DefaultPermissionGrantPolicy.java revision 7838027fb089238a6044b9bda4385bf81f90ab50
1/*
2 * Copyright (C) 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 *      http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server.pm.permission;
18
19import static android.os.Process.FIRST_APPLICATION_UID;
20
21import android.Manifest;
22import android.annotation.NonNull;
23import android.annotation.Nullable;
24import android.app.ActivityManager;
25import android.app.DownloadManager;
26import android.app.admin.DevicePolicyManager;
27import android.companion.CompanionDeviceManager;
28import android.content.ComponentName;
29import android.content.Context;
30import android.content.Intent;
31import android.content.pm.ApplicationInfo;
32import android.content.pm.PackageList;
33import android.content.pm.PackageManager;
34import android.content.pm.PackageManagerInternal;
35import android.content.pm.PackageManagerInternal.PackagesProvider;
36import android.content.pm.PackageManagerInternal.SyncAdapterPackagesProvider;
37import android.content.pm.PackageParser;
38import android.content.pm.ProviderInfo;
39import android.content.pm.ResolveInfo;
40import android.media.RingtoneManager;
41import android.net.Uri;
42import android.os.Binder;
43import android.os.Build;
44import android.os.Environment;
45import android.os.Handler;
46import android.os.Looper;
47import android.os.Message;
48import android.os.UserHandle;
49import android.os.storage.StorageManager;
50import android.print.PrintManager;
51import android.provider.CalendarContract;
52import android.provider.ContactsContract;
53import android.provider.MediaStore;
54import android.provider.Telephony.Sms.Intents;
55import android.security.Credentials;
56import android.service.textclassifier.TextClassifierService;
57import android.telephony.TelephonyManager;
58import android.text.TextUtils;
59import android.util.ArrayMap;
60import android.util.ArraySet;
61import android.util.Log;
62import android.util.Slog;
63import android.util.Xml;
64
65import com.android.internal.util.XmlUtils;
66import com.android.server.LocalServices;
67import com.android.server.pm.PackageManagerService;
68
69import org.xmlpull.v1.XmlPullParser;
70import org.xmlpull.v1.XmlPullParserException;
71
72import java.io.BufferedInputStream;
73import java.io.File;
74import java.io.FileInputStream;
75import java.io.IOException;
76import java.io.InputStream;
77import java.util.ArrayList;
78import java.util.Collections;
79import java.util.List;
80import java.util.Map;
81import java.util.Set;
82
83/**
84 * This class is the policy for granting runtime permissions to
85 * platform components and default handlers in the system such
86 * that the device is usable out-of-the-box. For example, the
87 * shell UID is a part of the system and the Phone app should
88 * have phone related permission by default.
89 * <p>
90 * NOTE: This class is at the wrong abstraction level. It is a part of the package manager
91 * service but knows about lots of higher level subsystems. The correct way to do this is
92 * to have an interface defined in the package manager but have the impl next to other
93 * policy stuff like PhoneWindowManager
94 */
95public final class DefaultPermissionGrantPolicy {
96    private static final String TAG = "DefaultPermGrantPolicy"; // must be <= 23 chars
97    private static final boolean DEBUG = false;
98
99    private static final int DEFAULT_FLAGS =
100            PackageManager.MATCH_DIRECT_BOOT_AWARE | PackageManager.MATCH_DIRECT_BOOT_UNAWARE
101                    | PackageManager.MATCH_UNINSTALLED_PACKAGES;
102
103    private static final String AUDIO_MIME_TYPE = "audio/mpeg";
104
105    private static final String TAG_EXCEPTIONS = "exceptions";
106    private static final String TAG_EXCEPTION = "exception";
107    private static final String TAG_PERMISSION = "permission";
108    private static final String ATTR_PACKAGE = "package";
109    private static final String ATTR_NAME = "name";
110    private static final String ATTR_FIXED = "fixed";
111
112    private static final Set<String> PHONE_PERMISSIONS = new ArraySet<>();
113    static {
114        PHONE_PERMISSIONS.add(Manifest.permission.READ_PHONE_STATE);
115        PHONE_PERMISSIONS.add(Manifest.permission.CALL_PHONE);
116        PHONE_PERMISSIONS.add(Manifest.permission.READ_CALL_LOG);
117        PHONE_PERMISSIONS.add(Manifest.permission.WRITE_CALL_LOG);
118        PHONE_PERMISSIONS.add(Manifest.permission.ADD_VOICEMAIL);
119        PHONE_PERMISSIONS.add(Manifest.permission.USE_SIP);
120        PHONE_PERMISSIONS.add(Manifest.permission.PROCESS_OUTGOING_CALLS);
121    }
122
123    private static final Set<String> CONTACTS_PERMISSIONS = new ArraySet<>();
124    static {
125        CONTACTS_PERMISSIONS.add(Manifest.permission.READ_CONTACTS);
126        CONTACTS_PERMISSIONS.add(Manifest.permission.WRITE_CONTACTS);
127        CONTACTS_PERMISSIONS.add(Manifest.permission.GET_ACCOUNTS);
128    }
129
130    private static final Set<String> LOCATION_PERMISSIONS = new ArraySet<>();
131    static {
132        LOCATION_PERMISSIONS.add(Manifest.permission.ACCESS_FINE_LOCATION);
133        LOCATION_PERMISSIONS.add(Manifest.permission.ACCESS_COARSE_LOCATION);
134    }
135
136    private static final Set<String> COARSE_LOCATION_PERMISSIONS = new ArraySet<>();
137    static {
138        COARSE_LOCATION_PERMISSIONS.add(Manifest.permission.ACCESS_COARSE_LOCATION);
139    }
140
141    private static final Set<String> CALENDAR_PERMISSIONS = new ArraySet<>();
142    static {
143        CALENDAR_PERMISSIONS.add(Manifest.permission.READ_CALENDAR);
144        CALENDAR_PERMISSIONS.add(Manifest.permission.WRITE_CALENDAR);
145    }
146
147    private static final Set<String> SMS_PERMISSIONS = new ArraySet<>();
148    static {
149        SMS_PERMISSIONS.add(Manifest.permission.SEND_SMS);
150        SMS_PERMISSIONS.add(Manifest.permission.RECEIVE_SMS);
151        SMS_PERMISSIONS.add(Manifest.permission.READ_SMS);
152        SMS_PERMISSIONS.add(Manifest.permission.RECEIVE_WAP_PUSH);
153        SMS_PERMISSIONS.add(Manifest.permission.RECEIVE_MMS);
154        SMS_PERMISSIONS.add(Manifest.permission.READ_CELL_BROADCASTS);
155    }
156
157    private static final Set<String> MICROPHONE_PERMISSIONS = new ArraySet<>();
158    static {
159        MICROPHONE_PERMISSIONS.add(Manifest.permission.RECORD_AUDIO);
160    }
161
162    private static final Set<String> CAMERA_PERMISSIONS = new ArraySet<>();
163    static {
164        CAMERA_PERMISSIONS.add(Manifest.permission.CAMERA);
165    }
166
167    private static final Set<String> SENSORS_PERMISSIONS = new ArraySet<>();
168    static {
169        SENSORS_PERMISSIONS.add(Manifest.permission.BODY_SENSORS);
170    }
171
172    private static final Set<String> STORAGE_PERMISSIONS = new ArraySet<>();
173    static {
174        STORAGE_PERMISSIONS.add(Manifest.permission.READ_EXTERNAL_STORAGE);
175        STORAGE_PERMISSIONS.add(Manifest.permission.WRITE_EXTERNAL_STORAGE);
176    }
177
178    private static final int MSG_READ_DEFAULT_PERMISSION_EXCEPTIONS = 1;
179
180    private static final String ACTION_TRACK = "com.android.fitness.TRACK";
181
182    private final Handler mHandler;
183
184    private PackagesProvider mLocationPackagesProvider;
185    private PackagesProvider mVoiceInteractionPackagesProvider;
186    private PackagesProvider mSmsAppPackagesProvider;
187    private PackagesProvider mDialerAppPackagesProvider;
188    private PackagesProvider mSimCallManagerPackagesProvider;
189    private PackagesProvider mUseOpenWifiAppPackagesProvider;
190    private SyncAdapterPackagesProvider mSyncAdapterPackagesProvider;
191
