Home
last modified time | relevance | path

Searched refs:callingUid (Results 1 – 25 of 272) sorted by relevance

1234567891011

/frameworks/base/services/core/java/com/android/server/pm/verify/domain/
DDomainVerificationEnforcer.java49 public void assertInternal(int callingUid) { in assertInternal() argument
50 switch (callingUid) { in assertInternal()
57 "Caller " + callingUid + " is not allowed to change internal state"); in assertInternal()
65 public void assertApprovedQuerent(int callingUid, @NonNull DomainVerificationProxy proxy) { in assertApprovedQuerent() argument
66 switch (callingUid) { in assertApprovedQuerent()
72 if (!proxy.isCallerVerifier(callingUid)) { in assertApprovedQuerent()
78 Binder.getCallingPid(), callingUid, in assertApprovedQuerent()
79 "Caller " + callingUid + " does not hold " in assertApprovedQuerent()
88 public void assertApprovedVerifier(int callingUid, @NonNull DomainVerificationProxy proxy) in assertApprovedVerifier() argument
91 switch (callingUid) { in assertApprovedVerifier()
[all …]
/frameworks/base/core/java/com/android/internal/util/
DProviderAccessStats.java49 private void incrementStats(int callingUid, SparseLongArray stats) { in incrementStats() argument
51 stats.put(callingUid, stats.get(callingUid) + 1); in incrementStats()
52 mAllCallingUids.put(callingUid, true); in incrementStats()
62 private void incrementStats(int callingUid, boolean inBatch, in incrementStats() argument
64 incrementStats(callingUid, inBatch ? statsInBatch : statsNonBatch); in incrementStats()
67 public final void incrementInsertStats(int callingUid, boolean inBatch) { in incrementInsertStats() argument
68 incrementStats(callingUid, inBatch, mInsertStats, mInsertInBatchStats); in incrementInsertStats()
71 public final void incrementUpdateStats(int callingUid, boolean inBatch) { in incrementUpdateStats() argument
72 incrementStats(callingUid, inBatch, mUpdateStats, mUpdateInBatchStats); in incrementUpdateStats()
75 public final void incrementDeleteStats(int callingUid, boolean inBatch) { in incrementDeleteStats() argument
[all …]
/frameworks/base/services/core/java/com/android/server/wm/
DSafeActivityOptions.java147 int callingPid, int callingUid) { in setCallingPidUidForRemoteAnimationAdapter() argument
156 adapter.setCallingPidUid(callingPid, callingUid); in setCallingPidUidForRemoteAnimationAdapter()
210 ActivityOptions options, int callingPid, int callingUid) { in checkPermissions() argument
214 && !supervisor.mRecentTasks.isCallerRecents(callingUid)) { in checkPermissions()
216 START_TASKS_FROM_RECENTS, callingPid, callingUid); in checkPermissions()
220 + ", uid=" + callingUid + ") with launchTaskId=" in checkPermissions()
231 && !supervisor.isCallerAllowedToLaunchOnTaskDisplayArea(callingPid, callingUid, in checkPermissions()
235 + ", uid=" + callingUid + ") with launchTaskDisplayArea=" + taskDisplayArea; in checkPermissions()
242 && !supervisor.isCallerAllowedToLaunchOnDisplay(callingPid, callingUid, in checkPermissions()
246 + ", uid=" + callingUid + ") with launchDisplayId=" in checkPermissions()
[all …]
DKeyguardDisableHandler.java72 void disableKeyguard(IBinder token, String tag, int callingUid, int userId) { in disableKeyguard() argument
73 UserTokenWatcher watcherForCaller = watcherForCallingUid(token, callingUid); in disableKeyguard()
77 void reenableKeyguard(IBinder token, int callingUid, int userId) { in reenableKeyguard() argument
78 UserTokenWatcher watcherForCaller = watcherForCallingUid(token, callingUid); in reenableKeyguard()
82 private UserTokenWatcher watcherForCallingUid(IBinder token, int callingUid) { in watcherForCallingUid() argument
83 if (Process.isApplicationUid(callingUid)) { in watcherForCallingUid()
85 } else if (callingUid == Process.SYSTEM_UID && token instanceof LockTaskToken) { in watcherForCallingUid()
/frameworks/base/apex/blobstore/service/java/com/android/server/blob/
DBlobStoreManagerService.java347 int callingUid, String callingPackage) { in createSessionInternal() argument
