGW("Camera using old HAL version: %d", deviceVersion); 984 return -EOPNOTSUPP; 985 // TODO: don't allow 2.0 Only allow 2.1 and higher 986 case CAMERA_DEVICE_API_VERSION_2_0: 987 case CAMERA_DEVICE_API_VERSION_2_1: 988 case CAMERA_DEVICE_API_VERSION_3_0: 989 case CAMERA_DEVICE_API_VERSION_3_1: 990 case CAMERA_DEVICE_API_VERSION_3_2: 991 client = new CameraDeviceClient(this, cameraCb, clientPackageName, 992 cameraId, facing, callingPid, clientUid, getpid()); 993 break; 994 case -1: 995 ALOGE("Invalid camera id %d", cameraId); 996 return BAD_VALUE; 997 default: 998 ALOGE("Unknown camera device HAL version: %d", deviceVersion); 999 return INVALID_OPERATION; 1000 } 1001 1002 status_t status = connectFinishUnsafe(client, client->getRemote()); 1003 if (status != OK) { 1004 // this is probably not recoverable.. maybe the client can try again 1005 // OK: we can only get here if we were originally in PRESENT state 1006 updateStatus(ICameraServiceListener::STATUS_PRESENT, cameraId); 1007 return status; 1008 } 1009 1010 LOG1("CameraService::connectDevice X (id %d, this pid is %d)", cameraId, 1011 getpid()); 1012 1013 mClient[cameraId] = client; 1014 } 1015 // important: release the mutex here so the client can call back 1016 // into the service from its destructor (can be at the end of the call) 1017 1018 device = client; 1019 return OK; 1020} 1021 1022 1023status_t CameraService::addListener( 1024 const sp<ICameraServiceListener>& listener) { 1025 ALOGV("%s: Add listener %p", __FUNCTION__, listener.get()); 1026 1027 if (listener == 0) { 1028 ALOGE("%s: Listener must not be null", __FUNCTION__); 1029 return BAD_VALUE; 1030 } 1031 1032 Mutex::Autolock lock(mServiceLock); 1033 1034 Vector<sp<ICameraServiceListener> >::iterator it, end; 1035 for (it = mListenerList.begin(); it != mListenerList.end(); ++it) { 1036 if ((*it)->asBinder() == listener->asBinder()) { 1037 ALOGW("%s: Tried to add listener %p which was already subscribed", 1038 __FUNCTION__, listener.get()); 1039 return ALREADY_EXISTS; 1040 } 1041 } 1042 1043 mListenerList.push_back(listener); 1044 1045 /* Immediately signal current status to this listener only */ 1046 { 1047 Mutex::Autolock m(mStatusMutex) ; 1048 int numCams = getNumberOfCameras(); 1049 for (int i = 0; i < numCams; ++i) { 1050 listener->onStatusChanged(mStatusList[i], i); 1051 } 1052 } 1053 1054 return OK; 1055} 1056status_t CameraService::removeListener( 1057 const sp<ICameraServiceListener>& listener) { 1058 ALOGV("%s: Remove listener %p", __FUNCTION__, listener.get()); 1059 1060 if (listener == 0) { 1061 ALOGE("%s: Listener must not be null", __FUNCTION__); 1062 return BAD_VALUE; 1063 } 1064 1065 Mutex::Autolock lock(mServiceLock); 1066 1067 Vector<sp<ICameraServiceListener> >::iterator it; 1068 for (it = mListenerList.begin(); it != mListenerList.end(); ++it) { 1069 if ((*it)->asBinder() == listener->asBinder()) { 1070 mListenerList.erase(it); 1071 return OK; 1072 } 1073 } 1074 1075 ALOGW("%s: Tried to remove a listener %p which was not subscribed", 1076 __FUNCTION__, listener.get()); 1077 1078 return BAD_VALUE; 1079} 1080 1081status_t CameraService::getLegacyParameters( 1082 int cameraId, 1083 /*out*/ 1084 String16* parameters) { 1085 ALOGV("%s: for camera ID = %d", __FUNCTION__, cameraId); 1086 1087 if (parameters == NULL) { 1088 ALOGE("%s: parameters must not be null", __FUNCTION__); 1089 return BAD_VALUE; 1090 } 1091 1092 status_t ret = 0; 1093 1094 CameraParameters