OSDN Git Service

am e726495a: am fe5e7e92: Merge "docs: Fix issue with onCreate() method declaration...
[android-x86/frameworks-base.git] / core / res / AndroidManifest.xml
1 <?xml version="1.0" encoding="utf-8"?>
2 <!--
3 /* //device/apps/common/AndroidManifest.xml
4 **
5 ** Copyright 2006, The Android Open Source Project
6 **
7 ** Licensed under the Apache License, Version 2.0 (the "License");
8 ** you may not use this file except in compliance with the License.
9 ** You may obtain a copy of the License at
10 **
11 **     http://www.apache.org/licenses/LICENSE-2.0
12 **
13 ** Unless required by applicable law or agreed to in writing, software
14 ** distributed under the License is distributed on an "AS IS" BASIS,
15 ** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 ** See the License for the specific language governing permissions and
17 ** limitations under the License.
18 */
19 -->
20 <manifest xmlns:android="http://schemas.android.com/apk/res/android"
21     package="android" coreApp="true" android:sharedUserId="android.uid.system"
22     android:sharedUserLabel="@string/android_system_label">
23
24     <!-- ================================================ -->
25     <!-- Special broadcasts that only the system can send -->
26     <!-- ================================================ -->
27     <eat-comment />
28
29     <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
30     <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
31     <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
32     <protected-broadcast android:name="android.intent.action.TIME_SET" />
33     <protected-broadcast android:name="android.intent.action.TIME_TICK" />
34     <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
35     <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
36     <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
37     <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
38     <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
39     <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
40     <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
41     <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
42     <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
43     <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
44     <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
45     <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
46     <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
47     <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
48     <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
49     <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
50     <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
51     <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
52     <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
53     <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
54     <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
55     <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
56     <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
57     <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
58     <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
59     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
60     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
61     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
62     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
63     <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
64     <protected-broadcast android:name="android.intent.action.REBOOT" />
65     <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
66     <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
67     <protected-broadcast android:name="android.intent.action.USER_ADDED" />
68     <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
69     <protected-broadcast android:name="android.intent.action.USER_STARTING" />
70     <protected-broadcast android:name="android.intent.action.USER_STARTED" />
71     <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
72     <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
73     <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
74     <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
75     <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
76
77     <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
78     <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" />
79
80     <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
81     <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
82     <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
83     <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
84     <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" />
85
86     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
87     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
88     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
89     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
90     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
91     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
92
93     <protected-broadcast android:name="android.backup.intent.RUN" />
94     <protected-broadcast android:name="android.backup.intent.CLEAR" />
95     <protected-broadcast android:name="android.backup.intent.INIT" />
96
97     <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
98     <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
99     <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
100     <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
101     <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
102     <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
103     <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
104     <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
105     <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
106     <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
107     <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
108     <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
109     <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
110     <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
111     <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
112     <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
113     <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
114     <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
115     <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
116     <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
117     <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
118     <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
119     <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
120     <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
121     <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
122     <protected-broadcast
123         android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
124     <protected-broadcast
125         android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
126     <protected-broadcast
127         android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
128     <protected-broadcast
129         android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
130     <protected-broadcast
131         android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
132     <protected-broadcast
133         android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
134     <protected-broadcast
135         android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
136     <protected-broadcast
137         android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
138     <protected-broadcast
139         android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
140     <protected-broadcast
141         android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
142     <protected-broadcast
143         android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
144     <protected-broadcast
145         android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
146     <protected-broadcast
147         android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
148     <protected-broadcast
149         android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
150    <protected-broadcast
151         android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
152     <protected-broadcast
153         android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
154     <protected-broadcast
155         android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
156     <protected-broadcast
157         android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
158     <protected-broadcast
159         android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
160     <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" />
161     <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
162     <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
163     <protected-broadcast android:name="android.btopp.intent.action.LIST" />
164     <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
165     <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
166     <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
167     <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
168     <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
169     <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
170     <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
171     <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
172     <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
173     <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
174     <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
175
176     <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
177
178     <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
179     <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
180     <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
181     <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
182     <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
183
184     <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
185     <protected-broadcast android:name="android.media.action.ANALOG_AUDIO_DOCK_PLUG" />
186     <protected-broadcast android:name="android.media.action.DIGITAL_AUDIO_DOCK_PLUG" />
187     <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" />
188     <protected-broadcast android:name="android.media.action.USB_AUDIO_ACCESSORY_PLUG" />
189     <protected-broadcast android:name="android.media.action.USB_AUDIO_DEVICE_PLUG" />
190
191     <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
192     <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
193     <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
194     <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
195     <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
196     <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
197     <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
198     <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
199
200     <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
201     <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
202     <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
203     <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
204     <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
205     <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
206     <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
207     <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
208     <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
209     <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
210
211     <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
212     <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
213     <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
214     <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
215     <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
216
217     <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
218
219     <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" />
220     <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
221     <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
222     <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
223
224     <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
225     <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
226     <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
227
228     <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
229
230     <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
231     <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
232     <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
233     <protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" />
234
235     <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
236     <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
237     <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
238     <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
239     <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
240     <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
241     <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
242     <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
243     <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
244     <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
245     <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
246     <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
247     <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
248     <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
249     <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
250     <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
251     <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
252     <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
253     <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
254     <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
255     <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
256     <protected-broadcast
257             android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
258     <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
259     <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
260     <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
261     <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
262     <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
263     <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
264     <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
265     <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" />
266
267     <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
268     <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
269
270     <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
271
272     <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
273
274     <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" />
275
276     <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
277     <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
278     <protected-broadcast android:name="android.location.MODE_CHANGED" />
279     <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
280     <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
281
282     <protected-broadcast
283         android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
284
285     <!-- Defined in RestrictionsManager -->
286     <protected-broadcast
287         android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
288     <!-- Defined in RestrictionsManager -->
289
290     <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
291     <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
292     <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
293     <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
294     <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
295
296     <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SUBSCRIPTION_CHANGED" />
297     <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED" />
298     <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" />
299     <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" />
300     <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" />
301     <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" />
302
303     <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" />
304     <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" />
305
306     <!-- ====================================== -->
307     <!-- Permissions for things that cost money -->
308     <!-- ====================================== -->
309     <eat-comment />
310
311     <!-- Used for permissions that can be used to make the user spend money
312          without their direct involvement. -->
313     <permission-group android:name="android.permission-group.COST_MONEY"
314         android:label="@string/permgrouplab_costMoney"
315         android:description="@string/permgroupdesc_costMoney" />
316
317     <!-- ================================== -->
318     <!-- Permissions for accessing messages -->
319     <!-- ================================== -->
320     <eat-comment />
321
322     <!-- Used for permissions that allow an application to send messages
323          on behalf of the user or intercept messages being received by the
324          user.  This is primarily intended for SMS/MMS messaging, such as
325          receiving or reading an MMS. -->
326     <permission-group android:name="android.permission-group.MESSAGES"
327         android:label="@string/permgrouplab_messages"
328         android:icon="@drawable/perm_group_messages"
329         android:description="@string/permgroupdesc_messages"
330         android:permissionGroupFlags="personalInfo"
331         android:priority="360"/>
332
333     <!-- Allows an application to send SMS messages. -->
334     <permission android:name="android.permission.SEND_SMS"
335         android:permissionGroup="android.permission-group.MESSAGES"
336         android:protectionLevel="dangerous"
337         android:permissionFlags="costsMoney"
338         android:label="@string/permlab_sendSms"
339         android:description="@string/permdesc_sendSms" />
340
341     <!-- @SystemApi Allows an application (Phone) to send a request to other applications
342          to handle the respond-via-message action during incoming calls.
343          <p>Not for use by third-party applications. -->
344     <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
345         android:permissionGroup="android.permission-group.MESSAGES"
346         android:protectionLevel="signature|system"
347         android:label="@string/permlab_sendRespondViaMessageRequest"
348         android:description="@string/permdesc_sendRespondViaMessageRequest" />
349
350     <!-- Allows an application to monitor incoming SMS messages, to record
351          or perform processing on them. -->
352     <permission android:name="android.permission.RECEIVE_SMS"
353         android:permissionGroup="android.permission-group.MESSAGES"
354         android:protectionLevel="dangerous"
355         android:label="@string/permlab_receiveSms"
356         android:description="@string/permdesc_receiveSms" />
357
358     <!-- Allows an application to monitor incoming MMS messages, to record
359          or perform processing on them. -->
360     <permission android:name="android.permission.RECEIVE_MMS"
361         android:permissionGroup="android.permission-group.MESSAGES"
362         android:protectionLevel="dangerous"
363         android:label="@string/permlab_receiveMms"
364         android:description="@string/permdesc_receiveMms" />
365
366     <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
367          to record or display them to the user.
368          <p>Not for use by third-party applications.
369          @hide Pending API council approval -->
370     <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
371         android:permissionGroup="android.permission-group.MESSAGES"
372         android:protectionLevel="signature|system"
373         android:label="@string/permlab_receiveEmergencyBroadcast"
374         android:description="@string/permdesc_receiveEmergencyBroadcast" />
375
376     <!-- Allows an application to read previously received cell broadcast
377          messages and to register a content observer to get notifications when
378          a cell broadcast has been received and added to the database. For
379          emergency alerts, the database is updated immediately after the
380          alert dialog and notification sound/vibration/speech are presented.
381          The "read" column is then updated after the user dismisses the alert.
382          This enables supplementary emergency assistance apps to start loading
383          additional emergency information (if Internet access is available)
384          when the alert is first received, and to delay presenting the info
385          to the user until after the initial alert dialog is dismissed.
386          @hide Pending API council approval -->
387     <permission android:name="android.permission.READ_CELL_BROADCASTS"
388         android:permissionGroup="android.permission-group.MESSAGES"
389         android:protectionLevel="dangerous"
390         android:label="@string/permlab_readCellBroadcasts"
391         android:description="@string/permdesc_readCellBroadcasts" />
392
393     <!-- Allows an application to read SMS messages. -->
394     <permission android:name="android.permission.READ_SMS"
395         android:permissionGroup="android.permission-group.MESSAGES"
396         android:protectionLevel="dangerous"
397         android:label="@string/permlab_readSms"
398         android:description="@string/permdesc_readSms" />
399
400     <!-- Allows an application to write SMS messages. -->
401     <permission android:name="android.permission.WRITE_SMS"
402         android:permissionGroup="android.permission-group.MESSAGES"
403         android:protectionLevel="dangerous"
404         android:label="@string/permlab_writeSms"
405         android:description="@string/permdesc_writeSms" />
406
407     <!-- Allows an application to monitor incoming WAP push messages. -->
408     <permission android:name="android.permission.RECEIVE_WAP_PUSH"
409         android:permissionGroup="android.permission-group.MESSAGES"
410         android:protectionLevel="dangerous"
411         android:label="@string/permlab_receiveWapPush"
412         android:description="@string/permdesc_receiveWapPush" />
413
414     <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
415          or perform processing on them. -->
416     <!-- @hide -->
417     <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
418         android:permissionGroup="android.permission-group.MESSAGES"
419         android:protectionLevel="signature|system"
420         android:label="@string/permlab_receiveBluetoothMap"
421         android:description="@string/permdesc_receiveBluetoothMap" />
422
423     <!-- =============================================================== -->
424     <!-- Permissions for accessing social info (contacts and social) -->
425     <!-- =============================================================== -->
426     <eat-comment />
427
428     <!-- Used for permissions that provide access to the user's social connections,
429          such as contacts, call logs, social stream, etc.  This includes
430          both reading and writing of this data (which should generally be
431          expressed as two distinct permissions). -->
432
433     <permission-group android:name="android.permission-group.SOCIAL_INFO"
434         android:label="@string/permgrouplab_socialInfo"
435         android:icon="@drawable/perm_group_social_info"
436         android:description="@string/permgroupdesc_socialInfo"
437         android:permissionGroupFlags="personalInfo"
438         android:priority="320" />
439
440     <!-- Allows an application to read the user's contacts data. -->
441     <permission android:name="android.permission.READ_CONTACTS"
442         android:permissionGroup="android.permission-group.SOCIAL_INFO"
443         android:protectionLevel="dangerous"
444         android:label="@string/permlab_readContacts"
445         android:description="@string/permdesc_readContacts" />
446
447     <!-- Allows an application to write (but not read) the user's
448          contacts data. -->
449     <permission android:name="android.permission.WRITE_CONTACTS"
450         android:permissionGroup="android.permission-group.SOCIAL_INFO"
451         android:protectionLevel="dangerous"
452         android:label="@string/permlab_writeContacts"
453         android:description="@string/permdesc_writeContacts" />
454
455     <!-- @SystemApi @hide Allows an application to execute contacts directory search.
456          This should only be used by ContactsProvider.
457          <p>Not for use by third-party applications. -->
458     <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
459         android:permissionGroup="android.permission-group.PERSONAL_INFO"
460         android:protectionLevel="signature|system" />
461
462     <!-- Allows an application to read the user's call log.
463          <p class="note"><strong>Note:</strong> If your app uses the
464          {@link #READ_CONTACTS} permission and <em>both</em> your <a
465          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
466          minSdkVersion}</a> and <a
467          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
468          targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
469          grants your app this permission. If you don't need this permission, be sure your <a
470          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
471          targetSdkVersion}</a> is 16 or higher.</p> -->
472     <permission android:name="android.permission.READ_CALL_LOG"
473         android:permissionGroup="android.permission-group.SOCIAL_INFO"
474         android:protectionLevel="dangerous"
475         android:label="@string/permlab_readCallLog"
476         android:description="@string/permdesc_readCallLog" />
477
478     <!-- Allows an application to write (but not read) the user's
479          contacts data.
480          <p class="note"><strong>Note:</strong> If your app uses the
481          {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
482          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
483          minSdkVersion}</a> and <a
484          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
485          targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
486          grants your app this permission. If you don't need this permission, be sure your <a
487          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
488          targetSdkVersion}</a> is 16 or higher.</p>  -->
489     <permission android:name="android.permission.WRITE_CALL_LOG"
490         android:permissionGroup="android.permission-group.SOCIAL_INFO"
491         android:protectionLevel="dangerous"
492         android:label="@string/permlab_writeCallLog"
493         android:description="@string/permdesc_writeCallLog" />
494
495   <!-- Allows an application to read from the user's social stream.
496        @deprecated This functionality will be unsupported in the future; cursors returned
497        will be empty. Please do not use. -->
498     <permission android:name="android.permission.READ_SOCIAL_STREAM"
499         android:permissionGroup="android.permission-group.SOCIAL_INFO"
500         android:protectionLevel="dangerous"
501         android:label="@string/permlab_readSocialStream"
502         android:description="@string/permdesc_readSocialStream" />
503
504     <!-- Allows an application to write (but not read) the user's
505          social stream data.
