AndroidManifest.xml revision 05e6dde3a0b9ba1eb3d13d511fe2e27a0d10c851
1<?xml version="1.0" encoding="utf-8"?>
2<!--
3/* //device/apps/common/AndroidManifest.xml
4**
5** Copyright 2006, The Android Open Source Project
6**
7** Licensed under the Apache License, Version 2.0 (the "License");
8** you may not use this file except in compliance with the License.
9** You may obtain a copy of the License at
10**
11**     http://www.apache.org/licenses/LICENSE-2.0
12**
13** Unless required by applicable law or agreed to in writing, software
14** distributed under the License is distributed on an "AS IS" BASIS,
15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16** See the License for the specific language governing permissions and
17** limitations under the License.
18*/
19-->
20<manifest xmlns:android="http://schemas.android.com/apk/res/android"
21    package="android" coreApp="true" android:sharedUserId="android.uid.system"
22    android:sharedUserLabel="@string/android_system_label">
23
24    <!-- ================================================ -->
25    <!-- Special broadcasts that only the system can send -->
26    <!-- ================================================ -->
27    <eat-comment />
28
29    <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
30    <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
31    <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
32    <protected-broadcast android:name="android.intent.action.TIME_SET" />
33    <protected-broadcast android:name="android.intent.action.TIME_TICK" />
34    <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
35    <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
36    <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
37    <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
38    <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
39    <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
40    <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
41    <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
42    <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
43    <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
44    <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
45    <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
46    <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
47    <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
48    <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
49    <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
50    <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
51    <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
52    <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
53    <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
54    <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
55    <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
56    <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
57    <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
58    <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
59    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
60    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
61    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
62    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
63    <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
64    <protected-broadcast android:name="android.intent.action.REBOOT" />
65    <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
66    <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
67    <protected-broadcast android:name="android.intent.action.USER_ADDED" />
68    <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
69    <protected-broadcast android:name="android.intent.action.USER_STARTING" />
70    <protected-broadcast android:name="android.intent.action.USER_STARTED" />
71    <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
72    <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
73    <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
74    <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
75    <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
76
77    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
78    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" />
79
80    <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
81    <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
82    <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
83    <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
84    <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" />
85
86    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
87    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
88    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
89    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
90    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
91    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
92
93    <protected-broadcast android:name="android.backup.intent.RUN" />
94    <protected-broadcast android:name="android.backup.intent.CLEAR" />
95    <protected-broadcast android:name="android.backup.intent.INIT" />
96
97    <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
98    <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
99    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
100    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
101    <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
102    <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
103    <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
104    <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
105    <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
106    <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
107    <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
108    <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
109    <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
110    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
111    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
112    <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
113    <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
114    <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
115    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
116    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
117    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
118    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
119    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
120    <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
121    <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
122    <protected-broadcast
123        android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
124    <protected-broadcast
125        android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
126    <protected-broadcast
127        android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
128    <protected-broadcast
129        android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
130    <protected-broadcast
131        android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
132    <protected-broadcast
133        android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
134    <protected-broadcast
135        android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
136    <protected-broadcast
137        android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
138    <protected-broadcast
139        android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
140    <protected-broadcast
141        android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
142    <protected-broadcast
143        android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
144    <protected-broadcast
145        android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
146    <protected-broadcast
147        android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
148    <protected-broadcast
149        android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
150   <protected-broadcast
151        android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
152    <protected-broadcast
153        android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
154    <protected-broadcast
155        android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
156    <protected-broadcast
157        android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
158    <protected-broadcast
159        android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
160    <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" />
161    <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
162    <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
163    <protected-broadcast android:name="android.btopp.intent.action.LIST" />
164    <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
165    <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
166    <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
167    <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
168    <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
169    <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
170    <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
171    <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
172    <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
173    <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
174    <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
175
176    <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
177
178    <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
179    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
180    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
181    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
182    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
183
184    <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
185    <protected-broadcast android:name="android.intent.action.ANALOG_AUDIO_DOCK_PLUG" />
186    <protected-broadcast android:name="android.intent.action.DIGITAL_AUDIO_DOCK_PLUG" />
187    <protected-broadcast android:name="android.intent.action.HDMI_AUDIO_PLUG" />
188    <protected-broadcast android:name="android.intent.action.USB_AUDIO_ACCESSORY_PLUG" />
189    <protected-broadcast android:name="android.intent.action.USB_AUDIO_DEVICE_PLUG" />
190
191    <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
192    <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
193    <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
194    <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
195    <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
196    <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
197    <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
198    <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
199
200    <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
201    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
202    <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
203    <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
204    <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
205    <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
206    <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
207    <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
208    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
209    <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
210
211    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
212    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
213    <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
214    <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
215    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
216
217    <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
218
219    <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" />
220    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
221    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
222    <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
223
224    <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
225    <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
226    <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
227
228    <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
229
230    <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
231    <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
232    <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
233    <protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" />
234
235    <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
236    <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
237    <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
238    <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
239    <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
240    <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
241    <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
242    <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
243    <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
244    <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
245    <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
246    <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
247    <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
248    <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
249    <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
250    <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
251    <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
252    <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
253    <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
254    <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
255    <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
256    <protected-broadcast
257            android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
258    <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
259    <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
260    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
261    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
262    <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
263    <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
264    <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
265    <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" />
266
267    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
268    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
269
270    <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
271
272    <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
273
274    <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" />
275
276    <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
277    <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
278    <protected-broadcast android:name="android.location.MODE_CHANGED" />
279    <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
280    <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
281
282    <protected-broadcast
283        android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
284
285    <!-- Defined in RestrictionsManager -->
286    <protected-broadcast
287        android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
288    <!-- Defined in RestrictionsManager -->
289
290    <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
291    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
292    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
293    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
294    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
295
296    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SUBSCRIPTION_CHANGED" />
297    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED" />
298    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" />
299    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" />
300    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" />
301    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" />
302
303    <!-- ====================================== -->
304    <!-- Permissions for things that cost money -->
305    <!-- ====================================== -->
306    <eat-comment />
307
308    <!-- Used for permissions that can be used to make the user spend money
309         without their direct involvement. -->
310    <permission-group android:name="android.permission-group.COST_MONEY"
311        android:label="@string/permgrouplab_costMoney"
312        android:description="@string/permgroupdesc_costMoney" />
313
314    <!-- ================================== -->
315    <!-- Permissions for accessing messages -->
316    <!-- ================================== -->
317    <eat-comment />
318
319    <!-- Used for permissions that allow an application to send messages
320         on behalf of the user or intercept messages being received by the
321         user.  This is primarily intended for SMS/MMS messaging, such as
322         receiving or reading an MMS. -->
323    <permission-group android:name="android.permission-group.MESSAGES"
324        android:label="@string/permgrouplab_messages"
325        android:icon="@drawable/perm_group_messages"
326        android:description="@string/permgroupdesc_messages"
327        android:permissionGroupFlags="personalInfo"
328        android:priority="360"/>
329
330    <!-- Allows an application to send SMS messages. -->
331    <permission android:name="android.permission.SEND_SMS"
332        android:permissionGroup="android.permission-group.MESSAGES"
333        android:protectionLevel="dangerous"
334        android:permissionFlags="costsMoney"
335        android:label="@string/permlab_sendSms"
336        android:description="@string/permdesc_sendSms" />
337
338    <!-- @SystemApi Allows an application (Phone) to send a request to other applications
339         to handle the respond-via-message action during incoming calls.
340         <p>Not for use by third-party applications. -->
341    <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
342        android:permissionGroup="android.permission-group.MESSAGES"
343        android:protectionLevel="signature|system"
344        android:label="@string/permlab_sendRespondViaMessageRequest"
345        android:description="@string/permdesc_sendRespondViaMessageRequest" />
346
347    <!-- Allows an application to monitor incoming SMS messages, to record
348         or perform processing on them. -->
349    <permission android:name="android.permission.RECEIVE_SMS"
350        android:permissionGroup="android.permission-group.MESSAGES"
351        android:protectionLevel="dangerous"
352        android:label="@string/permlab_receiveSms"
353        android:description="@string/permdesc_receiveSms" />
354
355    <!-- Allows an application to monitor incoming MMS messages, to record
356         or perform processing on them. -->
357    <permission android:name="android.permission.RECEIVE_MMS"
358        android:permissionGroup="android.permission-group.MESSAGES"
359        android:protectionLevel="dangerous"
360        android:label="@string/permlab_receiveMms"
361        android:description="@string/permdesc_receiveMms" />
362
363    <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
364         to record or display them to the user.
365         <p>Not for use by third-party applications.
366         @hide Pending API council approval -->
367    <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
368        android:permissionGroup="android.permission-group.MESSAGES"
369        android:protectionLevel="signature|system"
370        android:label="@string/permlab_receiveEmergencyBroadcast"
371        android:description="@string/permdesc_receiveEmergencyBroadcast" />
372
373    <!-- Allows an application to read previously received cell broadcast
374         messages and to register a content observer to get notifications when
375         a cell broadcast has been received and added to the database. For
376         emergency alerts, the database is updated immediately after the
377         alert dialog and notification sound/vibration/speech are presented.
378         The "read" column is then updated after the user dismisses the alert.
379         This enables supplementary emergency assistance apps to start loading
380         additional emergency information (if Internet access is available)
381         when the alert is first received, and to delay presenting the info
382         to the user until after the initial alert dialog is dismissed.
383         @hide Pending API council approval -->
384    <permission android:name="android.permission.READ_CELL_BROADCASTS"
385        android:permissionGroup="android.permission-group.MESSAGES"
386        android:protectionLevel="dangerous"
387        android:label="@string/permlab_readCellBroadcasts"
388        android:description="@string/permdesc_readCellBroadcasts" />
389
390    <!-- Allows an application to read SMS messages. -->
391    <permission android:name="android.permission.READ_SMS"
392        android:permissionGroup="android.permission-group.MESSAGES"
393        android:protectionLevel="dangerous"
394        android:label="@string/permlab_readSms"
395        android:description="@string/permdesc_readSms" />
396
397    <!-- Allows an application to write SMS messages. -->
398    <permission android:name="android.permission.WRITE_SMS"
399        android:permissionGroup="android.permission-group.MESSAGES"
400        android:protectionLevel="dangerous"
401        android:label="@string/permlab_writeSms"
402        android:description="@string/permdesc_writeSms" />
403
404    <!-- Allows an application to monitor incoming WAP push messages. -->
405    <permission android:name="android.permission.RECEIVE_WAP_PUSH"
406        android:permissionGroup="android.permission-group.MESSAGES"
407        android:protectionLevel="dangerous"
408        android:label="@string/permlab_receiveWapPush"
409        android:description="@string/permdesc_receiveWapPush" />
410
411    <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
412         or perform processing on them. -->
413    <!-- @hide -->
414    <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
415        android:permissionGroup="android.permission-group.MESSAGES"
416        android:protectionLevel="dangerous"
417        android:label="@string/permlab_receiveBluetoothMap"
418        android:description="@string/permdesc_receiveBluetoothMap" />
419
420    <!-- =============================================================== -->
421    <!-- Permissions for accessing social info (contacts and social) -->
422    <!-- =============================================================== -->
423    <eat-comment />
424
425    <!-- Used for permissions that provide access to the user's social connections,
426         such as contacts, call logs, social stream, etc.  This includes
427         both reading and writing of this data (which should generally be
428         expressed as two distinct permissions). -->
429
430    <permission-group android:name="android.permission-group.SOCIAL_INFO"
431        android:label="@string/permgrouplab_socialInfo"
432        android:icon="@drawable/perm_group_social_info"
433        android:description="@string/permgroupdesc_socialInfo"
434        android:permissionGroupFlags="personalInfo"
435        android:priority="320" />
436
437    <!-- Allows an application to read the user's contacts data. -->
438    <permission android:name="android.permission.READ_CONTACTS"
439        android:permissionGroup="android.permission-group.SOCIAL_INFO"
440        android:protectionLevel="dangerous"
441        android:label="@string/permlab_readContacts"
442        android:description="@string/permdesc_readContacts" />
443
444    <!-- Allows an application to write (but not read) the user's
445         contacts data. -->
446    <permission android:name="android.permission.WRITE_CONTACTS"
447        android:permissionGroup="android.permission-group.SOCIAL_INFO"
448        android:protectionLevel="dangerous"
449        android:label="@string/permlab_writeContacts"
450        android:description="@string/permdesc_writeContacts" />
451
452    <!-- @SystemApi @hide Allows an application to execute contacts directory search.
453         This should only be used by ContactsProvider.
454         <p>Not for use by third-party applications. -->
455    <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
456        android:permissionGroup="android.permission-group.PERSONAL_INFO"
457        android:protectionLevel="signature|system" />
458
459    <!-- Allows an application to read the user's call log.
460         <p class="note"><strong>Note:</strong> If your app uses the
461         {@link #READ_CONTACTS} permission and <em>both</em> your <a
462         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
463         minSdkVersion}</a> and <a
464         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
465         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
466         grants your app this permission. If you don't need this permission, be sure your <a
467         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
468         targetSdkVersion}</a> is 16 or higher.</p> -->
469    <permission android:name="android.permission.READ_CALL_LOG"
470        android:permissionGroup="android.permission-group.SOCIAL_INFO"
471        android:protectionLevel="dangerous"
472        android:label="@string/permlab_readCallLog"
473        android:description="@string/permdesc_readCallLog" />
474
475    <!-- Allows an application to write (but not read) the user's
476         contacts data.
477         <p class="note"><strong>Note:</strong> If your app uses the
478         {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
479         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
480         minSdkVersion}</a> and <a
481         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
482         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
483         grants your app this permission. If you don't need this permission, be sure your <a
484         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
485         targetSdkVersion}</a> is 16 or higher.</p>  -->
486    <permission android:name="android.permission.WRITE_CALL_LOG"
487        android:permissionGroup="android.permission-group.SOCIAL_INFO"
488        android:protectionLevel="dangerous"
489        android:label="@string/permlab_writeCallLog"
490        android:description="@string/permdesc_writeCallLog" />
491
492  <!-- Allows an application to read from the user's social stream.
493       @deprecated This functionality will be unsupported in the future; cursors returned
494       will be empty. Please do not use. -->
495    <permission android:name="android.permission.READ_SOCIAL_STREAM"
496        android:permissionGroup="android.permission-group.SOCIAL_INFO"
497        android:protectionLevel="dangerous"
498        android:label="@string/permlab_readSocialStream"
499        android:description="@string/permdesc_readSocialStream" />
500
501    <!-- Allows an application to write (but not read) the user's
502         social stream data.
