summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
author Mugdha Lakhani <nator@google.com> 2023-01-12 12:17:43 +0000
committer Android (Google) Code Review <android-gerrit@google.com> 2023-01-12 12:17:43 +0000
commit966e60ba9e5b532e491024a349306ba33c88754e (patch)
tree33feeb3124d18a3bc4b5b5036758af69c6f0fc41
parent47fddf4dd2dfe810577225e700c22d3ba795dfae (diff)
parent43b8a91b0584dd1c6a136702e68e1f0cd519cb51 (diff)
Merge "Isolated processes must fail registering BRs."
-rw-r--r--services/core/java/com/android/server/am/ActivityManagerService.java13
1 files changed, 9 insertions, 4 deletions
diff --git a/services/core/java/com/android/server/am/ActivityManagerService.java b/services/core/java/com/android/server/am/ActivityManagerService.java
index 64b654a7cac9..a386bafbeb67 100644
--- a/services/core/java/com/android/server/am/ActivityManagerService.java
+++ b/services/core/java/com/android/server/am/ActivityManagerService.java
@@ -13520,12 +13520,17 @@ public class ActivityManagerService extends IActivityManager.Stub
public Intent registerReceiverWithFeature(IApplicationThread caller, String callerPackage,
String callerFeatureId, String receiverId, IIntentReceiver receiver,
IntentFilter filter, String permission, int userId, int flags) {
+ enforceNotIsolatedCaller("registerReceiver");
+
// Allow Sandbox process to register only unexported receivers.
- if ((flags & Context.RECEIVER_NOT_EXPORTED) != 0) {
- enforceNotIsolatedCaller("registerReceiver");
- } else if (mSdkSandboxSettings.isBroadcastReceiverRestrictionsEnforced()) {
- enforceNotIsolatedOrSdkSandboxCaller("registerReceiver");
+ boolean unexported = (flags & Context.RECEIVER_NOT_EXPORTED) != 0;
+ if (mSdkSandboxSettings.isBroadcastReceiverRestrictionsEnforced()
+ && Process.isSdkSandboxUid(Binder.getCallingUid())
+ && !unexported) {
+ throw new SecurityException("SDK sandbox process not allowed to call "
+ + "registerReceiver");
}
+
ArrayList<Intent> stickyIntents = null;
ProcessRecord callerApp = null;
final boolean visibleToInstantApps