1.通过命令查看应用权限:
adb shell dumpsys package "xxx.xxx.xxx" //如adb shell dumpsys package com.tencent.androidqqmail
重要的权限debug命令。得到的信息的具体解释见以下内容。
2.应用中权限的分类:
(1).自定义权限
Permissions:
Permission [com.android.launcher3.permission.READ_SETTINGS] (adf0ebe):
sourcePackage=com.android.launcher3
uid=10106 gids=null type=0 prot=signature|privileged
perm=Permission{c6b5b1f com.android.launcher3.permission.READ_SETTINGS}
packageSetting=PackageSetting{8736e6c com.android.launcher3/10106}
Permissions:
Permission [com.android.launcher3.permission.WRITE_SETTINGS] (8531c35):
sourcePackage=com.android.launcher3
uid=10106 gids=null type=0 prot=signature|privileged
perm=Permission{3f958ca com.android.launcher3.permission.WRITE_SETTINGS}
packageSetting=PackageSetting{8736e6c com.android.launcher3/10106}
(2).应用所有的权限列表
Packages:
Package [com.android.launcher3] (8736e6c):
userId=10106
pkg=Package{dbc3796 com.android.launcher3}
codePath=/system/product/priv-app/Launcher3QuickStep
resourcePath=/system/product/priv-app/Launcher3QuickStep
legacyNativeLibraryDir=/system/product/priv-app/Launcher3QuickStep/lib
primaryCpuAbi=null
secondaryCpuAbi=null
versionCode=29 minSdk=29 targetSdk=29
versionName=10
splits=[base]
apkSigningVersion=3
applicationInfo=ApplicationInfo{e2646b1 com.android.launcher3}
flags=[ SYSTEM HAS_CODE ALLOW_CLEAR_USER_DATA ALLOW_BACKUP KILL_AFTER_RESTORE RESTORE_ANY_VERSION ]
privateFlags=[ PRIVATE_FLAG_ACTIVITIES_RESIZE_MODE_RESIZEABLE_VIA_SDK_VERSION ALLOW_AUDIO_PLAYBACK_CAPTURE PARTIALLY_DIRECT_BOOT_AWARE PRIVILEGED PRODUCT ]
dataDir=/data/user/0/com.android.launcher3
supportsScreens=[small, medium, large, xlarge, resizeable, anyDensity]
timeStamp=2020-03-06 16:23:16
firstInstallTime=2020-03-06 16:23:16
lastUpdateTime=2020-03-06 16:23:16
signatures=PackageSignatures{6178f17 version:3, signatures:[b4addb29], past signatures:[]}
installPermissionsFixed=true
pkgFlags=[ SYSTEM HAS_CODE ALLOW_CLEAR_USER_DATA ALLOW_BACKUP KILL_AFTER_RESTORE RESTORE_ANY_VERSION ]
declared permissions:
com.android.launcher3.permission.READ_SETTINGS: prot=signature|privileged, INSTALLED
com.android.launcher3.permission.WRITE_SETTINGS: prot=signature|privileged, INSTALLED
com.android.launcher.permission.INSTALL_SHORTCUT: prot=dangerous
requested permissions:
android.permission.CONTROL_REMOTE_APP_TRANSITION_ANIMATIONS
com.android.launcher.permission.READ_SETTINGS
com.android.launcher.permission.WRITE_SETTINGS
com.android.launcher3.permission.READ_SETTINGS
com.android.launcher3.permission.WRITE_SETTINGS
android.permission.ACCESS_NETWORK_STATE
android.permission.ACCESS_WIFI_STATE
android.permission.CHANGE_NETWORK_STATE
android.permission.READ_PHONE_STATE
android.permission.INTERNET
android.permission.WRITE_OWNER_DATA
android.permission.WRITE_EXTERNAL_STORAGE: restricted=true
android.permission.ACCESS_COARSE_LOCATION
android.permission.ACCESS_FINE_LOCATION
android.permission.READ_EXTERNAL_STORAGE: restricted=true
android.permission.MOUNT_UNMOUNT_FILESYSTEMS
android.permission.GET_APP_GRANTED_URI_PERMISSIONS
android.permission.FORCE_PERSISTABLE_URI_PERMISSIONS
android.permission.READ_SMS: restricted=true
android.permission.KILL_BACKGROUND_PROCESSES
android.permission.FORCE_STOP_PACKAGES
android.permission.VIBRATE
android.permission.READ_CALL_LOG: restricted=true
android.permission.REQUEST_INSTALL_PACKAGES
android.permission.READ_CALENDAR
android.permission.WRITE_CALENDAR
android.permission.CALL_PHONE
android.permission.SET_WALLPAPER
android.permission.SET_WALLPAPER_HINTS
android.permission.BIND_APPWIDGET
android.permission.RECEIVE_BOOT_COMPLETED
