/frameworks/base/services/core/java/com/android/server/am/ |
H A D | UriPermissionOwner.java | 77 UriPermission perm = it.next(); 78 if (grantUri == null || grantUri.equals(perm.uri)) { 79 perm.removeReadOwner(this); 80 service.removeUriPermissionIfNeededLocked(perm); 92 UriPermission perm = it.next(); 93 if (grantUri == null || grantUri.equals(perm.uri)) { 94 perm.removeWriteOwner(this); 95 service.removeUriPermissionIfNeededLocked(perm); 105 public void addReadPermission(UriPermission perm) { argument 109 mReadPerms.add(perm); 112 addWritePermission(UriPermission perm) argument 119 removeReadPermission(UriPermission perm) argument 126 removeWritePermission(UriPermission perm) argument [all...] |
H A D | UriPermission.java | 361 private Snapshot(UriPermission perm) { argument 362 this.targetUserId = perm.targetUserId; 363 this.sourcePkg = perm.sourcePkg; 364 this.targetPkg = perm.targetPkg; 365 this.uri = perm.uri; 366 this.persistedModeFlags = perm.persistedModeFlags; 367 this.persistedCreateTime = perm.persistedCreateTime;
|
H A D | BroadcastQueue.java | 498 int perm = mService.checkComponentPermission(filter.requiredPermission, 500 if (perm != PackageManager.PERMISSION_GRANTED) { 527 int perm = mService.checkComponentPermission(requiredPermission, 529 if (perm != PackageManager.PERMISSION_GRANTED) { 561 int perm = mService.checkComponentPermission(null, 563 if (perm != PackageManager.PERMISSION_GRANTED) { 980 int perm = mService.checkComponentPermission(info.activityInfo.permission, 983 if (!skip && perm != PackageManager.PERMISSION_GRANTED) { 1021 perm = AppGlobals.getPackageManager(). 1027 perm [all...] |
H A D | ActivityManagerService.java | 7785 "Checking read perm for " + pprperm + " for " + pp.getPath() 7800 "Checking write perm " + ppwperm + " for " + pp.getPath() 7898 UriPermission perm = targetUris.get(grantUri); 7899 if (perm == null) { 7900 perm = new UriPermission(sourcePkg, targetPkg, targetUid, grantUri); 7901 targetUris.put(grantUri, perm); 7904 return perm; 7930 final UriPermission perm = perms.valueAt(i); 7931 if (perm.uri.prefix && grantUri.uri.isPathPrefixMatch(perm 8320 removeUriPermissionIfNeededLocked(UriPermission perm) argument [all...] |
/frameworks/compile/mclinker/lib/Support/Unix/ |
H A D | FileSystem.inc | 106 mode_t perm = 0; 108 perm |= S_IRUSR; 110 perm |= S_IWUSR; 112 perm |= S_IXUSR; 114 perm |= S_IRGRP; 116 perm |= S_IWGRP; 118 perm |= S_IXGRP; 120 perm |= S_IROTH; 122 perm |= S_IWOTH; 124 perm | [all...] |
/frameworks/native/cmds/servicemanager/ |
H A D | service_manager.c | 65 static bool check_mac_perms(pid_t spid, uid_t uid, const char *tctx, const char *perm, const char *name) argument 81 int result = selinux_check_access(sctx, tctx, class, perm, (void *) &ad); 88 static bool check_mac_perms_from_getcon(pid_t spid, uid_t uid, const char *perm) argument 94 return check_mac_perms(spid, uid, service_manager_context, perm, NULL); 97 static bool check_mac_perms_from_lookup(pid_t spid, uid_t uid, const char *perm, const char *name) argument 116 allowed = check_mac_perms(spid, uid, tctx, perm, name); 123 const char *perm = "add"; local 124 return check_mac_perms_from_lookup(spid, uid, perm, str8(name, name_len)) ? 1 : 0; 129 const char *perm = "list"; local 130 return check_mac_perms_from_getcon(spid, uid, perm) 135 const char *perm = "find"; local [all...] |