shimParams; 1095 if ((ret = getLegacyParametersLazy(cameraId, /*out*/&shimParams)) != OK) { 1096 // Error logged by caller 1097 return ret; 1098 } 1099 1100 String8 shimParamsString8 = shimParams.flatten(); 1101 String16 shimParamsString16 = String16(shimParamsString8); 1102 1103 *parameters = shimParamsString16; 1104 1105 return OK; 1106} 1107 1108status_t CameraService::supportsCameraApi(int cameraId, int apiVersion) { 1109 ALOGV("%s: for camera ID = %d", __FUNCTION__, cameraId); 1110 1111 switch (apiVersion) { 1112 case API_VERSION_1: 1113 case API_VERSION_2: 1114 break; 1115 default: 1116 ALOGE("%s: Bad API version %d", __FUNCTION__, apiVersion); 1117 return BAD_VALUE; 1118 } 1119 1120 int facing = -1; 1121 int deviceVersion = getDeviceVersion(cameraId, &facing); 1122 1123 switch(deviceVersion) { 1124 case CAMERA_DEVICE_API_VERSION_1_0: 1125 case CAMERA_DEVICE_API_VERSION_2_0: 1126 case CAMERA_DEVICE_API_VERSION_2_1: 1127 case CAMERA_DEVICE_API_VERSION_3_0: 1128 case CAMERA_DEVICE_API_VERSION_3_1: 1129 if (apiVersion == API_VERSION_2) { 1130 ALOGV("%s: Camera id %d uses HAL prior to HAL3.2, doesn't support api2 without shim", 1131 __FUNCTION__, cameraId); 1132 return -EOPNOTSUPP; 1133 } else { // if (apiVersion == API_VERSION_1) { 1134 ALOGV("%s: Camera id %d uses older HAL before 3.2, but api1 is always supported", 1135 __FUNCTION__, cameraId); 1136 return OK; 1137 } 1138 case CAMERA_DEVICE_API_VERSION_3_2: 1139 ALOGV("%s: Camera id %d uses HAL3.2 or newer, supports api1/api2 directly", 1140 __FUNCTION__, cameraId); 1141 return OK; 1142 case -1: 1143 ALOGE("%s: Invalid camera id %d", __FUNCTION__, cameraId); 1144 return BAD_VALUE; 1145 default: 1146 ALOGE("%s: Unknown camera device HAL version: %d", __FUNCTION__, deviceVersion); 1147 return INVALID_OPERATION; 1148 } 1149 1150 return OK; 1151} 1152 1153void CameraService::removeClientByRemote(const wp<IBinder>& remoteBinder) { 1154 int callingPid = getCallingPid(); 1155 LOG1("CameraService::removeClientByRemote E (pid %d)", callingPid); 1156 1157 // Declare this before the lock to make absolutely sure the 1158 // destructor won't be called with the lock held. 1159 Mutex::Autolock lock(mServiceLock); 1160 1161 int outIndex; 1162 sp<BasicClient> client = findClientUnsafe(remoteBinder, outIndex); 1163 1164 if (client != 0) { 1165 // Found our camera, clear and leave. 1166 LOG1("removeClient: clear camera %d", outIndex); 1167 1168 sp<IBinder> remote = client->getRemote(); 1169 if (remote != NULL) { 1170 remote->unlinkToDeath(this); 1171 } 1172 1173 mClient[outIndex].clear(); 1174 } else { 1175 1176 sp<ProClient> clientPro = findProClientUnsafe(remoteBinder); 1177 1178 if (clientPro != NULL) { 1179 // Found our camera, clear and leave. 1180 LOG1("removeClient: clear pro %p", clientPro.get()); 1181 1182 clientPro->getRemoteCallback()->asBinder()->unlinkToDeath(this); 1183 } 1184 } 1185 1186 LOG1("CameraService::removeClientByRemote X (pid %d)", callingPid); 1187} 1188 1189sp<CameraService::ProClient> CameraService::findProClientUnsafe( 1190 const wp<IBinder>& cameraCallbacksRemote) 1191{ 1192 sp<ProClient> clientPro; 1193 1194 for (int i = 0; i < mNumberOfCameras; ++i) { 1195 Vector<size_t> removeIdx; 1196 1197 for (size_t j = 0; j < mProClientList[i].size(); ++j) { 1198 wp<ProClient> cl = mProClientList[i][j]; 1199 1200 sp<ProClient> clStrong = cl.promote(); 1201 if (clStrong != NULL && clStrong->getRemote() == cameraCallbacksRemote) { 1202 