android.permission.REQUEST_DELETE_PACKAGES
android.permission.PACKAGE_USAGE_STATS
android.permission.READ_FRAME_BUFFER
android.permission.WAKE_LOCK
android.permission.FOREGROUND_SERVICE
android.permission.SYSTEM_ALERT_WINDOW
install permissions:
com.android.launcher3.permission.READ_SETTINGS: granted=true
android.permission.SYSTEM_ALERT_WINDOW: granted=true
android.permission.CHANGE_NETWORK_STATE: granted=true
android.permission.FOREGROUND_SERVICE: granted=true
android.permission.RECEIVE_BOOT_COMPLETED: granted=true
com.android.launcher3.permission.WRITE_SETTINGS: granted=true
android.permission.INTERNET: granted=true
android.permission.CONTROL_REMOTE_APP_TRANSITION_ANIMATIONS: granted=true
android.permission.BIND_APPWIDGET: granted=true
android.permission.PACKAGE_USAGE_STATS: granted=true
android.permission.MOUNT_UNMOUNT_FILESYSTEMS: granted=true
android.permission.FORCE_PERSISTABLE_URI_PERMISSIONS: granted=true
android.permission.ACCESS_NETWORK_STATE: granted=true
android.permission.SET_WALLPAPER: granted=true
android.permission.KILL_BACKGROUND_PROCESSES: granted=true
android.permission.REQUEST_DELETE_PACKAGES: granted=true
android.permission.SET_WALLPAPER_HINTS: granted=true
android.permission.FORCE_STOP_PACKAGES: granted=true
android.permission.VIBRATE: granted=true
android.permission.ACCESS_WIFI_STATE: granted=true
android.permission.REQUEST_INSTALL_PACKAGES: granted=true
android.permission.READ_FRAME_BUFFER: granted=true
android.permission.GET_APP_GRANTED_URI_PERMISSIONS: granted=true
android.permission.WAKE_LOCK: granted=true
User 0: ceDataInode=4456624 installed=true hidden=false suspended=false stopped=false notLaunched=false enabled=0 instant=false virtual=false
gids=[3003]
runtime permissions:
android.permission.READ_SMS: granted=false, flags=[ USER_SENSITIVE_WHEN_GRANTED|RESTRICTION_UPGRADE_EXEMPT]
android.permission.READ_CALENDAR: granted=false, flags=[ USER_SENSITIVE_WHEN_GRANTED]
android.permission.READ_CALL_LOG: granted=false, flags=[ USER_SENSITIVE_WHEN_GRANTED|RESTRICTION_UPGRADE_EXEMPT]
android.permission.ACCESS_FINE_LOCATION: granted=true, flags=[ GRANTED_BY_DEFAULT]
android.permission.READ_EXTERNAL_STORAGE: granted=false, flags=[ USER_SENSITIVE_WHEN_GRANTED|RESTRICTION_UPGRADE_EXEMPT]
android.permission.ACCESS_COARSE_LOCATION: granted=true, flags=[ GRANTED_BY_DEFAULT]
android.permission.READ_PHONE_STATE: granted=false, flags=[ USER_SENSITIVE_WHEN_GRANTED]
android.permission.CALL_PHONE: granted=false, flags=[ USER_SENSITIVE_WHEN_GRANTED]
android.permission.WRITE_CALENDAR: granted=false, flags=[ USER_SENSITIVE_WHEN_GRANTED]
android.permission.WRITE_EXTERNAL_STORAGE: granted=false, flags=[ USER_SENSITIVE_WHEN_GRANTED|RESTRICTION_UPGRADE_EXEMPT]
3.应用中权限分类
(1).declared permissions :自定义权限
作用:与其他应用分享自己的资源和功能.
By defining custom permissions, an app can share its resources and capabilities with other apps.
为了创建自定义权限,你需要在你应用的AndroidManifest.xml里用一个或多个<permission>来声明。
比如说,一个应用想控制启动它的activity对象,那么可以像下面一个声明一个自定义权限:
<manifest
xmlns:android="http://schemas.android.com/apk/res/android"
package="com.example.myapp" >
<permission
android:name="com.example.myapp.permission.DEADLY_ACTIVITY"
android:label="@string/permlab_deadlyActivity"
android:description="@string/permdesc_deadlyActivity"
android:permissionGroup="android.permission-group.COST_MONEY"
android:protectionLevel="dangerous" />
...
</manifest>
protectionLevel:这个属性是必须的,告知系统权限的等级,有如下几种等级:normal,dangerous,signature,signatureOrSystem。
permissionGroup:这个属性是可选的,只被用来帮助系统呈现权限给用户。
在大多数情况,你应该将其设置为一个标准的系统权限组(在android.Manifest.permission_group中列出的).
