Lines Matching defs:permission

19 import static android.Manifest.permission.INTERACT_ACROSS_USERS;
20 import static android.Manifest.permission.INTERACT_ACROSS_USERS_FULL;
21 import static android.Manifest.permission.START_TASKS_FROM_RECENTS;
1913 ServiceManager.addService("permission", new PermissionController(this));
1964 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
1968 + " without permission " + android.Manifest.permission.DUMP);
1984 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
1988 + " without permission " + android.Manifest.permission.DUMP);
2004 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
2008 + " without permission " + android.Manifest.permission.DUMP);
2024 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
2028 + " without permission " + android.Manifest.permission.DUMP);
2935 android.Manifest.permission.ACCESS_ALL_EXTERNAL_STORAGE,
3234 throw new SecurityException("Shell does not have permission to access user "
3250 enforceCallingPermission(android.Manifest.permission.SET_SCREEN_COMPATIBILITY,
3267 enforceCallingPermission(android.Manifest.permission.SET_SCREEN_COMPATIBILITY,
3284 enforceCallingPermission(android.Manifest.permission.SET_SCREEN_COMPATIBILITY,
3375 // permission grants) as any app that may launch one of your own activities. So
3502 if (checkCallingPermission(Manifest.permission.BIND_VOICE_INTERACTION)
3507 + " requires " + android.Manifest.permission.BIND_VOICE_INTERACTION;
4343 if (checkCallingPermission(android.Manifest.permission.FORCE_STOP_PACKAGES)
4348 + " requires " + android.Manifest.permission.FORCE_STOP_PACKAGES;
4377 if (checkCallingPermission(android.Manifest.permission.FORCE_STOP_PACKAGES)
4382 + " requires " + android.Manifest.permission.FORCE_STOP_PACKAGES;
5143 android.Manifest.permission.CLEAR_APP_USER_DATA,
5148 throw new SecurityException("PID " + pid + " does not have permission "
5149 + android.Manifest.permission.CLEAR_APP_USER_DATA + " to clear data"
5188 if (checkCallingPermission(android.Manifest.permission.KILL_BACKGROUND_PROCESSES)
5190 checkCallingPermission(android.Manifest.permission.RESTART_PACKAGES)
5195 + " requires " + android.Manifest.permission.KILL_BACKGROUND_PROCESSES;
5225 if (checkCallingPermission(android.Manifest.permission.KILL_BACKGROUND_PROCESSES)
5230 + " requires " + android.Manifest.permission.KILL_BACKGROUND_PROCESSES;
5273 if (checkCallingPermission(android.Manifest.permission.FORCE_STOP_PACKAGES)
5278 + " requires " + android.Manifest.permission.FORCE_STOP_PACKAGES;
6241 android.Manifest.permission.RECEIVE_BOOT_COMPLETED,
6704 enforceCallingPermission(android.Manifest.permission.SET_PROCESS_LIMIT,
6742 enforceCallingPermission(android.Manifest.permission.SET_PROCESS_LIMIT,
6800 public boolean checkPermission(String permission, int pid, int uid) {
6801 return mActivityManagerService.checkPermission(permission, pid,
6808 public int checkComponentPermission(String permission, int pid, int uid,
6810 return ActivityManagerService.this.checkComponentPermission(permission, pid, uid,
6823 int checkComponentPermission(String permission, int pid, int uid,
6828 return ActivityManager.checkComponentPermission(permission, uid,
6835 * permission is automatically denied. (Internally a null permission
6842 public int checkPermission(String permission, int pid, int uid) {
6843 if (permission == null) {
6846 return checkComponentPermission(permission, pid, UserHandle.getAppId(uid), -1, true);
6850 public int checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) {
6851 if (permission == null) {
6866 return checkComponentPermission(permission, pid, UserHandle.getAppId(uid), -1, true);
6873 int checkCallingPermission(String permission) {
6874 return checkPermission(permission,
6882 void enforceCallingPermission(String permission, String func) {
6883 if (checkCallingPermission(permission)
6891 + " requires " + permission;
6898 * the given {@link ProviderInfo}. Final permission checking is always done
6936 // <path-permission> below removes this ability
6940 // check if target holds any <path-permission> that match uri
6984 // <path-permission> above
7097 * Check if the targetPkg can be granted permission to access uri by
7100 * if the URI permission grant should be performed; returns -1 if it is not
7101 * needed (for example targetPkg already has permission to access the URI).
