diff options
| -rw-r--r-- | services/core/java/com/android/server/pm/permission/PermissionManagerService.java | 11 | ||||
| -rw-r--r-- | services/core/java/com/android/server/policy/PermissionPolicyService.java | 5 |
2 files changed, 3 insertions, 13 deletions
diff --git a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java index f50df1fb16fb..bb3388cc5b9a 100644 --- a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java +++ b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java @@ -53,7 +53,6 @@ import android.annotation.NonNull; import android.annotation.Nullable; import android.annotation.UserIdInt; import android.app.ActivityManager; -import android.app.AppOpsManager; import android.app.ApplicationPackageManager; import android.app.IActivityManager; import android.content.Context; @@ -1542,7 +1541,6 @@ public class PermissionManagerService extends IPermissionManager.Stub { } }; - final AppOpsManager appOpsManager = mContext.getSystemService(AppOpsManager.class); for (int i = 0; i < permissionCount; i++) { final String permName = pkg.requestedPermissions.get(i); final BasePermission bp; @@ -1608,16 +1606,9 @@ public class PermissionManagerService extends IPermissionManager.Stub { // If this permission was granted by default, make sure it is. if ((oldFlags & FLAG_PERMISSION_GRANTED_BY_DEFAULT) != 0) { + // PermissionPolicyService will handle the app op for runtime permissions later. grantRuntimePermissionInternal(permName, packageName, false, Process.SYSTEM_UID, userId, delayingPermCallback); - // Allow app op later as we are holding mPackages - // PermissionPolicyService will handle the app op for foreground/background - // permissions. - String appOp = AppOpsManager.permissionToOp(permName); - if (appOp != null) { - mHandler.post(() -> appOpsManager.setUidMode(appOp, uid, - AppOpsManager.MODE_ALLOWED)); - } // If permission review is enabled the permissions for a legacy apps // are represented as constantly granted runtime ones, so don't revoke. } else if ((flags & FLAG_PERMISSION_REVIEW_REQUIRED) == 0) { diff --git a/services/core/java/com/android/server/policy/PermissionPolicyService.java b/services/core/java/com/android/server/policy/PermissionPolicyService.java index 6edbdd84e5f5..9b9f93f7b5c4 100644 --- a/services/core/java/com/android/server/policy/PermissionPolicyService.java +++ b/services/core/java/com/android/server/policy/PermissionPolicyService.java @@ -153,7 +153,7 @@ public final class PermissionPolicyService extends SystemService { for (int i = 0; i < numDangerousPerms; i++) { PermissionInfo perm = dangerousPerms.get(i); - if (perm.isRestricted() || perm.backgroundPermission != null) { + if (perm.isRuntime()) { appOpsService.startWatchingMode(getSwitchOp(perm.name), null, appOpsListener); } if (perm.isSoftRestricted()) { @@ -511,8 +511,7 @@ public final class PermissionPolicyService extends SystemService { private void addPermissionAppOp(@NonNull PackageInfo packageInfo, @NonNull PermissionInfo permissionInfo) { - // TODO: Sync all permissions in the future. - if (!permissionInfo.isRestricted() && permissionInfo.backgroundPermission == null) { + if (!permissionInfo.isRuntime()) { return; } |