AndroidManifest.xml revision 09a65601b24b77b7e5b3d2d4c7c30eded1ba1040
1<?xml version="1.0" encoding="utf-8"?>
2<!--
3/* //device/apps/common/AndroidManifest.xml
4**
5** Copyright 2006, The Android Open Source Project
6**
7** Licensed under the Apache License, Version 2.0 (the "License");
8** you may not use this file except in compliance with the License.
9** You may obtain a copy of the License at
10**
11**     http://www.apache.org/licenses/LICENSE-2.0
12**
13** Unless required by applicable law or agreed to in writing, software
14** distributed under the License is distributed on an "AS IS" BASIS,
15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16** See the License for the specific language governing permissions and
17** limitations under the License.
18*/
19-->
20<manifest xmlns:android="http://schemas.android.com/apk/res/android"
21    package="android" coreApp="true" android:sharedUserId="android.uid.system"
22    android:sharedUserLabel="@string/android_system_label">
23
24    <!-- ================================================ -->
25    <!-- Special broadcasts that only the system can send -->
26    <!-- ================================================ -->
27    <eat-comment />
28
29    <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
30    <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
31    <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
32    <protected-broadcast android:name="android.intent.action.TIME_SET" />
33    <protected-broadcast android:name="android.intent.action.TIME_TICK" />
34    <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
35    <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
36    <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
37    <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
38    <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
39    <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
40    <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
41    <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
42    <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
43    <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
44    <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
45    <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
46    <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
47    <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
48    <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
49    <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
50    <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
51    <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
52    <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
53    <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
54    <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
55    <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
56    <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
57    <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
58    <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
59    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
60    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
61    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
62    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
63    <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
64    <protected-broadcast android:name="android.intent.action.REBOOT" />
65    <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
66    <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
67    <protected-broadcast android:name="android.intent.action.USER_ADDED" />
68    <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
69    <protected-broadcast android:name="android.intent.action.USER_STARTING" />
70    <protected-broadcast android:name="android.intent.action.USER_STARTED" />
71    <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
72    <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
73    <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
74    <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
75    <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
76
77    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
78
79    <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
80    <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
81    <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
82    <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
83    <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" />
84
85    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
86    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
87    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
88    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
89    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
90    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
91
92    <protected-broadcast android:name="android.backup.intent.RUN" />
93    <protected-broadcast android:name="android.backup.intent.CLEAR" />
94    <protected-broadcast android:name="android.backup.intent.INIT" />
95
96    <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
97    <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
98    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
99    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
100    <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
101    <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
102    <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
103    <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
104    <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
105    <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
106    <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
107    <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
108    <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
109    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
110    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
111    <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
112    <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
113    <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
114    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
115    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
116    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
117    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
118    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
119    <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
120    <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
121    <protected-broadcast
122        android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
123    <protected-broadcast
124        android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
125    <protected-broadcast
126        android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
127    <protected-broadcast
128        android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
129    <protected-broadcast
130        android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
131    <protected-broadcast
132        android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
133    <protected-broadcast
134        android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
135    <protected-broadcast
136        android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
137    <protected-broadcast
138        android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
139    <protected-broadcast
140        android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
141    <protected-broadcast
142        android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
143    <protected-broadcast
144        android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
145    <protected-broadcast
146        android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
147    <protected-broadcast
148        android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
149   <protected-broadcast
150        android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
151    <protected-broadcast
152        android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
153    <protected-broadcast
154        android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
155    <protected-broadcast
156        android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
157    <protected-broadcast
158        android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
159    <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" />
160    <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
161    <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
162    <protected-broadcast android:name="android.btopp.intent.action.LIST" />
163    <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
164    <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
165    <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
166    <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
167    <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
168    <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
169    <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
170    <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
171    <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
172    <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
173    <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
174
175    <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
176
177    <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
178    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
179    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
180    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
181    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
182
183    <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
184    <protected-broadcast android:name="android.intent.action.ANALOG_AUDIO_DOCK_PLUG" />
185    <protected-broadcast android:name="android.intent.action.DIGITAL_AUDIO_DOCK_PLUG" />
186    <protected-broadcast android:name="android.intent.action.HDMI_AUDIO_PLUG" />
187    <protected-broadcast android:name="android.intent.action.USB_AUDIO_ACCESSORY_PLUG" />
188    <protected-broadcast android:name="android.intent.action.USB_AUDIO_DEVICE_PLUG" />
189
190    <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
191    <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
192    <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
193    <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
194    <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
195    <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
