android 权限被拒绝,android – 为什么这些权限被拒绝?

只是为它的Heck,我请求所有的权限,从我的应用程序(hello世界),看看什么是授予的权限类型,什么是被拒绝的权限!对我的娱乐,我发现大约40的权限未授予!两个作为未知权限返回。

这是我拒绝的所有权限的日志 –

W/PackageManager( 61): Not granting permission android.permission.ACCESS_CHECKIN_PROPERTIES to package com.robosoft.linuxtop (protectionLevel=3 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.ACCESS_SURFACE_FLINGER to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.ACCOUNT_MANAGER to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.BIND_APPWIDGET to package com.robosoft.linuxtop (protectionLevel=3 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.BIND_DEVICE_ADMIN to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.BIND_INPUT_METHOD to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.BIND_WALLPAPER to package com.robosoft.linuxtop (protectionLevel=3 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.BRICK to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.BROADCAST_PACKAGE_REMOVED to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.BROADCAST_SMS to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.BROADCAST_WAP_PUSH to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.CALL_PRIVILEGED to package com.robosoft.linuxtop (protectionLevel=3 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.CHANGE_COMPONENT_ENABLED_STATE to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.CLEAR_APP_USER_DATA to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.CONTROL_LOCATION_UPDATES to package com.robosoft.linuxtop (protectionLevel=3 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.DELETE_CACHE_FILES to package com.robosoft.linuxtop (protectionLevel=3 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.DELETE_PACKAGES to package com.robosoft.linuxtop (protectionLevel=3 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.DEVICE_POWER to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.DIAGNOSTIC to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.FACTORY_TEST to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.FORCE_BACK to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.GLOBAL_SEARCH to package com.robosoft.linuxtop (protectionLevel=3 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.HARDWARE_TEST to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.INJECT_EVENTS to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.INSTALL_LOCATION_PROVIDER to package com.robosoft.linuxtop (protectionLevel=3 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.INSTALL_PACKAGES to package com.robosoft.linuxtop (protectionLevel=3 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.INTERNAL_SYSTEM_WINDOW to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.MANAGE_APP_TOKENS to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.MASTER_CLEAR to package com.robosoft.linuxtop (protectionLevel=3 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.READ_FRAME_BUFFER to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Unknown permission android.permission.READ_HISTORY_BOOKMARKS in package com.robosoft.linuxtop

W/PackageManager( 61): Not granting permission android.permission.READ_INPUT_STATE to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.REBOOT to package com.robosoft.linuxtop (protectionLevel=3 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.SET_ACTIVITY_WATCHER to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.SET_ORIENTATION to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.SET_PREFERRED_APPLICATIONS to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.SET_TIME to package com.robosoft.linuxtop (protectionLevel=3 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.STATUS_BAR to package com.robosoft.linuxtop (protectionLevel=3 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.UPDATE_DEVICE_STATS to package com.robosoft.linuxtop (protectionLevel=2 flags=0x8444)

W/PackageManager( 61): Not granting permission android.permission.WRITE_GSERVICES to package com.robosoft.linuxtop (protectionLevel=3 flags=0x8444)

W/PackageManager( 61): Unknown permission android.permission.WRITE_HISTORY_BOOKMARKS in package com.robosoft.linuxtop

W/PackageManager( 61): Not granting permission android.permission.WRITE_SECURE_SETTINGS to package com.robosoft.linuxtop (protectionLevel=3 flags=0x8444)

现在,事实上,我知道第二级权限不授予第三方应用程序开发人员,并且仅为OEM保留。但我很惊讶,因为很多三级权限已被拒绝给我(如果不是所有!)。因此,我的问题是,为什么是这样,我需要添加一些东西到我的清单,这些权限被接受?也不是系统应该授予我的权限模拟器,因为毕竟它的开发?它是否智能,因为它会拒绝它认为我的应用程序不合理的权限?是android系统高级,它理解代码?

我非常感谢,如果你可以解释我这个概念在几行,而不是指向我的常规权限和安全文档。我已经阅读了几次,我想我的理解缺乏在某些角度。因此,我更愿意阅读一些其他的尝试向我解释。谢谢