506          @deprecated This functionality will be unsupported in the future; cursors returned
507          will be empty. Please do not use. -->
508     <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
509         android:permissionGroup="android.permission-group.SOCIAL_INFO"
510         android:protectionLevel="dangerous"
511         android:label="@string/permlab_writeSocialStream"
512         android:description="@string/permdesc_writeSocialStream" />
513
514     <!-- =============================================================== -->
515     <!-- Permissions for accessing information about the device owner    -->
516     <!-- =============================================================== -->
517     <eat-comment />
518
519     <!-- Used for permissions that provide access to information about the device
520          user such as profile information.  This includes both reading and
521          writing of this data (which should generally be expressed as two
522          distinct permissions). -->
523     <permission-group android:name="android.permission-group.PERSONAL_INFO"
524         android:label="@string/permgrouplab_personalInfo"
525         android:icon="@drawable/perm_group_personal_info"
526         android:description="@string/permgroupdesc_personalInfo"
527         android:permissionGroupFlags="personalInfo"
528         android:priority="310" />
529
530     <!-- Allows an application to read the user's personal profile data. -->
531     <permission android:name="android.permission.READ_PROFILE"
532         android:permissionGroup="android.permission-group.PERSONAL_INFO"
533         android:protectionLevel="dangerous"
534         android:label="@string/permlab_readProfile"
535         android:description="@string/permdesc_readProfile" />
536
537     <!-- Allows an application to write (but not read) the user's
538          personal profile data. -->
539     <permission android:name="android.permission.WRITE_PROFILE"
540         android:permissionGroup="android.permission-group.PERSONAL_INFO"
541         android:protectionLevel="dangerous"
542         android:label="@string/permlab_writeProfile"
543         android:description="@string/permdesc_writeProfile" />
544
545     <!-- Allows an application to access data from sensors that the user uses to
546          measure what is happening inside his/her body, such as heart rate. -->
547     <permission android:name="android.permission.BODY_SENSORS"
548         android:permissionGroup="android.permission-group.PERSONAL_INFO"
549         android:label="@string/permlab_bodySensors"
550         android:description="@string/permdesc_bodySensors" />
551
552     <!-- =============================================================== -->
553     <!-- Permissions for accessing the device calendar                   -->
554     <!-- =============================================================== -->
555     <eat-comment />
556
557     <!-- Used for permissions that provide access to the device
558          calendar to create / view events.-->
559     <permission-group android:name="android.permission-group.CALENDAR"
560         android:label="@string/permgrouplab_calendar"
561         android:icon="@drawable/perm_group_calendar"
562         android:description="@string/permgroupdesc_calendar"
563         android:permissionGroupFlags="personalInfo"
564         android:priority="290" />
565
566     <!-- Allows an application to read the user's calendar data. -->
567     <permission android:name="android.permission.READ_CALENDAR"
568         android:permissionGroup="android.permission-group.PERSONAL_INFO"
569         android:protectionLevel="dangerous"
570         android:label="@string/permlab_readCalendar"
571         android:description="@string/permdesc_readCalendar" />
572
573     <!-- Allows an application to write (but not read) the user's
574          calendar data. -->
575     <permission android:name="android.permission.WRITE_CALENDAR"
576         android:permissionGroup="android.permission-group.PERSONAL_INFO"
577         android:protectionLevel="dangerous"
578         android:label="@string/permlab_writeCalendar"
579         android:description="@string/permdesc_writeCalendar" />
580
581     <!-- =============================================================== -->
582     <!-- Permissions for accessing the user dictionary-->
583     <!-- =============================================================== -->
584     <eat-comment />
585
586     <!-- Used for permissions that provide access to the user
587          calendar to create / view events.-->
588     <permission-group android:name="android.permission-group.USER_DICTIONARY"
589         android:label="@string/permgrouplab_dictionary"
590         android:icon="@drawable/perm_group_user_dictionary"
591         android:description="@string/permgroupdesc_dictionary"
592         android:permissionGroupFlags="personalInfo"
593         android:priority="170" />
594
595     <!-- Allows an application to read the user dictionary. This should
596          really only be required by an IME, or a dictionary editor like
597          the Settings app. -->
598     <permission android:name="android.permission.READ_USER_DICTIONARY"
599         android:permissionGroup="android.permission-group.USER_DICTIONARY"
600         android:protectionLevel="dangerous"
601         android:label="@string/permlab_readDictionary"
602         android:description="@string/permdesc_readDictionary" />
603
604     <!-- Used for permissions that provide access to the user
605          calendar to create / view events.-->
606     <permission-group android:name="android.permission-group.WRITE_USER_DICTIONARY"
607         android:label="@string/permgrouplab_writeDictionary"
608         android:icon="@drawable/perm_group_user_dictionary_write"
609         android:description="@string/permgroupdesc_writeDictionary"
610         android:priority="160" />
611
612     <!-- Allows an application to write to the user dictionary. -->
613     <permission android:name="android.permission.WRITE_USER_DICTIONARY"
614         android:permissionGroup="android.permission-group.WRITE_USER_DICTIONARY"
615         android:protectionLevel="normal"
616         android:label="@string/permlab_writeDictionary"
617         android:description="@string/permdesc_writeDictionary" />
618
619     <!-- =============================================================== -->
620     <!-- Permissions for accessing the user bookmarks                    -->
621     <!-- =============================================================== -->
622     <eat-comment />
623
624     <!-- Used for permissions that provide access to the user
625          bookmarks and browser history.-->
626     <permission-group android:name="android.permission-group.BOOKMARKS"
627         android:label="@string/permgrouplab_bookmarks"
628         android:icon="@drawable/perm_group_bookmarks"
629         android:description="@string/permgroupdesc_bookmarks"
630         android:permissionGroupFlags="personalInfo"
631         android:priority="300" />
632
633     <!-- Allows an application to read (but not write) the user's
634         browsing history and bookmarks. -->
635     <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
636         android:permissionGroup="android.permission-group.BOOKMARKS"
637         android:label="@string/permlab_readHistoryBookmarks"
638         android:description="@string/permdesc_readHistoryBookmarks"
639         android:protectionLevel="dangerous" />
640
641     <!-- Allows an application to write (but not read) the user's
642         browsing history and bookmarks. -->
643     <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
644         android:permissionGroup="android.permission-group.BOOKMARKS"
645         android:label="@string/permlab_writeHistoryBookmarks"
646         android:description="@string/permdesc_writeHistoryBookmarks"
647         android:protectionLevel="dangerous" />
648
649     <!-- =============================================================== -->
650     <!-- Permissions for setting the device alarm                        -->
651     <!-- =============================================================== -->
652     <eat-comment />
653
654     <!-- Used for permissions that provide access to device alarms. -->
655     <permission-group android:name="android.permission-group.DEVICE_ALARMS"
656         android:label="@string/permgrouplab_deviceAlarms"
657         android:icon="@drawable/perm_group_device_alarms"
658         android:description="@string/permgroupdesc_deviceAlarms"
659         android:permissionGroupFlags="personalInfo"
660         android:priority="210" />
661
662     <!-- Allows an application to broadcast an Intent to set an alarm for the
663          user. -->
664     <permission android:name="com.android.alarm.permission.SET_ALARM"
665         android:permissionGroup="android.permission-group.DEVICE_ALARMS"
666         android:label="@string/permlab_setAlarm"
667         android:description="@string/permdesc_setAlarm"
668         android:protectionLevel="normal" />
669
670     <!-- =============================================================== -->
671     <!-- Permissions for accessing the user voicemail                    -->
672     <!-- =============================================================== -->
673     <eat-comment />
674
675     <!-- Used for permissions that provide access to the user voicemail box. -->
676     <permission-group android:name="android.permission-group.VOICEMAIL"
677         android:label="@string/permgrouplab_voicemail"
678         android:icon="@drawable/perm_group_voicemail"
679         android:description="@string/permgroupdesc_voicemail"
680         android:permissionGroupFlags="personalInfo"
681         android:priority="280" />
682
683     <!-- Allows an application to add voicemails into the system. -->
684     <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
685         android:permissionGroup="android.permission-group.VOICEMAIL"
686         android:protectionLevel="dangerous"
687         android:label="@string/permlab_addVoicemail"
688         android:description="@string/permdesc_addVoicemail" />
689
690     <!-- Allows an application to modify and remove existing voicemails in the system -->
691     <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
692         android:permissionGroup="android.permission-group.VOICEMAIL"
693         android:protectionLevel="system|signature"
694         android:label="@string/permlab_writeVoicemail"
695         android:description="@string/permdesc_writeVoicemail" />
696
697     <!-- Allows an application to read voicemails in the system. -->
698     <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
699         android:permissionGroup="android.permission-group.VOICEMAIL"
700         android:protectionLevel="system|signature"
701         android:label="@string/permlab_readVoicemail"
702         android:description="@string/permdesc_readVoicemail" />
703
704     <!-- =============================================== -->
705     <!-- Permissions for enabling accessibility features -->
706     <!-- =============================================== -->
707     <eat-comment />
708
709     <!-- Used for permissions that allow requesting certain accessibility features. -->
710     <permission-group android:name="android.permission-group.ACCESSIBILITY_FEATURES"
711         android:label="@string/permgrouplab_accessibilityFeatures"
712         android:icon="@drawable/perm_group_accessibility_features"
713         android:description="@string/permgroupdesc_accessibilityFeatures"
714         android:priority="380" />
715
716     <!-- ======================================= -->
717     <!-- Permissions for accessing location info -->
718     <!-- ======================================= -->
719     <eat-comment />
720
721     <!-- Used for permissions that allow access to the user's current
722          location. -->
723     <permission-group android:name="android.permission-group.LOCATION"
724         android:label="@string/permgrouplab_location"
725         android:icon="@drawable/perm_group_location"
726         android:description="@string/permgroupdesc_location"
727         android:permissionGroupFlags="personalInfo"
728         android:priority="330" />
729
730     <!-- Allows an app to access precise location from location sources such
731          as GPS, cell towers, and Wi-Fi. -->
732     <permission android:name="android.permission.ACCESS_FINE_LOCATION"
733         android:permissionGroup="android.permission-group.LOCATION"
734         android:protectionLevel="dangerous"
735         android:label="@string/permlab_accessFineLocation"
736         android:description="@string/permdesc_accessFineLocation" />
737
738     <!-- Allows an app to access approximate location derived from network location
739          sources such as cell towers and Wi-Fi. -->
740     <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
741         android:permissionGroup="android.permission-group.LOCATION"
742         android:protectionLevel="dangerous"
743         android:label="@string/permlab_accessCoarseLocation"
744         android:description="@string/permdesc_accessCoarseLocation" />
745
746     <!-- Allows an application to create mock location providers for testing -->
747     <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
748         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
749         android:protectionLevel="dangerous"
750         android:label="@string/permlab_accessMockLocation"
751         android:description="@string/permdesc_accessMockLocation" />
752
753     <!-- Allows an application to access extra location provider commands -->
754     <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
755         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
756         android:protectionLevel="normal"
757         android:label="@string/permlab_accessLocationExtraCommands"
758         android:description="@string/permdesc_accessLocationExtraCommands" />
759
760     <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
761     <p>Not for use by third-party applications. -->
762     <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
763         android:protectionLevel="signature|system"
764         android:label="@string/permlab_installLocationProvider"
765         android:description="@string/permdesc_installLocationProvider" />
766
767     <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
768          This should only be used by HDMI-CEC service.
769     -->
770     <permission android:name="android.permission.HDMI_CEC"
771         android:protectionLevel="signatureOrSystem" />
772
773     <!-- @SystemApi Allows an application to use location features in hardware,
774          such as the geofencing api.
775          <p>Not for use by third-party applications. -->
776     <permission android:name="android.permission.LOCATION_HARDWARE"
777         android:permissionGroup="android.permission-group.LOCATION"
778         android:protectionLevel="signature|system" />
779     <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
780
781     <!-- ======================================= -->
782     <!-- Permissions for accessing networks -->
783     <!-- ======================================= -->
784     <eat-comment />
785
786     <!-- Used for permissions that provide access to networking services.  The
787          main permission here is internet access, but this is also an
788          appropriate group for accessing or modifying any network configuration
789          or other related network operations. -->
790     <permission-group android:name="android.permission-group.NETWORK"
791         android:label="@string/permgrouplab_network"
792         android:icon="@drawable/perm_group_network"
793         android:description="@string/permgroupdesc_network"
794         android:priority="270" />
795
796     <!-- Allows applications to open network sockets. -->
797     <permission android:name="android.permission.INTERNET"
798         android:permissionGroup="android.permission-group.NETWORK"
799         android:protectionLevel="dangerous"
800         android:description="@string/permdesc_createNetworkSockets"
801         android:label="@string/permlab_createNetworkSockets" />
802
803     <!-- Allows applications to access information about networks -->
804     <permission android:name="android.permission.ACCESS_NETWORK_STATE"
805         android:permissionGroup="android.permission-group.NETWORK"
806         android:protectionLevel="normal"
807         android:description="@string/permdesc_accessNetworkState"
808         android:label="@string/permlab_accessNetworkState" />
809
810     <!-- Allows applications to access information about Wi-Fi networks -->
811     <permission android:name="android.permission.ACCESS_WIFI_STATE"
812         android:permissionGroup="android.permission-group.NETWORK"
813         android:protectionLevel="normal"
814         android:description="@string/permdesc_accessWifiState"
815         android:label="@string/permlab_accessWifiState" />
816
817     <!-- Allows applications to change Wi-Fi connectivity state -->
818     <permission android:name="android.permission.CHANGE_WIFI_STATE"
819         android:permissionGroup="android.permission-group.NETWORK"
820         android:protectionLevel="dangerous"
821         android:description="@string/permdesc_changeWifiState"
822         android:label="@string/permlab_changeWifiState" />
823
824     <!-- @SystemApi @hide Allows applications to read Wi-Fi credential.
825          <p>Not for use by third-party applications. -->
826     <permission android:name="android.permission.READ_WIFI_CREDENTIAL"
827         android:permissionGroup="android.permission-group.NETWORK"
828         android:protectionLevel="signature|system" />
829
830     <!-- @hide -->
831     <permission android:name="android.permission.ACCESS_WIMAX_STATE"
832         android:permissionGroup="android.permission-group.NETWORK"
833         android:protectionLevel="normal"
834         android:description="@string/permdesc_accessWimaxState"
835         android:label="@string/permlab_accessWimaxState" />
836
837     <!-- @hide -->
838     <permission android:name="android.permission.CHANGE_WIMAX_STATE"
839         android:permissionGroup="android.permission-group.NETWORK"
840         android:protectionLevel="dangerous"
841         android:description="@string/permdesc_changeWimaxState"
842         android:label="@string/permlab_changeWimaxState" />
843
844     <!-- Allows applications to act as network scorers. @hide @SystemApi-->
845     <!-- TODO: Change protection level to normal when unhiding this API. -->
846     <permission android:name="android.permission.SCORE_NETWORKS"
847         android:permissionGroup="android.permission-group.NETWORK"
848         android:protectionLevel="signature|system"
849         android:description="@string/permdesc_scoreNetworks"
850         android:label="@string/permlab_scoreNetworks" />
851
852     <!-- ======================================= -->
853     <!-- Permissions for short range, peripheral networks -->
854     <!-- ======================================= -->
855     <eat-comment />
856
857     <!-- Used for permissions that provide access to other devices through Bluetooth.-->
858     <permission-group android:name="android.permission-group.BLUETOOTH_NETWORK"
859         android:label="@string/permgrouplab_bluetoothNetwork"
860         android:icon="@drawable/perm_group_bluetooth"
861         android:description="@string/permgroupdesc_bluetoothNetwork"
862         android:priority="260" />
863
864     <!-- Allows applications to connect to paired bluetooth devices -->
865     <permission android:name="android.permission.BLUETOOTH"
866         android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
867         android:protectionLevel="dangerous"
868         android:description="@string/permdesc_bluetooth"
869         android:label="@string/permlab_bluetooth" />
870
871     <!-- Allows applications to discover and pair bluetooth devices -->
872     <permission android:name="android.permission.BLUETOOTH_ADMIN"
873         android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
874         android:protectionLevel="dangerous"
875         android:description="@string/permdesc_bluetoothAdmin"
876         android:label="@string/permlab_bluetoothAdmin" />
877
878     <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to
879          allow or disallow phonebook access or message access.
