OSDN Git Service

am d23fa0f6: am 97a7fbfb: am 621fa30c: am 9eef8749: am 2200f86f: All (er, L) is final...
[android-x86/frameworks-base.git] / core / res / AndroidManifest.xml
1 <?xml version="1.0" encoding="utf-8"?>
2 <!--
3 /* //device/apps/common/AndroidManifest.xml
4 **
5 ** Copyright 2006, The Android Open Source Project
6 **
7 ** Licensed under the Apache License, Version 2.0 (the "License");
8 ** you may not use this file except in compliance with the License.
9 ** You may obtain a copy of the License at
10 **
11 **     http://www.apache.org/licenses/LICENSE-2.0
12 **
13 ** Unless required by applicable law or agreed to in writing, software
14 ** distributed under the License is distributed on an "AS IS" BASIS,
15 ** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 ** See the License for the specific language governing permissions and
17 ** limitations under the License.
18 */
19 -->
20 <manifest xmlns:android="http://schemas.android.com/apk/res/android"
21     package="android" coreApp="true" android:sharedUserId="android.uid.system"
22     android:sharedUserLabel="@string/android_system_label">
23
24     <!-- ================================================ -->
25     <!-- Special broadcasts that only the system can send -->
26     <!-- ================================================ -->
27     <eat-comment />
28
29     <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
30     <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
31     <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
32     <protected-broadcast android:name="android.intent.action.TIME_SET" />
33     <protected-broadcast android:name="android.intent.action.TIME_TICK" />
34     <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
35     <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
36     <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
37     <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
38     <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
39     <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
40     <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
41     <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
42     <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
43     <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
44     <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
45     <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
46     <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
47     <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
48     <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
49     <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
50     <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
51     <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
52     <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
53     <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
54     <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
55     <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
56     <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
57     <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
58     <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
59     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
60     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
61     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
62     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
63     <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
64     <protected-broadcast android:name="android.intent.action.REBOOT" />
65     <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
66     <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
67     <protected-broadcast android:name="android.intent.action.USER_ADDED" />
68     <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
69     <protected-broadcast android:name="android.intent.action.USER_STARTING" />
70     <protected-broadcast android:name="android.intent.action.USER_STARTED" />
71     <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
72     <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
73     <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
74     <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
75     <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
76
77     <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
78     <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" />
79
80     <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
81     <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
82     <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
83     <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
84     <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" />
85
86     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
87     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
88     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
89     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
90     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
91     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
92
93     <protected-broadcast android:name="android.backup.intent.RUN" />
94     <protected-broadcast android:name="android.backup.intent.CLEAR" />
95     <protected-broadcast android:name="android.backup.intent.INIT" />
96
97     <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
98     <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
99     <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
100     <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
101     <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
102     <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
103     <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
104     <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
105     <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
106     <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
107     <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
108     <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
109     <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
110     <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
111     <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
112     <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
113     <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
114     <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
115     <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
116     <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
117     <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
118     <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
119     <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
120     <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
121     <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
122     <protected-broadcast
123         android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
124     <protected-broadcast
125         android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
126     <protected-broadcast
127         android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
128     <protected-broadcast
129         android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
130     <protected-broadcast
131         android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
132     <protected-broadcast
133         android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
134     <protected-broadcast
135         android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
136     <protected-broadcast
137         android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
138     <protected-broadcast
139         android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
140     <protected-broadcast
141         android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
142     <protected-broadcast
143         android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
144     <protected-broadcast
145         android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
146     <protected-broadcast
147         android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
148     <protected-broadcast
149         android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
150    <protected-broadcast
151         android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
152     <protected-broadcast
153         android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
154     <protected-broadcast
155         android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
156     <protected-broadcast
157         android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
158     <protected-broadcast
159         android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
160     <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" />
161     <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
162     <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
163     <protected-broadcast android:name="android.btopp.intent.action.LIST" />
164     <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
165     <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
166     <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
167     <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
168     <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
169     <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
170     <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
171     <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
172     <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
173     <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
174     <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
175
176     <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
177
178     <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
179     <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
180     <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
181     <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
182     <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
183
184     <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
185     <protected-broadcast android:name="android.media.action.ANALOG_AUDIO_DOCK_PLUG" />
186     <protected-broadcast android:name="android.media.action.DIGITAL_AUDIO_DOCK_PLUG" />
187     <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" />
188     <protected-broadcast android:name="android.media.action.USB_AUDIO_ACCESSORY_PLUG" />
189     <protected-broadcast android:name="android.media.action.USB_AUDIO_DEVICE_PLUG" />
190
191     <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
192     <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
193     <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
194     <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
195     <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
196     <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
197     <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
198     <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
199
200     <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
201     <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
202     <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
203     <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
204     <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
205     <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
206     <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
207     <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
208     <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
209     <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
210
211     <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
212     <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
213     <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
214     <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
215     <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
216
217     <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
218
219     <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" />
220     <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
221     <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
222     <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
223
224     <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
225     <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
226     <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
227
228     <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
229
230     <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
231     <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
232     <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
233     <protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" />
234
235     <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
236     <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
237     <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
238     <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
239     <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" />
240     <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
241     <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
242     <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
243     <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
244     <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
245     <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
246     <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
247     <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
248     <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
249     <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
250     <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
251     <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
252     <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
253     <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
254     <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
255     <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
256     <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
257     <protected-broadcast
258             android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
259     <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
260     <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
261     <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
262     <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
263     <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
264     <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
265     <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
266     <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" />
267
268     <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
269     <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
270
271     <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
272
273     <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
274
275     <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" />
276
277     <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
278     <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
279     <protected-broadcast android:name="android.location.MODE_CHANGED" />
280     <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
281     <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
282
283     <protected-broadcast
284         android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
285
286     <!-- Defined in RestrictionsManager -->
287     <protected-broadcast
288         android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
289     <!-- Defined in RestrictionsManager -->
290
291     <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
292     <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
293     <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
294     <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
295     <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
296
297     <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SUBSCRIPTION_CHANGED" />
298     <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED" />
299     <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" />
300     <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" />
301     <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" />
302     <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" />
303
304     <!-- ====================================== -->
305     <!-- Permissions for things that cost money -->
306     <!-- ====================================== -->
307     <eat-comment />
308
309     <!-- Used for permissions that can be used to make the user spend money
310          without their direct involvement. -->
311     <permission-group android:name="android.permission-group.COST_MONEY"
312         android:label="@string/permgrouplab_costMoney"
313         android:description="@string/permgroupdesc_costMoney" />
314
315     <!-- ================================== -->
316     <!-- Permissions for accessing messages -->
317     <!-- ================================== -->
318     <eat-comment />
319
320     <!-- Used for permissions that allow an application to send messages
321          on behalf of the user or intercept messages being received by the
322          user.  This is primarily intended for SMS/MMS messaging, such as
323          receiving or reading an MMS. -->
324     <permission-group android:name="android.permission-group.MESSAGES"
325         android:label="@string/permgrouplab_messages"
326         android:icon="@drawable/perm_group_messages"
327         android:description="@string/permgroupdesc_messages"
328         android:permissionGroupFlags="personalInfo"
329         android:priority="360"/>
330
331     <!-- Allows an application to send SMS messages. -->
332     <permission android:name="android.permission.SEND_SMS"
333         android:permissionGroup="android.permission-group.MESSAGES"
334         android:protectionLevel="dangerous"
335         android:permissionFlags="costsMoney"
336         android:label="@string/permlab_sendSms"
337         android:description="@string/permdesc_sendSms" />
338
339     <!-- @SystemApi Allows an application (Phone) to send a request to other applications
340          to handle the respond-via-message action during incoming calls.
341          <p>Not for use by third-party applications. -->
342     <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
343         android:permissionGroup="android.permission-group.MESSAGES"
344         android:protectionLevel="signature|system"
345         android:label="@string/permlab_sendRespondViaMessageRequest"
346         android:description="@string/permdesc_sendRespondViaMessageRequest" />
347
348     <!-- Allows an application to monitor incoming SMS messages, to record
349          or perform processing on them. -->
350     <permission android:name="android.permission.RECEIVE_SMS"
351         android:permissionGroup="android.permission-group.MESSAGES"
352         android:protectionLevel="dangerous"
353         android:label="@string/permlab_receiveSms"
354         android:description="@string/permdesc_receiveSms" />
355
356     <!-- Allows an application to monitor incoming MMS messages, to record
357          or perform processing on them. -->
358     <permission android:name="android.permission.RECEIVE_MMS"
359         android:permissionGroup="android.permission-group.MESSAGES"
360         android:protectionLevel="dangerous"
361         android:label="@string/permlab_receiveMms"
362         android:description="@string/permdesc_receiveMms" />
363
364     <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
365          to record or display them to the user.
366          <p>Not for use by third-party applications.
367          @hide Pending API council approval -->
368     <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
369         android:permissionGroup="android.permission-group.MESSAGES"
370         android:protectionLevel="signature|system"
371         android:label="@string/permlab_receiveEmergencyBroadcast"
372         android:description="@string/permdesc_receiveEmergencyBroadcast" />
373
374     <!-- Allows an application to read previously received cell broadcast
375          messages and to register a content observer to get notifications when
376          a cell broadcast has been received and added to the database. For
377          emergency alerts, the database is updated immediately after the
378          alert dialog and notification sound/vibration/speech are presented.
379          The "read" column is then updated after the user dismisses the alert.
380          This enables supplementary emergency assistance apps to start loading
381          additional emergency information (if Internet access is available)
382          when the alert is first received, and to delay presenting the info
383          to the user until after the initial alert dialog is dismissed.
384          @hide Pending API council approval -->
385     <permission android:name="android.permission.READ_CELL_BROADCASTS"
386         android:permissionGroup="android.permission-group.MESSAGES"
387         android:protectionLevel="dangerous"
388         android:label="@string/permlab_readCellBroadcasts"
389         android:description="@string/permdesc_readCellBroadcasts" />
390
391     <!-- Allows an application to read SMS messages. -->
392     <permission android:name="android.permission.READ_SMS"
393         android:permissionGroup="android.permission-group.MESSAGES"
394         android:protectionLevel="dangerous"
395         android:label="@string/permlab_readSms"
396         android:description="@string/permdesc_readSms" />
397
398     <!-- Allows an application to write SMS messages. -->
399     <permission android:name="android.permission.WRITE_SMS"
400         android:permissionGroup="android.permission-group.MESSAGES"
401         android:protectionLevel="dangerous"
402         android:label="@string/permlab_writeSms"
403         android:description="@string/permdesc_writeSms" />
404
405     <!-- Allows an application to monitor incoming WAP push messages. -->
406     <permission android:name="android.permission.RECEIVE_WAP_PUSH"
407         android:permissionGroup="android.permission-group.MESSAGES"
408         android:protectionLevel="dangerous"
409         android:label="@string/permlab_receiveWapPush"
410         android:description="@string/permdesc_receiveWapPush" />
411
412     <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
413          or perform processing on them. -->
414     <!-- @hide -->
415     <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
416         android:permissionGroup="android.permission-group.MESSAGES"
417         android:protectionLevel="dangerous"
418         android:label="@string/permlab_receiveBluetoothMap"
419         android:description="@string/permdesc_receiveBluetoothMap" />
420
421     <!-- =============================================================== -->
422     <!-- Permissions for accessing social info (contacts and social) -->
423     <!-- =============================================================== -->
424     <eat-comment />
425
426     <!-- Used for permissions that provide access to the user's social connections,
427          such as contacts, call logs, social stream, etc.  This includes
428          both reading and writing of this data (which should generally be
429          expressed as two distinct permissions). -->
430
431     <permission-group android:name="android.permission-group.SOCIAL_INFO"
432         android:label="@string/permgrouplab_socialInfo"
433         android:icon="@drawable/perm_group_social_info"
434         android:description="@string/permgroupdesc_socialInfo"
435         android:permissionGroupFlags="personalInfo"
436         android:priority="320" />
437
438     <!-- Allows an application to read the user's contacts data. -->
439     <permission android:name="android.permission.READ_CONTACTS"
440         android:permissionGroup="android.permission-group.SOCIAL_INFO"
441         android:protectionLevel="dangerous"
442         android:label="@string/permlab_readContacts"
443         android:description="@string/permdesc_readContacts" />
444
445     <!-- Allows an application to write (but not read) the user's
446          contacts data. -->
447     <permission android:name="android.permission.WRITE_CONTACTS"
448         android:permissionGroup="android.permission-group.SOCIAL_INFO"
449         android:protectionLevel="dangerous"
450         android:label="@string/permlab_writeContacts"
451         android:description="@string/permdesc_writeContacts" />
452
453     <!-- @SystemApi @hide Allows an application to execute contacts directory search.
454          This should only be used by ContactsProvider.
455          <p>Not for use by third-party applications. -->
456     <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
457         android:permissionGroup="android.permission-group.PERSONAL_INFO"
458         android:protectionLevel="signature|system" />
459
460     <!-- Allows an application to read the user's call log.
461          <p class="note"><strong>Note:</strong> If your app uses the
462          {@link #READ_CONTACTS} permission and <em>both</em> your <a
463          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
464          minSdkVersion}</a> and <a
465          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
466          targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
467          grants your app this permission. If you don't need this permission, be sure your <a
468          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
469          targetSdkVersion}</a> is 16 or higher.</p> -->
470     <permission android:name="android.permission.READ_CALL_LOG"
471         android:permissionGroup="android.permission-group.SOCIAL_INFO"
472         android:protectionLevel="dangerous"
473         android:label="@string/permlab_readCallLog"
474         android:description="@string/permdesc_readCallLog" />
475
476     <!-- Allows an application to write (but not read) the user's
477          contacts data.
478          <p class="note"><strong>Note:</strong> If your app uses the
479          {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
480          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
481          minSdkVersion}</a> and <a
482          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
483          targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
484          grants your app this permission. If you don't need this permission, be sure your <a
485          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
486          targetSdkVersion}</a> is 16 or higher.</p>  -->
487     <permission android:name="android.permission.WRITE_CALL_LOG"
488         android:permissionGroup="android.permission-group.SOCIAL_INFO"
489         android:protectionLevel="dangerous"
490         android:label="@string/permlab_writeCallLog"
491         android:description="@string/permdesc_writeCallLog" />
492
493   <!-- Allows an application to read from the user's social stream.
494        @deprecated This functionality will be unsupported in the future; cursors returned
495        will be empty. Please do not use. -->
496     <permission android:name="android.permission.READ_SOCIAL_STREAM"
497         android:permissionGroup="android.permission-group.SOCIAL_INFO"
498         android:protectionLevel="dangerous"
499         android:label="@string/permlab_readSocialStream"
500         android:description="@string/permdesc_readSocialStream" />
501
502     <!-- Allows an application to write (but not read) the user's
503          social stream data.
