diff --git a/core/java/android/content/pm/PackageParser.java b/core/java/android/content/pm/PackageParser.java index ed7a2a3ea30d0..924df1b39cb88 100644 --- a/core/java/android/content/pm/PackageParser.java +++ b/core/java/android/content/pm/PackageParser.java @@ -4702,7 +4702,7 @@ public class PackageParser { private static boolean copyNeeded(int flags, Package p, PackageUserState state, Bundle metaData, int userId) { - if (userId != UserHandle.USER_OWNER) { + if (userId != UserHandle.USER_SYSTEM) { // We always need to copy for other users, since we need // to fix up the uid. return true; diff --git a/core/java/android/content/pm/RegisteredServicesCache.java b/core/java/android/content/pm/RegisteredServicesCache.java index b293e2a834000..b3f03c3290614 100644 --- a/core/java/android/content/pm/RegisteredServicesCache.java +++ b/core/java/android/content/pm/RegisteredServicesCache.java @@ -213,7 +213,7 @@ public abstract class RegisteredServicesCache { @Override public void onReceive(Context context, Intent intent) { // External apps can't coexist with multi-user, so scan owner - handlePackageEvent(intent, UserHandle.USER_OWNER); + handlePackageEvent(intent, UserHandle.USER_SYSTEM); } }; diff --git a/services/core/java/com/android/server/am/ActivityManagerService.java b/services/core/java/com/android/server/am/ActivityManagerService.java index f3ea1c46af42d..b6cd477729745 100644 --- a/services/core/java/com/android/server/am/ActivityManagerService.java +++ b/services/core/java/com/android/server/am/ActivityManagerService.java @@ -16022,7 +16022,7 @@ public final class ActivityManagerService extends ActivityManagerNative "Call does not support special user #" + targetUserId); } // Check shell permission - if (callingUid == Process.SHELL_UID && targetUserId >= UserHandle.USER_OWNER) { + if (callingUid == Process.SHELL_UID && targetUserId >= UserHandle.USER_SYSTEM) { if (mUserManager.hasUserRestriction(UserManager.DISALLOW_DEBUGGING_FEATURES, targetUserId)) { throw new SecurityException("Shell does not have permission to access user " diff --git a/services/core/java/com/android/server/content/SyncManager.java b/services/core/java/com/android/server/content/SyncManager.java index c998c2c28aac3..292aff90df7ab 100644 --- a/services/core/java/com/android/server/content/SyncManager.java +++ b/services/core/java/com/android/server/content/SyncManager.java @@ -790,7 +790,7 @@ public class SyncManager { for (AccountAndUser account : accounts) { // If userId is specified, do not sync accounts of other users - if (userId >= UserHandle.USER_OWNER && account.userId >= UserHandle.USER_OWNER + if (userId >= UserHandle.USER_SYSTEM && account.userId >= UserHandle.USER_SYSTEM && userId != account.userId) { continue; } diff --git a/services/core/java/com/android/server/location/LocationBlacklist.java b/services/core/java/com/android/server/location/LocationBlacklist.java index 6f22689320caa..3f3f82871c0ff 100644 --- a/services/core/java/com/android/server/location/LocationBlacklist.java +++ b/services/core/java/com/android/server/location/LocationBlacklist.java @@ -50,7 +50,7 @@ public final class LocationBlacklist extends ContentObserver { private String[] mWhitelist = new String[0]; private String[] mBlacklist = new String[0]; - private int mCurrentUserId = UserHandle.USER_OWNER; + private int mCurrentUserId = UserHandle.USER_SYSTEM; public LocationBlacklist(Context context, Handler handler) { super(handler);