Lines Matching refs:info

834             ApplicationInfo info = mPackageManager.getApplicationInfo(
836 if ((info.flags & ApplicationInfo.FLAG_SYSTEM) != 0) {
842 Slog.w(TAG, "Possible Google transport spoof: ignoring " + info);
971 PackageInfo info;
974 info = mPackageManager.getPackageInfo(pkg, 0);
1654 PackageInfo info = mPackageManager.getPackageInfo(packageName, 0);
1655 if ((info.applicationInfo.flags & ApplicationInfo.FLAG_ALLOW_CLEAR_USER_DATA) == 0) {
2114 // Look up the package info & signatures. This is first so that if it
2954 RestoreFileRunnable(IBackupAgent agent, FileMetadata info,
2957 mInfo = info;
3166 FileMetadata info;
3168 info = readTarHeaders(instream);
3169 if (info != null) {
3171 dumpFileMetadata(info);
3174 final String pkg = info.packageName;
3193 if (info.path.equals(BACKUP_MANIFEST_FILENAME)) {
3194 mPackagePolicies.put(pkg, readAppManifest(info, instream));
3195 mPackageInstallers.put(pkg, info.installerPackageName);
3199 skipTarPadding(info.size, instream);
3214 if (info.domain.equals(FullBackup.APK_TREE_TOKEN)) {
3218 okay = installApk(info, installerName, instream);
3226 skipTarPadding(info.size, instream);
3237 if (info.domain.equals(FullBackup.APK_TREE_TOKEN)) {
3319 long toCopy = info.size;
3323 + info.path);
3332 mAgent, info, mPipes[0], token);
3335 mAgent.doRestoreFile(mPipes[0], info.size, info.type,
3336 info.domain, info.path, info.mode, info.mtime,
3378 // the delta from info.size to the end of block.
3379 skipTarPadding(info.size, instream);
3402 long bytesToConsume = (info.size + 511) & ~511;
3417 info = null;
3420 return (info != null);
3534 boolean installApk(FileMetadata info, String installerPackage, InputStream instream) {
3537 if (DEBUG) Slog.d(TAG, "Installing from backup: " + info.packageName);
3541 File apkFile = new File(mDataDir, info.packageName);
3545 long size = info.size;
3570 if (mPackagePolicies.get(info.packageName) != RestorePolicy.ACCEPT) {
3576 if (!mInstallObserver.mPackageName.equals(info.packageName)) {
3578 + info.packageName + " but apk was really "
3585 PackageInfo pkg = mPackageManager.getPackageInfo(info.packageName,
3589 + info.packageName + " but it disallows backup/restore");
3593 Signature[] sigs = mManifestSignatures.get(info.packageName);
3595 Slog.w(TAG, "Installed app " + info.packageName
3602 Slog.w(TAG, "Install of package " + info.packageName
3641 RestorePolicy readAppManifest(FileMetadata info, InputStream instream)
3644 if (info.size > 64 * 1024) {
3645 throw new IOException("Restore manifest too big; corrupt? size=" + info.size);
3648 byte[] buffer = new byte[(int) info.size];
3649 if (readExactly(instream, buffer, 0, (int)info.size) == info.size) {
3650 mBytes += info.size;
3664 if (manifestPackage.equals(info.packageName)) {
3670 info.installerPackageName = (str[0].length() > 0) ? str[0] : null;
3681 mManifestSignatures.put(info.packageName, sigs);
3683 // Okay, got the manifest info we need...