504          @deprecated This functionality will be unsupported in the future; cursors returned
505          will be empty. Please do not use. -->
506     <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
507         android:permissionGroup="android.permission-group.SOCIAL_INFO"
508         android:protectionLevel="dangerous"
509         android:label="@string/permlab_writeSocialStream"
510         android:description="@string/permdesc_writeSocialStream" />
511
512     <!-- =============================================================== -->
513     <!-- Permissions for accessing information about the device owner    -->
514     <!-- =============================================================== -->
515     <eat-comment />
516
517     <!-- Used for permissions that provide access to information about the device
518          user such as profile information.  This includes both reading and
519          writing of this data (which should generally be expressed as two
520          distinct permissions). -->
521     <permission-group android:name="android.permission-group.PERSONAL_INFO"
522         android:label="@string/permgrouplab_personalInfo"
523         android:icon="@drawable/perm_group_personal_info"
524         android:description="@string/permgroupdesc_personalInfo"
525         android:permissionGroupFlags="personalInfo"
526         android:priority="310" />
527
528     <!-- Allows an application to read the user's personal profile data. -->
529     <permission android:name="android.permission.READ_PROFILE"
530         android:permissionGroup="android.permission-group.PERSONAL_INFO"
531         android:protectionLevel="dangerous"
532         android:label="@string/permlab_readProfile"
533         android:description="@string/permdesc_readProfile" />
534
535     <!-- Allows an application to write (but not read) the user's
536          personal profile data. -->
537     <permission android:name="android.permission.WRITE_PROFILE"
538         android:permissionGroup="android.permission-group.PERSONAL_INFO"
539         android:protectionLevel="dangerous"
540         android:label="@string/permlab_writeProfile"
541         android:description="@string/permdesc_writeProfile" />
542
543     <!-- Allows an application to access data from sensors that the user uses to
544          measure what is happening inside his/her body, such as heart rate. -->
545     <permission android:name="android.permission.BODY_SENSORS"
546         android:permissionGroup="android.permission-group.PERSONAL_INFO"
547         android:label="@string/permlab_bodySensors"
548         android:description="@string/permdesc_bodySensors" />
549
550     <!-- =============================================================== -->
551     <!-- Permissions for accessing the device calendar                   -->
552     <!-- =============================================================== -->
553     <eat-comment />
554
555     <!-- Used for permissions that provide access to the device
556          calendar to create / view events.-->
557     <permission-group android:name="android.permission-group.CALENDAR"
558         android:label="@string/permgrouplab_calendar"
559         android:icon="@drawable/perm_group_calendar"
560         android:description="@string/permgroupdesc_calendar"
561         android:permissionGroupFlags="personalInfo"
562         android:priority="290" />
563
564     <!-- Allows an application to read the user's calendar data. -->
565     <permission android:name="android.permission.READ_CALENDAR"
566         android:permissionGroup="android.permission-group.PERSONAL_INFO"
567         android:protectionLevel="dangerous"
568         android:label="@string/permlab_readCalendar"
569         android:description="@string/permdesc_readCalendar" />
570
571     <!-- Allows an application to write (but not read) the user's
572          calendar data. -->
573     <permission android:name="android.permission.WRITE_CALENDAR"
574         android:permissionGroup="android.permission-group.PERSONAL_INFO"
575         android:protectionLevel="dangerous"
576         android:label="@string/permlab_writeCalendar"
577         android:description="@string/permdesc_writeCalendar" />
578
579     <!-- =============================================================== -->
580     <!-- Permissions for accessing the user dictionary-->
581     <!-- =============================================================== -->
582     <eat-comment />
583
584     <!-- Used for permissions that provide access to the user
585          calendar to create / view events.-->
586     <permission-group android:name="android.permission-group.USER_DICTIONARY"
587         android:label="@string/permgrouplab_dictionary"
588         android:icon="@drawable/perm_group_user_dictionary"
589         android:description="@string/permgroupdesc_dictionary"
590         android:permissionGroupFlags="personalInfo"
591         android:priority="170" />
592
593     <!-- Allows an application to read the user dictionary. This should
594          really only be required by an IME, or a dictionary editor like
595          the Settings app. -->
596     <permission android:name="android.permission.READ_USER_DICTIONARY"
597         android:permissionGroup="android.permission-group.USER_DICTIONARY"
598         android:protectionLevel="dangerous"
599         android:label="@string/permlab_readDictionary"
600         android:description="@string/permdesc_readDictionary" />
601
602     <!-- Used for permissions that provide access to the user
603          calendar to create / view events.-->
604     <permission-group android:name="android.permission-group.WRITE_USER_DICTIONARY"
605         android:label="@string/permgrouplab_writeDictionary"
606         android:icon="@drawable/perm_group_user_dictionary_write"
607         android:description="@string/permgroupdesc_writeDictionary"
608         android:priority="160" />
609
610     <!-- Allows an application to write to the user dictionary. -->
611     <permission android:name="android.permission.WRITE_USER_DICTIONARY"
612         android:permissionGroup="android.permission-group.WRITE_USER_DICTIONARY"
613         android:protectionLevel="normal"
614         android:label="@string/permlab_writeDictionary"
615         android:description="@string/permdesc_writeDictionary" />
616
617     <!-- =============================================================== -->
618     <!-- Permissions for accessing the user bookmarks                    -->
619     <!-- =============================================================== -->
620     <eat-comment />
621
622     <!-- Used for permissions that provide access to the user
623          bookmarks and browser history.-->
624     <permission-group android:name="android.permission-group.BOOKMARKS"
625         android:label="@string/permgrouplab_bookmarks"
626         android:icon="@drawable/perm_group_bookmarks"
627         android:description="@string/permgroupdesc_bookmarks"
628         android:permissionGroupFlags="personalInfo"
629         android:priority="300" />
630
631     <!-- Allows an application to read (but not write) the user's
632         browsing history and bookmarks. -->
633     <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
634         android:permissionGroup="android.permission-group.BOOKMARKS"
635         android:label="@string/permlab_readHistoryBookmarks"
636         android:description="@string/permdesc_readHistoryBookmarks"
637         android:protectionLevel="dangerous" />
638
639     <!-- Allows an application to write (but not read) the user's
640         browsing history and bookmarks. -->
641     <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
642         android:permissionGroup="android.permission-group.BOOKMARKS"
643         android:label="@string/permlab_writeHistoryBookmarks"
644         android:description="@string/permdesc_writeHistoryBookmarks"
645         android:protectionLevel="dangerous" />
646
647     <!-- =============================================================== -->
648     <!-- Permissions for setting the device alarm                        -->
649     <!-- =============================================================== -->
650     <eat-comment />
651
652     <!-- Used for permissions that provide access to device alarms. -->
653     <permission-group android:name="android.permission-group.DEVICE_ALARMS"
654         android:label="@string/permgrouplab_deviceAlarms"
655         android:icon="@drawable/perm_group_device_alarms"
656         android:description="@string/permgroupdesc_deviceAlarms"
657         android:permissionGroupFlags="personalInfo"
658         android:priority="210" />
659
660     <!-- Allows an application to broadcast an Intent to set an alarm for the
661          user. -->
662     <permission android:name="com.android.alarm.permission.SET_ALARM"
663         android:permissionGroup="android.permission-group.DEVICE_ALARMS"
664         android:label="@string/permlab_setAlarm"
665         android:description="@string/permdesc_setAlarm"
666         android:protectionLevel="normal" />
667
668     <!-- =============================================================== -->
669     <!-- Permissions for accessing the user voicemail                    -->
670     <!-- =============================================================== -->
671     <eat-comment />
672
673     <!-- Used for permissions that provide access to the user voicemail box. -->
674     <permission-group android:name="android.permission-group.VOICEMAIL"
675         android:label="@string/permgrouplab_voicemail"
676         android:icon="@drawable/perm_group_voicemail"
677         android:description="@string/permgroupdesc_voicemail"
678         android:permissionGroupFlags="personalInfo"
679         android:priority="280" />
680
681     <!-- Allows an application to add voicemails into the system. -->
682     <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
683         android:permissionGroup="android.permission-group.VOICEMAIL"
684         android:protectionLevel="dangerous"
685         android:label="@string/permlab_addVoicemail"
686         android:description="@string/permdesc_addVoicemail" />
687
688     <!-- Allows an application to modify and remove existing voicemails in the system -->
689     <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
690         android:permissionGroup="android.permission-group.VOICEMAIL"
691         android:protectionLevel="dangerous"
692         android:label="@string/permlab_writeVoicemail"
693         android:description="@string/permdesc_writeVoicemail" />
694
695     <!-- Allows an application to read voicemails in the system. -->
696     <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
697         android:permissionGroup="android.permission-group.VOICEMAIL"
698         android:protectionLevel="dangerous"
699         android:label="@string/permlab_readVoicemail"
700         android:description="@string/permdesc_readVoicemail" />
701
702     <!-- =============================================== -->
703     <!-- Permissions for enabling accessibility features -->
704     <!-- =============================================== -->
705     <eat-comment />
706
707     <!-- Used for permissions that allow requesting certain accessibility features. -->
708     <permission-group android:name="android.permission-group.ACCESSIBILITY_FEATURES"
709         android:label="@string/permgrouplab_accessibilityFeatures"
710         android:icon="@drawable/perm_group_accessibility_features"
711         android:description="@string/permgroupdesc_accessibilityFeatures"
712         android:priority="380" />
713
714     <!-- ======================================= -->
715     <!-- Permissions for accessing location info -->
716     <!-- ======================================= -->
717     <eat-comment />
718
719     <!-- Used for permissions that allow access to the user's current
720          location. -->
721     <permission-group android:name="android.permission-group.LOCATION"
722         android:label="@string/permgrouplab_location"
723         android:icon="@drawable/perm_group_location"
724         android:description="@string/permgroupdesc_location"
725         android:permissionGroupFlags="personalInfo"
726         android:priority="330" />
727
728     <!-- Allows an app to access precise location from location sources such
729          as GPS, cell towers, and Wi-Fi. -->
730     <permission android:name="android.permission.ACCESS_FINE_LOCATION"
731         android:permissionGroup="android.permission-group.LOCATION"
732         android:protectionLevel="dangerous"
733         android:label="@string/permlab_accessFineLocation"
734         android:description="@string/permdesc_accessFineLocation" />
735
736     <!-- Allows an app to access approximate location derived from network location
737          sources such as cell towers and Wi-Fi. -->
738     <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
739         android:permissionGroup="android.permission-group.LOCATION"
740         android:protectionLevel="dangerous"
741         android:label="@string/permlab_accessCoarseLocation"
742         android:description="@string/permdesc_accessCoarseLocation" />
743
744     <!-- Allows an application to create mock location providers for testing -->
745     <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
746         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
747         android:protectionLevel="dangerous"
748         android:label="@string/permlab_accessMockLocation"
749         android:description="@string/permdesc_accessMockLocation" />
750
751     <!-- Allows an application to access extra location provider commands -->
752     <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
753         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
754         android:protectionLevel="normal"
755         android:label="@string/permlab_accessLocationExtraCommands"
756         android:description="@string/permdesc_accessLocationExtraCommands" />
757
758     <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
759     <p>Not for use by third-party applications. -->
760     <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
761         android:protectionLevel="signature|system"
762         android:label="@string/permlab_installLocationProvider"
763         android:description="@string/permdesc_installLocationProvider" />
764
765     <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
766          This should only be used by HDMI-CEC service.
767     -->
768     <permission android:name="android.permission.HDMI_CEC"
769         android:protectionLevel="signatureOrSystem" />
770
771     <!-- @SystemApi Allows an application to use location features in hardware,
772          such as the geofencing api.
773          <p>Not for use by third-party applications. -->
774     <permission android:name="android.permission.LOCATION_HARDWARE"
775         android:permissionGroup="android.permission-group.LOCATION"
776         android:protectionLevel="signature|system" />
777     <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
778
779     <!-- ======================================= -->
780     <!-- Permissions for accessing networks -->
781     <!-- ======================================= -->
782     <eat-comment />
783
784     <!-- Used for permissions that provide access to networking services.  The
785          main permission here is internet access, but this is also an
786          appropriate group for accessing or modifying any network configuration
787          or other related network operations. -->
788     <permission-group android:name="android.permission-group.NETWORK"
789         android:label="@string/permgrouplab_network"
790         android:icon="@drawable/perm_group_network"
791         android:description="@string/permgroupdesc_network"
792         android:priority="270" />
793
794     <!-- Allows applications to open network sockets. -->
795     <permission android:name="android.permission.INTERNET"
796         android:permissionGroup="android.permission-group.NETWORK"
797         android:protectionLevel="dangerous"
798         android:description="@string/permdesc_createNetworkSockets"
799         android:label="@string/permlab_createNetworkSockets" />
800
801     <!-- Allows applications to access information about networks -->
802     <permission android:name="android.permission.ACCESS_NETWORK_STATE"
803         android:permissionGroup="android.permission-group.NETWORK"
804         android:protectionLevel="normal"
805         android:description="@string/permdesc_accessNetworkState"
806         android:label="@string/permlab_accessNetworkState" />
807
808     <!-- Allows applications to access information about Wi-Fi networks -->
809     <permission android:name="android.permission.ACCESS_WIFI_STATE"
810         android:permissionGroup="android.permission-group.NETWORK"
811         android:protectionLevel="normal"
812         android:description="@string/permdesc_accessWifiState"
813         android:label="@string/permlab_accessWifiState" />
814
815     <!-- Allows applications to change Wi-Fi connectivity state -->
816     <permission android:name="android.permission.CHANGE_WIFI_STATE"
817         android:permissionGroup="android.permission-group.NETWORK"
818         android:protectionLevel="dangerous"
819         android:description="@string/permdesc_changeWifiState"
820         android:label="@string/permlab_changeWifiState" />
821
822     <!-- @SystemApi @hide Allows applications to read Wi-Fi credential.
823          <p>Not for use by third-party applications. -->
824     <permission android:name="android.permission.READ_WIFI_CREDENTIAL"
825         android:permissionGroup="android.permission-group.NETWORK"
826         android:protectionLevel="signature|system" />
827
828     <!-- @SystemApi @hide Allow system apps to receive broadcast
829          when a wifi network credential is changed.
830          <p>Not for use by third-party applications. -->
831     <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE"
832         android:permissionGroup="android.permission-group.NETWORK"
833         android:protectionLevel="signature|system" />
834
835     <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created
836          by another application. Once reconfigured the original creator canot make any further
837          modifications.
838          <p>Not for use by third-party applications. -->
839     <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG"
840         android:permissionGroup="android.permission-group.NETWORK"
841         android:protectionLevel="signature|system" />
842
843     <!-- @hide -->
844     <permission android:name="android.permission.ACCESS_WIMAX_STATE"
845         android:permissionGroup="android.permission-group.NETWORK"
846         android:protectionLevel="normal"
847         android:description="@string/permdesc_accessWimaxState"
848         android:label="@string/permlab_accessWimaxState" />
849
850     <!-- @hide -->
851     <permission android:name="android.permission.CHANGE_WIMAX_STATE"
852         android:permissionGroup="android.permission-group.NETWORK"
853         android:protectionLevel="dangerous"
854         android:description="@string/permdesc_changeWimaxState"
855         android:label="@string/permlab_changeWimaxState" />
856
857     <!-- Allows applications to act as network scorers. @hide @SystemApi-->
858     <!-- TODO: Change protection level to normal when unhiding this API. -->
859     <permission android:name="android.permission.SCORE_NETWORKS"
860         android:permissionGroup="android.permission-group.NETWORK"
861         android:protectionLevel="signature|system"
862         android:description="@string/permdesc_scoreNetworks"
863         android:label="@string/permlab_scoreNetworks" />
864
865     <!-- ======================================= -->
866     <!-- Permissions for short range, peripheral networks -->
867     <!-- ======================================= -->
868     <eat-comment />
869
870     <!-- Used for permissions that provide access to other devices through Bluetooth.-->
871     <permission-group android:name="android.permission-group.BLUETOOTH_NETWORK"
872         android:label="@string/permgrouplab_bluetoothNetwork"
873         android:icon="@drawable/perm_group_bluetooth"
874         android:description="@string/permgroupdesc_bluetoothNetwork"
875         android:priority="260" />
876
877     <!-- Allows applications to connect to paired bluetooth devices -->
878     <permission android:name="android.permission.BLUETOOTH"
879         android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
880         android:protectionLevel="dangerous"
881         android:description="@string/permdesc_bluetooth"
882         android:label="@string/permlab_bluetooth" />
883
884     <!-- Allows applications to discover and pair bluetooth devices -->
885     <permission android:name="android.permission.BLUETOOTH_ADMIN"
886         android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
887         android:protectionLevel="dangerous"
888         android:description="@string/permdesc_bluetoothAdmin"
889         android:label="@string/permlab_bluetoothAdmin" />
890
891     <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to
892          allow or disallow phonebook access or message access.