clientPro = clStrong; 1203 break; 1204 } else if (clStrong == NULL) { 1205 // mark to clean up dead ptr 1206 removeIdx.push(j); 1207 } 1208 } 1209 1210 // remove stale ptrs (in reverse so the indices dont change) 1211 for (ssize_t j = (ssize_t)removeIdx.size() - 1; j >= 0; --j) { 1212 mProClientList[i].removeAt(removeIdx[j]); 1213 } 1214 1215 } 1216 1217 return clientPro; 1218} 1219 1220sp<CameraService::BasicClient> CameraService::findClientUnsafe( 1221 const wp<IBinder>& cameraClient, int& outIndex) { 1222 sp<BasicClient> client; 1223 1224 for (int i = 0; i < mNumberOfCameras; i++) { 1225 1226 // This happens when we have already disconnected (or this is 1227 // just another unused camera). 1228 if (mClient[i] == 0) continue; 1229 1230 // Promote mClient. It can fail if we are called from this path: 1231 // Client::~Client() -> disconnect() -> removeClientByRemote(). 1232 client = mClient[i].promote(); 1233 1234 // Clean up stale client entry 1235 if (client == NULL) { 1236 mClient[i].clear(); 1237 continue; 1238 } 1239 1240 if (cameraClient == client->getRemote()) { 1241 // Found our camera 1242 outIndex = i; 1243 return client; 1244 } 1245 } 1246 1247 outIndex = -1; 1248 return NULL; 1249} 1250 1251CameraService::BasicClient* CameraService::getClientByIdUnsafe(int cameraId) { 1252 if (cameraId < 0 || cameraId >= mNumberOfCameras) return NULL; 1253 return mClient[cameraId].unsafe_get(); 1254} 1255 1256Mutex* CameraService::getClientLockById(int cameraId) { 1257 if (cameraId < 0 || cameraId >= mNumberOfCameras) return NULL; 1258 return &mClientLock[cameraId]; 1259} 1260 1261sp<CameraService::BasicClient> CameraService::getClientByRemote( 1262 const wp<IBinder>& cameraClient) { 1263 1264 // Declare this before the lock to make absolutely sure the 1265 // destructor won't be called with the lock held. 1266 sp<BasicClient> client; 1267 1268 Mutex::Autolock lock(mServiceLock); 1269 1270 int outIndex; 1271 client = findClientUnsafe(cameraClient, outIndex); 1272 1273 return client; 1274} 1275 1276status_t CameraService::onTransact( 1277 uint32_t code, const Parcel& data, Parcel* reply, uint32_t flags) { 1278 // Permission checks 1279 switch (code) { 1280 case BnCameraService::CONNECT: 1281 case BnCameraService::CONNECT_PRO: 1282 case BnCameraService::CONNECT_DEVICE: 1283 case BnCameraService::CONNECT_LEGACY: 1284 const int pid = getCallingPid(); 1285 const int self_pid = getpid(); 1286 if (pid != self_pid) { 1287 // we're called from a different process, do the real check 1288 if (!checkCallingPermission( 1289 String16("android.permission.CAMERA"))) { 1290 const int uid = getCallingUid(); 1291 ALOGE("Permission Denial: " 1292 "can't use the camera pid=%d, uid=%d", pid, uid); 1293 return PERMISSION_DENIED; 1294 } 1295 } 1296 break; 1297 } 1298 1299 return BnCameraService::onTransact(code, data, reply, flags); 1300} 1301 1302// The reason we need this busy bit is a new CameraService::connect() request 1303// may come in while the previous Client's destructor has not been run or is 1304// still running. If the last strong reference of the previous Client is gone 1305// but the destructor has not been finished, we should not allow the new Client 1306// to be created because we need to wait for the previous Client to tear down 1307// the hardware first. 