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
In the 2005 film adaptation of The Hitchhiker’s Guide to the Galaxy by Douglas Adams, aliens demolish the earth to make way for a hyperspace expressway. Our demise could have been averted insofar as the demolition proposal had been on file at local planning offices worldwide for some time. However, no one complained during the public comment period. Like construction proposals, no one ever bothers to read the preface to a programming book. Typically, that’s mostly harmless, but not for this book. Though you won’t be vaporized into star dust for jumping to Chapter 1 or later, you’ll be befuddled for not having downloaded and familiarized yourself with Firebug, our tool for learning JavaScript. JavaScript is a beginner-friendly programming language available in browsers such as Internet Explorer, Firefox, Safari, Opera, and Chrome. Those browsers contain a JavaScript interpreter to parse and run your JavaScript programs, which you write in plain text with a text editor. So, you can use the same text editor that you code your XHTML and CSS with. JavaScript derives its syntax, which is to say its grammar, from the ECMAScript standard and its features for manipulating XHTML, CSS, and HTTP from the DOM standard. Typically, JavaScript interpreters implement ECMAScript and DOM in separate libraries. So, just as your brain has left and right lobes, a browser’s JavaScript brain has ECMAScript and DOM lobes. In the first six chapters, we’ll converse with the ECMAScript lobe. Then we’ll converse with the DOM lobe for a couple of chapters. I guess you could say we’ll be picking a JavaScript’s brain one lobe at a time—ECMAScript and then DOM, with Firebug. Finally, in the last two chapters, we’ll hand-code an uber-cool JavaScript program with our preferred text editors. But we’ll never make it through Chapters 1–8 without Firebug. So, our first order of business will be to have you download and familiarize yourself with Firebug, a free add-on to Firefox for Windows, Mac, or Linux. Obviously, prior to installing a Firefox add-on like Firebug, you need to have Firefox. Note that Firefox is a free web browser for Windows, Mac OS X, or Linux. To download Firefox, go to www.mozilla.com, and click the Download Firefox – Free button, as displayed in Figure 1. Then follow the wizard to install Firefox on your computer. Open Firefox, and then download the Firebug add-on from www.getfirebug.com. Simply click Install Firebug for Firefox button in the top-right corner, as shown in Figure 2. Then follow the wizard, granting permission to install the add-on if prompted by Firefox.
Table of Contents Chapter 1: Introduction ....................................................................................... 7 Charitable Donation .............................................................................................. 8 Acknowledgement ................................................................................................ 8 About this Book .................................................................................................... 9 About you The Reader ........................................................................................... 9 About Hyperlinks ................................................................................................ 10 Disclaimer ......................................................................................................... 10 What’s New in SRM 4.0 ....................................................................................... 10 A Brief History of Life - before VMware SRM ........................................................... 12 What is not a DR Technology? .............................................................................. 13 What is VMware SRM? ......................................................................................... 15 What about File Level Consistency? ....................................................................... 16 Principles of Storage Management and Replication .................................................. 17 Storage Vendor Guides ........................................................................................ 22 Summary .......................................................................................................... 24 Chapter 2: Getting started with EMC Celerra Replicator .................................... 25 Creating an EMC Celerra iSCSI Target ................................................................... 28 Granting Access to ESX hosts to EMC Celerra iSCSI Target ...................................... 30 Creating a New File System ................................................................................. 33 Creating an iSCSI LUN ........................................................................................ 36 Configuring Celerra Replication ............................................................................. 39 Conclusion ......................................................................................................... 45 Chapter 3: Getting started with EMC Clariion MirrorView/S .............................. 47 Creating EMC LUN .............................................................................................. 49 Configure EMC MirrorView ................................................................................... 51 Creating a Snapshot for SRM Tests ....................................................................... 53 Creating Consistency Groups (Recommended) ....................................................... 55 Granting Access to ESX hosts to Clariion LUNs ....................................................... 55 Conclusion ......................................................................................................... 58 Chapter 4: Getting started with HP LeftHand Scheduled Remote Copy .............. 59 Some Frequently Asked Questions about HP LeftHand VSA ...................................... 60 Download and Upload the VSA ............................................................................. 61 Importing the HP Lefthand VSA ............................................................................ 62 Modifying the VSA’s Settings ................................................................................ 63 Licensed by Virtual MAC Address .......................................................................... 64 Primary Configuration of VSA Host ........................................................................ 65 Install Management Client ................................................................................... 66 Configure the VSA (Management Groups, Clusters & Volumes) ................................. 67 Licensing the VSA ............................................................................................... 72 Configuring VSA for Replication ............................................................................ 73 Monitoring your replication/snapshot .................................................................... 76 Adding ESX hosts & Allocating Volumes to Them .................................................... 78 Configuring the ESX Software iSCSI ...................................................................... 80 HP Lefthand - Create a Test Volume at the Recovery Site ........................................ 85 Shutting Down the VSA ....................................................................................... 90 Conclusion ......................................................................................................... 90 Chapter 5: Getting started with NetApp and SnapMirror ................................... 93 Provisioning NetApp storage for VMware ESX ......................................................... 95 Creating NetApp Volumes for NFS ......................................................................... 95 Modify the Export Properties ................................................................................ 99 Granting Access to ESX hosts to NetApp Volumes .................................................. 101 Creating NetApp Volumes for Fibre Channel and iSCSI ........................................... 102 Gaining Access to NetApp LUNs to ESX ................................................................. 107 Configure NetApp SnapMirror .............................................................................. 108 Introducing NetApp Rapid Clone Utility 3.0 and Virtual Storage Console ................... 114 Using the NetApp Virtual Storage Console ............................................................. 119 4 Conclusion ........................................................................................................ 125 Chapter 6: Installing VMware SRM .................................................................. 