893          This is not available to third party applications. -->
894     <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
895         android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
896         android:protectionLevel="system|signature"
897         android:description="@string/permdesc_bluetoothPriv"
898         android:label="@string/permlab_bluetoothPriv" />
899
900     <!-- Control access to email providers exclusively for Bluetooth
901          @hide
902     -->
903     <permission android:name="android.permission.BLUETOOTH_MAP"
904         android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
905         android:protectionLevel="signature"
906         android:description="@string/permdesc_bluetoothMap"
907         android:label="@string/permlab_bluetoothMap" />
908
909     <!-- Allows bluetooth stack to access files
910          @hide This should only be used by Bluetooth apk.
911     -->
912     <permission android:name="android.permission.BLUETOOTH_STACK"
913         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
914         android:protectionLevel="signature" />
915
916     <!-- Allows applications to perform I/O operations over NFC -->
917     <permission android:name="android.permission.NFC"
918         android:permissionGroup="android.permission-group.NETWORK"
919         android:protectionLevel="dangerous"
920         android:description="@string/permdesc_nfc"
921         android:label="@string/permlab_nfc" />
922
923     <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
924          @hide -->
925     <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
926         android:permissionGroup="android.permission-group.NETWORK"
927         android:protectionLevel="signature|system" />
928
929     <!-- @SystemApi @hide -->
930     <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
931         android:permissionGroup="android.permission-group.NETWORK"
932         android:protectionLevel="signature|system" />
933
934     <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
935          @hide -->
936     <permission android:name="android.permission.LOOP_RADIO"
937         android:permissionGroup="android.permission-group.NETWORK"
938         android:protectionLevel="signature|system" />
939
940     <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
941          @hide
942     -->
943     <permission android:name="android.permission.NFC_HANDOVER_STATUS"
944                 android:label="@string/permlab_handoverStatus"
945                 android:description="@string/permdesc_handoverStatus"
946                 android:protectionLevel="signature|system" />
947
948     <!-- ================================== -->
949     <!-- Permissions for accessing accounts -->
950     <!-- ================================== -->
951     <eat-comment />
952
953     <!-- Permissions for direct access to the accounts managed
954          by the Account Manager. -->
955     <permission-group android:name="android.permission-group.ACCOUNTS"
956         android:label="@string/permgrouplab_accounts"
957         android:icon="@drawable/perm_group_accounts"
958         android:description="@string/permgroupdesc_accounts"
959         android:permissionGroupFlags="personalInfo"
960         android:priority="200" />
961
962     <!-- Allows access to the list of accounts in the Accounts Service -->
963     <permission android:name="android.permission.GET_ACCOUNTS"
964         android:permissionGroup="android.permission-group.ACCOUNTS"
965         android:protectionLevel="normal"
966         android:description="@string/permdesc_getAccounts"
967         android:label="@string/permlab_getAccounts" />
968
969     <!-- Allows an application to act as an AccountAuthenticator for
970          the AccountManager -->
971     <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
972         android:permissionGroup="android.permission-group.ACCOUNTS"
973         android:protectionLevel="dangerous"
974         android:label="@string/permlab_authenticateAccounts"
975         android:description="@string/permdesc_authenticateAccounts" />
976
977     <!-- Allows an application to request authtokens from the AccountManager -->
978     <permission android:name="android.permission.USE_CREDENTIALS"
979         android:permissionGroup="android.permission-group.ACCOUNTS"
980         android:protectionLevel="dangerous"
981         android:label="@string/permlab_useCredentials"
982         android:description="@string/permdesc_useCredentials" />
983
984     <!-- Allows an application to manage the list of accounts in the AccountManager -->
985     <permission android:name="android.permission.MANAGE_ACCOUNTS"
986         android:permissionGroup="android.permission-group.ACCOUNTS"
987         android:protectionLevel="dangerous"
988         android:label="@string/permlab_manageAccounts"
989         android:description="@string/permdesc_manageAccounts" />
990
991     <!-- @SystemApi Allows applications to call into AccountAuthenticators.
992     <p>Not for use by third-party applications. -->
993     <permission android:name="android.permission.ACCOUNT_MANAGER"
994         android:permissionGroup="android.permission-group.ACCOUNTS"
995         android:protectionLevel="signature"
996         android:description="@string/permdesc_accountManagerService"
997         android:label="@string/permlab_accountManagerService" />
998
999     <!-- ================================== -->
1000     <!-- Permissions for accessing hardware that may effect battery life-->
1001     <!-- ================================== -->
1002     <eat-comment />
1003
1004     <!-- Used for permissions that provide direct access to the hardware on
1005          the device that has an effect on battery life.  This includes vibrator,
1006          flashlight,  etc. -->
1007
1008     <permission-group android:name="android.permission-group.AFFECTS_BATTERY"
1009         android:label="@string/permgrouplab_affectsBattery"
1010         android:icon="@drawable/perm_group_affects_battery"
1011         android:description="@string/permgroupdesc_affectsBattery"
1012         android:priority="180" />
1013
1014     <!-- Allows applications to enter Wi-Fi Multicast mode -->
1015     <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
1016         android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
1017         android:protectionLevel="dangerous"
1018         android:description="@string/permdesc_changeWifiMulticastState"
1019         android:label="@string/permlab_changeWifiMulticastState" />
1020
1021     <!-- Allows access to the vibrator -->
1022     <permission android:name="android.permission.VIBRATE"
1023         android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
1024         android:protectionLevel="normal"
1025         android:label="@string/permlab_vibrate"
1026         android:description="@string/permdesc_vibrate" />
1027
1028     <!-- Allows access to the flashlight -->
1029     <permission android:name="android.permission.FLASHLIGHT"
1030         android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
1031         android:protectionLevel="normal"
1032         android:label="@string/permlab_flashlight"
1033         android:description="@string/permdesc_flashlight" />
1034
1035     <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
1036          from dimming -->
1037     <permission android:name="android.permission.WAKE_LOCK"
1038         android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
1039         android:protectionLevel="normal"
1040         android:label="@string/permlab_wakeLock"
1041         android:description="@string/permdesc_wakeLock" />
1042
1043     <!-- Allows using the device's IR transmitter, if available -->
1044     <permission android:name="android.permission.TRANSMIT_IR"
1045         android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
1046         android:protectionLevel="normal"
1047         android:label="@string/permlab_transmitIr"
1048         android:description="@string/permdesc_transmitIr" />
1049
1050     <!-- ==================================================== -->
1051     <!-- Permissions related to changing audio settings   -->
1052     <!-- ==================================================== -->
1053     <eat-comment />
1054
1055     <!-- Used for permissions that provide direct access to speaker settings
1056          the device. -->
1057     <permission-group android:name="android.permission-group.AUDIO_SETTINGS"
1058         android:label="@string/permgrouplab_audioSettings"
1059         android:icon="@drawable/perm_group_audio_settings"
1060         android:description="@string/permgroupdesc_audioSettings"
1061         android:priority="130" />
1062
1063     <!-- Allows an application to modify global audio settings -->
1064     <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
1065         android:permissionGroup="android.permission-group.AUDIO_SETTINGS"
1066         android:protectionLevel="normal"
1067         android:label="@string/permlab_modifyAudioSettings"
1068         android:description="@string/permdesc_modifyAudioSettings" />
1069
1070     <!-- ================================== -->
1071     <!-- Permissions for accessing hardware -->
1072     <!-- ================================== -->
1073     <eat-comment />
1074
1075     <!-- Used for permissions that provide direct access to the hardware on
1076          the device.  This includes audio, the camera, vibrator, etc. -->
1077     <permission-group android:name="android.permission-group.HARDWARE_CONTROLS"
1078         android:label="@string/permgrouplab_hardwareControls"
1079         android:description="@string/permgroupdesc_hardwareControls"
1080         android:priority="260"/>
1081
1082     <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
1083          @hide -->
1084     <permission android:name="android.permission.MANAGE_USB"
1085         android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1086         android:protectionLevel="signature|system"
1087         android:label="@string/permlab_manageUsb"
1088         android:description="@string/permdesc_manageUsb" />
1089
1090     <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
1091          For use only by the device side MTP implementation.
1092          @hide -->
1093     <permission android:name="android.permission.ACCESS_MTP"
1094         android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1095         android:protectionLevel="signature|system"
1096         android:label="@string/permlab_accessMtp"
1097         android:description="@string/permdesc_accessMtp" />
1098
1099     <!-- Allows access to hardware peripherals.  Intended only for hardware testing.
1100     <p>Not for use by third-party applications. -->
1101     <permission android:name="android.permission.HARDWARE_TEST"
1102         android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1103         android:protectionLevel="signature"
1104         android:label="@string/permlab_hardware_test"
1105         android:description="@string/permdesc_hardware_test" />
1106
1107     <!-- @SystemApi Allows access to FM
1108          @hide This is not a third-party API (intended for system apps).-->
1109     <permission android:name="android.permission.ACCESS_FM_RADIO"
1110         android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1111         android:protectionLevel="signature|system"
1112         android:label="@string/permlab_fm"
1113         android:description="@string/permdesc_fm" />
1114
1115     <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
1116          @hide -->
1117     <permission android:name="android.permission.NET_ADMIN"
1118         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1119         android:protectionLevel="signature" />
1120
1121     <!-- Allows registration for remote audio playback. @hide -->
1122     <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
1123         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1124         android:protectionLevel="signature" />
1125
1126     <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
1127          built-in tuners and HDMI-in's.
1128          @hide This should only be used by OEM's TvInputService's.
1129     -->
1130     <permission android:name="android.permission.TV_INPUT_HARDWARE"
1131         android:protectionLevel="signatureOrSystem" />
1132
1133     <!-- @SystemApi Allows to capture a frame of TV input hardware such as
1134          built-in tuners and HDMI-in's.
1135          @hide <p>Not for use by third-party applications.
1136     -->
1137     <permission android:name="android.permission.CAPTURE_TV_INPUT"
1138         android:protectionLevel="signatureOrSystem" />
1139
1140     <!-- @hide Allows enabling/disabling OEM unlock
1141    <p>Not for use by third-party applications. -->
1142     <permission android:name="android.permission.OEM_UNLOCK_STATE"
1143                 android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1144                 android:protectionLevel="signature" />
1145
1146
1147     <!-- =========================================== -->
1148     <!-- Permissions associated with audio capture -->
1149     <!-- =========================================== -->
1150     <eat-comment />
1151
1152     <!-- Used for permissions that are associated with accessing
1153          microphone audio from the device. Note that phone calls also capture audio
1154          but are in a separate (more visible) permission group. -->
1155     <permission-group android:name="android.permission-group.MICROPHONE"
1156         android:label="@string/permgrouplab_microphone"
1157         android:icon="@drawable/perm_group_microphone"
1158         android:description="@string/permgroupdesc_microphone"
1159         android:permissionGroupFlags="personalInfo"
1160         android:priority="340" />
1161
1162     <!-- Allows an application to record audio -->
1163     <permission android:name="android.permission.RECORD_AUDIO"
1164         android:permissionGroup="android.permission-group.MICROPHONE"
1165         android:protectionLevel="dangerous"
1166         android:label="@string/permlab_recordAudio"
1167         android:description="@string/permdesc_recordAudio" />
1168
1169
1170     <!-- =========================================== -->
1171     <!-- Permissions associated with camera and image capture -->
1172     <!-- =========================================== -->
1173     <eat-comment />
1174
1175     <!-- Used for permissions that are associated with accessing
1176          camera or capturing images/video from the device. -->
1177     <permission-group android:name="android.permission-group.CAMERA"
1178         android:label="@string/permgrouplab_camera"
1179         android:icon="@drawable/perm_group_camera"
1180         android:description="@string/permgroupdesc_camera"
1181         android:permissionGroupFlags="personalInfo"
1182         android:priority="350" />
1183
1184     <!-- Required to be able to access the camera device.
1185          <p>This will automatically enforce the <a
1186          href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code
1187          &lt;uses-feature&gt;}</a> manifest element for <em>all</em> camera features.
1188          If you do not require all camera features or can properly operate if a camera
1189          is not available, then you must modify your manifest as appropriate in order to
1190          install on devices that don't support all camera features.</p> -->
1191     <permission android:name="android.permission.CAMERA"
1192         android:permissionGroup="android.permission-group.CAMERA"
1193         android:protectionLevel="dangerous"
1194         android:label="@string/permlab_camera"
1195         android:description="@string/permdesc_camera" />
1196
1197     <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
1198          a camera is in use by an application.
1199          @hide -->
1200     <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
1201         android:permissionGroup="android.permission-group.CAMERA"
1202         android:protectionLevel="signature|system"
1203         android:label="@string/permlab_cameraDisableTransmitLed"
1204         android:description="@string/permdesc_cameraDisableTransmitLed" />
1205
1206     <!-- =========================================== -->
1207     <!-- Permissions associated with telephony state -->
1208     <!-- =========================================== -->
1209     <eat-comment />
1210
1211     <!-- Used for permissions that are associated with accessing and modifying
1212          telephony state: placing calls, intercepting outgoing calls, reading
1213          and modifying the phone state. -->
1214     <permission-group android:name="android.permission-group.PHONE_CALLS"
1215         android:label="@string/permgrouplab_phoneCalls"
1216         android:icon="@drawable/perm_group_phone_calls"
1217         android:description="@string/permgroupdesc_phoneCalls"
1218         android:permissionGroupFlags="personalInfo"
1219         android:priority="370" />
1220
1221     <!-- Allows an application to see the number being dialed during an outgoing
1222          call with the option to redirect the call to a different number or
1223          abort the call altogether. -->
1224     <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
1225         android:permissionGroup="android.permission-group.PHONE_CALLS"
1226         android:protectionLevel="dangerous"
1227         android:label="@string/permlab_processOutgoingCalls"
1228         android:description="@string/permdesc_processOutgoingCalls" />
1229
1230     <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
1231          Does not include placing calls.
1232          <p>Not for use by third-party applications. -->
1233     <permission android:name="android.permission.MODIFY_PHONE_STATE"
1234         android:permissionGroup="android.permission-group.PHONE_CALLS"
1235         android:protectionLevel="signature|system"
1236         android:label="@string/permlab_modifyPhoneState"
1237         android:description="@string/permdesc_modifyPhoneState" />
1238
1239     <!-- Allows read only access to phone state.
1240          <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1241          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1242          minSdkVersion}</a> and <a
1243          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1244          targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1245          grants your app this permission. If you don't need this permission, be sure your <a
1246          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1247          targetSdkVersion}</a> is 4 or higher. -->
1248     <permission android:name="android.permission.READ_PHONE_STATE"
1249         android:permissionGroup="android.permission-group.PHONE_CALLS"
1250         android:protectionLevel="dangerous"
1251         android:label="@string/permlab_readPhoneState"
1252         android:description="@string/permdesc_readPhoneState" />
1253
1254     <!-- Allows read only access to precise phone state.
1255          @hide Pending API council approval -->
1256     <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
1257         android:permissionGroup="android.permission-group.PHONE_CALLS"
1258         android:protectionLevel="dangerous"
1259         android:label="@string/permlab_readPrecisePhoneState"
1260         android:description="@string/permdesc_readPrecisePhoneState" />
1261
1262     <!-- @SystemApi Allows read access to privileged phone state.