/frameworks/compile/mclinker/lib/Support/Windows/ |
H A D | FileSystem.inc | 77 int perm = 0; 80 perm |= _S_IREAD; 84 perm |= _S_IWRITE; 86 return ::_open(pPath.native().c_str(), pOFlag | _O_BINARY, perm);
|
/frameworks/base/core/java/com/android/server/ |
H A D | SystemConfig.java | 301 String perm = parser.getAttributeValue(null, "name"); 302 if (perm == null) { 308 perm = perm.intern(); 309 readPermission(parser, perm); 312 String perm = parser.getAttributeValue(null, "name"); 313 if (perm == null) { 334 perm = perm.intern(); 340 perms.add(perm); [all...] |
/frameworks/av/drm/drmserver/ |
H A D | DrmManagerService.cpp | 51 const char *DrmManagerService::get_perm_label(drm_perm_t perm) { argument 52 unsigned int index = perm; 55 ALOGE("SELinux: Failed to retrieve permission label(perm=%d).\n", perm); 61 bool DrmManagerService::selinuxIsProtectedCallAllowed(pid_t spid, drm_perm_t perm) { argument 68 const char *str_perm = get_perm_label(perm); 82 bool DrmManagerService::isProtectedCallAllowed(drm_perm_t perm) { argument 92 return selinuxIsProtectedCallAllowed(spid, perm);
|
/frameworks/av/drm/libdrmframework/include/ |
H A D | DrmManagerService.h | 61 static const char *get_perm_label(drm_perm_t perm); 63 static bool selinuxIsProtectedCallAllowed(pid_t spid, drm_perm_t perm); 65 static bool isProtectedCallAllowed(drm_perm_t perm);
|
/frameworks/base/services/core/java/com/android/server/job/ |
H A D | JobSchedulerShellCommand.java | 60 final int perm = mPM.checkUidPermission( 62 if (perm != PackageManager.PERMISSION_GRANTED) {
|
/frameworks/base/core/java/android/os/ |
H A D | SELinux.java | 99 * @param perm The permission name. 102 public static final native boolean checkSELinuxAccess(String scon, String tcon, String tclass, String perm); argument
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | BasePermission.java | 40 PackageParser.Permission perm; field in class:BasePermission
|
H A D | PackageManagerService.java | 1097 private static final String TAG_PERMISSION_BACKUP = "perm-grant-backup"; 1102 private static final String TAG_PERMISSION = "perm"; 2302 SystemConfig.PermissionEntry perm = permConfig.valueAt(i); 2303 BasePermission bp = mSettings.mPermissions.get(perm.name); 2305 bp = new BasePermission(perm.name, "android", BasePermission.TYPE_BUILTIN); 2306 mSettings.mPermissions.put(perm.name, bp); 2308 if (perm.gids != null) { 2309 bp.setGids(perm.gids, perm.perUser); 3344 if (bp.perm ! 9800 hasPermission(PackageParser.Package pkgInfo, String perm) argument 10221 isNewPlatformPermissionForPackage(String perm, PackageParser.Package pkg) argument 10238 grantSignaturePermission(String perm, PackageParser.Package pkg, BasePermission bp, PermissionsState origPermissions) argument [all...] |
H A D | PermissionsState.java | 609 public PermissionData(BasePermission perm) { argument 610 mPerm = perm;
|
H A D | Settings.java | 226 private static final String TAG_PERMISSION_ENTRY = "perm"; 674 bp.perm = null; 2726 Log.v(PackageManagerService.TAG, "Writing perm: name=" + bp.name + " type=" 2729 final PermissionInfo pi = bp.perm != null ? bp.perm.info : bp.pendingInfo; 4509 PackageParser.Permission perm = perms.get(i); 4511 && !permissionNames.contains(perm.info.name)) { 4514 pw.print(prefix); pw.print(" "); pw.print(perm.info.name); 4516 pw.print(PermissionInfo.protectionToString(perm.info.protectionLevel)); 4517 if ((perm [all...] |