192    private ArrayMap<String, List<DefaultPermissionGrant>> mGrantExceptions;
193    private final Context mContext;
194    private final Object mLock = new Object();
195    private final PackageManagerInternal mServiceInternal;
196    private final PermissionManagerService mPermissionManager;
197    private final DefaultPermissionGrantedCallback mPermissionGrantedCallback;
198    public interface DefaultPermissionGrantedCallback {
199        /** Callback when permissions have been granted */
200        public void onDefaultRuntimePermissionsGranted(int userId);
201    }
202
203    public DefaultPermissionGrantPolicy(Context context, Looper looper,
204            @Nullable DefaultPermissionGrantedCallback callback,
205            @NonNull PermissionManagerService permissionManager) {
206        mContext = context;
207        mHandler = new Handler(looper) {
208            @Override
209            public void handleMessage(Message msg) {
210                if (msg.what == MSG_READ_DEFAULT_PERMISSION_EXCEPTIONS) {
211                    synchronized (mLock) {
212                        if (mGrantExceptions == null) {
213                            mGrantExceptions = readDefaultPermissionExceptionsLocked();
214                        }
215                    }
216                }
217            }
218        };
219        mPermissionGrantedCallback = callback;
220        mPermissionManager = permissionManager;
221        mServiceInternal = LocalServices.getService(PackageManagerInternal.class);
222    }
223
224    public void setLocationPackagesProvider(PackagesProvider provider) {
225        synchronized (mLock) {
226            mLocationPackagesProvider = provider;
227        }
228    }
229
230    public void setVoiceInteractionPackagesProvider(PackagesProvider provider) {
231        synchronized (mLock) {
232            mVoiceInteractionPackagesProvider = provider;
233        }
234    }
235
236    public void setSmsAppPackagesProvider(PackagesProvider provider) {
237        synchronized (mLock) {
238            mSmsAppPackagesProvider = provider;
239        }
240    }
241
242    public void setDialerAppPackagesProvider(PackagesProvider provider) {
243        synchronized (mLock) {
244            mDialerAppPackagesProvider = provider;
245        }
246    }
247
248    public void setSimCallManagerPackagesProvider(PackagesProvider provider) {
249        synchronized (mLock) {
250            mSimCallManagerPackagesProvider = provider;
251        }
252    }
253
254    public void setUseOpenWifiAppPackagesProvider(PackagesProvider provider) {
255        synchronized (mLock) {
256            mUseOpenWifiAppPackagesProvider = provider;
257        }
258    }
259
260    public void setSyncAdapterPackagesProvider(SyncAdapterPackagesProvider provider) {
261        synchronized (mLock) {
262            mSyncAdapterPackagesProvider = provider;
263        }
264    }
265
266    public void grantDefaultPermissions(int userId) {
267        grantPermissionsToSysComponentsAndPrivApps(userId);
268        grantDefaultSystemHandlerPermissions(userId);
269        grantDefaultPermissionExceptions(userId);
270    }
271
272    private void grantRuntimePermissionsForPackage(int userId, PackageParser.Package pkg) {
273        Set<String> permissions = new ArraySet<>();
274        for (String permission :  pkg.requestedPermissions) {
275            final BasePermission bp = mPermissionManager.getPermission(permission);
276            if (bp == null) {
277                continue;
278            }
279            if (bp.isRuntime()) {
280                permissions.add(permission);
281            }
282        }
283        if (!permissions.isEmpty()) {
284            grantRuntimePermissions(pkg, permissions, true, userId);
285        }
286    }
287
288    private void grantAllRuntimePermissions(int userId) {
289        Log.i(TAG, "Granting all runtime permissions for user " + userId);
290        final PackageList packageList = mServiceInternal.getPackageList();
291        for (String packageName : packageList.getPackageNames()) {
292            final PackageParser.Package pkg = mServiceInternal.getPackage(packageName);
293            if (pkg == null) {
294                continue;
295            }
296            grantRuntimePermissionsForPackage(userId, pkg);
297        }
298    }
299
300    public void scheduleReadDefaultPermissionExceptions() {
301        mHandler.sendEmptyMessage(MSG_READ_DEFAULT_PERMISSION_EXCEPTIONS);
302    }
303
304    private void grantPermissionsToSysComponentsAndPrivApps(int userId) {
305        Log.i(TAG, "Granting permissions to platform components for user " + userId);
306        final PackageList packageList = mServiceInternal.getPackageList();
307        for (String packageName : packageList.getPackageNames()) {
308            final PackageParser.Package pkg = mServiceInternal.getPackage(packageName);
309            if (pkg == null) {
310                continue;
311            }
312            if (!isSysComponentOrPersistentPlatformSignedPrivApp(pkg)
313                    || !doesPackageSupportRuntimePermissions(pkg)
314                    || pkg.requestedPermissions.isEmpty()) {
315                continue;
316            }
317            grantRuntimePermissionsForPackage(userId, pkg);
318        }
319    }
320
321    private void grantDefaultSystemHandlerPermissions(int userId) {
322        Log.i(TAG, "Granting permissions to default platform handlers for user " + userId);
323
324        final PackagesProvider locationPackagesProvider;
325        final PackagesProvider voiceInteractionPackagesProvider;
326        final PackagesProvider smsAppPackagesProvider;
327        final PackagesProvider dialerAppPackagesProvider;
328        final PackagesProvider simCallManagerPackagesProvider;
329        final PackagesProvider useOpenWifiAppPackagesProvider;
330        final SyncAdapterPackagesProvider syncAdapterPackagesProvider;
331
332        synchronized (mLock) {
333            locationPackagesProvider = mLocationPackagesProvider;
334            voiceInteractionPackagesProvider = mVoiceInteractionPackagesProvider;
335            smsAppPackagesProvider = mSmsAppPackagesProvider;
336            dialerAppPackagesProvider = mDialerAppPackagesProvider;
337            simCallManagerPackagesProvider = mSimCallManagerPackagesProvider;
338            useOpenWifiAppPackagesProvider = mUseOpenWifiAppPackagesProvider;
339            syncAdapterPackagesProvider = mSyncAdapterPackagesProvider;
340        }
341
342        String[] voiceInteractPackageNames = (voiceInteractionPackagesProvider != null)
343                ? voiceInteractionPackagesProvider.getPackages(userId) : null;
344        String[] locationPackageNames = (locationPackagesProvider != null)
345                ? locationPackagesProvider.getPackages(userId) : null;
346        String[] smsAppPackageNames = (smsAppPackagesProvider != null)
347                ? smsAppPackagesProvider.getPackages(userId) : null;
348        String[] dialerAppPackageNames = (dialerAppPackagesProvider != null)
349                ? dialerAppPackagesProvider.getPackages(userId) : null;
350        String[] simCallManagerPackageNames = (simCallManagerPackagesProvider != null)
351                ? simCallManagerPackagesProvider.getPackages(userId) : null;
352        String[] useOpenWifiAppPackageNames = (useOpenWifiAppPackagesProvider != null)
353                ? useOpenWifiAppPackagesProvider.getPackages(userId) : null;
354        String[] contactsSyncAdapterPackages = (syncAdapterPackagesProvider != null) ?
355                syncAdapterPackagesProvider.getPackages(ContactsContract.AUTHORITY, userId) : null;
