| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Media Server crash is happening while accessing
codecspecific data at the end of recording since
stopRecording is issued from script even before
codec spefic data is returned from encoder.
- Size check is added to prevent accessing
codecspecific data in this case.
CRs-Fixed: 732893
Change-Id: I77ce3c02c76c4d3cc4345d761ad505090ef29530
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CameraSource (legacy Camera) treats framerate set via
MediaRecorder.setVideoFrameRate as _both_ camera-preview-fps
and video-encoder-fps. Trying to set high fps for encoder
will inadvertently fail trying to set the same value for
camera-preview.
Read the custom camera parameter to detect if this is a
high-speed request, selectively set the fps only for
video, and default to 30fps for preview fps.
Change-Id: If66211dd81b2a08d4df4c6f23e87304e9e7013f4
|
|
|
|
|
|
|
|
| |
Avoid the frame-skip logic in time-lapse source if capture-rate
exceeds video-fps. Not doing so will drop frames and also cause
retrograde timestamps and an assertion in CameraSource.
Change-Id: I8420e44ab96484f0d6301c366a24eefc8efeaf0f
|
|
|
|
|
|
|
|
|
|
|
| |
Corrupt AMR NB clips were crashing media player
This was due to the assert in the AMRNB decoder.
To avoid this, post error and exit if corrupt
clip is played.
CRs-Fixed: 486681
Change-Id: I4c27a95978015e5493799ca23a3598559ad8bd9d
|
|
|
|
|
|
|
|
|
|
| |
As per ISO/IEC 14496-15, there is no explicit limit on the size of
codec-specific-data for AVC clips. Only mpeg4 video requires that
CSD size must fit within a single byte. Make the assertion enforcing
this condition specific to m4v content.
CRs-Fixed: 724526
Change-Id: Id006030ac65d5ec0bf285c040e4c536039f9489b
|
|
|
|
|
|
|
|
|
|
|
| |
Change access modifiers and add overridables in rtsp stack.
Make ARTSPConnection/ARTPConnection extensible for IPV6 support.
Provide default implementations in AVMediaServiceExensions and
AVMediaServiceFactory.
Change-Id: Iaa67070d1832d56e0569dabfd8327c1998f04493
|
|
|
|
|
|
|
|
| |
Specific clip contains corrupt ID3v2 header where size field is zero. This
corner case isn't handled properly and leads to crash.
Change-Id: Ic7e97b9de84b0cb3ce3716db95ab05f8f0db336f
CRs-Fixed: 815025
|
|
|
|
|
|
|
|
|
|
|
| |
Ignore stss block for audio even if its present, all audio
sample are sync samples itself, self decodeable and playable.
Parsing this block for audio restricts audio seek to few entries
available in this block, sometimes 0, which is undesired.
CRs-Fixed: 664870
Change-Id: If3208d5c0557d3eaeddf875d6c6762bd870c439b
|
|
|
|
|
|
|
| |
Add support for FLAC playback in
compressed offload mode
Change-Id: I617b41b867277272212d6cf1a6f82f646c5b1032
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
If the start time is not specified in meta data, the start time
will be assigned with latency of AudioRecord, it's calculated by
allocated frame count which is not the real start time when the
first frame received
Initialize the start time to the current system time if not
specified in meta data
CRs-Fixed: 812379
Change-Id: Ia007ca4592fe1f96e105d4ec48305c578b677bb1
|
|
|
|
|
|
|
|
|
|
|
| |
Change access modifiers and qualify methods with virtual, to
allow extensions. Add facility for loading customizations
(Extended classes) dynamically.
Conflicts:
media/libmediaplayerservice/nuplayer/NuPlayerDriver.cpp
Change-Id: Icc8965754fb1c73175a13a9ad24c19665ad60988
|
|
|
|
|
|
|
|
|
|
| |
Use correct format specifiers to fix 64-bit compilation.
Conflicts:
media/libmediaplayerservice/StagefrightRecorder.cpp
media/libstagefright/VideoFrameScheduler.cpp
Change-Id: Ic2238db525a23710716558015ca152871b4c549f
|
|
|
|
|
|
| |
added support for FLAC decoding
Change-Id: Ia35b0b9218fdf2584348a2a95bf0401c5065dedc
|
|
|
|
|
|
|
|
|
|
| |
Calculate ctts offset as difference between composition
time and decoding time, and avoid adding kMaxCttsOffsetTimeUs
as it increases the sample timestamp by the same amount
which leads to av sync loss for B-frames.