127 Architecture of VMware SRM ............................................................................... 128 VMware SRM Product Limitations and Gotchas ...................................................... 140 Licensing VMware SRM ....................................................................................... 142 Setting up the VMware SRM Database with Microsoft SQL 2005 ............................... 143 Installing VMware SRM Server ............................................................................. 152 Installing the vSphere Client SRM Plug-in ............................................................. 159 Failure to Connect to the SRM Server ................................................................... 160 Conclusion ........................................................................................................ 161 Chapter 7: Protection Site Configuration ......................................................... 163 Pairing the Protected and Recovery Site SRM together ........................................... 164 Configuring Array Managers – An Introduction ...................................................... 169 Configure Inventory Mappings ............................................................................. 193 Creating Protection Groups ................................................................................. 199 Failures to Protect a Virtual Machine .................................................................... 205 Conclusion ........................................................................................................ 207 Chapter 8: Recovery Site Configuration ........................................................... 209 Creating A Basic Full Site Recovery Plan ............................................................... 210 Testing Storage Configuration at the Recovery Site ................................................ 214 Overview: First Recovery Plan Test ...................................................................... 215 Practise: First Recovery Plan Test ........................................................................ 221 Controlling & Troubleshooting Recovery Plans ....................................................... 223 EMC Celerra and Testing Plans ............................................................................ 229 EMC Clariion and Testing Plans ............................................................................ 230 NetApp and Testing Plans ................................................................................... 231 HP Lefthand and Testing Plans ............................................................................ 232 Conclusion ........................................................................................................ 236 Chapter 9: Custom Recovery Plans .................................................................. 237 Configuring Shutdown of Protected Virtual Machines at the Protected Site ................ 239 Configuring Priority/Order for Recovery Virtual Machines ........................................ 242 Parallel Host Start-Up Order and Normal/Low ........................................................ 244 Adding Message Steps ....................................................................................... 244 Adding Command Steps ..................................................................................... 246 Adding Command Steps with PowerCLI ................................................................ 247 Adding Command Steps to Call Scripts with the VM ............................................... 250 Configure IP Address changes for Recovery Virtual Machines .................................. 251 Configure Bulk IP Address changes for Recovery Virtual Machine DR-IP-Exporter) ..... 256 Customized VM Mappings ................................................................................... 260 Managing Changes at the Protection Site .............................................................. 262 Managing Changes at the Recovery Site ............................................................... 268 Other Changes in the vSphere and SRM Environment ............................................. 268 Creating New VMs on New Networks and on New Storage....................................... 270 Storage VMotion and Protection Groups ................................................................ 275 Virtual Machines Stored on Multiple VMFS Datastores ............................................. 277 Virtual machines with Raw Device/Disk Mappings .................................................. 279 Multiple Protections Groups and Multiple Recovery Plans ........................................ 283 The Repair Array Manager’s Button ...................................................................... 286 Conclusion ........................................................................................................ 287 Chapter 10: Alarms, Exporting History and Access Control .............................. 289 vCenter “Linked Mode” and Site Recovery Manager ................................................ 290 Alarms Overview ............................................................................................... 292 Exporting & History ............................................................................................ 298 Access Control .................................................................................................. 301 Testing your Permissions .................................................................................... 307 Some Permission Limitations – Test & Run Plans ................................................... 308 VMware SRM Log Files........................................................................................ 310 5 Conclusions ...................................................................................................... 311 Chapter 11: Bi-Directional and Multi-Site Configurations ................................ 313 Configuring the Array Manager ............................................................................ 315 Configuring the Inventory Mappings ..................................................................... 316 Creating the Protection Group ............................................................................. 317 Creating the Recovery Plan ................................................................................. 317 Shared Site Configurations ................................................................................. 318 Decommissioning a Site ..................................................................................... 325 Conclusions ...................................................................................................... 325 Chapter 12: Failover and Failback ................................................................... 327 Considerations before Failover and Failback .......................................................... 329 Planned Failover – Protected Site is available ........................................................ 329 EMC Celerra and Running Plans ........................................................................... 332 EMC Clariion and Running Plans .......................................................................... 333 HP Lefthand and Running Plans ........................................................................... 335 NetApp and Running Plans .................................................................................. 335 Planned Failback – Protected Site is available ........................................................ 337 Clean-Up of the Planned Failback ......................................................................... 355 Unplanned Failover - Protected Site is DEAD ......................................................... 364 Planned Failback – Protected Site is BACK ............................................................ 367 Conclusions ...................................................................................................... 372 Chapter 13: Scripted Site Recovery ................................................................. 375 A Very Special Acknowledgement ........................................................................ 376 Part 1: Introduction - Automating VMware SRM ..................................................... 376 Part Two: Introduction – Recovery with Site Recovery Manager ............................... 380 Conclusions ...................................................................................................... 390 The End – Final Conclusions ............................................................................. 392

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值