/frameworks/base/services/core/java/com/android/server/am/ |
H A D | UriPermissionOwner.java | 77 UriPermission perm = it.next(); 78 if (grantUri == null || grantUri.equals(perm.uri)) { 79 perm.removeReadOwner(this); 80 service.removeUriPermissionIfNeededLocked(perm); 92 UriPermission perm = it.next(); 93 if (grantUri == null || grantUri.equals(perm.uri)) { 94 perm.removeWriteOwner(this); 95 service.removeUriPermissionIfNeededLocked(perm); 105 public void addReadPermission(UriPermission perm) { argument 109 mReadPerms.add(perm); 112 addWritePermission(UriPermission perm) argument 119 removeReadPermission(UriPermission perm) argument 126 removeWritePermission(UriPermission perm) argument [all...] |
H A D | UriPermission.java | 373 private Snapshot(UriPermission perm) { argument 374 this.targetUserId = perm.targetUserId; 375 this.sourcePkg = perm.sourcePkg; 376 this.targetPkg = perm.targetPkg; 377 this.uri = perm.uri; 378 this.persistedModeFlags = perm.persistedModeFlags; 379 this.persistedCreateTime = perm.persistedCreateTime;
|
H A D | BroadcastQueue.java | 521 int perm = mService.checkComponentPermission(filter.requiredPermission, 523 if (perm != PackageManager.PERMISSION_GRANTED) { 550 int perm = mService.checkComponentPermission(requiredPermission, 552 if (perm != PackageManager.PERMISSION_GRANTED) { 584 int perm = mService.checkComponentPermission(null, 586 if (perm != PackageManager.PERMISSION_GRANTED) { 1065 int perm = mService.checkComponentPermission(info.activityInfo.permission, 1068 if (!skip && perm != PackageManager.PERMISSION_GRANTED) { 1106 perm = AppGlobals.getPackageManager(). 1112 perm [all...] |
H A D | ActivityManagerService.java | 8497 "Checking read perm for " + pprperm + " for " + pp.getPath() 8512 "Checking write perm " + ppwperm + " for " + pp.getPath() 8708 UriPermission perm = targetUris.get(grantUri); 8709 if (perm == null) { 8710 perm = new UriPermission(sourcePkg, targetPkg, targetUid, grantUri); 8711 targetUris.put(grantUri, perm); 8714 return perm; 8740 final UriPermission perm = perms.valueAt(i); 8741 if (perm.uri.prefix && grantUri.uri.isPathPrefixMatch(perm 9154 removeUriPermissionIfNeededLocked(UriPermission perm) argument [all...] |
/frameworks/compile/mclinker/lib/Support/Unix/ |
H A D | FileSystem.inc | 106 mode_t perm = 0; 108 perm |= S_IRUSR; 110 perm |= S_IWUSR; 112 perm |= S_IXUSR; 114 perm |= S_IRGRP; 116 perm |= S_IWGRP; 118 perm |= S_IXGRP; 120 perm |= S_IROTH; 122 perm |= S_IWOTH; 124 perm | [all...] |
/frameworks/native/cmds/servicemanager/ |
H A D | service_manager.c | 64 static bool check_mac_perms(pid_t spid, uid_t uid, const char *tctx, const char *perm, const char *name) argument 80 int result = selinux_check_access(sctx, tctx, class, perm, (void *) &ad); 87 static bool check_mac_perms_from_getcon(pid_t spid, uid_t uid, const char *perm) argument 89 return check_mac_perms(spid, uid, service_manager_context, perm, NULL); 92 static bool check_mac_perms_from_lookup(pid_t spid, uid_t uid, const char *perm, const char *name) argument 107 allowed = check_mac_perms(spid, uid, tctx, perm, name); 114 const char *perm = "add"; local 120 return check_mac_perms_from_lookup(spid, uid, perm, str8(name, name_len)) ? 1 : 0; 125 const char *perm = "list"; local 126 return check_mac_perms_from_getcon(spid, uid, perm) 131 const char *perm = "find"; local [all...] |
/frameworks/compile/mclinker/lib/Support/Windows/ |
H A D | FileSystem.inc | 77 int perm = 0; 80 perm |= _S_IREAD; 84 perm |= _S_IWRITE; 86 return ::_open(pPath.native().c_str(), pOFlag | _O_BINARY, perm);
|
/frameworks/base/core/java/android/widget/ |
H A D | AppSecurityPermissions.java | 90 MyPermissionGroupInfo(PermissionInfo perm) { argument 91 name = perm.packageName; 92 packageName = perm.packageName; 146 public void setPermission(MyPermissionGroupInfo grp, MyPermissionInfo perm, argument 150 mPerm = perm; 162 CharSequence label = perm.mLabel; 163 if (perm.mNew && newPermPrefix != null) { 179 if (localLOGV) Log.i(TAG, "Made perm item " + perm.name 479 MyPermissionInfo perm 499 getPermissionItemView(MyPermissionGroupInfo grp, MyPermissionInfo perm, boolean first, CharSequence newPermPrefix, boolean showRevokeUI) argument 505 getPermissionItemView(Context context, LayoutInflater inflater, MyPermissionGroupInfo grp, MyPermissionInfo perm, boolean first, CharSequence newPermPrefix, String packageName, boolean showRevokeUI) argument [all...] |
/frameworks/base/core/java/com/android/server/ |
H A D | SystemConfig.java | 350 String perm = parser.getAttributeValue(null, "name"); 351 if (perm == null) { 357 perm = perm.intern(); 358 readPermission(parser, perm); 361 String perm = parser.getAttributeValue(null, "name"); 362 if (perm == null) { 383 perm = perm.intern(); 389 perms.add(perm); [all...] |
/frameworks/av/drm/drmserver/ |