503         @deprecated This functionality will be unsupported in the future; cursors returned
504         will be empty. Please do not use. -->
505    <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
506        android:permissionGroup="android.permission-group.SOCIAL_INFO"
507        android:protectionLevel="dangerous"
508        android:label="@string/permlab_writeSocialStream"
509        android:description="@string/permdesc_writeSocialStream" />
510
511    <!-- =============================================================== -->
512    <!-- Permissions for accessing information about the device owner    -->
513    <!-- =============================================================== -->
514    <eat-comment />
515
516    <!-- Used for permissions that provide access to information about the device
517         user such as profile information.  This includes both reading and
518         writing of this data (which should generally be expressed as two
519         distinct permissions). -->
520    <permission-group android:name="android.permission-group.PERSONAL_INFO"
521        android:label="@string/permgrouplab_personalInfo"
522        android:icon="@drawable/perm_group_personal_info"
523        android:description="@string/permgroupdesc_personalInfo"
524        android:permissionGroupFlags="personalInfo"
525        android:priority="310" />
526
527    <!-- Allows an application to read the user's personal profile data. -->
528    <permission android:name="android.permission.READ_PROFILE"
529        android:permissionGroup="android.permission-group.PERSONAL_INFO"
530        android:protectionLevel="dangerous"
531        android:label="@string/permlab_readProfile"
532        android:description="@string/permdesc_readProfile" />
533
534    <!-- Allows an application to write (but not read) the user's
535         personal profile data. -->
536    <permission android:name="android.permission.WRITE_PROFILE"
537        android:permissionGroup="android.permission-group.PERSONAL_INFO"
538        android:protectionLevel="dangerous"
539        android:label="@string/permlab_writeProfile"
540        android:description="@string/permdesc_writeProfile" />
541
542    <!-- Allows an application to access data from sensors that the user uses to
543         measure what is happening inside his/her body, such as heart rate. -->
544    <permission android:name="android.permission.BODY_SENSORS"
545        android:permissionGroup="android.permission-group.PERSONAL_INFO"
546        android:label="@string/permlab_bodySensors"
547        android:description="@string/permdesc_bodySensors" />
548
549    <!-- =============================================================== -->
550    <!-- Permissions for accessing the device calendar                   -->
551    <!-- =============================================================== -->
552    <eat-comment />
553
554    <!-- Used for permissions that provide access to the device
555         calendar to create / view events.-->
556    <permission-group android:name="android.permission-group.CALENDAR"
557        android:label="@string/permgrouplab_calendar"
558        android:icon="@drawable/perm_group_calendar"
559        android:description="@string/permgroupdesc_calendar"
560        android:permissionGroupFlags="personalInfo"
561        android:priority="290" />
562
563    <!-- Allows an application to read the user's calendar data. -->
564    <permission android:name="android.permission.READ_CALENDAR"
565        android:permissionGroup="android.permission-group.PERSONAL_INFO"
566        android:protectionLevel="dangerous"
567        android:label="@string/permlab_readCalendar"
568        android:description="@string/permdesc_readCalendar" />
569
570    <!-- Allows an application to write (but not read) the user's
571         calendar data. -->
572    <permission android:name="android.permission.WRITE_CALENDAR"
573        android:permissionGroup="android.permission-group.PERSONAL_INFO"
574        android:protectionLevel="dangerous"
575        android:label="@string/permlab_writeCalendar"
576        android:description="@string/permdesc_writeCalendar" />
577
578    <!-- =============================================================== -->
579    <!-- Permissions for accessing the user dictionary-->
580    <!-- =============================================================== -->
581    <eat-comment />
582
583    <!-- Used for permissions that provide access to the user
584         calendar to create / view events.-->
585    <permission-group android:name="android.permission-group.USER_DICTIONARY"
586        android:label="@string/permgrouplab_dictionary"
587        android:icon="@drawable/perm_group_user_dictionary"
588        android:description="@string/permgroupdesc_dictionary"
589        android:permissionGroupFlags="personalInfo"
590        android:priority="170" />
591
592    <!-- Allows an application to read the user dictionary. This should
593         really only be required by an IME, or a dictionary editor like
594         the Settings app. -->
595    <permission android:name="android.permission.READ_USER_DICTIONARY"
596        android:permissionGroup="android.permission-group.USER_DICTIONARY"
597        android:protectionLevel="dangerous"
598        android:label="@string/permlab_readDictionary"
599        android:description="@string/permdesc_readDictionary" />
600
601    <!-- Used for permissions that provide access to the user
602         calendar to create / view events.-->
603    <permission-group android:name="android.permission-group.WRITE_USER_DICTIONARY"
604        android:label="@string/permgrouplab_writeDictionary"
605        android:icon="@drawable/perm_group_user_dictionary_write"
606        android:description="@string/permgroupdesc_writeDictionary"
607        android:priority="160" />
608
609    <!-- Allows an application to write to the user dictionary. -->
610    <permission android:name="android.permission.WRITE_USER_DICTIONARY"
611        android:permissionGroup="android.permission-group.WRITE_USER_DICTIONARY"
612        android:protectionLevel="normal"
613        android:label="@string/permlab_writeDictionary"
614        android:description="@string/permdesc_writeDictionary" />
615
616    <!-- =============================================================== -->
617    <!-- Permissions for accessing the user bookmarks                    -->
618    <!-- =============================================================== -->
619    <eat-comment />
620
621    <!-- Used for permissions that provide access to the user
622         bookmarks and browser history.-->
623    <permission-group android:name="android.permission-group.BOOKMARKS"
624        android:label="@string/permgrouplab_bookmarks"
625        android:icon="@drawable/perm_group_bookmarks"
626        android:description="@string/permgroupdesc_bookmarks"
627        android:permissionGroupFlags="personalInfo"
628        android:priority="300" />
629
630    <!-- Allows an application to read (but not write) the user's
631        browsing history and bookmarks. -->
632    <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
633        android:permissionGroup="android.permission-group.BOOKMARKS"
634        android:label="@string/permlab_readHistoryBookmarks"
635        android:description="@string/permdesc_readHistoryBookmarks"
636        android:protectionLevel="dangerous" />
637
638    <!-- Allows an application to write (but not read) the user's
639        browsing history and bookmarks. -->
640    <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
641        android:permissionGroup="android.permission-group.BOOKMARKS"
642        android:label="@string/permlab_writeHistoryBookmarks"
643        android:description="@string/permdesc_writeHistoryBookmarks"
644        android:protectionLevel="dangerous" />
645
646    <!-- =============================================================== -->
647    <!-- Permissions for setting the device alarm                        -->
648    <!-- =============================================================== -->
649    <eat-comment />
650
651    <!-- Used for permissions that provide access to device alarms. -->
652    <permission-group android:name="android.permission-group.DEVICE_ALARMS"
653        android:label="@string/permgrouplab_deviceAlarms"
654        android:icon="@drawable/perm_group_device_alarms"
655        android:description="@string/permgroupdesc_deviceAlarms"
656        android:permissionGroupFlags="personalInfo"
657        android:priority="210" />
658
659    <!-- Allows an application to broadcast an Intent to set an alarm for the
660         user. -->
661    <permission android:name="com.android.alarm.permission.SET_ALARM"
662        android:permissionGroup="android.permission-group.DEVICE_ALARMS"
663        android:label="@string/permlab_setAlarm"
664        android:description="@string/permdesc_setAlarm"
665        android:protectionLevel="normal" />
666
667    <!-- =============================================================== -->
668    <!-- Permissions for accessing the user voicemail                    -->
669    <!-- =============================================================== -->
670    <eat-comment />
671
672    <!-- Used for permissions that provide access to the user voicemail box. -->
673    <permission-group android:name="android.permission-group.VOICEMAIL"
674        android:label="@string/permgrouplab_voicemail"
675        android:icon="@drawable/perm_group_voicemail"
676        android:description="@string/permgroupdesc_voicemail"
677        android:permissionGroupFlags="personalInfo"
678        android:priority="280" />
679
680    <!-- Allows an application to add voicemails into the system. -->
681    <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
682        android:permissionGroup="android.permission-group.VOICEMAIL"
683        android:protectionLevel="dangerous"
684        android:label="@string/permlab_addVoicemail"
685        android:description="@string/permdesc_addVoicemail" />
686
687    <!-- Allows an application to modify and remove existing voicemails in the system -->
688    <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
689        android:permissionGroup="android.permission-group.VOICEMAIL"
690        android:protectionLevel="dangerous"
691        android:label="@string/permlab_writeVoicemail"
692        android:description="@string/permdesc_writeVoicemail" />
693
694    <!-- Allows an application to read voicemails in the system. -->
695    <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
696        android:permissionGroup="android.permission-group.VOICEMAIL"
697        android:protectionLevel="dangerous"
698        android:label="@string/permlab_readVoicemail"
699        android:description="@string/permdesc_readVoicemail" />
700
701    <!-- =============================================== -->
702    <!-- Permissions for enabling accessibility features -->
703    <!-- =============================================== -->
704    <eat-comment />
705
706    <!-- Used for permissions that allow requesting certain accessibility features. -->
707    <permission-group android:name="android.permission-group.ACCESSIBILITY_FEATURES"
708        android:label="@string/permgrouplab_accessibilityFeatures"
709        android:icon="@drawable/perm_group_accessibility_features"
710        android:description="@string/permgroupdesc_accessibilityFeatures"
711        android:priority="380" />
712
713    <!-- ======================================= -->
714    <!-- Permissions for accessing location info -->
715    <!-- ======================================= -->
716    <eat-comment />
717
718    <!-- Used for permissions that allow access to the user's current
719         location. -->
720    <permission-group android:name="android.permission-group.LOCATION"
721        android:label="@string/permgrouplab_location"
722        android:icon="@drawable/perm_group_location"
723        android:description="@string/permgroupdesc_location"
724        android:permissionGroupFlags="personalInfo"
725        android:priority="330" />
726
727    <!-- Allows an app to access precise location from location sources such
728         as GPS, cell towers, and Wi-Fi. -->
729    <permission android:name="android.permission.ACCESS_FINE_LOCATION"
730        android:permissionGroup="android.permission-group.LOCATION"
731        android:protectionLevel="dangerous"
732        android:label="@string/permlab_accessFineLocation"
733        android:description="@string/permdesc_accessFineLocation" />
734
735    <!-- Allows an app to access approximate location derived from network location
736         sources such as cell towers and Wi-Fi. -->
737    <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
738        android:permissionGroup="android.permission-group.LOCATION"
739        android:protectionLevel="dangerous"
740        android:label="@string/permlab_accessCoarseLocation"
741        android:description="@string/permdesc_accessCoarseLocation" />
742
743    <!-- Allows an application to create mock location providers for testing -->
744    <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
745        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
746        android:protectionLevel="dangerous"
747        android:label="@string/permlab_accessMockLocation"
748        android:description="@string/permdesc_accessMockLocation" />
749
750    <!-- Allows an application to access extra location provider commands -->
751    <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
752        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
753        android:protectionLevel="normal"
754        android:label="@string/permlab_accessLocationExtraCommands"
755        android:description="@string/permdesc_accessLocationExtraCommands" />
756
757    <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
758    <p>Not for use by third-party applications. -->
759    <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
760        android:protectionLevel="signature|system"
761        android:label="@string/permlab_installLocationProvider"
762        android:description="@string/permdesc_installLocationProvider" />
763
764    <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
765         This should only be used by HDMI-CEC service.
766    -->
767    <permission android:name="android.permission.HDMI_CEC"
768        android:protectionLevel="signatureOrSystem" />
769
770    <!-- @SystemApi Allows an application to use location features in hardware,
771         such as the geofencing api.
772         <p>Not for use by third-party applications. -->
773    <permission android:name="android.permission.LOCATION_HARDWARE"
774        android:permissionGroup="android.permission-group.LOCATION"
775        android:protectionLevel="signature|system" />
776    <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
777
778    <!-- ======================================= -->
779    <!-- Permissions for accessing networks -->
780    <!-- ======================================= -->
781    <eat-comment />
782
783    <!-- Used for permissions that provide access to networking services.  The
784         main permission here is internet access, but this is also an
785         appropriate group for accessing or modifying any network configuration
786         or other related network operations. -->
787    <permission-group android:name="android.permission-group.NETWORK"
788        android:label="@string/permgrouplab_network"
789        android:icon="@drawable/perm_group_network"
790        android:description="@string/permgroupdesc_network"
791        android:priority="270" />
792
793    <!-- Allows applications to open network sockets. -->
794    <permission android:name="android.permission.INTERNET"
795        android:permissionGroup="android.permission-group.NETWORK"
796        android:protectionLevel="dangerous"
797        android:description="@string/permdesc_createNetworkSockets"
798        android:label="@string/permlab_createNetworkSockets" />
799
800    <!-- Allows applications to access information about networks -->
801    <permission android:name="android.permission.ACCESS_NETWORK_STATE"
802        android:permissionGroup="android.permission-group.NETWORK"
803        android:protectionLevel="normal"
804        android:description="@string/permdesc_accessNetworkState"
805        android:label="@string/permlab_accessNetworkState" />
806
807    <!-- Allows applications to access information about Wi-Fi networks -->
808    <permission android:name="android.permission.ACCESS_WIFI_STATE"
809        android:permissionGroup="android.permission-group.NETWORK"
810        android:protectionLevel="normal"
811        android:description="@string/permdesc_accessWifiState"
812        android:label="@string/permlab_accessWifiState" />
813
814    <!-- Allows applications to change Wi-Fi connectivity state -->
815    <permission android:name="android.permission.CHANGE_WIFI_STATE"
816        android:permissionGroup="android.permission-group.NETWORK"
817        android:protectionLevel="dangerous"
818        android:description="@string/permdesc_changeWifiState"
819        android:label="@string/permlab_changeWifiState" />
820
821    <!-- @SystemApi @hide Allows applications to read Wi-Fi credential.
822         <p>Not for use by third-party applications. -->
823    <permission android:name="android.permission.READ_WIFI_CREDENTIAL"
824        android:permissionGroup="android.permission-group.NETWORK"
825        android:protectionLevel="signature|system" />
826
827    <!-- @hide -->
828    <permission android:name="android.permission.ACCESS_WIMAX_STATE"
829        android:permissionGroup="android.permission-group.NETWORK"
830        android:protectionLevel="normal"
831        android:description="@string/permdesc_accessWimaxState"
832        android:label="@string/permlab_accessWimaxState" />
833
834    <!-- @hide -->
835    <permission android:name="android.permission.CHANGE_WIMAX_STATE"
836        android:permissionGroup="android.permission-group.NETWORK"
837        android:protectionLevel="dangerous"
838        android:description="@string/permdesc_changeWimaxState"
839        android:label="@string/permlab_changeWimaxState" />
840
841    <!-- Allows applications to act as network scorers. @hide @SystemApi-->
842    <!-- TODO: Change protection level to normal when unhiding this API. -->
843    <permission android:name="android.permission.SCORE_NETWORKS"
844        android:permissionGroup="android.permission-group.NETWORK"
845        android:protectionLevel="signature|system"
846        android:description="@string/permdesc_scoreNetworks"
847        android:label="@string/permlab_scoreNetworks" />
848
849    <!-- ======================================= -->
850    <!-- Permissions for short range, peripheral networks -->
851    <!-- ======================================= -->
852    <eat-comment />
853
854    <!-- Used for permissions that provide access to other devices through Bluetooth.-->
855    <permission-group android:name="android.permission-group.BLUETOOTH_NETWORK"
856        android:label="@string/permgrouplab_bluetoothNetwork"
857        android:icon="@drawable/perm_group_bluetooth"
858        android:description="@string/permgroupdesc_bluetoothNetwork"
859        android:priority="260" />
860
861    <!-- Allows applications to connect to paired bluetooth devices -->
862    <permission android:name="android.permission.BLUETOOTH"
863        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
864        android:protectionLevel="dangerous"
865        android:description="@string/permdesc_bluetooth"
866        android:label="@string/permlab_bluetooth" />
867
868    <!-- Allows applications to discover and pair bluetooth devices -->
869    <permission android:name="android.permission.BLUETOOTH_ADMIN"
870        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
871        android:protectionLevel="dangerous"
872        android:description="@string/permdesc_bluetoothAdmin"
873        android:label="@string/permlab_bluetoothAdmin" />
874
875    <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction.
