/frameworks/base/services/core/java/com/android/server/am/ |
H A D | UriPermissionOwner.java | 78 UriPermission perm = it.next(); 79 if (grantUri == null || grantUri.equals(perm.uri)) { 80 perm.removeReadOwner(this); 81 service.removeUriPermissionIfNeededLocked(perm); 93 UriPermission perm = it.next(); 94 if (grantUri == null || grantUri.equals(perm.uri)) { 95 perm.removeWriteOwner(this); 96 service.removeUriPermissionIfNeededLocked(perm); 106 public void addReadPermission(UriPermission perm) { argument 110 mReadPerms.add(perm); 113 addWritePermission(UriPermission perm) argument 120 removeReadPermission(UriPermission perm) argument 127 removeWritePermission(UriPermission perm) argument [all...] |
H A D | UriPermission.java | 374 private Snapshot(UriPermission perm) { argument 375 this.targetUserId = perm.targetUserId; 376 this.sourcePkg = perm.sourcePkg; 377 this.targetPkg = perm.targetPkg; 378 this.uri = perm.uri; 379 this.persistedModeFlags = perm.persistedModeFlags; 380 this.persistedCreateTime = perm.persistedCreateTime;
|
H A D | BroadcastQueue.java | 524 int perm = mService.checkComponentPermission(filter.requiredPermission, 526 if (perm != PackageManager.PERMISSION_GRANTED) { 553 int perm = mService.checkComponentPermission(requiredPermission, 555 if (perm != PackageManager.PERMISSION_GRANTED) { 587 int perm = mService.checkComponentPermission(null, 589 if (perm != PackageManager.PERMISSION_GRANTED) { 1080 int perm = mService.checkComponentPermission(info.activityInfo.permission, 1083 if (!skip && perm != PackageManager.PERMISSION_GRANTED) { 1121 perm = AppGlobals.getPackageManager(). 1127 perm [all...] |
H A D | ActivityManagerService.java | 9254 "Checking read perm for " + pprperm + " for " + pp.getPath() 9269 "Checking write perm " + ppwperm + " for " + pp.getPath() 9488 UriPermission perm = targetUris.get(grantUri); 9489 if (perm == null) { 9490 perm = new UriPermission(sourcePkg, targetPkg, targetUid, grantUri); 9491 targetUris.put(grantUri, perm); 9494 return perm; 9521 final UriPermission perm = perms.valueAt(i); 9522 if (perm.uri.prefix && grantUri.uri.isPathPrefixMatch(perm 9977 removeUriPermissionIfNeededLocked(UriPermission perm) argument [all...] |
/frameworks/base/services/core/java/com/android/server/pm/permission/ |
H A D | BasePermission.java | 91 PackageParser.Permission perm; field in class:BasePermission 146 public void setPermission(@Nullable Permission perm) { argument 147 this.perm = perm; 165 public int calculateFootprint(BasePermission perm) { argument 166 if (uid == perm.uid) { 167 return perm.name.length() + perm.perm.info.calculateFootprint(); 172 public boolean isPermission(Permission perm) { argument [all...] |
H A D | PermissionManagerService.java | 168 final SystemConfig.PermissionEntry perm = permConfig.valueAt(i); 169 BasePermission bp = mSettings.getPermissionLocked(perm.name); 171 bp = new BasePermission(perm.name, "android", BasePermission.TYPE_BUILTIN); 172 mSettings.putPermissionLocked(perm.name, bp); 174 if (perm.gids != null) { 175 bp.setGids(perm.gids, perm.perUser); 588 String perm = pkg.requestedPermissions.get(i); 589 if (mSettings.isPermissionAppOp(perm)) { 590 ArraySet<String> appOpPkgs = mSettings.mAppOpPermissionPackages.get(perm); 995 isNewPlatformPermissionForPackage(String perm, PackageParser.Package pkg) argument 1019 hasPrivappWhitelistEntry(String perm, PackageParser.Package pkg) argument 1037 grantSignaturePermission(String perm, PackageParser.Package pkg, BasePermission bp, PermissionsState origPermissions) argument [all...] |
H A D | PermissionsState.java | 655 public PermissionData(BasePermission perm) { argument 656 mPerm = perm;
|
/frameworks/compile/mclinker/lib/Support/Unix/ |
H A D | FileSystem.inc | 106 mode_t perm = 0; 108 perm |= S_IRUSR; 110 perm |= S_IWUSR; 112 perm |= S_IXUSR; 114 perm |= S_IRGRP; 116 perm |= S_IWGRP; 118 perm |= S_IXGRP; 120 perm |= S_IROTH; 122 perm |= S_IWOTH; 124 perm | [all...] |
/frameworks/native/cmds/servicemanager/ |
H A D | service_manager.c | 64 static bool check_mac_perms(pid_t spid, uid_t uid, const char *tctx, const char *perm, const char *name) argument 80 int result = selinux_check_access(sctx, tctx, class, perm, (void *) &ad); 87 static bool check_mac_perms_from_getcon(pid_t spid, uid_t uid, const char *perm) argument 89 return check_mac_perms(spid, uid, service_manager_context, perm, NULL); 92 static bool check_mac_perms_from_lookup(pid_t spid, uid_t uid, const char *perm, const char *name) argument 107 allowed = check_mac_perms(spid, uid, tctx, perm, name); 114 const char *perm = "add"; local 120 return check_mac_perms_from_lookup(spid, uid, perm, str8(name, name_len)) ? 1 : 0; 125 const char *perm = "list"; local 126 return check_mac_perms_from_getcon(spid, uid, perm) 131 const char *perm = "find"; local [all...] |
