/frameworks/native/cmds/servicemanager/ |
H A D | service_manager.c | 64 static bool check_mac_perms(pid_t spid, uid_t uid, const char *tctx, const char *perm, const char *name) argument 80 int result = selinux_check_access(sctx, tctx, class, perm, (void *) &ad); 87 static bool check_mac_perms_from_getcon(pid_t spid, uid_t uid, const char *perm) argument 89 return check_mac_perms(spid, uid, service_manager_context, perm, NULL); 92 static bool check_mac_perms_from_lookup(pid_t spid, uid_t uid, const char *perm, const char *name) argument 107 allowed = check_mac_perms(spid, uid, tctx, perm, name); 114 const char *perm = "add"; local 120 return check_mac_perms_from_lookup(spid, uid, perm, str8(name, name_len)) ? 1 : 0; 125 const char *perm = "list"; local 126 return check_mac_perms_from_getcon(spid, uid, perm) 131 const char *perm = "find"; local [all...] |
/frameworks/data-binding/prebuilds/1.0-rc0/ |
H A D | databinding-studio-bundle.jar | META-INF/ META-INF/MANIFEST.MF android/ android/databinding/ android/databinding/Bindable.class Bindable. ... |
/frameworks/compile/mclinker/lib/Support/Unix/ |
H A D | FileSystem.inc | 106 mode_t perm = 0; 108 perm |= S_IRUSR; 110 perm |= S_IWUSR; 112 perm |= S_IXUSR; 114 perm |= S_IRGRP; 116 perm |= S_IWGRP; 118 perm |= S_IXGRP; 120 perm |= S_IROTH; 122 perm |= S_IWOTH; 124 perm | [all...] |
/frameworks/compile/mclinker/lib/Support/Windows/ |
H A D | FileSystem.inc | 77 int perm = 0; 80 perm |= _S_IREAD; 84 perm |= _S_IWRITE; 86 return ::_open(pPath.native().c_str(), pOFlag | _O_BINARY, perm);
|
/frameworks/base/services/backup/java/com/android/server/backup/ |
H A D | BackupManagerService.java | 11149 int perm = mContext.checkPermission(android.Manifest.permission.BACKUP, 11151 if ((perm == PackageManager.PERMISSION_DENIED) &&
|
/frameworks/base/services/backup/java/com/android/server/backup/restore/ |
H A D | ActiveRestoreSession.java | 307 int perm = backupManagerService.getContext().checkPermission( 310 if ((perm == PackageManager.PERMISSION_DENIED) &&
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | StorageManagerService.java | 1455 private void enforcePermission(String perm) { argument 1456 mContext.enforceCallingOrSelfPermission(perm, perm);
|
/frameworks/base/services/core/java/com/android/server/accounts/ |
H A D | AccountManagerService.java | 5283 for (String perm : permissions) { 5284 if (pm.checkPermission(perm, packageName, userId) 5287 final int opCode = AppOpsManager.permissionToOpCode(perm); 5303 for (String perm : permissions) { 5304 if (mContext.checkCallingOrSelfPermission(perm) == PackageManager.PERMISSION_GRANTED) { 5306 Log.v(TAG, " caller uid " + callingUid + " has " + perm); 5308 final int opCode = AppOpsManager.permissionToOpCode(perm);
|
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ActivityManagerService.java | 8497 "Checking read perm for " + pprperm + " for " + pp.getPath() 8512 "Checking write perm " + ppwperm + " for " + pp.getPath() 8708 UriPermission perm = targetUris.get(grantUri); 8709 if (perm == null) { 8710 perm = new UriPermission(sourcePkg, targetPkg, targetUid, grantUri); 8711 targetUris.put(grantUri, perm); 8714 return perm; 8740 final UriPermission perm = perms.valueAt(i); 8741 if (perm.uri.prefix && grantUri.uri.isPathPrefixMatch(perm 9154 removeUriPermissionIfNeededLocked(UriPermission perm) argument [all...] |
H A D | BroadcastQueue.java | 521 int perm = mService.checkComponentPermission(filter.requiredPermission, 523 if (perm != PackageManager.PERMISSION_GRANTED) { 550 int perm = mService.checkComponentPermission(requiredPermission, 552 if (perm != PackageManager.PERMISSION_GRANTED) { 584 int perm = mService.checkComponentPermission(null, 586 if (perm != PackageManager.PERMISSION_GRANTED) { 1065 int perm = mService.checkComponentPermission(info.activityInfo.permission, 1068 if (!skip && perm != PackageManager.PERMISSION_GRANTED) { 1106 perm = AppGlobals.getPackageManager(). 1112 perm [all...] |
H A D | UriPermission.java | 373 private Snapshot(UriPermission perm) { argument 374 this.targetUserId = perm.targetUserId; 375 this.sourcePkg = perm.sourcePkg; 376 this.targetPkg = perm.targetPkg; 377 this.uri = perm.uri; 378 this.persistedModeFlags = perm.persistedModeFlags; 379 this.persistedCreateTime = perm.persistedCreateTime;
|
H A D | UriPermissionOwner.java | 77 UriPermission perm = it.next(); 78 if (grantUri == null || grantUri.equals(perm.uri)) { 79 perm.removeReadOwner(this); 80 service.removeUriPermissionIfNeededLocked(perm); 92 UriPermission perm = it.next(); 93 if (grantUri == null || grantUri.equals(perm.uri)) { 94 perm.removeWriteOwner(this); 95 service.removeUriPermissionIfNeededLocked(perm); 105 public void addReadPermission(UriPermission perm) { argument 109 mReadPerms.add(perm); 112 addWritePermission(UriPermission perm) argument 119 removeReadPermission(UriPermission perm) argument 126 removeWritePermission(UriPermission perm) argument [all...] |
