diff --git a/audio/common.mk b/audio/common.mk index edf7b6a..a691f0a 100644 --- a/audio/common.mk +++ b/audio/common.mk @@ -3,8 +3,15 @@ BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/audio/sepolicy/common #Audio Vendor libraries PRODUCT_PACKAGES += \ libfvsam_prm_parser \ - libmahalcontroller \ + libmahalcontroller + +ifeq ($(USE_MAM_V4_ABOVE),true) +PRODUCT_PACKAGES += \ + libMAM_Google_Pixel_Android +else +PRODUCT_PACKAGES += \ libAlgFx_HiFi3z +endif ifneq ($(USE_AUDIO_HAL_AIDL),true) ## AudioHAL Configurations diff --git a/mediacodec/vpu/sepolicy/mediacodec_google.te b/mediacodec/vpu/sepolicy/mediacodec_google.te index e0f5d7f..47c0be8 100644 --- a/mediacodec/vpu/sepolicy/mediacodec_google.te +++ b/mediacodec/vpu/sepolicy/mediacodec_google.te @@ -7,6 +7,8 @@ hal_server_domain(mediacodec_google, hal_codec2) hal_client_domain(mediacodec_google, hal_graphics_allocator) +add_service(mediacodec_google, eco_service) + allow mediacodec_google dmabuf_system_heap_device:chr_file r_file_perms; allow mediacodec_google video_device:chr_file { read write open ioctl map }; @@ -19,3 +21,8 @@ neverallow mediacodec_google { file_type fs_type }:file execute_no_trans; # https://android-developers.googleblog.com/2016/05/hardening-media-stack.html neverallow mediacodec_google domain:{ udp_socket rawip_socket } *; neverallow mediacodec_google { domain userdebug_or_eng(`-su') }:tcp_socket *; + +userdebug_or_eng(` + allow mediacodec_google vendor_media_data_file:dir rw_dir_perms; + allow mediacodec_google vendor_media_data_file:file create_file_perms; +')