/frameworks/base/services/core/java/com/android/server/pm/verify/domain/ |
D | DomainVerificationEnforcer.java | 49 public void assertInternal(int callingUid) { in assertInternal() argument 50 switch (callingUid) { in assertInternal() 57 "Caller " + callingUid + " is not allowed to change internal state"); in assertInternal() 65 public void assertApprovedQuerent(int callingUid, @NonNull DomainVerificationProxy proxy) { in assertApprovedQuerent() argument 66 switch (callingUid) { in assertApprovedQuerent() 72 if (!proxy.isCallerVerifier(callingUid)) { in assertApprovedQuerent() 78 Binder.getCallingPid(), callingUid, in assertApprovedQuerent() 79 "Caller " + callingUid + " does not hold " in assertApprovedQuerent() 88 public void assertApprovedVerifier(int callingUid, @NonNull DomainVerificationProxy proxy) in assertApprovedVerifier() argument 91 switch (callingUid) { in assertApprovedVerifier() [all …]
|
/frameworks/base/core/java/com/android/internal/util/ |
D | ProviderAccessStats.java | 49 private void incrementStats(int callingUid, SparseLongArray stats) { in incrementStats() argument 51 stats.put(callingUid, stats.get(callingUid) + 1); in incrementStats() 52 mAllCallingUids.put(callingUid, true); in incrementStats() 62 private void incrementStats(int callingUid, boolean inBatch, in incrementStats() argument 64 incrementStats(callingUid, inBatch ? statsInBatch : statsNonBatch); in incrementStats() 67 public final void incrementInsertStats(int callingUid, boolean inBatch) { in incrementInsertStats() argument 68 incrementStats(callingUid, inBatch, mInsertStats, mInsertInBatchStats); in incrementInsertStats() 71 public final void incrementUpdateStats(int callingUid, boolean inBatch) { in incrementUpdateStats() argument 72 incrementStats(callingUid, inBatch, mUpdateStats, mUpdateInBatchStats); in incrementUpdateStats() 75 public final void incrementDeleteStats(int callingUid, boolean inBatch) { in incrementDeleteStats() argument [all …]
|
/frameworks/base/services/core/java/com/android/server/wm/ |
D | SafeActivityOptions.java | 147 int callingPid, int callingUid) { in setCallingPidUidForRemoteAnimationAdapter() argument 156 adapter.setCallingPidUid(callingPid, callingUid); in setCallingPidUidForRemoteAnimationAdapter() 210 ActivityOptions options, int callingPid, int callingUid) { in checkPermissions() argument 214 && !supervisor.mRecentTasks.isCallerRecents(callingUid)) { in checkPermissions() 216 START_TASKS_FROM_RECENTS, callingPid, callingUid); in checkPermissions() 220 + ", uid=" + callingUid + ") with launchTaskId=" in checkPermissions() 231 && !supervisor.isCallerAllowedToLaunchOnTaskDisplayArea(callingPid, callingUid, in checkPermissions() 235 + ", uid=" + callingUid + ") with launchTaskDisplayArea=" + taskDisplayArea; in checkPermissions() 242 && !supervisor.isCallerAllowedToLaunchOnDisplay(callingPid, callingUid, in checkPermissions() 246 + ", uid=" + callingUid + ") with launchDisplayId=" in checkPermissions() [all …]
|
D | KeyguardDisableHandler.java | 72 void disableKeyguard(IBinder token, String tag, int callingUid, int userId) { in disableKeyguard() argument 73 UserTokenWatcher watcherForCaller = watcherForCallingUid(token, callingUid); in disableKeyguard() 77 void reenableKeyguard(IBinder token, int callingUid, int userId) { in reenableKeyguard() argument 78 UserTokenWatcher watcherForCaller = watcherForCallingUid(token, callingUid); in reenableKeyguard() 82 private UserTokenWatcher watcherForCallingUid(IBinder token, int callingUid) { in watcherForCallingUid() argument 83 if (Process.isApplicationUid(callingUid)) { in watcherForCallingUid() 85 } else if (callingUid == Process.SYSTEM_UID && token instanceof LockTaskToken) { in watcherForCallingUid()
|
/frameworks/base/apex/blobstore/service/java/com/android/server/blob/ |