356        String[] calendarSyncAdapterPackages = (syncAdapterPackagesProvider != null) ?
357                syncAdapterPackagesProvider.getPackages(CalendarContract.AUTHORITY, userId) : null;
358
359        // Installer
360        final String installerPackageName = mServiceInternal.getKnownPackageName(
361                PackageManagerInternal.PACKAGE_INSTALLER, userId);
362        PackageParser.Package installerPackage = getSystemPackage(installerPackageName);
363        if (installerPackage != null
364                && doesPackageSupportRuntimePermissions(installerPackage)) {
365            grantRuntimePermissions(installerPackage, STORAGE_PERMISSIONS, true, userId);
366        }
367
368        // Verifier
369        final String verifierPackageName = mServiceInternal.getKnownPackageName(
370                PackageManagerInternal.PACKAGE_VERIFIER, userId);
371        PackageParser.Package verifierPackage = getSystemPackage(verifierPackageName);
372        if (verifierPackage != null
373                && doesPackageSupportRuntimePermissions(verifierPackage)) {
374            grantRuntimePermissions(verifierPackage, STORAGE_PERMISSIONS, true, userId);
375            grantRuntimePermissions(verifierPackage, PHONE_PERMISSIONS, false, userId);
376            grantRuntimePermissions(verifierPackage, SMS_PERMISSIONS, false, userId);
377        }
378
379        // SetupWizard
380        final String setupWizardPackageName = mServiceInternal.getKnownPackageName(
381                PackageManagerInternal.PACKAGE_SETUP_WIZARD, userId);
382        PackageParser.Package setupPackage = getSystemPackage(setupWizardPackageName);
383        if (setupPackage != null
384                && doesPackageSupportRuntimePermissions(setupPackage)) {
385            grantRuntimePermissions(setupPackage, PHONE_PERMISSIONS, userId);
386            grantRuntimePermissions(setupPackage, CONTACTS_PERMISSIONS, userId);
387            grantRuntimePermissions(setupPackage, LOCATION_PERMISSIONS, userId);
388            grantRuntimePermissions(setupPackage, CAMERA_PERMISSIONS, userId);
389        }
390
391        // Camera
392        Intent cameraIntent = new Intent(MediaStore.ACTION_IMAGE_CAPTURE);
393        PackageParser.Package cameraPackage = getDefaultSystemHandlerActivityPackage(
394                cameraIntent, userId);
395        if (cameraPackage != null
396                && doesPackageSupportRuntimePermissions(cameraPackage)) {
397            grantRuntimePermissions(cameraPackage, CAMERA_PERMISSIONS, userId);
398            grantRuntimePermissions(cameraPackage, MICROPHONE_PERMISSIONS, userId);
399            grantRuntimePermissions(cameraPackage, STORAGE_PERMISSIONS, userId);
400        }
401
402        // Media provider
403        PackageParser.Package mediaStorePackage = getDefaultProviderAuthorityPackage(
404                MediaStore.AUTHORITY, userId);
405        if (mediaStorePackage != null) {
406            grantRuntimePermissions(mediaStorePackage, STORAGE_PERMISSIONS, true, userId);
407            grantRuntimePermissions(mediaStorePackage, PHONE_PERMISSIONS, true, userId);
408        }
409
410        // Downloads provider
411        PackageParser.Package downloadsPackage = getDefaultProviderAuthorityPackage(
412                "downloads", userId);
413        if (downloadsPackage != null) {
414            grantRuntimePermissions(downloadsPackage, STORAGE_PERMISSIONS, true, userId);
415        }
416
417        // Downloads UI
418        Intent downloadsUiIntent = new Intent(DownloadManager.ACTION_VIEW_DOWNLOADS);
419        PackageParser.Package downloadsUiPackage = getDefaultSystemHandlerActivityPackage(
420                downloadsUiIntent, userId);
421        if (downloadsUiPackage != null
422                && doesPackageSupportRuntimePermissions(downloadsUiPackage)) {
423            grantRuntimePermissions(downloadsUiPackage, STORAGE_PERMISSIONS, true, userId);
424        }
425
426        // Storage provider
427        PackageParser.Package storagePackage = getDefaultProviderAuthorityPackage(
428                "com.android.externalstorage.documents", userId);
429        if (storagePackage != null) {
430            grantRuntimePermissions(storagePackage, STORAGE_PERMISSIONS, true, userId);
431        }
432
433        // Container service
434        PackageParser.Package containerPackage = getSystemPackage(
435                PackageManagerService.DEFAULT_CONTAINER_PACKAGE);
436        if (containerPackage != null) {
437            grantRuntimePermissions(containerPackage, STORAGE_PERMISSIONS, true, userId);
438        }
439
440        // CertInstaller
441        Intent certInstallerIntent = new Intent(Credentials.INSTALL_ACTION);
442        PackageParser.Package certInstallerPackage = getDefaultSystemHandlerActivityPackage(
443                certInstallerIntent, userId);
444        if (certInstallerPackage != null
445                && doesPackageSupportRuntimePermissions(certInstallerPackage)) {
446            grantRuntimePermissions(certInstallerPackage, STORAGE_PERMISSIONS, true, userId);
447        }
448
449        // Dialer
450        if (dialerAppPackageNames == null) {
451            Intent dialerIntent = new Intent(Intent.ACTION_DIAL);
452            PackageParser.Package dialerPackage = getDefaultSystemHandlerActivityPackage(
453                    dialerIntent, userId);
454            if (dialerPackage != null) {
455                grantDefaultPermissionsToDefaultSystemDialerApp(dialerPackage, userId);
456            }
457        } else {
458            for (String dialerAppPackageName : dialerAppPackageNames) {
459                PackageParser.Package dialerPackage = getSystemPackage(dialerAppPackageName);
460                if (dialerPackage != null) {
461                    grantDefaultPermissionsToDefaultSystemDialerApp(dialerPackage, userId);
462                }
463            }
464        }
465
466        // Sim call manager
467        if (simCallManagerPackageNames != null) {
468            for (String simCallManagerPackageName : simCallManagerPackageNames) {
469                PackageParser.Package simCallManagerPackage =
470                        getSystemPackage(simCallManagerPackageName);
471                if (simCallManagerPackage != null) {
472                    grantDefaultPermissionsToDefaultSimCallManager(simCallManagerPackage,
473                            userId);
474                }
475            }
476        }
477
478        // Use Open Wifi
479        if (useOpenWifiAppPackageNames != null) {
480            for (String useOpenWifiPackageName : useOpenWifiAppPackageNames) {
481                PackageParser.Package useOpenWifiPackage =
482                        getSystemPackage(useOpenWifiPackageName);
483                if (useOpenWifiPackage != null) {
484                    grantDefaultPermissionsToDefaultSystemUseOpenWifiApp(useOpenWifiPackage,
485                            userId);
486                }
487            }
488        }
489
490        // SMS
491        if (smsAppPackageNames == null) {
492            Intent smsIntent = new Intent(Intent.ACTION_MAIN);
493            smsIntent.addCategory(Intent.CATEGORY_APP_MESSAGING);
494            PackageParser.Package smsPackage = getDefaultSystemHandlerActivityPackage(
495                    smsIntent, userId);
496            if (smsPackage != null) {
497               grantDefaultPermissionsToDefaultSystemSmsApp(smsPackage, userId);
498            }
499        } else {
500            for (String smsPackageName : smsAppPackageNames) {
501                PackageParser.Package smsPackage = getSystemPackage(smsPackageName);
502                if (smsPackage != null) {
503                    grantDefaultPermissionsToDefaultSystemSmsApp(smsPackage, userId);
504                }
505            }
506        }
507
508        // Cell Broadcast Receiver
509        Intent cbrIntent = new Intent(Intents.SMS_CB_RECEIVED_ACTION);
510        PackageParser.Package cbrPackage =
511                getDefaultSystemHandlerActivityPackage(cbrIntent, userId);
512        if (cbrPackage != null && doesPackageSupportRuntimePermissions(cbrPackage)) {
513            grantRuntimePermissions(cbrPackage, SMS_PERMISSIONS, userId);
514        }
515
516        // Carrier Provisioning Service
517        Intent carrierProvIntent = new Intent(Intents.SMS_CARRIER_PROVISION_ACTION);
518        PackageParser.Package carrierProvPackage =
519                getDefaultSystemHandlerServicePackage(carrierProvIntent, userId);
520        if (carrierProvPackage != null
521                && doesPackageSupportRuntimePermissions(carrierProvPackage)) {
522            grantRuntimePermissions(carrierProvPackage, SMS_PERMISSIONS, false, userId);
523        }
524
525        // Calendar
526        Intent calendarIntent = new Intent(Intent.ACTION_MAIN);
527        calendarIntent.addCategory(Intent.CATEGORY_APP_CALENDAR);
528        PackageParser.Package calendarPackage = getDefaultSystemHandlerActivityPackage(
529                calendarIntent, userId);
530        if (calendarPackage != null
531                && doesPackageSupportRuntimePermissions(calendarPackage)) {
532            grantRuntimePermissions(calendarPackage, CALENDAR_PERMISSIONS, userId);
533            grantRuntimePermissions(calendarPackage, CONTACTS_PERMISSIONS, userId);
534        }
535
536        // Calendar provider
537        PackageParser.Package calendarProviderPackage = getDefaultProviderAuthorityPackage(
538                CalendarContract.AUTHORITY, userId);
539        if (calendarProviderPackage != null) {
540            grantRuntimePermissions(calendarProviderPackage, CONTACTS_PERMISSIONS, userId);
541            grantRuntimePermissions(calendarProviderPackage, CALENDAR_PERMISSIONS,
542                    true, userId);
543            grantRuntimePermissions(calendarProviderPackage, STORAGE_PERMISSIONS, userId);
544        }
545
546        // Calendar provider sync adapters
547        List<PackageParser.Package> calendarSyncAdapters = getHeadlessSyncAdapterPackages(
548                calendarSyncAdapterPackages, userId);
549        final int calendarSyncAdapterCount = calendarSyncAdapters.size();
550        for (int i = 0; i < calendarSyncAdapterCount; i++) {
551            PackageParser.Package calendarSyncAdapter = calendarSyncAdapters.get(i);
552            if (doesPackageSupportRuntimePermissions(calendarSyncAdapter)) {
