summaryrefslogtreecommitdiff
path: root/libs/androidfw/StringPool.cpp
diff options
context:
space:
mode:
author Michael Groover <mpgroover@google.com> 2022-12-13 17:02:10 -0600
committer Michael Groover <mpgroover@google.com> 2022-12-13 18:48:58 -0600
commit0a693d087c912c6e51b99b8f4761ed67163ab481 (patch)
tree50330e6b8d41f124197b5a07d53fef25c3851ee8 /libs/androidfw/StringPool.cpp
parent32765d94a13e1f1ba7d055805240b1884093da75 (diff)
Update receiver flag enforcement workaround for affected package
Android T allows apps to declare a runtime receiver as not exported by invoking registerReceiver with a new RECEIVER_NOT_EXPORTED flag; receivers registered with this flag will only receive broadcasts from the platform and the app itself. However to ensure developers can properly protect their receivers, all apps targeting U or later registering a receiver for non-system broadcasts must specify either the exported or not exported flag when invoking #registerReceiver; if one of these flags is not provided, the platform will throw a SecurityException. Some apps have already begun targeting U but have not yet flagged their exposed receivers; this commit updates the exemption for these apps to prevent them from crashing due to this new enforcement while their receivers are updated. Bug: 262396031 Test: Manually verified all affected apps were exempted. Change-Id: Ieeb9834632eafba4941c67a5d3ae764d7c781fb3
Diffstat (limited to 'libs/androidfw/StringPool.cpp')
0 files changed, 0 insertions, 0 deletions