/frameworks/base/services/core/java/com/android/server/job/ |
H A D | JobSchedulerShellCommand.java | 80 final int perm = mPM.checkUidPermission( 82 if (perm != PackageManager.PERMISSION_GRANTED) {
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | BasePermission.java | 40 PackageParser.Permission perm; field in class:BasePermission
|
H A D | PackageManagerService.java | 1377 private static final String TAG_PERMISSION_BACKUP = "perm-grant-backup"; 1382 private static final String TAG_PERMISSION = "perm"; 2502 SystemConfig.PermissionEntry perm = permConfig.valueAt(i); 2503 BasePermission bp = mSettings.mPermissions.get(perm.name); 2505 bp = new BasePermission(perm.name, "android", BasePermission.TYPE_BUILTIN); 2506 mSettings.mPermissions.put(perm.name, bp); 2508 if (perm.gids != null) { 2509 bp.setGids(perm.gids, perm.perUser); 4272 if (bp.perm ! 12903 hasPermission(PackageParser.Package pkgInfo, String perm) argument 13364 isNewPlatformPermissionForPackage(String perm, PackageParser.Package pkg) argument 13381 grantSignaturePermission(String perm, PackageParser.Package pkg, BasePermission bp, PermissionsState origPermissions) argument [all...] |
H A D | PermissionsState.java | 653 public PermissionData(BasePermission perm) { argument 654 mPerm = perm;
|
H A D | Settings.java | 241 private static final String TAG_PERMISSION_ENTRY = "perm"; 681 bp.perm = null; 2982 Log.v(PackageManagerService.TAG, "Writing perm: name=" + bp.name + " type=" 2985 final PermissionInfo pi = bp.perm != null ? bp.perm.info : bp.pendingInfo; 4812 PackageParser.Permission perm = perms.get(i); 4814 && !permissionNames.contains(perm.info.name)) { 4817 pw.print(prefix); pw.print(" "); pw.print(perm.info.name); 4819 pw.print(PermissionInfo.protectionToString(perm.info.protectionLevel)); 4820 if ((perm [all...] |
/frameworks/base/core/tests/coretests/src/android/content/pm/ |
H A D | AppsQueryHelperTests.java | 140 protected List<PackageInfo> getPackagesHoldingPermission(String perm, int userId) { argument
|
/frameworks/base/core/java/android/content/pm/ |
H A D | PackageParser.java | 791 final String perm = p.requestedPermissions.get(i); 792 pi.requestedPermissions[i] = perm; 795 if (grantedPermissions != null && grantedPermissions.contains(perm)) { 2595 final String perm = spi.newPerms[in]; 2596 if (!pkg.requestedPermissions.contains(perm)) { 2597 pkg.requestedPermissions.add(perm); 3216 PermissionGroup perm = new PermissionGroup(owner); 3220 if (!parsePackageItemInfo(owner, perm.info, outError, 3233 perm.info.descriptionRes = sa.getResourceId( 3236 perm [all...] |
/frameworks/base/core/java/android/os/ |
H A D | SELinux.java | 99 * @param perm The permission name. 102 public static final native boolean checkSELinuxAccess(String scon, String tcon, String tclass, String perm); argument
|
/frameworks/base/core/java/android/widget/ |
H A D | AppSecurityPermissions.java | 90 MyPermissionGroupInfo(PermissionInfo perm) { argument 91 name = perm.packageName; 92 packageName = perm.packageName; 146 public void setPermission(MyPermissionGroupInfo grp, MyPermissionInfo perm, argument 150 mPerm = perm; 162 CharSequence label = perm.mLabel; 163 if (perm.mNew && newPermPrefix != null) { 179 if (localLOGV) Log.i(TAG, "Made perm item " + perm.name 479 MyPermissionInfo perm 499 getPermissionItemView(MyPermissionGroupInfo grp, MyPermissionInfo perm, boolean first, CharSequence newPermPrefix, boolean showRevokeUI) argument 505 getPermissionItemView(Context context, LayoutInflater inflater, MyPermissionGroupInfo grp, MyPermissionInfo perm, boolean first, CharSequence newPermPrefix, String packageName, boolean showRevokeUI) argument [all...] |
/frameworks/base/core/java/com/android/internal/app/ |
H A D | ChooserActivity.java | 508 final String perm = pm.getServiceInfo(serviceComponent, 0).permission; 509 if (!ChooserTargetService.BIND_PERMISSION.equals(perm)) {
|
H A D | ResolverComparator.java | 467 final String perm = mPm.getServiceInfo(componentName, 0).permission; 468 if (!ResolverRankerService.BIND_PERMISSION.equals(perm)) {
|
/frameworks/base/core/java/com/android/server/ |
H A D | SystemConfig.java | 350 String perm = parser.getAttributeValue(null, "name"); 351 if (perm == null) { 357 perm = perm.intern(); 358 readPermission(parser, perm); 361 String perm = parser.getAttributeValue(null, "name"); 362 if (perm == null) { 383 perm = perm.intern(); 389 perms.add(perm); [all...] |
/frameworks/base/cmds/pm/src/com/android/commands/pm/ |
H A D | Pm.java | 1354 String perm = nextArg(); 1355 if (perm == null) { 1362 mPm.grantRuntimePermission(pkg, perm, userId); 1364 mPm.revokeRuntimePermission(pkg, perm, userId);
|