Android Permission Management Principles (including 6.0)

Android Permission Management Principles (including 6.0)

Preface

Before MarshMallow, permissions were granted at the time of installation in the Android system. Although Google tried to introduce AppOpsManager into the source code in 4.3 to achieve the purpose of dynamic permission control, this function was hidden in the Release version due to its immaturity. After 6.0, in order to simplify the installation process and facilitate user control of permissions, Google officially introduced runtime-permission, allowing users to dynamically control permissions at runtime. For development, it means setting targetSdkVersion to 23, and dynamically applying for permissions at the corresponding time. When an App adapted to Android 6.0 runs on an Android 6.0+ phone, it will call the 6.0-related APIs. However, on lower-version phones, it is still processed according to the permissions at installation time.

AppOpsManager dynamic permission management: official preview of permission management

AppOpsManager is a dynamic permission management method introduced by Google in Android 4.3. However, Google thinks it is immature, so it always blocks this function in each release. This function is similar to the dynamic permission management in China. Here we use the implementation in CyanogenMod12 to explain it (the source code of the domestic ROM is not available, but from the performance point of view, the implementation should be similar). The essence of the dynamic management implemented by AppOpsManager is: put the authentication inside each service. For example, if the App wants to apply for location permission, the location service LocationManagerService will query the AppOpsService whether the App location permission is granted. If authorization is required, a system dialog box will pop up for the user to operate, and the result will be persisted in the file according to the user's operation. If the corresponding permission is set in the Setting, the corresponding permission operation persistence file /data/system/appops.xml will also be updated. The next time you apply for the service again, the service will authenticate the permission again.

For example - Location Manager Service: CM12 source code

When an app uses location services, it usually obtains location through requestLocationUpdates of LocationManager, which is actually requesting LocationManagerService for location through Binder.

/android/location/LocationManager.java

  1. private void requestLocationUpdates(LocationRequest request, LocationListener listener,
  2. Looper looper, PendingIntent intent) {
  3. ...
  4. try {
  5. mService.requestLocationUpdates(request, transport, intent, packageName);
  6. ...   

/com/android/server/LocationManagerService.java

  1. @Override
  2. public void requestLocationUpdates(LocationRequest request, ILocationListener listener,
  3. PendingIntent intent, String packageName) {
  4. if (request == null ) request = DEFAULT_LOCATION_REQUEST;
  5. checkPackageName(packageName);
  6. <! --Key function 1, query the Manifest file to see if permission has been declared -->  
  7. int allowedResolutionLevel = getCallerAllowedResolutionLevel();
  8. checkResolutionLevelIsSufficientForProviderUse(allowedResolutionLevel,
  9. request.getProvider());
  10. . . .
  11. <! --Get the pid and uid of the calling app-->  
  12. final int pid = Binder.getCallingPid();
  13. final int uid = Binder.getCallingUid();
  14. // providers may use public location API's, need to clear identity
  15. long identity = Binder.clearCallingIdentity();
  16. try {
  17. <! --Key function 2 checks whether permissions are dynamically granted or denied-->  
  18. checkLocationAccess(uid, packageName, allowedResolutionLevel);
  19.   
  20. synchronized (mLock) {
  21. Receiver receiver = checkListenerOrIntentLocked(listener, intent, pid, uid,
  22. packageName, workSource, hideFromAppOps);
  23. if (receiver != null ) {
  24. requestLocationUpdatesLocked(sanitizedRequest, receiver, pid,
  25. uid, packageName);
  26. }
  27. }
  28. finally
  29. Binder.restoreCallingIdentity(identity);
  30. }
  31. }

getCallerAllowedResolutionLevel mainly calls getAllowedResolutionLevel to query whether the APP has been declared in the Manifest

  1. private int getCallerAllowedResolutionLevel() {
  2. return getAllowedResolutionLevel(Binder.getCallingPid(), Binder.getCallingUid());
  3. }
  4.  
  5. private int getAllowedResolutionLevel( int pid, int uid) {
  6. if (mContext.checkPermission(android.Manifest.permission.ACCESS_FINE_LOCATION,
  7. pid, uid) == PackageManager.PERMISSION_GRANTED) {
  8. return RESOLUTION_LEVEL_FINE;
  9. } else if (mContext.checkPermission(android.Manifest.permission.ACCESS_COARSE_LOCATION,
  10. pid, uid) == PackageManager.PERMISSION_GRANTED) {
  11. return RESOLUTION_LEVEL_COARSE;
  12. } else {
  13. return RESOLUTION_LEVEL_NONE;
  14. }
  15. }

checkLocationAccess is the entry point for dynamic authentication. In the checkLocationAccess function, mAppOps.checkOp is called for authentication. mAppOps is the AppOpsManager instance.