1263          @hide Used internally. -->
1264     <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
1265         android:permissionGroup="android.permission-group.PHONE_CALLS"
1266         android:protectionLevel="signature|system" />
1267
1268      <!-- Allows an application to initiate a phone call without going through
1269          the Dialer user interface for the user to confirm the call
1270          being placed. -->
1271     <permission android:name="android.permission.CALL_PHONE"
1272         android:permissionGroup="android.permission-group.PHONE_CALLS"
1273         android:protectionLevel="dangerous"
1274         android:permissionFlags="costsMoney"
1275         android:label="@string/permlab_callPhone"
1276         android:description="@string/permdesc_callPhone" />
1277
1278     <!-- Allows an application to use SIP service -->
1279     <permission android:name="android.permission.USE_SIP"
1280         android:permissionGroup="android.permission-group.PHONE_CALLS"
1281         android:protectionLevel="dangerous"
1282         android:description="@string/permdesc_use_sip"
1283         android:label="@string/permlab_use_sip" />
1284
1285     <!-- @SystemApi Allows an application to bind to InCallService implementations.
1286          @hide -->
1287     <permission android:name="android.permission.BIND_INCALL_SERVICE"
1288         android:permissionGroup="android.permission-group.PHONE_CALLS"
1289         android:protectionLevel="system|signature"
1290         android:description="@string/permdesc_bind_incall_service"
1291         android:label="@string/permlab_bind_incall_service" />
1292
1293     <!-- @SystemApi Allows an application to bind to ConnectionService implementations.
1294          @hide -->
1295     <permission android:name="android.permission.BIND_CONNECTION_SERVICE"
1296                 android:permissionGroup="android.permission-group.PHONE_CALLS"
1297                 android:protectionLevel="system|signature"
1298                 android:description="@string/permdesc_bind_connection_service"
1299                 android:label="@string/permlab_bind_connection_service" />
1300
1301     <!-- @SystemApi Allows an application to control the in-call experience.
1302          @hide -->
1303     <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE"
1304                 android:permissionGroup="android.permission-group.PHONE_CALLS"
1305                 android:protectionLevel="system|signature"
1306                 android:description="@string/permdesc_control_incall_experience"
1307                 android:label="@string/permlab_control_incall_experience" />
1308
1309     <!-- ================================== -->
1310     <!-- Permissions for sdcard interaction -->
1311     <!-- ================================== -->
1312     <eat-comment />
1313
1314     <!-- Group of permissions that are related to SD card access. -->
1315     <permission-group android:name="android.permission-group.STORAGE"
1316         android:label="@string/permgrouplab_storage"
1317         android:icon="@drawable/perm_group_storage"
1318         android:description="@string/permgroupdesc_storage"
1319         android:permissionGroupFlags="personalInfo"
1320         android:priority="240" />
1321
1322     <!-- Allows an application to read from external storage.
1323          <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
1324          granted this permission.</p>
1325          <p>This permission is enforced starting in API level 19.  Before API level 19, this
1326          permission is not enforced and all apps still have access to read from external storage.
1327          You can test your app with the permission enforced by enabling <em>Protect USB
1328          storage</em> under Developer options in the Settings app on a device running Android 4.1 or
1329          higher.</p>
1330          <p>Also starting in API level 19, this permission is <em>not</em> required to
1331          read/write files in your application-specific directories returned by
1332          {@link android.content.Context#getExternalFilesDir} and
1333          {@link android.content.Context#getExternalCacheDir}.
1334          <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1335          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1336          minSdkVersion}</a> and <a
1337          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1338          targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1339          grants your app this permission. If you don't need this permission, be sure your <a
1340          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1341          targetSdkVersion}</a> is 4 or higher.-->
1342     <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
1343         android:permissionGroup="android.permission-group.STORAGE"
1344         android:label="@string/permlab_sdcardRead"
1345         android:description="@string/permdesc_sdcardRead"
1346         android:protectionLevel="normal" />
1347
1348     <!-- Allows an application to write to external storage.
1349          <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1350          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1351          minSdkVersion}</a> and <a
1352          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1353          targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1354          grants your app this permission. If you don't need this permission, be sure your <a
1355          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1356          targetSdkVersion}</a> is 4 or higher.
1357          <p>Starting in API level 19, this permission is <em>not</em> required to
1358          read/write files in your application-specific directories returned by
1359          {@link android.content.Context#getExternalFilesDir} and
1360          {@link android.content.Context#getExternalCacheDir}. -->
1361     <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
1362         android:permissionGroup="android.permission-group.STORAGE"
1363         android:label="@string/permlab_sdcardWrite"
1364         android:description="@string/permdesc_sdcardWrite"
1365         android:protectionLevel="dangerous" />
1366
1367     <!-- @SystemApi Allows an application to write to internal media storage
1368          @hide  -->
1369     <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
1370         android:permissionGroup="android.permission-group.STORAGE"
1371         android:label="@string/permlab_mediaStorageWrite"
1372         android:description="@string/permdesc_mediaStorageWrite"
1373         android:protectionLevel="signature|system" />
1374
1375     <!-- Allows an application to manage access to documents, usually as part
1376          of a document picker. -->
1377     <permission android:name="android.permission.MANAGE_DOCUMENTS"
1378         android:permissionGroup="android.permission-group.STORAGE"
1379         android:label="@string/permlab_manageDocs"
1380         android:description="@string/permdesc_manageDocs"
1381         android:protectionLevel="signature" />
1382
1383     <!-- ================================== -->
1384     <!-- Permissions for screenlock         -->
1385     <!-- ================================== -->
1386     <eat-comment />
1387
1388     <!-- Group of permissions that are related to the screenlock. -->
1389     <permission-group android:name="android.permission-group.SCREENLOCK"
1390         android:label="@string/permgrouplab_screenlock"
1391         android:icon="@drawable/perm_group_screenlock"
1392         android:permissionGroupFlags="personalInfo"
1393         android:description="@string/permgroupdesc_screenlock"
1394         android:priority="230" />
1395
1396     <!-- Allows applications to disable the keyguard -->
1397     <permission android:name="android.permission.DISABLE_KEYGUARD"
1398         android:permissionGroup="android.permission-group.SCREENLOCK"
1399         android:protectionLevel="dangerous"
1400         android:description="@string/permdesc_disableKeyguard"
1401         android:label="@string/permlab_disableKeyguard" />
1402
1403     <!-- ================================== -->
1404     <!-- Permissions to access other installed applications  -->
1405     <!-- ================================== -->
1406     <eat-comment />
1407
1408     <!-- Group of permissions that are related to the other applications
1409          installed on the system.  Examples include such as listing
1410          running apps, or killing background processes. -->
1411     <permission-group android:name="android.permission-group.APP_INFO"
1412         android:label="@string/permgrouplab_appInfo"
1413         android:icon="@drawable/perm_group_app_info"
1414         android:description="@string/permgroupdesc_appInfo"
1415         android:priority="220" />
1416
1417     <!-- @deprecated No longer enforced. -->
1418     <permission android:name="android.permission.GET_TASKS"
1419         android:permissionGroup="android.permission-group.APP_INFO"
1420         android:protectionLevel="normal"
1421         android:label="@string/permlab_getTasks"
1422         android:description="@string/permdesc_getTasks" />
1423
1424     <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really
1425          give access to task information.  We need this new one because there are
1426          many existing apps that use add libraries and such that have validation
1427          code to ensure the app has requested the GET_TASKS permission by seeing
1428          if it has been granted the permission...  if it hasn't, it kills the app
1429          with a message about being upset.  So we need to have it continue to look
1430          like the app is getting that permission, even though it will never be
1431          checked, and new privileged apps can now request this one for real access.
1432          @hide
1433          @SystemApi -->
1434     <permission android:name="android.permission.REAL_GET_TASKS"
1435         android:permissionGroup="android.permission-group.APP_INFO"
1436         android:protectionLevel="signature|system"
1437         android:label="@string/permlab_getTasks"
1438         android:description="@string/permdesc_getTasks" />
1439
1440     <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo.
1441          @hide -->
1442     <permission android:name="android.permission.START_TASKS_FROM_RECENTS"
1443         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1444         android:protectionLevel="signature|system"
1445         android:label="@string/permlab_startTasksFromRecents"
1446         android:description="@string/permdesc_startTasksFromRecents" />
1447
1448     <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
1449          across the users on the device, using singleton services and
1450          user-targeted broadcasts.  This permission is not available to
1451          third party applications. -->
1452     <permission android:name="android.permission.INTERACT_ACROSS_USERS"
1453         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1454         android:protectionLevel="signature|system|development"
1455         android:label="@string/permlab_interactAcrossUsers"
1456         android:description="@string/permdesc_interactAcrossUsers" />
1457
1458     <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
1459          that removes restrictions on where broadcasts can be sent and allows other
1460          types of interactions. -->
1461     <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
1462         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1463         android:protectionLevel="signature"
1464         android:label="@string/permlab_interactAcrossUsersFull"
1465         android:description="@string/permdesc_interactAcrossUsersFull" />
1466
1467     <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
1468          users on the device. This permission is not available to
1469          third party applications. -->
1470     <permission android:name="android.permission.MANAGE_USERS"
1471         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1472         android:protectionLevel="signature|system"
1473         android:label="@string/permlab_manageUsers"
1474         android:description="@string/permdesc_manageUsers" />
1475
1476     <!-- Allows an application to get full detailed information about
1477          recently running tasks, with full fidelity to the real state.
1478          @hide -->
1479     <permission android:name="android.permission.GET_DETAILED_TASKS"
1480         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1481         android:protectionLevel="signature"
1482         android:label="@string/permlab_getDetailedTasks"
1483         android:description="@string/permdesc_getDetailedTasks" />
1484
1485     <!-- Allows an application to change the Z-order of tasks -->
1486     <permission android:name="android.permission.REORDER_TASKS"
1487         android:permissionGroup="android.permission-group.APP_INFO"
1488         android:protectionLevel="normal"
1489         android:label="@string/permlab_reorderTasks"
1490         android:description="@string/permdesc_reorderTasks" />
1491
1492     <!-- @hide Allows an application to change to remove/kill tasks -->
1493     <permission android:name="android.permission.REMOVE_TASKS"
1494         android:permissionGroup="android.permission-group.APP_INFO"
1495         android:protectionLevel="signature"
1496         android:label="@string/permlab_removeTasks"
1497         android:description="@string/permdesc_removeTasks" />
1498
1499     <!-- @SystemApi @hide Allows an application to create/manage/remove stacks -->
1500     <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
1501         android:permissionGroup="android.permission-group.APP_INFO"
1502         android:protectionLevel="signature|system"
1503         android:label="@string/permlab_manageActivityStacks"
1504         android:description="@string/permdesc_manageActivityStacks" />
1505
1506     <!-- Allows an application to start any activity, regardless of permission
1507          protection or exported state. @hide -->
1508     <permission android:name="android.permission.START_ANY_ACTIVITY"
1509         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1510         android:protectionLevel="signature"
1511         android:label="@string/permlab_startAnyActivity"
1512         android:description="@string/permdesc_startAnyActivity" />
1513
1514     <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
1515         API is no longer supported. -->
1516     <permission android:name="android.permission.RESTART_PACKAGES"
1517         android:permissionGroup="android.permission-group.APP_INFO"
1518         android:protectionLevel="normal"
1519         android:label="@string/permlab_killBackgroundProcesses"
1520         android:description="@string/permdesc_killBackgroundProcesses" />
1521
1522     <!-- Allows an application to call
1523         {@link android.app.ActivityManager#killBackgroundProcesses}. -->
1524     <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
1525         android:permissionGroup="android.permission-group.APP_INFO"
1526         android:protectionLevel="normal"
1527         android:label="@string/permlab_killBackgroundProcesses"
1528         android:description="@string/permdesc_killBackgroundProcesses" />
1529
1530     <!-- ================================== -->
1531     <!-- Permissions affecting the display of other applications  -->
1532     <!-- ================================== -->
1533     <eat-comment />
1534
1535     <!-- Group of permissions that allow manipulation of how
1536          another application displays UI to the user. -->
1537     <permission-group android:name="android.permission-group.DISPLAY"
1538         android:label="@string/permgrouplab_display"
1539         android:icon="@drawable/perm_group_display"
1540         android:description="@string/permgroupdesc_display"
1541         android:priority="190"/>
1542
1543     <!-- Allows an application to open windows using the type
1544          {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT},
1545          shown on top of all other applications.  Very few applications
1546          should use this permission; these windows are intended for
1547          system-level interaction with the user. -->
1548     <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
1549         android:permissionGroup="android.permission-group.DISPLAY"
1550         android:protectionLevel="dangerous"
1551         android:label="@string/permlab_systemAlertWindow"
1552         android:description="@string/permdesc_systemAlertWindow" />
1553
1554     <!-- ================================== -->
1555     <!-- Permissions affecting the system wallpaper -->
1556     <!-- ================================== -->
1557     <eat-comment />
1558
1559     <!-- Group of permissions that allow manipulation of how
1560          another application displays UI to the user. -->
1561     <permission-group android:name="android.permission-group.WALLPAPER"
1562         android:label="@string/permgrouplab_wallpaper"
1563         android:icon="@drawable/perm_group_wallpaper"
1564         android:description="@string/permgroupdesc_wallpaper"
1565         android:priority="150" />
1566
1567     <!-- Allows applications to set the wallpaper -->
1568     <permission android:name="android.permission.SET_WALLPAPER"
1569         android:permissionGroup="android.permission-group.WALLPAPER"
1570         android:protectionLevel="normal"
1571         android:label="@string/permlab_setWallpaper"
1572         android:description="@string/permdesc_setWallpaper" />
1573
1574     <!-- Allows applications to set the wallpaper hints -->
1575     <permission android:name="android.permission.SET_WALLPAPER_HINTS"
1576         android:permissionGroup="android.permission-group.WALLPAPER"
1577         android:protectionLevel="normal"
1578         android:label="@string/permlab_setWallpaperHints"
1579         android:description="@string/permdesc_setWallpaperHints" />
1580
1581     <!-- ============================================ -->
1582     <!-- Permissions for changing the system clock -->
1583     <!-- ============================================ -->
1584     <eat-comment />
1585
1586     <!-- Group of permissions that are related to system clock. -->
1587     <permission-group android:name="android.permission-group.SYSTEM_CLOCK"
1588         android:label="@string/permgrouplab_systemClock"
1589         android:icon="@drawable/perm_group_system_clock"
1590         android:description="@string/permgroupdesc_systemClock"
1591         android:priority="140" />
1592
1593     <!-- @SystemApi Allows applications to set the system time.
