diff options
author | 2020-06-16 15:12:57 -0700 | |
---|---|---|
committer | 2020-06-16 15:12:57 -0700 | |
commit | 3e46d7e1a16f04e3624a93907e99cc400a230535 (patch) | |
tree | 459335936704a0a629b5a6c89c2ff96efe5e1892 | |
parent | 26dfdc587fcaef5f68187b6bf1343fd7e2914d32 (diff) |
Revert "Ignores protected broadcasts if not priv-app"
Revert of I5bd2bf3bd7c38fd9cc563a02b24bc569495d79ed
For now, allow all system apps to declare protected
broadcasts. This will be cleaned up in a future change.
Bug: 158570769
Change-Id: I54d236c0a6daaa934bd64a3bd05e2654e0e868fe
-rw-r--r-- | services/core/java/com/android/server/pm/PackageManagerService.java | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/services/core/java/com/android/server/pm/PackageManagerService.java b/services/core/java/com/android/server/pm/PackageManagerService.java index ae8b3a0e9acc..91d9d17652cc 100644 --- a/services/core/java/com/android/server/pm/PackageManagerService.java +++ b/services/core/java/com/android/server/pm/PackageManagerService.java @@ -11729,6 +11729,8 @@ public class PackageManagerService extends IPackageManager.Stub } } else { parsedPackage + // Non system apps cannot mark any broadcast as protected + .clearProtectedBroadcasts() // non system apps can't be flagged as core .setCoreApp(false) // clear flags not applicable to regular apps @@ -11740,7 +11742,6 @@ public class PackageManagerService extends IPackageManager.Stub } if ((scanFlags & SCAN_AS_PRIVILEGED) == 0) { parsedPackage - .clearProtectedBroadcasts() .markNotActivitiesAsNotExportedIfSingleUser(); } |