Loading core/java/android/appwidget/flags.aconfig +0 −10 Original line number Diff line number Diff line Loading @@ -96,16 +96,6 @@ flag { is_fixed_read_only: true } flag { name: "check_remote_views_uri_permission" namespace: "app_widgets" description: "Check that the widget provider has permissions to access any URIs within its RemoteViews" bug: "369137473" metadata { purpose: PURPOSE_BUGFIX } } flag { name: "engagement_metrics" namespace: "app_widgets" Loading services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java +1 −4 Original line number Diff line number Diff line Loading @@ -16,7 +16,6 @@ package com.android.server.appwidget; import static android.appwidget.flags.Flags.checkRemoteViewsUriPermission; import static android.appwidget.flags.Flags.remoteAdapterConversion; import static android.appwidget.flags.Flags.remoteViewsProto; import static android.appwidget.flags.Flags.removeAppWidgetServiceIoFromCriticalPath; Loading Loading @@ -2560,9 +2559,7 @@ class AppWidgetServiceImpl extends IAppWidgetService.Stub implements WidgetBacku // Make sure the package runs under the caller uid. mSecurityPolicy.enforceCallFromPackage(callingPackage); // Make sure RemoteViews do not contain URIs that the caller cannot access. if (checkRemoteViewsUriPermission()) { checkRemoteViewsUris(views); } synchronized (mLock) { ensureGroupStateLoadedLocked(userId); Loading Loading
core/java/android/appwidget/flags.aconfig +0 −10 Original line number Diff line number Diff line Loading @@ -96,16 +96,6 @@ flag { is_fixed_read_only: true } flag { name: "check_remote_views_uri_permission" namespace: "app_widgets" description: "Check that the widget provider has permissions to access any URIs within its RemoteViews" bug: "369137473" metadata { purpose: PURPOSE_BUGFIX } } flag { name: "engagement_metrics" namespace: "app_widgets" Loading
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java +1 −4 Original line number Diff line number Diff line Loading @@ -16,7 +16,6 @@ package com.android.server.appwidget; import static android.appwidget.flags.Flags.checkRemoteViewsUriPermission; import static android.appwidget.flags.Flags.remoteAdapterConversion; import static android.appwidget.flags.Flags.remoteViewsProto; import static android.appwidget.flags.Flags.removeAppWidgetServiceIoFromCriticalPath; Loading Loading @@ -2560,9 +2559,7 @@ class AppWidgetServiceImpl extends IAppWidgetService.Stub implements WidgetBacku // Make sure the package runs under the caller uid. mSecurityPolicy.enforceCallFromPackage(callingPackage); // Make sure RemoteViews do not contain URIs that the caller cannot access. if (checkRemoteViewsUriPermission()) { checkRemoteViewsUris(views); } synchronized (mLock) { ensureGroupStateLoadedLocked(userId); Loading