1594     <p>Not for use by third-party applications. -->
1595     <permission android:name="android.permission.SET_TIME"
1596         android:protectionLevel="signature|system"
1597         android:label="@string/permlab_setTime"
1598         android:description="@string/permdesc_setTime" />
1599
1600     <!-- Allows applications to set the system time zone -->
1601     <permission android:name="android.permission.SET_TIME_ZONE"
1602         android:permissionGroup="android.permission-group.SYSTEM_CLOCK"
1603         android:protectionLevel="normal"
1604         android:label="@string/permlab_setTimeZone"
1605         android:description="@string/permdesc_setTimeZone" />
1606
1607     <!-- ==================================================== -->
1608     <!-- Permissions related to changing status bar   -->
1609     <!-- ==================================================== -->
1610     <eat-comment />
1611
1612     <!-- Used for permissions that change the status bar -->
1613     <permission-group android:name="android.permission-group.STATUS_BAR"
1614         android:label="@string/permgrouplab_statusBar"
1615         android:icon="@drawable/perm_group_status_bar"
1616         android:description="@string/permgroupdesc_statusBar"
1617         android:priority="110" />
1618
1619     <!-- Allows an application to expand or collapse the status bar. -->
1620     <permission android:name="android.permission.EXPAND_STATUS_BAR"
1621         android:permissionGroup="android.permission-group.STATUS_BAR"
1622         android:protectionLevel="normal"
1623         android:label="@string/permlab_expandStatusBar"
1624         android:description="@string/permdesc_expandStatusBar" />
1625
1626     <!-- ============================================================== -->
1627     <!-- Permissions related to adding/removing shortcuts from Launcher -->
1628     <!-- ============================================================== -->
1629     <eat-comment />
1630
1631     <!-- Allows an application to install a shortcut in Launcher -->
1632     <permission
1633         android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
1634         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1635         android:protectionLevel="dangerous"
1636         android:label="@string/permlab_install_shortcut"
1637         android:description="@string/permdesc_install_shortcut" />
1638
1639         <!-- Allows an application to uninstall a shortcut in Launcher -->
1640     <permission
1641         android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
1642         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1643         android:protectionLevel="dangerous"
1644         android:label="@string/permlab_uninstall_shortcut"
1645         android:description="@string/permdesc_uninstall_shortcut"/>
1646
1647     <!-- ==================================================== -->
1648     <!-- Permissions related to accessing sync settings   -->
1649     <!-- ==================================================== -->
1650     <eat-comment />
1651
1652     <!-- Used for permissions that access the sync settings or sync
1653          related information. -->
1654     <permission-group android:name="android.permission-group.SYNC_SETTINGS"
1655         android:label="@string/permgrouplab_syncSettings"
1656         android:icon="@drawable/perm_group_sync_settings"
1657         android:description="@string/permgroupdesc_syncSettings"
1658         android:priority="120" />
1659
1660     <!-- Allows applications to read the sync settings -->
1661     <permission android:name="android.permission.READ_SYNC_SETTINGS"
1662         android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1663         android:protectionLevel="normal"
1664         android:description="@string/permdesc_readSyncSettings"
1665         android:label="@string/permlab_readSyncSettings" />
1666
1667     <!-- Allows applications to write the sync settings -->
1668     <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
1669         android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1670         android:protectionLevel="normal"
1671         android:description="@string/permdesc_writeSyncSettings"
1672         android:label="@string/permlab_writeSyncSettings" />
1673
1674     <!-- Allows applications to read the sync stats -->
1675     <permission android:name="android.permission.READ_SYNC_STATS"
1676         android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1677         android:protectionLevel="normal"
1678         android:description="@string/permdesc_readSyncStats"
1679         android:label="@string/permlab_readSyncStats" />
1680
1681
1682     <!-- ============================================ -->
1683     <!-- Permissions for low-level system interaction -->
1684     <!-- ============================================ -->
1685     <eat-comment />
1686
1687     <!-- Group of permissions that are related to system APIs.  Many
1688          of these are not permissions the user will be expected to understand,
1689          and such permissions should generally be marked as "normal" protection
1690          level so they don't get displayed.  This can also, however, be used
1691          for miscellaneous features that provide access to the operating system,
1692          such as writing the global system settings. -->
1693     <permission-group android:name="android.permission-group.SYSTEM_TOOLS"
1694         android:label="@string/permgrouplab_systemTools"
1695         android:icon="@drawable/perm_group_system_tools"
1696         android:description="@string/permgroupdesc_systemTools"
1697         android:priority="100" />
1698
1699     <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
1700     <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
1701         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1702         android:protectionLevel="signature"
1703         android:label="@string/permlab_setScreenCompatibility"
1704         android:description="@string/permdesc_setScreenCompatibility" />
1705
1706     <!-- Allows an application to access all multi-user external storage @hide -->
1707     <permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE"
1708         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1709         android:label="@string/permlab_sdcardAccessAll"
1710         android:description="@string/permdesc_sdcardAccessAll"
1711         android:protectionLevel="signature" />
1712
1713     <!-- @SystemApi Allows an application to modify the current configuration, such
1714          as locale. -->
1715     <permission android:name="android.permission.CHANGE_CONFIGURATION"
1716         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1717         android:protectionLevel="signature|system|development"
1718         android:label="@string/permlab_changeConfiguration"
1719         android:description="@string/permdesc_changeConfiguration" />
1720
1721     <!-- Allows an application to read or write the system settings. -->
1722     <permission android:name="android.permission.WRITE_SETTINGS"
1723         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1724         android:protectionLevel="normal"
1725         android:label="@string/permlab_writeSettings"
1726         android:description="@string/permdesc_writeSettings" />
1727
1728     <!-- @SystemApi Allows an application to modify the Google service map.
1729     <p>Not for use by third-party applications. -->
1730     <permission android:name="android.permission.WRITE_GSERVICES"
1731         android:protectionLevel="signature|system"
1732         android:label="@string/permlab_writeGservices"
1733         android:description="@string/permdesc_writeGservices" />
1734
1735     <!-- @SystemApi Allows an application to call
1736         {@link android.app.ActivityManager#forceStopPackage}.
1737         @hide -->
1738     <permission android:name="android.permission.FORCE_STOP_PACKAGES"
1739         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1740         android:protectionLevel="signature|system"
1741         android:label="@string/permlab_forceStopPackages"
1742         android:description="@string/permdesc_forceStopPackages" />
1743
1744     <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
1745          An active window is the window that has fired an accessibility event. -->
1746     <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
1747         android:permissionGroup="android.permission-group.PERSONAL_INFO"
1748         android:protectionLevel="signature|system"
1749         android:label="@string/permlab_retrieve_window_content"
1750         android:description="@string/permdesc_retrieve_window_content" />
1751
1752     <!-- @SystemApi Modify the global animation scaling factor.
1753     <p>Not for use by third-party applications. -->
1754     <permission android:name="android.permission.SET_ANIMATION_SCALE"
1755         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1756         android:protectionLevel="signature|system|development"
1757         android:label="@string/permlab_setAnimationScale"
1758         android:description="@string/permdesc_setAnimationScale" />
1759
1760     <!-- @deprecated This functionality will be removed in the future; please do
1761          not use. Allow an application to make its activities persistent. -->
1762     <permission android:name="android.permission.PERSISTENT_ACTIVITY"
1763         android:permissionGroup="android.permission-group.APP_INFO"
1764         android:protectionLevel="normal"
1765         android:label="@string/permlab_persistentActivity"
1766         android:description="@string/permdesc_persistentActivity" />
1767
1768     <!-- Allows an application to find out the space used by any package. -->
1769     <permission android:name="android.permission.GET_PACKAGE_SIZE"
1770         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1771         android:protectionLevel="normal"
1772         android:label="@string/permlab_getPackageSize"
1773         android:description="@string/permdesc_getPackageSize" />
1774
1775     <!-- @deprecated No longer useful, see
1776          {@link android.content.pm.PackageManager#addPackageToPreferred}
1777          for details. -->
1778     <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
1779         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1780         android:protectionLevel="signature"
1781         android:label="@string/permlab_setPreferredApplications"
1782         android:description="@string/permdesc_setPreferredApplications" />
1783
1784     <!-- Allows an application to receive the
1785          {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
1786          broadcast after the system finishes booting.  If you don't
1787          request this permission, you will not receive the broadcast at
1788          that time.  Though holding this permission does not have any
1789          security implications, it can have a negative impact on the
1790          user experience by increasing the amount of time it takes the
1791          system to start and allowing applications to have themselves
1792          running without the user being aware of them.  As such, you must
1793          explicitly declare your use of this facility to make that visible
1794          to the user. -->
1795     <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
1796         android:permissionGroup="android.permission-group.APP_INFO"
1797         android:protectionLevel="normal"
1798         android:label="@string/permlab_receiveBootCompleted"
1799         android:description="@string/permdesc_receiveBootCompleted" />
1800
1801     <!-- Allows an application to broadcast sticky intents.  These are
1802          broadcasts whose data is held by the system after being finished,
1803          so that clients can quickly retrieve that data without having
1804          to wait for the next broadcast. -->
1805     <permission android:name="android.permission.BROADCAST_STICKY"
1806         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1807         android:protectionLevel="normal"
1808         android:label="@string/permlab_broadcastSticky"
1809         android:description="@string/permdesc_broadcastSticky" />
1810
1811     <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
1812     <p>Not for use by third-party applications.-->
1813     <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
1814         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1815         android:protectionLevel="system|signature"
1816         android:label="@string/permlab_mount_unmount_filesystems"
1817         android:description="@string/permdesc_mount_unmount_filesystems" />
1818
1819     <!-- @SystemApi Allows formatting file systems for removable storage.
1820     <p>Not for use by third-party applications. -->
1821     <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
1822         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1823         android:protectionLevel="system|signature"
1824         android:label="@string/permlab_mount_format_filesystems"
1825         android:description="@string/permdesc_mount_format_filesystems" />
1826
1827     <!-- Allows access to ASEC non-destructive API calls
1828          @hide  -->
1829     <permission android:name="android.permission.ASEC_ACCESS"
1830         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1831         android:protectionLevel="signature"
1832         android:label="@string/permlab_asec_access"
1833         android:description="@string/permdesc_asec_access" />
1834
1835     <!-- Allows creation of ASEC volumes
1836          @hide  -->
1837     <permission android:name="android.permission.ASEC_CREATE"
1838         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1839         android:protectionLevel="signature"
1840         android:label="@string/permlab_asec_create"
1841         android:description="@string/permdesc_asec_create" />
1842
1843     <!-- Allows destruction of ASEC volumes
1844          @hide  -->
1845     <permission android:name="android.permission.ASEC_DESTROY"
1846         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1847         android:protectionLevel="signature"
1848         android:label="@string/permlab_asec_destroy"
1849         android:description="@string/permdesc_asec_destroy" />
1850
1851     <!-- Allows mount / unmount of ASEC volumes
1852          @hide  -->
1853     <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
1854         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1855         android:protectionLevel="signature"
1856         android:label="@string/permlab_asec_mount_unmount"
1857         android:description="@string/permdesc_asec_mount_unmount" />
1858
1859     <!-- Allows rename of ASEC volumes
1860          @hide  -->
1861     <permission android:name="android.permission.ASEC_RENAME"
1862         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1863         android:protectionLevel="signature"
1864         android:label="@string/permlab_asec_rename"
1865         android:description="@string/permdesc_asec_rename" />
1866
1867     <!-- @SystemApi Allows applications to write the apn settings.
1868     <p>Not for use by third-party applications. -->
1869     <permission android:name="android.permission.WRITE_APN_SETTINGS"
1870                 android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1871                 android:protectionLevel="signature|system"
1872                 android:description="@string/permdesc_writeApnSettings"
1873                 android:label="@string/permlab_writeApnSettings" />
1874
1875     <!-- Allows an application to allow access the subscribed feeds
1876          ContentProvider. -->
1877     <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
1878         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1879         android:label="@string/permlab_subscribedFeedsRead"
1880         android:description="@string/permdesc_subscribedFeedsRead"
1881         android:protectionLevel="normal" />
1882     <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
1883         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1884         android:label="@string/permlab_subscribedFeedsWrite"
1885         android:description="@string/permdesc_subscribedFeedsWrite"
1886         android:protectionLevel="dangerous" />
1887
1888     <!-- Allows applications to change network connectivity state -->
1889     <permission android:name="android.permission.CHANGE_NETWORK_STATE"
1890         android:permissionGroup="android.permission-group.NETWORK"
1891         android:protectionLevel="normal"
1892         android:description="@string/permdesc_changeNetworkState"
1893         android:label="@string/permlab_changeNetworkState" />
1894
1895     <!-- Allows an application to clear the caches of all installed
1896          applications on the device.  -->
1897     <permission android:name="android.permission.CLEAR_APP_CACHE"
1898         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1899         android:protectionLevel="dangerous"
1900         android:label="@string/permlab_clearAppCache"
1901         android:description="@string/permdesc_clearAppCache" />
1902
1903     <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
1904          @hide -->
1905     <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
1906         android:protectionLevel="signature|system"
1907         android:label="@string/permlab_anyCodecForPlayback"
1908         android:description="@string/permdesc_anyCodecForPlayback" />
1909
1910     <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
1911          behalf of the user.
1912          @hide -->
1913     <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
1914         android:protectionLevel="signature|system"
1915         android:label="@string/permlab_manageCaCertificates"
1916         android:description="@string/permdesc_manageCaCertificates" />
1917
1918     <!-- @SystemApi Allows an application to do certain operations needed for
1919          interacting with the recovery (system update) system.
1920          @hide -->
1921     <permission android:name="android.permission.RECOVERY"
1922         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1923         android:protectionLevel="signature|system"
1924         android:label="@string/permlab_recovery"
1925         android:description="@string/permdesc_recovery" />
1926
1927     <!-- Allows the system to bind to an application's task services
1928          @hide -->
1929     <permission android:name="android.permission.BIND_JOB_SERVICE"
1930         android:protectionLevel="signature"
1931         android:label="@string/permlab_bindJobService"
1932         android:description="@string/permdesc_bindJobService" />
1933     <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
1934
1935     <!-- ========================================= -->
1936     <!-- Permissions for special development tools -->
1937     <!-- ========================================= -->
1938     <eat-comment />
1939
1940     <!-- Group of permissions that are related to development features.  These
1941          are not permissions that should appear in third-party applications; they
1942          protect APIs that are intended only to be used for development
1943          purposes. -->
1944     <permission-group android:name="android.permission-group.DEVELOPMENT_TOOLS"
1945         android:label="@string/permgrouplab_developmentTools"
1946         android:description="@string/permgroupdesc_developmentTools"
1947         android:priority="310" />
1948
1949     <!-- @SystemApi Allows an application to read or write the secure system settings.
1950     <p>Not for use by third-party applications. -->
1951     <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
1952         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1953         android:protectionLevel="signature|system|development"
1954         android:label="@string/permlab_writeSecureSettings"
1955         android:description="@string/permdesc_writeSecureSettings" />
1956
1957     <!-- @SystemApi Allows an application to retrieve state dump information from system services.
1958     <p>Not for use by third-party applications. -->
1959     <permission android:name="android.permission.DUMP"
1960         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1961         android:protectionLevel="signature|system|development"
1962         android:label="@string/permlab_dump"
1963         android:description="@string/permdesc_dump" />
1964
1965     <!-- @SystemApi Allows an application to read the low-level system log files.
1966     <p>Not for use by third-party applications, because
1967     Log entries can contain the user's private information. -->
1968     <permission android:name="android.permission.READ_LOGS"
1969         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1970         android:protectionLevel="signature|system|development"
1971         android:label="@string/permlab_readLogs"
1972         android:description="@string/permdesc_readLogs" />
1973
1974     <!-- @SystemApi Configure an application for debugging.
1975     <p>Not for use by third-party applications. -->
1976     <permission android:name="android.permission.SET_DEBUG_APP"
1977         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1978         android:protectionLevel="signature|system|development"
1979         android:label="@string/permlab_setDebugApp"
1980         android:description="@string/permdesc_setDebugApp" />
1981
1982     <!-- @SystemApi Allows an application to set the maximum number of (not needed)
1983          application processes that can be running.
1984          <p>Not for use by third-party applications. -->
1985     <permission android:name="android.permission.SET_PROCESS_LIMIT"
1986         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1987         android:protectionLevel="signature|system|development"
1988         android:label="@string/permlab_setProcessLimit"
1989         android:description="@string/permdesc_setProcessLimit" />
1990
1991     <!-- @SystemApi Allows an application to control whether activities are immediately
1992          finished when put in the background.
1993          <p>Not for use by third-party applications. -->
1994     <permission android:name="android.permission.SET_ALWAYS_FINISH"
1995         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1996         android:protectionLevel="signature|system|development"
1997         android:label="@string/permlab_setAlwaysFinish"
1998         android:description="@string/permdesc_setAlwaysFinish" />
1999
2000     <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
2001     <p>Not for use by third-party applications. -->
2002     <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
2003         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
2004         android:protectionLevel="signature|system|development"
2005         android:label="@string/permlab_signalPersistentProcesses"
2006         android:description="@string/permdesc_signalPersistentProcesses" />
2007
2008     <!-- ==================================== -->
2009     <!-- Private (signature-only) permissions -->
2010     <!-- ==================================== -->
2011     <eat-comment />
2012
2013     <!-- @SystemApi Allows applications to RW to diagnostic resources.