/frameworks/base/core/java/android/widget/ |
H A D | AppSecurityPermissions.java | 91 MyPermissionGroupInfo(PermissionInfo perm) { argument 92 name = perm.packageName; 93 packageName = perm.packageName; 147 public void setPermission(MyPermissionGroupInfo grp, MyPermissionInfo perm, argument 151 mPerm = perm; 163 CharSequence label = perm.mLabel; 164 if (perm.mNew && newPermPrefix != null) { 180 if (localLOGV) Log.i(TAG, "Made perm item " + perm.name 480 MyPermissionInfo perm 500 getPermissionItemView(MyPermissionGroupInfo grp, MyPermissionInfo perm, boolean first, CharSequence newPermPrefix, boolean showRevokeUI) argument 506 getPermissionItemView(Context context, LayoutInflater inflater, MyPermissionGroupInfo grp, MyPermissionInfo perm, boolean first, CharSequence newPermPrefix, String packageName, boolean showRevokeUI) argument [all...] |
/frameworks/av/media/mtp/ |
H A D | MtpDevice.h | 116 int perm);
|
H A D | MtpDevice.cpp | 652 bool MtpDevice::readObject(MtpObjectHandle handle, const char* destPath, int group, int perm) { argument 663 fchmod(fd, perm);
|
/frameworks/base/core/java/android/content/pm/ |
H A D | AppsQueryHelper.java | 203 protected List<PackageInfo> getPackagesHoldingPermission(String perm, int userId) { argument 205 return mPackageManager.getPackagesHoldingPermissions(new String[]{perm}, 0,
|
H A D | PackageParser.java | 607 final String perm = p.requestedPermissions.get(i); 608 pi.requestedPermissions[i] = perm; 611 if (grantedPermissions != null && grantedPermissions.contains(perm)) { 2171 final String perm = spi.newPerms[in]; 2172 if (!pkg.requestedPermissions.contains(perm)) { 2173 pkg.requestedPermissions.add(perm); 2502 PermissionGroup perm = new PermissionGroup(owner); 2507 if (!parsePackageItemInfo(owner, perm.info, outError, 2519 perm.info.descriptionRes = sa.getResourceId( 2522 perm [all...] |
/frameworks/base/core/java/android/accounts/ |
H A D | AbstractAccountAuthenticator.java | 513 final String perm = Manifest.permission.ACCOUNT_MANAGER; 514 if (mContext.checkCallingOrSelfPermission(perm) != PackageManager.PERMISSION_GRANTED) { 515 throw new SecurityException("caller uid " + uid + " lacks " + perm);
|
/frameworks/base/core/tests/coretests/src/android/content/pm/ |
H A D | AppsQueryHelperTests.java | 140 protected List<PackageInfo> getPackagesHoldingPermission(String perm, int userId) { argument
|
/frameworks/base/cmds/pm/src/com/android/commands/pm/ |
H A D | Pm.java | 1269 String perm = nextArg(); 1270 if (perm == null) { 1277 mPm.grantRuntimePermission(pkg, perm, userId); 1279 mPm.revokeRuntimePermission(pkg, perm, userId);
|
/frameworks/base/core/java/android/app/ |
H A D | ActivityManagerNative.java | 453 String perm = data.readString(); 455 Intent intent = registerReceiver(app, packageName, rec, filter, perm, userId); 1365 String perm = data.readString(); 1368 int res = checkPermission(perm, pid, uid); 1376 String perm = data.readString(); 1380 int res = checkPermissionWithToken(perm, pid, uid, token); 1980 IBinder perm = newUriPermissionOwner(name); 1982 reply.writeStrongBinder(perm); 1989 IBinder perm = getUriPermissionOwnerForActivity(activityToken); 1991 reply.writeStrongBinder(perm); 3449 registerReceiver(IApplicationThread caller, String packageName, IIntentReceiver receiver, IntentFilter filter, String perm, int userId) argument [all...] |