  1. boolean checkLocationAccess( int uid, String packageName, int allowedResolutionLevel) {
  2. int op = resolutionLevelToOp(allowedResolutionLevel);
  3. if (op >= 0) {
  4. int mode = mAppOps.checkOp(op, uid, packageName);
  5. if (mode != AppOpsManager.MODE_ALLOWED && mode != AppOpsManager.MODE_ASK ) {
  6. return   false ;
  7. }
  8. }
  9. return   true ;
  10. }

Then send an authentication request to the AppOpsService service through Binder

  1.   public   int noteOp( int op, int uid, String packageName) {
  2. try {
  3. int mode = mService.noteOperation(op, uid, packageName);
  4. if (mode == MODE_ERRORED) {
  5. throw new SecurityException(buildSecurityExceptionMsg(op, uid, packageName));
  6. }
  7. return mode;
  8. } catch (RemoteException e) {
  9. }
  10. return MODE_IGNORED;
  11. }

AppOpsService is responsible for the identification and update of dynamic permissions. Next, look at the noteOperation code

  1. @Override
  2. public   int noteOperation( int code, int uid, String packageName) {
  3. final Result userDialogResult;
  4. verifyIncomingUid(uid);
  5. verifyIncomingOp(code);
  6. synchronized (this) {
  7. Ops ops = getOpsLocked(uid, packageName, true );
  8. ...
  9. <! --Key point 1-->  
  10. if (switchOp.mode == AppOpsManager.MODE_IGNORED ||
  11. switchOp.mode == AppOpsManager.MODE_ERRORED) {
  12.  
  13. op.rejectTime = System.currentTimeMillis();
  14. op.ignoredCount++;
  15. return switchOp.mode;
  16. <! --Key point 2-->  
  17. } else if(switchOp.mode == AppOpsManager.MODE_ALLOWED) {
  18.  
  19. op. time = System.currentTimeMillis();
  20. op.rejectTime = 0;
  21. op.allowedCount++;
  22. return AppOpsManager.MODE_ALLOWED;
  23. } else {
  24. op.noteOpCount++;
  25. <! --Key function 3-->  
  26. userDialogResult = askOperationLocked(code, uid, packageName,
  27. switchOp);
  28. }
  29. }
  30. return userDialogResult.get();
  31. }

In the above code, 1 and 2 directly return the authorization or rejection for the processed scenarios, and 3 is our common authorization entry dialog box, which is uniformly authorized in AppOpsServie. askOperationLocked will display a system dialog box. After the user chooses to authorize or reject, AppOpsServie will record the choice and notify the application service to provide or reject the service. askOperationLocked sends an authentication message through mHandler. Looking at the implementation, it actually creates a new PermissionDialog authorization dialog box and passes the reference of AppOpsService into it. After authorization, the authorization result will be notified through mService.notifyOperation.

  1. mHandler = new Handler() {
  2. public void handleMessage(Message msg) {
  3. switch (msg.what) {
  4. case SHOW_PERMISSION_DIALOG: {
  5. HashMap<String, Object> data =
  6. (HashMap<String, Object>) msg.obj;
  7. synchronized (this) {
  8. Op op = (Op) data.get( "op" );
  9. Result res = (Result) data.get( "result" );
  10. op.dialogResult.register(res);
  11. if(op.dialogResult.mDialog == null ) {
  12. Integer code = ( Integer ) data.get( "code" );
  13. Integer uid = ( Integer ) data.get( "uid" );
  14. String packageName =
  15. (String) data.get( "packageName" );
  16. Dialog d = new PermissionDialog(mContext,
  17. AppOpsService.this, code, uid,
  18. packageName);
  19. op.dialogResult.mDialog = (PermissionDialog)d;
  20. d.show();
  21. }
  22. }
  23. }break;
  24. }
  25. }
  26. };

Android distribution source code supports dynamic permission management (almost zero)

Between Android 4.3 and 5.1, although apps can obtain instances of AppOpsManager, the setMode interface that actually performs dynamic operation permissions is hidden, as shown below:

  1. /** @hide */
  2. public void setMode( int code, int uid, String packageName, int mode) {
  3. try {
  4. mService.setMode(code, uid, packageName, mode);
  5. } catch (RemoteException e) {
  6. }
  7. }

After traversing the source code, only the NotificationManagerService system application uses setMode, that is, in the release version, only notifications are dynamically managed through the system notification manager.