880          This is not available to third party applications. -->
881     <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
882         android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
883         android:protectionLevel="system|signature"
884         android:description="@string/permdesc_bluetoothPriv"
885         android:label="@string/permlab_bluetoothPriv" />
886
887     <!-- Control access to email providers exclusively for Bluetooth
888          @hide
889     -->
890     <permission android:name="android.permission.BLUETOOTH_MAP"
891         android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
892         android:protectionLevel="signature"
893         android:description="@string/permdesc_bluetoothMap"
894         android:label="@string/permlab_bluetoothMap" />
895
896     <!-- Allows bluetooth stack to access files
897          @hide This should only be used by Bluetooth apk.
898     -->
899     <permission android:name="android.permission.BLUETOOTH_STACK"
900         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
901         android:protectionLevel="signature" />
902
903     <!-- Allows applications to perform I/O operations over NFC -->
904     <permission android:name="android.permission.NFC"
905         android:permissionGroup="android.permission-group.NETWORK"
906         android:protectionLevel="dangerous"
907         android:description="@string/permdesc_nfc"
908         android:label="@string/permlab_nfc" />
909
910     <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
911          @hide -->
912     <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
913         android:permissionGroup="android.permission-group.NETWORK"
914         android:protectionLevel="signature|system" />
915
916     <!-- @SystemApi @hide -->
917     <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
918         android:permissionGroup="android.permission-group.NETWORK"
919         android:protectionLevel="signature|system" />
920
921     <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
922          @hide -->
923     <permission android:name="android.permission.LOOP_RADIO"
924         android:permissionGroup="android.permission-group.NETWORK"
925         android:protectionLevel="signature|system" />
926
927     <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
928          @hide
929     -->
930     <permission android:name="android.permission.NFC_HANDOVER_STATUS"
931                 android:label="@string/permlab_handoverStatus"
932                 android:description="@string/permdesc_handoverStatus"
933                 android:protectionLevel="signature|system" />
934
935     <!-- ================================== -->
936     <!-- Permissions for accessing accounts -->
937     <!-- ================================== -->
938     <eat-comment />
939
940     <!-- Permissions for direct access to the accounts managed
941          by the Account Manager. -->
942     <permission-group android:name="android.permission-group.ACCOUNTS"
943         android:label="@string/permgrouplab_accounts"
944         android:icon="@drawable/perm_group_accounts"
945         android:description="@string/permgroupdesc_accounts"
946         android:permissionGroupFlags="personalInfo"
947         android:priority="200" />
948
949     <!-- Allows access to the list of accounts in the Accounts Service -->
950     <permission android:name="android.permission.GET_ACCOUNTS"
951         android:permissionGroup="android.permission-group.ACCOUNTS"
952         android:protectionLevel="normal"
953         android:description="@string/permdesc_getAccounts"
954         android:label="@string/permlab_getAccounts" />
955
956     <!-- Allows an application to act as an AccountAuthenticator for
957          the AccountManager -->
958     <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
959         android:permissionGroup="android.permission-group.ACCOUNTS"
960         android:protectionLevel="dangerous"
961         android:label="@string/permlab_authenticateAccounts"
962         android:description="@string/permdesc_authenticateAccounts" />
963
964     <!-- Allows an application to request authtokens from the AccountManager -->
965     <permission android:name="android.permission.USE_CREDENTIALS"
966         android:permissionGroup="android.permission-group.ACCOUNTS"
967         android:protectionLevel="dangerous"
968         android:label="@string/permlab_useCredentials"
969         android:description="@string/permdesc_useCredentials" />
970
971     <!-- Allows an application to manage the list of accounts in the AccountManager -->
972     <permission android:name="android.permission.MANAGE_ACCOUNTS"
973         android:permissionGroup="android.permission-group.ACCOUNTS"
974         android:protectionLevel="dangerous"
975         android:label="@string/permlab_manageAccounts"
976         android:description="@string/permdesc_manageAccounts" />
977
978     <!-- @SystemApi Allows applications to call into AccountAuthenticators.
979     <p>Not for use by third-party applications. -->
980     <permission android:name="android.permission.ACCOUNT_MANAGER"
981         android:permissionGroup="android.permission-group.ACCOUNTS"
982         android:protectionLevel="signature"
983         android:description="@string/permdesc_accountManagerService"
984         android:label="@string/permlab_accountManagerService" />
985
986     <!-- ================================== -->
987     <!-- Permissions for accessing hardware that may effect battery life-->
988     <!-- ================================== -->
989     <eat-comment />
990
991     <!-- Used for permissions that provide direct access to the hardware on
992          the device that has an effect on battery life.  This includes vibrator,
993          flashlight,  etc. -->
994
995     <permission-group android:name="android.permission-group.AFFECTS_BATTERY"
996         android:label="@string/permgrouplab_affectsBattery"
997         android:icon="@drawable/perm_group_affects_battery"
998         android:description="@string/permgroupdesc_affectsBattery"
999         android:priority="180" />
1000
1001     <!-- Allows applications to enter Wi-Fi Multicast mode -->
1002     <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
1003         android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
1004         android:protectionLevel="dangerous"
1005         android:description="@string/permdesc_changeWifiMulticastState"
1006         android:label="@string/permlab_changeWifiMulticastState" />
1007
1008     <!-- Allows access to the vibrator -->
1009     <permission android:name="android.permission.VIBRATE"
1010         android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
1011         android:protectionLevel="normal"
1012         android:label="@string/permlab_vibrate"
1013         android:description="@string/permdesc_vibrate" />
1014
1015     <!-- Allows access to the flashlight -->
1016     <permission android:name="android.permission.FLASHLIGHT"
1017         android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
1018         android:protectionLevel="normal"
1019         android:label="@string/permlab_flashlight"
1020         android:description="@string/permdesc_flashlight" />
1021
1022     <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
1023          from dimming -->
1024     <permission android:name="android.permission.WAKE_LOCK"
1025         android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
1026         android:protectionLevel="normal"
1027         android:label="@string/permlab_wakeLock"
1028         android:description="@string/permdesc_wakeLock" />
1029
1030     <!-- Allows using the device's IR transmitter, if available -->
1031     <permission android:name="android.permission.TRANSMIT_IR"
1032         android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
1033         android:protectionLevel="normal"
1034         android:label="@string/permlab_transmitIr"
1035         android:description="@string/permdesc_transmitIr" />
1036
1037     <!-- ==================================================== -->
1038     <!-- Permissions related to changing audio settings   -->
1039     <!-- ==================================================== -->
1040     <eat-comment />
1041
1042     <!-- Used for permissions that provide direct access to speaker settings
1043          the device. -->
1044     <permission-group android:name="android.permission-group.AUDIO_SETTINGS"
1045         android:label="@string/permgrouplab_audioSettings"
1046         android:icon="@drawable/perm_group_audio_settings"
1047         android:description="@string/permgroupdesc_audioSettings"
1048         android:priority="130" />
1049
1050     <!-- Allows an application to modify global audio settings -->
1051     <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
1052         android:permissionGroup="android.permission-group.AUDIO_SETTINGS"
1053         android:protectionLevel="normal"
1054         android:label="@string/permlab_modifyAudioSettings"
1055         android:description="@string/permdesc_modifyAudioSettings" />
1056
1057     <!-- ================================== -->
1058     <!-- Permissions for accessing hardware -->
1059     <!-- ================================== -->
1060     <eat-comment />
1061
1062     <!-- Used for permissions that provide direct access to the hardware on
1063          the device.  This includes audio, the camera, vibrator, etc. -->
1064     <permission-group android:name="android.permission-group.HARDWARE_CONTROLS"
1065         android:label="@string/permgrouplab_hardwareControls"
1066         android:description="@string/permgroupdesc_hardwareControls"
1067         android:priority="260"/>
1068
1069     <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
1070          @hide -->
1071     <permission android:name="android.permission.MANAGE_USB"
1072         android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1073         android:protectionLevel="signature|system"
1074         android:label="@string/permlab_manageUsb"
1075         android:description="@string/permdesc_manageUsb" />
1076
1077     <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
1078          For use only by the device side MTP implementation.
1079          @hide -->
1080     <permission android:name="android.permission.ACCESS_MTP"
1081         android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1082         android:protectionLevel="signature|system"
1083         android:label="@string/permlab_accessMtp"
1084         android:description="@string/permdesc_accessMtp" />
1085
1086     <!-- Allows access to hardware peripherals.  Intended only for hardware testing.
1087     <p>Not for use by third-party applications. -->
1088     <permission android:name="android.permission.HARDWARE_TEST"
1089         android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1090         android:protectionLevel="signature"
1091         android:label="@string/permlab_hardware_test"
1092         android:description="@string/permdesc_hardware_test" />
1093
1094     <!-- @SystemApi Allows access to FM
1095          @hide This is not a third-party API (intended for system apps).-->
1096     <permission android:name="android.permission.ACCESS_FM_RADIO"
1097         android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1098         android:protectionLevel="signature|system"
1099         android:label="@string/permlab_fm"
1100         android:description="@string/permdesc_fm" />
1101
1102     <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
1103          @hide -->
1104     <permission android:name="android.permission.NET_ADMIN"
1105         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1106         android:protectionLevel="signature" />
1107
1108     <!-- Allows registration for remote audio playback. @hide -->
1109     <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
1110         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1111         android:protectionLevel="signature" />
1112
1113     <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
1114          built-in tuners and HDMI-in's.
1115          @hide This should only be used by OEM's TvInputService's.
1116     -->
1117     <permission android:name="android.permission.TV_INPUT_HARDWARE"
1118         android:protectionLevel="signatureOrSystem" />
1119
1120     <!-- @SystemApi Allows to capture a frame of TV input hardware such as
1121          built-in tuners and HDMI-in's.
1122          @hide <p>Not for use by third-party applications.
1123     -->
1124     <permission android:name="android.permission.CAPTURE_TV_INPUT"
1125         android:protectionLevel="signatureOrSystem" />
1126
1127     <!-- @hide Allows enabling/disabling OEM unlock
1128    <p>Not for use by third-party applications. -->
1129     <permission android:name="android.permission.OEM_UNLOCK_STATE"
1130                 android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1131                 android:protectionLevel="signature" />
1132
1133
1134     <!-- =========================================== -->
1135     <!-- Permissions associated with audio capture -->
1136     <!-- =========================================== -->
1137     <eat-comment />
1138
1139     <!-- Used for permissions that are associated with accessing
1140          microphone audio from the device. Note that phone calls also capture audio
1141          but are in a separate (more visible) permission group. -->
1142     <permission-group android:name="android.permission-group.MICROPHONE"
1143         android:label="@string/permgrouplab_microphone"
1144         android:icon="@drawable/perm_group_microphone"
1145         android:description="@string/permgroupdesc_microphone"
1146         android:permissionGroupFlags="personalInfo"
1147         android:priority="340" />
1148
1149     <!-- Allows an application to record audio -->
1150     <permission android:name="android.permission.RECORD_AUDIO"
1151         android:permissionGroup="android.permission-group.MICROPHONE"
1152         android:protectionLevel="dangerous"
1153         android:label="@string/permlab_recordAudio"
1154         android:description="@string/permdesc_recordAudio" />
1155
1156
1157     <!-- =========================================== -->
1158     <!-- Permissions associated with camera and image capture -->
1159     <!-- =========================================== -->
1160     <eat-comment />
1161
1162     <!-- Used for permissions that are associated with accessing
1163          camera or capturing images/video from the device. -->
1164     <permission-group android:name="android.permission-group.CAMERA"
1165         android:label="@string/permgrouplab_camera"
1166         android:icon="@drawable/perm_group_camera"
1167         android:description="@string/permgroupdesc_camera"
1168         android:permissionGroupFlags="personalInfo"
1169         android:priority="350" />
1170
1171     <!-- Required to be able to access the camera device.
1172          <p>This will automatically enforce the <a
1173          href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code
1174          &lt;uses-feature&gt;}</a> manifest element for <em>all</em> camera features.
1175          If you do not require all camera features or can properly operate if a camera
1176          is not available, then you must modify your manifest as appropriate in order to
1177          install on devices that don't support all camera features.</p> -->
1178     <permission android:name="android.permission.CAMERA"
1179         android:permissionGroup="android.permission-group.CAMERA"
1180         android:protectionLevel="dangerous"
1181         android:label="@string/permlab_camera"
1182         android:description="@string/permdesc_camera" />
1183
1184     <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
1185          a camera is in use by an application.
1186          @hide -->
1187     <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
1188         android:permissionGroup="android.permission-group.CAMERA"
1189         android:protectionLevel="signature|system"
1190         android:label="@string/permlab_cameraDisableTransmitLed"
1191         android:description="@string/permdesc_cameraDisableTransmitLed" />
1192
1193     <!-- =========================================== -->
1194     <!-- Permissions associated with telephony state -->
1195     <!-- =========================================== -->
1196     <eat-comment />
1197
1198     <!-- Used for permissions that are associated with accessing and modifying
1199          telephony state: placing calls, intercepting outgoing calls, reading
1200          and modifying the phone state. -->
1201     <permission-group android:name="android.permission-group.PHONE_CALLS"
1202         android:label="@string/permgrouplab_phoneCalls"
1203         android:icon="@drawable/perm_group_phone_calls"
1204         android:description="@string/permgroupdesc_phoneCalls"
1205         android:permissionGroupFlags="personalInfo"
1206         android:priority="370" />
1207
1208     <!-- Allows an application to see the number being dialed during an outgoing
1209          call with the option to redirect the call to a different number or
1210          abort the call altogether. -->
1211     <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
1212         android:permissionGroup="android.permission-group.PHONE_CALLS"
1213         android:protectionLevel="dangerous"
1214         android:label="@string/permlab_processOutgoingCalls"
1215         android:description="@string/permdesc_processOutgoingCalls" />
1216
1217     <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
1218          Does not include placing calls.
1219          <p>Not for use by third-party applications. -->
1220     <permission android:name="android.permission.MODIFY_PHONE_STATE"
1221         android:permissionGroup="android.permission-group.PHONE_CALLS"
1222         android:protectionLevel="signature|system"
1223         android:label="@string/permlab_modifyPhoneState"
1224         android:description="@string/permdesc_modifyPhoneState" />
1225
1226     <!-- Allows read only access to phone state.
1227          <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1228          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1229          minSdkVersion}</a> and <a
1230          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1231          targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1232          grants your app this permission. If you don't need this permission, be sure your <a
1233          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1234          targetSdkVersion}</a> is 4 or higher. -->
1235     <permission android:name="android.permission.READ_PHONE_STATE"
1236         android:permissionGroup="android.permission-group.PHONE_CALLS"
1237         android:protectionLevel="dangerous"
1238         android:label="@string/permlab_readPhoneState"
1239         android:description="@string/permdesc_readPhoneState" />
1240
1241     <!-- Allows read only access to precise phone state.
1242          @hide Pending API council approval -->
1243     <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
1244         android:permissionGroup="android.permission-group.PHONE_CALLS"
1245         android:protectionLevel="signature|system"
1246         android:label="@string/permlab_readPrecisePhoneState"
1247         android:description="@string/permdesc_readPrecisePhoneState" />
1248
1249     <!-- @SystemApi Allows read access to privileged phone state.