2014     <p>Not for use by third-party applications. -->
2015     <permission android:name="android.permission.DIAGNOSTIC"
2016         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2017         android:protectionLevel="signature"
2018         android:description="@string/permdesc_diagnostic"
2019         android:label="@string/permlab_diagnostic" />
2020
2021     <!-- @SystemApi Allows an application to open, close, or disable the status bar
2022          and its icons.
2023          <p>Not for use by third-party applications. -->
2024     <permission android:name="android.permission.STATUS_BAR"
2025         android:label="@string/permlab_statusBar"
2026         android:description="@string/permdesc_statusBar"
2027         android:protectionLevel="signature|system" />
2028
2029     <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
2030     @hide -->
2031     <permission android:name="android.permission.STATUS_BAR_SERVICE"
2032         android:label="@string/permlab_statusBarService"
2033         android:description="@string/permdesc_statusBarService"
2034         android:protectionLevel="signature" />
2035
2036     <!-- Allows an application to force a BACK operation on whatever is the
2037          top activity.
2038          <p>Not for use by third-party applications. -->
2039     <permission android:name="android.permission.FORCE_BACK"
2040         android:label="@string/permlab_forceBack"
2041         android:description="@string/permdesc_forceBack"
2042         android:protectionLevel="signature" />
2043
2044     <!-- @SystemApi Allows an application to update device statistics.
2045     <p>Not for use by third-party applications. -->
2046     <permission android:name="android.permission.UPDATE_DEVICE_STATS"
2047         android:label="@string/permlab_updateBatteryStats"
2048         android:description="@string/permdesc_updateBatteryStats"
2049         android:protectionLevel="signature|system" />
2050
2051     <!-- @SystemApi @hide Allows an application to collect battery statistics -->
2052     <permission android:name="android.permission.GET_APP_OPS_STATS"
2053         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2054         android:label="@string/permlab_getAppOpsStats"
2055         android:description="@string/permdesc_getAppOpsStats"
2056         android:protectionLevel="signature|system|development" />
2057
2058     <!-- @SystemApi Allows an application to update application operation statistics. Not for
2059          use by third party apps. @hide -->
2060     <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
2061         android:label="@string/permlab_updateAppOpsStats"
2062         android:description="@string/permdesc_updateAppOpsStats"
2063         android:protectionLevel="signature|system" />
2064
2065     <!-- Allows an application to open windows that are for use by parts
2066          of the system user interface.
2067          <p>Not for use by third-party applications. -->
2068     <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
2069         android:label="@string/permlab_internalSystemWindow"
2070         android:description="@string/permdesc_internalSystemWindow"
2071         android:protectionLevel="signature" />
2072
2073     <!-- Allows an application to manage (create, destroy,
2074          Z-order) application tokens in the window manager.
2075          <p>Not for use by third-party applications. -->
2076     <permission android:name="android.permission.MANAGE_APP_TOKENS"
2077         android:label="@string/permlab_manageAppTokens"
2078         android:description="@string/permdesc_manageAppTokens"
2079         android:protectionLevel="signature" />
2080
2081     <!-- @hide Allows the application to temporarily freeze the screen for a
2082          full-screen transition. -->
2083     <permission android:name="android.permission.FREEZE_SCREEN"
2084         android:label="@string/permlab_freezeScreen"
2085         android:description="@string/permdesc_freezeScreen"
2086         android:protectionLevel="signature" />
2087
2088     <!-- Allows an application to inject user events (keys, touch, trackball)
2089          into the event stream and deliver them to ANY window.  Without this
2090          permission, you can only deliver events to windows in your own process.
2091          <p>Not for use by third-party applications. -->
2092     <permission android:name="android.permission.INJECT_EVENTS"
2093         android:label="@string/permlab_injectEvents"
2094         android:description="@string/permdesc_injectEvents"
2095         android:protectionLevel="signature" />
2096
2097     <!-- @hide Allows an application to register an input filter which filters the stream
2098          of user events (keys, touch, trackball) before they are dispatched to any window. -->
2099     <permission android:name="android.permission.FILTER_EVENTS"
2100         android:label="@string/permlab_filter_events"
2101         android:description="@string/permdesc_filter_events"
2102         android:protectionLevel="signature" />
2103
2104     <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
2105     <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
2106         android:label="@string/permlab_retrieveWindowToken"
2107         android:description="@string/permdesc_retrieveWindowToken"
2108         android:protectionLevel="signature" />
2109
2110     <!-- @hide Allows an application to collect frame statistics -->
2111     <permission android:name="android.permission.FRAME_STATS"
2112          android:label="@string/permlab_frameStats"
2113          android:description="@string/permdesc_frameStats"
2114          android:protectionLevel="signature" />
2115
2116     <!-- @hide Allows an application to temporary enable accessibility on the device. -->
2117     <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
2118         android:label="@string/permlab_temporary_enable_accessibility"
2119         android:description="@string/permdesc_temporary_enable_accessibility"
2120         android:protectionLevel="signature" />
2121
2122     <!-- Allows an application to watch and control how activities are
2123          started globally in the system.  Only for is in debugging
2124          (usually the monkey command).
2125          <p>Not for use by third-party applications. -->
2126     <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
2127         android:label="@string/permlab_runSetActivityWatcher"
2128         android:description="@string/permdesc_runSetActivityWatcher"
2129         android:protectionLevel="signature" />
2130
2131     <!-- @SystemApi Allows an application to call the activity manager shutdown() API
2132          to put the higher-level system there into a shutdown state.
2133          @hide -->
2134     <permission android:name="android.permission.SHUTDOWN"
2135         android:label="@string/permlab_shutdown"
2136         android:description="@string/permdesc_shutdown"
2137         android:protectionLevel="signature|system" />
2138
2139     <!-- @SystemApi Allows an application to tell the activity manager to temporarily
2140          stop application switches, putting it into a special mode that
2141          prevents applications from immediately switching away from some
2142          critical UI such as the home screen.
2143          @hide -->
2144     <permission android:name="android.permission.STOP_APP_SWITCHES"
2145         android:label="@string/permlab_stopAppSwitches"
2146         android:description="@string/permdesc_stopAppSwitches"
2147         android:protectionLevel="signature|system" />
2148
2149     <!-- Allows an application to retrieve private information about
2150          the current top activity, such as any assist context it can provide.
2151          <p>Not for use by third-party applications. -->
2152     <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
2153         android:label="@string/permlab_getTopActivityInfo"
2154         android:description="@string/permdesc_getTopActivityInfo"
2155         android:protectionLevel="signature" />
2156
2157     <!-- Allows an application to retrieve the current state of keys and
2158          switches.
2159          <p>Not for use by third-party applications.
2160          @deprecated The API that used this permission has been removed. -->
2161     <permission android:name="android.permission.READ_INPUT_STATE"
2162         android:label="@string/permlab_readInputState"
2163         android:description="@string/permdesc_readInputState"
2164         android:protectionLevel="signature" />
2165
2166     <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
2167          to ensure that only the system can bind to it. -->
2168     <permission android:name="android.permission.BIND_INPUT_METHOD"
2169         android:label="@string/permlab_bindInputMethod"
2170         android:description="@string/permdesc_bindInputMethod"
2171         android:protectionLevel="signature" />
2172
2173     <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
2174          to ensure that only the system can bind to it. -->
2175     <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
2176         android:label="@string/permlab_bindAccessibilityService"
2177         android:description="@string/permdesc_bindAccessibilityService"
2178         android:protectionLevel="signature" />
2179
2180     <!-- Must be required by a {@link android.printservice.PrintService},
2181          to ensure that only the system can bind to it. -->
2182     <permission android:name="android.permission.BIND_PRINT_SERVICE"
2183         android:label="@string/permlab_bindPrintService"
2184         android:description="@string/permdesc_bindPrintService"
2185         android:protectionLevel="signature" />
2186
2187     <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
2188          or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
2189          the system can bind to it. -->
2190     <permission android:name="android.permission.BIND_NFC_SERVICE"
2191         android:label="@string/permlab_bindNfcService"
2192         android:description="@string/permdesc_bindNfcService"
2193         android:protectionLevel="signature" />
2194
2195     <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
2196          @hide -->
2197     <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
2198         android:label="@string/permlab_bindPrintSpoolerService"
2199         android:description="@string/permdesc_bindPrintSpoolerService"
2200         android:protectionLevel="signature" />
2201
2202     <!-- Must be required by a TextService (e.g. SpellCheckerService)
2203          to ensure that only the system can bind to it. -->
2204     <permission android:name="android.permission.BIND_TEXT_SERVICE"
2205         android:label="@string/permlab_bindTextService"
2206         android:description="@string/permdesc_bindTextService"
2207         android:protectionLevel="signature" />
2208
2209     <!-- Must be required by a {@link android.net.VpnService},
2210          to ensure that only the system can bind to it. -->
2211     <permission android:name="android.permission.BIND_VPN_SERVICE"
2212         android:label="@string/permlab_bindVpnService"
2213         android:description="@string/permdesc_bindVpnService"
2214         android:protectionLevel="signature" />
2215
2216     <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
2217          to ensure that only the system can bind to it. -->
2218     <permission android:name="android.permission.BIND_WALLPAPER"
2219         android:label="@string/permlab_bindWallpaper"
2220         android:description="@string/permdesc_bindWallpaper"
2221         android:protectionLevel="signature|system" />
2222
2223     <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
2224          to ensure that only the system can bind to it. -->
2225     <permission android:name="android.permission.BIND_VOICE_INTERACTION"
2226         android:label="@string/permlab_bindVoiceInteraction"
2227         android:description="@string/permdesc_bindVoiceInteraction"
2228         android:protectionLevel="signature" />
2229
2230     <!-- Must be required by hotword enrollment application,
2231          to ensure that only the system can interact with it.
2232          @hide <p>Not for use by third-party applications.</p> -->
2233     <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
2234         android:label="@string/permlab_manageVoiceKeyphrases"
2235         android:description="@string/permdesc_manageVoiceKeyphrases"
2236         android:protectionLevel="signature|system" />
2237
2238     <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
2239          to ensure that only the system can bind to it.
2240          @hide -->
2241     <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
2242         android:label="@string/permlab_bindRemoteDisplay"
2243         android:description="@string/permdesc_bindRemoteDisplay"
2244         android:protectionLevel="signature" />
2245
2246     <!-- Must be required by a {@link android.media.tv.TvInputService}
2247          to ensure that only the system can bind to it. -->
2248     <permission android:name="android.permission.BIND_TV_INPUT"
2249         android:label="@string/permlab_bindTvInput"
2250         android:description="@string/permdesc_bindTvInput"
2251         android:protectionLevel="signature|system" />
2252
2253     <!-- @SystemApi Allows an application to modify parental controls
2254          <p>Not for use by third-party applications.
2255          @hide -->
2256     <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS"
2257         android:label="@string/permlab_modifyParentalControls"
2258         android:description="@string/permdesc_modifyParentalControls"
2259         android:protectionLevel="signature|system" />
2260
2261     <!-- Must be required by a {@link android.media.routing.MediaRouteService}
2262          to ensure that only the system can interact with it.
2263          @hide -->
2264     <permission android:name="android.permission.BIND_ROUTE_PROVIDER"
2265         android:label="@string/permlab_bindRouteProvider"
2266         android:description="@string/permdesc_bindRouteProvider"
2267         android:protectionLevel="signature" />
2268
2269     <!-- Must be required by device administration receiver, to ensure that only the
2270          system can interact with it. -->
2271     <permission android:name="android.permission.BIND_DEVICE_ADMIN"
2272         android:label="@string/permlab_bindDeviceAdmin"
2273         android:description="@string/permdesc_bindDeviceAdmin"
2274         android:protectionLevel="signature" />
2275
2276     <!-- @SystemApi Required to add or remove another application as a device admin.
2277          <p>Not for use by third-party applications.
2278          @hide -->
2279     <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
2280         android:label="@string/permlab_manageDeviceAdmins"
2281         android:description="@string/permdesc_manageDeviceAdmins"
2282         android:protectionLevel="signature|system" />
2283
2284     <!-- Allows low-level access to setting the orientation (actually
2285          rotation) of the screen.
2286          <p>Not for use by third-party applications. -->
2287     <permission android:name="android.permission.SET_ORIENTATION"
2288         android:label="@string/permlab_setOrientation"
2289         android:description="@string/permdesc_setOrientation"
2290         android:protectionLevel="signature" />
2291
2292     <!-- Allows low-level access to setting the pointer speed.
2293          <p>Not for use by third-party applications. -->
2294     <permission android:name="android.permission.SET_POINTER_SPEED"
2295         android:label="@string/permlab_setPointerSpeed"
2296         android:description="@string/permdesc_setPointerSpeed"
2297         android:protectionLevel="signature" />
2298
2299     <!-- Allows low-level access to setting input device calibration.
2300          <p>Not for use by normal applications.
2301          @hide -->
2302     <permission android:name="android.permission.SET_INPUT_CALIBRATION"
2303         android:label="@string/permlab_setInputCalibration"
2304         android:description="@string/permdesc_setInputCalibration"
2305         android:protectionLevel="signature" />
2306
2307     <!-- Allows low-level access to setting the keyboard layout.
2308          <p>Not for use by third-party applications.
2309          @hide -->
2310     <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
2311         android:label="@string/permlab_setKeyboardLayout"
2312         android:description="@string/permdesc_setKeyboardLayout"
2313         android:protectionLevel="signature" />
2314
2315     <!-- @SystemApi Allows an application to install packages.
2316     <p>Not for use by third-party applications. -->
2317     <permission android:name="android.permission.INSTALL_PACKAGES"
2318         android:label="@string/permlab_installPackages"
2319         android:description="@string/permdesc_installPackages"
2320         android:protectionLevel="signature|system" />
2321
2322     <!-- Allows an application to clear user data.
2323     <p>Not for use by third-party applications. -->
2324     <permission android:name="android.permission.CLEAR_APP_USER_DATA"
2325         android:label="@string/permlab_clearAppUserData"
2326         android:description="@string/permdesc_clearAppUserData"
2327         android:protectionLevel="signature" />
2328
2329     <!-- @SystemApi Allows an application to delete cache files.
2330     <p>Not for use by third-party applications. -->
2331     <permission android:name="android.permission.DELETE_CACHE_FILES"
2332         android:label="@string/permlab_deleteCacheFiles"
2333         android:description="@string/permdesc_deleteCacheFiles"
2334         android:protectionLevel="signature|system" />
2335
2336     <!-- @SystemApi Allows an application to delete packages.
2337     <p>Not for use by third-party applications. -->
2338     <permission android:name="android.permission.DELETE_PACKAGES"
2339         android:label="@string/permlab_deletePackages"
2340         android:description="@string/permdesc_deletePackages"
2341         android:protectionLevel="signature|system" />
2342
2343     <!-- @SystemApi Allows an application to move location of installed package.
2344          @hide -->
2345     <permission android:name="android.permission.MOVE_PACKAGE"
2346         android:label="@string/permlab_movePackage"
2347         android:description="@string/permdesc_movePackage"
2348         android:protectionLevel="signature|system" />
2349
2350     <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
2351          enabled or not.
2352          <p>Not for use by third-party applications. -->
2353     <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
2354         android:label="@string/permlab_changeComponentState"
2355         android:description="@string/permdesc_changeComponentState"
2356         android:protectionLevel="signature|system" />
2357
2358     <!-- @hide Allows an application to grant or revoke specific permissions. -->
2359     <permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS"
2360         android:label="@string/permlab_grantRevokePermissions"
2361         android:description="@string/permdesc_grantRevokePermissions"
2362         android:protectionLevel="signature" />
2363
2364     <!-- Allows an application to use SurfaceFlinger's low level features.
