/frameworks/base/services/core/java/com/android/server/am/ |
H A D | UriPermissionOwner.java | 78 UriPermission perm = it.next(); 79 if (grantUri == null || grantUri.equals(perm.uri)) { 80 perm.removeReadOwner(this); 81 service.removeUriPermissionIfNeededLocked(perm); 93 UriPermission perm = it.next(); 94 if (grantUri == null || grantUri.equals(perm.uri)) { 95 perm.removeWriteOwner(this); 96 service.removeUriPermissionIfNeededLocked(perm); 106 public void addReadPermission(UriPermission perm) { argument 110 mReadPerms.add(perm); 113 addWritePermission(UriPermission perm) argument 120 removeReadPermission(UriPermission perm) argument 127 removeWritePermission(UriPermission perm) argument [all...] |
H A D | UriPermission.java | 362 private Snapshot(UriPermission perm) { argument 363 this.targetUserId = perm.targetUserId; 364 this.sourcePkg = perm.sourcePkg; 365 this.targetPkg = perm.targetPkg; 366 this.uri = perm.uri; 367 this.persistedModeFlags = perm.persistedModeFlags; 368 this.persistedCreateTime = perm.persistedCreateTime;
|
H A D | ActivityManagerService.java | 2933 checkTime(startTime, "startProcess: checking external storage perm"); 6951 if (DEBUG_URI_PERMISSION) Slog.v(TAG, "Checking read perm for " 6966 if (DEBUG_URI_PERMISSION) Slog.v(TAG, "Checking write perm " 7026 UriPermission perm = targetUris.get(grantUri); 7027 if (perm == null) { 7028 perm = new UriPermission(sourcePkg, targetPkg, targetUid, grantUri); 7029 targetUris.put(grantUri, perm); 7032 return perm; 7058 final UriPermission perm = perms.valueAt(i); 7059 if (perm 7445 removeUriPermissionIfNeededLocked(UriPermission perm) argument [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | BasePermission.java | 39 PackageParser.Permission perm; field in class:BasePermission
|
H A D | PackageManagerService.java | 1374 SystemConfig.PermissionEntry perm = permConfig.valueAt(i); 1375 BasePermission bp = mSettings.mPermissions.get(perm.name); 1377 bp = new BasePermission(perm.name, "android", BasePermission.TYPE_BUILTIN); 1378 mSettings.mPermissions.put(perm.name, bp); 1380 if (perm.gids != null) { 1381 bp.gids = appendInts(bp.gids, perm.gids); 2025 if (bp.perm != null) { 2026 return PackageParser.generatePermissionInfo(bp.perm, flags); 2055 if (p.perm == null || p.perm 6963 hasPermission(PackageParser.Package pkgInfo, String perm) argument 7199 isNewPlatformPermissionForPackage(String perm, PackageParser.Package pkg) argument 7216 grantSignaturePermission(String perm, PackageParser.Package pkg, BasePermission bp, ArraySet<String> origPermissions) argument [all...] |
/frameworks/base/core/java/android/os/ |
H A D | SELinux.java | 127 * @param perm The permission name. 130 public static final native boolean checkSELinuxAccess(String scon, String tcon, String tclass, String perm); argument
|
/frameworks/compile/mclinker/lib/Core/ |
H A D | Linker.cpp | 264 FileHandle::Permission perm; local 268 perm = mcld::FileHandle::Permission(0x644); 273 perm = mcld::FileHandle::Permission(0x755); 280 perm)) {
|
/frameworks/native/cmds/servicemanager/ |
H A D | service_manager.c | 59 static bool check_mac_perms(pid_t spid, const char *tctx, const char *perm, const char *name) argument 70 int result = selinux_check_access(sctx, tctx, class, perm, (void *) name); 77 static bool check_mac_perms_from_getcon(pid_t spid, const char *perm) argument 83 return check_mac_perms(spid, service_manager_context, perm, NULL); 86 static bool check_mac_perms_from_lookup(pid_t spid, const char *perm, const char *name) argument 105 allowed = check_mac_perms(spid, tctx, perm, name); 112 const char *perm = "add"; local 113 return check_mac_perms_from_lookup(spid, perm, str8(name, name_len)) ? 1 : 0; 118 const char *perm = "list"; local 119 return check_mac_perms_from_getcon(spid, perm) 124 const char *perm = "find"; local [all...] |
/frameworks/av/media/mtp/ |
H A D | MtpDevice.cpp | 678 bool MtpDevice::readObject(MtpObjectHandle handle, const char* destPath, int group, int perm) { argument 689 fchmod(fd, perm);
|
/frameworks/base/core/java/android/widget/ |
H A D | AppSecurityPermissions.java | 91 MyPermissionGroupInfo(PermissionInfo perm) { argument 92 name = perm.packageName; 93 packageName = perm.packageName; 151 public void setPermission(MyPermissionGroupInfo grp, MyPermissionInfo perm, argument 155 mPerm = perm; 167 CharSequence label = perm.mLabel; 168 if (perm.mNew && newPermPrefix != null) { 184 if (localLOGV) Log.i(TAG, "Made perm item " + perm.name 494 MyPermissionInfo perm 514 getPermissionItemView(MyPermissionGroupInfo grp, MyPermissionInfo perm, boolean first, CharSequence newPermPrefix, boolean showRevokeUI) argument 520 getPermissionItemView(Context context, LayoutInflater inflater, MyPermissionGroupInfo grp, MyPermissionInfo perm, boolean first, CharSequence newPermPrefix, String packageName, boolean showRevokeUI) argument [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | MountService.java | 1306 private void validatePermission(String perm) { argument 1307 if (mContext.checkCallingOrSelfPermission(perm) != PackageManager.PERMISSION_GRANTED) { 1308 throw new SecurityException(String.format("Requires %s permission", perm));
|
/frameworks/base/core/java/android/app/ |
H A D | ActivityManagerNative.java | 396 String perm = data.readString(); 398 Intent intent = registerReceiver(app, packageName, rec, filter, perm, userId); 436 String perm = data.readString(); 442 resultCode, resultData, resultExtras, perm, appOp, 1187 String perm = data.readString(); 1190 int res = checkPermission(perm, pid, uid); 1198 String perm = data.readString(); 1202 int res = checkPermissionWithToken(perm, pid, uid, token); 1728 IBinder perm = newUriPermissionOwner(name); 1730 reply.writeStrongBinder(perm); 2768 registerReceiver(IApplicationThread caller, String packageName, IIntentReceiver receiver, IntentFilter filter, String perm, int userId) argument [all...] |