  1. public void setNotificationsEnabledForPackage(String pkg, int uid, boolean enabled) {
  2. checkCallerIsSystem();
  3.  
  4. Slog.v(TAG, (enabled? "en" : "dis" ) + "abling notifications for " + pkg);
  5.  
  6. mAppOps.setMode(AppOpsManager.OP_POST_NOTIFICATION, uid, pkg,
  7. enabled ? AppOpsManager.MODE_ALLOWED : AppOpsManager.MODE_IGNORED);
  8.  
  9. // Now, cancel any outstanding notifications that are part of a just-disabled app
  10. if (ENABLE_BLOCKED_NOTIFICATIONS && !enabled) {
  11. cancelAllNotificationsInt(pkg, 0, 0, true , UserHandle.getUserId(uid));
  12. }
  13. }

Android 6.0 Permission Management Principle

The runtime-permission mechanism of Android 6.0 allows users to cancel authorization at any time. Therefore, every time you apply for a system service, you must dynamically query whether the corresponding permission has been obtained. If not, you need to apply dynamically. First, let's take a look at the query of permissions:

Android 6.0 Permission Query

The support-v4 compatibility package provides a tool class PermissionChecker that can be used to check permission acquisition.

PermissionChecker

  1. public   static   int checkPermission(@NonNull Context context, @NonNull String permission,
  2. int pid, int uid, String packageName) {
  3. if (context.checkPermission(permission, pid, uid) == PackageManager.PERMISSION_DENIED) {
  4. return PERMISSION_DENIED;
  5. }
  6.  
  7. String op = AppOpsManagerCompat.permissionToOp(permission);
  8. if (op == null ) {
  9. return PERMISSION_GRANTED;
  10. }
  11.  
  12. if (packageName == null ) {
  13. String[] packageNames = context.getPackageManager().getPackagesForUid(uid);
  14. if (packageNames == null || packageNames.length <= 0) {
  15. return PERMISSION_DENIED;
  16. }
  17. packageName = packageNames[0];
  18. }
  19.  
  20. if (AppOpsManagerCompat.noteProxyOp(context, op, packageName)
  21. != AppOpsManagerCompat.MODE_ALLOWED) {
  22. return PERMISSION_DENIED_APP_OP;
  23. }
  24.  
  25. return PERMISSION_GRANTED;
  26. }

Here we only care about context.checkPermission. From the above analysis of APPOpsManager from 4.3 to 5.1, we know that some operations of AppOpsManagerCompat itself have no practical significance for permission management. They are only used to make some marks. At most, they are useful for notification permissions. Next, let's look at checkPermission:

ContextImple.java

  1. /** @hide */
  2. @Override
  3. public   int checkPermission(String permission, int pid, int uid, IBinder callerToken) {
  4. if (permission == null ) {
  5. throw new IllegalArgumentException( "permission is null" );
  6. }
  7. try {
  8. return ActivityManagerNative.getDefault().checkPermissionWithToken(
  9. permission, pid, uid, callerToken);
  10. } catch (RemoteException e) {
  11. return PackageManager.PERMISSION_DENIED;
  12. }
  13. }

Then look down

ActivityManagerNative.java

  1. public   int checkPermission(String permission, int pid, int uid)
  2. throws RemoteException {
  3. Parcel data = Parcel.obtain();
  4. Parcel reply = Parcel.obtain();
  5. data.writeInterfaceToken(IActivityManager.descriptor);
  6. data.writeString(permission);
  7. data.writeInt(pid);
  8. data.writeInt(uid);
  9. mRemote.transact(CHECK_PERMISSION_TRANSACTION, data, reply, 0);
  10. reply.readException();
  11. int res = reply.readInt();
  12. data.recycle();
  13. reply.recycle();
  14. return res;
  15. }

ActivityManagerService

  1. public   int checkPermission(String permission, int pid, int uid) {
  2. if (permission == null ) {
  3. return PackageManager.PERMISSION_DENIED;
  4. }
  5. return checkComponentPermission(permission, pid, UserHandle.getAppId(uid), -1, true );
  6. }

Then call ActivityManager.checkComponentPermission, call AppGlobals.getPackageManager().checkUidPermission(permission, uid);

ActivityManager.java

  1. /** @hide */
  2. public   static   int checkComponentPermission(String permission, int uid,
  3. int owningUid, boolean exported) {
  4. // Root, system server get to do everything.
  5.      
  6. <! --root and System can obtain all permissions-->  
  7. if (uid == 0 || uid == Process.SYSTEM_UID) {
  8. return PackageManager.PERMISSION_GRANTED;
  9. }
  10. . . .
  11. <! --Normal permission query-->  
  12. try {
  13. return AppGlobals.getPackageManager()
  14. .checkUidPermission(permission, uid);
  15. } catch (RemoteException e) {
  16. // Should never happen, but if it does... deny!
  17. Slog.e(TAG, "PackageManager is dead?!?" , e);
  18. }
  19. return PackageManager.PERMISSION_DENIED;
  20. }

Finally, PackageManagerService.java is called to check whether there is permission. At this point, we only need to know that the query of permission is actually done through PKMS. We should have a basic understanding that the update, persistence, and recovery of permissions are all done through PKMS.