CRs-Fixed: 524739
Change-Id: I75a1bb594536623e3a445af2ee1ceb0cf0926a6e
|
|
|
|
|
|
| |
findDispatcher can return NULL. Check for NULL.
Change-Id: I07edc427b706dfdeec6a6f90f13d00c8941e77f2
|
|
|
|
|
|
|
|
|
|
|
| |
mp42 boxes do not support the 'damr' box type whereas 3gp4 boxes
explicitly support it. Using mp42 makes clips with AMR incompliant
with mpeg4 standards and unplayable by many media players. To
ensure interoperability, use a 3gp4 box if the recorded clip
contains AMR audio.
CRs-Fixed: 721883
Change-Id: I75e3558cd5088d05d36104abfb04a3c0c1d1a4e7
|
|
|
|
|
|
|
|
| |
Only set timed text language if kKeyMediaLanguage is found.
Crs-Fixed: 641896
Change-Id: Ie471bc458e42f5728064e447ac5c33b07311d3fd
|
|
|
|
|
|
|
|
| |
OMXNodeInstance freeNode tries to tear down OMX component
if not in OMX_StateLoaded. It handles all other states except
OMX_StatePause. This change adds OMX_StatePause handling.
Change-Id: I3bae2015c57b932186069756490c9bdf1f93eea4
|
|
|
|
|
|
|
|
|
|
|
| |
The HTTP connection created by StagefrightMetadataRetriever
is not closed explicitly, and tcp activity continues even
after metadata retriever is destroyed
Explicitly disconnect HTTP connection in StagefrightMetadataRetriever
Change-Id: I261d369e8dcff1bc0a3c7225243e865858b4fc7c
CRs-Fixed: 754684
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Camcoder recording crashes when internal memory is almost full.
- crash happens if there is no space to write even first video frame.
as soon as first video frame comes file limit exceeded information
is given back to recorder and timestamp of video is not updated.
since video timestamp is not proper crash is seen
when comparing it with audio timestamp.
- check is added while doing comparision of timestamps and
reporting error in track stop() so recorded file is not saved to
memory.
Change-Id: I69e8bad62ab03ce01de5cbdb13f8ea841b787fcb
|
|
|
|
|
|
|
|
|
| |
Set sample aspect ratio width & height only if both sar_width
and sar_height are valid ( >1 ). sar-height being 0
can cause divide by zero exception in NuPlayer.
Change-Id: Idfc4cae57651f3b5fd755057a880503f359aa004
CRs-Fixed: 735506
|
|
|
|
|
|
|
|
| |
- If number of bits available to read from ABitReader
is zero,do not call getBits.
Change-Id: I4b7332b03ed6ee1d7b6711e5b4c5dce396151b03
CRs-Fixed: 777657
|
|
|
|
|
| |
Bug: 21725583
Change-Id: I799c1967759c7e49fb50281a1708188450caac77
|
|\
| |
| |
| |
| | |
* commit 'fa11fd5bb2e9c5e00f7fecbbe76c279193182cee':
Prevent integer issues in ID3::Iterator::findFrame
|
| |\
| | |
| | |
| | | |
Change-Id: I6c1369f05bbeb83e2152b8dae35f7a53328f7239
|
| | |\
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
issues in ID3::Iterator::findFrame" into klp-dev
* commit '4c6556d17f4073ed0b4d11abf42df9c32c339291':
Prevent integer issues in ID3::Iterator::findFrame
|
| | | |\
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
ID3::Iterator::findFrame" into klp-dev
* commit 'eecc406f462ef2b3a73cd6bf3c05f7cb45382276':
Prevent integer issues in ID3::Iterator::findFrame
|
| | | | |\
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
klp-dev
* commit '3b42241aab5855964d1bd60268ae21c2d9cc6065':
Prevent integer issues in ID3::Iterator::findFrame
|
| | | | | |\ |
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
Integer overflows could occur a few places within findFrame. These can lead to
out-of-bounds reads and potentially infinite loops. Ensure that arithmetic does
not wrap around to prevent these behaviors.
Bug: 23285192
Change-Id: I72a61df7d5719d1d3f2bd0b37fba86f0f4bbedee
|
| | | | |\ \ \
| | | | | |/ /
| | | | | | |
| | | | | | |
| | | | | | | |
* commit 'd8816a13dbcafd5d61d26a8a6b2e892452bca1a7':
DO NOT MERGE libstagefright: Fix crash in convertMetaDataToMessage
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
- The ABuffer used for the Message has a preset value of 1024, if
flattening the meta data exceeds this value, a check fails hence
the crash.