3686 info.packageName, PackageManager.GET_SIGNATURES);
3716 + "installed application for " + info.packageName);
3719 Slog.w(TAG, "Package " + info.packageName
3724 + info.packageName + " but allowBackup=false");
3730 if (DEBUG) Slog.i(TAG, "Package " + info.packageName
3736 Slog.i(TAG, "Cannot restore package " + info.packageName
3741 + info.packageName);
3744 Slog.i(TAG, "Expected package " + info.packageName
3749 + " for package " + info.packageName);
3752 Slog.w(TAG, "Corrupt restore manifest for package " + info.packageName);
3780 void dumpFileMetadata(FileMetadata info) {
3785 b.append((info.type == BackupAgent.TYPE_DIRECTORY) ? 'd' : '-');
3786 b.append(((info.mode & 0400) != 0) ? 'r' : '-');
3787 b.append(((info.mode & 0200) != 0) ? 'w' : '-');
3788 b.append(((info.mode & 0100) != 0) ? 'x' : '-');
3789 b.append(((info.mode & 0040) != 0) ? 'r' : '-');
3790 b.append(((info.mode & 0020) != 0) ? 'w' : '-');
3791 b.append(((info.mode & 0010) != 0) ? 'x' : '-');
3792 b.append(((info.mode & 0004) != 0) ? 'r' : '-');
3793 b.append(((info.mode & 0002) != 0) ? 'w' : '-');
3794 b.append(((info.mode & 0001) != 0) ? 'x' : '-');
3795 b.append(String.format(" %9d ", info.size));
3797 Date stamp = new Date(info.mtime);
3800 b.append(info.packageName);
3802 b.append(info.domain);
3804 b.append(info.path);
3812 FileMetadata info = null;
3818 info = new FileMetadata();
3819 info.size = extractRadix(block, 124, 12, 8);
3820 info.mtime = extractRadix(block, 136, 12, 8);
3821 info.mode = extractRadix(block, 100, 8, 8);
3823 info.path = extractString(block, 345, 155); // prefix
3826 if (info.path.length() > 0) info.path += '/';
3827 info.path += path;
3834 gotHeader = readPaxExtendedHeader(instream, info);
3846 case '0': info.type = BackupAgent.TYPE_FILE; break;
3848 info.type = BackupAgent.TYPE_DIRECTORY;
3849 if (info.size != 0) {
3851 info.size = 0;
3857 if (DEBUG) Slog.w(TAG, "Saw type=0 in tar header block, info=" + info);
3870 info.path, 0, FullBackup.SHARED_PREFIX.length())) {
3872 info.path = info.path.substring(FullBackup.SHARED_PREFIX.length());
3873 info.packageName = SHARED_BACKUP_AGENT_PACKAGE;
3874 info.domain = FullBackup.SHARED_STORAGE_TOKEN;
3875 if (DEBUG) Slog.i(TAG, "File in shared storage: " + info.path);
3877 info.path, 0, FullBackup.APPS_PREFIX.length())) {
3881 info.path = info.path.substring(FullBackup.APPS_PREFIX.length());
3884 int slash = info.path.indexOf('/');
3885 if (slash < 0) throw new IOException("Illegal semantic path in " + info.path);
3886 info.packageName = info.path.substring(0, slash);
3887 info.path = info.path.substring(slash+1);
3890 if (!info.path.equals(BACKUP_MANIFEST_FILENAME)) {
3891 slash = info.path.indexOf('/');
3892 if (slash < 0) throw new IOException("Illegal semantic path in non-manifest " + info.path);
3893 info.domain = info.path.substring(0, slash);
3895 if (!info.domain.equals(FullBackup.APK_TREE_TOKEN)
3896 && !info.domain.equals(FullBackup.DATA_TREE_TOKEN)
3897 && !info.domain.equals(FullBackup.DATABASE_TREE_TOKEN)
3898 && !info.domain.equals(FullBackup.ROOT_TREE_TOKEN)
3899 && !info.domain.equals(FullBackup.SHAREDPREFS_TREE_TOKEN)
3900 && !info.domain.equals(FullBackup.OBB_TREE_TOKEN)
3901 && !info.domain.equals(FullBackup.CACHE_TREE_TOKEN)) {
3902 throw new IOException("Unrecognized domain " + info.domain);
3905 info.path = info.path.substring(slash + 1);
3916 return info;
3963 // overwrites 'info' fields based on the pax extended header
3964 boolean readPaxExtendedHeader(InputStream instream, FileMetadata info)
3967 if (info.size > 32*1024) {
3968 Slog.w(TAG, "Suspiciously large pax header size " + info.size
3970 throw new IOException("Sanity failure: pax header size " + info.size);
3974 int numBlocks = (int)((info.size + 511) >> 9);
3981 final int contentSize = (int) info.size;
4007 info.path = valStr;
4009 info.size = Long.parseLong(valStr);
4920 PackageInfo info;
4922 info = mPackageManager.getPackageInfo(packageName, PackageManager.GET_SIGNATURES);
4956 new ClearParams(getTransport(mCurrentTransport), info));