/frameworks/compile/mclinker/lib/Support/Windows/ |
H A D | FileSystem.inc | 77 int perm = 0; 80 perm |= _S_IREAD; 84 perm |= _S_IWRITE; 86 return ::_open(pPath.native().c_str(), pOFlag | _O_BINARY, perm);
|
/frameworks/av/drm/drmserver/ |
H A D | DrmManagerService.cpp | 51 const char *DrmManagerService::get_perm_label(drm_perm_t perm) { argument 52 unsigned int index = perm; 55 ALOGE("SELinux: Failed to retrieve permission label(perm=%d).\n", perm); 61 bool DrmManagerService::selinuxIsProtectedCallAllowed(pid_t spid, drm_perm_t perm) { argument 68 const char *str_perm = get_perm_label(perm); 82 bool DrmManagerService::isProtectedCallAllowed(drm_perm_t perm) { argument 92 return selinuxIsProtectedCallAllowed(spid, perm);
|
H A D | DrmManagerService.h | 61 static const char *get_perm_label(drm_perm_t perm); 63 static bool selinuxIsProtectedCallAllowed(pid_t spid, drm_perm_t perm); 65 static bool isProtectedCallAllowed(drm_perm_t perm);
|
/frameworks/base/core/java/android/os/ |
H A D | SELinux.java | 99 * @param perm The permission name. 102 public static final native boolean checkSELinuxAccess(String scon, String tcon, String tclass, String perm); argument
|
/frameworks/base/core/java/android/widget/ |
H A D | AppSecurityPermissions.java | 91 MyPermissionGroupInfo(PermissionInfo perm) { argument 92 name = perm.packageName; 93 packageName = perm.packageName; 147 public void setPermission(MyPermissionGroupInfo grp, MyPermissionInfo perm, argument 151 mPerm = perm; 163 CharSequence label = perm.mLabel; 164 if (perm.mNew && newPermPrefix != null) { 180 if (localLOGV) Log.i(TAG, "Made perm item " + perm.name 480 MyPermissionInfo perm 500 getPermissionItemView(MyPermissionGroupInfo grp, MyPermissionInfo perm, boolean first, CharSequence newPermPrefix, boolean showRevokeUI) argument 506 getPermissionItemView(Context context, LayoutInflater inflater, MyPermissionGroupInfo grp, MyPermissionInfo perm, boolean first, CharSequence newPermPrefix, String packageName, boolean showRevokeUI) argument [all...] |
/frameworks/base/core/java/com/android/server/ |
H A D | SystemConfig.java | 429 String perm = parser.getAttributeValue(null, "name"); 430 if (perm == null) { 436 perm = perm.intern(); 437 readPermission(parser, perm); 440 String perm = parser.getAttributeValue(null, "name"); 441 if (perm == null) { 462 perm = perm.intern(); 468 perms.add(perm); [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | AppsQueryHelper.java | 209 protected List<PackageInfo> getPackagesHoldingPermission(String perm, int userId) { argument 211 return mPackageManager.getPackagesHoldingPermissions(new String[]{perm}, 0,
|
H A D | PackageParser.java | 786 final String perm = p.requestedPermissions.get(i); 787 pi.requestedPermissions[i] = perm; 790 if (grantedPermissions != null && grantedPermissions.contains(perm)) { 2450 final String perm = spi.newPerms[in]; 2451 if (!pkg.requestedPermissions.contains(perm)) { 2452 pkg.requestedPermissions.add(perm); 3071 PermissionGroup perm = new PermissionGroup(owner); 3075 if (!parsePackageItemInfo(owner, perm.info, outError, 3088 perm.info.descriptionRes = sa.getResourceId( 3091 perm [all...] |
/frameworks/ml/nn/common/operations/ |
H A D | Reshape.cpp | 199 const int32_t* perm, const Shape& permShape, 209 reversed_perm[output_k] = permSize - perm[input_k] - 1; 198 transposeGeneric(const uint8_t* inputData, const Shape& inputShape, const int32_t* perm, const Shape& permShape, uint8_t* outputData, const Shape& outputShape) argument
|
/frameworks/av/media/mtp/ |
H A D | MtpDevice.h | 123 int perm);
|
/frameworks/base/services/backup/java/com/android/server/backup/restore/ |
H A D | ActiveRestoreSession.java | 315 int perm = mBackupManagerService.getContext().checkPermission( 318 if ((perm == PackageManager.PERMISSION_DENIED) &&
|
/frameworks/base/services/core/java/com/android/server/job/ |
H A D | JobSchedulerShellCommand.java | 86 final int perm = mPM.checkUidPermission( 88 if (perm != PackageManager.PERMISSION_GRANTED) {
|
/frameworks/base/core/java/android/accounts/ |
H A D | AbstractAccountAuthenticator.java | 516 final String perm = Manifest.permission.ACCOUNT_MANAGER; 517 if (mContext.checkCallingOrSelfPermission(perm) != PackageManager.PERMISSION_GRANTED) { 518 throw new SecurityException("caller uid " + uid + " lacks " + perm);
|
/frameworks/base/core/tests/coretests/src/android/content/pm/ |
H A D | AppsQueryHelperTests.java | 140 protected List<PackageInfo> getPackagesHoldingPermission(String perm, int userId) { argument
|
/frameworks/base/core/java/com/android/internal/app/ |
H A D | ResolverComparator.java | 470 final String perm = mPm.getServiceInfo(componentName, 0).permission; 471 if (!ResolverRankerService.BIND_PERMISSION.equals(perm)) {
|
/frameworks/ml/nn/common/include/ |
H A D | Operations.h | 222 const int32_t* perm, const Shape& permShape,
|