PKMS permission query for different versions

Android5.0 checkUidPermission

  1. public   int checkUidPermission(String permName, int uid) {
  2. final boolean enforcedDefault = isPermissionEnforcedDefault(permName);
  3. synchronized (mPackages) {
  4. <! --In the PackageManagerService.Setting.mUserIds array, find the permission list of uid (that is, package) according to uid-->  
  5. Object obj = mSettings.getUserIdLPr(UserHandle.getAppId(uid));
  6. if (obj != null ) {
  7. GrantedPermissions gp = (GrantedPermissions)obj;
  8. if (gp.grantedPermissions. contains (permName)) {
  9. return PackageManager.PERMISSION_GRANTED;
  10. }
  11. } else {
  12. <! --mSystemPermissions records the permission corresponding to the uid of some system-level applications->  
  13. HashSet<String> perms = mSystemPermissions.get(uid);
  14. if (perms != null && perms. contains (permName)) {
  15. return PackageManager.PERMISSION_GRANTED;
  16. }
  17. }
  18. if (!isPermissionEnforcedLocked(permName, enforcedDefault)) {
  19. return PackageManager.PERMISSION_GRANTED;
  20. }
  21. }
  22. return PackageManager.PERMISSION_DENIED;
  23. }

checkUidPermission for Android6.0+

  1. @Override
  2. public   int checkUidPermission(String permName, int uid) {
  3. final int userId = UserHandle.getUserId(uid);
  4.  
  5. if (!sUserManager.exists(userId)) {
  6. return PackageManager.PERMISSION_DENIED;
  7. }
  8.  
  9. synchronized (mPackages) {
  10. Object obj = mSettings.getUserIdLPr(UserHandle.getAppId(uid));
  11. if (obj != null ) {
  12. final SettingBase ps = (SettingBase) obj;
  13. final PermissionsState permissionsState = ps.getPermissionsState();
  14. if (permissionsState.hasPermission(permName, userId)) {
  15. return PackageManager.PERMISSION_GRANTED;
  16. }
  17. // Special case : ACCESS_FINE_LOCATION permission includes ACCESS_COARSE_LOCATION
  18. if (Manifest.permission.ACCESS_COARSE_LOCATION.equals(permName) && permissionsState
  19. .hasPermission(Manifest.permission.ACCESS_FINE_LOCATION, userId)) {
  20. return PackageManager.PERMISSION_GRANTED;
  21. }
  22. } else {
  23. ArraySet<String> perms = mSystemPermissions.get(uid);
  24. if (perms != null ) {
  25. if (perms. contains (permName)) {
  26. return PackageManager.PERMISSION_GRANTED;
  27. }
  28. if (Manifest.permission.ACCESS_COARSE_LOCATION.equals(permName) && perms
  29. . contains (Manifest.permission.ACCESS_FINE_LOCATION)) {
  30. return PackageManager.PERMISSION_GRANTED;
  31. }
  32. }
  33. }
  34. }
  35.  
  36. return PackageManager.PERMISSION_DENIED;
  37. }

It can be seen that after Android 6.0, the operation of permissions is PermissionsState

PermissionsState.java (android-6.0frameworksbaseservicescorejavacomandroidserverpm)

  1. public boolean hasPermission(String name , int userId) {
  2. enforceValidUserId(userId);
  3.  
  4. if (mPermissions == null ) {
  5. return   false ;
  6. }
  7.  
  8. PermissionData permissionData = mPermissions.get( name );
  9. return permissionData != null && permissionData.isGranted(userId);
  10. }

It is clear from the above code that after 6.0, in addition to declaring permissions, they must also be authorized. Runtime permissions are different from install permissions. For install permissions, isGranted always returns True. There is no need to delve into how PermissionsState is stored in memory. Just remember it and we will talk about it later.

Android 6.0 dynamically applies for permissions

You can apply for permissions through ActivityCompat in the V4 package, which is compatible with different versions.

ActivityCompat.java

  1. public   static void requestPermissions(final @NonNull Activity activity,
  2. final @NonNull String[] permissions, final int requestCode) {
  3. if (Build.VERSION.SDK_INT >= 23) {
  4. ActivityCompatApi23.requestPermissions(activity, permissions, requestCode);
  5. } else if (activity instanceof OnRequestPermissionsResultCallback) {
  6.          
  7. Handler handler = new Handler(Looper.getMainLooper());
  8. handler.post(new Runnable() {
  9. @Override
  10. public void run() {
  11. final int [] grantResults = new int [permissions.length];
  12.  
  13. PackageManager packageManager = activity.getPackageManager();
  14. String packageName = activity.getPackageName();
  15.  
  16. final int permissionCount = permissions.length;
  17. for ( int i = 0; i < permissionCount; i++) {
  18. grantResults[i] = packageManager.checkPermission(
  19. permissions[i], packageName);
  20. }
  21.  
  22. ((OnRequestPermissionsResultCallback) activity).onRequestPermissionsResult(
  23. requestCode, permissions, grantResults);
  24. }
  25. });
  26. }
  27. }

As you can see, if it is below 6.0, PKMS is used to query whether permissions are applied in the Manifest, and the query result is passed to the Activity or Fragment through the onRequestPermissionsResult callback. In fact, as long as it is declared in the Manifest, it will be Granted by default. Then read on: ActivityCompatApi23 will eventually call activity.requestPermissions to request permissions.