1250          @hide Used internally. -->
1251     <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
1252         android:permissionGroup="android.permission-group.PHONE_CALLS"
1253         android:protectionLevel="signature|system" />
1254
1255      <!-- Allows an application to initiate a phone call without going through
1256          the Dialer user interface for the user to confirm the call
1257          being placed. -->
1258     <permission android:name="android.permission.CALL_PHONE"
1259         android:permissionGroup="android.permission-group.PHONE_CALLS"
1260         android:protectionLevel="dangerous"
1261         android:permissionFlags="costsMoney"
1262         android:label="@string/permlab_callPhone"
1263         android:description="@string/permdesc_callPhone" />
1264
1265     <!-- Allows an application to use SIP service -->
1266     <permission android:name="android.permission.USE_SIP"
1267         android:permissionGroup="android.permission-group.PHONE_CALLS"
1268         android:protectionLevel="dangerous"
1269         android:description="@string/permdesc_use_sip"
1270         android:label="@string/permlab_use_sip" />
1271
1272     <!-- @SystemApi Allows an application to bind to InCallService implementations.
1273          @hide -->
1274     <permission android:name="android.permission.BIND_INCALL_SERVICE"
1275         android:permissionGroup="android.permission-group.PHONE_CALLS"
1276         android:protectionLevel="system|signature"
1277         android:description="@string/permdesc_bind_incall_service"
1278         android:label="@string/permlab_bind_incall_service" />
1279
1280     <!-- @SystemApi Allows an application to bind to ConnectionService implementations.
1281          @hide -->
1282     <permission android:name="android.permission.BIND_CONNECTION_SERVICE"
1283                 android:permissionGroup="android.permission-group.PHONE_CALLS"
1284                 android:protectionLevel="system|signature"
1285                 android:description="@string/permdesc_bind_connection_service"
1286                 android:label="@string/permlab_bind_connection_service" />
1287
1288     <!-- @SystemApi Allows an application to control the in-call experience.
1289          @hide -->
1290     <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE"
1291                 android:permissionGroup="android.permission-group.PHONE_CALLS"
1292                 android:protectionLevel="system|signature"
1293                 android:description="@string/permdesc_control_incall_experience"
1294                 android:label="@string/permlab_control_incall_experience" />
1295
1296     <!-- ================================== -->
1297     <!-- Permissions for sdcard interaction -->
1298     <!-- ================================== -->
1299     <eat-comment />
1300
1301     <!-- Group of permissions that are related to SD card access. -->
1302     <permission-group android:name="android.permission-group.STORAGE"
1303         android:label="@string/permgrouplab_storage"
1304         android:icon="@drawable/perm_group_storage"
1305         android:description="@string/permgroupdesc_storage"
1306         android:permissionGroupFlags="personalInfo"
1307         android:priority="240" />
1308
1309     <!-- Allows an application to read from external storage.
1310          <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
1311          granted this permission.</p>
1312          <p>This permission is enforced starting in API level 19.  Before API level 19, this
1313          permission is not enforced and all apps still have access to read from external storage.
1314          You can test your app with the permission enforced by enabling <em>Protect USB
1315          storage</em> under Developer options in the Settings app on a device running Android 4.1 or
1316          higher.</p>
1317          <p>Also starting in API level 19, this permission is <em>not</em> required to
1318          read/write files in your application-specific directories returned by
1319          {@link android.content.Context#getExternalFilesDir} and
1320          {@link android.content.Context#getExternalCacheDir}.
1321          <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1322          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1323          minSdkVersion}</a> and <a
1324          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1325          targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1326          grants your app this permission. If you don't need this permission, be sure your <a
1327          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1328          targetSdkVersion}</a> is 4 or higher.-->
1329     <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
1330         android:permissionGroup="android.permission-group.STORAGE"
1331         android:label="@string/permlab_sdcardRead"
1332         android:description="@string/permdesc_sdcardRead"
1333         android:protectionLevel="normal" />
1334
1335     <!-- Allows an application to write to external storage.
1336          <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1337          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1338          minSdkVersion}</a> and <a
1339          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1340          targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1341          grants your app this permission. If you don't need this permission, be sure your <a
1342          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1343          targetSdkVersion}</a> is 4 or higher.
1344          <p>Starting in API level 19, this permission is <em>not</em> required to
1345          read/write files in your application-specific directories returned by
1346          {@link android.content.Context#getExternalFilesDir} and
1347          {@link android.content.Context#getExternalCacheDir}. -->
1348     <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
1349         android:permissionGroup="android.permission-group.STORAGE"
1350         android:label="@string/permlab_sdcardWrite"
1351         android:description="@string/permdesc_sdcardWrite"
1352         android:protectionLevel="dangerous" />
1353
1354     <!-- @SystemApi Allows an application to write to internal media storage
1355          @hide  -->
1356     <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
1357         android:permissionGroup="android.permission-group.STORAGE"
1358         android:label="@string/permlab_mediaStorageWrite"
1359         android:description="@string/permdesc_mediaStorageWrite"
1360         android:protectionLevel="signature|system" />
1361
1362     <!-- Allows an application to manage access to documents, usually as part
1363          of a document picker. -->
1364     <permission android:name="android.permission.MANAGE_DOCUMENTS"
1365         android:permissionGroup="android.permission-group.STORAGE"
1366         android:label="@string/permlab_manageDocs"
1367         android:description="@string/permdesc_manageDocs"
1368         android:protectionLevel="signature" />
1369
1370     <!-- ================================== -->
1371     <!-- Permissions for screenlock         -->
1372     <!-- ================================== -->
1373     <eat-comment />
1374
1375     <!-- Group of permissions that are related to the screenlock. -->
1376     <permission-group android:name="android.permission-group.SCREENLOCK"
1377         android:label="@string/permgrouplab_screenlock"
1378         android:icon="@drawable/perm_group_screenlock"
1379         android:permissionGroupFlags="personalInfo"
1380         android:description="@string/permgroupdesc_screenlock"
1381         android:priority="230" />
1382
1383     <!-- Allows applications to disable the keyguard -->
1384     <permission android:name="android.permission.DISABLE_KEYGUARD"
1385         android:permissionGroup="android.permission-group.SCREENLOCK"
1386         android:protectionLevel="dangerous"
1387         android:description="@string/permdesc_disableKeyguard"
1388         android:label="@string/permlab_disableKeyguard" />
1389
1390     <!-- ================================== -->
1391     <!-- Permissions to access other installed applications  -->
1392     <!-- ================================== -->
1393     <eat-comment />
1394
1395     <!-- Group of permissions that are related to the other applications
1396          installed on the system.  Examples include such as listing
1397          running apps, or killing background processes. -->
1398     <permission-group android:name="android.permission-group.APP_INFO"
1399         android:label="@string/permgrouplab_appInfo"
1400         android:icon="@drawable/perm_group_app_info"
1401         android:description="@string/permgroupdesc_appInfo"
1402         android:priority="220" />
1403
1404     <!-- @deprecated No longer enforced. -->
1405     <permission android:name="android.permission.GET_TASKS"
1406         android:permissionGroup="android.permission-group.APP_INFO"
1407         android:protectionLevel="normal"
1408         android:label="@string/permlab_getTasks"
1409         android:description="@string/permdesc_getTasks" />
1410
1411     <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really
1412          give access to task information.  We need this new one because there are
1413          many existing apps that use add libraries and such that have validation
1414          code to ensure the app has requested the GET_TASKS permission by seeing
1415          if it has been granted the permission...  if it hasn't, it kills the app
1416          with a message about being upset.  So we need to have it continue to look
1417          like the app is getting that permission, even though it will never be
1418          checked, and new privileged apps can now request this one for real access.
1419          @hide
1420          @SystemApi -->
1421     <permission android:name="android.permission.REAL_GET_TASKS"
1422         android:permissionGroup="android.permission-group.APP_INFO"
1423         android:protectionLevel="signature|system"
1424         android:label="@string/permlab_getTasks"
1425         android:description="@string/permdesc_getTasks" />
1426
1427     <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo.
1428          @hide -->
1429     <permission android:name="android.permission.START_TASKS_FROM_RECENTS"
1430         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1431         android:protectionLevel="signature|system"
1432         android:label="@string/permlab_startTasksFromRecents"
1433         android:description="@string/permdesc_startTasksFromRecents" />
1434
1435     <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
1436          across the users on the device, using singleton services and
1437          user-targeted broadcasts.  This permission is not available to
1438          third party applications. -->
1439     <permission android:name="android.permission.INTERACT_ACROSS_USERS"
1440         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1441         android:protectionLevel="signature|system|development"
1442         android:label="@string/permlab_interactAcrossUsers"
1443         android:description="@string/permdesc_interactAcrossUsers" />
1444
1445     <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
1446          that removes restrictions on where broadcasts can be sent and allows other
1447          types of interactions. -->
1448     <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
1449         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1450         android:protectionLevel="signature"
1451         android:label="@string/permlab_interactAcrossUsersFull"
1452         android:description="@string/permdesc_interactAcrossUsersFull" />
1453
1454     <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
1455          users on the device. This permission is not available to
1456          third party applications. -->
1457     <permission android:name="android.permission.MANAGE_USERS"
1458         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1459         android:protectionLevel="signature|system"
1460         android:label="@string/permlab_manageUsers"
1461         android:description="@string/permdesc_manageUsers" />
1462
1463     <!-- Allows an application to get full detailed information about
1464          recently running tasks, with full fidelity to the real state.
1465          @hide -->
1466     <permission android:name="android.permission.GET_DETAILED_TASKS"
1467         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1468         android:protectionLevel="signature"
1469         android:label="@string/permlab_getDetailedTasks"
1470         android:description="@string/permdesc_getDetailedTasks" />
1471
1472     <!-- Allows an application to change the Z-order of tasks -->
1473     <permission android:name="android.permission.REORDER_TASKS"
1474         android:permissionGroup="android.permission-group.APP_INFO"
1475         android:protectionLevel="normal"
1476         android:label="@string/permlab_reorderTasks"
1477         android:description="@string/permdesc_reorderTasks" />
1478
1479     <!-- @hide Allows an application to change to remove/kill tasks -->
1480     <permission android:name="android.permission.REMOVE_TASKS"
1481         android:permissionGroup="android.permission-group.APP_INFO"
1482         android:protectionLevel="signature"
1483         android:label="@string/permlab_removeTasks"
1484         android:description="@string/permdesc_removeTasks" />
1485
1486     <!-- @SystemApi @hide Allows an application to create/manage/remove stacks -->
1487     <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
1488         android:permissionGroup="android.permission-group.APP_INFO"
1489         android:protectionLevel="signature|system"
1490         android:label="@string/permlab_manageActivityStacks"
1491         android:description="@string/permdesc_manageActivityStacks" />
1492
1493     <!-- Allows an application to start any activity, regardless of permission
1494          protection or exported state. @hide -->
1495     <permission android:name="android.permission.START_ANY_ACTIVITY"
1496         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1497         android:protectionLevel="signature"
1498         android:label="@string/permlab_startAnyActivity"
1499         android:description="@string/permdesc_startAnyActivity" />
1500
1501     <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
1502         API is no longer supported. -->
1503     <permission android:name="android.permission.RESTART_PACKAGES"
1504         android:permissionGroup="android.permission-group.APP_INFO"
1505         android:protectionLevel="normal"
1506         android:label="@string/permlab_killBackgroundProcesses"
1507         android:description="@string/permdesc_killBackgroundProcesses" />
1508
1509     <!-- Allows an application to call
1510         {@link android.app.ActivityManager#killBackgroundProcesses}. -->
1511     <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
1512         android:permissionGroup="android.permission-group.APP_INFO"
1513         android:protectionLevel="normal"
1514         android:label="@string/permlab_killBackgroundProcesses"
1515         android:description="@string/permdesc_killBackgroundProcesses" />
1516
1517     <!-- ================================== -->
1518     <!-- Permissions affecting the display of other applications  -->
1519     <!-- ================================== -->
1520     <eat-comment />
1521
1522     <!-- Group of permissions that allow manipulation of how
1523          another application displays UI to the user. -->
1524     <permission-group android:name="android.permission-group.DISPLAY"
1525         android:label="@string/permgrouplab_display"
1526         android:icon="@drawable/perm_group_display"
1527         android:description="@string/permgroupdesc_display"
1528         android:priority="190"/>
1529
1530     <!-- Allows an application to open windows using the type
1531          {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT},
1532          shown on top of all other applications.  Very few applications
1533          should use this permission; these windows are intended for
1534          system-level interaction with the user. -->
1535     <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
1536         android:permissionGroup="android.permission-group.DISPLAY"
1537         android:protectionLevel="dangerous"
1538         android:label="@string/permlab_systemAlertWindow"
1539         android:description="@string/permdesc_systemAlertWindow" />
1540
1541     <!-- ================================== -->
1542     <!-- Permissions affecting the system wallpaper -->
1543     <!-- ================================== -->
1544     <eat-comment />
1545
1546     <!-- Group of permissions that allow manipulation of how
1547          another application displays UI to the user. -->
1548     <permission-group android:name="android.permission-group.WALLPAPER"
1549         android:label="@string/permgrouplab_wallpaper"
1550         android:icon="@drawable/perm_group_wallpaper"
1551         android:description="@string/permgroupdesc_wallpaper"
1552         android:priority="150" />
1553
1554     <!-- Allows applications to set the wallpaper -->
1555     <permission android:name="android.permission.SET_WALLPAPER"
1556         android:permissionGroup="android.permission-group.WALLPAPER"
1557         android:protectionLevel="normal"
1558         android:label="@string/permlab_setWallpaper"
1559         android:description="@string/permdesc_setWallpaper" />
1560
1561     <!-- Allows applications to set the wallpaper hints -->
1562     <permission android:name="android.permission.SET_WALLPAPER_HINTS"
1563         android:permissionGroup="android.permission-group.WALLPAPER"
1564         android:protectionLevel="normal"
1565         android:label="@string/permlab_setWallpaperHints"
1566         android:description="@string/permdesc_setWallpaperHints" />
1567
1568     <!-- ============================================ -->
1569     <!-- Permissions for changing the system clock -->
1570     <!-- ============================================ -->
1571     <eat-comment />
1572
1573     <!-- Group of permissions that are related to system clock. -->
1574     <permission-group android:name="android.permission-group.SYSTEM_CLOCK"
1575         android:label="@string/permgrouplab_systemClock"
1576         android:icon="@drawable/perm_group_system_clock"
1577         android:description="@string/permgroupdesc_systemClock"
1578         android:priority="140" />
1579
1580     <!-- @SystemApi Allows applications to set the system time.