876         This is not available to third party applications. -->
877    <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
878        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
879        android:protectionLevel="system|signature"
880        android:description="@string/permdesc_bluetoothPriv"
881        android:label="@string/permlab_bluetoothPriv" />
882
883    <!-- Control access to email providers exclusively for Bluetooth
884         @hide
885    -->
886    <permission android:name="android.permission.BLUETOOTH_MAP"
887        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
888        android:protectionLevel="signature"
889        android:description="@string/permdesc_bluetoothMap"
890        android:label="@string/permlab_bluetoothMap" />
891
892    <!-- Allows bluetooth stack to access files
893         @hide This should only be used by Bluetooth apk.
894    -->
895    <permission android:name="android.permission.BLUETOOTH_STACK"
896        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
897        android:protectionLevel="signature" />
898
899    <!-- Allows applications to perform I/O operations over NFC -->
900    <permission android:name="android.permission.NFC"
901        android:permissionGroup="android.permission-group.NETWORK"
902        android:protectionLevel="dangerous"
903        android:description="@string/permdesc_nfc"
904        android:label="@string/permlab_nfc" />
905
906    <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
907         @hide -->
908    <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
909        android:permissionGroup="android.permission-group.NETWORK"
910        android:protectionLevel="signature|system" />
911
912    <!-- @SystemApi @hide -->
913    <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
914        android:permissionGroup="android.permission-group.NETWORK"
915        android:protectionLevel="signature|system" />
916
917    <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
918         @hide -->
919    <permission android:name="android.permission.LOOP_RADIO"
920        android:permissionGroup="android.permission-group.NETWORK"
921        android:protectionLevel="signature|system" />
922
923    <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
924         @hide
925    -->
926    <permission android:name="android.permission.NFC_HANDOVER_STATUS"
927                android:label="@string/permlab_handoverStatus"
928                android:description="@string/permdesc_handoverStatus"
929                android:protectionLevel="signature|system" />
930
931    <!-- ================================== -->
932    <!-- Permissions for accessing accounts -->
933    <!-- ================================== -->
934    <eat-comment />
935
936    <!-- Permissions for direct access to the accounts managed
937         by the Account Manager. -->
938    <permission-group android:name="android.permission-group.ACCOUNTS"
939        android:label="@string/permgrouplab_accounts"
940        android:icon="@drawable/perm_group_accounts"
941        android:description="@string/permgroupdesc_accounts"
942        android:permissionGroupFlags="personalInfo"
943        android:priority="200" />
944
945    <!-- Allows access to the list of accounts in the Accounts Service -->
946    <permission android:name="android.permission.GET_ACCOUNTS"
947        android:permissionGroup="android.permission-group.ACCOUNTS"
948        android:protectionLevel="normal"
949        android:description="@string/permdesc_getAccounts"
950        android:label="@string/permlab_getAccounts" />
951
952    <!-- Allows an application to act as an AccountAuthenticator for
953         the AccountManager -->
954    <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
955        android:permissionGroup="android.permission-group.ACCOUNTS"
956        android:protectionLevel="dangerous"
957        android:label="@string/permlab_authenticateAccounts"
958        android:description="@string/permdesc_authenticateAccounts" />
959
960    <!-- Allows an application to request authtokens from the AccountManager -->
961    <permission android:name="android.permission.USE_CREDENTIALS"
962        android:permissionGroup="android.permission-group.ACCOUNTS"
963        android:protectionLevel="dangerous"
964        android:label="@string/permlab_useCredentials"
965        android:description="@string/permdesc_useCredentials" />
966
967    <!-- Allows an application to manage the list of accounts in the AccountManager -->
968    <permission android:name="android.permission.MANAGE_ACCOUNTS"
969        android:permissionGroup="android.permission-group.ACCOUNTS"
970        android:protectionLevel="dangerous"
971        android:label="@string/permlab_manageAccounts"
972        android:description="@string/permdesc_manageAccounts" />
973
974    <!-- @SystemApi Allows applications to call into AccountAuthenticators.
975    <p>Not for use by third-party applications. -->
976    <permission android:name="android.permission.ACCOUNT_MANAGER"
977        android:permissionGroup="android.permission-group.ACCOUNTS"
978        android:protectionLevel="signature"
979        android:description="@string/permdesc_accountManagerService"
980        android:label="@string/permlab_accountManagerService" />
981
982    <!-- ================================== -->
983    <!-- Permissions for accessing hardware that may effect battery life-->
984    <!-- ================================== -->
985    <eat-comment />
986
987    <!-- Used for permissions that provide direct access to the hardware on
988         the device that has an effect on battery life.  This includes vibrator,
989         flashlight,  etc. -->
990
991    <permission-group android:name="android.permission-group.AFFECTS_BATTERY"
992        android:label="@string/permgrouplab_affectsBattery"
993        android:icon="@drawable/perm_group_affects_battery"
994        android:description="@string/permgroupdesc_affectsBattery"
995        android:priority="180" />
996
997    <!-- Allows applications to enter Wi-Fi Multicast mode -->
998    <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
999        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
1000        android:protectionLevel="dangerous"
1001        android:description="@string/permdesc_changeWifiMulticastState"
1002        android:label="@string/permlab_changeWifiMulticastState" />
1003
1004    <!-- Allows access to the vibrator -->
1005    <permission android:name="android.permission.VIBRATE"
1006        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
1007        android:protectionLevel="normal"
1008        android:label="@string/permlab_vibrate"
1009        android:description="@string/permdesc_vibrate" />
1010
1011    <!-- Allows access to the flashlight -->
1012    <permission android:name="android.permission.FLASHLIGHT"
1013        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
1014        android:protectionLevel="normal"
1015        android:label="@string/permlab_flashlight"
1016        android:description="@string/permdesc_flashlight" />
1017
1018    <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
1019         from dimming -->
1020    <permission android:name="android.permission.WAKE_LOCK"
1021        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
1022        android:protectionLevel="normal"
1023        android:label="@string/permlab_wakeLock"
1024        android:description="@string/permdesc_wakeLock" />
1025
1026    <!-- Allows using the device's IR transmitter, if available -->
1027    <permission android:name="android.permission.TRANSMIT_IR"
1028        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
1029        android:protectionLevel="normal"
1030        android:label="@string/permlab_transmitIr"
1031        android:description="@string/permdesc_transmitIr" />
1032
1033    <!-- ==================================================== -->
1034    <!-- Permissions related to changing audio settings   -->
1035    <!-- ==================================================== -->
1036    <eat-comment />
1037
1038    <!-- Used for permissions that provide direct access to speaker settings
1039         the device. -->
1040    <permission-group android:name="android.permission-group.AUDIO_SETTINGS"
1041        android:label="@string/permgrouplab_audioSettings"
1042        android:icon="@drawable/perm_group_audio_settings"
1043        android:description="@string/permgroupdesc_audioSettings"
1044        android:priority="130" />
1045
1046    <!-- Allows an application to modify global audio settings -->
1047    <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
1048        android:permissionGroup="android.permission-group.AUDIO_SETTINGS"
1049        android:protectionLevel="normal"
1050        android:label="@string/permlab_modifyAudioSettings"
1051        android:description="@string/permdesc_modifyAudioSettings" />
1052
1053    <!-- ================================== -->
1054    <!-- Permissions for accessing hardware -->
1055    <!-- ================================== -->
1056    <eat-comment />
1057
1058    <!-- Used for permissions that provide direct access to the hardware on
1059         the device.  This includes audio, the camera, vibrator, etc. -->
1060    <permission-group android:name="android.permission-group.HARDWARE_CONTROLS"
1061        android:label="@string/permgrouplab_hardwareControls"
1062        android:description="@string/permgroupdesc_hardwareControls"
1063        android:priority="260"/>
1064
1065    <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
1066         @hide -->
1067    <permission android:name="android.permission.MANAGE_USB"
1068        android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1069        android:protectionLevel="signature|system"
1070        android:label="@string/permlab_manageUsb"
1071        android:description="@string/permdesc_manageUsb" />
1072
1073    <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
1074         For use only by the device side MTP implementation.
1075         @hide -->
1076    <permission android:name="android.permission.ACCESS_MTP"
1077        android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1078        android:protectionLevel="signature|system"
1079        android:label="@string/permlab_accessMtp"
1080        android:description="@string/permdesc_accessMtp" />
1081
1082    <!-- Allows access to hardware peripherals.  Intended only for hardware testing.
1083    <p>Not for use by third-party applications. -->
1084    <permission android:name="android.permission.HARDWARE_TEST"
1085        android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1086        android:protectionLevel="signature"
1087        android:label="@string/permlab_hardware_test"
1088        android:description="@string/permdesc_hardware_test" />
1089
1090    <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
1091         @hide -->
1092    <permission android:name="android.permission.NET_ADMIN"
1093        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1094        android:protectionLevel="signature" />
1095
1096    <!-- Allows registration for remote audio playback. @hide -->
1097    <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
1098        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1099        android:protectionLevel="signature" />
1100
1101    <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
1102         built-in tuners and HDMI-in's.
1103         @hide This should only be used by OEM's TvInputService's.
1104    -->
1105    <permission android:name="android.permission.TV_INPUT_HARDWARE"
1106        android:protectionLevel="signatureOrSystem" />
1107
1108    <!-- @SystemApi Allows to capture a frame of TV input hardware such as
1109         built-in tuners and HDMI-in's.
1110         @hide <p>Not for use by third-party applications.
1111    -->
1112    <permission android:name="android.permission.CAPTURE_TV_INPUT"
1113        android:protectionLevel="signatureOrSystem" />
1114
1115    <!-- @hide Allows enabling/disabling OEM unlock
1116   <p>Not for use by third-party applications. -->
1117    <permission android:name="android.permission.OEM_UNLOCK_STATE"
1118                android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1119                android:protectionLevel="signature" />
1120
1121
1122    <!-- =========================================== -->
1123    <!-- Permissions associated with audio capture -->
1124    <!-- =========================================== -->
1125    <eat-comment />
1126
1127    <!-- Used for permissions that are associated with accessing
1128         microphone audio from the device. Note that phone calls also capture audio
1129         but are in a separate (more visible) permission group. -->
1130    <permission-group android:name="android.permission-group.MICROPHONE"
1131        android:label="@string/permgrouplab_microphone"
1132        android:icon="@drawable/perm_group_microphone"
1133        android:description="@string/permgroupdesc_microphone"
1134        android:permissionGroupFlags="personalInfo"
1135        android:priority="340" />
1136
1137    <!-- Allows an application to record audio -->
1138    <permission android:name="android.permission.RECORD_AUDIO"
1139        android:permissionGroup="android.permission-group.MICROPHONE"
1140        android:protectionLevel="dangerous"
1141        android:label="@string/permlab_recordAudio"
1142        android:description="@string/permdesc_recordAudio" />
1143
1144
1145    <!-- =========================================== -->
1146    <!-- Permissions associated with camera and image capture -->
1147    <!-- =========================================== -->
1148    <eat-comment />
1149
1150    <!-- Used for permissions that are associated with accessing
1151         camera or capturing images/video from the device. -->
1152    <permission-group android:name="android.permission-group.CAMERA"
1153        android:label="@string/permgrouplab_camera"
1154        android:icon="@drawable/perm_group_camera"
1155        android:description="@string/permgroupdesc_camera"
1156        android:permissionGroupFlags="personalInfo"
1157        android:priority="350" />
1158
1159    <!-- Required to be able to access the camera device.
1160         <p>This will automatically enforce the <a
1161         href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code
1162         &lt;uses-feature&gt;}</a> manifest element for <em>all</em> camera features.
1163         If you do not require all camera features or can properly operate if a camera
1164         is not available, then you must modify your manifest as appropriate in order to
1165         install on devices that don't support all camera features.</p> -->
1166    <permission android:name="android.permission.CAMERA"
1167        android:permissionGroup="android.permission-group.CAMERA"
1168        android:protectionLevel="dangerous"
1169        android:label="@string/permlab_camera"
1170        android:description="@string/permdesc_camera" />
1171
1172    <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
1173         a camera is in use by an application.
1174         @hide -->
1175    <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
1176        android:permissionGroup="android.permission-group.CAMERA"
1177        android:protectionLevel="signature|system"
1178        android:label="@string/permlab_cameraDisableTransmitLed"
1179        android:description="@string/permdesc_cameraDisableTransmitLed" />
1180
1181    <!-- =========================================== -->
1182    <!-- Permissions associated with telephony state -->
1183    <!-- =========================================== -->
1184    <eat-comment />
1185
1186    <!-- Used for permissions that are associated with accessing and modifying
1187         telephony state: placing calls, intercepting outgoing calls, reading
1188         and modifying the phone state. -->
1189    <permission-group android:name="android.permission-group.PHONE_CALLS"
1190        android:label="@string/permgrouplab_phoneCalls"
1191        android:icon="@drawable/perm_group_phone_calls"
1192        android:description="@string/permgroupdesc_phoneCalls"
1193        android:permissionGroupFlags="personalInfo"
1194        android:priority="370" />
1195
1196    <!-- Allows an application to see the number being dialed during an outgoing
1197         call with the option to redirect the call to a different number or
1198         abort the call altogether. -->
1199    <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
1200        android:permissionGroup="android.permission-group.PHONE_CALLS"
1201        android:protectionLevel="dangerous"
1202        android:label="@string/permlab_processOutgoingCalls"
1203        android:description="@string/permdesc_processOutgoingCalls" />
1204
1205    <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
1206         Does not include placing calls.
1207         <p>Not for use by third-party applications. -->
1208    <permission android:name="android.permission.MODIFY_PHONE_STATE"
1209        android:permissionGroup="android.permission-group.PHONE_CALLS"
1210        android:protectionLevel="signature|system"
1211        android:label="@string/permlab_modifyPhoneState"
1212        android:description="@string/permdesc_modifyPhoneState" />
1213
1214    <!-- Allows read only access to phone state.
1215         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1216         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1217         minSdkVersion}</a> and <a
1218         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1219         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1220         grants your app this permission. If you don't need this permission, be sure your <a
1221         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1222         targetSdkVersion}</a> is 4 or higher. -->
1223    <permission android:name="android.permission.READ_PHONE_STATE"
1224        android:permissionGroup="android.permission-group.PHONE_CALLS"
1225        android:protectionLevel="dangerous"
1226        android:label="@string/permlab_readPhoneState"
1227        android:description="@string/permdesc_readPhoneState" />
1228
1229    <!-- Allows read only access to precise phone state.
1230         @hide Pending API council approval -->
1231    <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
1232        android:permissionGroup="android.permission-group.PHONE_CALLS"
1233        android:protectionLevel="dangerous"
1234        android:label="@string/permlab_readPrecisePhoneState"
1235        android:description="@string/permdesc_readPrecisePhoneState" />
1236
1237    <!-- @SystemApi Allows read access to privileged phone state.