H A D | DrmManagerService.cpp | 51 const char *DrmManagerService::get_perm_label(drm_perm_t perm) { argument 52 unsigned int index = perm; 55 ALOGE("SELinux: Failed to retrieve permission label(perm=%d).\n", perm); 61 bool DrmManagerService::selinuxIsProtectedCallAllowed(pid_t spid, drm_perm_t perm) { argument 68 const char *str_perm = get_perm_label(perm); 82 bool DrmManagerService::isProtectedCallAllowed(drm_perm_t perm) { argument 92 return selinuxIsProtectedCallAllowed(spid, perm);
|
H A D | DrmManagerService.h | 61 static const char *get_perm_label(drm_perm_t perm); 63 static bool selinuxIsProtectedCallAllowed(pid_t spid, drm_perm_t perm); 65 static bool isProtectedCallAllowed(drm_perm_t perm);
|
/frameworks/base/core/java/android/os/ |
H A D | SELinux.java | 99 * @param perm The permission name. 102 public static final native boolean checkSELinuxAccess(String scon, String tcon, String tclass, String perm); argument
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | BasePermission.java | 40 PackageParser.Permission perm; field in class:BasePermission
|
H A D | PermissionsState.java | 653 public PermissionData(BasePermission perm) { argument 654 mPerm = perm;
|
H A D | PackageManagerService.java | 1377 private static final String TAG_PERMISSION_BACKUP = "perm-grant-backup"; 1382 private static final String TAG_PERMISSION = "perm"; 2502 SystemConfig.PermissionEntry perm = permConfig.valueAt(i); 2503 BasePermission bp = mSettings.mPermissions.get(perm.name); 2505 bp = new BasePermission(perm.name, "android", BasePermission.TYPE_BUILTIN); 2506 mSettings.mPermissions.put(perm.name, bp); 2508 if (perm.gids != null) { 2509 bp.setGids(perm.gids, perm.perUser); 4272 if (bp.perm ! 12903 hasPermission(PackageParser.Package pkgInfo, String perm) argument 13364 isNewPlatformPermissionForPackage(String perm, PackageParser.Package pkg) argument 13381 grantSignaturePermission(String perm, PackageParser.Package pkg, BasePermission bp, PermissionsState origPermissions) argument [all...] |
H A D | Settings.java | 241 private static final String TAG_PERMISSION_ENTRY = "perm"; 681 bp.perm = null; 2982 Log.v(PackageManagerService.TAG, "Writing perm: name=" + bp.name + " type=" 2985 final PermissionInfo pi = bp.perm != null ? bp.perm.info : bp.pendingInfo; 4812 PackageParser.Permission perm = perms.get(i); 4814 && !permissionNames.contains(perm.info.name)) { 4817 pw.print(prefix); pw.print(" "); pw.print(perm.info.name); 4819 pw.print(PermissionInfo.protectionToString(perm.info.protectionLevel)); 4820 if ((perm [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | AppsQueryHelper.java | 209 protected List<PackageInfo> getPackagesHoldingPermission(String perm, int userId) { argument 211 return mPackageManager.getPackagesHoldingPermissions(new String[]{perm}, 0,
|
H A D | PackageParser.java | 791 final String perm = p.requestedPermissions.get(i); 792 pi.requestedPermissions[i] = perm; 795 if (grantedPermissions != null && grantedPermissions.contains(perm)) { 2595 final String perm = spi.newPerms[in]; 2596 if (!pkg.requestedPermissions.contains(perm)) { 2597 pkg.requestedPermissions.add(perm); 3216 PermissionGroup perm = new PermissionGroup(owner); 3220 if (!parsePackageItemInfo(owner, perm.info, outError, 3233 perm.info.descriptionRes = sa.getResourceId( 3236 perm [all...] |
/frameworks/base/services/core/java/com/android/server/job/ |
H A D | JobSchedulerShellCommand.java | 80 final int perm = mPM.checkUidPermission( 82 if (perm != PackageManager.PERMISSION_GRANTED) {
|
/frameworks/av/media/mtp/ |
H A D | MtpDevice.h | 123 int perm);
|
/frameworks/base/services/backup/java/com/android/server/backup/restore/ |
H A D | ActiveRestoreSession.java | 307 int perm = backupManagerService.getContext().checkPermission( 310 if ((perm == PackageManager.PERMISSION_DENIED) &&
|
/frameworks/base/core/java/android/accounts/ |
H A D | AbstractAccountAuthenticator.java | 513 final String perm = Manifest.permission.ACCOUNT_MANAGER; 514 if (mContext.checkCallingOrSelfPermission(perm) != PackageManager.PERMISSION_GRANTED) { 515 throw new SecurityException("caller uid " + uid + " lacks " + perm);
|
/frameworks/base/core/tests/coretests/src/android/content/pm/ |
H A D | AppsQueryHelperTests.java | 140 protected List<PackageInfo> getPackagesHoldingPermission(String perm, int userId) { argument
|
/frameworks/base/core/java/com/android/internal/app/ |
H A D | ResolverComparator.java | 467 final String perm = mPm.getServiceInfo(componentName, 0).permission; 468 if (!ResolverRankerService.BIND_PERMISSION.equals(perm)) {
|
/frameworks/base/cmds/pm/src/com/android/commands/pm/ |
H A D | Pm.java | 1354 String perm = nextArg(); 1355 if (perm == null) { 1362 mPm.grantRuntimePermission(pkg, perm, userId); 1364 mPm.revokeRuntimePermission(pkg, perm, userId);
|