- This change creates a new ABuffer if the buffer size would exceed
the buffer capacity.
Bug: 22771132
CRs-Fixed: 857850
(cherry picked from commit 4bce636865bdf0e2a79fc9a5d9a69107649c850d)
Change-Id: Ia0a963e9872f646791e75b710ff9e227a66af4f9
|
| | | | |\ \ \
| | | | | |/ /
| | | | | | |
| | | | | | | |
Change-Id: If031955c9edca657401831fbfa5a128f0b4c6d86
|
| | | | | |\ \ |
|
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
Check allocations when the size is read from a file and might therefore
be invalid.
b/14388161
Change-Id: Ia08cc0a6107f275a70e793ef3b50c0ce16ceeee0
|
| | | | |\ \ \ \
| | | | | |/ / /
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
mNumSampleSizes in SampleTable." into klp-dev
* commit '522019f15b3c191b73d1a0ddb56aeb3dd6b7ce31':
libstagefright: fix handling of mSampleTimeEntries and mNumSampleSizes in SampleTable.
|
| | | | | |\ \ \
| | | | | | | | |
| | | | | | | | |
| | | | | | | | | |
mNumSampleSizes in SampleTable." into klp-dev
|
| | | | | | | |/
| | | | | | |/|
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
SampleTable.
Bug: 23247055
Change-Id: I29ef59c7ff09248063714e5013f7c33f66c5eebd
(cherry picked from commit 3564c4562f46bede6ef1ea716c4fd4f77e470ae8)
|
| |\ \ \ \ \ \ \
| | |/ / / / / /
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
Fix crash in convertMetaDataToMessage" into lmp-dev
* commit '35fbcdd63b3961e98797a738c138698a8bcf4258':
libstagefright: Fix crash in convertMetaDataToMessage
|
| | |\ \ \ \ \ \
| | | |/ / / / /
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
convertMetaDataToMessage" into lmp-dev
* commit 'b8a84e59ed3724a2e220dbda49dc5478334e9bad':
libstagefright: Fix crash in convertMetaDataToMessage
|
| | | |\ \ \ \ \ |
|
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | | |
- The ABuffer used for the Message has a preset value of 1024, if
flattening the meta data exceeds this value, a check fails hence
the crash.
- This change creates a new ABuffer if the buffer size would exceed
the buffer capacity.
Bug: 22771132
CRs-Fixed: 857850
(cherry picked from commit 9c170c076382096b9e767da0e3f9f37dafa76546)
Change-Id: I056ade2f95bc8d82dfe092de7ecddba588cc5b72
|
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | | |
Bug: 23416608
Change-Id: I4dacd38ed42db8f4887c3ee386dc909451f4346f
|
|\ \ \ \ \ \ \ \ \
| |/ / / / / / / /
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | | |
cb2acbfe: am 635d38a8: Merge "Check RTSP payload length" into klp-dev
* commit '99187615b2cb42e39842083c2998a97e8277a5d5':
Check RTSP payload length
|
| |\ \ \ \ \ \ \ \
| | |/ / / / / / /
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | | |
635d38a8: Merge "Check RTSP payload length" into klp-dev
* commit 'd3b6f9c17ed10df01d682b0fac6b13fca396e5fb':
Check RTSP payload length
|
| | |\ \ \ \ \ \ \
| | | |/ / / / / /
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | | |
payload length" into klp-dev
* commit 'a27fe8d7cc1413041e38f8c74f1f6510bdc44627':
Check RTSP payload length
|
| | | |\ \ \ \ \ \
| | | | | |/ / / /
| | | | |/| | | |
| | | | | | | | |
| | | | | | | | | |
* commit 'cb2acbfed69d18aa4693c03d8a77cd45daf8af8d':
Check RTSP payload length
|
| | | | |\ \ \ \ \
| | | | | | |/ / /
| | | | | |/| | |
| | | | | | | | |
| | | | | | | | | |
* commit '635d38a84414e26aaf6c4b5df7859fde196adeaf':
Check RTSP payload length
|
| | | | | |\ \ \ \ |
|
| | | | | | | |_|/
| | | | | | |/| |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | | |
Bug: 23346388
Change-Id: Ifd918cefc90527c2f52177c3ce0da7a13259ad08
|