2365     <p>Not for use by third-party applications. -->
2366     <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
2367         android:label="@string/permlab_accessSurfaceFlinger"
2368         android:description="@string/permdesc_accessSurfaceFlinger"
2369         android:protectionLevel="signature" />
2370
2371     <!-- @SystemApi Allows an application to take screen shots and more generally
2372          get access to the frame buffer data.
2373          <p>Not for use by third-party applications. -->
2374     <permission android:name="android.permission.READ_FRAME_BUFFER"
2375         android:label="@string/permlab_readFrameBuffer"
2376         android:description="@string/permdesc_readFrameBuffer"
2377         android:protectionLevel="signature|system" />
2378
2379     <!-- Allows an application to use InputFlinger's low level features.
2380          @hide -->
2381     <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
2382         android:label="@string/permlab_accessInputFlinger"
2383         android:description="@string/permdesc_accessInputFlinger"
2384         android:protectionLevel="signature" />
2385
2386     <!-- Allows an application to configure and connect to Wifi displays
2387          @hide -->
2388     <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
2389         android:label="@string/permlab_configureWifiDisplay"
2390         android:description="@string/permdesc_configureWifiDisplay"
2391         android:protectionLevel="signature" />
2392
2393     <!-- Allows an application to control low-level features of Wifi displays
2394          such as opening an RTSP socket.  This permission should only be used
2395          by the display manager.
2396          @hide -->
2397     <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
2398         android:label="@string/permlab_controlWifiDisplay"
2399         android:description="@string/permdesc_controlWifiDisplay"
2400         android:protectionLevel="signature" />
2401
2402     <!-- @SystemApi Allows an application to capture audio output.
2403          <p>Not for use by third-party applications.</p> -->
2404     <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
2405         android:label="@string/permlab_captureAudioOutput"
2406         android:description="@string/permdesc_captureAudioOutput"
2407         android:protectionLevel="signature|system" />
2408
2409     <!-- @SystemApi Allows an application to capture audio for hotword detection.
2410          <p>Not for use by third-party applications.</p>
2411          @hide -->
2412     <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
2413         android:label="@string/permlab_captureAudioHotword"
2414         android:description="@string/permdesc_captureAudioHotword"
2415         android:protectionLevel="signature|system" />
2416
2417     <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
2418          <p>Not for use by third-party applications.</p>
2419          @hide -->
2420     <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
2421         android:label="@string/permlab_modifyAudioRouting"
2422         android:description="@string/permdesc_modifyAudioRouting"
2423         android:protectionLevel="signature|system" />
2424
2425     <!-- @SystemApi Allows an application to capture video output.
2426          <p>Not for use by third-party applications.</p> -->
2427     <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
2428         android:label="@string/permlab_captureVideoOutput"
2429         android:description="@string/permdesc_captureVideoOutput"
2430         android:protectionLevel="signature|system" />
2431
2432     <!-- @SystemApi Allows an application to capture secure video output.
2433          <p>Not for use by third-party applications.</p> -->
2434     <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
2435         android:label="@string/permlab_captureSecureVideoOutput"
2436         android:description="@string/permdesc_captureSecureVideoOutput"
2437         android:protectionLevel="signature|system" />
2438
2439     <!-- @SystemApi Allows an application to know what content is playing and control its playback.
2440          <p>Not for use by third-party applications due to privacy of media consumption</p>  -->
2441     <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
2442         android:label="@string/permlab_mediaContentControl"
2443         android:description="@string/permdesc_mediaContentControl"
2444         android:protectionLevel="signature|system" />
2445
2446     <!-- Required to be able to disable the device (very dangerous!).
2447     <p>Not for use by third-party applications.. -->
2448     <permission android:name="android.permission.BRICK"
2449         android:label="@string/permlab_brick"
2450         android:description="@string/permdesc_brick"
2451         android:protectionLevel="signature" />
2452
2453     <!-- @SystemApi Required to be able to reboot the device.
2454     <p>Not for use by third-party applications. -->
2455     <permission android:name="android.permission.REBOOT"
2456         android:label="@string/permlab_reboot"
2457         android:description="@string/permdesc_reboot"
2458         android:protectionLevel="signature|system" />
2459
2460    <!-- Allows low-level access to power management.
2461    <p>Not for use by third-party applications. -->
2462     <permission android:name="android.permission.DEVICE_POWER"
2463         android:label="@string/permlab_devicePower"
2464         android:description="@string/permdesc_devicePower"
2465         android:protectionLevel="signature" />
2466
2467    <!-- Allows access to the PowerManager.userActivity function.
2468    <p>Not for use by third-party applications. @hide @SystemApi -->
2469     <permission android:name="android.permission.USER_ACTIVITY"
2470         android:label="@string/permlab_userActivity"
2471         android:description="@string/permdesc_userActivity"
2472         android:protectionLevel="signature|system" />
2473
2474    <!-- @hide Allows low-level access to tun tap driver -->
2475     <permission android:name="android.permission.NET_TUNNELING"
2476         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2477         android:protectionLevel="signature" />
2478
2479     <!-- Run as a manufacturer test application, running as the root user.
2480          Only available when the device is running in manufacturer test mode.
2481          <p>Not for use by third-party applications. -->
2482     <permission android:name="android.permission.FACTORY_TEST"
2483         android:label="@string/permlab_factoryTest"
2484         android:description="@string/permdesc_factoryTest"
2485         android:protectionLevel="signature" />
2486
2487     <!-- Allows an application to broadcast a notification that an application
2488          package has been removed.
2489          <p>Not for use by third-party applications. -->
2490     <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
2491         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2492         android:label="@string/permlab_broadcastPackageRemoved"
2493         android:description="@string/permdesc_broadcastPackageRemoved"
2494         android:protectionLevel="signature" />
2495
2496     <!-- Allows an application to broadcast an SMS receipt notification.
2497     <p>Not for use by third-party applications. -->
2498     <permission android:name="android.permission.BROADCAST_SMS"
2499         android:permissionGroup="android.permission-group.MESSAGES"
2500         android:label="@string/permlab_broadcastSmsReceived"
2501         android:description="@string/permdesc_broadcastSmsReceived"
2502         android:protectionLevel="signature" />
2503
2504     <!-- Allows an application to broadcast a WAP PUSH receipt notification.
2505     <p>Not for use by third-party applications. -->
2506     <permission android:name="android.permission.BROADCAST_WAP_PUSH"
2507         android:permissionGroup="android.permission-group.MESSAGES"
2508         android:label="@string/permlab_broadcastWapPush"
2509         android:description="@string/permdesc_broadcastWapPush"
2510         android:protectionLevel="signature" />
2511
2512     <!-- @SystemApi Allows an application to broadcast a SCORE_NETWORKS request.
2513          <p>Not for use by third-party applications. @hide -->
2514     <permission android:name="android.permission.BROADCAST_SCORE_NETWORKS"
2515         android:label="@string/permlab_broadcastScoreNetworks"
2516         android:description="@string/permdesc_broadcastScoreNetworks"
2517         android:protectionLevel="signature|system" />
2518
2519     <!-- @SystemApi Not for use by third-party applications. -->
2520     <permission android:name="android.permission.MASTER_CLEAR"
2521         android:label="@string/permlab_masterClear"
2522         android:description="@string/permdesc_masterClear"
2523         android:protectionLevel="signature|system" />
2524
2525     <!-- @SystemApi Allows an application to call any phone number, including emergency
2526          numbers, without going through the Dialer user interface for the user
2527          to confirm the call being placed.
2528          <p>Not for use by third-party applications. -->
2529     <permission android:name="android.permission.CALL_PRIVILEGED"
2530         android:label="@string/permlab_callPrivileged"
2531         android:description="@string/permdesc_callPrivileged"
2532         android:protectionLevel="signature|system" />
2533
2534     <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
2535     <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
2536         android:label="@string/permlab_performCdmaProvisioning"
2537         android:description="@string/permdesc_performCdmaProvisioning"
2538         android:protectionLevel="signature|system" />
2539
2540     <!-- @SystemApi Allows enabling/disabling location update notifications from
2541          the radio.
2542          <p>Not for use by third-party applications. -->
2543     <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
2544         android:label="@string/permlab_locationUpdates"
2545         android:description="@string/permdesc_locationUpdates"
2546         android:protectionLevel="signature|system" />
2547
2548     <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
2549          database, to change values that get uploaded.
2550          <p>Not for use by third-party applications. -->
2551     <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
2552         android:label="@string/permlab_checkinProperties"
2553         android:description="@string/permdesc_checkinProperties"
2554         android:protectionLevel="signature|system" />
2555
2556     <!-- @SystemApi Allows an application to collect component usage
2557          statistics @hide -->
2558     <permission android:name="android.permission.PACKAGE_USAGE_STATS"
2559         android:label="@string/permlab_pkgUsageStats"
2560         android:description="@string/permdesc_pkgUsageStats"
2561         android:protectionLevel="signature|development|appop" />
2562     <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" />
2563
2564     <!-- @SystemApi Allows an application to collect battery statistics -->
2565     <permission android:name="android.permission.BATTERY_STATS"
2566         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2567         android:label="@string/permlab_batteryStats"
2568         android:description="@string/permdesc_batteryStats"
2569         android:protectionLevel="signature|system|development" />
2570
2571     <!-- @SystemApi Allows an application to control the backup and restore process.
2572     <p>Not for use by third-party applications.
2573          @hide pending API council -->
2574     <permission android:name="android.permission.BACKUP"
2575         android:label="@string/permlab_backup"
2576         android:description="@string/permdesc_backup"
2577         android:protectionLevel="signature|system" />
2578
2579     <!-- Allows a package to launch the secure full-backup confirmation UI.
2580          ONLY the system process may hold this permission.
2581          @hide -->
2582     <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
2583         android:label="@string/permlab_confirm_full_backup"
2584         android:description="@string/permdesc_confirm_full_backup"
2585         android:protectionLevel="signature" />
2586
2587     <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
2588          to ensure that only the system can bind to it. -->
2589     <permission android:name="android.permission.BIND_REMOTEVIEWS"
2590         android:label="@string/permlab_bindRemoteViews"
2591         android:description="@string/permdesc_bindRemoteViews"
2592         android:protectionLevel="signature|system" />
2593
2594     <!-- @SystemApi Allows an application to tell the AppWidget service which application
2595          can access AppWidget's data.  The normal user flow is that a user
2596          picks an AppWidget to go into a particular host, thereby giving that
2597          host application access to the private data from the AppWidget app.
2598          An application that has this permission should honor that contract.
2599          <p>Not for use by third-party applications. -->
2600     <permission android:name="android.permission.BIND_APPWIDGET"
2601         android:permissionGroup="android.permission-group.PERSONAL_INFO"
2602         android:label="@string/permlab_bindGadget"
2603         android:description="@string/permdesc_bindGadget"
2604         android:protectionLevel="signature|system" />
2605
2606     <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
2607          keyguard widget
2608          @hide -->
2609     <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
2610         android:permissionGroup="android.permission-group.PERSONAL_INFO"
2611         android:protectionLevel="signature|system" />
2612
2613     <!-- @SystemApi Internal permission allowing an application to query/set which
2614          applications can bind AppWidgets.
2615          @hide -->
2616     <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
2617         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2618         android:protectionLevel="signature|system" />
2619
2620     <!-- Allows applications to change the background data setting.
2621     <p>Not for use by third-party applications.
2622          @hide pending API council -->
2623     <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
2624         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2625         android:protectionLevel="signature"
2626         android:description="@string/permdesc_changeBackgroundDataSetting"
2627         android:label="@string/permlab_changeBackgroundDataSetting" />
2628
2629     <!-- @SystemApi This permission can be used on content providers to allow the global
2630          search system to access their data.  Typically it used when the
2631          provider has some permissions protecting it (which global search
2632          would not be expected to hold), and added as a read-only permission
2633          to the path in the provider where global search queries are
2634          performed.  This permission can not be held by regular applications;
2635          it is used by applications to protect themselves from everyone else
2636          besides global search. -->
2637     <permission android:name="android.permission.GLOBAL_SEARCH"
2638         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2639         android:protectionLevel="signature|system" />
2640
2641     <!-- Internal permission protecting access to the global search
2642          system: ensures that only the system can access the provider
2643          to perform queries (since this otherwise provides unrestricted
2644          access to a variety of content providers), and to write the
2645          search statistics (to keep applications from gaming the source
2646          ranking).
2647          @hide -->
2648     <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
2649         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2650         android:protectionLevel="signature" />
2651
2652     <!-- @SystemApi Internal permission to allows an application to read indexable data.
2653         @hide -->
2654     <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
2655         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2656         android:protectionLevel="signature|system" />
2657
2658     <!-- @SystemApi Allows applications to set a live wallpaper.
2659          @hide XXX Change to signature once the picker is moved to its
2660          own apk as Ghod Intended. -->
2661     <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
2662         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2663         android:protectionLevel="signature|system" />
2664
2665     <!-- @SystemApi Allows applications to read dream settings and dream state.
2666          @hide -->
2667     <permission android:name="android.permission.READ_DREAM_STATE"
2668         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2669         android:protectionLevel="signature|system" />
2670
2671     <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
2672          @hide -->
2673     <permission android:name="android.permission.WRITE_DREAM_STATE"
2674         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2675         android:protectionLevel="signature|system" />
2676
2677     <!-- @SystemApi Allow an application to read and write the cache partition.
2678          @hide -->
2679     <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
2680         android:label="@string/permlab_cache_filesystem"
2681         android:description="@string/permdesc_cache_filesystem"
2682         android:protectionLevel="signature|system" />
2683
2684     <!-- Must be required by default container service so that only
2685          the system can bind to it and use it to copy
2686          protected data to secure containers or files
2687          accessible to the system.
2688          @hide -->
2689     <permission android:name="android.permission.COPY_PROTECTED_DATA"
2690         android:label="@string/permlab_copyProtectedData"
2691         android:description="@string/permlab_copyProtectedData"
2692         android:protectionLevel="signature" />
2693
2694     <!-- @SystemApi Internal permission protecting access to the encryption methods
2695         @hide
2696     -->
2697     <permission android:name="android.permission.CRYPT_KEEPER"
2698         android:protectionLevel="signature|system" />
2699
2700     <!-- @SystemApi Allows an application to read historical network usage for
2701          specific networks and applications. @hide -->
2702     <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
2703         android:label="@string/permlab_readNetworkUsageHistory"
2704         android:description="@string/permdesc_readNetworkUsageHistory"
2705         android:protectionLevel="signature|system" />
2706
2707     <!-- Allows an application to manage network policies (such as warning and disable
2708          limits) and to define application-specific rules. @hide -->
2709     <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
2710         android:label="@string/permlab_manageNetworkPolicy"
2711         android:description="@string/permdesc_manageNetworkPolicy"
2712         android:protectionLevel="signature" />
2713
2714     <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used
2715          by system services like download manager and media server. Not for use by
2716          third party apps. @hide -->
2717     <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
2718         android:label="@string/permlab_modifyNetworkAccounting"
2719         android:description="@string/permdesc_modifyNetworkAccounting"
2720         android:protectionLevel="signature|system" />
2721
2722     <!-- C2DM permission.
2723          @hide Used internally.
2724      -->
2725     <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
2726           android:protectionLevel="signature" />
2727     <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
2728
2729     <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
2730          trust it to verify packages.
2731     -->
2732     <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
2733         android:label="@string/permlab_packageVerificationAgent"
2734         android:description="@string/permdesc_packageVerificationAgent"
2735         android:protectionLevel="signature|system" />
2736
2737     <!-- Must be required by package verifier receiver, to ensure that only the
2738          system can interact with it.