1238         @hide Used internally. -->
1239    <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
1240        android:permissionGroup="android.permission-group.PHONE_CALLS"
1241        android:protectionLevel="signature|system" />
1242
1243     <!-- Allows an application to initiate a phone call without going through
1244         the Dialer user interface for the user to confirm the call
1245         being placed. -->
1246    <permission android:name="android.permission.CALL_PHONE"
1247        android:permissionGroup="android.permission-group.PHONE_CALLS"
1248        android:protectionLevel="dangerous"
1249        android:permissionFlags="costsMoney"
1250        android:label="@string/permlab_callPhone"
1251        android:description="@string/permdesc_callPhone" />
1252
1253    <!-- Allows an application to use SIP service -->
1254    <permission android:name="android.permission.USE_SIP"
1255        android:permissionGroup="android.permission-group.PHONE_CALLS"
1256        android:protectionLevel="dangerous"
1257        android:description="@string/permdesc_use_sip"
1258        android:label="@string/permlab_use_sip" />
1259
1260    <!-- @SystemApi Allows an application to bind to InCallService implementations.
1261         @hide -->
1262    <permission android:name="android.permission.BIND_INCALL_SERVICE"
1263        android:permissionGroup="android.permission-group.PHONE_CALLS"
1264        android:protectionLevel="system|signature"
1265        android:description="@string/permdesc_bind_incall_service"
1266        android:label="@string/permlab_bind_incall_service" />
1267
1268    <!-- @SystemApi Allows an application to bind to ConnectionService implementations.
1269         @hide -->
1270    <permission android:name="android.permission.BIND_CONNECTION_SERVICE"
1271                android:permissionGroup="android.permission-group.PHONE_CALLS"
1272                android:protectionLevel="system|signature"
1273                android:description="@string/permdesc_bind_connection_service"
1274                android:label="@string/permlab_bind_connection_service" />
1275
1276    <!-- @SystemApi Allows an application to control the in-call experience.
1277         @hide -->
1278    <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE"
1279                android:permissionGroup="android.permission-group.PHONE_CALLS"
1280                android:protectionLevel="system|signature"
1281                android:description="@string/permdesc_control_incall_experience"
1282                android:label="@string/permlab_control_incall_experience" />
1283
1284    <!-- ================================== -->
1285    <!-- Permissions for sdcard interaction -->
1286    <!-- ================================== -->
1287    <eat-comment />
1288
1289    <!-- Group of permissions that are related to SD card access. -->
1290    <permission-group android:name="android.permission-group.STORAGE"
1291        android:label="@string/permgrouplab_storage"
1292        android:icon="@drawable/perm_group_storage"
1293        android:description="@string/permgroupdesc_storage"
1294        android:permissionGroupFlags="personalInfo"
1295        android:priority="240" />
1296
1297    <!-- Allows an application to read from external storage.
1298         <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
1299         granted this permission.</p>
1300         <p>This permission is enforced starting in API level 19.  Before API level 19, this
1301         permission is not enforced and all apps still have access to read from external storage.
1302         You can test your app with the permission enforced by enabling <em>Protect USB
1303         storage</em> under Developer options in the Settings app on a device running Android 4.1 or
1304         higher.</p>
1305         <p>Also starting in API level 19, this permission is <em>not</em> required to
1306         read/write files in your application-specific directories returned by
1307         {@link android.content.Context#getExternalFilesDir} and
1308         {@link android.content.Context#getExternalCacheDir}.
1309         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1310         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1311         minSdkVersion}</a> and <a
1312         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1313         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1314         grants your app this permission. If you don't need this permission, be sure your <a
1315         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1316         targetSdkVersion}</a> is 4 or higher.-->
1317    <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
1318        android:permissionGroup="android.permission-group.STORAGE"
1319        android:label="@string/permlab_sdcardRead"
1320        android:description="@string/permdesc_sdcardRead"
1321        android:protectionLevel="normal" />
1322
1323    <!-- Allows an application to write to external storage.
1324         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1325         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1326         minSdkVersion}</a> and <a
1327         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1328         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1329         grants your app this permission. If you don't need this permission, be sure your <a
1330         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1331         targetSdkVersion}</a> is 4 or higher.
1332         <p>Starting in API level 19, this permission is <em>not</em> required to
1333         read/write files in your application-specific directories returned by
1334         {@link android.content.Context#getExternalFilesDir} and
1335         {@link android.content.Context#getExternalCacheDir}. -->
1336    <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
1337        android:permissionGroup="android.permission-group.STORAGE"
1338        android:label="@string/permlab_sdcardWrite"
1339        android:description="@string/permdesc_sdcardWrite"
1340        android:protectionLevel="dangerous" />
1341
1342    <!-- @SystemApi Allows an application to write to internal media storage
1343         @hide  -->
1344    <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
1345        android:permissionGroup="android.permission-group.STORAGE"
1346        android:label="@string/permlab_mediaStorageWrite"
1347        android:description="@string/permdesc_mediaStorageWrite"
1348        android:protectionLevel="signature|system" />
1349
1350    <!-- Allows an application to manage access to documents, usually as part
1351         of a document picker. -->
1352    <permission android:name="android.permission.MANAGE_DOCUMENTS"
1353        android:permissionGroup="android.permission-group.STORAGE"
1354        android:label="@string/permlab_manageDocs"
1355        android:description="@string/permdesc_manageDocs"
1356        android:protectionLevel="signature" />
1357
1358    <!-- ================================== -->
1359    <!-- Permissions for screenlock         -->
1360    <!-- ================================== -->
1361    <eat-comment />
1362
1363    <!-- Group of permissions that are related to the screenlock. -->
1364    <permission-group android:name="android.permission-group.SCREENLOCK"
1365        android:label="@string/permgrouplab_screenlock"
1366        android:icon="@drawable/perm_group_screenlock"
1367        android:permissionGroupFlags="personalInfo"
1368        android:description="@string/permgroupdesc_screenlock"
1369        android:priority="230" />
1370
1371    <!-- Allows applications to disable the keyguard -->
1372    <permission android:name="android.permission.DISABLE_KEYGUARD"
1373        android:permissionGroup="android.permission-group.SCREENLOCK"
1374        android:protectionLevel="dangerous"
1375        android:description="@string/permdesc_disableKeyguard"
1376        android:label="@string/permlab_disableKeyguard" />
1377
1378    <!-- ================================== -->
1379    <!-- Permissions to access other installed applications  -->
1380    <!-- ================================== -->
1381    <eat-comment />
1382
1383    <!-- Group of permissions that are related to the other applications
1384         installed on the system.  Examples include such as listing
1385         running apps, or killing background processes. -->
1386    <permission-group android:name="android.permission-group.APP_INFO"
1387        android:label="@string/permgrouplab_appInfo"
1388        android:icon="@drawable/perm_group_app_info"
1389        android:description="@string/permgroupdesc_appInfo"
1390        android:priority="220" />
1391
1392    <!-- @SystemApi Allows an application to get information about the currently
1393         or recently running tasks. -->
1394    <permission android:name="android.permission.GET_TASKS"
1395        android:permissionGroup="android.permission-group.APP_INFO"
1396        android:protectionLevel="signature|system"
1397        android:label="@string/permlab_getTasks"
1398        android:description="@string/permdesc_getTasks" />
1399
1400    <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo.
1401         @hide -->
1402    <permission android:name="android.permission.START_TASKS_FROM_RECENTS"
1403        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1404        android:protectionLevel="signature|system"
1405        android:label="@string/permlab_startTasksFromRecents"
1406        android:description="@string/permdesc_startTasksFromRecents" />
1407
1408    <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
1409         across the users on the device, using singleton services and
1410         user-targeted broadcasts.  This permission is not available to
1411         third party applications. -->
1412    <permission android:name="android.permission.INTERACT_ACROSS_USERS"
1413        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1414        android:protectionLevel="signature|system|development"
1415        android:label="@string/permlab_interactAcrossUsers"
1416        android:description="@string/permdesc_interactAcrossUsers" />
1417
1418    <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
1419         that removes restrictions on where broadcasts can be sent and allows other
1420         types of interactions. -->
1421    <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
1422        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1423        android:protectionLevel="signature"
1424        android:label="@string/permlab_interactAcrossUsersFull"
1425        android:description="@string/permdesc_interactAcrossUsersFull" />
1426
1427    <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
1428         users on the device. This permission is not available to
1429         third party applications. -->
1430    <permission android:name="android.permission.MANAGE_USERS"
1431        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1432        android:protectionLevel="signature|system"
1433        android:label="@string/permlab_manageUsers"
1434        android:description="@string/permdesc_manageUsers" />
1435
1436    <!-- Allows an application to get full detailed information about
1437         recently running tasks, with full fidelity to the real state.
1438         @hide -->
1439    <permission android:name="android.permission.GET_DETAILED_TASKS"
1440        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1441        android:protectionLevel="signature"
1442        android:label="@string/permlab_getDetailedTasks"
1443        android:description="@string/permdesc_getDetailedTasks" />
1444
1445    <!-- Allows an application to change the Z-order of tasks -->
1446    <permission android:name="android.permission.REORDER_TASKS"
1447        android:permissionGroup="android.permission-group.APP_INFO"
1448        android:protectionLevel="normal"
1449        android:label="@string/permlab_reorderTasks"
1450        android:description="@string/permdesc_reorderTasks" />
1451
1452    <!-- @hide Allows an application to change to remove/kill tasks -->
1453    <permission android:name="android.permission.REMOVE_TASKS"
1454        android:permissionGroup="android.permission-group.APP_INFO"
1455        android:protectionLevel="signature"
1456        android:label="@string/permlab_removeTasks"
1457        android:description="@string/permdesc_removeTasks" />
1458
1459    <!-- @SystemApi @hide Allows an application to create/manage/remove stacks -->
1460    <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
1461        android:permissionGroup="android.permission-group.APP_INFO"
1462        android:protectionLevel="signature|system"
1463        android:label="@string/permlab_manageActivityStacks"
1464        android:description="@string/permdesc_manageActivityStacks" />
1465
1466    <!-- Allows an application to start any activity, regardless of permission
1467         protection or exported state. @hide -->
1468    <permission android:name="android.permission.START_ANY_ACTIVITY"
1469        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1470        android:protectionLevel="signature"
1471        android:label="@string/permlab_startAnyActivity"
1472        android:description="@string/permdesc_startAnyActivity" />
1473
1474    <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
1475        API is no longer supported. -->
1476    <permission android:name="android.permission.RESTART_PACKAGES"
1477        android:permissionGroup="android.permission-group.APP_INFO"
1478        android:protectionLevel="normal"
1479        android:label="@string/permlab_killBackgroundProcesses"
1480        android:description="@string/permdesc_killBackgroundProcesses" />
1481
1482    <!-- Allows an application to call
1483        {@link android.app.ActivityManager#killBackgroundProcesses}. -->
1484    <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
1485        android:permissionGroup="android.permission-group.APP_INFO"
1486        android:protectionLevel="normal"
1487        android:label="@string/permlab_killBackgroundProcesses"
1488        android:description="@string/permdesc_killBackgroundProcesses" />
1489
1490    <!-- ================================== -->
1491    <!-- Permissions affecting the display of other applications  -->
1492    <!-- ================================== -->
1493    <eat-comment />
1494
1495    <!-- Group of permissions that allow manipulation of how
1496         another application displays UI to the user. -->
1497    <permission-group android:name="android.permission-group.DISPLAY"
1498        android:label="@string/permgrouplab_display"
1499        android:icon="@drawable/perm_group_display"
1500        android:description="@string/permgroupdesc_display"
1501        android:priority="190"/>
1502
1503    <!-- Allows an application to open windows using the type
1504         {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT},
1505         shown on top of all other applications.  Very few applications
1506         should use this permission; these windows are intended for
1507         system-level interaction with the user. -->
1508    <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
1509        android:permissionGroup="android.permission-group.DISPLAY"
1510        android:protectionLevel="dangerous"
1511        android:label="@string/permlab_systemAlertWindow"
1512        android:description="@string/permdesc_systemAlertWindow" />
1513
1514    <!-- ================================== -->
1515    <!-- Permissions affecting the system wallpaper -->
1516    <!-- ================================== -->
1517    <eat-comment />
1518
1519    <!-- Group of permissions that allow manipulation of how
1520         another application displays UI to the user. -->
1521    <permission-group android:name="android.permission-group.WALLPAPER"
1522        android:label="@string/permgrouplab_wallpaper"
1523        android:icon="@drawable/perm_group_wallpaper"
1524        android:description="@string/permgroupdesc_wallpaper"
1525        android:priority="150" />
1526
1527    <!-- Allows applications to set the wallpaper -->
1528    <permission android:name="android.permission.SET_WALLPAPER"
1529        android:permissionGroup="android.permission-group.WALLPAPER"
1530        android:protectionLevel="normal"
1531        android:label="@string/permlab_setWallpaper"
1532        android:description="@string/permdesc_setWallpaper" />
1533
1534    <!-- Allows applications to set the wallpaper hints -->
1535    <permission android:name="android.permission.SET_WALLPAPER_HINTS"
1536        android:permissionGroup="android.permission-group.WALLPAPER"
1537        android:protectionLevel="normal"
1538        android:label="@string/permlab_setWallpaperHints"
1539        android:description="@string/permdesc_setWallpaperHints" />
1540
1541    <!-- ============================================ -->
1542    <!-- Permissions for changing the system clock -->
1543    <!-- ============================================ -->
1544    <eat-comment />
1545
1546    <!-- Group of permissions that are related to system clock. -->
1547    <permission-group android:name="android.permission-group.SYSTEM_CLOCK"
1548        android:label="@string/permgrouplab_systemClock"
1549        android:icon="@drawable/perm_group_system_clock"
1550        android:description="@string/permgroupdesc_systemClock"
1551        android:priority="140" />
1552
1553    <!-- @SystemApi Allows applications to set the system time.