7113 "Checking grant " + targetPkg + " permission to " + grantUri);
7121 "Can't grant URI permission for non-content URI: " + grantUri);
7128 Slog.w(TAG, "No content provider found for permission check: " +
7139 "Can't grant URI permission no uid for: " + targetPkg);
7148 // First... does the target actually need this permission?
7150 // No need to grant the target this permission.
7152 "Target " + targetPkg + " already has full permission to " + grantUri);
7176 * In this case, we grant a uri permission, even if the ContentProvider does not normally
7204 + " does not allow granting of permission to path of Uri "
7210 // Third... does the caller itself have permission to access
7214 // Require they hold a strong enough Uri permission
7217 + " does not have permission to uri " + grantUri);
7244 // So here we are: the caller has the assumed permission
7249 "Granting " + targetPkg + "/" + targetUid + " permission to " + grantUri);
7341 Slog.v(TAG, "Can't grant URI permission no uid for: " + targetPkg
7426 + " when granting permission to uri " + grantUri);
7451 "Removing " + perm.targetUid + " permission to " + perm.uri);
7468 Slog.w(TAG, "No content provider found for permission revoke: "
7473 // Does the caller have this permission on the URI?
7486 " permission to " + perm.uri);
7518 "Revoking " + perm.targetUid + " permission to " + perm.uri);
7552 + " when revoking permission to uri " + uri);
7567 Slog.w(TAG, "No content provider found for permission revoke: "
7846 throw new SecurityException("No persistable permission grants found for UID "
7885 throw new SecurityException("No permission grants found for UID " + callingUid
7964 Slog.w(TAG, "No permission grants found for " + packageName);
8104 boolean allowed = checkPermission(android.Manifest.permission.REAL_GET_TASKS,
8107 if (checkPermission(android.Manifest.permission.GET_TASKS,
8110 // still be requesting the old permission and not switched to the new
8112 // to see if they are holding the old permission and are a system app.
8142 android.Manifest.permission.GET_DETAILED_TASKS)
8178 // If the caller doesn't have the GET_TASKS permission, then only
8230 enforceCallingPermission(android.Manifest.permission.READ_FRAME_BUFFER,
8493 enforceCallingPermission(android.Manifest.permission.REMOVE_TASKS,
8509 enforceCallingPermission(android.Manifest.permission.REORDER_TASKS,
8549 enforceCallingPermission(android.Manifest.permission.REORDER_TASKS,
8610 enforceCallingPermission(android.Manifest.permission.REORDER_TASKS,
8630 enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS,
8640 enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS,
8659 enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS,
8679 enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS,
8699 enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS,
8711 enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS,
8725 enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS,
8739 enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS,
8843 enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS,
8891 enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS,
8967 * given {@link ProviderInfo}. Final permission checking is always done
9512 enforceCallingPermission(android.Manifest.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY,
9513 "Do not have permission in call getContentProviderExternal()");
9554 enforceCallingPermission(android.Manifest.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY,
9555 "Do not have permission in call removeContentProviderExternal()");
9756 android.Manifest.permission.REMOVE_TASKS, "appNotRespondingViaProvider()");
9806 * users, then it does not need permission to access the ContentProvider.