553                grantRuntimePermissions(calendarSyncAdapter, CALENDAR_PERMISSIONS, userId);
554            }
555        }
556
557        // Contacts
558        Intent contactsIntent = new Intent(Intent.ACTION_MAIN);
559        contactsIntent.addCategory(Intent.CATEGORY_APP_CONTACTS);
560        PackageParser.Package contactsPackage = getDefaultSystemHandlerActivityPackage(
561                contactsIntent, userId);
562        if (contactsPackage != null
563                && doesPackageSupportRuntimePermissions(contactsPackage)) {
564            grantRuntimePermissions(contactsPackage, CONTACTS_PERMISSIONS, userId);
565            grantRuntimePermissions(contactsPackage, PHONE_PERMISSIONS, userId);
566        }
567
568        // Contacts provider sync adapters
569        List<PackageParser.Package> contactsSyncAdapters = getHeadlessSyncAdapterPackages(
570                contactsSyncAdapterPackages, userId);
571        final int contactsSyncAdapterCount = contactsSyncAdapters.size();
572        for (int i = 0; i < contactsSyncAdapterCount; i++) {
573            PackageParser.Package contactsSyncAdapter = contactsSyncAdapters.get(i);
574            if (doesPackageSupportRuntimePermissions(contactsSyncAdapter)) {
575                grantRuntimePermissions(contactsSyncAdapter, CONTACTS_PERMISSIONS, userId);
576            }
577        }
578
579        // Contacts provider
580        PackageParser.Package contactsProviderPackage = getDefaultProviderAuthorityPackage(
581                ContactsContract.AUTHORITY, userId);
582        if (contactsProviderPackage != null) {
583            grantRuntimePermissions(contactsProviderPackage, CONTACTS_PERMISSIONS,
584                    true, userId);
585            grantRuntimePermissions(contactsProviderPackage, PHONE_PERMISSIONS,
586                    true, userId);
587            grantRuntimePermissions(contactsProviderPackage, STORAGE_PERMISSIONS, userId);
588        }
589
590        // Device provisioning
591        Intent deviceProvisionIntent = new Intent(
592                DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE);
593        PackageParser.Package deviceProvisionPackage =
594                getDefaultSystemHandlerActivityPackage(deviceProvisionIntent, userId);
595        if (deviceProvisionPackage != null
596                && doesPackageSupportRuntimePermissions(deviceProvisionPackage)) {
597            grantRuntimePermissions(deviceProvisionPackage, CONTACTS_PERMISSIONS, userId);
598        }
599
600        // Maps
601        Intent mapsIntent = new Intent(Intent.ACTION_MAIN);
602        mapsIntent.addCategory(Intent.CATEGORY_APP_MAPS);
603        PackageParser.Package mapsPackage = getDefaultSystemHandlerActivityPackage(
604                mapsIntent, userId);
605        if (mapsPackage != null
606                && doesPackageSupportRuntimePermissions(mapsPackage)) {
607            grantRuntimePermissions(mapsPackage, LOCATION_PERMISSIONS, userId);
608        }
609
610        // Gallery
611        Intent galleryIntent = new Intent(Intent.ACTION_MAIN);
612        galleryIntent.addCategory(Intent.CATEGORY_APP_GALLERY);
613        PackageParser.Package galleryPackage = getDefaultSystemHandlerActivityPackage(
614                galleryIntent, userId);
615        if (galleryPackage != null
616                && doesPackageSupportRuntimePermissions(galleryPackage)) {
617            grantRuntimePermissions(galleryPackage, STORAGE_PERMISSIONS, userId);
618        }
619
620        // Email
621        Intent emailIntent = new Intent(Intent.ACTION_MAIN);
622        emailIntent.addCategory(Intent.CATEGORY_APP_EMAIL);
623        PackageParser.Package emailPackage = getDefaultSystemHandlerActivityPackage(
624                emailIntent, userId);
625        if (emailPackage != null
626                && doesPackageSupportRuntimePermissions(emailPackage)) {
627            grantRuntimePermissions(emailPackage, CONTACTS_PERMISSIONS, userId);
628            grantRuntimePermissions(emailPackage, CALENDAR_PERMISSIONS, userId);
629        }
630
631        // Browser
632        PackageParser.Package browserPackage = null;
633        String defaultBrowserPackage = mServiceInternal.getKnownPackageName(
634                PackageManagerInternal.PACKAGE_BROWSER, userId);
635        if (defaultBrowserPackage != null) {
636            browserPackage = getPackage(defaultBrowserPackage);
637        }
638        if (browserPackage == null) {
639            Intent browserIntent = new Intent(Intent.ACTION_MAIN);
640            browserIntent.addCategory(Intent.CATEGORY_APP_BROWSER);
641            browserPackage = getDefaultSystemHandlerActivityPackage(
642                    browserIntent, userId);
643        }
644        if (browserPackage != null
645                && doesPackageSupportRuntimePermissions(browserPackage)) {
646            grantRuntimePermissions(browserPackage, LOCATION_PERMISSIONS, userId);
647        }
648
649        // Voice interaction
650        if (voiceInteractPackageNames != null) {
651            for (String voiceInteractPackageName : voiceInteractPackageNames) {
652                PackageParser.Package voiceInteractPackage = getSystemPackage(
653                        voiceInteractPackageName);
654                if (voiceInteractPackage != null
655                        && doesPackageSupportRuntimePermissions(voiceInteractPackage)) {
656                    grantRuntimePermissions(voiceInteractPackage,
657                            CONTACTS_PERMISSIONS, userId);
658                    grantRuntimePermissions(voiceInteractPackage,
659                            CALENDAR_PERMISSIONS, userId);
660                    grantRuntimePermissions(voiceInteractPackage,
661                            MICROPHONE_PERMISSIONS, userId);
662                    grantRuntimePermissions(voiceInteractPackage,
663                            PHONE_PERMISSIONS, userId);
664                    grantRuntimePermissions(voiceInteractPackage,
665                            SMS_PERMISSIONS, userId);
666                    grantRuntimePermissions(voiceInteractPackage,
667                            LOCATION_PERMISSIONS, userId);
668                }
669            }
670        }
671
672        if (ActivityManager.isLowRamDeviceStatic()) {
673            // Allow voice search on low-ram devices
674            Intent globalSearchIntent = new Intent("android.search.action.GLOBAL_SEARCH");
675            PackageParser.Package globalSearchPickerPackage =
676                getDefaultSystemHandlerActivityPackage(globalSearchIntent, userId);
677
678            if (globalSearchPickerPackage != null
679                    && doesPackageSupportRuntimePermissions(globalSearchPickerPackage)) {
680                grantRuntimePermissions(globalSearchPickerPackage,
681                    MICROPHONE_PERMISSIONS, false, userId);
682                grantRuntimePermissions(globalSearchPickerPackage,
683                    LOCATION_PERMISSIONS, false, userId);
684            }
685        }
686
687        // Voice recognition
688        Intent voiceRecoIntent = new Intent("android.speech.RecognitionService");
689        voiceRecoIntent.addCategory(Intent.CATEGORY_DEFAULT);
690        PackageParser.Package voiceRecoPackage = getDefaultSystemHandlerServicePackage(
691                voiceRecoIntent, userId);
692        if (voiceRecoPackage != null
693                && doesPackageSupportRuntimePermissions(voiceRecoPackage)) {
694            grantRuntimePermissions(voiceRecoPackage, MICROPHONE_PERMISSIONS, userId);
695        }
696
697        // Location
698        if (locationPackageNames != null) {
699            for (String packageName : locationPackageNames) {
700                PackageParser.Package locationPackage = getSystemPackage(packageName);
701                if (locationPackage != null
702                        && doesPackageSupportRuntimePermissions(locationPackage)) {
703                    grantRuntimePermissions(locationPackage, CONTACTS_PERMISSIONS, userId);
704                    grantRuntimePermissions(locationPackage, CALENDAR_PERMISSIONS, userId);
705                    grantRuntimePermissions(locationPackage, MICROPHONE_PERMISSIONS, userId);
706                    grantRuntimePermissions(locationPackage, PHONE_PERMISSIONS, userId);
707                    grantRuntimePermissions(locationPackage, SMS_PERMISSIONS, userId);
708                    grantRuntimePermissions(locationPackage, LOCATION_PERMISSIONS,
709                            true, userId);
710                    grantRuntimePermissions(locationPackage, CAMERA_PERMISSIONS, userId);
711                    grantRuntimePermissions(locationPackage, SENSORS_PERMISSIONS, userId);
712                    grantRuntimePermissions(locationPackage, STORAGE_PERMISSIONS, userId);
713                }
714            }
715        }
716
717        // Music
718        Intent musicIntent = new Intent(Intent.ACTION_VIEW);
719        musicIntent.addCategory(Intent.CATEGORY_DEFAULT);
720        musicIntent.setDataAndType(Uri.fromFile(new File("foo.mp3")),
721                AUDIO_MIME_TYPE);
722        PackageParser.Package musicPackage = getDefaultSystemHandlerActivityPackage(
723                musicIntent, userId);
724        if (musicPackage != null
725                && doesPackageSupportRuntimePermissions(musicPackage)) {
726            grantRuntimePermissions(musicPackage, STORAGE_PERMISSIONS, userId);
727        }
728
729        // Home
730        Intent homeIntent = new Intent(Intent.ACTION_MAIN);
731        homeIntent.addCategory(Intent.CATEGORY_HOME);
732        homeIntent.addCategory(Intent.CATEGORY_LAUNCHER_APP);
733        PackageParser.Package homePackage = getDefaultSystemHandlerActivityPackage(
734                homeIntent, userId);
735        if (homePackage != null
736                && doesPackageSupportRuntimePermissions(homePackage)) {
737            grantRuntimePermissions(homePackage, LOCATION_PERMISSIONS, false, userId);
738        }
739
740        // Watches
741        if (mContext.getPackageManager().hasSystemFeature(PackageManager.FEATURE_WATCH, 0)) {
742            // Home application on watches
743            Intent wearHomeIntent = new Intent(Intent.ACTION_MAIN);
744            wearHomeIntent.addCategory(Intent.CATEGORY_HOME_MAIN);
745
746            PackageParser.Package wearHomePackage = getDefaultSystemHandlerActivityPackage(
