diff options
author | Dianne Hackborn <hackbod@google.com> | 2013-03-27 00:22:43 +0000 |
---|---|---|
committer | Android (Google) Code Review <android-gerrit@google.com> | 2013-03-27 00:24:04 +0000 |
commit | 3bcc2fbaad4064360cee26708d702b7ee575f448 (patch) | |
tree | 1a69bc0ec19f01464df5a35d00e64f95e94e3efd /services/java/com/android/server/am/ActivityManagerService.java | |
parent | 5871b258afd0bf3a2d58dea437b340a4f5b382cf (diff) | |
parent | a40cfeb55f6caa35fee894b86175b7d916520c80 (diff) | |
download | frameworks_base-3bcc2fbaad4064360cee26708d702b7ee575f448.zip frameworks_base-3bcc2fbaad4064360cee26708d702b7ee575f448.tar.gz frameworks_base-3bcc2fbaad4064360cee26708d702b7ee575f448.tar.bz2 |
Merge "Fix issue #8470131: Process thrash kills battery" into jb-mr2-dev
Diffstat (limited to 'services/java/com/android/server/am/ActivityManagerService.java')
-rw-r--r-- | services/java/com/android/server/am/ActivityManagerService.java | 27 |
1 files changed, 27 insertions, 0 deletions
diff --git a/services/java/com/android/server/am/ActivityManagerService.java b/services/java/com/android/server/am/ActivityManagerService.java index 04ffbd9..88ef884 100644 --- a/services/java/com/android/server/am/ActivityManagerService.java +++ b/services/java/com/android/server/am/ActivityManagerService.java @@ -19,6 +19,7 @@ package com.android.server.am; import static android.content.pm.PackageManager.PERMISSION_GRANTED; import android.app.AppOpsManager; +import android.appwidget.AppWidgetManager; import com.android.internal.R; import com.android.internal.os.BatteryStatsImpl; import com.android.internal.os.ProcessStats; @@ -11791,6 +11792,32 @@ public final class ActivityManagerService extends ActivityManagerNative + callingPid + ", uid=" + callingUid; Slog.w(TAG, msg); throw new SecurityException(msg); + } else if (AppWidgetManager.ACTION_APPWIDGET_CONFIGURE.equals(intent.getAction())) { + // Special case for compatibility: we don't want apps to send this, + // but historically it has not been protected and apps may be using it + // to poke their own app widget. So, instead of making it protected, + // just limit it to the caller. + if (callerApp == null) { + String msg = "Permission Denial: not allowed to send broadcast " + + intent.getAction() + " from unknown caller."; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } else if (intent.getComponent() != null) { + // They are good enough to send to an explicit component... verify + // it is being sent to the calling app. + if (!intent.getComponent().getPackageName().equals( + callerApp.info.packageName)) { + String msg = "Permission Denial: not allowed to send broadcast " + + intent.getAction() + " to " + + intent.getComponent().getPackageName() + " from " + + callerApp.info.packageName; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + } else { + // Limit broadcast to their own package. + intent.setPackage(callerApp.info.packageName); + } } } catch (RemoteException e) { Slog.w(TAG, "Remote exception", e); |