1308void CameraService::setCameraBusy(int cameraId) { 1309 android_atomic_write(1, &mBusy[cameraId]); 1310 1311 ALOGV("setCameraBusy cameraId=%d", cameraId); 1312} 1313 1314void CameraService::setCameraFree(int cameraId) { 1315 android_atomic_write(0, &mBusy[cameraId]); 1316 1317 ALOGV("setCameraFree cameraId=%d", cameraId); 1318} 1319 1320// We share the media players for shutter and recording sound for all clients. 1321// A reference count is kept to determine when we will actually release the 1322// media players. 1323 1324MediaPlayer* CameraService::newMediaPlayer(const char *file) { 1325 MediaPlayer* mp = new MediaPlayer(); 1326 if (mp->setDataSource(NULL /* httpService */, file, NULL) == NO_ERROR) { 1327 mp->setAudioStreamType(AUDIO_STREAM_ENFORCED_AUDIBLE); 1328 mp->prepare(); 1329 } else { 1330 ALOGE("Failed to load CameraService sounds: %s", file); 1331 return NULL; 1332 } 1333 return mp; 1334} 1335 1336void CameraService::loadSound() { 1337 Mutex::Autolock lock(mSoundLock); 1338 LOG1("CameraService::loadSound ref=%d", mSoundRef); 1339 if (mSoundRef++) return; 1340 1341 mSoundPlayer[SOUND_SHUTTER] = newMediaPlayer("/system/media/audio/ui/camera_click.ogg"); 1342 mSoundPlayer[SOUND_RECORDING] = newMediaPlayer("/system/media/audio/ui/VideoRecord.ogg"); 1343} 1344 1345void CameraService::releaseSound() { 1346 Mutex::Autolock lock(mSoundLock); 1347 LOG1("CameraService::releaseSound ref=%d", mSoundRef); 1348 if (--mSoundRef) return; 1349 1350 for (int i = 0; i < NUM_SOUNDS; i++) { 1351 if (mSoundPlayer[i] != 0) { 1352 mSoundPlayer[i]->disconnect(); 1353 mSoundPlayer[i].clear(); 1354 } 1355 } 1356} 1357 1358void CameraService::playSound(sound_kind kind) { 1359 LOG1("playSound(%d)", kind); 1360 Mutex::Autolock lock(mSoundLock); 1361 sp<MediaPlayer> player = mSoundPlayer[kind]; 1362 if (player != 0) { 1363 player->seekTo(0); 1364 player->start(); 1365 } 1366} 1367 1368// ---------------------------------------------------------------------------- 1369 1370CameraService::Client::Client(const sp<CameraService>& cameraService, 1371 const sp<ICameraClient>& cameraClient, 1372 const String16& clientPackageName, 1373 int cameraId, int cameraFacing, 1374 int clientPid, uid_t clientUid, 1375 int servicePid) : 1376 CameraService::BasicClient(cameraService, cameraClient->asBinder(), 1377 clientPackageName, 1378 cameraId, cameraFacing, 1379 clientPid, clientUid, 1380 servicePid) 1381{ 1382 int callingPid = getCallingPid(); 1383 LOG1("Client::Client E (pid %d, id %d)", callingPid, cameraId); 1384 1385 mRemoteCallback = cameraClient; 1386 1387 cameraService->setCameraBusy(cameraId); 1388 cameraService->loadSound(); 1389 1390 LOG1("Client::Client X (pid %d, id %d)", callingPid, cameraId); 1391} 1392 1393// tear down the client 1394CameraService::Client::~Client() { 1395 ALOGV("~Client"); 1396 mDestructionStarted = true; 1397 1398 mCameraService->releaseSound(); 1399 // unconditionally disconnect. function is idempotent 1400 Client::disconnect(); 1401} 1402 1403CameraService::BasicClient::BasicClient(const sp<CameraService>& cameraService, 1404 const sp<IBinder>& remoteCallback, 1405 const String16& clientPackageName, 1406 int cameraId, int cameraFacing, 1407 int clientPid, uid_t clientUid, 1408 int servicePid): 1409 mClientPackageName(clientPackageName) 1410{ 1411 mCameraService = cameraService; 1412 mRemoteBinder = remoteCallback; 1413 mCameraId = cameraId; 1414 mCameraFacing = cameraFacing; 1415 mClientPid = clientPid; 1416 mClientUid = clientUid; 1417 mServicePid = servicePid; 1418 mOpsActive = false; 1419 mDestructionStarted = false; 