1581     <p>Not for use by third-party applications. -->
1582     <permission android:name="android.permission.SET_TIME"
1583         android:protectionLevel="signature|system"
1584         android:label="@string/permlab_setTime"
1585         android:description="@string/permdesc_setTime" />
1586
1587     <!-- Allows applications to set the system time zone -->
1588     <permission android:name="android.permission.SET_TIME_ZONE"
1589         android:permissionGroup="android.permission-group.SYSTEM_CLOCK"
1590         android:protectionLevel="normal"
1591         android:label="@string/permlab_setTimeZone"
1592         android:description="@string/permdesc_setTimeZone" />
1593
1594     <!-- ==================================================== -->
1595     <!-- Permissions related to changing status bar   -->
1596     <!-- ==================================================== -->
1597     <eat-comment />
1598
1599     <!-- Used for permissions that change the status bar -->
1600     <permission-group android:name="android.permission-group.STATUS_BAR"
1601         android:label="@string/permgrouplab_statusBar"
1602         android:icon="@drawable/perm_group_status_bar"
1603         android:description="@string/permgroupdesc_statusBar"
1604         android:priority="110" />
1605
1606     <!-- Allows an application to expand or collapse the status bar. -->
1607     <permission android:name="android.permission.EXPAND_STATUS_BAR"
1608         android:permissionGroup="android.permission-group.STATUS_BAR"
1609         android:protectionLevel="normal"
1610         android:label="@string/permlab_expandStatusBar"
1611         android:description="@string/permdesc_expandStatusBar" />
1612
1613     <!-- ============================================================== -->
1614     <!-- Permissions related to adding/removing shortcuts from Launcher -->
1615     <!-- ============================================================== -->
1616     <eat-comment />
1617
1618     <!-- Allows an application to install a shortcut in Launcher -->
1619     <permission
1620         android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
1621         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1622         android:protectionLevel="dangerous"
1623         android:label="@string/permlab_install_shortcut"
1624         android:description="@string/permdesc_install_shortcut" />
1625
1626         <!-- Allows an application to uninstall a shortcut in Launcher -->
1627     <permission
1628         android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
1629         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1630         android:protectionLevel="dangerous"
1631         android:label="@string/permlab_uninstall_shortcut"
1632         android:description="@string/permdesc_uninstall_shortcut"/>
1633
1634     <!-- ==================================================== -->
1635     <!-- Permissions related to accessing sync settings   -->
1636     <!-- ==================================================== -->
1637     <eat-comment />
1638
1639     <!-- Used for permissions that access the sync settings or sync
1640          related information. -->
1641     <permission-group android:name="android.permission-group.SYNC_SETTINGS"
1642         android:label="@string/permgrouplab_syncSettings"
1643         android:icon="@drawable/perm_group_sync_settings"
1644         android:description="@string/permgroupdesc_syncSettings"
1645         android:priority="120" />
1646
1647     <!-- Allows applications to read the sync settings -->
1648     <permission android:name="android.permission.READ_SYNC_SETTINGS"
1649         android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1650         android:protectionLevel="normal"
1651         android:description="@string/permdesc_readSyncSettings"
1652         android:label="@string/permlab_readSyncSettings" />
1653
1654     <!-- Allows applications to write the sync settings -->
1655     <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
1656         android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1657         android:protectionLevel="normal"
1658         android:description="@string/permdesc_writeSyncSettings"
1659         android:label="@string/permlab_writeSyncSettings" />
1660
1661     <!-- Allows applications to read the sync stats -->
1662     <permission android:name="android.permission.READ_SYNC_STATS"
1663         android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1664         android:protectionLevel="normal"
1665         android:description="@string/permdesc_readSyncStats"
1666         android:label="@string/permlab_readSyncStats" />
1667
1668
1669     <!-- ============================================ -->
1670     <!-- Permissions for low-level system interaction -->
1671     <!-- ============================================ -->
1672     <eat-comment />
1673
1674     <!-- Group of permissions that are related to system APIs.  Many
1675          of these are not permissions the user will be expected to understand,
1676          and such permissions should generally be marked as "normal" protection
1677          level so they don't get displayed.  This can also, however, be used
1678          for miscellaneous features that provide access to the operating system,
1679          such as writing the global system settings. -->
1680     <permission-group android:name="android.permission-group.SYSTEM_TOOLS"
1681         android:label="@string/permgrouplab_systemTools"
1682         android:icon="@drawable/perm_group_system_tools"
1683         android:description="@string/permgroupdesc_systemTools"
1684         android:priority="100" />
1685
1686     <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
1687     <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
1688         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1689         android:protectionLevel="signature"
1690         android:label="@string/permlab_setScreenCompatibility"
1691         android:description="@string/permdesc_setScreenCompatibility" />
1692
1693     <!-- Allows an application to access all multi-user external storage @hide -->
1694     <permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE"
1695         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1696         android:label="@string/permlab_sdcardAccessAll"
1697         android:description="@string/permdesc_sdcardAccessAll"
1698         android:protectionLevel="signature" />
1699
1700     <!-- @SystemApi Allows an application to modify the current configuration, such
1701          as locale. -->
1702     <permission android:name="android.permission.CHANGE_CONFIGURATION"
1703         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1704         android:protectionLevel="signature|system|development"
1705         android:label="@string/permlab_changeConfiguration"
1706         android:description="@string/permdesc_changeConfiguration" />
1707
1708     <!-- Allows an application to read or write the system settings. -->
1709     <permission android:name="android.permission.WRITE_SETTINGS"
1710         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1711         android:protectionLevel="normal"
1712         android:label="@string/permlab_writeSettings"
1713         android:description="@string/permdesc_writeSettings" />
1714
1715     <!-- @SystemApi Allows an application to modify the Google service map.
1716     <p>Not for use by third-party applications. -->
1717     <permission android:name="android.permission.WRITE_GSERVICES"
1718         android:protectionLevel="signature|system"
1719         android:label="@string/permlab_writeGservices"
1720         android:description="@string/permdesc_writeGservices" />
1721
1722     <!-- @SystemApi Allows an application to call
1723         {@link android.app.ActivityManager#forceStopPackage}.
1724         @hide -->
1725     <permission android:name="android.permission.FORCE_STOP_PACKAGES"
1726         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1727         android:protectionLevel="signature|system"
1728         android:label="@string/permlab_forceStopPackages"
1729         android:description="@string/permdesc_forceStopPackages" />
1730
1731     <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
1732          An active window is the window that has fired an accessibility event. -->
1733     <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
1734         android:permissionGroup="android.permission-group.PERSONAL_INFO"
1735         android:protectionLevel="signature|system"
1736         android:label="@string/permlab_retrieve_window_content"
1737         android:description="@string/permdesc_retrieve_window_content" />
1738
1739     <!-- @SystemApi Modify the global animation scaling factor.
1740     <p>Not for use by third-party applications. -->
1741     <permission android:name="android.permission.SET_ANIMATION_SCALE"
1742         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1743         android:protectionLevel="signature|system|development"
1744         android:label="@string/permlab_setAnimationScale"
1745         android:description="@string/permdesc_setAnimationScale" />
1746
1747     <!-- @deprecated This functionality will be removed in the future; please do
1748          not use. Allow an application to make its activities persistent. -->
1749     <permission android:name="android.permission.PERSISTENT_ACTIVITY"
1750         android:permissionGroup="android.permission-group.APP_INFO"
1751         android:protectionLevel="normal"
1752         android:label="@string/permlab_persistentActivity"
1753         android:description="@string/permdesc_persistentActivity" />
1754
1755     <!-- Allows an application to find out the space used by any package. -->
1756     <permission android:name="android.permission.GET_PACKAGE_SIZE"
1757         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1758         android:protectionLevel="normal"
1759         android:label="@string/permlab_getPackageSize"
1760         android:description="@string/permdesc_getPackageSize" />
1761
1762     <!-- @deprecated No longer useful, see
1763          {@link android.content.pm.PackageManager#addPackageToPreferred}
1764          for details. -->
1765     <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
1766         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1767         android:protectionLevel="signature"
1768         android:label="@string/permlab_setPreferredApplications"
1769         android:description="@string/permdesc_setPreferredApplications" />
1770
1771     <!-- Allows an application to receive the
1772          {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
1773          broadcast after the system finishes booting.  If you don't
1774          request this permission, you will not receive the broadcast at
1775          that time.  Though holding this permission does not have any
1776          security implications, it can have a negative impact on the
1777          user experience by increasing the amount of time it takes the
1778          system to start and allowing applications to have themselves
1779          running without the user being aware of them.  As such, you must
1780          explicitly declare your use of this facility to make that visible
1781          to the user. -->
1782     <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
1783         android:permissionGroup="android.permission-group.APP_INFO"
1784         android:protectionLevel="normal"
1785         android:label="@string/permlab_receiveBootCompleted"
1786         android:description="@string/permdesc_receiveBootCompleted" />
1787
1788     <!-- Allows an application to broadcast sticky intents.  These are
1789          broadcasts whose data is held by the system after being finished,
1790          so that clients can quickly retrieve that data without having
1791          to wait for the next broadcast. -->
1792     <permission android:name="android.permission.BROADCAST_STICKY"
1793         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1794         android:protectionLevel="normal"
1795         android:label="@string/permlab_broadcastSticky"
1796         android:description="@string/permdesc_broadcastSticky" />
1797
1798     <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
1799     <p>Not for use by third-party applications.-->
1800     <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
1801         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1802         android:protectionLevel="system|signature"
1803         android:label="@string/permlab_mount_unmount_filesystems"
1804         android:description="@string/permdesc_mount_unmount_filesystems" />
1805
1806     <!-- @SystemApi Allows formatting file systems for removable storage.
1807     <p>Not for use by third-party applications. -->
1808     <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
1809         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1810         android:protectionLevel="system|signature"
1811         android:label="@string/permlab_mount_format_filesystems"
1812         android:description="@string/permdesc_mount_format_filesystems" />
1813
1814     <!-- Allows access to ASEC non-destructive API calls
1815          @hide  -->
1816     <permission android:name="android.permission.ASEC_ACCESS"
1817         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1818         android:protectionLevel="signature"
1819         android:label="@string/permlab_asec_access"
1820         android:description="@string/permdesc_asec_access" />
1821
1822     <!-- Allows creation of ASEC volumes
1823          @hide  -->
1824     <permission android:name="android.permission.ASEC_CREATE"
1825         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1826         android:protectionLevel="signature"
1827         android:label="@string/permlab_asec_create"
1828         android:description="@string/permdesc_asec_create" />
1829
1830     <!-- Allows destruction of ASEC volumes
1831          @hide  -->
1832     <permission android:name="android.permission.ASEC_DESTROY"
1833         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1834         android:protectionLevel="signature"
1835         android:label="@string/permlab_asec_destroy"
1836         android:description="@string/permdesc_asec_destroy" />
1837
1838     <!-- Allows mount / unmount of ASEC volumes
1839          @hide  -->
1840     <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
1841         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1842         android:protectionLevel="signature"
1843         android:label="@string/permlab_asec_mount_unmount"
1844         android:description="@string/permdesc_asec_mount_unmount" />
1845
1846     <!-- Allows rename of ASEC volumes
1847          @hide  -->
1848     <permission android:name="android.permission.ASEC_RENAME"
1849         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1850         android:protectionLevel="signature"
1851         android:label="@string/permlab_asec_rename"
1852         android:description="@string/permdesc_asec_rename" />
1853
1854     <!-- @SystemApi Allows applications to write the apn settings.
1855     <p>Not for use by third-party applications. -->
1856     <permission android:name="android.permission.WRITE_APN_SETTINGS"
1857                 android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1858                 android:protectionLevel="signature|system"
1859                 android:description="@string/permdesc_writeApnSettings"
1860                 android:label="@string/permlab_writeApnSettings" />
1861
1862     <!-- Allows an application to allow access the subscribed feeds
1863          ContentProvider. -->
1864     <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
1865         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1866         android:label="@string/permlab_subscribedFeedsRead"
1867         android:description="@string/permdesc_subscribedFeedsRead"
1868         android:protectionLevel="normal" />
1869     <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
1870         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1871         android:label="@string/permlab_subscribedFeedsWrite"
1872         android:description="@string/permdesc_subscribedFeedsWrite"
1873         android:protectionLevel="dangerous" />
1874
1875     <!-- Allows applications to change network connectivity state -->
1876     <permission android:name="android.permission.CHANGE_NETWORK_STATE"
1877         android:permissionGroup="android.permission-group.NETWORK"
1878         android:protectionLevel="normal"
1879         android:description="@string/permdesc_changeNetworkState"
1880         android:label="@string/permlab_changeNetworkState" />
1881
1882     <!-- Allows an application to clear the caches of all installed
1883          applications on the device.  -->
1884     <permission android:name="android.permission.CLEAR_APP_CACHE"
1885         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1886         android:protectionLevel="dangerous"
1887         android:label="@string/permlab_clearAppCache"
1888         android:description="@string/permdesc_clearAppCache" />
1889
1890     <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
1891          @hide -->
1892     <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
1893         android:protectionLevel="signature|system"
1894         android:label="@string/permlab_anyCodecForPlayback"
1895         android:description="@string/permdesc_anyCodecForPlayback" />
1896
1897     <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
1898          behalf of the user.
1899          @hide -->
1900     <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
1901         android:protectionLevel="signature|system"
1902         android:label="@string/permlab_manageCaCertificates"
1903         android:description="@string/permdesc_manageCaCertificates" />
1904
1905     <!-- @SystemApi Allows an application to do certain operations needed for
1906          interacting with the recovery (system update) system.
1907          @hide -->
1908     <permission android:name="android.permission.RECOVERY"
1909         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1910         android:protectionLevel="signature|system"
1911         android:label="@string/permlab_recovery"
1912         android:description="@string/permdesc_recovery" />
1913
1914     <!-- Allows the system to bind to an application's task services
1915          @hide -->
1916     <permission android:name="android.permission.BIND_JOB_SERVICE"
1917         android:protectionLevel="signature"
1918         android:label="@string/permlab_bindJobService"
1919         android:description="@string/permdesc_bindJobService" />
1920     <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
1921
1922     <!-- ========================================= -->
1923     <!-- Permissions for special development tools -->
1924     <!-- ========================================= -->
1925     <eat-comment />
1926
1927     <!-- Group of permissions that are related to development features.  These
1928          are not permissions that should appear in third-party applications; they
1929          protect APIs that are intended only to be used for development
1930          purposes. -->
1931     <permission-group android:name="android.permission-group.DEVELOPMENT_TOOLS"
1932         android:label="@string/permgrouplab_developmentTools"
1933         android:description="@string/permgroupdesc_developmentTools"
1934         android:priority="310" />
1935
1936     <!-- @SystemApi Allows an application to read or write the secure system settings.
1937     <p>Not for use by third-party applications. -->
1938     <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
1939         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1940         android:protectionLevel="signature|system|development"
1941         android:label="@string/permlab_writeSecureSettings"
1942         android:description="@string/permdesc_writeSecureSettings" />
1943
1944     <!-- @SystemApi Allows an application to retrieve state dump information from system services.
1945     <p>Not for use by third-party applications. -->
1946     <permission android:name="android.permission.DUMP"
1947         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1948         android:protectionLevel="signature|system|development"
1949         android:label="@string/permlab_dump"
1950         android:description="@string/permdesc_dump" />
1951
1952     <!-- @SystemApi Allows an application to read the low-level system log files.
1953     <p>Not for use by third-party applications, because
1954     Log entries can contain the user's private information. -->
1955     <permission android:name="android.permission.READ_LOGS"
1956         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1957         android:protectionLevel="signature|system|development"
1958         android:label="@string/permlab_readLogs"
1959         android:description="@string/permdesc_readLogs" />
1960
1961     <!-- @SystemApi Configure an application for debugging.
1962     <p>Not for use by third-party applications. -->
1963     <permission android:name="android.permission.SET_DEBUG_APP"
1964         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1965         android:protectionLevel="signature|system|development"
1966         android:label="@string/permlab_setDebugApp"
1967         android:description="@string/permdesc_setDebugApp" />
1968
1969     <!-- @SystemApi Allows an application to set the maximum number of (not needed)
1970          application processes that can be running.
1971          <p>Not for use by third-party applications. -->
1972     <permission android:name="android.permission.SET_PROCESS_LIMIT"
1973         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1974         android:protectionLevel="signature|system|development"
1975         android:label="@string/permlab_setProcessLimit"
1976         android:description="@string/permdesc_setProcessLimit" />
1977
1978     <!-- @SystemApi Allows an application to control whether activities are immediately
1979          finished when put in the background.