Activity

  1. public final void requestPermissions(@NonNull String[] permissions, int requestCode) {
  2. Intent intent = getPackageManager().buildRequestPermissionsIntent(permissions);
  3. startActivityForResult(REQUEST_PERMISSIONS_WHO_PREFIX, intent, requestCode, null );
  4. }

Intent is actually obtained through PackageManager (ApplicationPackageManager implementation class)

  1.   public Intent buildRequestPermissionsIntent(@NonNull String[] permissions) {
  2. if (ArrayUtils.isEmpty(permissions)) {
  3. throw new NullPointerException( "permission cannot be null or empty" );
  4. }
  5. Intent intent = new Intent(ACTION_REQUEST_PERMISSIONS);
  6. intent.putExtra(EXTRA_REQUEST_PERMISSIONS_NAMES, permissions);
  7. intent.setPackage(getPermissionControllerPackageName());
  8. return intent;
  9. }

Here, we first implicitly obtain the information related to the authorization Activity component (GrantPermissionsActivity), which is actually a dialog-style authorization Activity, which is an Activity in the PackageInstaller system application. The getPermissionControllerPackageName here actually obtains the corresponding package name.

ApplicationPackageManager.java (android-6.0frameworksbasecorejavaandroidapp)

  1. @Override
  2. public String getPermissionControllerPackageName() {
  3. synchronized (mLock) {
  4. if (mPermissionsControllerPackageName == null ) {
  5. try {
  6. mPermissionsControllerPackageName = mPM.getPermissionControllerPackageName();
  7. } catch (RemoteException e) {
  8. throw new RuntimeException( "Package manager has died" , e);
  9. }
  10. }
  11. return mPermissionsControllerPackageName;
  12. }
  13. }

Finally, get the package name through PackageManagerService

PackageManagerService.java (android-6.0frameworksbaseservicescorejavacomandroidserverpm)

  1. @Override
  2. public String getPermissionControllerPackageName() {
  3. synchronized (mPackages) {
  4. return mRequiredInstallerPackage;
  5. }
  6. }

The variable mRequiredInstallerPackage is assigned a value in the PMS constructor: For native Android 6.0, the permission management app and the installer are the same

  1. mRequiredInstallerPackage = getRequiredInstallerLPr();

Here you will get the relevant information of the PackageInstaller application. PackageInstaller is responsible for installing and uninstalling applications, and also contains some logic for authorization management. startActivityForResult starts the GrantPermissionsActivity in PackageInstaller, which is mainly responsible for granting permissions.

  1. <activity android: name = ".permission.ui.GrantPermissionsActivity"  
  2. android:configChanges= "orientation|keyboardHidden|screenSize"  
  3. android:excludeFromRecents= "true"  
  4. android:theme= "@style/GrantPermissions" >
  5. <intent-filter>
  6. < action android: name = "android.content.pm.action.REQUEST_PERMISSIONS" />
  7. <category android: name = "android.intent.category.DEFAULT" />
  8. </intent-filter>
  9. </activity>

This is an Activity with a floating window style similar to a dialog box

  1. <style name = "GrantPermissions" parent= "Settings" >
  2. <item name = "android:windowIsFloating" > true </item>
  3. <item name = "android:windowElevation" >@dimen/action_dialog_z</item>
  4. <item name = "android:windowSwipeToDismiss" > false </item>
  5. </style>

After that, the permission process is dynamically updated:

How to dynamically update RuntimePermission

Through the above process, we enter the GrantPermissionsActivity. In this Activity, if the permission is not obtained at the beginning, a permission application dialog box will pop up. The permission information in PKMS will be updated according to the user's operation, and the updated structure will be persisted to runtime-permissions.xml.

GrantPermissionsActivity

GrantPermissionsActivity actually uses the GroupState object to communicate with PKMS and remotely update permissions. Of course, if the permissions have been granted, there is no need to pop up the permission application dialog box again.