1420} 1421 1422CameraService::BasicClient::~BasicClient() { 1423 ALOGV("~BasicClient"); 1424 mDestructionStarted = true; 1425} 1426 1427void CameraService::BasicClient::disconnect() { 1428 ALOGV("BasicClient::disconnect"); 1429 mCameraService->removeClientByRemote(mRemoteBinder); 1430 // client shouldn't be able to call into us anymore 1431 mClientPid = 0; 1432} 1433 1434status_t CameraService::BasicClient::startCameraOps() { 1435 int32_t res; 1436 1437 mOpsCallback = new OpsCallback(this); 1438 1439 { 1440 ALOGV("%s: Start camera ops, package name = %s, client UID = %d", 1441 __FUNCTION__, String8(mClientPackageName).string(), mClientUid); 1442 } 1443 1444 mAppOpsManager.startWatchingMode(AppOpsManager::OP_CAMERA, 1445 mClientPackageName, mOpsCallback); 1446 res = mAppOpsManager.startOp(AppOpsManager::OP_CAMERA, 1447 mClientUid, mClientPackageName); 1448 1449 if (res != AppOpsManager::MODE_ALLOWED) { 1450 ALOGI("Camera %d: Access for \"%s\" has been revoked", 1451 mCameraId, String8(mClientPackageName).string()); 1452 return PERMISSION_DENIED; 1453 } 1454 mOpsActive = true; 1455 return OK; 1456} 1457 1458status_t CameraService::BasicClient::finishCameraOps() { 1459 if (mOpsActive) { 1460 mAppOpsManager.finishOp(AppOpsManager::OP_CAMERA, mClientUid, 1461 mClientPackageName); 1462 mOpsActive = false; 1463 } 1464 mAppOpsManager.stopWatchingMode(mOpsCallback); 1465 mOpsCallback.clear(); 1466 1467 return OK; 1468} 1469 1470void CameraService::BasicClient::opChanged(int32_t op, const String16& packageName) { 1471 String8 name(packageName); 1472 String8 myName(mClientPackageName); 1473 1474 if (op != AppOpsManager::OP_CAMERA) { 1475 ALOGW("Unexpected app ops notification received: %d", op); 1476 return; 1477 } 1478 1479 int32_t res; 1480 res = mAppOpsManager.checkOp(AppOpsManager::OP_CAMERA, 1481 mClientUid, mClientPackageName); 1482 ALOGV("checkOp returns: %d, %s ", res, 1483 res == AppOpsManager::MODE_ALLOWED ? "ALLOWED" : 1484 res == AppOpsManager::MODE_IGNORED ? "IGNORED" : 1485 res == AppOpsManager::MODE_ERRORED ? "ERRORED" : 1486 "UNKNOWN"); 1487 1488 if (res != AppOpsManager::MODE_ALLOWED) { 1489 ALOGI("Camera %d: Access for \"%s\" revoked", mCameraId, 1490 myName.string()); 1491 // Reset the client PID to allow server-initiated disconnect, 1492 // and to prevent further calls by client. 1493 mClientPid = getCallingPid(); 1494 CaptureResultExtras resultExtras; // a dummy result (invalid) 1495 notifyError(ICameraDeviceCallbacks::ERROR_CAMERA_SERVICE, resultExtras); 1496 disconnect(); 1497 } 1498} 1499 1500// ---------------------------------------------------------------------------- 1501 1502Mutex* CameraService::Client::getClientLockFromCookie(void* user) { 1503 return gCameraService->getClientLockById((int)(intptr_t) user); 1504} 1505 1506// Provide client pointer for callbacks. Client lock returned from getClientLockFromCookie should 1507// be acquired for this to be safe 1508CameraService::Client* CameraService::Client::getClientFromCookie(void* user) { 1509 BasicClient *basicClient = gCameraService->getClientByIdUnsafe((int)(intptr_t) user); 1510 // OK: only CameraClient calls this, and they already cast anyway. 1511 Client* client = static_cast<Client*>(basicClient); 1512 1513 // This could happen if the Client is in the process of shutting down (the 1514 // last strong reference is gone, but the destructor hasn't finished 1515 // stopping the hardware). 