Home | History | Annotate | Download | only in pm

Lines Matching defs:permissions

13  * See the License for the specific language governing permissions and
436 /** REMOVE. According to Svet, this was only used to reset permissions during development. */
572 "permissions revoked";
628 * Permissions required in order to receive instant application lifecycle broadcasts.
729 * Whether or not system app permissions should be promoted from install to runtime.
1974 // permissions if requested before broadcasting the install. Also
1976 // review flag which is used to emulate runtime permissions for
1995 // app that had no children, we grant requested runtime permissions to the new
2574 // when upgrading from pre-M, promote system app permissions from install to runtime
2585 // want to automatically grant runtime permissions for new system apps
3079 // cases get permissions that the user didn't initially explicitly
3085 + mSdkVersion + "; regranting permissions for internal storage");
3173 // clear only after permissions and other defaults have been updated
3936 // Compute granted permissions only if package has requested permissions
3937 final Set<String> permissions = ArrayUtils.isEmpty(p.requestedPermissions)
3941 ps.firstInstallTime, ps.lastUpdateTime, permissions, state, userId);
5467 * Update the permission flags for all packages and runtime permissions of a user in order
5706 * permissions, since the app may immediately restart after this call.
7934 String[] permissions, boolean[] tmp, int flags, int userId) {
7937 for (int i=0; i<permissions.length; i++) {
7938 final String permission = permissions[i];
7955 if (numMatch == permissions.length) {
7956 pi.requestedPermissions = permissions;
7960 for (int i=0; i<permissions.length; i++) {
7962 pi.requestedPermissions[numMatch] = permissions[i];
7974 String[] permissions, int flags, int userId) {
7976 flags = updateFlagsForPackage(flags, userId, permissions);
7979 "get packages holding permissions");
7985 boolean[] tmpBools = new boolean[permissions.length];
7988 addPackageHoldingPermissions(list, ps, permissions, tmpBools, flags,
7995 addPackageHoldingPermissions(list, ps, permissions, tmpBools, flags,
10082 // to whitelist their privileged permissions just like other
10326 // This package wants to adopt ownership of permissions from
10333 Slog.i(TAG, "Adopting permissions from " + origName + " to "
11042 // Static shared libs cannot declare permissions
11043 if (!pkg.permissions.isEmpty()) {
11045 "Static shared libs cannot declare permissions");
11586 // Don't allow ephemeral applications to define new permissions groups.
11594 // Don't allow ephemeral applications to define new permissions.
11596 Slog.w(TAG, "Permissions from package " + pkg.packageName
11597 + " ignored: instant apps cannot define new permissions.");
11649 // revokeRuntimePermissionsIfGroupChanged. Only for those permissions might get
16658 // Update permissions for restored package
16802 // Update permissions for restored package
16927 // NOTE: This changes slightly to include UPDATE_PERMISSIONS_ALL regardless of the size of pkg.permissions
17225 // Prevent apps opting out from runtime permissions
17233 + " doesn't support runtime permissions but the old"
17273 // bail early here before tripping over redefined permissions.
17310 int N = pkg.permissions.size();
17312 final PackageParser.Permission perm = pkg.permissions.get(i);
17316 // Don't allow anyone but the system to define ephemeral permissions.
17342 // older certificate with which the current is ok with sharing permissions
17374 pkg.permissions.remove(i);
18392 // Retrieve object to delete permissions for shared user later on
18447 // Remove permissions associated with package. Since runtime
18448 // permissions are per user we have to kill the removed package
18450 // package if revoking the permissions requested only by the removed
18695 // Propagate the permissions state as we do not want to drop on the floor
18696 // runtime permissions. The update permissions method below will take
18697 // care of removing obsolete permissions and grant install permissions.
19290 * Reverts user permission state changes (permissions and flags) in
19309 * Reverts user permission state changes (permissions and flags).
19396 // If permission review is enabled the permissions for a legacy apps
19417 // Synchronously write as we are taking permissions away.
19422 // Synchronously write as we are taking permissions away.
21145 // If we upgraded grant all default permissions before kicking off.
21151 // If we did not grant default permissions, we preload from this the
21158 // permissions, ensure permissions are updated. Beware of dragons if you
21296 pw.println(" perm[issions]: dump permissions");
21313 pw.println(" service-permissions: dump permissions required by services");
21396 } else if ("perm".equals(cmd) || "permissions".equals(cmd)) {
21449 } else if ("service-permissions".equals(cmd)) {
21834 pw.println("Service permissions:");
22192 + mSdkVersion + "; regranting permissions for " + volumeUuid);
23225 // dagerous permissions for such apps as always granted runtime
23226 // permissions to keep per user flag state whether review is needed.