Extend service permission list only accessible from SystemUid.
As noted in b/185746653 - for isolated_compute_app, we do not want even the holding app for the isolated-process to be able to bind to it. This was implemented specifically for HOTWORD usecase previously and missed for few other usecases. Similar to hotword service, we are extending the same permission check to wearablesensingservice and ondeviceintelligence service which also run as isolated_compute_app and require this enforcement in framework. Bug: 369871251 Flag: EXEMPT bugfix Test: added CTS in topic (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:31ce2795a8fa161920ac4e153fb62a37cb20cf2c) Merged-In: I6bbe1a48de15243ace803e08c2ab7550c3612eb1 Change-Id: I6bbe1a48de15243ace803e08c2ab7550c3612eb1
Loading
Please register or sign in to comment