747                    wearHomeIntent, userId);
748
749            if (wearHomePackage != null
750                    && doesPackageSupportRuntimePermissions(wearHomePackage)) {
751                grantRuntimePermissions(wearHomePackage, CONTACTS_PERMISSIONS, false,
752                        userId);
753                grantRuntimePermissions(wearHomePackage, PHONE_PERMISSIONS, true, userId);
754                grantRuntimePermissions(wearHomePackage, MICROPHONE_PERMISSIONS, false,
755                        userId);
756                grantRuntimePermissions(wearHomePackage, LOCATION_PERMISSIONS, false,
757                        userId);
758            }
759
760            // Fitness tracking on watches
761            Intent trackIntent = new Intent(ACTION_TRACK);
762            PackageParser.Package trackPackage = getDefaultSystemHandlerActivityPackage(
763                    trackIntent, userId);
764            if (trackPackage != null
765                    && doesPackageSupportRuntimePermissions(trackPackage)) {
766                grantRuntimePermissions(trackPackage, SENSORS_PERMISSIONS, false, userId);
767                grantRuntimePermissions(trackPackage, LOCATION_PERMISSIONS, false, userId);
768            }
769        }
770
771        // Print Spooler
772        PackageParser.Package printSpoolerPackage = getSystemPackage(
773                PrintManager.PRINT_SPOOLER_PACKAGE_NAME);
774        if (printSpoolerPackage != null
775                && doesPackageSupportRuntimePermissions(printSpoolerPackage)) {
776            grantRuntimePermissions(printSpoolerPackage, LOCATION_PERMISSIONS, true, userId);
777        }
778
779        // EmergencyInfo
780        Intent emergencyInfoIntent = new Intent(TelephonyManager.ACTION_EMERGENCY_ASSISTANCE);
781        PackageParser.Package emergencyInfoPckg = getDefaultSystemHandlerActivityPackage(
782                emergencyInfoIntent, userId);
783        if (emergencyInfoPckg != null
784                && doesPackageSupportRuntimePermissions(emergencyInfoPckg)) {
785            grantRuntimePermissions(emergencyInfoPckg, CONTACTS_PERMISSIONS, true, userId);
786            grantRuntimePermissions(emergencyInfoPckg, PHONE_PERMISSIONS, true, userId);
787        }
788
789        // NFC Tag viewer
790        Intent nfcTagIntent = new Intent(Intent.ACTION_VIEW);
791        nfcTagIntent.setType("vnd.android.cursor.item/ndef_msg");
792        PackageParser.Package nfcTagPkg = getDefaultSystemHandlerActivityPackage(
793                nfcTagIntent, userId);
794        if (nfcTagPkg != null
795                && doesPackageSupportRuntimePermissions(nfcTagPkg)) {
796            grantRuntimePermissions(nfcTagPkg, CONTACTS_PERMISSIONS, false, userId);
797            grantRuntimePermissions(nfcTagPkg, PHONE_PERMISSIONS, false, userId);
798        }
799
800        // Storage Manager
801        Intent storageManagerIntent = new Intent(StorageManager.ACTION_MANAGE_STORAGE);
802        PackageParser.Package storageManagerPckg = getDefaultSystemHandlerActivityPackage(
803                storageManagerIntent, userId);
804        if (storageManagerPckg != null
805                && doesPackageSupportRuntimePermissions(storageManagerPckg)) {
806            grantRuntimePermissions(storageManagerPckg, STORAGE_PERMISSIONS, true, userId);
807        }
808
809        // Companion devices
810        PackageParser.Package companionDeviceDiscoveryPackage = getSystemPackage(
811                CompanionDeviceManager.COMPANION_DEVICE_DISCOVERY_PACKAGE_NAME);
812        if (companionDeviceDiscoveryPackage != null
813                && doesPackageSupportRuntimePermissions(companionDeviceDiscoveryPackage)) {
814            grantRuntimePermissions(companionDeviceDiscoveryPackage,
815                    LOCATION_PERMISSIONS, true, userId);
816        }
817
818        // Ringtone Picker
819        Intent ringtonePickerIntent = new Intent(RingtoneManager.ACTION_RINGTONE_PICKER);
820        PackageParser.Package ringtonePickerPackage =
821                getDefaultSystemHandlerActivityPackage(ringtonePickerIntent, userId);
822        if (ringtonePickerPackage != null
823                && doesPackageSupportRuntimePermissions(ringtonePickerPackage)) {
824            grantRuntimePermissions(ringtonePickerPackage,
825                    STORAGE_PERMISSIONS, true, userId);
826        }
827
828        // TextClassifier Service
829        String textClassifierPackageName =
830                mContext.getPackageManager().getSystemTextClassifierPackageName();
831        if (!TextUtils.isEmpty(textClassifierPackageName)) {
832            PackageParser.Package textClassifierPackage =
833                    getSystemPackage(textClassifierPackageName);
834            if (textClassifierPackage != null
835                    && doesPackageSupportRuntimePermissions(textClassifierPackage)) {
836                grantRuntimePermissions(textClassifierPackage, PHONE_PERMISSIONS, true, userId);
837                grantRuntimePermissions(textClassifierPackage, SMS_PERMISSIONS, true, userId);
838                grantRuntimePermissions(textClassifierPackage, CALENDAR_PERMISSIONS, true, userId);
839                grantRuntimePermissions(textClassifierPackage, LOCATION_PERMISSIONS, true, userId);
840                grantRuntimePermissions(textClassifierPackage, CONTACTS_PERMISSIONS, true, userId);
841            }
842        }
843
844        if (mPermissionGrantedCallback != null) {
845            mPermissionGrantedCallback.onDefaultRuntimePermissionsGranted(userId);
846        }
847    }
848
849    private void grantDefaultPermissionsToDefaultSystemDialerApp(
850            PackageParser.Package dialerPackage, int userId) {
851        if (doesPackageSupportRuntimePermissions(dialerPackage)) {
852            boolean isPhonePermFixed =
853                    mContext.getPackageManager().hasSystemFeature(PackageManager.FEATURE_WATCH, 0);
854            grantRuntimePermissions(
855                    dialerPackage, PHONE_PERMISSIONS, isPhonePermFixed, userId);
856            grantRuntimePermissions(dialerPackage, CONTACTS_PERMISSIONS, userId);
857            grantRuntimePermissions(dialerPackage, SMS_PERMISSIONS, userId);
858            grantRuntimePermissions(dialerPackage, MICROPHONE_PERMISSIONS, userId);
859            grantRuntimePermissions(dialerPackage, CAMERA_PERMISSIONS, userId);
860        }
861    }
862
863    private void grantDefaultPermissionsToDefaultSystemSmsApp(
864            PackageParser.Package smsPackage, int userId) {
865        if (doesPackageSupportRuntimePermissions(smsPackage)) {
866            grantRuntimePermissions(smsPackage, PHONE_PERMISSIONS, userId);
867            grantRuntimePermissions(smsPackage, CONTACTS_PERMISSIONS, userId);
868            grantRuntimePermissions(smsPackage, SMS_PERMISSIONS, userId);
869            grantRuntimePermissions(smsPackage, STORAGE_PERMISSIONS, userId);
870            grantRuntimePermissions(smsPackage, MICROPHONE_PERMISSIONS, userId);
871            grantRuntimePermissions(smsPackage, CAMERA_PERMISSIONS, userId);
872        }
873    }
874
875    private void grantDefaultPermissionsToDefaultSystemUseOpenWifiApp(
876            PackageParser.Package useOpenWifiPackage, int userId) {
877        if (doesPackageSupportRuntimePermissions(useOpenWifiPackage)) {
878            grantRuntimePermissions(useOpenWifiPackage, COARSE_LOCATION_PERMISSIONS, userId);
879        }
880    }
881
882    public void grantDefaultPermissionsToDefaultSmsApp(String packageName, int userId) {
883        Log.i(TAG, "Granting permissions to default sms app for user:" + userId);
884        if (packageName == null) {
885            return;
886        }
887        PackageParser.Package smsPackage = getPackage(packageName);
888        if (smsPackage != null && doesPackageSupportRuntimePermissions(smsPackage)) {
889            grantRuntimePermissions(smsPackage, PHONE_PERMISSIONS, false, true, userId);
890            grantRuntimePermissions(smsPackage, CONTACTS_PERMISSIONS, false, true, userId);
891            grantRuntimePermissions(smsPackage, SMS_PERMISSIONS, false, true, userId);
892            grantRuntimePermissions(smsPackage, STORAGE_PERMISSIONS, false, true, userId);
893            grantRuntimePermissions(smsPackage, MICROPHONE_PERMISSIONS, false, true, userId);
894            grantRuntimePermissions(smsPackage, CAMERA_PERMISSIONS, false, true, userId);
895        }
896    }
897
898    public void grantDefaultPermissionsToDefaultDialerApp(String packageName, int userId) {
899        Log.i(TAG, "Granting permissions to default dialer app for user:" + userId);
900        if (packageName == null) {
901            return;
902        }
903        PackageParser.Package dialerPackage = getPackage(packageName);
904        if (dialerPackage != null
905                && doesPackageSupportRuntimePermissions(dialerPackage)) {
906            grantRuntimePermissions(dialerPackage, PHONE_PERMISSIONS, false, true, userId);
907            grantRuntimePermissions(dialerPackage, CONTACTS_PERMISSIONS, false, true, userId);
908            grantRuntimePermissions(dialerPackage, SMS_PERMISSIONS, false, true, userId);
909            grantRuntimePermissions(dialerPackage, MICROPHONE_PERMISSIONS, false, true, userId);
910            grantRuntimePermissions(dialerPackage, CAMERA_PERMISSIONS, false, true, userId);
911        }
912    }
913
914    public void grantDefaultPermissionsToDefaultUseOpenWifiApp(String packageName, int userId) {
915        Log.i(TAG, "Granting permissions to default Use Open WiFi app for user:" + userId);
916        if (packageName == null) {
917            return;
918        }
919        PackageParser.Package useOpenWifiPackage = getPackage(packageName);
920        if (useOpenWifiPackage != null
921                && doesPackageSupportRuntimePermissions(useOpenWifiPackage)) {
922            grantRuntimePermissions(
923                    useOpenWifiPackage, COARSE_LOCATION_PERMISSIONS, false, true, userId);
924        }
925    }
926
927    private void grantDefaultPermissionsToDefaultSimCallManager(
928            PackageParser.Package simCallManagerPackage, int userId) {
929        Log.i(TAG, "Granting permissions to sim call manager for user:" + userId);
930        if (doesPackageSupportRuntimePermissions(simCallManagerPackage)) {
931            grantRuntimePermissions(simCallManagerPackage, PHONE_PERMISSIONS, userId);