1554    <p>Not for use by third-party applications. -->
1555    <permission android:name="android.permission.SET_TIME"
1556        android:protectionLevel="signature|system"
1557        android:label="@string/permlab_setTime"
1558        android:description="@string/permdesc_setTime" />
1559
1560    <!-- Allows applications to set the system time zone -->
1561    <permission android:name="android.permission.SET_TIME_ZONE"
1562        android:permissionGroup="android.permission-group.SYSTEM_CLOCK"
1563        android:protectionLevel="normal"
1564        android:label="@string/permlab_setTimeZone"
1565        android:description="@string/permdesc_setTimeZone" />
1566
1567    <!-- ==================================================== -->
1568    <!-- Permissions related to changing status bar   -->
1569    <!-- ==================================================== -->
1570    <eat-comment />
1571
1572    <!-- Used for permissions that change the status bar -->
1573    <permission-group android:name="android.permission-group.STATUS_BAR"
1574        android:label="@string/permgrouplab_statusBar"
1575        android:icon="@drawable/perm_group_status_bar"
1576        android:description="@string/permgroupdesc_statusBar"
1577        android:priority="110" />
1578
1579    <!-- Allows an application to expand or collapse the status bar. -->
1580    <permission android:name="android.permission.EXPAND_STATUS_BAR"
1581        android:permissionGroup="android.permission-group.STATUS_BAR"
1582        android:protectionLevel="normal"
1583        android:label="@string/permlab_expandStatusBar"
1584        android:description="@string/permdesc_expandStatusBar" />
1585
1586    <!-- ============================================================== -->
1587    <!-- Permissions related to adding/removing shortcuts from Launcher -->
1588    <!-- ============================================================== -->
1589    <eat-comment />
1590
1591    <!-- Allows an application to install a shortcut in Launcher -->
1592    <permission
1593        android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
1594        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1595        android:protectionLevel="dangerous"
1596        android:label="@string/permlab_install_shortcut"
1597        android:description="@string/permdesc_install_shortcut" />
1598
1599        <!-- Allows an application to uninstall a shortcut in Launcher -->
1600    <permission
1601        android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
1602        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1603        android:protectionLevel="dangerous"
1604        android:label="@string/permlab_uninstall_shortcut"
1605        android:description="@string/permdesc_uninstall_shortcut"/>
1606
1607    <!-- ==================================================== -->
1608    <!-- Permissions related to accessing sync settings   -->
1609    <!-- ==================================================== -->
1610    <eat-comment />
1611
1612    <!-- Used for permissions that access the sync settings or sync
1613         related information. -->
1614    <permission-group android:name="android.permission-group.SYNC_SETTINGS"
1615        android:label="@string/permgrouplab_syncSettings"
1616        android:icon="@drawable/perm_group_sync_settings"
1617        android:description="@string/permgroupdesc_syncSettings"
1618        android:priority="120" />
1619
1620    <!-- Allows applications to read the sync settings -->
1621    <permission android:name="android.permission.READ_SYNC_SETTINGS"
1622        android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1623        android:protectionLevel="normal"
1624        android:description="@string/permdesc_readSyncSettings"
1625        android:label="@string/permlab_readSyncSettings" />
1626
1627    <!-- Allows applications to write the sync settings -->
1628    <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
1629        android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1630        android:protectionLevel="normal"
1631        android:description="@string/permdesc_writeSyncSettings"
1632        android:label="@string/permlab_writeSyncSettings" />
1633
1634    <!-- Allows applications to read the sync stats -->
1635    <permission android:name="android.permission.READ_SYNC_STATS"
1636        android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1637        android:protectionLevel="normal"
1638        android:description="@string/permdesc_readSyncStats"
1639        android:label="@string/permlab_readSyncStats" />
1640
1641
1642    <!-- ============================================ -->
1643    <!-- Permissions for low-level system interaction -->
1644    <!-- ============================================ -->
1645    <eat-comment />
1646
1647    <!-- Group of permissions that are related to system APIs.  Many
1648         of these are not permissions the user will be expected to understand,
1649         and such permissions should generally be marked as "normal" protection
1650         level so they don't get displayed.  This can also, however, be used
1651         for miscellaneous features that provide access to the operating system,
1652         such as writing the global system settings. -->
1653    <permission-group android:name="android.permission-group.SYSTEM_TOOLS"
1654        android:label="@string/permgrouplab_systemTools"
1655        android:icon="@drawable/perm_group_system_tools"
1656        android:description="@string/permgroupdesc_systemTools"
1657        android:priority="100" />
1658
1659    <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
1660    <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
1661        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1662        android:protectionLevel="signature"
1663        android:label="@string/permlab_setScreenCompatibility"
1664        android:description="@string/permdesc_setScreenCompatibility" />
1665
1666    <!-- Allows an application to access all multi-user external storage @hide -->
1667    <permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE"
1668        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1669        android:label="@string/permlab_sdcardAccessAll"
1670        android:description="@string/permdesc_sdcardAccessAll"
1671        android:protectionLevel="signature" />
1672
1673    <!-- @SystemApi Allows an application to modify the current configuration, such
1674         as locale. -->
1675    <permission android:name="android.permission.CHANGE_CONFIGURATION"
1676        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1677        android:protectionLevel="signature|system|development"
1678        android:label="@string/permlab_changeConfiguration"
1679        android:description="@string/permdesc_changeConfiguration" />
1680
1681    <!-- Allows an application to read or write the system settings. -->
1682    <permission android:name="android.permission.WRITE_SETTINGS"
1683        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1684        android:protectionLevel="normal"
1685        android:label="@string/permlab_writeSettings"
1686        android:description="@string/permdesc_writeSettings" />
1687
1688    <!-- @SystemApi Allows an application to modify the Google service map.
1689    <p>Not for use by third-party applications. -->
1690    <permission android:name="android.permission.WRITE_GSERVICES"
1691        android:protectionLevel="signature|system"
1692        android:label="@string/permlab_writeGservices"
1693        android:description="@string/permdesc_writeGservices" />
1694
1695    <!-- @SystemApi Allows an application to call
1696        {@link android.app.ActivityManager#forceStopPackage}.
1697        @hide -->
1698    <permission android:name="android.permission.FORCE_STOP_PACKAGES"
1699        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1700        android:protectionLevel="signature|system"
1701        android:label="@string/permlab_forceStopPackages"
1702        android:description="@string/permdesc_forceStopPackages" />
1703
1704    <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
1705         An active window is the window that has fired an accessibility event. -->
1706    <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
1707        android:permissionGroup="android.permission-group.PERSONAL_INFO"
1708        android:protectionLevel="signature|system"
1709        android:label="@string/permlab_retrieve_window_content"
1710        android:description="@string/permdesc_retrieve_window_content" />
1711
1712    <!-- @SystemApi Modify the global animation scaling factor.
1713    <p>Not for use by third-party applications. -->
1714    <permission android:name="android.permission.SET_ANIMATION_SCALE"
1715        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1716        android:protectionLevel="signature|system|development"
1717        android:label="@string/permlab_setAnimationScale"
1718        android:description="@string/permdesc_setAnimationScale" />
1719
1720    <!-- @deprecated This functionality will be removed in the future; please do
1721         not use. Allow an application to make its activities persistent. -->
1722    <permission android:name="android.permission.PERSISTENT_ACTIVITY"
1723        android:permissionGroup="android.permission-group.APP_INFO"
1724        android:protectionLevel="normal"
1725        android:label="@string/permlab_persistentActivity"
1726        android:description="@string/permdesc_persistentActivity" />
1727
1728    <!-- Allows an application to find out the space used by any package. -->
1729    <permission android:name="android.permission.GET_PACKAGE_SIZE"
1730        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1731        android:protectionLevel="normal"
1732        android:label="@string/permlab_getPackageSize"
1733        android:description="@string/permdesc_getPackageSize" />
1734
1735    <!-- @deprecated No longer useful, see
1736         {@link android.content.pm.PackageManager#addPackageToPreferred}
1737         for details. -->
1738    <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
1739        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1740        android:protectionLevel="signature"
1741        android:label="@string/permlab_setPreferredApplications"
1742        android:description="@string/permdesc_setPreferredApplications" />
1743
1744    <!-- Allows an application to receive the
1745         {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
1746         broadcast after the system finishes booting.  If you don't
1747         request this permission, you will not receive the broadcast at
1748         that time.  Though holding this permission does not have any
1749         security implications, it can have a negative impact on the
1750         user experience by increasing the amount of time it takes the
1751         system to start and allowing applications to have themselves
1752         running without the user being aware of them.  As such, you must
1753         explicitly declare your use of this facility to make that visible
1754         to the user. -->
1755    <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
1756        android:permissionGroup="android.permission-group.APP_INFO"
1757        android:protectionLevel="normal"
1758        android:label="@string/permlab_receiveBootCompleted"
1759        android:description="@string/permdesc_receiveBootCompleted" />
1760
1761    <!-- Allows an application to broadcast sticky intents.  These are
1762         broadcasts whose data is held by the system after being finished,
1763         so that clients can quickly retrieve that data without having
1764         to wait for the next broadcast. -->
1765    <permission android:name="android.permission.BROADCAST_STICKY"
1766        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1767        android:protectionLevel="normal"
1768        android:label="@string/permlab_broadcastSticky"
1769        android:description="@string/permdesc_broadcastSticky" />
1770
1771    <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
1772    <p>Not for use by third-party applications.-->
1773    <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
1774        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1775        android:protectionLevel="system|signature"
1776        android:label="@string/permlab_mount_unmount_filesystems"
1777        android:description="@string/permdesc_mount_unmount_filesystems" />
1778
1779    <!-- @SystemApi Allows formatting file systems for removable storage.
1780    <p>Not for use by third-party applications. -->
1781    <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
1782        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1783        android:protectionLevel="system|signature"
1784        android:label="@string/permlab_mount_format_filesystems"
1785        android:description="@string/permdesc_mount_format_filesystems" />
1786
1787    <!-- Allows access to ASEC non-destructive API calls
1788         @hide  -->
1789    <permission android:name="android.permission.ASEC_ACCESS"
1790        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1791        android:protectionLevel="signature"
1792        android:label="@string/permlab_asec_access"
1793        android:description="@string/permdesc_asec_access" />
1794
1795    <!-- Allows creation of ASEC volumes
1796         @hide  -->
1797    <permission android:name="android.permission.ASEC_CREATE"
1798        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1799        android:protectionLevel="signature"
1800        android:label="@string/permlab_asec_create"
1801        android:description="@string/permdesc_asec_create" />
1802
1803    <!-- Allows destruction of ASEC volumes
1804         @hide  -->
1805    <permission android:name="android.permission.ASEC_DESTROY"
1806        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1807        android:protectionLevel="signature"
1808        android:label="@string/permlab_asec_destroy"
1809        android:description="@string/permdesc_asec_destroy" />
1810
1811    <!-- Allows mount / unmount of ASEC volumes
1812         @hide  -->
1813    <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
1814        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1815        android:protectionLevel="signature"
1816        android:label="@string/permlab_asec_mount_unmount"
1817        android:description="@string/permdesc_asec_mount_unmount" />
1818
1819    <!-- Allows rename of ASEC volumes
1820         @hide  -->
1821    <permission android:name="android.permission.ASEC_RENAME"
1822        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1823        android:protectionLevel="signature"
1824        android:label="@string/permlab_asec_rename"
1825        android:description="@string/permdesc_asec_rename" />
1826
1827    <!-- @SystemApi Allows applications to write the apn settings.
1828    <p>Not for use by third-party applications. -->
1829    <permission android:name="android.permission.WRITE_APN_SETTINGS"
1830                android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1831                android:protectionLevel="signature|system"
1832                android:description="@string/permdesc_writeApnSettings"
1833                android:label="@string/permlab_writeApnSettings" />
1834
1835    <!-- Allows an application to allow access the subscribed feeds
1836         ContentProvider. -->
1837    <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
1838        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1839        android:label="@string/permlab_subscribedFeedsRead"
1840        android:description="@string/permdesc_subscribedFeedsRead"
1841        android:protectionLevel="normal" />
1842    <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
1843        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1844        android:label="@string/permlab_subscribedFeedsWrite"
1845        android:description="@string/permdesc_subscribedFeedsWrite"
1846        android:protectionLevel="dangerous" />
1847
1848    <!-- Allows applications to change network connectivity state -->
1849    <permission android:name="android.permission.CHANGE_NETWORK_STATE"
1850        android:permissionGroup="android.permission-group.NETWORK"
1851        android:protectionLevel="normal"
1852        android:description="@string/permdesc_changeNetworkState"
1853        android:label="@string/permlab_changeNetworkState" />
1854
1855    <!-- Allows an application to clear the caches of all installed
1856         applications on the device.  -->
1857    <permission android:name="android.permission.CLEAR_APP_CACHE"
1858        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1859        android:protectionLevel="dangerous"
1860        android:label="@string/permlab_clearAppCache"
1861        android:description="@string/permdesc_clearAppCache" />
1862
1863    <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
1864         @hide -->
1865    <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
1866        android:protectionLevel="signature|system"
1867        android:label="@string/permlab_anyCodecForPlayback"
1868        android:description="@string/permdesc_anyCodecForPlayback" />
1869
1870    <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
1871         behalf of the user.
1872         @hide -->
1873    <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
1874        android:protectionLevel="signature|system"
1875        android:label="@string/permlab_manageCaCertificates"
1876        android:description="@string/permdesc_manageCaCertificates" />
1877
1878    <!-- @SystemApi Allows an application to do certain operations needed for
1879         interacting with the recovery (system update) system.
1880         @hide -->
1881    <permission android:name="android.permission.RECOVERY"
1882        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1883        android:protectionLevel="signature|system"
1884        android:label="@string/permlab_recovery"
1885        android:description="@string/permdesc_recovery" />
1886
1887    <!-- Allows the system to bind to an application's task services
1888         @hide -->
1889    <permission android:name="android.permission.BIND_JOB_SERVICE"
1890        android:protectionLevel="signature"
1891        android:label="@string/permlab_bindJobService"
1892        android:description="@string/permdesc_bindJobService" />
1893    <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
1894
1895    <!-- ========================================= -->
1896    <!-- Permissions for special development tools -->
1897    <!-- ========================================= -->
1898    <eat-comment />
1899
1900    <!-- Group of permissions that are related to development features.  These
1901         are not permissions that should appear in third-party applications; they
1902         protect APIs that are intended only to be used for development
1903         purposes. -->
1904    <permission-group android:name="android.permission-group.DEVELOPMENT_TOOLS"
1905        android:label="@string/permgrouplab_developmentTools"
1906        android:description="@string/permgroupdesc_developmentTools"
1907        android:priority="310" />
1908
1909    <!-- @SystemApi Allows an application to read or write the secure system settings.
1910    <p>Not for use by third-party applications. -->
1911    <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
1912        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1913        android:protectionLevel="signature|system|development"
1914        android:label="@string/permlab_writeSecureSettings"
1915        android:description="@string/permdesc_writeSecureSettings" />
1916
1917    <!-- @SystemApi Allows an application to retrieve state dump information from system services.
1918    <p>Not for use by third-party applications. -->
1919    <permission android:name="android.permission.DUMP"
1920        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1921        android:protectionLevel="signature|system|development"
1922        android:label="@string/permlab_dump"
1923        android:description="@string/permdesc_dump" />
1924
1925    <!-- @SystemApi Allows an application to read the low-level system log files.
1926    <p>Not for use by third-party applications, because
1927    Log entries can contain the user's private information. -->
1928    <permission android:name="android.permission.READ_LOGS"
1929        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1930        android:protectionLevel="signature|system|development"
1931        android:label="@string/permlab_readLogs"
1932        android:description="@string/permdesc_readLogs" />
1933
1934    <!-- @SystemApi Configure an application for debugging.
1935    <p>Not for use by third-party applications. -->
1936    <permission android:name="android.permission.SET_DEBUG_APP"
1937        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1938        android:protectionLevel="signature|system|development"
1939        android:label="@string/permlab_setDebugApp"
1940        android:description="@string/permdesc_setDebugApp" />
1941
1942    <!-- @SystemApi Allows an application to set the maximum number of (not needed)
1943         application processes that can be running.
1944         <p>Not for use by third-party applications. -->
1945    <permission android:name="android.permission.SET_PROCESS_LIMIT"
1946        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1947        android:protectionLevel="signature|system|development"
1948        android:label="@string/permlab_setProcessLimit"
1949        android:description="@string/permdesc_setProcessLimit" />
1950
1951    <!-- @SystemApi Allows an application to control whether activities are immediately
1952         finished when put in the background.
1953         <p>Not for use by third-party applications. -->
1954    <permission android:name="android.permission.SET_ALWAYS_FINISH"
1955        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1956        android:protectionLevel="signature|system|development"
1957        android:label="@string/permlab_setAlwaysFinish"
1958        android:description="@string/permdesc_setAlwaysFinish" />
1959
1960    <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
1961    <p>Not for use by third-party applications. -->
1962    <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
1963        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1964        android:protectionLevel="signature|system|development"
1965        android:label="@string/permlab_signalPersistentProcesses"
1966        android:description="@string/permdesc_signalPersistentProcesses" />
1967
1968    <!-- ==================================== -->
1969    <!-- Private (signature-only) permissions -->
1970    <!-- ==================================== -->
1971    <eat-comment />
1972
1973    <!-- @SystemApi Allows applications to RW to diagnostic resources.
