summaryrefslogtreecommitdiff
path: root/libs/androidfw/StringPool.cpp
diff options
context:
space:
mode:
author Martijn Coenen <maco@google.com> 2024-02-29 12:03:05 +0000
committer Martijn Coenen <maco@google.com> 2024-03-12 12:55:02 +0000
commite397fd3d20c3f409311e411387ec1524ccecf085 (patch)
treef07da4d6a00ead73f07bd759db37ae23ec60241b /libs/androidfw/StringPool.cpp
parent340a1267f0f71ec60a68ddd9089fe43a327c36c5 (diff)
Verify UID of incoming Zygote connections.
Only the system UID should be allowed to connect to the Zygote. While for generic Zygotes this is also covered by SELinux policy, this is not true for App Zygotes: the preload code running in an app zygote could connect to another app zygote socket, if it had access to its (random) socket address. On the Java layer, simply check the UID when the connection is made. In the native layer, this check was already present, but it actually didn't work in the case where we receive a new incoming connection on the socket, and receive a 'non-fork' command: in that case, we will simply exit the native loop, and let the Java layer handle the command, without any further UID checking. Modified the native logic to drop new connections with a mismatching UID, and to keep serving the existing connection (if it was still there). Bug: 319081336 Test: manual Change-Id: I3f85a17107849e2cd3e82d6ef15c90b9e2f26532 Merged-In: I3f85a17107849e2cd3e82d6ef15c90b9e2f26532 (cherry picked from commit 2ffc7cb220e4220b7e108c4043a3f0f2a85b6508)
Diffstat (limited to 'libs/androidfw/StringPool.cpp')
0 files changed, 0 insertions, 0 deletions