summaryrefslogtreecommitdiff
path: root/tests/DynamicCodeLoggerIntegrationTests/src/cpp/test_executable.cpp
diff options
context:
space:
mode:
authorBernardo Rufino <brufino@google.com>2021-05-26 16:25:39 +0100
committerAndroid Build Coastguard Worker <android-build-coastguard-worker@google.com>2021-08-16 04:14:51 +0000
commitd88b5baa7b5a5b2bbe8636a835949110bdd34e30 (patch)
treed867dac25fb9b7d62e6dffdf8d9b1e1cb7c35e87 /tests/DynamicCodeLoggerIntegrationTests/src/cpp/test_executable.cpp
parent4399aeddfeafeaed5e00307813277538b80d20a8 (diff)
Fix background bypass via notifications
This is a CP of ag/14736230 to qt-dev. Apps were able to bypass BAL and BG-FGS restrictions by retrieving their own notifications and firing their PI since those were allowlisted for those operations. Now we strip the token that granted them that ability from notifications returned via NM.getActiveNotifications(), which returns the notifications of the caller. Notifications returned via notification listener APIs still contain such token, as they should. Bug: 185388103 Bug: 169821287 Test: Manually tested Change-Id: I2ede0d639a560f6acacec3864a0a7d23af152ba5 Merged-In: I2ede0d639a560f6acacec3864a0a7d23af152ba5 (cherry picked from commit 5fbeff59df3ea1441c3843aa1834616876ef1985) (cherry picked from commit 14c1c7b4a732c517ba18f5dd0598adb9f3b72221)
Diffstat (limited to 'tests/DynamicCodeLoggerIntegrationTests/src/cpp/test_executable.cpp')
0 files changed, 0 insertions, 0 deletions