349 final int sessionsCount = getSessionsCountLocked(callingUid, callingPackage); in createSessionInternal()
357 sessionId, blobHandle, callingUid, callingPackage, in createSessionInternal()
359 addSessionForUserLocked(session, UserHandle.getUserId(callingUid)); in createSessionInternal()
362 + "; callingUid=" + callingUid + ", callingPackage=" + callingPackage); in createSessionInternal()
370 int callingUid, String callingPackage) { in openSessionInternal() argument
374 UserHandle.getUserId(callingUid)).get(sessionId); in openSessionInternal()
375 if (session == null || !session.hasAccess(callingUid, callingPackage) in openSessionInternal()
385 int callingUid, String callingPackage) { in abandonSessionInternal() argument
388 callingUid, callingPackage); in abandonSessionInternal()
[all …]
/frameworks/base/services/core/java/com/android/server/pm/permission/
DLegacyPermissionManagerService.java190 int callingUid = mInjector.getCallingUid(); in verifyCallerCanCheckAccess() local
192 if (UserHandle.getAppId(callingUid) >= Process.FIRST_APPLICATION_UID && (callingUid != uid in verifyCallerCanCheckAccess()
196 callingUid, callingPid, packageName, uid, pid, message); in verifyCallerCanCheckAccess()
236 final int callingUid = Binder.getCallingUid(); in grantDefaultPermissionsToActiveLuiApp() local
238 "grantDefaultPermissionsToActiveLuiApp", callingUid); in grantDefaultPermissionsToActiveLuiApp()
245 final int callingUid = Binder.getCallingUid(); in revokeDefaultPermissionsFromLuiApps() local
247 "revokeDefaultPermissionsFromLuiApps", callingUid); in revokeDefaultPermissionsFromLuiApps()
254 final int callingUid = Binder.getCallingUid(); in grantDefaultPermissionsToEnabledImsServices() local
256 "grantDefaultPermissionsToEnabledImsServices", callingUid); in grantDefaultPermissionsToEnabledImsServices()
264 final int callingUid = Binder.getCallingUid(); in grantDefaultPermissionsToEnabledTelephonyDataServices() local
[all …]
/frameworks/base/services/core/java/com/android/server/notification/
DNotificationDelegate.java29 void onClearAll(int callingUid, int callingPid, int userId); in onClearAll() argument
30 void onNotificationClick(int callingUid, int callingPid, String key, in onNotificationClick() argument
32 void onNotificationActionClick(int callingUid, int callingPid, String key, int actionIndex, in onNotificationActionClick() argument
34 void onNotificationClear(int callingUid, int callingPid, in onNotificationClear() argument
39 void onNotificationError(int callingUid, int callingPid, in onNotificationError() argument
68 int callingUid); in grantInlineReplyUriPermission() argument
73 void clearInlineReplyUriPermissions(String key, int callingUid); in clearInlineReplyUriPermissions() argument
/frameworks/base/services/usage/java/com/android/server/usage/
DUsageStatsService.java533 private boolean shouldObfuscateInstantAppsForCaller(int callingUid, int userId) { in shouldObfuscateInstantAppsForCaller() argument
534 return !mPackageManagerInternal.canAccessInstantApps(callingUid, userId); in shouldObfuscateInstantAppsForCaller()
538 int callingPid, int callingUid) { in shouldHideShortcutInvocationEvents() argument
542 callingPid, callingUid); in shouldHideShortcutInvocationEvents()
547 private boolean shouldHideLocusIdEvents(int callingPid, int callingUid) { in shouldHideLocusIdEvents() argument
548 if (callingUid == Process.SYSTEM_UID) { in shouldHideLocusIdEvents()
552 android.Manifest.permission.ACCESS_LOCUS_ID_USAGE_STATS, callingPid, callingUid) in shouldHideLocusIdEvents()
561 private boolean shouldObfuscateNotificationEvents(int callingPid, int callingUid) { in shouldObfuscateNotificationEvents() argument
562 if (callingUid == Process.SYSTEM_UID) { in shouldObfuscateNotificationEvents()
566 callingPid, callingUid) == PackageManager.PERMISSION_GRANTED); in shouldObfuscateNotificationEvents()
[all …]
/frameworks/base/services/core/java/com/android/server/net/
DNetworkStatsObservers.java78 IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) { in register() argument