1516 if (client == NULL) return NULL; 1517 1518 // destruction already started, so should not be accessed 1519 if (client->mDestructionStarted) return NULL; 1520 1521 return client; 1522} 1523 1524void CameraService::Client::notifyError(ICameraDeviceCallbacks::CameraErrorCode errorCode, 1525 const CaptureResultExtras& resultExtras) { 1526 mRemoteCallback->notifyCallback(CAMERA_MSG_ERROR, CAMERA_ERROR_RELEASED, 0); 1527} 1528 1529// NOTE: function is idempotent 1530void CameraService::Client::disconnect() { 1531 ALOGV("Client::disconnect"); 1532 BasicClient::disconnect(); 1533 mCameraService->setCameraFree(mCameraId); 1534 1535 StatusVector rejectSourceStates; 1536 rejectSourceStates.push_back(ICameraServiceListener::STATUS_NOT_PRESENT); 1537 rejectSourceStates.push_back(ICameraServiceListener::STATUS_ENUMERATING); 1538 1539 // Transition to PRESENT if the camera is not in either of above 2 states 1540 mCameraService->updateStatus(ICameraServiceListener::STATUS_PRESENT, 1541 mCameraId, 1542 &rejectSourceStates); 1543} 1544 1545CameraService::Client::OpsCallback::OpsCallback(wp<BasicClient> client): 1546 mClient(client) { 1547} 1548 1549void CameraService::Client::OpsCallback::opChanged(int32_t op, 1550 const String16& packageName) { 1551 sp<BasicClient> client = mClient.promote(); 1552 if (client != NULL) { 1553 client->opChanged(op, packageName); 1554 } 1555} 1556 1557// ---------------------------------------------------------------------------- 1558// IProCamera 1559// ---------------------------------------------------------------------------- 1560 1561CameraService::ProClient::ProClient(const sp<CameraService>& cameraService, 1562 const sp<IProCameraCallbacks>& remoteCallback, 1563 const String16& clientPackageName, 1564 int cameraId, 1565 int cameraFacing, 1566 int clientPid, 1567 uid_t clientUid, 1568 int servicePid) 1569 : CameraService::BasicClient(cameraService, remoteCallback->asBinder(), 1570 clientPackageName, cameraId, cameraFacing, 1571 clientPid, clientUid, servicePid) 1572{ 1573 mRemoteCallback = remoteCallback; 1574} 1575 1576CameraService::ProClient::~ProClient() { 1577} 1578 1579void CameraService::ProClient::notifyError(ICameraDeviceCallbacks::CameraErrorCode errorCode, 1580 const CaptureResultExtras& resultExtras) { 1581 mRemoteCallback->notifyCallback(CAMERA_MSG_ERROR, CAMERA_ERROR_RELEASED, 0); 1582} 1583 1584// ---------------------------------------------------------------------------- 1585 1586static const int kDumpLockRetries = 50; 1587static const int kDumpLockSleep = 60000; 1588 1589static bool tryLock(Mutex& mutex) 1590{ 1591 bool locked = false; 1592 for (int i = 0; i < kDumpLockRetries; ++i) { 1593 if (mutex.tryLock() == NO_ERROR) { 1594 locked = true; 1595 break; 1596 } 1597 usleep(kDumpLockSleep); 1598 } 1599 return locked; 1600} 1601 1602status_t CameraService::dump(int fd, const Vector<String16>& args) { 1603 String8 result; 1604 if (checkCallingPermission(String16("android.permission.DUMP")) == false) { 1605 result.appendFormat("Permission Denial: " 1606 "can't dump CameraService from pid=%d, uid=%d\n", 1607 getCallingPid(), 1608 getCallingUid()); 1609 write(fd, result.string(), result.size()); 1610 } else { 1611 bool locked = tryLock(mServiceLock); 1612 // failed to lock - CameraService is probably deadlocked 1613 if (!locked) { 1614 result.append("CameraService may be deadlocked\n"); 1615 write(fd, result.string(), result.size()); 1616 } 1617 1618 bool hasClient = false; 1619 if (!mModule) { 1620 result = String8::format("No camera module available!