D | BlobStoreManagerService.java | 347 int callingUid, String callingPackage) { in createSessionInternal() argument 349 final int sessionsCount = getSessionsCountLocked(callingUid, callingPackage); in createSessionInternal() 357 sessionId, blobHandle, callingUid, callingPackage, in createSessionInternal() 359 addSessionForUserLocked(session, UserHandle.getUserId(callingUid)); in createSessionInternal() 362 + "; callingUid=" + callingUid + ", callingPackage=" + callingPackage); in createSessionInternal() 370 int callingUid, String callingPackage) { in openSessionInternal() argument 374 UserHandle.getUserId(callingUid)).get(sessionId); in openSessionInternal() 375 if (session == null || !session.hasAccess(callingUid, callingPackage) in openSessionInternal() 385 int callingUid, String callingPackage) { in abandonSessionInternal() argument 388 callingUid, callingPackage); in abandonSessionInternal() [all …]
|
/frameworks/base/services/core/java/com/android/server/pm/permission/ |
D | LegacyPermissionManagerService.java | 190 int callingUid = mInjector.getCallingUid(); in verifyCallerCanCheckAccess() local 192 if (UserHandle.getAppId(callingUid) >= Process.FIRST_APPLICATION_UID && (callingUid != uid in verifyCallerCanCheckAccess() 196 callingUid, callingPid, packageName, uid, pid, message); in verifyCallerCanCheckAccess() 236 final int callingUid = Binder.getCallingUid(); in grantDefaultPermissionsToActiveLuiApp() local 238 "grantDefaultPermissionsToActiveLuiApp", callingUid); in grantDefaultPermissionsToActiveLuiApp() 245 final int callingUid = Binder.getCallingUid(); in revokeDefaultPermissionsFromLuiApps() local 247 "revokeDefaultPermissionsFromLuiApps", callingUid); in revokeDefaultPermissionsFromLuiApps() 254 final int callingUid = Binder.getCallingUid(); in grantDefaultPermissionsToEnabledImsServices() local 256 "grantDefaultPermissionsToEnabledImsServices", callingUid); in grantDefaultPermissionsToEnabledImsServices() 264 final int callingUid = Binder.getCallingUid(); in grantDefaultPermissionsToEnabledTelephonyDataServices() local [all …]
|
/frameworks/base/services/core/java/com/android/server/notification/ |
D | NotificationDelegate.java | 29 void onClearAll(int callingUid, int callingPid, int userId); in onClearAll() argument 30 void onNotificationClick(int callingUid, int callingPid, String key, in onNotificationClick() argument 32 void onNotificationActionClick(int callingUid, int callingPid, String key, int actionIndex, in onNotificationActionClick() argument 34 void onNotificationClear(int callingUid, int callingPid, in onNotificationClear() argument 39 void onNotificationError(int callingUid, int callingPid, in onNotificationError() argument 68 int callingUid); in grantInlineReplyUriPermission() argument 73 void clearInlineReplyUriPermissions(String key, int callingUid); in clearInlineReplyUriPermissions() argument
|
/frameworks/base/services/usage/java/com/android/server/usage/ |
D | UsageStatsService.java | 533 private boolean shouldObfuscateInstantAppsForCaller(int callingUid, int userId) { in shouldObfuscateInstantAppsForCaller() argument 534 return !mPackageManagerInternal.canAccessInstantApps(callingUid, userId); in shouldObfuscateInstantAppsForCaller() 538 int callingPid, int callingUid) { in shouldHideShortcutInvocationEvents() argument 542 callingPid, callingUid); in shouldHideShortcutInvocationEvents() 547 private boolean shouldHideLocusIdEvents(int callingPid, int callingUid) { in shouldHideLocusIdEvents() argument 548 if (callingUid == Process.SYSTEM_UID) { in shouldHideLocusIdEvents() 552 android.Manifest.permission.ACCESS_LOCUS_ID_USAGE_STATS, callingPid, callingUid) in shouldHideLocusIdEvents() 561 private boolean shouldObfuscateNotificationEvents(int callingPid, int callingUid) { in shouldObfuscateNotificationEvents() argument 562 if (callingUid == Process.SYSTEM_UID) { in shouldObfuscateNotificationEvents() 566 callingPid, callingUid) == PackageManager.PERMISSION_GRANTED); in shouldObfuscateNotificationEvents() [all …]
|
/frameworks/base/services/core/java/com/android/server/net/ |