  1. public class GrantPermissionsActivity extends OverlayTouchActivity
  2. implements GrantPermissionsViewHandler.ResultListener {
  3.          
  4. private LinkedHashMap<String, GroupState> mRequestGrantPermissionGroups = new LinkedHashMap<>();
  5. ....
  6.      
  7. @Override
  8. public void onPermissionGrantResult(String name , boolean granted, boolean doNotAskAgain) {
  9. GroupState groupState = mRequestGrantPermissionGroups.get( name );
  10. if (groupState.mGroup != null ) {
  11. if (granted) {
  12.              
  13. <! --Permission update time-->  
  14. groupState.mGroup.grantRuntimePermissions(doNotAskAgain);
  15. groupState.mState = GroupState.STATE_ALLOWED;
  16. } else {
  17. groupState.mGroup.revokeRuntimePermissions(doNotAskAgain);
  18. groupState.mState = GroupState.STATE_DENIED;
  19. }
  20. updateGrantResults(groupState.mGroup);
  21. }
  22. if (!showNextPermissionGroupGrantRequest()) {
  23. setResultAndFinish();
  24. }
  25. }

Specific update process:

  1. public boolean grantRuntimePermissions(boolean fixedByTheUser, String[] filterPermissions) {
  2. final int uid = mPackageInfo.applicationInfo.uid;
  3.  
  4. // We toggle permissions only   to apps that support runtime
  5. // permissions, otherwise we toggle the app op corresponding
  6. // to the permission if the permission is granted to the app.
  7. for (Permission permission : mPermissions. values ​​()) {
  8. if (filterPermissions != null  
  9. && !ArrayUtils. contains (filterPermissions, permission.getName())) {
  10. continue ;
  11. }
  12. ...
  13. <! --Some key points-->  
  14.  
  15. // Grant the permission if needed.
  16. if (!permission.isGranted()) {
  17. permission.setGranted( true );
  18. mPackageManager.grantRuntimePermission(mPackageInfo.packageName,
  19. permission.getName(), mUserHandle);
  20. }
  21. // Update the permission flags.
  22. if (!fixedByTheUser) {
  23. // Now the apps can ask for the permission as the user  
  24. // no longer has it fixed in a denied state.
  25. if (permission.isUserFixed() || permission.isUserSet()) {
  26. permission.setUserFixed( false );
  27. permission.setUserSet( true );
  28. mPackageManager.updatePermissionFlags(permission.getName(),
  29. mPackageInfo.packageName,
  30. PackageManager.FLAG_PERMISSION_USER_FIXED
  31. | PackageManager.FLAG_PERMISSION_USER_SET,
  32. 0, mUserHandle);

You can see that PackageManager is finally called to update the runtime permissions of the App, and finally enters the PackageManagerService service.

PackageManagerService

  1. @Override
  2. public void grantRuntimePermission(String packageName, String name , final int userId) {
  3. if (!sUserManager.exists(userId)) {
  4. Log.e(TAG, "No such user:" + userId);
  5. return ;
  6. }
  7.          
  8. ...some checks
  9.          
  10. mContext.enforceCallingOrSelfPermission(
  11. android.Manifest.permission.GRANT_RUNTIME_PERMISSIONS,
  12. "grantRuntimePermission" );
  13.  
  14. enforceCrossUserPermission(Binder.getCallingUid(), userId,
  15. true /* requireFullPermission */, true /* checkShell */,
  16. "grantRuntimePermission" );
  17. . . . . .
  18. ...
  19. uid = UserHandle.getUid(userId, pkg.applicationInfo.uid);
  20. sb = (SettingBase) pkg.mExtras;
  21. if (sb == null ) {
  22. throw new IllegalArgumentException( "Unknown package: " + packageName);
  23. }
  24.  
  25. final PermissionsState permissionsState = sb.getPermissionsState();
  26.                
  27. ...
  28. ...authorization
  29.              
  30. final int result = permissionsState.grantRuntimePermission(bp, userId);
  31. switch (result) {
  32. case PermissionsState.PERMISSION_OPERATION_FAILURE: {
  33. return ;
  34. }
  35.  
  36. case PermissionsState.PERMISSION_OPERATION_SUCCESS_GIDS_CHANGED: {
  37. final int appId = UserHandle.getAppId(pkg.applicationInfo.uid);
  38. mHandler.post(new Runnable() {
  39. @Override
  40. public void run() {
  41. killUid(appId, userId, KILL_APP_REASON_GIDS_CHANGED);
  42. }
  43. });
  44. }
  45. break;
  46. }
  47.  
  48. mOnPermissionChangeListeners.onPermissionsChanged(uid);
  49.              
  50.              
  51. <! --Persistence-->  
  52.              
  53. // Not critical if that is lost - app has to request again.
  54. mSettings.writeRuntimePermissionsForUserLPr(userId, false );
  55. }  

<!--Check whether the permission has been declared in the Manifest-->

  1. private static void enforceDeclaredAsUsedAndRuntimeOrDevelopmentPermission(PackageParser.Package pkg,
  2. BasePermission bp) {
  3. int   index = pkg.requestedPermissions.indexOf(bp. name );
  4. if ( index == -1) {
  5. throw new SecurityException( "Package " + pkg.packageName
  6. + " has not requested permission " + bp. name );
  7. }
  8. if (!bp.isRuntime() && !bp.isDevelopment()) {
  9. throw new SecurityException( "Permission " + bp. name  
  10. + " is not a changeable permission type" );
  11. }
  12. }