80 RequestInfo requestInfo = buildRequestInfo(request, messenger, binder, callingUid, in register()
93 public void unregister(DataUsageRequest request, int callingUid) { in unregister() argument
94 getHandler().sendMessage(mHandler.obtainMessage(MSG_UNREGISTER, callingUid, 0 /* ignore */, in unregister()
168 private void handleUnregister(DataUsageRequest request, int callingUid) { in handleUnregister() argument
175 if (Process.SYSTEM_UID != callingUid && requestInfo.mCallingUid != callingUid) { in handleUnregister()
176 Slog.w(TAG, "Caller uid " + callingUid + " is not owner of " + request); in handleUnregister()
209 Messenger messenger, IBinder binder, int callingUid, in buildRequestInfo() argument
212 return new UserUsageRequestInfo(this, request, messenger, binder, callingUid, in buildRequestInfo()
217 return new NetworkUsageRequestInfo(this, request, messenger, binder, callingUid, in buildRequestInfo()
[all …]
DNetworkStatsAccess.java107 Context context, int callingUid, String callingPackage) { in checkAccessLevel() argument
122 final boolean isDeviceOwner = dpmi != null && dpmi.isActiveDeviceOwner(callingUid); in checkAccessLevel()
123 final int appId = UserHandle.getAppId(callingUid); in checkAccessLevel()
131 boolean hasAppOpsPermission = hasAppOpsPermission(context, callingUid, callingPackage); in checkAccessLevel()
138 boolean isProfileOwner = dpmi != null && (dpmi.isActiveProfileOwner(callingUid) in checkAccessLevel()
139 || dpmi.isActiveDeviceOwner(callingUid)); in checkAccessLevel()
181 Context context, int callingUid, String callingPackage) { in hasAppOpsPermission() argument
187 callingUid, callingPackage); in hasAppOpsPermission()
/frameworks/av/media/libmediatranscoding/
DTranscodingClientManager.cpp133 int32_t callingUid = AIBinder_getCallingUid(); in submitRequest() local
140 in_clientUid = callingUid; in submitRequest()
143 } else if (in_clientUid != callingUid && !owner->isTrustedCaller(callingPid, callingUid)) { in submitRequest()
146 in_clientPid, in_clientUid, callingUid); in submitRequest()
150 in_clientPid, in_clientUid, callingUid); in submitRequest()
159 } else if (in_clientPid != callingPid && !owner->isTrustedCaller(callingPid, callingUid)) { in submitRequest()
162 in_clientPid, in_clientUid, callingUid); in submitRequest()
166 in_clientPid, in_clientUid, callingUid); in submitRequest()
171 *_aidl_return = owner->mSessionController->submit(mClientId, sessionId, callingUid, in submitRequest()
241 int32_t callingUid = AIBinder_getCallingUid(); in addClientUid() local
[all …]
/frameworks/base/telephony/common/android/telephony/
DLocationAccessPolicy.java63 public final int callingUid; field in LocationAccessPolicy.LocationPermissionQuery
71 int callingUid, int callingPid, int minSdkVersionForCoarse, in LocationPermissionQuery() argument
75 this.callingUid = callingUid; in LocationPermissionQuery()
114 public Builder setCallingUid(int callingUid) { in setCallingUid() argument
115 mCallingUid = callingUid; in setCallingUid()
262 query.callingUid, permissionToCheck); in checkAppLocationPermissionHelper()
267 .noteOpNoThrow(getAppOpsString(permissionToCheck), query.callingUid, in checkAppLocationPermissionHelper()
313 if (query.callingUid == Process.PHONE_UID || query.callingUid == Process.SYSTEM_UID in checkLocationPermission()
314 || query.callingUid == Process.NETWORK_STACK_UID in checkLocationPermission()
315 || query.callingUid == Process.ROOT_UID) { in checkLocationPermission()
[all …]
/frameworks/base/services/tests/servicestests/src/com/android/server/devicepolicy/
DDevicePolicyManagerTest.java235 mServiceContext.binder.callingUid = DpmMockContext.CALLER_UID; in setUp()
264 mAdmin1Context.binder.callingUid = DpmMockContext.CALLER_UID; in setUp()
354 mServiceContext.binder.callingUid = in setAsProfileOwner()
573 mMockContext.binder.callingUid = ANOTHER_ADMIN_UID; in testSetActiveAdmin_multiUsers()
577 mMockContext.binder.callingUid = DpmMockContext.CALLER_UID; in testSetActiveAdmin_multiUsers()