虽然你可以自己定义一个权限组,但是我们更建议使用存在的权限组,因为可以简化呈现给用户的UI。
label和description:你需要为自定义权限提供label和description。
这些都是用户可以看到的字符串资源,label对应于标签,description对应于权限细节。
label建议写的短一些,而description建议为几句话描述一下权限允许持有者可以做什么。
我们推荐两段式描述,第一句描述一下权限,第二句描述一下如果应用获取了对应权限会有什么风险。
"normal"
The default value. A lower-risk permission that gives requesting applications access to isolated application-level features, with minimal risk to other applications, the system, or the user.
The system automatically grants this type of permission to a requesting application at installation, without asking for the user's explicit approval (though the user always has the option to review these permissions before installing).
"dangerous"
A higher-risk permission that would give a requesting application access to private user data or control over the device that can negatively impact the user.
Because this type of permission introduces potential risk, the system may not automatically grant it to the requesting application.
For example, any dangerous permissions requested by an application may be displayed to the user and require confirmation before proceeding, or some other approach may be taken to avoid the user automatically allowing the use of such facilities.
"signature"
A permission that the system grants only if the requesting application is signed with the same certificate as the application that declared the permission.
If the certificates match, the system automatically grants the permission without notifying the user or asking for the user's explicit approval.
"signatureOrSystem"
A permission that the system grants only to applications that are in the Android system image or that are signed with the same certificate as the application that declared the permission.
Please avoid using this option, as the signature protection level should be sufficient for most needs and works regardless of exactly where applications are installed.
The "signatureOrSystem" permission is used for certain special situations where multiple vendors have applications built into a system image and need to share specific features explicitly because they are being built together.
(2).requested permissions :请求权限
是应用所需权限的集合,包含其他权限:declared permissions ,install permissions ,runtime permissions.
(3).install permissions :安装权限
Android 6.0之前的manifest里包含的所有权限声明都可以当做install permissions。
Android 6.0及以后的版本manifest里除了dangerous permissions即runtime permissions外则都属于install permissions。
安装时权限(Android 5.1 及更低版本):用户在安装或更新应用时,向应用授予危险权限。OEM/运营商可以在不通知用户的情况下,预先安装具有预授权的应用。
(4).runtime permissions : 运行时权限
运行时权限(Android 6.0 及更高版本):用户在应用运行时向应用授予危险权限。
应用决定何时申请权限(例如,在应用启动或用户访问特定功能时申请权限)。但必须允许用户授予/拒绝授予应用访问特定权限组的权限。
4.用户可以在"Settings"->"Apps & notification"->"App info"->"Permissions"中查看具体应用的权限。
也可以在"Settings"->"Apps & notification"->"Permission manager"中查看所有权限情况。
5.查看data/system/packages.xml中的权限情况
如:查看packages.xml中packageinstaller的权限信息:
<package name="com.android.packageinstaller" codePath="/system/priv-app/PackageInstaller" nativeLibraryPath="/system/priv-app/PackageInstaller/lib" publicFlags="810040901" privateFlags="8" ft="11e8f7d4c00" it="11e8f7d4c00" ut="11e8f7d4c00" version="29" userId="10049" isOrphaned="true">
<sigs count="1" schemeVersion="3">
<cert index="1" />
</sigs>
<perms>
<item name="android.permission.USE_RESERVED_DISK" granted="true" flags="0" />
<item name="android.permission.INSTALL_PACKAGES" granted="true" flags="0" />