1980          <p>Not for use by third-party applications. -->
1981     <permission android:name="android.permission.SET_ALWAYS_FINISH"
1982         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1983         android:protectionLevel="signature|system|development"
1984         android:label="@string/permlab_setAlwaysFinish"
1985         android:description="@string/permdesc_setAlwaysFinish" />
1986
1987     <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
1988     <p>Not for use by third-party applications. -->
1989     <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
1990         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1991         android:protectionLevel="signature|system|development"
1992         android:label="@string/permlab_signalPersistentProcesses"
1993         android:description="@string/permdesc_signalPersistentProcesses" />
1994
1995     <!-- ==================================== -->
1996     <!-- Private (signature-only) permissions -->
1997     <!-- ==================================== -->
1998     <eat-comment />
1999
2000     <!-- @SystemApi Allows applications to RW to diagnostic resources.
2001     <p>Not for use by third-party applications. -->
2002     <permission android:name="android.permission.DIAGNOSTIC"
2003         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2004         android:protectionLevel="signature"
2005         android:description="@string/permdesc_diagnostic"
2006         android:label="@string/permlab_diagnostic" />
2007
2008     <!-- @SystemApi Allows an application to open, close, or disable the status bar
2009          and its icons.
2010          <p>Not for use by third-party applications. -->
2011     <permission android:name="android.permission.STATUS_BAR"
2012         android:label="@string/permlab_statusBar"
2013         android:description="@string/permdesc_statusBar"
2014         android:protectionLevel="signature|system" />
2015
2016     <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
2017     @hide -->
2018     <permission android:name="android.permission.STATUS_BAR_SERVICE"
2019         android:label="@string/permlab_statusBarService"
2020         android:description="@string/permdesc_statusBarService"
2021         android:protectionLevel="signature" />
2022
2023     <!-- Allows an application to force a BACK operation on whatever is the
2024          top activity.
2025          <p>Not for use by third-party applications. -->
2026     <permission android:name="android.permission.FORCE_BACK"
2027         android:label="@string/permlab_forceBack"
2028         android:description="@string/permdesc_forceBack"
2029         android:protectionLevel="signature" />
2030
2031     <!-- @SystemApi Allows an application to update device statistics.
2032     <p>Not for use by third-party applications. -->
2033     <permission android:name="android.permission.UPDATE_DEVICE_STATS"
2034         android:label="@string/permlab_updateBatteryStats"
2035         android:description="@string/permdesc_updateBatteryStats"
2036         android:protectionLevel="signature|system" />
2037
2038     <!-- @SystemApi @hide Allows an application to collect battery statistics -->
2039     <permission android:name="android.permission.GET_APP_OPS_STATS"
2040         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2041         android:label="@string/permlab_getAppOpsStats"
2042         android:description="@string/permdesc_getAppOpsStats"
2043         android:protectionLevel="signature|system|development" />
2044
2045     <!-- @SystemApi Allows an application to update application operation statistics. Not for
2046          use by third party apps. @hide -->
2047     <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
2048         android:label="@string/permlab_updateAppOpsStats"
2049         android:description="@string/permdesc_updateAppOpsStats"
2050         android:protectionLevel="signature|system" />
2051
2052     <!-- Allows an application to open windows that are for use by parts
2053          of the system user interface.
2054          <p>Not for use by third-party applications. -->
2055     <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
2056         android:label="@string/permlab_internalSystemWindow"
2057         android:description="@string/permdesc_internalSystemWindow"
2058         android:protectionLevel="signature" />
2059
2060     <!-- Allows an application to manage (create, destroy,
2061          Z-order) application tokens in the window manager.
2062          <p>Not for use by third-party applications. -->
2063     <permission android:name="android.permission.MANAGE_APP_TOKENS"
2064         android:label="@string/permlab_manageAppTokens"
2065         android:description="@string/permdesc_manageAppTokens"
2066         android:protectionLevel="signature" />
2067
2068     <!-- @hide Allows the application to temporarily freeze the screen for a
2069          full-screen transition. -->
2070     <permission android:name="android.permission.FREEZE_SCREEN"
2071         android:label="@string/permlab_freezeScreen"
2072         android:description="@string/permdesc_freezeScreen"
2073         android:protectionLevel="signature" />
2074
2075     <!-- Allows an application to inject user events (keys, touch, trackball)
2076          into the event stream and deliver them to ANY window.  Without this
2077          permission, you can only deliver events to windows in your own process.
2078          <p>Not for use by third-party applications. -->
2079     <permission android:name="android.permission.INJECT_EVENTS"
2080         android:label="@string/permlab_injectEvents"
2081         android:description="@string/permdesc_injectEvents"
2082         android:protectionLevel="signature" />
2083
2084     <!-- @hide Allows an application to register an input filter which filters the stream
2085          of user events (keys, touch, trackball) before they are dispatched to any window. -->
2086     <permission android:name="android.permission.FILTER_EVENTS"
2087         android:label="@string/permlab_filter_events"
2088         android:description="@string/permdesc_filter_events"
2089         android:protectionLevel="signature" />
2090
2091     <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
2092     <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
2093         android:label="@string/permlab_retrieveWindowToken"
2094         android:description="@string/permdesc_retrieveWindowToken"
2095         android:protectionLevel="signature" />
2096
2097     <!-- @hide Allows an application to collect frame statistics -->
2098     <permission android:name="android.permission.FRAME_STATS"
2099          android:label="@string/permlab_frameStats"
2100          android:description="@string/permdesc_frameStats"
2101          android:protectionLevel="signature" />
2102
2103     <!-- @hide Allows an application to temporary enable accessibility on the device. -->
2104     <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
2105         android:label="@string/permlab_temporary_enable_accessibility"
2106         android:description="@string/permdesc_temporary_enable_accessibility"
2107         android:protectionLevel="signature" />
2108
2109     <!-- Allows an application to watch and control how activities are
2110          started globally in the system.  Only for is in debugging
2111          (usually the monkey command).
2112          <p>Not for use by third-party applications. -->
2113     <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
2114         android:label="@string/permlab_runSetActivityWatcher"
2115         android:description="@string/permdesc_runSetActivityWatcher"
2116         android:protectionLevel="signature" />
2117
2118     <!-- @SystemApi Allows an application to call the activity manager shutdown() API
2119          to put the higher-level system there into a shutdown state.
2120          @hide -->
2121     <permission android:name="android.permission.SHUTDOWN"
2122         android:label="@string/permlab_shutdown"
2123         android:description="@string/permdesc_shutdown"
2124         android:protectionLevel="signature|system" />
2125
2126     <!-- @SystemApi Allows an application to tell the activity manager to temporarily
2127          stop application switches, putting it into a special mode that
2128          prevents applications from immediately switching away from some
2129          critical UI such as the home screen.
2130          @hide -->
2131     <permission android:name="android.permission.STOP_APP_SWITCHES"
2132         android:label="@string/permlab_stopAppSwitches"
2133         android:description="@string/permdesc_stopAppSwitches"
2134         android:protectionLevel="signature|system" />
2135
2136     <!-- Allows an application to retrieve private information about
2137          the current top activity, such as any assist context it can provide.
2138          <p>Not for use by third-party applications. -->
2139     <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
2140         android:label="@string/permlab_getTopActivityInfo"
2141         android:description="@string/permdesc_getTopActivityInfo"
2142         android:protectionLevel="signature" />
2143
2144     <!-- Allows an application to retrieve the current state of keys and
2145          switches.
2146          <p>Not for use by third-party applications.
2147          @deprecated The API that used this permission has been removed. -->
2148     <permission android:name="android.permission.READ_INPUT_STATE"
2149         android:label="@string/permlab_readInputState"
2150         android:description="@string/permdesc_readInputState"
2151         android:protectionLevel="signature" />
2152
2153     <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
2154          to ensure that only the system can bind to it. -->
2155     <permission android:name="android.permission.BIND_INPUT_METHOD"
2156         android:label="@string/permlab_bindInputMethod"
2157         android:description="@string/permdesc_bindInputMethod"
2158         android:protectionLevel="signature" />
2159
2160     <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
2161          to ensure that only the system can bind to it. -->
2162     <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
2163         android:label="@string/permlab_bindAccessibilityService"
2164         android:description="@string/permdesc_bindAccessibilityService"
2165         android:protectionLevel="signature" />
2166
2167     <!-- Must be required by a {@link android.printservice.PrintService},
2168          to ensure that only the system can bind to it. -->
2169     <permission android:name="android.permission.BIND_PRINT_SERVICE"
2170         android:label="@string/permlab_bindPrintService"
2171         android:description="@string/permdesc_bindPrintService"
2172         android:protectionLevel="signature" />
2173
2174     <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
2175          or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
2176          the system can bind to it. -->
2177     <permission android:name="android.permission.BIND_NFC_SERVICE"
2178         android:label="@string/permlab_bindNfcService"
2179         android:description="@string/permdesc_bindNfcService"
2180         android:protectionLevel="signature" />
2181
2182     <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
2183          @hide -->
2184     <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
2185         android:label="@string/permlab_bindPrintSpoolerService"
2186         android:description="@string/permdesc_bindPrintSpoolerService"
2187         android:protectionLevel="signature" />
2188
2189     <!-- Must be required by a TextService (e.g. SpellCheckerService)
2190          to ensure that only the system can bind to it. -->
2191     <permission android:name="android.permission.BIND_TEXT_SERVICE"
2192         android:label="@string/permlab_bindTextService"
2193         android:description="@string/permdesc_bindTextService"
2194         android:protectionLevel="signature" />
2195
2196     <!-- Must be required by a {@link android.net.VpnService},
2197          to ensure that only the system can bind to it. -->
2198     <permission android:name="android.permission.BIND_VPN_SERVICE"
2199         android:label="@string/permlab_bindVpnService"
2200         android:description="@string/permdesc_bindVpnService"
2201         android:protectionLevel="signature" />
2202
2203     <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
2204          to ensure that only the system can bind to it. -->
2205     <permission android:name="android.permission.BIND_WALLPAPER"
2206         android:label="@string/permlab_bindWallpaper"
2207         android:description="@string/permdesc_bindWallpaper"
2208         android:protectionLevel="signature|system" />
2209
2210     <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
2211          to ensure that only the system can bind to it. -->
2212     <permission android:name="android.permission.BIND_VOICE_INTERACTION"
2213         android:label="@string/permlab_bindVoiceInteraction"
2214         android:description="@string/permdesc_bindVoiceInteraction"
2215         android:protectionLevel="signature" />
2216
2217     <!-- Must be required by hotword enrollment application,
2218          to ensure that only the system can interact with it.
2219          @hide <p>Not for use by third-party applications.</p> -->
2220     <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
2221         android:label="@string/permlab_manageVoiceKeyphrases"
2222         android:description="@string/permdesc_manageVoiceKeyphrases"
2223         android:protectionLevel="signature|system" />
2224
2225     <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
2226          to ensure that only the system can bind to it.
2227          @hide -->
2228     <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
2229         android:label="@string/permlab_bindRemoteDisplay"
2230         android:description="@string/permdesc_bindRemoteDisplay"
2231         android:protectionLevel="signature" />
2232
2233     <!-- Must be required by a {@link android.media.tv.TvInputService}
2234          to ensure that only the system can bind to it. -->
2235     <permission android:name="android.permission.BIND_TV_INPUT"
2236         android:label="@string/permlab_bindTvInput"
2237         android:description="@string/permdesc_bindTvInput"
2238         android:protectionLevel="signature|system" />
2239
2240     <!-- @SystemApi Allows an application to modify parental controls
2241          <p>Not for use by third-party applications.
2242          @hide -->
2243     <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS"
2244         android:label="@string/permlab_modifyParentalControls"
2245         android:description="@string/permdesc_modifyParentalControls"
2246         android:protectionLevel="signature|system" />
2247
2248     <!-- Must be required by device administration receiver, to ensure that only the
2249          system can interact with it. -->
2250     <permission android:name="android.permission.BIND_DEVICE_ADMIN"
2251         android:label="@string/permlab_bindDeviceAdmin"
2252         android:description="@string/permdesc_bindDeviceAdmin"
2253         android:protectionLevel="signature" />
2254
2255     <!-- @SystemApi Required to add or remove another application as a device admin.
2256          <p>Not for use by third-party applications.
2257          @hide -->
2258     <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
2259         android:label="@string/permlab_manageDeviceAdmins"
2260         android:description="@string/permdesc_manageDeviceAdmins"
2261         android:protectionLevel="signature|system" />
2262
2263     <!-- Allows low-level access to setting the orientation (actually
2264          rotation) of the screen.
2265          <p>Not for use by third-party applications. -->
2266     <permission android:name="android.permission.SET_ORIENTATION"
2267         android:label="@string/permlab_setOrientation"
2268         android:description="@string/permdesc_setOrientation"
2269         android:protectionLevel="signature" />
2270
2271     <!-- Allows low-level access to setting the pointer speed.
2272          <p>Not for use by third-party applications. -->
2273     <permission android:name="android.permission.SET_POINTER_SPEED"
2274         android:label="@string/permlab_setPointerSpeed"
2275         android:description="@string/permdesc_setPointerSpeed"
2276         android:protectionLevel="signature" />
2277
2278     <!-- Allows low-level access to setting input device calibration.
2279          <p>Not for use by normal applications.
2280          @hide -->
2281     <permission android:name="android.permission.SET_INPUT_CALIBRATION"
2282         android:label="@string/permlab_setInputCalibration"
2283         android:description="@string/permdesc_setInputCalibration"
2284         android:protectionLevel="signature" />
2285
2286     <!-- Allows low-level access to setting the keyboard layout.
2287          <p>Not for use by third-party applications.
2288          @hide -->
2289     <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
2290         android:label="@string/permlab_setKeyboardLayout"
2291         android:description="@string/permdesc_setKeyboardLayout"
2292         android:protectionLevel="signature" />
2293
2294     <!-- @SystemApi Allows an application to install packages.
2295     <p>Not for use by third-party applications. -->
2296     <permission android:name="android.permission.INSTALL_PACKAGES"
2297         android:label="@string/permlab_installPackages"
2298         android:description="@string/permdesc_installPackages"
2299         android:protectionLevel="signature|system" />
2300
2301     <!-- Allows an application to clear user data.
2302     <p>Not for use by third-party applications. -->
2303     <permission android:name="android.permission.CLEAR_APP_USER_DATA"
2304         android:label="@string/permlab_clearAppUserData"
2305         android:description="@string/permdesc_clearAppUserData"
2306         android:protectionLevel="signature" />
2307
2308     <!-- @SystemApi Allows an application to delete cache files.
2309     <p>Not for use by third-party applications. -->
2310     <permission android:name="android.permission.DELETE_CACHE_FILES"
2311         android:label="@string/permlab_deleteCacheFiles"
2312         android:description="@string/permdesc_deleteCacheFiles"
2313         android:protectionLevel="signature|system" />
2314
2315     <!-- @SystemApi Allows an application to delete packages.
2316     <p>Not for use by third-party applications. -->
2317     <permission android:name="android.permission.DELETE_PACKAGES"
2318         android:label="@string/permlab_deletePackages"
2319         android:description="@string/permdesc_deletePackages"
2320         android:protectionLevel="signature|system" />
2321
2322     <!-- @SystemApi Allows an application to move location of installed package.
2323          @hide -->
2324     <permission android:name="android.permission.MOVE_PACKAGE"
2325         android:label="@string/permlab_movePackage"
2326         android:description="@string/permdesc_movePackage"
2327         android:protectionLevel="signature|system" />
2328
2329     <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
2330          enabled or not.
2331          <p>Not for use by third-party applications. -->
2332     <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
2333         android:label="@string/permlab_changeComponentState"
2334         android:description="@string/permdesc_changeComponentState"
2335         android:protectionLevel="signature|system" />
2336
2337     <!-- @hide Allows an application to grant or revoke specific permissions. -->
2338     <permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS"
2339         android:label="@string/permlab_grantRevokePermissions"
2340         android:description="@string/permdesc_grantRevokePermissions"
2341         android:protectionLevel="signature" />
2342
2343     <!-- Allows an application to use SurfaceFlinger's low level features.