1974    <p>Not for use by third-party applications. -->
1975    <permission android:name="android.permission.DIAGNOSTIC"
1976        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1977        android:protectionLevel="signature"
1978        android:description="@string/permdesc_diagnostic"
1979        android:label="@string/permlab_diagnostic" />
1980
1981    <!-- @SystemApi Allows an application to open, close, or disable the status bar
1982         and its icons.
1983         <p>Not for use by third-party applications. -->
1984    <permission android:name="android.permission.STATUS_BAR"
1985        android:label="@string/permlab_statusBar"
1986        android:description="@string/permdesc_statusBar"
1987        android:protectionLevel="signature|system" />
1988
1989    <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
1990    @hide -->
1991    <permission android:name="android.permission.STATUS_BAR_SERVICE"
1992        android:label="@string/permlab_statusBarService"
1993        android:description="@string/permdesc_statusBarService"
1994        android:protectionLevel="signature" />
1995
1996    <!-- Allows an application to force a BACK operation on whatever is the
1997         top activity.
1998         <p>Not for use by third-party applications. -->
1999    <permission android:name="android.permission.FORCE_BACK"
2000        android:label="@string/permlab_forceBack"
2001        android:description="@string/permdesc_forceBack"
2002        android:protectionLevel="signature" />
2003
2004    <!-- @SystemApi Allows an application to update device statistics.
2005    <p>Not for use by third-party applications. -->
2006    <permission android:name="android.permission.UPDATE_DEVICE_STATS"
2007        android:label="@string/permlab_updateBatteryStats"
2008        android:description="@string/permdesc_updateBatteryStats"
2009        android:protectionLevel="signature|system" />
2010
2011    <!-- @SystemApi @hide Allows an application to collect battery statistics -->
2012    <permission android:name="android.permission.GET_APP_OPS_STATS"
2013        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2014        android:label="@string/permlab_getAppOpsStats"
2015        android:description="@string/permdesc_getAppOpsStats"
2016        android:protectionLevel="signature|system|development" />
2017
2018    <!-- @SystemApi Allows an application to update application operation statistics. Not for
2019         use by third party apps. @hide -->
2020    <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
2021        android:label="@string/permlab_updateAppOpsStats"
2022        android:description="@string/permdesc_updateAppOpsStats"
2023        android:protectionLevel="signature|system" />
2024
2025    <!-- Allows an application to open windows that are for use by parts
2026         of the system user interface.
2027         <p>Not for use by third-party applications. -->
2028    <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
2029        android:label="@string/permlab_internalSystemWindow"
2030        android:description="@string/permdesc_internalSystemWindow"
2031        android:protectionLevel="signature" />
2032
2033    <!-- Allows an application to manage (create, destroy,
2034         Z-order) application tokens in the window manager.
2035         <p>Not for use by third-party applications. -->
2036    <permission android:name="android.permission.MANAGE_APP_TOKENS"
2037        android:label="@string/permlab_manageAppTokens"
2038        android:description="@string/permdesc_manageAppTokens"
2039        android:protectionLevel="signature" />
2040
2041    <!-- @hide Allows the application to temporarily freeze the screen for a
2042         full-screen transition. -->
2043    <permission android:name="android.permission.FREEZE_SCREEN"
2044        android:label="@string/permlab_freezeScreen"
2045        android:description="@string/permdesc_freezeScreen"
2046        android:protectionLevel="signature" />
2047
2048    <!-- Allows an application to inject user events (keys, touch, trackball)
2049         into the event stream and deliver them to ANY window.  Without this
2050         permission, you can only deliver events to windows in your own process.
2051         <p>Not for use by third-party applications. -->
2052    <permission android:name="android.permission.INJECT_EVENTS"
2053        android:label="@string/permlab_injectEvents"
2054        android:description="@string/permdesc_injectEvents"
2055        android:protectionLevel="signature" />
2056
2057    <!-- @hide Allows an application to register an input filter which filters the stream
2058         of user events (keys, touch, trackball) before they are dispatched to any window. -->
2059    <permission android:name="android.permission.FILTER_EVENTS"
2060        android:label="@string/permlab_filter_events"
2061        android:description="@string/permdesc_filter_events"
2062        android:protectionLevel="signature" />
2063
2064    <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
2065    <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
2066        android:label="@string/permlab_retrieveWindowToken"
2067        android:description="@string/permdesc_retrieveWindowToken"
2068        android:protectionLevel="signature" />
2069
2070    <!-- @hide Allows an application to collect frame statistics -->
2071    <permission android:name="android.permission.FRAME_STATS"
2072         android:label="@string/permlab_frameStats"
2073         android:description="@string/permdesc_frameStats"
2074         android:protectionLevel="signature" />
2075
2076    <!-- @hide Allows an application to temporary enable accessibility on the device. -->
2077    <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
2078        android:label="@string/permlab_temporary_enable_accessibility"
2079        android:description="@string/permdesc_temporary_enable_accessibility"
2080        android:protectionLevel="signature" />
2081
2082    <!-- Allows an application to watch and control how activities are
2083         started globally in the system.  Only for is in debugging
2084         (usually the monkey command).
2085         <p>Not for use by third-party applications. -->
2086    <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
2087        android:label="@string/permlab_runSetActivityWatcher"
2088        android:description="@string/permdesc_runSetActivityWatcher"
2089        android:protectionLevel="signature" />
2090
2091    <!-- @SystemApi Allows an application to call the activity manager shutdown() API
2092         to put the higher-level system there into a shutdown state.
2093         @hide -->
2094    <permission android:name="android.permission.SHUTDOWN"
2095        android:label="@string/permlab_shutdown"
2096        android:description="@string/permdesc_shutdown"
2097        android:protectionLevel="signature|system" />
2098
2099    <!-- @SystemApi Allows an application to tell the activity manager to temporarily
2100         stop application switches, putting it into a special mode that
2101         prevents applications from immediately switching away from some
2102         critical UI such as the home screen.
2103         @hide -->
2104    <permission android:name="android.permission.STOP_APP_SWITCHES"
2105        android:label="@string/permlab_stopAppSwitches"
2106        android:description="@string/permdesc_stopAppSwitches"
2107        android:protectionLevel="signature|system" />
2108
2109    <!-- Allows an application to retrieve private information about
2110         the current top activity, such as any assist context it can provide.
2111         <p>Not for use by third-party applications. -->
2112    <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
2113        android:label="@string/permlab_getTopActivityInfo"
2114        android:description="@string/permdesc_getTopActivityInfo"
2115        android:protectionLevel="signature" />
2116
2117    <!-- Allows an application to retrieve the current state of keys and
2118         switches.
2119         <p>Not for use by third-party applications.
2120         @deprecated The API that used this permission has been removed. -->
2121    <permission android:name="android.permission.READ_INPUT_STATE"
2122        android:label="@string/permlab_readInputState"
2123        android:description="@string/permdesc_readInputState"
2124        android:protectionLevel="signature" />
2125
2126    <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
2127         to ensure that only the system can bind to it. -->
2128    <permission android:name="android.permission.BIND_INPUT_METHOD"
2129        android:label="@string/permlab_bindInputMethod"
2130        android:description="@string/permdesc_bindInputMethod"
2131        android:protectionLevel="signature" />
2132
2133    <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
2134         to ensure that only the system can bind to it. -->
2135    <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
2136        android:label="@string/permlab_bindAccessibilityService"
2137        android:description="@string/permdesc_bindAccessibilityService"
2138        android:protectionLevel="signature" />
2139
2140    <!-- Must be required by a {@link android.printservice.PrintService},
2141         to ensure that only the system can bind to it. -->
2142    <permission android:name="android.permission.BIND_PRINT_SERVICE"
2143        android:label="@string/permlab_bindPrintService"
2144        android:description="@string/permdesc_bindPrintService"
2145        android:protectionLevel="signature" />
2146
2147    <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
2148         or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
2149         the system can bind to it. -->
2150    <permission android:name="android.permission.BIND_NFC_SERVICE"
2151        android:label="@string/permlab_bindNfcService"
2152        android:description="@string/permdesc_bindNfcService"
2153        android:protectionLevel="signature" />
2154
2155    <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
2156         @hide -->
2157    <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
2158        android:label="@string/permlab_bindPrintSpoolerService"
2159        android:description="@string/permdesc_bindPrintSpoolerService"
2160        android:protectionLevel="signature" />
2161
2162    <!-- Must be required by a TextService (e.g. SpellCheckerService)
2163         to ensure that only the system can bind to it. -->
2164    <permission android:name="android.permission.BIND_TEXT_SERVICE"
2165        android:label="@string/permlab_bindTextService"
2166        android:description="@string/permdesc_bindTextService"
2167        android:protectionLevel="signature" />
2168
2169    <!-- Must be required by a {@link android.net.VpnService},
2170         to ensure that only the system can bind to it. -->
2171    <permission android:name="android.permission.BIND_VPN_SERVICE"
2172        android:label="@string/permlab_bindVpnService"
2173        android:description="@string/permdesc_bindVpnService"
2174        android:protectionLevel="signature" />
2175
2176    <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
2177         to ensure that only the system can bind to it. -->
2178    <permission android:name="android.permission.BIND_WALLPAPER"
2179        android:label="@string/permlab_bindWallpaper"
2180        android:description="@string/permdesc_bindWallpaper"
2181        android:protectionLevel="signature|system" />
2182
2183    <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
2184         to ensure that only the system can bind to it. -->
2185    <permission android:name="android.permission.BIND_VOICE_INTERACTION"
2186        android:label="@string/permlab_bindVoiceInteraction"
2187        android:description="@string/permdesc_bindVoiceInteraction"
2188        android:protectionLevel="signature" />
2189
2190    <!-- Must be required by hotword enrollment application,
2191         to ensure that only the system can interact with it.
2192         @hide <p>Not for use by third-party applications.</p> -->
2193    <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
2194        android:label="@string/permlab_manageVoiceKeyphrases"
2195        android:description="@string/permdesc_manageVoiceKeyphrases"
2196        android:protectionLevel="signature|system" />
2197
2198    <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
2199         to ensure that only the system can bind to it.
2200         @hide -->
2201    <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
2202        android:label="@string/permlab_bindRemoteDisplay"
2203        android:description="@string/permdesc_bindRemoteDisplay"
2204        android:protectionLevel="signature" />
2205
2206    <!-- Must be required by a {@link android.media.tv.TvInputService}
2207         to ensure that only the system can bind to it. -->
2208    <permission android:name="android.permission.BIND_TV_INPUT"
2209        android:label="@string/permlab_bindTvInput"
2210        android:description="@string/permdesc_bindTvInput"
2211        android:protectionLevel="signature|system" />
2212
2213    <!-- @SystemApi Allows an application to modify parental controls
2214         <p>Not for use by third-party applications.
2215         @hide -->
2216    <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS"
2217        android:label="@string/permlab_modifyParentalControls"
2218        android:description="@string/permdesc_modifyParentalControls"
2219        android:protectionLevel="signature|system" />
2220
2221    <!-- Must be required by device administration receiver, to ensure that only the
2222         system can interact with it. -->
2223    <permission android:name="android.permission.BIND_DEVICE_ADMIN"
2224        android:label="@string/permlab_bindDeviceAdmin"
2225        android:description="@string/permdesc_bindDeviceAdmin"
2226        android:protectionLevel="signature" />
2227
2228    <!-- @SystemApi Required to add or remove another application as a device admin.
2229         <p>Not for use by third-party applications.
2230         @hide -->
2231    <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
2232        android:label="@string/permlab_manageDeviceAdmins"
2233        android:description="@string/permdesc_manageDeviceAdmins"
2234        android:protectionLevel="signature|system" />
2235
2236    <!-- Allows low-level access to setting the orientation (actually
2237         rotation) of the screen.
2238         <p>Not for use by third-party applications. -->
2239    <permission android:name="android.permission.SET_ORIENTATION"
2240        android:label="@string/permlab_setOrientation"
2241        android:description="@string/permdesc_setOrientation"
2242        android:protectionLevel="signature" />
2243
2244    <!-- Allows low-level access to setting the pointer speed.
2245         <p>Not for use by third-party applications. -->
2246    <permission android:name="android.permission.SET_POINTER_SPEED"
2247        android:label="@string/permlab_setPointerSpeed"
2248        android:description="@string/permdesc_setPointerSpeed"
2249        android:protectionLevel="signature" />
2250
2251    <!-- Allows low-level access to setting input device calibration.
2252         <p>Not for use by normal applications.
2253         @hide -->
2254    <permission android:name="android.permission.SET_INPUT_CALIBRATION"
2255        android:label="@string/permlab_setInputCalibration"
2256        android:description="@string/permdesc_setInputCalibration"
2257        android:protectionLevel="signature" />
2258
2259    <!-- Allows low-level access to setting the keyboard layout.
2260         <p>Not for use by third-party applications.
2261         @hide -->
2262    <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
2263        android:label="@string/permlab_setKeyboardLayout"
2264        android:description="@string/permdesc_setKeyboardLayout"
2265        android:protectionLevel="signature" />
2266
2267    <!-- @SystemApi Allows an application to install packages.
2268    <p>Not for use by third-party applications. -->
2269    <permission android:name="android.permission.INSTALL_PACKAGES"
2270        android:label="@string/permlab_installPackages"
2271        android:description="@string/permdesc_installPackages"
2272        android:protectionLevel="signature|system" />
2273
2274    <!-- Allows an application to clear user data.
2275    <p>Not for use by third-party applications. -->
2276    <permission android:name="android.permission.CLEAR_APP_USER_DATA"
2277        android:label="@string/permlab_clearAppUserData"
2278        android:description="@string/permdesc_clearAppUserData"
2279        android:protectionLevel="signature" />
2280
2281    <!-- @SystemApi Allows an application to delete cache files.
2282    <p>Not for use by third-party applications. -->
2283    <permission android:name="android.permission.DELETE_CACHE_FILES"
2284        android:label="@string/permlab_deleteCacheFiles"
2285        android:description="@string/permdesc_deleteCacheFiles"
2286        android:protectionLevel="signature|system" />
2287
2288    <!-- @SystemApi Allows an application to delete packages.
2289    <p>Not for use by third-party applications. -->
2290    <permission android:name="android.permission.DELETE_PACKAGES"
2291        android:label="@string/permlab_deletePackages"
2292        android:description="@string/permdesc_deletePackages"
2293        android:protectionLevel="signature|system" />
2294
2295    <!-- @SystemApi Allows an application to move location of installed package.
2296         @hide -->
2297    <permission android:name="android.permission.MOVE_PACKAGE"
2298        android:label="@string/permlab_movePackage"
2299        android:description="@string/permdesc_movePackage"
2300        android:protectionLevel="signature|system" />
2301
2302    <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
2303         enabled or not.
2304         <p>Not for use by third-party applications. -->
2305    <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
2306        android:label="@string/permlab_changeComponentState"
2307        android:description="@string/permdesc_changeComponentState"
2308        android:protectionLevel="signature|system" />
2309
2310    <!-- @hide Allows an application to grant or revoke specific permissions. -->
2311    <permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS"
2312        android:label="@string/permlab_grantRevokePermissions"
2313        android:description="@string/permdesc_grantRevokePermissions"
2314        android:protectionLevel="signature" />
2315
2316    <!-- Allows an application to use SurfaceFlinger's low level features.
