summaryrefslogtreecommitdiff
path: root/tools/aapt2/format/binary/BinaryResourceParser.cpp
diff options
context:
space:
mode:
authorMichal Karpinski <mkarpinski@google.com>2019-04-16 14:02:46 +0100
committerMichal Karpinski <mkarpinski@google.com>2019-04-16 15:50:13 +0100
commit2927b542ab9d6e63f61c582c6a027da3efd9dead (patch)
tree6032710dc8369b13d011850422428e56faa9dd71 /tools/aapt2/format/binary/BinaryResourceParser.cpp
parent949305fe52816c6a51454cc8aee56fee8486eeac (diff)
Don't allow PI-based starts and trampolines when sender
is SYSTEM_UID and it happens to pass foregroundness check at the time of sending It could lead to abuses like directing the user to Settings app and then giving a PI through any API, so that app could open activity/trampoline due to Settings app (SYSTEM_UID) being fg. PI-based starts where sender is SYSTEM_UID will no longer be supported based on foregroundness check. Any such starts need to now be explicitly whitelisted (see b/124858756). Also, ignore windows of type TYPE_APPLICATION_STARTING in isAnyNonToastWindowVisibleForUid() check. Bug: 129563343 Test: atest WmTests:ActivityStarterTests Test: atest BackgroundActivityLaunchTest Test: atest CtsActivityManagerDeviceTestCases:ActivityStarterTests Test: atest WmTests:RootWindowContainerTests Change-Id: I563f71f0b1c7922d8c675d2e4feed909f43446be
Diffstat (limited to 'tools/aapt2/format/binary/BinaryResourceParser.cpp')
0 files changed, 0 insertions, 0 deletions