First, update the permission granted in memory

PermissionsState.java

  1. private int grantPermission(BasePermission permission, int userId) {
  2. if (hasPermission(permission. name , userId)) {
  3. return PERMISSION_OPERATION_FAILURE;
  4. }
  5.  
  6. final boolean hasGids = !ArrayUtils.isEmpty(permission.computeGids(userId));
  7. final int [] oldGids = hasGids ? computeGids(userId) : NO_GIDS;
  8.  
  9. PermissionData permissionData = ensurePermissionData(permission);
  10.  
  11. if (!permissionData. grant (userId)) {
  12. return PERMISSION_OPERATION_FAILURE;
  13. }
  14.  
  15. if (hasGids) {
  16. final int [] newGids = computeGids(userId);
  17. if (oldGids.length != newGids.length) {
  18. return PERMISSION_OPERATION_SUCCESS_GIDS_CHANGED;
  19. }
  20. }
  21.  
  22. return PERMISSION_OPERATION_SUCCESS;
  23. }

<!--Dynamically add and update memory Permison -->

  1. private PermissionData ensurePermissionData(BasePermission permission) {
  2. if (mPermissions == null ) {
  3. mPermissions = new ArrayMap<>();
  4. }
  5. PermissionData permissionData = mPermissions.get( permission.name );
  6. if (permissionData == null ) {
  7. permissionData = new PermissionData(permission);
  8. mPermissions.put( permission.name , permissionData);
  9. }
  10. return permissionData;
  11. }

Next, to persist the updated permissions to the file, use mSettings.writeRuntimePermissionsForUserLPr

RuntimePermission persistence

Settings.java

  1. public void writeRuntimePermissionsForUserLPr( int userId, boolean sync) {
  2. if (sync) {
  3. mRuntimePermissionsPersistence.writePermissionsForUserSyncLPr(userId);
  4. } else {
  5. mRuntimePermissionsPersistence.writePermissionsForUserAsyncLPr(userId);
  6. }
  7. }

The method Settings.getPackageLPw is called by the scanPackageDirtyLI method when scanning for installed applications. In it, you can see that the mUserIds in the Settings class, the value stored in mPackages, and the mPackages.pkg. mExtras in the PackageManagerService are all the same thing, which is a PackageSetting.

  1. private File getUserRuntimePermissionsFile( int userId) {
  2. // TODO: Implement a cleaner solution when adding tests.
  3. // This instead   of Environment.getUserSystemDirectory(userId) to support testing.
  4. File userDir = new File(new File(mSystemDir, "users" ), Integer .toString(userId));
  5. return new File(userDir, RUNTIME_PERMISSIONS_FILE_NAME);
  6. }

The directory data/system/0/runtime-permissions.xml stores the permissions that need to be applied for at runtime. This is only available on Android 6.0 and above.

  1. <pkg name = "com.snail.labaffinity" >
  2. <item name = "android.permission.CALL_PHONE" granted= "true" flags= "0" />
  3. <item name = "android.permission.CAMERA" granted= "false" flags= "1" />
  4. </pkg>

RuntimePermission recovery (in fact, this also includes ordinary permissions)

These persistent data will be read by PMS when the phone starts up. PKMS scans Apk and updates package information, checking whether /data/system/packages.xml exists. This file is created by writeLP() when parsing apk. It records system permissions and name, codePath, flags, ts, version, uesrid and other information of each apk. This information is mainly obtained by parsing AndroidManifest.xml of apk. After parsing apk, the update information is written to this file and saved to flash. The next time the phone is started, the relevant information is directly read from it and added to the memory-related list. This file will be updated when apk is upgraded, installed or deleted. packages.xml only includes installpermission, and runtimepermissiono is stored in runtime-permissions.xml.

  1. public PackageManagerService(Context context, Installer installer,
  2. boolean factoryTest, boolean onlyCore) {
  3. ....
  4. mSettings = new Settings(mPackages);
  5.      
  6. //Summarize and update information related to Permission
  7.  
  8. updatePermissionsLPw( null , null , true ,
  9.  
  10. regrantPermissions,regrantPermissions);
  11.  
  12. //Write the information to package.xml, package.list and package-stopped.xml files
  13. mSettings.writeLPr();
  14.     
  15. ....
  16. mFirstBoot = !mSettings.readLPw(sUserManager.getUsers( false ));
  17.  
  18. Settings(File dataDir, Object lock) {
  19.  
  20. mRuntimePermissionsPersistence = new RuntimePermissionPersistence(mLock);
  21.  
  22. <! --Load package information-->  

Read the corresponding setting information according to SettingsFile or BackupSettingsFile to generate a PackageSetting object, which contains the permission list field protected final PermissionsState mPermissionsState;. After that, dynamic permission operations are all for this object during operation.