2317    <p>Not for use by third-party applications. -->
2318    <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
2319        android:label="@string/permlab_accessSurfaceFlinger"
2320        android:description="@string/permdesc_accessSurfaceFlinger"
2321        android:protectionLevel="signature" />
2322
2323    <!-- @SystemApi Allows an application to take screen shots and more generally
2324         get access to the frame buffer data.
2325         <p>Not for use by third-party applications. -->
2326    <permission android:name="android.permission.READ_FRAME_BUFFER"
2327        android:label="@string/permlab_readFrameBuffer"
2328        android:description="@string/permdesc_readFrameBuffer"
2329        android:protectionLevel="signature|system" />
2330
2331    <!-- Allows an application to use InputFlinger's low level features.
2332         @hide -->
2333    <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
2334        android:label="@string/permlab_accessInputFlinger"
2335        android:description="@string/permdesc_accessInputFlinger"
2336        android:protectionLevel="signature" />
2337
2338    <!-- Allows an application to configure and connect to Wifi displays
2339         @hide -->
2340    <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
2341        android:label="@string/permlab_configureWifiDisplay"
2342        android:description="@string/permdesc_configureWifiDisplay"
2343        android:protectionLevel="signature" />
2344
2345    <!-- Allows an application to control low-level features of Wifi displays
2346         such as opening an RTSP socket.  This permission should only be used
2347         by the display manager.
2348         @hide -->
2349    <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
2350        android:label="@string/permlab_controlWifiDisplay"
2351        android:description="@string/permdesc_controlWifiDisplay"
2352        android:protectionLevel="signature" />
2353
2354    <!-- @SystemApi Allows an application to capture audio output.
2355         <p>Not for use by third-party applications.</p> -->
2356    <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
2357        android:label="@string/permlab_captureAudioOutput"
2358        android:description="@string/permdesc_captureAudioOutput"
2359        android:protectionLevel="signature|system" />
2360
2361    <!-- @SystemApi Allows an application to capture audio for hotword detection.
2362         <p>Not for use by third-party applications.</p>
2363         @hide -->
2364    <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
2365        android:label="@string/permlab_captureAudioHotword"
2366        android:description="@string/permdesc_captureAudioHotword"
2367        android:protectionLevel="signature|system" />
2368
2369    <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
2370         <p>Not for use by third-party applications.</p>
2371         @hide -->
2372    <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
2373        android:label="@string/permlab_modifyAudioRouting"
2374        android:description="@string/permdesc_modifyAudioRouting"
2375        android:protectionLevel="signature|system" />
2376
2377    <!-- @SystemApi Allows an application to capture video output.
2378         <p>Not for use by third-party applications.</p> -->
2379    <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
2380        android:label="@string/permlab_captureVideoOutput"
2381        android:description="@string/permdesc_captureVideoOutput"
2382        android:protectionLevel="signature|system" />
2383
2384    <!-- @SystemApi Allows an application to capture secure video output.
2385         <p>Not for use by third-party applications.</p> -->
2386    <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
2387        android:label="@string/permlab_captureSecureVideoOutput"
2388        android:description="@string/permdesc_captureSecureVideoOutput"
2389        android:protectionLevel="signature|system" />
2390
2391    <!-- @SystemApi Allows an application to know what content is playing and control its playback.
2392         <p>Not for use by third-party applications due to privacy of media consumption</p>  -->
2393    <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
2394        android:label="@string/permlab_mediaContentControl"
2395        android:description="@string/permdesc_mediaContentControl"
2396        android:protectionLevel="signature|system" />
2397
2398    <!-- Required to be able to disable the device (very dangerous!).
2399    <p>Not for use by third-party applications.. -->
2400    <permission android:name="android.permission.BRICK"
2401        android:label="@string/permlab_brick"
2402        android:description="@string/permdesc_brick"
2403        android:protectionLevel="signature" />
2404
2405    <!-- @SystemApi Required to be able to reboot the device.
2406    <p>Not for use by third-party applications. -->
2407    <permission android:name="android.permission.REBOOT"
2408        android:label="@string/permlab_reboot"
2409        android:description="@string/permdesc_reboot"
2410        android:protectionLevel="signature|system" />
2411
2412   <!-- Allows low-level access to power management.
2413   <p>Not for use by third-party applications. -->
2414    <permission android:name="android.permission.DEVICE_POWER"
2415        android:label="@string/permlab_devicePower"
2416        android:description="@string/permdesc_devicePower"
2417        android:protectionLevel="signature" />
2418
2419   <!-- Allows access to the PowerManager.userActivity function.
2420   <p>Not for use by third-party applications. @hide @SystemApi -->
2421    <permission android:name="android.permission.USER_ACTIVITY"
2422        android:label="@string/permlab_userActivity"
2423        android:description="@string/permdesc_userActivity"
2424        android:protectionLevel="signature|system" />
2425
2426   <!-- @hide Allows low-level access to tun tap driver -->
2427    <permission android:name="android.permission.NET_TUNNELING"
2428        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2429        android:protectionLevel="signature" />
2430
2431    <!-- Run as a manufacturer test application, running as the root user.
2432         Only available when the device is running in manufacturer test mode.
2433         <p>Not for use by third-party applications. -->
2434    <permission android:name="android.permission.FACTORY_TEST"
2435        android:label="@string/permlab_factoryTest"
2436        android:description="@string/permdesc_factoryTest"
2437        android:protectionLevel="signature" />
2438
2439    <!-- Allows an application to broadcast a notification that an application
2440         package has been removed.
2441         <p>Not for use by third-party applications. -->
2442    <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
2443        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2444        android:label="@string/permlab_broadcastPackageRemoved"
2445        android:description="@string/permdesc_broadcastPackageRemoved"
2446        android:protectionLevel="signature" />
2447
2448    <!-- Allows an application to broadcast an SMS receipt notification.
2449    <p>Not for use by third-party applications. -->
2450    <permission android:name="android.permission.BROADCAST_SMS"
2451        android:permissionGroup="android.permission-group.MESSAGES"
2452        android:label="@string/permlab_broadcastSmsReceived"
2453        android:description="@string/permdesc_broadcastSmsReceived"
2454        android:protectionLevel="signature" />
2455
2456    <!-- Allows an application to broadcast a WAP PUSH receipt notification.
2457    <p>Not for use by third-party applications. -->
2458    <permission android:name="android.permission.BROADCAST_WAP_PUSH"
2459        android:permissionGroup="android.permission-group.MESSAGES"
2460        android:label="@string/permlab_broadcastWapPush"
2461        android:description="@string/permdesc_broadcastWapPush"
2462        android:protectionLevel="signature" />
2463
2464    <!-- @SystemApi Allows an application to broadcast a SCORE_NETWORKS request.
2465         <p>Not for use by third-party applications. @hide -->
2466    <permission android:name="android.permission.BROADCAST_SCORE_NETWORKS"
2467        android:label="@string/permlab_broadcastScoreNetworks"
2468        android:description="@string/permdesc_broadcastScoreNetworks"
2469        android:protectionLevel="signature|system" />
2470
2471    <!-- @SystemApi Not for use by third-party applications. -->
2472    <permission android:name="android.permission.MASTER_CLEAR"
2473        android:label="@string/permlab_masterClear"
2474        android:description="@string/permdesc_masterClear"
2475        android:protectionLevel="signature|system" />
2476
2477    <!-- @SystemApi Allows an application to call any phone number, including emergency
2478         numbers, without going through the Dialer user interface for the user
2479         to confirm the call being placed.
2480         <p>Not for use by third-party applications. -->
2481    <permission android:name="android.permission.CALL_PRIVILEGED"
2482        android:label="@string/permlab_callPrivileged"
2483        android:description="@string/permdesc_callPrivileged"
2484        android:protectionLevel="signature|system" />
2485
2486    <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
2487    <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
2488        android:label="@string/permlab_performCdmaProvisioning"
2489        android:description="@string/permdesc_performCdmaProvisioning"
2490        android:protectionLevel="signature|system" />
2491
2492    <!-- @SystemApi Allows enabling/disabling location update notifications from
2493         the radio.
2494         <p>Not for use by third-party applications. -->
2495    <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
2496        android:label="@string/permlab_locationUpdates"
2497        android:description="@string/permdesc_locationUpdates"
2498        android:protectionLevel="signature|system" />
2499
2500    <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
2501         database, to change values that get uploaded.
2502         <p>Not for use by third-party applications. -->
2503    <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
2504        android:label="@string/permlab_checkinProperties"
2505        android:description="@string/permdesc_checkinProperties"
2506        android:protectionLevel="signature|system" />
2507
2508    <!-- @SystemApi Allows an application to collect component usage
2509         statistics @hide -->
2510    <permission android:name="android.permission.PACKAGE_USAGE_STATS"
2511        android:label="@string/permlab_pkgUsageStats"
2512        android:description="@string/permdesc_pkgUsageStats"
2513        android:protectionLevel="signature|system|development|appop" />
2514    <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" />
2515
2516    <!-- @SystemApi Allows an application to collect battery statistics -->
2517    <permission android:name="android.permission.BATTERY_STATS"
2518        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2519        android:label="@string/permlab_batteryStats"
2520        android:description="@string/permdesc_batteryStats"
2521        android:protectionLevel="signature|system|development" />
2522
2523    <!-- @SystemApi Allows an application to control the backup and restore process.
2524    <p>Not for use by third-party applications.
2525         @hide pending API council -->
2526    <permission android:name="android.permission.BACKUP"
2527        android:label="@string/permlab_backup"
2528        android:description="@string/permdesc_backup"
2529        android:protectionLevel="signature|system" />
2530
2531    <!-- Allows a package to launch the secure full-backup confirmation UI.
2532         ONLY the system process may hold this permission.
2533         @hide -->
2534    <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
2535        android:label="@string/permlab_confirm_full_backup"
2536        android:description="@string/permdesc_confirm_full_backup"
2537        android:protectionLevel="signature" />
2538
2539    <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
2540         to ensure that only the system can bind to it. -->
2541    <permission android:name="android.permission.BIND_REMOTEVIEWS"
2542        android:label="@string/permlab_bindRemoteViews"
2543        android:description="@string/permdesc_bindRemoteViews"
2544        android:protectionLevel="signature|system" />
2545
2546    <!-- @SystemApi Allows an application to tell the AppWidget service which application
2547         can access AppWidget's data.  The normal user flow is that a user
2548         picks an AppWidget to go into a particular host, thereby giving that
2549         host application access to the private data from the AppWidget app.
2550         An application that has this permission should honor that contract.
2551         <p>Not for use by third-party applications. -->
2552    <permission android:name="android.permission.BIND_APPWIDGET"
2553        android:permissionGroup="android.permission-group.PERSONAL_INFO"
2554        android:label="@string/permlab_bindGadget"
2555        android:description="@string/permdesc_bindGadget"
2556        android:protectionLevel="signature|system" />
2557
2558    <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
2559         keyguard widget
2560         @hide -->
2561    <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
2562        android:permissionGroup="android.permission-group.PERSONAL_INFO"
2563        android:protectionLevel="signature|system" />
2564
2565    <!-- @SystemApi Internal permission allowing an application to query/set which
2566         applications can bind AppWidgets.
2567         @hide -->
2568    <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
2569        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2570        android:protectionLevel="signature|system" />
2571
2572    <!-- Allows applications to change the background data setting.
2573    <p>Not for use by third-party applications.
2574         @hide pending API council -->
2575    <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
2576        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2577        android:protectionLevel="signature"
2578        android:description="@string/permdesc_changeBackgroundDataSetting"
2579        android:label="@string/permlab_changeBackgroundDataSetting" />
2580
2581    <!-- @SystemApi This permission can be used on content providers to allow the global
2582         search system to access their data.  Typically it used when the
2583         provider has some permissions protecting it (which global search
2584         would not be expected to hold), and added as a read-only permission
2585         to the path in the provider where global search queries are
2586         performed.  This permission can not be held by regular applications;
2587         it is used by applications to protect themselves from everyone else
2588         besides global search. -->
2589    <permission android:name="android.permission.GLOBAL_SEARCH"
2590        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2591        android:protectionLevel="signature|system" />
2592
2593    <!-- Internal permission protecting access to the global search
2594         system: ensures that only the system can access the provider
2595         to perform queries (since this otherwise provides unrestricted
2596         access to a variety of content providers), and to write the
2597         search statistics (to keep applications from gaming the source
2598         ranking).
2599         @hide -->
2600    <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
2601        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2602        android:protectionLevel="signature" />
2603
2604    <!-- @SystemApi Internal permission to allows an application to read indexable data.
2605        @hide -->
2606    <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
2607        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2608        android:protectionLevel="signature|system" />
2609
2610    <!-- @SystemApi Allows applications to set a live wallpaper.
2611         @hide XXX Change to signature once the picker is moved to its
2612         own apk as Ghod Intended. -->
2613    <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
2614        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2615        android:protectionLevel="signature|system" />
2616
2617    <!-- @SystemApi Allows applications to read dream settings and dream state.
2618         @hide -->
2619    <permission android:name="android.permission.READ_DREAM_STATE"
2620        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2621        android:protectionLevel="signature|system" />
2622
2623    <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
2624         @hide -->
2625    <permission android:name="android.permission.WRITE_DREAM_STATE"
2626        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2627        android:protectionLevel="signature|system" />
2628
2629    <!-- @SystemApi Allow an application to read and write the cache partition.
2630         @hide -->
2631    <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
2632        android:label="@string/permlab_cache_filesystem"
2633        android:description="@string/permdesc_cache_filesystem"
2634        android:protectionLevel="signature|system" />
2635
2636    <!-- Must be required by default container service so that only
2637         the system can bind to it and use it to copy
2638         protected data to secure containers or files
2639         accessible to the system.
2640         @hide -->
2641    <permission android:name="android.permission.COPY_PROTECTED_DATA"
2642        android:label="@string/permlab_copyProtectedData"
2643        android:description="@string/permlab_copyProtectedData"
2644        android:protectionLevel="signature" />
2645
2646    <!-- @SystemApi Internal permission protecting access to the encryption methods
2647        @hide
2648    -->
2649    <permission android:name="android.permission.CRYPT_KEEPER"
2650        android:protectionLevel="signature|system" />
2651
2652    <!-- @SystemApi Allows an application to read historical network usage for
2653         specific networks and applications. @hide -->
2654    <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
2655        android:label="@string/permlab_readNetworkUsageHistory"
2656        android:description="@string/permdesc_readNetworkUsageHistory"
2657        android:protectionLevel="signature|system" />
2658
2659    <!-- Allows an application to manage network policies (such as warning and disable
2660         limits) and to define application-specific rules. @hide -->
2661    <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
2662        android:label="@string/permlab_manageNetworkPolicy"
2663        android:description="@string/permdesc_manageNetworkPolicy"
2664        android:protectionLevel="signature" />
2665
2666    <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used
2667         by system services like download manager and media server. Not for use by
2668         third party apps. @hide -->
2669    <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
2670        android:label="@string/permlab_modifyNetworkAccounting"
2671        android:description="@string/permdesc_modifyNetworkAccounting"
2672        android:protectionLevel="signature|system" />
2673
2674    <!-- C2DM permission.
2675         @hide Used internally.
2676     -->
2677    <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
2678          android:protectionLevel="signature" />
2679    <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
2680
2681    <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
2682         trust it to verify packages.