\n"); 1621 write(fd, result.string(), result.size()); 1622 if (locked) mServiceLock.unlock(); 1623 return NO_ERROR; 1624 } 1625 1626 result = String8::format("Camera module HAL API version: 0x%x\n", 1627 mModule->common.hal_api_version); 1628 result.appendFormat("Camera module API version: 0x%x\n", 1629 mModule->common.module_api_version); 1630 result.appendFormat("Camera module name: %s\n", 1631 mModule->common.name); 1632 result.appendFormat("Camera module author: %s\n", 1633 mModule->common.author); 1634 result.appendFormat("Number of camera devices: %d\n\n", mNumberOfCameras); 1635 1636 sp<VendorTagDescriptor> desc = VendorTagDescriptor::getGlobalVendorTagDescriptor(); 1637 if (desc == NULL) { 1638 result.appendFormat("Vendor tags left unimplemented.\n"); 1639 } else { 1640 result.appendFormat("Vendor tag definitions:\n"); 1641 } 1642 1643 write(fd, result.string(), result.size()); 1644 1645 if (desc != NULL) { 1646 desc->dump(fd, /*verbosity*/2, /*indentation*/4); 1647 } 1648 1649 for (int i = 0; i < mNumberOfCameras; i++) { 1650 result = String8::format("Camera %d static information:\n", i); 1651 camera_info info; 1652 1653 status_t rc = mModule->get_camera_info(i, &info); 1654 if (rc != OK) { 1655 result.appendFormat(" Error reading static information!\n"); 1656 write(fd, result.string(), result.size()); 1657 } else { 1658 result.appendFormat(" Facing: %s\n", 1659 info.facing == CAMERA_FACING_BACK ? "BACK" : "FRONT"); 1660 result.appendFormat(" Orientation: %d\n", info.orientation); 1661 int deviceVersion; 1662 if (mModule->common.module_api_version < 1663 CAMERA_MODULE_API_VERSION_2_0) { 1664 deviceVersion = CAMERA_DEVICE_API_VERSION_1_0; 1665 } else { 1666 deviceVersion = info.device_version; 1667 } 1668 result.appendFormat(" Device version: 0x%x\n", deviceVersion); 1669 if (deviceVersion >= CAMERA_DEVICE_API_VERSION_2_0) { 1670 result.appendFormat(" Device static metadata:\n"); 1671 write(fd, result.string(), result.size()); 1672 dump_indented_camera_metadata(info.static_camera_characteristics, 1673 fd, /*verbosity*/2, /*indentation*/4); 1674 } else { 1675 write(fd, result.string(), result.size()); 1676 } 1677 } 1678 1679 sp<BasicClient> client = mClient[i].promote(); 1680 if (client == 0) { 1681 result = String8::format(" Device is closed, no client instance\n"); 1682 write(fd, result.string(), result.size()); 1683 continue; 1684 } 1685 hasClient = true; 1686 result = String8::format(" Device is open. Client instance dump:\n"); 1687 write(fd, result.string(), result.size()); 1688 client->dump(fd, args); 1689 } 1690 if (!hasClient) { 1691 result = String8::format("\nNo active camera clients yet.\n"); 1692 write(fd, result.string(), result.size()); 1693 } 1694 1695 if (locked) mServiceLock.unlock(); 1696 1697 // Dump camera traces if there were any 1698 write(fd, "\n", 1); 1699 camera3::CameraTraces::dump(fd, args); 1700 1701 // change logging level 1702 int n = args.size(); 1703 for (int i = 0; i + 1 < n; i++) { 1704 String16 verboseOption("-v"); 1705 if (args[i] == verboseOption) { 1706 String8 levelStr(args[i+1]); 1707 int level = atoi(levelStr.string()); 1708 result = String8::format("\nSetting log level to %d.