2739          @hide
2740     -->
2741     <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
2742         android:label="@string/permlab_bindPackageVerifier"
2743         android:description="@string/permdesc_bindPackageVerifier"
2744         android:protectionLevel="signature" />
2745
2746     <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
2747          @hide -->
2748     <permission android:name="android.permission.SERIAL_PORT"
2749         android:label="@string/permlab_serialPort"
2750         android:description="@string/permdesc_serialPort"
2751         android:protectionLevel="signature|system" />
2752
2753     <!-- Allows the holder to access content providers from outside an ApplicationThread.
2754          This permission is enforced by the ActivityManagerService on the corresponding APIs,
2755          in particular ActivityManagerService#getContentProviderExternal(String) and
2756          ActivityManagerService#removeContentProviderExternal(String).
2757          @hide
2758     -->
2759     <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
2760         android:label="@string/permlab_accessContentProvidersExternally"
2761         android:description="@string/permdesc_accessContentProvidersExternally"
2762         android:protectionLevel="signature" />
2763
2764     <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
2765          OTA reboot *not* occur while the lock is held.
2766          @hide -->
2767     <permission android:name="android.permission.UPDATE_LOCK"
2768         android:label="@string/permlab_updateLock"
2769         android:description="@string/permdesc_updateLock"
2770         android:protectionLevel="signatureOrSystem" />
2771
2772     <!-- @SystemApi Allows an application to read the current set of notifications, including
2773          any metadata and intents attached.
2774          @hide -->
2775     <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
2776         android:label="@string/permlab_accessNotifications"
2777         android:description="@string/permdesc_accessNotifications"
2778         android:protectionLevel="signature|system" />
2779
2780     <!-- Allows access to keyguard secure storage.  Only allowed for system processes.
2781         @hide -->
2782     <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
2783         android:protectionLevel="signature"
2784         android:label="@string/permlab_access_keyguard_secure_storage"
2785         android:description="@string/permdesc_access_keyguard_secure_storage" />
2786
2787     <!-- Allows an application to control keyguard.  Only allowed for system processes.
2788         @hide -->
2789     <permission android:name="android.permission.CONTROL_KEYGUARD"
2790         android:protectionLevel="signature"
2791         android:label="@string/permlab_control_keyguard"
2792         android:description="@string/permdesc_control_keyguard" />
2793
2794     <!-- Allows an application to listen to trust changes.  Only allowed for system processes.
2795         @hide -->
2796     <permission android:name="android.permission.TRUST_LISTENER"
2797                 android:protectionLevel="signature"
2798                 android:label="@string/permlab_trust_listener"
2799                 android:description="@string/permdesc_trust_listener" />
2800
2801     <!-- @SystemApi Allows an application to provide a trust agent.
2802          @hide For security reasons, this is a platform-only permission. -->
2803     <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
2804                 android:protectionLevel="signatureOrSystem"
2805                 android:label="@string/permlab_provide_trust_agent"
2806                 android:description="@string/permdesc_provide_trust_agent" />
2807
2808     <!-- Allows an application to launch the trust agent settings activity.
2809         @hide -->
2810     <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
2811         android:protectionLevel="signatureOrSystem"
2812         android:label="@string/permlab_launch_trust_agent_settings"
2813         android:description="@string/permdesc_launch_trust_agent_settings" />
2814
2815     <!-- @SystemApi Must be required by an {@link
2816         android.service.trust.TrustAgentService},
2817         to ensure that only the system can bind to it.
2818         @hide -->
2819     <permission android:name="android.permission.BIND_TRUST_AGENT"
2820                 android:protectionLevel="signature"
2821                 android:label="@string/permlab_bind_trust_agent_service"
2822                 android:description="@string/permdesc_bind_trust_agent_service" />
2823
2824     <!-- Must be required by an {@link
2825          android.service.notification.NotificationListenerService},
2826          to ensure that only the system can bind to it. -->
2827     <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
2828         android:label="@string/permlab_bindNotificationListenerService"
2829         android:description="@string/permdesc_bindNotificationListenerService"
2830         android:protectionLevel="signature" />
2831
2832     <!-- @SystemApi Must be required by a {@link
2833          android.service.notification.ConditionProviderService},
2834          to ensure that only the system can bind to it.
2835          @hide -->
2836     <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
2837         android:label="@string/permlab_bindConditionProviderService"
2838         android:description="@string/permdesc_bindConditionProviderService"
2839         android:protectionLevel="signature" />
2840
2841     <!-- Must be required by a {@link android.media.routing.MediaRouteService},
2842          to ensure that only the system can bind to it. -->
2843     <permission android:name="android.permission.BIND_MEDIA_ROUTE_SERVICE"
2844         android:label="@string/permlab_bindMediaRouteService"
2845         android:description="@string/permdesc_bindMediaRouteService"
2846         android:protectionLevel="signature" />
2847
2848     <!-- Must be required by an {@link android.service.dreams.DreamService},
2849          to ensure that only the system can bind to it. -->
2850     <permission android:name="android.permission.BIND_DREAM_SERVICE"
2851         android:label="@string/permlab_bindDreamService"
2852         android:description="@string/permdesc_bindDreamService"
2853         android:protectionLevel="signature" />
2854
2855     <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
2856          carrier setup application to enforce that this permission is required
2857          @hide This is not a third-party API (intended for OEMs and system apps). -->
2858     <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
2859         android:label="@string/permlab_invokeCarrierSetup"
2860         android:description="@string/permdesc_invokeCarrierSetup"
2861         android:protectionLevel="signature|system" />
2862
2863     <!-- @SystemApi Allows an application to listen for network condition observations.
2864          @hide This is not a third-party API (intended for system apps). -->
2865     <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
2866         android:label="@string/permlab_accessNetworkConditions"
2867         android:description="@string/permdesc_accessNetworkConditions"
2868         android:protectionLevel="signature|system" />
2869
2870     <!-- @SystemApi Allows an application to provision and access DRM certificates
2871          @hide This is not a third-party API (intended for system apps). -->
2872     <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
2873         android:label="@string/permlab_accessDrmCertificates"
2874         android:description="@string/permdesc_accessDrmCertificates"
2875         android:protectionLevel="signature|system" />
2876
2877     <!-- Api Allows an application to manage media projection sessions.
2878          @hide This is not a third-party API (intended for system apps). -->
2879     <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION"
2880         android:label="@string/permlab_manageMediaProjection"
2881         android:description="@string/permdesc_manageMediaProjection"
2882         android:protectionLevel="signature" />
2883
2884     <!-- @SystemApi Allows an application to read install sessions
2885          @hide This is not a third-party API (intended for system apps). -->
2886     <permission android:name="android.permission.READ_INSTALL_SESSIONS"
2887         android:label="@string/permlab_readInstallSessions"
2888         android:description="@string/permdesc_readInstallSessions" />
2889
2890     <!-- @SystemApi Allows an application to remove DRM certificates
2891          @hide This is not a third-party API (intended for system apps). -->
2892     <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES"
2893         android:label="@string/permlab_removeDrmCertificates"
2894         android:description="@string/permdesc_removeDrmCertificates"
2895         android:protectionLevel="signature|system" />
2896
2897     <!-- The system process is explicitly the only one allowed to launch the
2898          confirmation UI for full backup/restore -->
2899     <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
2900
2901     <application android:process="system"
2902                  android:persistent="true"
2903                  android:hasCode="false"
2904                  android:label="@string/android_system_label"
2905                  android:allowClearUserData="false"
2906                  android:backupAgent="com.android.server.backup.SystemBackupAgent"
2907                  android:killAfterRestore="false"
2908                  android:icon="@drawable/ic_launcher_android"
2909                  android:supportsRtl="true">
2910         <activity android:name="com.android.internal.app.ChooserActivity"
2911                 android:theme="@style/Theme.DeviceDefault.Resolver"
2912                 android:finishOnCloseSystemDialogs="true"
2913                 android:excludeFromRecents="true"
2914                 android:documentLaunchMode="never"
2915                 android:relinquishTaskIdentity="true"
2916                 android:process=":ui">
2917             <intent-filter>
2918                 <action android:name="android.intent.action.CHOOSER" />
2919                 <category android:name="android.intent.category.DEFAULT" />
2920             </intent-filter>
2921         </activity>
2922         <activity android:name="com.android.internal.app.IntentForwarderActivity"
2923                 android:finishOnCloseSystemDialogs="true"
2924                 android:theme="@style/Theme.NoDisplay"
2925                 android:excludeFromRecents="true"
2926                 android:label="@string/user_owner_label"
2927                 android:exported="true"
2928                 >
2929         </activity>
2930         <activity-alias android:name="com.android.internal.app.ForwardIntentToUserOwner"
2931                 android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2932                 android:exported="true"
2933                 android:label="@string/user_owner_label">
2934         </activity-alias>
2935         <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
2936                 android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2937                 android:icon="@drawable/ic_corp_icon"
2938                 android:exported="true"
2939                 android:label="@string/managed_profile_label">
2940         </activity-alias>
2941         <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
2942                 android:theme="@style/Theme.Material.Dialog"
2943                 android:label="@string/heavy_weight_switcher_title"
2944                 android:finishOnCloseSystemDialogs="true"
2945                 android:excludeFromRecents="true"
2946                 android:process=":ui">
2947         </activity>
2948         <activity android:name="com.android.internal.app.PlatLogoActivity"
2949                 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
2950                 android:configChanges="orientation|keyboardHidden"
2951                 android:process=":ui">
2952         </activity>
2953         <activity android:name="com.android.internal.app.DisableCarModeActivity"
2954                 android:theme="@style/Theme.NoDisplay"
2955                 android:excludeFromRecents="true"
2956                 android:process=":ui">
2957         </activity>
2958
2959         <activity android:name="android.accounts.ChooseAccountActivity"
2960                 android:excludeFromRecents="true"
2961                 android:exported="true"
2962                 android:theme="@android:style/Theme.Material.Dialog"
2963                 android:label="@string/choose_account_label"
2964                 android:process=":ui">
2965         </activity>
2966
2967         <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
2968                 android:excludeFromRecents="true"
2969                 android:exported="true"
2970                 android:theme="@android:style/Theme.Material.Dialog"
2971                 android:label="@string/choose_account_label"
2972                 android:process=":ui">
2973         </activity>
2974
2975         <activity android:name="android.accounts.ChooseAccountTypeActivity"
2976                 android:excludeFromRecents="true"
2977                 android:theme="@android:style/Theme.Material.Dialog"
2978                 android:label="@string/choose_account_label"
2979                 android:process=":ui">
2980         </activity>
2981
2982         <activity android:name="android.accounts.CantAddAccountActivity"
2983                 android:excludeFromRecents="true"
2984                 android:exported="true"
2985                 android:theme="@android:style/Theme.Material.Dialog.NoActionBar"
2986                 android:process=":ui">
2987         </activity>
2988
2989         <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
2990                 android:excludeFromRecents="true"
2991                 android:exported="true"
2992                 android:theme="@android:style/Theme.Material.DialogWhenLarge"
2993                 android:process=":ui">
2994         </activity>
2995
2996         <activity android:name="android.content.SyncActivityTooManyDeletes"
2997                android:theme="@android:style/Theme.Holo.Dialog"
2998                android:label="@string/sync_too_many_deletes"
2999                android:process=":ui">
3000         </activity>
3001
3002         <activity android:name="com.android.server.ShutdownActivity"
3003             android:permission="android.permission.SHUTDOWN"
3004             android:excludeFromRecents="true">
3005             <intent-filter>
3006                 <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" />
3007                 <category android:name="android.intent.category.DEFAULT" />
3008             </intent-filter>
3009             <intent-filter>
3010                 <action android:name="android.intent.action.REBOOT" />
3011                 <category android:name="android.intent.category.DEFAULT" />
3012             </intent-filter>
3013         </activity>
3014
3015         <activity android:name="com.android.internal.app.NetInitiatedActivity"
3016                 android:theme="@style/Theme.Holo.Dialog.Alert"
3017                 android:excludeFromRecents="true"
3018                 android:process=":ui">
3019         </activity>
3020
3021         <activity android:name="com.android.internal.app.RestrictionsPinActivity"
3022                 android:theme="@style/Theme.Material.Light.Dialog.Alert"
3023                 android:excludeFromRecents="true"
3024                 android:windowSoftInputMode="adjustPan"
3025                 android:process=":ui">
3026             <intent-filter android:priority="100">
3027                 <action android:name="android.intent.action.RESTRICTIONS_CHALLENGE" />
3028                 <category android:name="android.intent.category.DEFAULT" />
3029             </intent-filter>
3030         </activity>
3031
3032         <receiver android:name="com.android.server.BootReceiver"
3033                 android:primaryUserOnly="true">
3034             <intent-filter android:priority="1000">
3035                 <action android:name="android.intent.action.BOOT_COMPLETED" />
3036             </intent-filter>
3037         </receiver>
3038
3039         <receiver android:name="com.android.server.updates.CertPinInstallReceiver" >
3040             <intent-filter>
3041                 <action android:name="android.intent.action.UPDATE_PINS" />
3042                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3043             </intent-filter>
3044         </receiver>
3045
3046         <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" >
3047             <intent-filter>
3048                 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
3049                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3050             </intent-filter>
3051         </receiver>
3052
3053         <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" >
3054             <intent-filter>
3055                 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
3056                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3057             </intent-filter>
3058         </receiver>
3059
3060         <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" >
3061             <intent-filter>
3062                 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
3063                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3064             </intent-filter>
3065         </receiver>
3066
3067         <receiver android:name="com.android.server.updates.TZInfoInstallReceiver" >
3068             <intent-filter>
3069                 <action android:name="android.intent.action.UPDATE_TZINFO" />
3070                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3071             </intent-filter>
3072         </receiver>
3073
3074         <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" >
3075             <intent-filter>
3076                 <action android:name="android.intent.action.UPDATE_SEPOLICY" />
3077                 <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3078             </intent-filter>
3079         </receiver>
3080
3081         <receiver android:name="com.android.server.MasterClearReceiver"
3082             android:permission="android.permission.MASTER_CLEAR">
3083             <intent-filter
3084                     android:priority="100" >
3085                 <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR -->
3086                 <action android:name="android.intent.action.MASTER_CLEAR" />
3087
3088                 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
3089                 <action android:name="com.google.android.c2dm.intent.RECEIVE" />
3090                 <category android:name="android.intent.category.MASTER_CLEAR" />
3091             </intent-filter>
3092         </receiver>
3093
3094         <service android:name="com.android.internal.os.storage.ExternalStorageFormatter"
3095             android:permission="android.permission.MASTER_CLEAR"
3096             android:exported="true" />
3097
3098         <service android:name="android.hardware.location.GeofenceHardwareService"
3099             android:permission="android.permission.LOCATION_HARDWARE"
3100             android:exported="false" />
3101
3102         <service android:name="com.android.internal.backup.LocalTransportService"
3103                 android:permission="android.permission.CONFIRM_FULL_BACKUP"
3104                 android:exported="false">
3105             <intent-filter>
3106                 <action android:name="android.backup.TRANSPORT_HOST" />
3107             </intent-filter>
3108         </service>
3109
3110         <service android:name="com.android.server.MountServiceIdler"
3111                  android:exported="true"
3112                  android:permission="android.permission.BIND_JOB_SERVICE" >
3113         </service>
3114
3115         <service android:name="com.android.server.backup.FullBackupJob"
3116                  android:exported="true"
3117                  android:permission="android.permission.BIND_JOB_SERVICE" >
3118         </service>
3119
3120         <service
3121             android:name="com.android.server.pm.BackgroundDexOptService"
3122             android:exported="true"
3123             android:permission="android.permission.BIND_JOB_SERVICE">
3124         </service>
3125
3126     </application>
3127
3128 </manifest>