581 mMockContext.binder.callingUid = ANOTHER_ADMIN_UID; in testSetActiveAdmin_multiUsers()
655 mContext.binder.callingUid = 1234567; in testRemoveActiveAdmin_SecurityException()
668 mContext.binder.callingUid = DpmMockContext.CALLER_UID; in testRemoveActiveAdmin_userNotRunningOrLocked()
717 mContext.binder.callingUid = 1234567; in testRemoveActiveAdmin_fromDifferentUserWithINTERACT_ACROSS_USERS_FULL()
848 mContext.binder.callingUid = 123456; in testForceRemoveActiveAdmin_nonShellCaller()
[all …]
/frameworks/base/services/core/java/com/android/server/accounts/
DAccountManagerService.java465 int callingUid = Binder.getCallingUid(); in addAccountExplicitlyWithVisibility() local
468 Log.v(TAG, "addAccountExplicitly: " + account + ", caller's uid " + callingUid in addAccountExplicitlyWithVisibility()
472 if (!isAccountManagedByCaller(account.type, callingUid, userId)) { in addAccountExplicitlyWithVisibility()
474 callingUid, account.type); in addAccountExplicitlyWithVisibility()
487 return addAccountInternal(accounts, account, password, extras, callingUid, in addAccountExplicitlyWithVisibility()
497 int callingUid = Binder.getCallingUid(); in getAccountsAndVisibilityForPackage() local
499 boolean isSystemUid = UserHandle.isSameApp(callingUid, Process.SYSTEM_UID); in getAccountsAndVisibilityForPackage()
500 List<String> managedTypes = getTypesForCaller(callingUid, userId, isSystemUid); in getAccountsAndVisibilityForPackage()
506 + callingUid + " with packageName=" + packageName); in getAccountsAndVisibilityForPackage()
516 return getAccountsAndVisibilityForPackage(packageName, managedTypes, callingUid, in getAccountsAndVisibilityForPackage()
[all …]
/frameworks/base/services/core/java/com/android/server/power/
DAmbientDisplaySuppressionController.java59 public void suppress(@NonNull String token, int callingUid, boolean suppress) { in suppress() argument
60 Pair<String, Integer> suppressionToken = Pair.create(requireNonNull(token), callingUid); in suppress()
83 List<String> getSuppressionTokens(int callingUid) { in getSuppressionTokens() argument
87 if (token.second == callingUid) { in getSuppressionTokens()
101 public boolean isSuppressed(@NonNull String token, int callingUid) { in isSuppressed() argument
102 return mSuppressionTokens.contains(Pair.create(requireNonNull(token), callingUid)); in isSuppressed()
/frameworks/base/services/core/java/com/android/server/tv/
DTvInputManagerService.java676 private SessionState getSessionStateLocked(IBinder sessionToken, int callingUid, int userId) { in getSessionStateLocked() argument
678 return getSessionStateLocked(sessionToken, callingUid, userState); in getSessionStateLocked()
683 int callingUid, UserState userState) { in getSessionStateLocked() argument
689 if (callingUid != Process.SYSTEM_UID && callingUid != sessionState.callingUid) { in getSessionStateLocked()
691 + " from uid " + callingUid); in getSessionStateLocked()
697 private ITvInputSession getSessionLocked(IBinder sessionToken, int callingUid, int userId) { in getSessionLocked() argument
698 return getSessionLocked(getSessionStateLocked(sessionToken, callingUid, userId)); in getSessionLocked()
711 private int resolveCallingUserId(int callingPid, int callingUid, int requestedUserId, in resolveCallingUserId() argument
713 return ActivityManager.handleIncomingUser(callingPid, callingUid, requestedUserId, false, in resolveCallingUserId()
838 private SessionState releaseSessionLocked(IBinder sessionToken, int callingUid, int userId) { in releaseSessionLocked() argument
[all …]
/frameworks/base/services/restrictions/java/com/android/server/restrictions/
DRestrictionsManagerService.java97 int callingUid = Binder.getCallingUid(); in requestPermission() local
98 int userHandle = UserHandle.getUserId(callingUid); in requestPermission()
110 enforceCallerMatchesPackage(callingUid, packageName, "Package name does not" + in requestPermission()
163 int callingUid = Binder.getCallingUid(); in notifyPermissionResponse() local