932            grantRuntimePermissions(simCallManagerPackage, MICROPHONE_PERMISSIONS, userId);
933        }
934    }
935
936    public void grantDefaultPermissionsToDefaultSimCallManager(String packageName, int userId) {
937        if (packageName == null) {
938            return;
939        }
940        PackageParser.Package simCallManagerPackage = getPackage(packageName);
941        if (simCallManagerPackage != null) {
942            grantDefaultPermissionsToDefaultSimCallManager(simCallManagerPackage, userId);
943        }
944    }
945
946    public void grantDefaultPermissionsToEnabledCarrierApps(String[] packageNames, int userId) {
947        Log.i(TAG, "Granting permissions to enabled carrier apps for user:" + userId);
948        if (packageNames == null) {
949            return;
950        }
951        for (String packageName : packageNames) {
952            PackageParser.Package carrierPackage = getSystemPackage(packageName);
953            if (carrierPackage != null
954                    && doesPackageSupportRuntimePermissions(carrierPackage)) {
955                grantRuntimePermissions(carrierPackage, PHONE_PERMISSIONS, userId);
956                grantRuntimePermissions(carrierPackage, LOCATION_PERMISSIONS, userId);
957                grantRuntimePermissions(carrierPackage, SMS_PERMISSIONS, userId);
958            }
959        }
960    }
961
962    public void grantDefaultPermissionsToEnabledImsServices(String[] packageNames, int userId) {
963        Log.i(TAG, "Granting permissions to enabled ImsServices for user:" + userId);
964        if (packageNames == null) {
965            return;
966        }
967        for (String packageName : packageNames) {
968            PackageParser.Package imsServicePackage = getSystemPackage(packageName);
969            if (imsServicePackage != null
970                    && doesPackageSupportRuntimePermissions(imsServicePackage)) {
971                grantRuntimePermissions(imsServicePackage, PHONE_PERMISSIONS, userId);
972                grantRuntimePermissions(imsServicePackage, MICROPHONE_PERMISSIONS, userId);
973                grantRuntimePermissions(imsServicePackage, LOCATION_PERMISSIONS, userId);
974                grantRuntimePermissions(imsServicePackage, CAMERA_PERMISSIONS, userId);
975                grantRuntimePermissions(imsServicePackage, CONTACTS_PERMISSIONS, userId);
976            }
977        }
978    }
979
980    public void grantDefaultPermissionsToEnabledTelephonyDataServices(
981            String[] packageNames, int userId) {
982        Log.i(TAG, "Granting permissions to enabled data services for user:" + userId);
983        if (packageNames == null) {
984            return;
985        }
986        for (String packageName : packageNames) {
987            PackageParser.Package dataServicePackage = getSystemPackage(packageName);
988            if (dataServicePackage != null
989                    && doesPackageSupportRuntimePermissions(dataServicePackage)) {
990                // Grant these permissions as system-fixed, so that nobody can accidentally
991                // break cellular data.
992                grantRuntimePermissions(dataServicePackage, PHONE_PERMISSIONS, true, userId);
993                grantRuntimePermissions(dataServicePackage, LOCATION_PERMISSIONS, true, userId);
994            }
995        }
996    }
997
998    public void revokeDefaultPermissionsFromDisabledTelephonyDataServices(
999            String[] packageNames, int userId) {
1000        Log.i(TAG, "Revoking permissions from disabled data services for user:" + userId);
1001        if (packageNames == null) {
1002            return;
1003        }
1004        for (String packageName : packageNames) {
1005            PackageParser.Package dataServicePackage = getSystemPackage(packageName);
1006            if (dataServicePackage != null
1007                    && doesPackageSupportRuntimePermissions(dataServicePackage)) {
1008                revokeRuntimePermissions(dataServicePackage, PHONE_PERMISSIONS, true, userId);
1009                revokeRuntimePermissions(dataServicePackage, LOCATION_PERMISSIONS, true, userId);
1010            }
1011        }
1012    }
1013
1014    public void grantDefaultPermissionsToActiveLuiApp(String packageName, int userId) {
1015        Log.i(TAG, "Granting permissions to active LUI app for user:" + userId);
1016        if (packageName == null) {
1017            return;
1018        }
1019        PackageParser.Package luiAppPackage = getSystemPackage(packageName);
1020        if (luiAppPackage != null
1021                && doesPackageSupportRuntimePermissions(luiAppPackage)) {
1022            grantRuntimePermissions(luiAppPackage, CAMERA_PERMISSIONS, true, userId);
1023        }
1024    }
1025
1026    public void revokeDefaultPermissionsFromLuiApps(String[] packageNames, int userId) {
1027        Log.i(TAG, "Revoke permissions from LUI apps for user:" + userId);
1028        if (packageNames == null) {
1029            return;
1030        }
1031        for (String packageName : packageNames) {
1032            PackageParser.Package luiAppPackage = getSystemPackage(packageName);
1033            if (luiAppPackage != null
1034                    && doesPackageSupportRuntimePermissions(luiAppPackage)) {
1035                revokeRuntimePermissions(luiAppPackage, CAMERA_PERMISSIONS, true, userId);
1036            }
1037        }
1038    }
1039
1040    public void grantDefaultPermissionsToDefaultBrowser(String packageName, int userId) {
1041        Log.i(TAG, "Granting permissions to default browser for user:" + userId);
1042        if (packageName == null) {
1043            return;
1044        }
1045        PackageParser.Package browserPackage = getSystemPackage(packageName);
1046        if (browserPackage != null
1047                && doesPackageSupportRuntimePermissions(browserPackage)) {
1048            grantRuntimePermissions(browserPackage, LOCATION_PERMISSIONS, false, false, userId);
1049        }
1050    }
1051
1052    private PackageParser.Package getDefaultSystemHandlerActivityPackage(
1053            Intent intent, int userId) {
1054        ResolveInfo handler = mServiceInternal.resolveIntent(intent,
1055                intent.resolveType(mContext.getContentResolver()), DEFAULT_FLAGS, userId, false,
1056                Binder.getCallingUid());
1057        if (handler == null || handler.activityInfo == null) {
1058            return null;
1059        }
1060        if (mServiceInternal.isResolveActivityComponent(handler.activityInfo)) {
1061            return null;
1062        }
1063        return getSystemPackage(handler.activityInfo.packageName);
1064    }
1065
1066    private PackageParser.Package getDefaultSystemHandlerServicePackage(
1067            Intent intent, int userId) {
1068        List<ResolveInfo> handlers = mServiceInternal.queryIntentServices(
1069                intent, DEFAULT_FLAGS, Binder.getCallingUid(), userId);
1070        if (handlers == null) {
1071            return null;
1072        }
1073        final int handlerCount = handlers.size();
1074        for (int i = 0; i < handlerCount; i++) {
1075            ResolveInfo handler = handlers.get(i);
1076            PackageParser.Package handlerPackage = getSystemPackage(
1077                    handler.serviceInfo.packageName);
1078            if (handlerPackage != null) {
1079                return handlerPackage;
1080            }
1081        }
1082        return null;
1083    }
1084
1085    private List<PackageParser.Package> getHeadlessSyncAdapterPackages(
1086            String[] syncAdapterPackageNames, int userId) {
1087        List<PackageParser.Package> syncAdapterPackages = new ArrayList<>();
1088
1089        Intent homeIntent = new Intent(Intent.ACTION_MAIN);
1090        homeIntent.addCategory(Intent.CATEGORY_LAUNCHER);
1091
1092        for (String syncAdapterPackageName : syncAdapterPackageNames) {
1093            homeIntent.setPackage(syncAdapterPackageName);
1094
1095            ResolveInfo homeActivity = mServiceInternal.resolveIntent(homeIntent,
1096                    homeIntent.resolveType(mContext.getContentResolver()), DEFAULT_FLAGS,
1097                    userId, false, Binder.getCallingUid());
1098            if (homeActivity != null) {
1099                continue;
1100            }
1101
1102            PackageParser.Package syncAdapterPackage = getSystemPackage(syncAdapterPackageName);
1103            if (syncAdapterPackage != null) {
1104                syncAdapterPackages.add(syncAdapterPackage);
1105            }
1106        }
1107
1108        return syncAdapterPackages;
1109    }
1110
1111    private PackageParser.Package getDefaultProviderAuthorityPackage(
1112            String authority, int userId) {
1113        ProviderInfo provider =
1114                mServiceInternal.resolveContentProvider(authority, DEFAULT_FLAGS, userId);
1115        if (provider != null) {
1116            return getSystemPackage(provider.packageName);
1117        }
1118        return null;
1119    }
1120
1121    private PackageParser.Package getPackage(String packageName) {
1122        return mServiceInternal.getPackage(packageName);
1123    }
1124
1125    private PackageParser.Package getSystemPackage(String packageName) {
1126        PackageParser.Package pkg = getPackage(packageName);
1127        if (pkg != null && pkg.isSystem()) {
1128            return !isSysComponentOrPersistentPlatformSignedPrivApp(pkg) ? pkg : null;
1129        }
1130        return null;
1131    }
1132
1133    private void grantRuntimePermissions(PackageParser.Package pkg, Set<String> permissions,
1134            int userId) {
1135        grantRuntimePermissions(pkg, permissions, false, false, userId);
1136    }
1137
1138    private void grantRuntimePermissions(PackageParser.Package pkg, Set<String> permissions,
1139            boolean systemFixed, int userId) {
1140        grantRuntimePermissions(pkg, permissions, systemFixed, false, userId);
1141    }
1142
1143    private void revokeRuntimePermissions(PackageParser.Package pkg, Set<String> permissions,
1144            boolean systemFixed, int userId) {
1145        if (pkg.requestedPermissions.isEmpty()) {
1146            return;
1147        }
1148        Set<String> revokablePermissions = new ArraySet<>(pkg.requestedPermissions);
1149
1150        for (String permission : permissions) {
1151            // We can't revoke what wasn't requested.