2344     <p>Not for use by third-party applications. -->
2345     <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
2346         android:label="@string/permlab_accessSurfaceFlinger"
2347         android:description="@string/permdesc_accessSurfaceFlinger"
2348         android:protectionLevel="signature" />
2349
2350     <!-- @SystemApi Allows an application to take screen shots and more generally
2351          get access to the frame buffer data.
2352          <p>Not for use by third-party applications. -->
2353     <permission android:name="android.permission.READ_FRAME_BUFFER"
2354         android:label="@string/permlab_readFrameBuffer"
2355         android:description="@string/permdesc_readFrameBuffer"
2356         android:protectionLevel="signature|system" />
2357
2358     <!-- Allows an application to use InputFlinger's low level features.
2359          @hide -->
2360     <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
2361         android:label="@string/permlab_accessInputFlinger"
2362         android:description="@string/permdesc_accessInputFlinger"
2363         android:protectionLevel="signature" />
2364
2365     <!-- Allows an application to configure and connect to Wifi displays
2366          @hide -->
2367     <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
2368         android:label="@string/permlab_configureWifiDisplay"
2369         android:description="@string/permdesc_configureWifiDisplay"
2370         android:protectionLevel="signature" />
2371
2372     <!-- Allows an application to control low-level features of Wifi displays
2373          such as opening an RTSP socket.  This permission should only be used
2374          by the display manager.
2375          @hide -->
2376     <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
2377         android:label="@string/permlab_controlWifiDisplay"
2378         android:description="@string/permdesc_controlWifiDisplay"
2379         android:protectionLevel="signature" />
2380
2381     <!-- @SystemApi Allows an application to capture audio output.
2382          <p>Not for use by third-party applications.</p> -->
2383     <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
2384         android:label="@string/permlab_captureAudioOutput"
2385         android:description="@string/permdesc_captureAudioOutput"
2386         android:protectionLevel="signature|system" />
2387
2388     <!-- @SystemApi Allows an application to capture audio for hotword detection.
2389          <p>Not for use by third-party applications.</p>
2390          @hide -->
2391     <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
2392         android:label="@string/permlab_captureAudioHotword"
2393         android:description="@string/permdesc_captureAudioHotword"
2394         android:protectionLevel="signature|system" />
2395
2396     <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
2397          <p>Not for use by third-party applications.</p>
2398          @hide -->
2399     <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
2400         android:label="@string/permlab_modifyAudioRouting"
2401         android:description="@string/permdesc_modifyAudioRouting"
2402         android:protectionLevel="signature|system" />
2403
2404     <!-- @SystemApi Allows an application to capture video output.
2405          <p>Not for use by third-party applications.</p> -->
2406     <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
2407         android:label="@string/permlab_captureVideoOutput"
2408         android:description="@string/permdesc_captureVideoOutput"
2409         android:protectionLevel="signature|system" />
2410
2411     <!-- @SystemApi Allows an application to capture secure video output.
2412          <p>Not for use by third-party applications.</p> -->
2413     <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
2414         android:label="@string/permlab_captureSecureVideoOutput"
2415         android:description="@string/permdesc_captureSecureVideoOutput"
2416         android:protectionLevel="signature|system" />
2417
2418     <!-- @SystemApi Allows an application to know what content is playing and control its playback.
2419          <p>Not for use by third-party applications due to privacy of media consumption</p>  -->
2420     <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
2421         android:label="@string/permlab_mediaContentControl"
2422         android:description="@string/permdesc_mediaContentControl"
2423         android:protectionLevel="signature|system" />
2424
2425     <!-- Required to be able to disable the device (very dangerous!).
2426     <p>Not for use by third-party applications.. -->
2427     <permission android:name="android.permission.BRICK"
2428         android:label="@string/permlab_brick"
2429         android:description="@string/permdesc_brick"
2430         android:protectionLevel="signature" />
2431
2432     <!-- @SystemApi Required to be able to reboot the device.
2433     <p>Not for use by third-party applications. -->
2434     <permission android:name="android.permission.REBOOT"
2435         android:label="@string/permlab_reboot"
2436         android:description="@string/permdesc_reboot"
2437         android:protectionLevel="signature|system" />
2438
2439    <!-- Allows low-level access to power management.
2440    <p>Not for use by third-party applications. -->
2441     <permission android:name="android.permission.DEVICE_POWER"
2442         android:label="@string/permlab_devicePower"
2443         android:description="@string/permdesc_devicePower"
2444         android:protectionLevel="signature" />
2445
2446    <!-- Allows access to the PowerManager.userActivity function.
2447    <p>Not for use by third-party applications. @hide @SystemApi -->
2448     <permission android:name="android.permission.USER_ACTIVITY"
2449         android:label="@string/permlab_userActivity"
2450         android:description="@string/permdesc_userActivity"
2451         android:protectionLevel="signature|system" />
2452
2453    <!-- @hide Allows low-level access to tun tap driver -->
2454     <permission android:name="android.permission.NET_TUNNELING"
2455         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2456         android:protectionLevel="signature" />
2457
2458     <!-- Run as a manufacturer test application, running as the root user.
2459          Only available when the device is running in manufacturer test mode.
2460          <p>Not for use by third-party applications. -->
2461     <permission android:name="android.permission.FACTORY_TEST"
2462         android:label="@string/permlab_factoryTest"
2463         android:description="@string/permdesc_factoryTest"
2464         android:protectionLevel="signature" />
2465
2466     <!-- Allows an application to broadcast a notification that an application
2467          package has been removed.
2468          <p>Not for use by third-party applications. -->
2469     <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
2470         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2471         android:label="@string/permlab_broadcastPackageRemoved"
2472         android:description="@string/permdesc_broadcastPackageRemoved"
2473         android:protectionLevel="signature" />
2474
2475     <!-- Allows an application to broadcast an SMS receipt notification.
2476     <p>Not for use by third-party applications. -->
2477     <permission android:name="android.permission.BROADCAST_SMS"
2478         android:permissionGroup="android.permission-group.MESSAGES"
2479         android:label="@string/permlab_broadcastSmsReceived"
2480         android:description="@string/permdesc_broadcastSmsReceived"
2481         android:protectionLevel="signature" />
2482
2483     <!-- Allows an application to broadcast a WAP PUSH receipt notification.
2484     <p>Not for use by third-party applications. -->
2485     <permission android:name="android.permission.BROADCAST_WAP_PUSH"
2486         android:permissionGroup="android.permission-group.MESSAGES"
2487         android:label="@string/permlab_broadcastWapPush"
2488         android:description="@string/permdesc_broadcastWapPush"
2489         android:protectionLevel="signature" />
2490
2491     <!-- @SystemApi Allows an application to broadcast a SCORE_NETWORKS request.
2492          <p>Not for use by third-party applications. @hide -->
2493     <permission android:name="android.permission.BROADCAST_SCORE_NETWORKS"
2494         android:label="@string/permlab_broadcastScoreNetworks"
2495         android:description="@string/permdesc_broadcastScoreNetworks"
2496         android:protectionLevel="signature|system" />
2497
2498     <!-- @SystemApi Not for use by third-party applications. -->
2499     <permission android:name="android.permission.MASTER_CLEAR"
2500         android:label="@string/permlab_masterClear"
2501         android:description="@string/permdesc_masterClear"
2502         android:protectionLevel="signature|system" />
2503
2504     <!-- @SystemApi Allows an application to call any phone number, including emergency
2505          numbers, without going through the Dialer user interface for the user
2506          to confirm the call being placed.
2507          <p>Not for use by third-party applications. -->
2508     <permission android:name="android.permission.CALL_PRIVILEGED"
2509         android:label="@string/permlab_callPrivileged"
2510         android:description="@string/permdesc_callPrivileged"
2511         android:protectionLevel="signature|system" />
2512
2513     <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
2514     <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
2515         android:label="@string/permlab_performCdmaProvisioning"
2516         android:description="@string/permdesc_performCdmaProvisioning"
2517         android:protectionLevel="signature|system" />
2518
2519     <!-- @SystemApi Allows enabling/disabling location update notifications from
2520          the radio.
2521          <p>Not for use by third-party applications. -->
2522     <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
2523         android:label="@string/permlab_locationUpdates"
2524         android:description="@string/permdesc_locationUpdates"
2525         android:protectionLevel="signature|system" />
2526
2527     <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
2528          database, to change values that get uploaded.
2529          <p>Not for use by third-party applications. -->
2530     <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
2531         android:label="@string/permlab_checkinProperties"
2532         android:description="@string/permdesc_checkinProperties"
2533         android:protectionLevel="signature|system" />
2534
2535     <!-- @SystemApi Allows an application to collect component usage
2536          statistics @hide -->
2537     <permission android:name="android.permission.PACKAGE_USAGE_STATS"
2538         android:label="@string/permlab_pkgUsageStats"
2539         android:description="@string/permdesc_pkgUsageStats"
2540         android:protectionLevel="signature|development|appop" />
2541     <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" />
2542
2543     <!-- @SystemApi Allows an application to collect battery statistics -->
2544     <permission android:name="android.permission.BATTERY_STATS"
2545         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2546         android:label="@string/permlab_batteryStats"
2547         android:description="@string/permdesc_batteryStats"
2548         android:protectionLevel="signature|system|development" />
2549
2550     <!-- @SystemApi Allows an application to control the backup and restore process.
2551     <p>Not for use by third-party applications.
2552          @hide pending API council -->
2553     <permission android:name="android.permission.BACKUP"
2554         android:label="@string/permlab_backup"
2555         android:description="@string/permdesc_backup"
2556         android:protectionLevel="signature|system" />
2557
2558     <!-- Allows a package to launch the secure full-backup confirmation UI.
2559          ONLY the system process may hold this permission.
2560          @hide -->
2561     <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
2562         android:label="@string/permlab_confirm_full_backup"
2563         android:description="@string/permdesc_confirm_full_backup"
2564         android:protectionLevel="signature" />
2565
2566     <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
2567          to ensure that only the system can bind to it. -->
2568     <permission android:name="android.permission.BIND_REMOTEVIEWS"
2569         android:label="@string/permlab_bindRemoteViews"
2570         android:description="@string/permdesc_bindRemoteViews"
2571         android:protectionLevel="signature|system" />
2572
2573     <!-- @SystemApi Allows an application to tell the AppWidget service which application
2574          can access AppWidget's data.  The normal user flow is that a user
2575          picks an AppWidget to go into a particular host, thereby giving that
2576          host application access to the private data from the AppWidget app.
2577          An application that has this permission should honor that contract.
2578          <p>Not for use by third-party applications. -->
2579     <permission android:name="android.permission.BIND_APPWIDGET"
2580         android:permissionGroup="android.permission-group.PERSONAL_INFO"
2581         android:label="@string/permlab_bindGadget"
2582         android:description="@string/permdesc_bindGadget"
2583         android:protectionLevel="signature|system" />
2584
2585     <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
2586          keyguard widget
2587          @hide -->
2588     <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
2589         android:permissionGroup="android.permission-group.PERSONAL_INFO"
2590         android:protectionLevel="signature|system" />
2591
2592     <!-- @SystemApi Internal permission allowing an application to query/set which
2593          applications can bind AppWidgets.
2594          @hide -->
2595     <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
2596         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2597         android:protectionLevel="signature|system" />
2598
2599     <!-- Allows applications to change the background data setting.
2600     <p>Not for use by third-party applications.
2601          @hide pending API council -->
2602     <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
2603         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2604         android:protectionLevel="signature"
2605         android:description="@string/permdesc_changeBackgroundDataSetting"
2606         android:label="@string/permlab_changeBackgroundDataSetting" />
2607
2608     <!-- @SystemApi This permission can be used on content providers to allow the global
2609          search system to access their data.  Typically it used when the
2610          provider has some permissions protecting it (which global search
2611          would not be expected to hold), and added as a read-only permission
2612          to the path in the provider where global search queries are
2613          performed.  This permission can not be held by regular applications;
2614          it is used by applications to protect themselves from everyone else
2615          besides global search. -->
2616     <permission android:name="android.permission.GLOBAL_SEARCH"
2617         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2618         android:protectionLevel="signature|system" />
2619
2620     <!-- Internal permission protecting access to the global search
2621          system: ensures that only the system can access the provider
2622          to perform queries (since this otherwise provides unrestricted
2623          access to a variety of content providers), and to write the
2624          search statistics (to keep applications from gaming the source
2625          ranking).
2626          @hide -->
2627     <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
2628         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2629         android:protectionLevel="signature" />
2630
2631     <!-- @SystemApi Internal permission to allows an application to read indexable data.
2632         @hide -->
2633     <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
2634         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2635         android:protectionLevel="signature|system" />
2636
2637     <!-- @SystemApi Allows applications to set a live wallpaper.
2638          @hide XXX Change to signature once the picker is moved to its
2639          own apk as Ghod Intended. -->
2640     <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
2641         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2642         android:protectionLevel="signature|system" />
2643
2644     <!-- @SystemApi Allows applications to read dream settings and dream state.
2645          @hide -->
2646     <permission android:name="android.permission.READ_DREAM_STATE"
2647         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2648         android:protectionLevel="signature|system" />
2649
2650     <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
2651          @hide -->
2652     <permission android:name="android.permission.WRITE_DREAM_STATE"
2653         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2654         android:protectionLevel="signature|system" />
2655
2656     <!-- @SystemApi Allow an application to read and write the cache partition.
2657          @hide -->
2658     <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
2659         android:label="@string/permlab_cache_filesystem"
2660         android:description="@string/permdesc_cache_filesystem"
2661         android:protectionLevel="signature|system" />
2662
2663     <!-- Must be required by default container service so that only
2664          the system can bind to it and use it to copy
2665          protected data to secure containers or files
2666          accessible to the system.
2667          @hide -->
2668     <permission android:name="android.permission.COPY_PROTECTED_DATA"
2669         android:label="@string/permlab_copyProtectedData"
2670         android:description="@string/permlab_copyProtectedData"
2671         android:protectionLevel="signature" />
2672
2673     <!-- @SystemApi Internal permission protecting access to the encryption methods
2674         @hide
2675     -->
2676     <permission android:name="android.permission.CRYPT_KEEPER"
2677         android:protectionLevel="signature|system" />
2678
2679     <!-- @SystemApi Allows an application to read historical network usage for
2680          specific networks and applications. @hide -->
2681     <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
2682         android:label="@string/permlab_readNetworkUsageHistory"
2683         android:description="@string/permdesc_readNetworkUsageHistory"
2684         android:protectionLevel="signature|system" />
2685
2686     <!-- Allows an application to manage network policies (such as warning and disable
2687          limits) and to define application-specific rules. @hide -->
2688     <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
2689         android:label="@string/permlab_manageNetworkPolicy"
2690         android:description="@string/permdesc_manageNetworkPolicy"
2691         android:protectionLevel="signature" />
2692
2693     <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used
2694          by system services like download manager and media server. Not for use by
2695          third party apps. @hide -->
2696     <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
2697         android:label="@string/permlab_modifyNetworkAccounting"
2698         android:description="@string/permdesc_modifyNetworkAccounting"
2699         android:protectionLevel="signature|system" />
2700
2701     <!-- C2DM permission.
2702          @hide Used internally.
2703      -->
2704     <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
2705           android:protectionLevel="signature" />
2706     <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
2707
2708     <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
2709          trust it to verify packages.