164 int userHandle = UserHandle.getUserId(callingUid); in notifyPermissionResponse()
172 enforceCallerMatchesPackage(callingUid, permProvider.getPackageName(), in notifyPermissionResponse()
187 private void enforceCallerMatchesPackage(int callingUid, String packageName, in enforceCallerMatchesPackage() argument
190 String[] pkgs = AppGlobals.getPackageManager().getPackagesForUid(callingUid); in enforceCallerMatchesPackage()
193 throw new SecurityException(message + callingUid); in enforceCallerMatchesPackage()
/frameworks/base/cmds/incidentd/src/
DIncidentService.cpp64 uid_t callingUid = IPCThreadState::self()->getCallingUid(); in checkIncidentPermissions() local
66 if (callingUid == AID_ROOT || callingUid == AID_SHELL) { in checkIncidentPermissions()
81 callingPid, callingUid); in checkIncidentPermissions()
88 callingPid, callingUid); in checkIncidentPermissions()
97 if (callingUid != AID_SHELL && callingUid != AID_ROOT) { in checkIncidentPermissions()
99 callingPid, callingUid); in checkIncidentPermissions()
106 if (callingUid != AID_SHELL && callingUid != AID_ROOT && callingUid != AID_STATSD && in checkIncidentPermissions()
107 callingUid != AID_SYSTEM) { in checkIncidentPermissions()
109 callingPid, callingUid); in checkIncidentPermissions()
355 const uid_t callingUid = IPCThreadState::self()->getCallingUid(); in registerSection() local
[all …]
/frameworks/base/apex/appsearch/service/java/com/android/server/appsearch/
DAppSearchManagerService.java334 int callingUid = Binder.getCallingUid(); in setSchema() local
335 UserHandle callingUser = handleIncomingUser(userHandle, callingUid); in setSchema()
344 verifyCallingPackage(userContext, callingUser, callingUid, packageName); in setSchema()
420 int callingUid = Binder.getCallingUid(); in getSchema() local
421 UserHandle callingUser = handleIncomingUser(userHandle, callingUid); in getSchema()
426 verifyCallingPackage(userContext, callingUser, callingUid, packageName); in getSchema()
452 int callingUid = Binder.getCallingUid(); in getNamespaces() local
453 UserHandle callingUser = handleIncomingUser(userHandle, callingUid); in getNamespaces()
458 verifyCallingPackage(userContext, callingUser, callingUid, packageName); in getNamespaces()
487 int callingUid = Binder.getCallingUid(); in putDocuments() local
[all …]
/frameworks/base/services/core/java/com/android/server/hdmi/
DHdmiCecAtomWriter.java44 HdmiCecMessage message, int direction, int callingUid, int errorCode) { in messageReported() argument
46 message, direction, errorCode, callingUid); in messageReported()
58 public void messageReported(HdmiCecMessage message, int direction, int callingUid) { in messageReported() argument
59 messageReported(message, direction, callingUid, ERROR_CODE_UNKNOWN); in messageReported()
71 HdmiCecMessage message, int direction, int errorCode, int callingUid) { in createMessageReportedGenericArgs() argument
75 return new MessageReportedGenericArgs(callingUid, direction, message.getSource(), in createMessageReportedGenericArgs()
/frameworks/base/services/core/java/com/android/server/pm/
DPackageInstallerService.java529 final int callingUid = Binder.getCallingUid(); in createSessionInternal() local
531 callingUid, userId, true, true, "createSession"); in createSessionInternal()
573 if ((callingUid == Process.SHELL_UID) || (callingUid == Process.ROOT_UID)) { in createSessionInternal()
579 if (callingUid != Process.SYSTEM_UID) { in createSessionInternal()
581 mAppOps.checkPackage(callingUid, installerPackageName); in createSessionInternal()
588 mAppOps.checkPackage(callingUid, requestedInstallerPackageName); in createSessionInternal()
596 && !mPm.isCallerVerifier(callingUid)) { in createSessionInternal()
608 && params.originatingUid != callingUid) { in createSessionInternal()
616 if (Build.IS_DEBUGGABLE || isCalledBySystemOrShell(callingUid)) { in createSessionInternal()
654 if (isCalledBySystemOrShell(callingUid) || mBypassNextAllowedApexUpdateCheck) { in createSessionInternal()
[all …]
/frameworks/base/core/tests/coretests/src/com/android/internal/os/