\n", level); 1709 setLogLevel(level); 1710 write(fd, result.string(), result.size()); 1711 } 1712 } 1713 1714 } 1715 return NO_ERROR; 1716} 1717 1718/*virtual*/void CameraService::binderDied( 1719 const wp<IBinder> &who) { 1720 1721 /** 1722 * While tempting to promote the wp<IBinder> into a sp, 1723 * it's actually not supported by the binder driver 1724 */ 1725 1726 ALOGV("java clients' binder died"); 1727 1728 sp<BasicClient> cameraClient = getClientByRemote(who); 1729 1730 if (cameraClient == 0) { 1731 ALOGV("java clients' binder death already cleaned up (normal case)"); 1732 return; 1733 } 1734 1735 ALOGW("Disconnecting camera client %p since the binder for it " 1736 "died (this pid %d)", cameraClient.get(), getCallingPid()); 1737 1738 cameraClient->disconnect(); 1739 1740} 1741 1742void CameraService::updateStatus(ICameraServiceListener::Status status, 1743 int32_t cameraId, 1744 const StatusVector *rejectSourceStates) { 1745 // do not lock mServiceLock here or can get into a deadlock from 1746 // connect() -> ProClient::disconnect -> updateStatus 1747 Mutex::Autolock lock(mStatusMutex); 1748 1749 ICameraServiceListener::Status oldStatus = mStatusList[cameraId]; 1750 1751 mStatusList[cameraId] = status; 1752 1753 if (oldStatus != status) { 1754 ALOGV("%s: Status has changed for camera ID %d from 0x%x to 0x%x", 1755 __FUNCTION__, cameraId, (uint32_t)oldStatus, (uint32_t)status); 1756 1757 if (oldStatus == ICameraServiceListener::STATUS_NOT_PRESENT && 1758 (status != ICameraServiceListener::STATUS_PRESENT && 1759 status != ICameraServiceListener::STATUS_ENUMERATING)) { 1760 1761 ALOGW("%s: From NOT_PRESENT can only transition into PRESENT" 1762 " or ENUMERATING", __FUNCTION__); 1763 mStatusList[cameraId] = oldStatus; 1764 return; 1765 } 1766 1767 if (rejectSourceStates != NULL) { 1768 const StatusVector &rejectList = *rejectSourceStates; 1769 StatusVector::const_iterator it = rejectList.begin(); 1770 1771 /** 1772 * Sometimes we want to conditionally do a transition. 1773 * For example if a client disconnects, we want to go to PRESENT 1774 * only if we weren't already in NOT_PRESENT or ENUMERATING. 1775 */ 1776 for (; it != rejectList.end(); ++it) { 1777 if (oldStatus == *it) { 1778 ALOGV("%s: Rejecting status transition for Camera ID %d, " 1779 " since the source state was was in one of the bad " 1780 " states.", __FUNCTION__, cameraId); 1781 mStatusList[cameraId] = oldStatus; 1782 return; 1783 } 1784 } 1785 } 1786 1787 /** 1788 * ProClients lose their exclusive lock. 1789 * - Done before the CameraClient can initialize the HAL device, 1790 * since we want to be able to close it before they get to initialize 1791 */ 1792 if (status == ICameraServiceListener::STATUS_NOT_AVAILABLE) { 1793 Vector<wp<ProClient> > proClients(mProClientList[cameraId]); 1794 Vector<wp<ProClient> >::const_iterator it; 1795 1796 for (it = proClients.begin(); it != proClients.end(); ++it) { 1797 sp<ProClient> proCl = it->promote(); 1798 if (proCl.get() != NULL) { 1799 proCl->onExclusiveLockStolen(); 1800 } 1801 } 1802 } 1803 1804 Vector<sp<ICameraServiceListener> >::const_iterator it; 1805 for (it = mListenerList.begin(); it != mListenerList.end(); ++it) { 1806 (*it)->onStatusChanged(status, cameraId); 1807 } 1808 } 1809} 1810 1811ICameraServiceListener::Status CameraService::getStatus(int cameraId) const { 1812 if (cameraId < 0 || cameraId >= MAX_CAMERAS) { 1813 ALOGE("%s: Invalid camera ID %d", __FUNCTION__, cameraId); 1814 return ICameraServiceListener::STATUS_UNKNOWN; 1815 } 1816 1817 Mutex::Autolock al(mStatusMutex); 1818 return mStatusList[cameraId]; 1819} 1820 1821}; // namespace android 1822