  1. boolean readLPw(@NonNull List<UserInfo> users) {
  2. FileInputStream str = null ;
  3. if (mBackupSettingsFilename.exists()) {
  4. try {
  5. str = new FileInputStream(mBackupSettingsFilename);
  6. mReadMessages.append( "Reading from backup settings file\n" );
  7. ...
  8. while ((type = parser. next ()) != XmlPullParser.END_DOCUMENT
  9. && (type != XmlPullParser.END_TAG || parser.getDepth() > outerDepth)) {
  10.          
  11. String tagName = parser.getName();
  12. if (tagName.equals( "package" )) {
  13.              
  14. ! --Read package information, including install permission information (for Android6.0package.xml) -->  
  15.      
  16. readPackageLPw(parser);
  17. ...
  18.           
  19. <! --Read runtime permission information-->  
  20.        
  21. for (UserInfo user : users) {
  22. mRuntimePermissionsPersistence.readStateForUserSyncLPr( user .id);
  23. }
  24. }
  25.  
  26.  
  27. private void readPackageLPw(XmlPullParser parser) throws XmlPullParserException, IOException {
  28. String name = null ;
  29. ...
  30. (tagName.equals(TAG_PERMISSIONS)) {
  31. readInstallPermissionsLPr(parser,
  32. packageSetting.getPermissionsState());

Then you can check permission

  1. @Override
  2. public   int checkUidPermission(String permName, int uid) {
  3. final int userId = UserHandle.getUserId(uid);
  4.  
  5. if (!sUserManager.exists(userId)) {
  6. return PackageManager.PERMISSION_DENIED;
  7. }
  8.  
  9. synchronized (mPackages) {
  10. Object obj = mSettings.getUserIdLPr(UserHandle.getAppId(uid));
  11. if (obj != null ) {
  12. final SettingBase ps = (SettingBase) obj;
  13. final PermissionsState permissionsState = ps.getPermissionsState();
  14. if (permissionsState.hasPermission(permName, userId)) {
  15. return PackageManager.PERMISSION_GRANTED;
  16. }

Where are the original permissions stored? They are not all read from the Android Manifest list, but only read once at startup. Before Android 6.0, all permissions were placed in the data/system/packages.xml file. After Android 6.0, they are divided into runtime permissions and ordinary permissions. Ordinary permissions are still placed in data/system/packages.xml, and runtime permissions are placed in data/system/users/0/runtime-permissions.xml. Permissions are updated based on whether they are dynamically applied at runtime.

What happens if you apply for normal permissions on Android 6.0?

In Android 6.0, normal permissions still follow the runtime permission model, but granted="true" means that the permission is always granted. So you can directly get the callback of successful permission application. If you check packages.xml, you will find the following information:

  1. <perms>
  2. <item name = "android.permission.INTERNET" granted= "true" flags= "0" />
  3. <item name = "android.permission.ACCESS_WIFI_STATE" granted= "true" flags= "0" />
  4. </perms>

Where are the key nodes of Android?

The key point is not to query whether the permission is granted. The permission query before Android 6.0 will not trigger the permission application and authorization. Only when the system service is requested, the system service calls AppopsManager to query whether the permission is granted. If it is not granted, it may trigger the permission application logic. This point is within each system service and is managed uniformly by the AppOpsService service. However, for the official Release version, in fact, only the system notification APP has the ability to dynamically manage permissions, and others have no operation capabilities.

<<:  [Exclusive for lazy people] Universal RecylerAdapter, built-in XRecyclerView, compatible with pull-up and pull-down and animation, high reuse, universal for all pages, support empty pages

>>:  Last time I released a version, I changed only one line of code!

Recommend

Which industries are suitable for information flow?

Question 1: I have a question: Regarding the prob...

Toutiao officially launches CPA (cost-per-acquisition) model

The conversion cost is sometimes high and sometim...

Data Operations: How to build an efficient data analysis system?

With the advent of the data-driven and refined op...

iOS 12 has these hidden tricks? It’s worth buying an iPhone now!

It has been a while since iOS 12 was released. Wi...

[Case] ​​18 methods of social marketing of Durex!

How to judge whether something is really popular?...

Paid community operation strategy and conversion!

The community needs to be hot-started, not cold-s...

Analysis of Tik Tok media advertising in Q1 2020!

Douyin’s DAU has exceeded 400 million, a 60% incr...

After Android and iOS, the third largest mobile system reappears

Google is still keeping mum on its intentions to ...

How to formulate SEM bidding promotion strategy?

The same applies to SEM bidding. Don’t use dilige...

Zhu Yonghai's Slow Bull Lecture on Quantitative Science Opens - Issue 21

Course Catalog Lao Zhu's 21st main course The...

The 38-section copy you wanted is here!

According to historical records , although there ...