1152            if (!revokablePermissions.contains(permission)) {
1153                continue;
1154            }
1155
1156            final int flags = mServiceInternal.getPermissionFlagsTEMP(
1157                    permission, pkg.packageName, userId);
1158
1159            // We didn't get this through the default grant policy. Move along.
1160            if ((flags & PackageManager.FLAG_PERMISSION_GRANTED_BY_DEFAULT) == 0) {
1161                continue;
1162            }
1163            // We aren't going to clobber device policy with a DefaultGrant.
1164            if ((flags & PackageManager.FLAG_PERMISSION_POLICY_FIXED) != 0) {
1165                continue;
1166            }
1167            // Do not revoke system fixed permissions unless caller set them that way;
1168            // there is no refcount for the number of sources of this, so there
1169            // should be at most one grantor doing SYSTEM_FIXED for any given package.
1170            if ((flags & PackageManager.FLAG_PERMISSION_SYSTEM_FIXED) != 0 && !systemFixed) {
1171                continue;
1172            }
1173            mServiceInternal.revokeRuntimePermission(pkg.packageName, permission, userId, false);
1174
1175            if (DEBUG) {
1176                Log.i(TAG, "revoked " + (systemFixed ? "fixed " : "not fixed ")
1177                        + permission + " to " + pkg.packageName);
1178            }
1179
1180            // Remove the GRANTED_BY_DEFAULT flag without touching the others.
1181            // Note that we do not revoke FLAG_PERMISSION_SYSTEM_FIXED. That bit remains
1182            // sticky once set.
1183            mServiceInternal.updatePermissionFlagsTEMP(permission, pkg.packageName,
1184                    PackageManager.FLAG_PERMISSION_GRANTED_BY_DEFAULT, 0, userId);
1185        }
1186    }
1187
1188    private void grantRuntimePermissions(PackageParser.Package pkg, Set<String> permissions,
1189            boolean systemFixed, boolean ignoreSystemPackage, int userId) {
1190        if (pkg.requestedPermissions.isEmpty()) {
1191            return;
1192        }
1193
1194        List<String> requestedPermissions = pkg.requestedPermissions;
1195        Set<String> grantablePermissions = null;
1196
1197        // In some cases, like for the Phone or SMS app, we grant permissions regardless
1198        // of if the version on the system image declares the permission as used since
1199        // selecting the app as the default for that function the user makes a deliberate
1200        // choice to grant this app the permissions needed to function. For all other
1201        // apps, (default grants on first boot and user creation) we don't grant default
1202        // permissions if the version on the system image does not declare them.
1203        if (!ignoreSystemPackage && pkg.isUpdatedSystemApp()) {
1204            final PackageParser.Package disabledPkg =
1205                    mServiceInternal.getDisabledPackage(pkg.packageName);
1206            if (disabledPkg != null) {
1207                if (disabledPkg.requestedPermissions.isEmpty()) {
1208                    return;
1209                }
1210                if (!requestedPermissions.equals(disabledPkg.requestedPermissions)) {
1211                    grantablePermissions = new ArraySet<>(requestedPermissions);
1212                    requestedPermissions = disabledPkg.requestedPermissions;
1213                }
1214            }
1215        }
1216
1217        final int grantablePermissionCount = requestedPermissions.size();
1218        for (int i = 0; i < grantablePermissionCount; i++) {
1219            String permission = requestedPermissions.get(i);
1220
1221            // If there is a disabled system app it may request a permission the updated
1222            // version ot the data partition doesn't, In this case skip the permission.
1223            if (grantablePermissions != null && !grantablePermissions.contains(permission)) {
1224                continue;
1225            }
1226
1227            if (permissions.contains(permission)) {
1228                final int flags = mServiceInternal.getPermissionFlagsTEMP(
1229                        permission, pkg.packageName, userId);
1230
1231                // If any flags are set to the permission, then it is either set in
1232                // its current state by the system or device/profile owner or the user.
1233                // In all these cases we do not want to clobber the current state.
1234                // Unless the caller wants to override user choices. The override is
1235                // to make sure we can grant the needed permission to the default
1236                // sms and phone apps after the user chooses this in the UI.
1237                if (flags == 0 || ignoreSystemPackage) {
1238                    // Never clobber policy fixed permissions.
1239                    // We must allow the grant of a system-fixed permission because
1240                    // system-fixed is sticky, but the permission itself may be revoked.
1241                    if ((flags & PackageManager.FLAG_PERMISSION_POLICY_FIXED) != 0) {
1242                        continue;
1243                    }
1244
1245                    mServiceInternal.grantRuntimePermission(
1246                            pkg.packageName, permission, userId, false);
1247                    if (DEBUG) {
1248                        Log.i(TAG, "Granted " + (systemFixed ? "fixed " : "not fixed ")
1249                                + permission + " to default handler " + pkg.packageName);
1250                    }
1251
1252                    int newFlags = PackageManager.FLAG_PERMISSION_GRANTED_BY_DEFAULT;
1253                    if (systemFixed) {
1254                        newFlags |= PackageManager.FLAG_PERMISSION_SYSTEM_FIXED;
1255                    }
1256
1257                    mServiceInternal.updatePermissionFlagsTEMP(permission, pkg.packageName,
1258                            newFlags, newFlags, userId);
1259                }
1260
1261                // If a component gets a permission for being the default handler A
1262                // and also default handler B, we grant the weaker grant form.
1263                if ((flags & PackageManager.FLAG_PERMISSION_GRANTED_BY_DEFAULT) != 0
1264                        && (flags & PackageManager.FLAG_PERMISSION_SYSTEM_FIXED) != 0
1265                        && !systemFixed) {
1266                    if (DEBUG) {
1267                        Log.i(TAG, "Granted not fixed " + permission + " to default handler "
1268                                + pkg.packageName);
1269                    }
1270                    mServiceInternal.updatePermissionFlagsTEMP(permission, pkg.packageName,
1271                            PackageManager.FLAG_PERMISSION_SYSTEM_FIXED, 0, userId);
1272                }
1273            }
1274        }
1275    }
1276
1277    private boolean isSysComponentOrPersistentPlatformSignedPrivApp(PackageParser.Package pkg) {
1278        if (UserHandle.getAppId(pkg.applicationInfo.uid) < FIRST_APPLICATION_UID) {
1279            return true;
1280        }
1281        if (!pkg.isPrivileged()) {
1282            return false;
1283        }
1284        final PackageParser.Package disabledPkg =
1285                mServiceInternal.getDisabledPackage(pkg.packageName);
1286        if (disabledPkg != null) {
1287            if ((disabledPkg.applicationInfo.flags & ApplicationInfo.FLAG_PERSISTENT) == 0) {
1288                return false;
1289            }
1290        } else if ((pkg.applicationInfo.flags & ApplicationInfo.FLAG_PERSISTENT) == 0) {
1291            return false;
1292        }
1293        final String systemPackageName = mServiceInternal.getKnownPackageName(
1294                PackageManagerInternal.PACKAGE_SYSTEM, UserHandle.USER_SYSTEM);
1295        final PackageParser.Package systemPackage = getPackage(systemPackageName);
1296        return pkg.mSigningDetails.hasAncestorOrSelf(systemPackage.mSigningDetails)
1297                || systemPackage.mSigningDetails.checkCapability(pkg.mSigningDetails,
1298                        PackageParser.SigningDetails.CertCapabilities.PERMISSION);
1299    }
1300
1301    private void grantDefaultPermissionExceptions(int userId) {
1302        mHandler.removeMessages(MSG_READ_DEFAULT_PERMISSION_EXCEPTIONS);
1303
1304        synchronized (mLock) {
1305            // mGrantExceptions is null only before the first read and then
1306            // it serves as a cache of the default grants that should be
1307            // performed for every user. If there is an entry then the app
1308            // is on the system image and supports runtime permissions.