D | NetworkStatsObservers.java | 78 IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) { in register() argument 80 RequestInfo requestInfo = buildRequestInfo(request, messenger, binder, callingUid, in register() 93 public void unregister(DataUsageRequest request, int callingUid) { in unregister() argument 94 getHandler().sendMessage(mHandler.obtainMessage(MSG_UNREGISTER, callingUid, 0 /* ignore */, in unregister() 168 private void handleUnregister(DataUsageRequest request, int callingUid) { in handleUnregister() argument 175 if (Process.SYSTEM_UID != callingUid && requestInfo.mCallingUid != callingUid) { in handleUnregister() 176 Slog.w(TAG, "Caller uid " + callingUid + " is not owner of " + request); in handleUnregister() 209 Messenger messenger, IBinder binder, int callingUid, in buildRequestInfo() argument 212 return new UserUsageRequestInfo(this, request, messenger, binder, callingUid, in buildRequestInfo() 217 return new NetworkUsageRequestInfo(this, request, messenger, binder, callingUid, in buildRequestInfo() [all …]
|
D | NetworkStatsAccess.java | 107 Context context, int callingUid, String callingPackage) { in checkAccessLevel() argument 122 final boolean isDeviceOwner = dpmi != null && dpmi.isActiveDeviceOwner(callingUid); in checkAccessLevel() 123 final int appId = UserHandle.getAppId(callingUid); in checkAccessLevel() 131 boolean hasAppOpsPermission = hasAppOpsPermission(context, callingUid, callingPackage); in checkAccessLevel() 138 boolean isProfileOwner = dpmi != null && (dpmi.isActiveProfileOwner(callingUid) in checkAccessLevel() 139 || dpmi.isActiveDeviceOwner(callingUid)); in checkAccessLevel() 181 Context context, int callingUid, String callingPackage) { in hasAppOpsPermission() argument 187 callingUid, callingPackage); in hasAppOpsPermission()
|
/frameworks/av/media/libmediatranscoding/ |
D | TranscodingClientManager.cpp | 133 int32_t callingUid = AIBinder_getCallingUid(); in submitRequest() local 140 in_clientUid = callingUid; in submitRequest() 143 } else if (in_clientUid != callingUid && !owner->isTrustedCaller(callingPid, callingUid)) { in submitRequest() 146 in_clientPid, in_clientUid, callingUid); in submitRequest() 150 in_clientPid, in_clientUid, callingUid); in submitRequest() 159 } else if (in_clientPid != callingPid && !owner->isTrustedCaller(callingPid, callingUid)) { in submitRequest() 162 in_clientPid, in_clientUid, callingUid); in submitRequest() 166 in_clientPid, in_clientUid, callingUid); in submitRequest() 171 *_aidl_return = owner->mSessionController->submit(mClientId, sessionId, callingUid, in submitRequest() 241 int32_t callingUid = AIBinder_getCallingUid(); in addClientUid() local [all …]
|
/frameworks/base/telephony/common/android/telephony/ |
D | LocationAccessPolicy.java | 63 public final int callingUid; field in LocationAccessPolicy.LocationPermissionQuery 71 int callingUid, int callingPid, int minSdkVersionForCoarse, in LocationPermissionQuery() argument 75 this.callingUid = callingUid; in LocationPermissionQuery() 114 public Builder setCallingUid(int callingUid) { in setCallingUid() argument 115 mCallingUid = callingUid; in setCallingUid() 262 query.callingUid, permissionToCheck); in checkAppLocationPermissionHelper() 267 .noteOpNoThrow(getAppOpsString(permissionToCheck), query.callingUid, in checkAppLocationPermissionHelper() 313 if (query.callingUid == Process.PHONE_UID || query.callingUid == Process.SYSTEM_UID in checkLocationPermission() 314 || query.callingUid == Process.NETWORK_STACK_UID in checkLocationPermission() 315 || query.callingUid == Process.ROOT_UID) { in checkLocationPermission() [all …]
|
/frameworks/base/services/tests/servicestests/src/com/android/server/devicepolicy/ |
D | DevicePolicyManagerTest.java | 235 mServiceContext.binder.callingUid = DpmMockContext.CALLER_UID; in setUp() 264 mAdmin1Context.binder.callingUid = DpmMockContext.CALLER_UID; in setUp() 354 mServiceContext.binder.callingUid = in setAsProfileOwner() 573 mMockContext.binder.callingUid = ANOTHER_ADMIN_UID; in testSetActiveAdmin_multiUsers() 577 mMockContext.binder.callingUid = DpmMockContext.CALLER_UID; in testSetActiveAdmin_multiUsers() 581 mMockContext.binder.callingUid = ANOTHER_ADMIN_UID; in testSetActiveAdmin_multiUsers() 655 mContext.binder.callingUid = 1234567; in testRemoveActiveAdmin_SecurityException() 668 mContext.binder.callingUid = DpmMockContext.CALLER_UID; in testRemoveActiveAdmin_userNotRunningOrLocked() 717 mContext.binder.callingUid = 1234567; in testRemoveActiveAdmin_fromDifferentUserWithINTERACT_ACROSS_USERS_FULL() 848 mContext.binder.callingUid = 123456; in testForceRemoveActiveAdmin_nonShellCaller() [all …]
