From 6e3fc5e40a11d8549f5105945db4f99f3f521746 Mon Sep 17 00:00:00 2001 From: krocard Date: Wed, 29 Jul 2020 12:06:05 +0100 Subject: [PATCH] OMX.broadcom.video_decoder.tunnel.secure needs EOS workaround The passthrough codec does not propagate the EOS back to ExoPlayer. Issue: https://github.com/google/ExoPlayer/issues/7647 PiperOrigin-RevId: 323758941 --- .../android/exoplayer2/mediacodec/MediaCodecRenderer.java | 3 +++ 1 file changed, 3 insertions(+) diff --git a/library/core/src/main/java/com/google/android/exoplayer2/mediacodec/MediaCodecRenderer.java b/library/core/src/main/java/com/google/android/exoplayer2/mediacodec/MediaCodecRenderer.java index 9b5e346264..d80c93df00 100644 --- a/library/core/src/main/java/com/google/android/exoplayer2/mediacodec/MediaCodecRenderer.java +++ b/library/core/src/main/java/com/google/android/exoplayer2/mediacodec/MediaCodecRenderer.java @@ -2279,6 +2279,9 @@ public abstract class MediaCodecRenderer extends BaseRenderer { String name = codecInfo.name; return (Util.SDK_INT <= 25 && "OMX.rk.video_decoder.avc".equals(name)) || (Util.SDK_INT <= 17 && "OMX.allwinner.video.decoder.avc".equals(name)) + || (Util.SDK_INT <= 29 + && ("OMX.broadcom.video_decoder.tunnel".equals(name) + || "OMX.broadcom.video_decoder.tunnel.secure".equals(name))) || ("Amazon".equals(Util.MANUFACTURER) && "AFTS".equals(Util.MODEL) && codecInfo.secure); }