2683    -->
2684    <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
2685        android:label="@string/permlab_packageVerificationAgent"
2686        android:description="@string/permdesc_packageVerificationAgent"
2687        android:protectionLevel="signature|system" />
2688
2689    <!-- Must be required by package verifier receiver, to ensure that only the
2690         system can interact with it.
2691         @hide
2692    -->
2693    <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
2694        android:label="@string/permlab_bindPackageVerifier"
2695        android:description="@string/permdesc_bindPackageVerifier"
2696        android:protectionLevel="signature" />
2697
2698    <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
2699         @hide -->
2700    <permission android:name="android.permission.SERIAL_PORT"
2701        android:label="@string/permlab_serialPort"
2702        android:description="@string/permdesc_serialPort"
2703        android:protectionLevel="signature|system" />
2704
2705    <!-- Allows the holder to access content providers from outside an ApplicationThread.
2706         This permission is enforced by the ActivityManagerService on the corresponding APIs,
2707         in particular ActivityManagerService#getContentProviderExternal(String) and
2708         ActivityManagerService#removeContentProviderExternal(String).
2709         @hide
2710    -->
2711    <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
2712        android:label="@string/permlab_accessContentProvidersExternally"
2713        android:description="@string/permdesc_accessContentProvidersExternally"
2714        android:protectionLevel="signature" />
2715
2716    <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
2717         OTA reboot *not* occur while the lock is held.
2718         @hide -->
2719    <permission android:name="android.permission.UPDATE_LOCK"
2720        android:label="@string/permlab_updateLock"
2721        android:description="@string/permdesc_updateLock"
2722        android:protectionLevel="signatureOrSystem" />
2723
2724    <!-- @SystemApi Allows an application to read the current set of notifications, including
2725         any metadata and intents attached.
2726         @hide -->
2727    <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
2728        android:label="@string/permlab_accessNotifications"
2729        android:description="@string/permdesc_accessNotifications"
2730        android:protectionLevel="signature|system" />
2731
2732    <!-- Allows access to keyguard secure storage.  Only allowed for system processes.
2733        @hide -->
2734    <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
2735        android:protectionLevel="signature"
2736        android:label="@string/permlab_access_keyguard_secure_storage"
2737        android:description="@string/permdesc_access_keyguard_secure_storage" />
2738
2739    <!-- Allows an application to control keyguard.  Only allowed for system processes.
2740        @hide -->
2741    <permission android:name="android.permission.CONTROL_KEYGUARD"
2742        android:protectionLevel="signature"
2743        android:label="@string/permlab_control_keyguard"
2744        android:description="@string/permdesc_control_keyguard" />
2745
2746    <!-- Allows an application to listen to trust changes.  Only allowed for system processes.
2747        @hide -->
2748    <permission android:name="android.permission.TRUST_LISTENER"
2749                android:protectionLevel="signature"
2750                android:label="@string/permlab_trust_listener"
2751                android:description="@string/permdesc_trust_listener" />
2752
2753    <!-- @SystemApi Allows an application to provide a trust agent.
2754         @hide For security reasons, this is a platform-only permission. -->
2755    <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
2756                android:protectionLevel="signatureOrSystem"
2757                android:label="@string/permlab_provide_trust_agent"
2758                android:description="@string/permdesc_provide_trust_agent" />
2759
2760    <!-- Allows an application to launch the trust agent settings activity.
2761        @hide -->
2762    <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
2763        android:protectionLevel="signatureOrSystem"
2764        android:label="@string/permlab_launch_trust_agent_settings"
2765        android:description="@string/permdesc_launch_trust_agent_settings" />
2766
2767    <!-- @SystemApi Must be required by an {@link
2768        android.service.trust.TrustAgentService},
2769        to ensure that only the system can bind to it.
2770        @hide -->
2771    <permission android:name="android.permission.BIND_TRUST_AGENT"
2772                android:protectionLevel="signature"
2773                android:label="@string/permlab_bind_trust_agent_service"
2774                android:description="@string/permdesc_bind_trust_agent_service" />
2775
2776    <!-- Must be required by an {@link
2777         android.service.notification.NotificationListenerService},
2778         to ensure that only the system can bind to it. -->
2779    <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
2780        android:label="@string/permlab_bindNotificationListenerService"
2781        android:description="@string/permdesc_bindNotificationListenerService"
2782        android:protectionLevel="signature" />
2783
2784    <!-- Must be required by an {@link
2785         android.service.notification.ConditionProviderService},
2786         to ensure that only the system can bind to it.
2787         @hide -->
2788    <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
2789        android:label="@string/permlab_bindConditionProviderService"
2790        android:description="@string/permdesc_bindConditionProviderService"
2791        android:protectionLevel="signature" />
2792
2793    <!-- Must be required by an {@link android.service.dreams.DreamService},
2794         to ensure that only the system can bind to it. -->
2795    <permission android:name="android.permission.BIND_DREAM_SERVICE"
2796        android:label="@string/permlab_bindDreamService"
2797        android:description="@string/permdesc_bindDreamService"
2798        android:protectionLevel="signature" />
2799
2800    <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
2801         carrier setup application to enforce that this permission is required
2802         @hide This is not a third-party API (intended for OEMs and system apps). -->
2803    <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
2804        android:label="@string/permlab_invokeCarrierSetup"
2805        android:description="@string/permdesc_invokeCarrierSetup"
2806        android:protectionLevel="signature|system" />
2807
2808    <!-- @SystemApi Allows an application to listen for network condition observations.
2809         @hide This is not a third-party API (intended for system apps). -->
2810    <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
2811        android:label="@string/permlab_accessNetworkConditions"
2812        android:description="@string/permdesc_accessNetworkConditions"
2813        android:protectionLevel="signature|system" />
2814
2815    <!-- @SystemApi Allows an application to provision and access DRM certificates
2816         @hide This is not a third-party API (intended for system apps). -->
2817    <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
2818        android:label="@string/permlab_accessDrmCertificates"
2819        android:description="@string/permdesc_accessDrmCertificates"
2820        android:protectionLevel="signature|system" />
2821
2822    <!-- Api Allows an application to manage media projection sessions.
2823         @hide This is not a third-party API (intended for system apps). -->
2824    <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION"
2825        android:label="@string/permlab_manageMediaProjection"
2826        android:description="@string/permdesc_manageMediaProjection"
2827        android:protectionLevel="signature" />
2828
2829    <!-- @SystemApi Allows an application to read install sessions
2830         @hide This is not a third-party API (intended for system apps). -->
2831    <permission android:name="android.permission.READ_INSTALL_SESSIONS"
2832        android:label="@string/permlab_readInstallSessions"
2833        android:description="@string/permdesc_readInstallSessions" />
2834
2835    <!-- @SystemApi Allows an application to remove DRM certificates
2836         @hide This is not a third-party API (intended for system apps). -->
2837    <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES"
2838        android:label="@string/permlab_removeDrmCertificates"
2839        android:description="@string/permdesc_removeDrmCertificates"
2840        android:protectionLevel="signature|system" />
2841
2842    <!-- The system process is explicitly the only one allowed to launch the
2843         confirmation UI for full backup/restore -->
2844    <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
2845
2846    <application android:process="system"
2847                 android:persistent="true"
2848                 android:hasCode="false"
2849                 android:label="@string/android_system_label"
2850                 android:allowClearUserData="false"
2851                 android:backupAgent="com.android.server.backup.SystemBackupAgent"
2852                 android:killAfterRestore="false"
2853                 android:icon="@drawable/ic_launcher_android"
2854                 android:supportsRtl="true">
2855        <activity android:name="com.android.internal.app.ChooserActivity"
2856                android:theme="@style/Theme.DeviceDefault.Resolver"
2857                android:finishOnCloseSystemDialogs="true"
2858                android:excludeFromRecents="true"
2859                android:documentLaunchMode="never"
2860                android:relinquishTaskIdentity="true"
2861                android:process=":ui">
2862            <intent-filter>
2863                <action android:name="android.intent.action.CHOOSER" />
2864                <category android:name="android.intent.category.DEFAULT" />
2865            </intent-filter>
2866        </activity>
2867        <activity android:name="com.android.internal.app.IntentForwarderActivity"
2868                android:finishOnCloseSystemDialogs="true"
2869                android:theme="@style/Theme.NoDisplay"
2870                android:excludeFromRecents="true"
2871                android:label="@string/user_owner_label"
2872                android:exported="true"
2873                >
2874        </activity>
2875        <activity-alias android:name="com.android.internal.app.ForwardIntentToUserOwner"
2876                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2877                android:exported="true"
2878                android:label="@string/user_owner_label">
2879        </activity-alias>
2880        <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
2881                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2882                android:icon="@drawable/ic_corp_icon"
2883                android:exported="true"
2884                android:label="@string/managed_profile_label">
2885        </activity-alias>
2886        <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
2887                android:theme="@style/Theme.Material.Dialog"
2888                android:label="@string/heavy_weight_switcher_title"
2889                android:finishOnCloseSystemDialogs="true"
2890                android:excludeFromRecents="true"
2891                android:process=":ui">
2892        </activity>
2893        <activity android:name="com.android.internal.app.PlatLogoActivity"
2894                android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
2895                android:process=":ui">
2896        </activity>
2897        <activity android:name="com.android.internal.app.DisableCarModeActivity"
2898                android:theme="@style/Theme.NoDisplay"
2899                android:excludeFromRecents="true"
2900                android:process=":ui">
2901        </activity>
2902
2903        <activity android:name="android.accounts.ChooseAccountActivity"
2904                android:excludeFromRecents="true"
2905                android:exported="true"
2906                android:theme="@android:style/Theme.Material.Dialog"
2907                android:label="@string/choose_account_label"
2908                android:process=":ui">
2909        </activity>
2910
2911        <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
2912                android:excludeFromRecents="true"
2913                android:exported="true"
2914                android:theme="@android:style/Theme.Material.Dialog"
2915                android:label="@string/choose_account_label"
2916                android:process=":ui">
2917        </activity>
2918
2919        <activity android:name="android.accounts.ChooseAccountTypeActivity"
2920                android:excludeFromRecents="true"
2921                android:theme="@android:style/Theme.Material.Dialog"
2922                android:label="@string/choose_account_label"
2923                android:process=":ui">
2924        </activity>
2925
2926        <activity android:name="android.accounts.CantAddAccountActivity"
2927                android:excludeFromRecents="true"
2928                android:exported="true"
2929                android:theme="@android:style/Theme.Material.Dialog.NoActionBar"
2930                android:process=":ui">
2931        </activity>
2932
2933        <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
2934                android:excludeFromRecents="true"
2935                android:exported="true"
2936                android:theme="@android:style/Theme.Material.DialogWhenLarge"
2937                android:process=":ui">
2938        </activity>
2939
2940        <activity android:name="android.content.SyncActivityTooManyDeletes"
2941               android:theme="@android:style/Theme.Holo.Dialog"
2942               android:label="@string/sync_too_many_deletes"
2943               android:process=":ui">
2944        </activity>
2945
2946        <activity android:name="com.android.server.ShutdownActivity"
2947            android:permission="android.permission.SHUTDOWN"
2948            android:excludeFromRecents="true">
2949            <intent-filter>
2950                <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" />
2951                <category android:name="android.intent.category.DEFAULT" />
2952            </intent-filter>
2953            <intent-filter>
2954                <action android:name="android.intent.action.REBOOT" />
2955                <category android:name="android.intent.category.DEFAULT" />
2956            </intent-filter>
2957        </activity>
2958
2959        <activity android:name="com.android.internal.app.NetInitiatedActivity"
2960                android:theme="@style/Theme.Holo.Dialog.Alert"
2961                android:excludeFromRecents="true"
2962                android:process=":ui">
2963        </activity>
2964
2965        <activity android:name="com.android.internal.app.RestrictionsPinActivity"
2966                android:theme="@style/Theme.Material.Light.Dialog.Alert"
2967                android:excludeFromRecents="true"
2968                android:windowSoftInputMode="adjustPan"
2969                android:process=":ui">
2970            <intent-filter android:priority="100">
2971                <action android:name="android.intent.action.RESTRICTIONS_CHALLENGE" />
2972                <category android:name="android.intent.category.DEFAULT" />
2973            </intent-filter>
2974        </activity>
2975
2976        <receiver android:name="com.android.server.BootReceiver"
2977                android:primaryUserOnly="true">
2978            <intent-filter android:priority="1000">
2979                <action android:name="android.intent.action.BOOT_COMPLETED" />
2980            </intent-filter>
2981        </receiver>
2982
2983        <receiver android:name="com.android.server.updates.CertPinInstallReceiver" >
2984            <intent-filter>
2985                <action android:name="android.intent.action.UPDATE_PINS" />
2986                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2987            </intent-filter>
2988        </receiver>
2989
2990        <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" >
2991            <intent-filter>
2992                <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
2993                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2994            </intent-filter>
2995        </receiver>
2996
2997        <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" >
2998            <intent-filter>
2999                <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
3000                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3001            </intent-filter>
3002        </receiver>
3003
3004        <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" >
3005            <intent-filter>
3006                <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
3007                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3008            </intent-filter>
3009        </receiver>
3010
3011        <receiver android:name="com.android.server.updates.TZInfoInstallReceiver" >
3012            <intent-filter>
3013                <action android:name="android.intent.action.UPDATE_TZINFO" />
3014                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3015            </intent-filter>
3016        </receiver>
3017
3018        <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" >
3019            <intent-filter>
3020                <action android:name="android.intent.action.UPDATE_SEPOLICY" />
3021                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3022            </intent-filter>
3023        </receiver>
3024
3025        <receiver android:name="com.android.server.MasterClearReceiver"
3026            android:permission="android.permission.MASTER_CLEAR">
3027            <intent-filter
3028                    android:priority="100" >
3029                <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR -->
3030                <action android:name="android.intent.action.MASTER_CLEAR" />
3031
3032                <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
3033                <action android:name="com.google.android.c2dm.intent.RECEIVE" />
3034                <category android:name="android.intent.category.MASTER_CLEAR" />
3035            </intent-filter>
3036        </receiver>
3037
3038        <service android:name="com.android.internal.os.storage.ExternalStorageFormatter"
3039            android:permission="android.permission.MASTER_CLEAR"
3040            android:exported="true" />
3041
3042        <service android:name="android.hardware.location.GeofenceHardwareService"
3043            android:permission="android.permission.LOCATION_HARDWARE"
3044            android:exported="false" />
3045
3046        <service android:name="com.android.internal.backup.LocalTransportService"
3047                android:permission="android.permission.CONFIRM_FULL_BACKUP"
3048                android:exported="false">
3049            <intent-filter>
3050                <action android:name="android.backup.TRANSPORT_HOST" />
3051            </intent-filter>
3052        </service>
3053
3054        <service android:name="com.android.server.MountServiceIdler"
3055                 android:exported="true"
3056                 android:permission="android.permission.BIND_JOB_SERVICE" >
3057        </service>
3058
3059        <service android:name="com.android.server.backup.FullBackupJob"
3060                 android:exported="true"
3061                 android:permission="android.permission.BIND_JOB_SERVICE" >
3062        </service>
3063
3064        <service
3065            android:name="com.android.server.pm.BackgroundDexOptService"
3066            android:exported="true"
3067            android:permission="android.permission.BIND_JOB_SERVICE">
3068        </service>
3069
3070    </application>
3071
3072</manifest>
3073