<item name="android.permission.RECEIVE_BOOT_COMPLETED" granted="true" flags="0" />
<item name="android.permission.INTERACT_ACROSS_USERS_FULL" granted="true" flags="0" />
<item name="android.permission.PACKAGE_USAGE_STATS" granted="true" flags="0" />
<item name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME" granted="true" flags="0" />
<item name="android.permission.READ_INSTALL_SESSIONS" granted="true" flags="0" />
<item name="android.permission.MANAGE_USERS" granted="true" flags="0" />
<item name="android.permission.HIDE_NON_SYSTEM_OVERLAY_WINDOWS" granted="true" flags="0" />
<item name="android.permission.MANAGE_APP_OPS_MODES" granted="true" flags="0" />
<item name="android.permission.UPDATE_APP_OPS_STATS" granted="true" flags="0" />
<item name="android.permission.DELETE_PACKAGES" granted="true" flags="0" />
</perms>
<proper-signing-keyset identifier="1" />
</package>
文章浏览阅读1.6k次。安装配置gi、安装数据库软件、dbca建库见下:http://blog.csdn.net/kadwf123/article/details/784299611、检查集群节点及状态:[root@rac2 ~]# olsnodes -srac1 Activerac2 Activerac3 Activerac4 Active[root@rac2 ~]_12c查看crs状态
文章浏览阅读1.3w次,点赞45次,收藏99次。我个人用的是anaconda3的一个python集成环境,自带jupyter notebook,但在我打开jupyter notebook界面后,却找不到对应的虚拟环境,原来是jupyter notebook只是通用于下载anaconda时自带的环境,其他环境要想使用必须手动下载一些库:1.首先进入到自己创建的虚拟环境(pytorch是虚拟环境的名字)activate pytorch2.在该环境下下载这个库conda install ipykernelconda install nb__jupyter没有pytorch环境
文章浏览阅读5.2k次,点赞19次,收藏28次。选择scoop纯属意外,也是无奈,因为电脑用户被锁了管理员权限,所有exe安装程序都无法安装,只可以用绿色软件,最后被我发现scoop,省去了到处下载XXX绿色版的烦恼,当然scoop里需要管理员权限的软件也跟我无缘了(譬如everything)。推荐添加dorado这个bucket镜像,里面很多中文软件,但是部分国外的软件下载地址在github,可能无法下载。以上两个是官方bucket的国内镜像,所有软件建议优先从这里下载。上面可以看到很多bucket以及软件数。如果官网登陆不了可以试一下以下方式。_scoop-cn
文章浏览阅读4.5k次,点赞2次,收藏3次。首先要有一个color-picker组件 <el-color-picker v-model="headcolor"></el-color-picker>在data里面data() { return {headcolor: ’ #278add ’ //这里可以选择一个默认的颜色} }然后在你想要改变颜色的地方用v-bind绑定就好了,例如:这里的:sty..._vue el-color-picker
文章浏览阅读640次。基于芯片日益增长的问题,所以内核开发者们引入了新的方法,就是在内核中只保留函数,而数据则不包含,由用户(应用程序员)自己把数据按照规定的格式编写,并放在约定的地方,为了不占用过多的内存,还要求数据以根精简的方式编写。boot启动时,传参给内核,告诉内核设备树文件和kernel的位置,内核启动时根据地址去找到设备树文件,再利用专用的编译器去反编译dtb文件,将dtb还原成数据结构,以供驱动的函数去调用。firmware是三星的一个固件的设备信息,因为找不到固件,所以内核启动不成功。_exynos 4412 刷机
文章浏览阅读2w次,点赞24次,收藏42次。Linux系统配置jdkLinux学习教程,Linux入门教程(超详细)_linux配置jdk
文章浏览阅读3.3k次,点赞5次,收藏19次。xlabel('\delta');ylabel('AUC');具体符号的对照表参照下图:_matlab微米怎么输入
文章浏览阅读119次。顺序读写指的是按照文件中数据的顺序进行读取或写入。对于文本文件,可以使用fgets、fputs、fscanf、fprintf等函数进行顺序读写。在C语言中,对文件的操作通常涉及文件的打开、读写以及关闭。文件的打开使用fopen函数,而关闭则使用fclose函数。在C语言中,可以使用fread和fwrite函数进行二进制读写。 Biaoge 于2024-03-09 23:51发布 阅读量:7 ️文章类型:【 C语言程序设计 】在C语言中,用于打开文件的函数是____,用于关闭文件的函数是____。
文章浏览阅读3.4k次,点赞2次,收藏13次。跟随鼠标移动的粒子以grid(SOP)为partical(SOP)的资源模板,调整后连接【Geo组合+point spirit(MAT)】,在连接【feedback组合】适当调整。影响粒子动态的节点【metaball(SOP)+force(SOP)】添加mouse in(CHOP)鼠标位置到metaball的坐标,实现鼠标影响。..._touchdesigner怎么让一个模型跟着鼠标移动
文章浏览阅读178次。项目运行环境配置:Jdk1.8 + Tomcat7.0 + Mysql + HBuilderX(Webstorm也行)+ Eclispe(IntelliJ IDEA,Eclispe,MyEclispe,Sts都支持)。项目技术:Springboot + mybatis + Maven +mysql5.7或8.0+html+css+js等等组成,B/S模式 + Maven管理等等。环境需要1.运行环境:最好是java jdk 1.8,我们在这个平台上运行的。其他版本理论上也可以。_基于java技术的停车场管理系统实现与设计
文章浏览阅读3.5k次。前言对于MediaPlayer播放器的源码分析内容相对来说比较多,会从Java-&amp;gt;Jni-&amp;gt;C/C++慢慢分析,后面会慢慢更新。另外,博客只作为自己学习记录的一种方式,对于其他的不过多的评论。MediaPlayerDemopublic class MainActivity extends AppCompatActivity implements SurfaceHolder.Cal..._android多媒体播放源码分析 时序图
文章浏览阅读2.4k次,点赞41次,收藏13次。java 数据结构与算法 ——快速排序法_快速排序法