|
/frameworks/base/services/core/java/com/android/server/accounts/ |
D | AccountManagerService.java | 465 int callingUid = Binder.getCallingUid(); in addAccountExplicitlyWithVisibility() local 468 Log.v(TAG, "addAccountExplicitly: " + account + ", caller's uid " + callingUid in addAccountExplicitlyWithVisibility() 472 if (!isAccountManagedByCaller(account.type, callingUid, userId)) { in addAccountExplicitlyWithVisibility() 474 callingUid, account.type); in addAccountExplicitlyWithVisibility() 487 return addAccountInternal(accounts, account, password, extras, callingUid, in addAccountExplicitlyWithVisibility() 497 int callingUid = Binder.getCallingUid(); in getAccountsAndVisibilityForPackage() local 499 boolean isSystemUid = UserHandle.isSameApp(callingUid, Process.SYSTEM_UID); in getAccountsAndVisibilityForPackage() 500 List<String> managedTypes = getTypesForCaller(callingUid, userId, isSystemUid); in getAccountsAndVisibilityForPackage() 506 + callingUid + " with packageName=" + packageName); in getAccountsAndVisibilityForPackage() 516 return getAccountsAndVisibilityForPackage(packageName, managedTypes, callingUid, in getAccountsAndVisibilityForPackage() [all …]
|
/frameworks/base/services/core/java/com/android/server/power/ |
D | AmbientDisplaySuppressionController.java | 59 public void suppress(@NonNull String token, int callingUid, boolean suppress) { in suppress() argument 60 Pair<String, Integer> suppressionToken = Pair.create(requireNonNull(token), callingUid); in suppress() 83 List<String> getSuppressionTokens(int callingUid) { in getSuppressionTokens() argument 87 if (token.second == callingUid) { in getSuppressionTokens() 101 public boolean isSuppressed(@NonNull String token, int callingUid) { in isSuppressed() argument 102 return mSuppressionTokens.contains(Pair.create(requireNonNull(token), callingUid)); in isSuppressed()
|
/frameworks/base/services/core/java/com/android/server/tv/ |
D | TvInputManagerService.java | 676 private SessionState getSessionStateLocked(IBinder sessionToken, int callingUid, int userId) { in getSessionStateLocked() argument 678 return getSessionStateLocked(sessionToken, callingUid, userState); in getSessionStateLocked() 683 int callingUid, UserState userState) { in getSessionStateLocked() argument 689 if (callingUid != Process.SYSTEM_UID && callingUid != sessionState.callingUid) { in getSessionStateLocked() 691 + " from uid " + callingUid); in getSessionStateLocked() 697 private ITvInputSession getSessionLocked(IBinder sessionToken, int callingUid, int userId) { in getSessionLocked() argument 698 return getSessionLocked(getSessionStateLocked(sessionToken, callingUid, userId)); in getSessionLocked() 711 private int resolveCallingUserId(int callingPid, int callingUid, int requestedUserId, in resolveCallingUserId() argument 713 return ActivityManager.handleIncomingUser(callingPid, callingUid, requestedUserId, false, in resolveCallingUserId() 838 private SessionState releaseSessionLocked(IBinder sessionToken, int callingUid, int userId) { in releaseSessionLocked() argument [all …]
|
/frameworks/base/services/restrictions/java/com/android/server/restrictions/ |