2710     -->
2711     <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
2712         android:label="@string/permlab_packageVerificationAgent"
2713         android:description="@string/permdesc_packageVerificationAgent"
2714         android:protectionLevel="signature|system" />
2715
2716     <!-- Must be required by package verifier receiver, to ensure that only the
2717          system can interact with it.
2718          @hide
2719     -->
2720     <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
2721         android:label="@string/permlab_bindPackageVerifier"
2722         android:description="@string/permdesc_bindPackageVerifier"
2723         android:protectionLevel="signature" />
2724
2725     <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
2726          @hide -->
2727     <permission android:name="android.permission.SERIAL_PORT"
2728         android:label="@string/permlab_serialPort"
2729         android:description="@string/permdesc_serialPort"
2730         android:protectionLevel="signature|system" />
2731
2732     <!-- Allows the holder to access content providers from outside an ApplicationThread.
2733          This permission is enforced by the ActivityManagerService on the corresponding APIs,
2734          in particular ActivityManagerService#getContentProviderExternal(String) and
2735          ActivityManagerService#removeContentProviderExternal(String).
2736          @hide
2737     -->
2738     <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
2739         android:label="@string/permlab_accessContentProvidersExternally"
2740         android:description="@string/permdesc_accessContentProvidersExternally"
2741         android:protectionLevel="signature" />
2742
2743     <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
2744          OTA reboot *not* occur while the lock is held.
2745          @hide -->
2746     <permission android:name="android.permission.UPDATE_LOCK"
2747         android:label="@string/permlab_updateLock"
2748         android:description="@string/permdesc_updateLock"
2749         android:protectionLevel="signatureOrSystem" />
2750
2751     <!-- @SystemApi Allows an application to read the current set of notifications, including
2752          any metadata and intents attached.
2753          @hide -->
2754     <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
2755         android:label="@string/permlab_accessNotifications"
2756         android:description="@string/permdesc_accessNotifications"
2757         android:protectionLevel="signature|system" />
2758
2759     <!-- Allows access to keyguard secure storage.  Only allowed for system processes.
2760         @hide -->
2761     <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
2762         android:protectionLevel="signature"
2763         android:label="@string/permlab_access_keyguard_secure_storage"
2764         android:description="@string/permdesc_access_keyguard_secure_storage" />
2765
2766     <!-- Allows an application to control keyguard.  Only allowed for system processes.
2767         @hide -->
2768     <permission android:name="android.permission.CONTROL_KEYGUARD"
2769         android:protectionLevel="signature"
2770         android:label="@string/permlab_control_keyguard"
2771         android:description="@string/permdesc_control_keyguard" />
2772
2773     <!-- Allows an application to listen to trust changes.  Only allowed for system processes.
2774         @hide -->
2775     <permission android:name="android.permission.TRUST_LISTENER"
2776                 android:protectionLevel="signature"
2777                 android:label="@string/permlab_trust_listener"
2778                 android:description="@string/permdesc_trust_listener" />
2779
2780     <!-- @SystemApi Allows an application to provide a trust agent.
2781          @hide For security reasons, this is a platform-only permission. -->
2782     <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
2783                 android:protectionLevel="signatureOrSystem"
2784                 android:label="@string/permlab_provide_trust_agent"
2785                 android:description="@string/permdesc_provide_trust_agent" />
2786
2787     <!-- Allows an application to launch the trust agent settings activity.
2788         @hide -->
2789     <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
2790         android:protectionLevel="signatureOrSystem"
2791         android:label="@string/permlab_launch_trust_agent_settings"
2792         android:description="@string/permdesc_launch_trust_agent_settings" />
2793
2794     <!-- @SystemApi Must be required by an {@link
2795         android.service.trust.TrustAgentService},
2796         to ensure that only the system can bind to it.
2797         @hide -->
2798     <permission android:name="android.permission.BIND_TRUST_AGENT"
2799                 android:protectionLevel="signature"
2800                 android:label="@string/permlab_bind_trust_agent_service"
2801                 android:description="@string/permdesc_bind_trust_agent_service" />
2802
2803     <!-- Must be required by an {@link
2804          android.service.notification.NotificationListenerService},
2805          to ensure that only the system can bind to it. -->
2806     <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
2807         android:label="@string/permlab_bindNotificationListenerService"
2808         android:description="@string/permdesc_bindNotificationListenerService"
2809         android:protectionLevel="signature" />
2810
2811     <!-- @SystemApi Must be required by a {@link
2812          android.service.notification.ConditionProviderService},
2813          to ensure that only the system can bind to it.
2814          @hide -->
2815     <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
2816         android:label="@string/permlab_bindConditionProviderService"
2817         android:description="@string/permdesc_bindConditionProviderService"
2818         android:protectionLevel="signature" />
2819
2820     <!-- Must be required by an {@link android.service.dreams.DreamService},
2821          to ensure that only the system can bind to it. -->
2822     <permission android:name="android.permission.BIND_DREAM_SERVICE"
2823         android:label="@string/permlab_bindDreamService"
2824         android:description="@string/permdesc_bindDreamService"
2825         android:protectionLevel="signature" />
2826
2827     <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
2828          carrier setup application to enforce that this permission is required
2829          @hide This is not a third-party API (intended for OEMs and system apps). -->
2830     <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
2831         android:label="@string/permlab_invokeCarrierSetup"
2832         android:description="@string/permdesc_invokeCarrierSetup"
2833         android:protectionLevel="signature|system" />
2834
2835     <!-- @SystemApi Allows an application to listen for network condition observations.
2836          @hide This is not a third-party API (intended for system apps). -->
2837     <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
2838         android:label="@string/permlab_accessNetworkConditions"
2839         android:description="@string/permdesc_accessNetworkConditions"
2840         android:protectionLevel="signature|system" />
2841
2842     <!-- @SystemApi Allows an application to provision and access DRM certificates
2843          @hide This is not a third-party API (intended for system apps). -->
2844     <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
2845         android:label="@string/permlab_accessDrmCertificates"
2846         android:description="@string/permdesc_accessDrmCertificates"
2847         android:protectionLevel="signature|system" />
2848
2849     <!-- Api Allows an application to manage media projection sessions.
2850          @hide This is not a third-party API (intended for system apps). -->
2851     <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION"
2852         android:label="@string/permlab_manageMediaProjection"
2853         android:description="@string/permdesc_manageMediaProjection"
2854         android:protectionLevel="signature" />
2855
2856     <!-- @SystemApi Allows an application to read install sessions
2857          @hide This is not a third-party API (intended for system apps). -->
2858     <permission android:name="android.permission.READ_INSTALL_SESSIONS"
2859         android:label="@string/permlab_readInstallSessions"
2860         android:description="@string/permdesc_readInstallSessions" />
2861
2862     <!-- @SystemApi Allows an application to remove DRM certificates
2863          @hide This is not a third-party API (intended for system apps). -->
2864     <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES"
2865         android:label="@string/permlab_removeDrmCertificates"
2866         android:description="@string/permdesc_removeDrmCertificates"
2867         android:protectionLevel="signature|system" />
2868
2869     <!-- The system process is explicitly the only one allowed to launch the
2870          confirmation UI for full backup/restore -->
2871     <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
2872
2873     <application android:process="system"
2874                  android:persistent="true"
2875                  android:hasCode="false"
2876                  android:label="@string/android_system_label"
2877                  android:allowClearUserData="false"
2878                  android:backupAgent="com.android.server.backup.SystemBackupAgent"
2879                  android:killAfterRestore="false"
2880                  android:icon="@drawable/ic_launcher_android"
2881                  android:supportsRtl="true">
2882         <activity android:name="com.android.internal.app.ChooserActivity"
2883                 android:theme="@style/Theme.DeviceDefault.Resolver"
2884                 android:finishOnCloseSystemDialogs="true"
2885                 android:excludeFromRecents="true"
2886                 android:documentLaunchMode="never"
2887                 android:relinquishTaskIdentity="true"
2888                 android:process=":ui">
2889             <intent-filter>
2890                 <action android:name="android.intent.action.CHOOSER" />
2891                 <category android:name="android.intent.category.DEFAULT" />
2892             </intent-filter>
2893         </activity>
2894         <activity android:name="com.android.internal.app.IntentForwarderActivity"
2895                 android:finishOnCloseSystemDialogs="true"
2896                 android:theme="@style/Theme.NoDisplay"
2897                 android:excludeFromRecents="true"
2898                 android:label="@string/user_owner_label"
2899                 android:exported="true"
2900                 >
2901         </activity>
2902         <activity-alias android:name="com.android.internal.app.ForwardIntentToUserOwner"
2903                 android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2904                 android:exported="true"
2905                 android:label="@string/user_owner_label">
2906         </activity-alias>
2907         <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
2908                 android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2909                 android:icon="@drawable/ic_corp_icon"
2910                 android:exported="true"
2911                 android:label="@string/managed_profile_label">
2912         </activity-alias>
2913         <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
2914                 android:theme="@style/Theme.Material.Dialog"
2915                 android:label="@string/heavy_weight_switcher_title"
2916                 android:finishOnCloseSystemDialogs="true"
2917                 android:excludeFromRecents="true"
2918                 android:process=":ui">
2919         </activity>
2920         <activity android:name="com.android.internal.app.PlatLogoActivity"
2921                 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
2922                 android:configChanges="orientation|keyboardHidden"
2923                 android:process=":ui">
2924         </activity>
2925         <activity android:name="com.android.internal.app.DisableCarModeActivity"
2926                 android:theme="@style/Theme.NoDisplay"
2927                 android:excludeFromRecents="true"
2928                 android:process=":ui">
2929         </activity>
2930
2931         <activity android:name="android.accounts.ChooseAccountActivity"
2932                 android:excludeFromRecents="true"
2933                 android:exported="true"
2934                 android:theme="@android:style/Theme.Material.Dialog"
2935                 android:label="@string/choose_account_label"
2936                 android:process=":ui">
2937         </activity>
2938
2939         <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
2940                 android:excludeFromRecents="true"
2941                 android:exported="true"
2942                 android:theme="@android:style/Theme.Material.Dialog"
2943                 android:label="@string/choose_account_label"
2944                 android:process=":ui">
2945         </activity>
2946
2947         <activity android:name="android.accounts.ChooseAccountTypeActivity"
2948                 android:excludeFromRecents="true"
2949                 android:theme="@android:style/Theme.Material.Dialog"
2950                 android:label="@string/choose_account_label"
2951                 android:process=":ui">
2952         </activity>
2953
2954         <activity android:name="android.accounts.CantAddAccountActivity"
2955                 android:excludeFromRecents="true"
2956                 android:exported="true"
2957                 android:theme="@android:style/Theme.Material.Dialog.NoActionBar"
2958                 android:process=":ui">
2959         </activity>
2960
2961         <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
2962                 android:excludeFromRecents="true"
2963                 android:exported="true"
2964                 android:theme="@android:style/Theme.Material.DialogWhenLarge"
2965                 android:process=":ui">
2966         </activity>
2967
2968         <activity android:name="android.content.SyncActivityTooManyDeletes"
2969                android:theme="@android:style/Theme.Holo.Dialog"
2970                android:label="@string/sync_too_many_deletes"
2971                android:process=":ui">
2972         </activity>
2973
2974         <activity android:name="com.android.server.ShutdownActivity"
2975             android:permission="android.permission.SHUTDOWN"
2976             android:excludeFromRecents="true">
2977             <intent-filter>
2978                 <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" />
2979                 <category android:name="android.intent.category.DEFAULT" />
2980             </intent-filter>
2981             <intent-filter>
2982                 <action android:name="android.intent.action.REBOOT" />
2983                 <category android:name="android.intent.category.DEFAULT" />
2984             </intent-filter>
2985         </activity>
2986
2987         <activity android:name="com.android.internal.app.NetInitiatedActivity"
2988                 android:theme="@style/Theme.Holo.Dialog.Alert"
2989                 android:excludeFromRecents="true"
2990                 android:process=":ui">
2991         </activity>
2992
2993         <activity android:name="com.android.internal.app.RestrictionsPinActivity"
2994                 android:theme="@style/Theme.Material.Light.Dialog.Alert"
2995                 android:excludeFromRecents="true"
2996                 android:windowSoftInputMode="adjustPan"
2997                 android:process=":ui">
2998             <intent-filter android:priority="100">
2999                 <action android:name="android.intent.action.RESTRICTIONS_CHALLENGE" />
3000                 <category android:name="android.intent.category.DEFAULT" />
3001             </intent-filter>
3002         </activity>
3003
3004         <receiver android:name="com.android.server.BootReceiver"
3005                 android:primaryUserOnly="true">
3006             <intent-filter android:priority="1000">
3007                 <action android:name="android.intent.action.BOOT_COMPLETED" />
3008             </intent-filter>
3009         </receiver>
3010
3011         <receiver android:name="com.android.server.updates.CertPinInstallReceiver" >
3012             <intent-filter>
3013                 <action android:name="android.intent.action.UPDATE_PINS" />
3014                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3015             </intent-filter>
3016         </receiver>
3017
3018         <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" >
3019             <intent-filter>
3020                 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
3021                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3022             </intent-filter>
3023         </receiver>
3024
3025         <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" >
3026             <intent-filter>
3027                 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
3028                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3029             </intent-filter>
3030         </receiver>
3031
3032         <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" >
3033             <intent-filter>
3034                 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
3035                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3036             </intent-filter>
3037         </receiver>
3038
3039         <receiver android:name="com.android.server.updates.TZInfoInstallReceiver" >
3040             <intent-filter>
3041                 <action android:name="android.intent.action.UPDATE_TZINFO" />
3042                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3043             </intent-filter>
3044         </receiver>
3045
3046         <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" >
3047             <intent-filter>
3048                 <action android:name="android.intent.action.UPDATE_SEPOLICY" />
3049                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3050             </intent-filter>
3051         </receiver>
3052
3053         <receiver android:name="com.android.server.MasterClearReceiver"
3054             android:permission="android.permission.MASTER_CLEAR">
3055             <intent-filter
3056                     android:priority="100" >
3057                 <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR -->
3058                 <action android:name="android.intent.action.MASTER_CLEAR" />
3059
3060                 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
3061                 <action android:name="com.google.android.c2dm.intent.RECEIVE" />
3062                 <category android:name="android.intent.category.MASTER_CLEAR" />
3063             </intent-filter>
3064         </receiver>
3065
3066         <service android:name="com.android.internal.os.storage.ExternalStorageFormatter"
3067             android:permission="android.permission.MASTER_CLEAR"
3068             android:exported="true" />
3069
3070         <service android:name="android.hardware.location.GeofenceHardwareService"
3071             android:permission="android.permission.LOCATION_HARDWARE"
3072             android:exported="false" />
3073
3074         <service android:name="com.android.internal.backup.LocalTransportService"
3075                 android:permission="android.permission.CONFIRM_FULL_BACKUP"
3076                 android:exported="false">
3077             <intent-filter>
3078                 <action android:name="android.backup.TRANSPORT_HOST" />
3079             </intent-filter>
3080         </service>
3081
3082         <service android:name="com.android.server.MountServiceIdler"
3083                  android:exported="true"
3084                  android:permission="android.permission.BIND_JOB_SERVICE" >
3085         </service>
3086
3087         <service android:name="com.android.server.backup.FullBackupJob"
3088                  android:exported="true"
3089                  android:permission="android.permission.BIND_JOB_SERVICE" >
3090         </service>
3091
3092         <service
3093             android:name="com.android.server.pm.BackgroundDexOptService"
3094             android:exported="true"
3095             android:permission="android.permission.BIND_JOB_SERVICE">
3096         </service>
3097
3098     </application>
3099
3100 </manifest>