DBatteryStatsBinderCallStatsTest.java52 int callingUid = Process.FIRST_APPLICATION_UID + 1; in testNoteBinderCallStats() local
56 BinderCallsStats.CallStat stat1 = new BinderCallsStats.CallStat(callingUid, in testNoteBinderCallStats()
66 BinderCallsStats.CallStat stat2 = new BinderCallsStats.CallStat(callingUid, in testNoteBinderCallStats()
95 int callingUid = Process.FIRST_APPLICATION_UID + 1; in testProportionalSystemServiceUsage_noStatsForSomeMethods() local
101 BinderCallsStats.CallStat stat1a = new BinderCallsStats.CallStat(callingUid, in testProportionalSystemServiceUsage_noStatsForSomeMethods()
108 BinderCallsStats.CallStat stat1b = new BinderCallsStats.CallStat(callingUid, in testProportionalSystemServiceUsage_noStatsForSomeMethods()
119 BinderCallsStats.CallStat stat2 = new BinderCallsStats.CallStat(callingUid, in testProportionalSystemServiceUsage_noStatsForSomeMethods()
/frameworks/base/services/core/java/com/android/server/pm/verify/domain/proxy/
DDomainVerificationProxyV1.java99 int verificationCode, @Nullable List<String> failedDomains, int callingUid) { in queueLegacyVerifyResult() argument
105 new Response(callingUid, verificationId, verificationCode, failedDomains)); in queueLegacyVerifyResult()
207 int callingUid = response.callingUid; in runMessage() local
210 if (mManager.setDomainVerificationStatusInternal(callingUid, domainSetId, in runMessage()
222 if (mManager.setDomainVerificationStatusInternal(callingUid, domainSetId, in runMessage()
239 public boolean isCallerVerifier(int callingUid) { in isCallerVerifier() argument
240 return mConnection.isCallerPackage(callingUid, mVerifierComponent.getPackageName()); in isCallerVerifier()
308 public final int callingUid; field in DomainVerificationProxyV1.Response
314 private Response(int callingUid, int verificationId, int verificationCode, in Response() argument
316 this.callingUid = callingUid; in Response()
/frameworks/base/services/core/java/com/android/server/os/
DBugreportManagerServiceImpl.java81 int callingUid = Binder.getCallingUid(); in startBugreport() local
82 enforcePermission(callingPackage, callingUid, bugreportMode in startBugreport()
92 startBugreportLocked(callingUid, callingPackage, bugreportFd, screenshotFd, in startBugreport()
100 int callingUid = Binder.getCallingUid(); in cancelBugreport() local
101 enforcePermission(callingPackage, callingUid, true /* checkCarrierPrivileges */); in cancelBugreport()
114 ds.cancelBugreport(callingUid, callingPackage); in cancelBugreport()
138 String callingPackage, int callingUid, boolean checkCarrierPrivileges) { in enforcePermission() argument
139 mAppOps.checkPackage(callingUid, callingPackage); in enforcePermission()
227 private void startBugreportLocked(int callingUid, String callingPackage, in startBugreportLocked() argument
248 ds.startBugreport(callingUid, callingPackage, in startBugreportLocked()
[all …]
/frameworks/base/services/core/java/com/android/server/uri/
DUriGrantsManagerService.java266 final int callingUid = Binder.getCallingUid(); in getUriPermissions() local
267 final int callingUserId = UserHandle.getUserId(callingUid); in getUriPermissions()
271 if (packageUid != callingUid) { in getUriPermissions()
273 "Package " + packageName + " does not belong to calling UID " + callingUid); in getUriPermissions()
280 callingUid); in getUriPermissions()
515 private boolean checkAuthorityGrantsLocked(int callingUid, ProviderInfo cpi, int userId, in checkAuthorityGrantsLocked() argument
517 final ArrayMap<GrantUri, UriPermission> perms = mGrantedUriPermissions.get(callingUid); in checkAuthorityGrantsLocked()
582 private NeededUriGrants checkGrantUriPermissionFromIntentUnlocked(int callingUid, in checkGrantUriPermissionFromIntentUnlocked() argument
605 contentUserHint = UserHandle.getUserId(callingUid); in checkGrantUriPermissionFromIntentUnlocked()
621 targetUid = checkGrantUriPermissionUnlocked(callingUid, targetPkg, grantUri, mode, in checkGrantUriPermissionFromIntentUnlocked()
[all …]

1234567891011