D | RestrictionsManagerService.java | 97 int callingUid = Binder.getCallingUid(); in requestPermission() local 98 int userHandle = UserHandle.getUserId(callingUid); in requestPermission() 110 enforceCallerMatchesPackage(callingUid, packageName, "Package name does not" + in requestPermission() 163 int callingUid = Binder.getCallingUid(); in notifyPermissionResponse() local 164 int userHandle = UserHandle.getUserId(callingUid); in notifyPermissionResponse() 172 enforceCallerMatchesPackage(callingUid, permProvider.getPackageName(), in notifyPermissionResponse() 187 private void enforceCallerMatchesPackage(int callingUid, String packageName, in enforceCallerMatchesPackage() argument 190 String[] pkgs = AppGlobals.getPackageManager().getPackagesForUid(callingUid); in enforceCallerMatchesPackage() 193 throw new SecurityException(message + callingUid); in enforceCallerMatchesPackage()
|
/frameworks/base/cmds/incidentd/src/ |
D | IncidentService.cpp | 64 uid_t callingUid = IPCThreadState::self()->getCallingUid(); in checkIncidentPermissions() local 66 if (callingUid == AID_ROOT || callingUid == AID_SHELL) { in checkIncidentPermissions() 81 callingPid, callingUid); in checkIncidentPermissions() 88 callingPid, callingUid); in checkIncidentPermissions() 97 if (callingUid != AID_SHELL && callingUid != AID_ROOT) { in checkIncidentPermissions() 99 callingPid, callingUid); in checkIncidentPermissions() 106 if (callingUid != AID_SHELL && callingUid != AID_ROOT && callingUid != AID_STATSD && in checkIncidentPermissions() 107 callingUid != AID_SYSTEM) { in checkIncidentPermissions() 109 callingPid, callingUid); in checkIncidentPermissions() 355 const uid_t callingUid = IPCThreadState::self()->getCallingUid(); in registerSection() local [all …]
|
/frameworks/base/apex/appsearch/service/java/com/android/server/appsearch/ |
D | AppSearchManagerService.java | 334 int callingUid = Binder.getCallingUid(); in setSchema() local 335 UserHandle callingUser = handleIncomingUser(userHandle, callingUid); in setSchema() 344 verifyCallingPackage(userContext, callingUser, callingUid, packageName); in setSchema() 420 int callingUid = Binder.getCallingUid(); in getSchema() local 421 UserHandle callingUser = handleIncomingUser(userHandle, callingUid); in getSchema() 426 verifyCallingPackage(userContext, callingUser, callingUid, packageName); in getSchema() 452 int callingUid = Binder.getCallingUid(); in getNamespaces() local 453 UserHandle callingUser = handleIncomingUser(userHandle, callingUid); in getNamespaces() 458 verifyCallingPackage(userContext, callingUser, callingUid, packageName); in getNamespaces() 487 int callingUid = Binder.getCallingUid(); in putDocuments() local [all …]
|
/frameworks/base/services/core/java/com/android/server/hdmi/ |
D | HdmiCecAtomWriter.java | 44 HdmiCecMessage message, int direction, int callingUid, int errorCode) { in messageReported() argument 46 message, direction, errorCode, callingUid); in messageReported() 58 public void messageReported(HdmiCecMessage message, int direction, int callingUid) { in messageReported() argument 59 messageReported(message, direction, callingUid, ERROR_CODE_UNKNOWN); in messageReported() 71 HdmiCecMessage message, int direction, int errorCode, int callingUid) { in createMessageReportedGenericArgs() argument 75 return new MessageReportedGenericArgs(callingUid, direction, message.getSource(), in createMessageReportedGenericArgs()
|
/frameworks/base/services/core/java/com/android/server/pm/ |
D | PackageInstallerService.java | 529 final int callingUid = Binder.getCallingUid(); in createSessionInternal() local 531 callingUid, userId, true, true, "createSession"); in createSessionInternal() 573 if ((callingUid == Process.SHELL_UID) || (callingUid == Process.ROOT_UID)) { in createSessionInternal() 579 if (callingUid != Process.SYSTEM_UID) { in createSessionInternal() 581 mAppOps.checkPackage(callingUid, installerPackageName); in createSessionInternal() 588 mAppOps.checkPackage(callingUid, requestedInstallerPackageName); in createSessionInternal() 596 && !mPm.isCallerVerifier(callingUid)) { in createSessionInternal() 608 && params.originatingUid != callingUid) { in createSessionInternal() 616 if (Build.IS_DEBUGGABLE || isCalledBySystemOrShell(callingUid)) { in createSessionInternal() 654 if (isCalledBySystemOrShell(callingUid) || mBypassNextAllowedApexUpdateCheck) { in createSessionInternal() [all …]
|
/frameworks/base/core/tests/coretests/src/com/android/internal/os/ |