9948 enforceCallingPermission(android.Manifest.permission.FORCE_BACK,
10075 if (checkCallingPermission(android.Manifest.permission.SHUTDOWN)
10077 throw new SecurityException("Requires permission "
10078 + android.Manifest.permission.SHUTDOWN);
10145 if (checkCallingPermission(android.Manifest.permission.DEVICE_POWER)
10147 throw new SecurityException("Requires permission "
10148 + android.Manifest.permission.DEVICE_POWER);
10165 if (checkCallingPermission(android.Manifest.permission.STOP_APP_SWITCHES)
10167 throw new SecurityException("Requires permission "
10168 + android.Manifest.permission.STOP_APP_SWITCHES);
10182 if (checkCallingPermission(android.Manifest.permission.STOP_APP_SWITCHES)
10184 throw new SecurityException("Requires permission "
10185 + android.Manifest.permission.STOP_APP_SWITCHES);
10203 android.Manifest.permission.STOP_APP_SWITCHES, sourcePid,
10213 android.Manifest.permission.STOP_APP_SWITCHES, callingPid,
10226 enforceCallingPermission(android.Manifest.permission.SET_DEBUG_APP,
10301 enforceCallingPermission(android.Manifest.permission.SET_ALWAYS_FINISH,
10315 enforceCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER,
10350 enforceCallingPermission(android.Manifest.permission.DUMP, "requestBugReport");
10367 if (checkCallingPermission(android.Manifest.permission.FILTER_EVENTS)
10369 throw new SecurityException("Requires permission "
10370 + android.Manifest.permission.FILTER_EVENTS);
10395 if (checkCallingPermission(android.Manifest.permission.FILTER_EVENTS)
10397 throw new SecurityException("Requires permission "
10398 + android.Manifest.permission.FILTER_EVENTS);
10465 enforceCallingPermission(android.Manifest.permission.GET_TOP_ACTIVITY_INFO,
10539 enforceCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER,
10849 if (checkCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER)
10851 throw new SecurityException("Requires permission "
10852 + android.Manifest.permission.SET_ACTIVITY_WATCHER);
10888 if (checkCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER)
10890 throw new SecurityException("Requires permission "
10891 + android.Manifest.permission.SET_ACTIVITY_WATCHER);
10924 if (checkCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER)
10926 throw new SecurityException("Requires permission "
10927 + android.Manifest.permission.SET_ACTIVITY_WATCHER);
12327 if (checkCallingPermission(android.Manifest.permission.DUMP)
12332 + " without permission "
12333 + android.Manifest.permission.DUMP);
15192 // If the caller has this permission, they always pass go. And collect $200.
15199 // If the caller does not have either permission, they are always doomed.
15251 // Check shell permission
15255 throw new SecurityException("Shell does not have permission to access user "
15265 // For apps that don't have pre-defined UIDs, check for permission
15376 enforceCallingPermission("android.permission.CONFIRM_FULL_BACKUP", "bindBackupAgent");
15440 enforceCallingPermission("android.permission.BACKUP", "clearPendingBackup");
15565 IIntentReceiver receiver, IntentFilter filter, String permission, int userId) {
15656 permission, callingUid, userId);
15924 android.Manifest.permission.BROADCAST_PACKAGE_REMOVED,
15931 + android.Manifest.permission.BROADCAST_PACKAGE_REMOVED;
16052 if (checkPermission(android.Manifest.permission.BROADCAST_STICKY,
16057 + " requires " + android.Manifest.permission.BROADCAST_STICKY;
16063 + " and enforce permission " + requiredPermission);
16358 if (checkCallingPermission(android.Manifest.permission.BROADCAST_STICKY)
16363 + " requires " + android.Manifest.permission.BROADCAST_STICKY;
16621 enforceCallingPermission(android.Manifest.permission.CHANGE_CONFIGURATION,
16623 enforceCallingPermission(android.Manifest.permission.WRITE_SETTINGS,
16637 enforceCallingPermission(android.Manifest.permission.CHANGE_CONFIGURATION,
18577 if (checkCallingPermission(android.Manifest.permission.SIGNAL_PERSISTENT_PROCESSES)
18579 throw new SecurityException("Requires permission "
18580 + android.Manifest.permission.SIGNAL_PERSISTENT_PROCESSES);
18629 // its own permission.
18630 if (checkCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER)
18632 throw new SecurityException("Requires permission "
18633 + android.Manifest.permission.SET_ACTIVITY_WATCHER);
18727 // its own permission (same as profileControl).
18728 if (checkCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER)
18730 throw new SecurityException("Requires permission "
18731 + android.Manifest.permission.SET_ACTIVITY_WATCHER);
19074 android.Manifest.permission.MANAGE_USERS, AppOpsManager.OP_NONE,
19251 android.Manifest.permission.RECEIVE_BOOT_COMPLETED, AppOpsManager.OP_NONE,