1309            if (mGrantExceptions == null) {
1310                mGrantExceptions = readDefaultPermissionExceptionsLocked();
1311            }
1312        }
1313
1314        Set<String> permissions = null;
1315        final int exceptionCount = mGrantExceptions.size();
1316        for (int i = 0; i < exceptionCount; i++) {
1317            String packageName = mGrantExceptions.keyAt(i);
1318            PackageParser.Package pkg = getSystemPackage(packageName);
1319            List<DefaultPermissionGrant> permissionGrants = mGrantExceptions.valueAt(i);
1320            final int permissionGrantCount = permissionGrants.size();
1321            for (int j = 0; j < permissionGrantCount; j++) {
1322                DefaultPermissionGrant permissionGrant = permissionGrants.get(j);
1323                if (permissions == null) {
1324                    permissions = new ArraySet<>();
1325                } else {
1326                    permissions.clear();
1327                }
1328                permissions.add(permissionGrant.name);
1329                grantRuntimePermissions(pkg, permissions,
1330                        permissionGrant.fixed, userId);
1331            }
1332        }
1333    }
1334
1335    private File[] getDefaultPermissionFiles() {
1336        ArrayList<File> ret = new ArrayList<File>();
1337        File dir = new File(Environment.getRootDirectory(), "etc/default-permissions");
1338        if (dir.isDirectory() && dir.canRead()) {
1339            Collections.addAll(ret, dir.listFiles());
1340        }
1341        dir = new File(Environment.getVendorDirectory(), "etc/default-permissions");
1342        if (dir.isDirectory() && dir.canRead()) {
1343            Collections.addAll(ret, dir.listFiles());
1344        }
1345        dir = new File(Environment.getOdmDirectory(), "etc/default-permissions");
1346        if (dir.isDirectory() && dir.canRead()) {
1347            Collections.addAll(ret, dir.listFiles());
1348        }
1349        dir = new File(Environment.getProductDirectory(), "etc/default-permissions");
1350        if (dir.isDirectory() && dir.canRead()) {
1351            Collections.addAll(ret, dir.listFiles());
1352        }
1353        // For IoT devices, we check the oem partition for default permissions for each app.
1354        if (mContext.getPackageManager().hasSystemFeature(PackageManager.FEATURE_EMBEDDED, 0)) {
1355            dir = new File(Environment.getOemDirectory(), "etc/default-permissions");
1356            if (dir.isDirectory() && dir.canRead()) {
1357                Collections.addAll(ret, dir.listFiles());
1358            }
1359        }
1360        return ret.isEmpty() ? null : ret.toArray(new File[0]);
1361    }
1362
1363    private @NonNull ArrayMap<String, List<DefaultPermissionGrant>>
1364            readDefaultPermissionExceptionsLocked() {
1365        File[] files = getDefaultPermissionFiles();
1366        if (files == null) {
1367            return new ArrayMap<>(0);
1368        }
1369
1370        ArrayMap<String, List<DefaultPermissionGrant>> grantExceptions = new ArrayMap<>();
1371
1372        // Iterate over the files in the directory and scan .xml files
1373        for (File file : files) {
1374            if (!file.getPath().endsWith(".xml")) {
1375                Slog.i(TAG, "Non-xml file " + file
1376                        + " in " + file.getParent() + " directory, ignoring");
1377                continue;
1378            }
1379            if (!file.canRead()) {
1380                Slog.w(TAG, "Default permissions file " + file + " cannot be read");
1381                continue;
1382            }
1383            try (
1384                InputStream str = new BufferedInputStream(new FileInputStream(file))
1385            ) {
1386                XmlPullParser parser = Xml.newPullParser();
1387                parser.setInput(str, null);
1388                parse(parser, grantExceptions);
1389            } catch (XmlPullParserException | IOException e) {
1390                Slog.w(TAG, "Error reading default permissions file " + file, e);
1391            }
1392        }
1393
1394        return grantExceptions;
1395    }
1396
1397    private void parse(XmlPullParser parser, Map<String, List<DefaultPermissionGrant>>
1398            outGrantExceptions) throws IOException, XmlPullParserException {
1399        final int outerDepth = parser.getDepth();
1400        int type;
1401        while ((type = parser.next()) != XmlPullParser.END_DOCUMENT
1402                && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) {
1403            if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) {
1404                continue;
1405            }
1406            if (TAG_EXCEPTIONS.equals(parser.getName())) {
1407                parseExceptions(parser, outGrantExceptions);
1408            } else {
1409                Log.e(TAG, "Unknown tag " + parser.getName());
1410            }
1411        }
1412    }
1413
1414    private void parseExceptions(XmlPullParser parser, Map<String, List<DefaultPermissionGrant>>
1415            outGrantExceptions) throws IOException, XmlPullParserException {
1416        final int outerDepth = parser.getDepth();
1417        int type;
1418        while ((type = parser.next()) != XmlPullParser.END_DOCUMENT
1419                && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) {
1420            if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) {
1421                continue;
1422            }
1423            if (TAG_EXCEPTION.equals(parser.getName())) {
1424                String packageName = parser.getAttributeValue(null, ATTR_PACKAGE);
1425
1426                List<DefaultPermissionGrant> packageExceptions =
1427                        outGrantExceptions.get(packageName);
1428                if (packageExceptions == null) {
1429                    // The package must be on the system image
1430                    PackageParser.Package pkg = getSystemPackage(packageName);
1431                    if (pkg == null) {
1432                        Log.w(TAG, "Unknown package:" + packageName);
1433                        XmlUtils.skipCurrentTag(parser);
1434                        continue;
1435                    }
1436
1437                    // The package must support runtime permissions
1438                    if (!doesPackageSupportRuntimePermissions(pkg)) {
1439                        Log.w(TAG, "Skipping non supporting runtime permissions package:"
1440                                + packageName);
1441                        XmlUtils.skipCurrentTag(parser);
1442                        continue;
1443                    }
1444                    packageExceptions = new ArrayList<>();
1445                    outGrantExceptions.put(packageName, packageExceptions);
1446                }
1447
1448                parsePermission(parser, packageExceptions);
1449            } else {
1450                Log.e(TAG, "Unknown tag " + parser.getName() + "under <exceptions>");
1451            }
1452        }
1453    }
1454
1455    private void parsePermission(XmlPullParser parser, List<DefaultPermissionGrant>
1456            outPackageExceptions) throws IOException, XmlPullParserException {
1457        final int outerDepth = parser.getDepth();
1458        int type;
1459        while ((type = parser.next()) != XmlPullParser.END_DOCUMENT
1460                && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) {
1461            if (type == XmlPullParser.END_TAG || type == XmlPullParser.TEXT) {
1462                continue;
1463            }
1464
1465            if (TAG_PERMISSION.contains(parser.getName())) {
1466                String name = parser.getAttributeValue(null, ATTR_NAME);
1467                if (name == null) {
1468                    Log.w(TAG, "Mandatory name attribute missing for permission tag");
1469                    XmlUtils.skipCurrentTag(parser);
1470                    continue;
1471                }
1472
1473                final boolean fixed = XmlUtils.readBooleanAttribute(parser, ATTR_FIXED);
1474
1475                DefaultPermissionGrant exception = new DefaultPermissionGrant(name, fixed);
1476                outPackageExceptions.add(exception);
1477            } else {
1478                Log.e(TAG, "Unknown tag " + parser.getName() + "under <exception>");
1479            }
1480        }
1481    }
1482
1483    private static boolean doesPackageSupportRuntimePermissions(PackageParser.Package pkg) {
1484        return pkg.applicationInfo.targetSdkVersion > Build.VERSION_CODES.LOLLIPOP_MR1;
1485    }
1486
1487    private static final class DefaultPermissionGrant {
1488        final String name;
1489        final boolean fixed;
1490
1491        public DefaultPermissionGrant(String name, boolean fixed) {
1492            this.name = name;
1493            this.fixed = fixed;
1494        }
1495    }
1496}
1497