D | BatteryStatsBinderCallStatsTest.java | 52 int callingUid = Process.FIRST_APPLICATION_UID + 1; in testNoteBinderCallStats() local 56 BinderCallsStats.CallStat stat1 = new BinderCallsStats.CallStat(callingUid, in testNoteBinderCallStats() 66 BinderCallsStats.CallStat stat2 = new BinderCallsStats.CallStat(callingUid, in testNoteBinderCallStats() 95 int callingUid = Process.FIRST_APPLICATION_UID + 1; in testProportionalSystemServiceUsage_noStatsForSomeMethods() local 101 BinderCallsStats.CallStat stat1a = new BinderCallsStats.CallStat(callingUid, in testProportionalSystemServiceUsage_noStatsForSomeMethods() 108 BinderCallsStats.CallStat stat1b = new BinderCallsStats.CallStat(callingUid, in testProportionalSystemServiceUsage_noStatsForSomeMethods() 119 BinderCallsStats.CallStat stat2 = new BinderCallsStats.CallStat(callingUid, in testProportionalSystemServiceUsage_noStatsForSomeMethods()
|
/frameworks/base/services/core/java/com/android/server/pm/verify/domain/proxy/ |
D | DomainVerificationProxyV1.java | 99 int verificationCode, @Nullable List<String> failedDomains, int callingUid) { in queueLegacyVerifyResult() argument 105 new Response(callingUid, verificationId, verificationCode, failedDomains)); in queueLegacyVerifyResult() 207 int callingUid = response.callingUid; in runMessage() local 210 if (mManager.setDomainVerificationStatusInternal(callingUid, domainSetId, in runMessage() 222 if (mManager.setDomainVerificationStatusInternal(callingUid, domainSetId, in runMessage() 239 public boolean isCallerVerifier(int callingUid) { in isCallerVerifier() argument 240 return mConnection.isCallerPackage(callingUid, mVerifierComponent.getPackageName()); in isCallerVerifier() 308 public final int callingUid; field in DomainVerificationProxyV1.Response 314 private Response(int callingUid, int verificationId, int verificationCode, in Response() argument 316 this.callingUid = callingUid; in Response()
|
/frameworks/base/services/core/java/com/android/server/os/ |
D | BugreportManagerServiceImpl.java | 81 int callingUid = Binder.getCallingUid(); in startBugreport() local 82 enforcePermission(callingPackage, callingUid, bugreportMode in startBugreport() 92 startBugreportLocked(callingUid, callingPackage, bugreportFd, screenshotFd, in startBugreport() 100 int callingUid = Binder.getCallingUid(); in cancelBugreport() local 101 enforcePermission(callingPackage, callingUid, true /* checkCarrierPrivileges */); in cancelBugreport() 114 ds.cancelBugreport(callingUid, callingPackage); in cancelBugreport() 138 String callingPackage, int callingUid, boolean checkCarrierPrivileges) { in enforcePermission() argument 139 mAppOps.checkPackage(callingUid, callingPackage); in enforcePermission() 227 private void startBugreportLocked(int callingUid, String callingPackage, in startBugreportLocked() argument 248 ds.startBugreport(callingUid, callingPackage, in startBugreportLocked() [all …]
|
/frameworks/base/services/core/java/com/android/server/uri/ |
D | UriGrantsManagerService.java | 266 final int callingUid = Binder.getCallingUid(); in getUriPermissions() local 267 final int callingUserId = UserHandle.getUserId(callingUid); in getUriPermissions() 271 if (packageUid != callingUid) { in getUriPermissions() 273 "Package " + packageName + " does not belong to calling UID " + callingUid); in getUriPermissions() 280 callingUid); in getUriPermissions() 515 private boolean checkAuthorityGrantsLocked(int callingUid, ProviderInfo cpi, int userId, in checkAuthorityGrantsLocked() argument 517 final ArrayMap<GrantUri, UriPermission> perms = mGrantedUriPermissions.get(callingUid); in checkAuthorityGrantsLocked() 582 private NeededUriGrants checkGrantUriPermissionFromIntentUnlocked(int callingUid, in checkGrantUriPermissionFromIntentUnlocked() argument 605 contentUserHint = UserHandle.getUserId(callingUid); in checkGrantUriPermissionFromIntentUnlocked() 621 targetUid = checkGrantUriPermissionUnlocked(callingUid, targetPkg, grantUri, mode, in checkGrantUriPermissionFromIntentUnlocked() [all …]
|