196    <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
197    <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
198
199    <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
200    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
201    <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
202    <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
203    <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
204    <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
205    <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
206    <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
207    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
208    <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
209
210    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
211    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
212    <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
213    <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
214    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
215
216    <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
217
218    <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" />
219    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
220    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
221    <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
222
223    <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
224    <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
225    <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
226
227    <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
228
229    <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
230    <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
231    <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
232    <protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" />
233
234    <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
235    <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
236    <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
237    <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
238    <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" />
239    <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
240    <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
241    <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
242    <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
243    <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
244    <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
245    <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
246    <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
247    <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
248    <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
249    <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
250    <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
251    <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
252    <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
253    <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
254    <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
255    <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
256    <protected-broadcast
257            android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
258    <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
259    <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
260    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
261    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
262    <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
263    <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
264    <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
265    <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" />
266
267    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
268    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
269
270    <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
271
272    <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
273
274    <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
275    <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
276    <protected-broadcast android:name="android.location.MODE_CHANGED" />
277    <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
278    <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
279
280    <protected-broadcast
281        android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
282
283    <!-- Defined in RestrictionsManager -->
284    <protected-broadcast
285        android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
286    <!-- Defined in RestrictionsManager -->
287
288    <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
289    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
290    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
291    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
292    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
293
294
295    <!-- ====================================== -->
296    <!-- Permissions for things that cost money -->
297    <!-- ====================================== -->
298    <eat-comment />
299
300    <!-- Used for permissions that can be used to make the user spend money
301         without their direct involvement. -->
302    <permission-group android:name="android.permission-group.COST_MONEY"
303        android:label="@string/permgrouplab_costMoney"
304        android:description="@string/permgroupdesc_costMoney" />
305
306    <!-- ================================== -->
307    <!-- Permissions for accessing messages -->
308    <!-- ================================== -->
309    <eat-comment />
310
311    <!-- Used for permissions that allow an application to send messages
312         on behalf of the user or intercept messages being received by the
313         user.  This is primarily intended for SMS/MMS messaging, such as
314         receiving or reading an MMS. -->
315    <permission-group android:name="android.permission-group.MESSAGES"
316        android:label="@string/permgrouplab_messages"
317        android:icon="@drawable/perm_group_messages"
318        android:description="@string/permgroupdesc_messages"
319        android:permissionGroupFlags="personalInfo"
320        android:priority="360"/>
321
322    <!-- Allows an application to send SMS messages. -->
323    <permission android:name="android.permission.SEND_SMS"
324        android:permissionGroup="android.permission-group.MESSAGES"
325        android:protectionLevel="dangerous"
326        android:permissionFlags="costsMoney"
327        android:label="@string/permlab_sendSms"
328        android:description="@string/permdesc_sendSms" />
329
330    <!-- @SystemApi Allows an application (Phone) to send a request to other applications
331         to handle the respond-via-message action during incoming calls.
332         <p>Not for use by third-party applications. -->
333    <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
334        android:permissionGroup="android.permission-group.MESSAGES"
335        android:protectionLevel="signature|system"
336        android:label="@string/permlab_sendRespondViaMessageRequest"
337        android:description="@string/permdesc_sendRespondViaMessageRequest" />
338
339    <!-- Allows an application to monitor incoming SMS messages, to record
340         or perform processing on them. -->
341    <permission android:name="android.permission.RECEIVE_SMS"
342        android:permissionGroup="android.permission-group.MESSAGES"
343        android:protectionLevel="dangerous"
344        android:label="@string/permlab_receiveSms"
345        android:description="@string/permdesc_receiveSms" />
346
347    <!-- Allows an application to monitor incoming MMS messages, to record
348         or perform processing on them. -->
349    <permission android:name="android.permission.RECEIVE_MMS"
350        android:permissionGroup="android.permission-group.MESSAGES"
351        android:protectionLevel="dangerous"
352        android:label="@string/permlab_receiveMms"
353        android:description="@string/permdesc_receiveMms" />
354
355    <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
356         to record or display them to the user.
357         <p>Not for use by third-party applications.
358         @hide Pending API council approval -->
359    <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
360        android:permissionGroup="android.permission-group.MESSAGES"
361        android:protectionLevel="signature|system"
362        android:label="@string/permlab_receiveEmergencyBroadcast"
363        android:description="@string/permdesc_receiveEmergencyBroadcast" />
364
365    <!-- Allows an application to read previously received cell broadcast
366         messages and to register a content observer to get notifications when
367         a cell broadcast has been received and added to the database. For
368         emergency alerts, the database is updated immediately after the
369         alert dialog and notification sound/vibration/speech are presented.
370         The "read" column is then updated after the user dismisses the alert.
371         This enables supplementary emergency assistance apps to start loading
372         additional emergency information (if Internet access is available)
373         when the alert is first received, and to delay presenting the info
374         to the user until after the initial alert dialog is dismissed.
375         @hide Pending API council approval -->
376    <permission android:name="android.permission.READ_CELL_BROADCASTS"
377        android:permissionGroup="android.permission-group.MESSAGES"
378        android:protectionLevel="dangerous"
379        android:label="@string/permlab_readCellBroadcasts"
380        android:description="@string/permdesc_readCellBroadcasts" />
381
382    <!-- Allows an application to read SMS messages. -->
383    <permission android:name="android.permission.READ_SMS"
384        android:permissionGroup="android.permission-group.MESSAGES"
385        android:protectionLevel="dangerous"
386        android:label="@string/permlab_readSms"
387        android:description="@string/permdesc_readSms" />
388
389    <!-- Allows an application to write SMS messages. -->
390    <permission android:name="android.permission.WRITE_SMS"
391        android:permissionGroup="android.permission-group.MESSAGES"
392        android:protectionLevel="dangerous"
393        android:label="@string/permlab_writeSms"
394        android:description="@string/permdesc_writeSms" />
395
396    <!-- Allows an application to monitor incoming WAP push messages. -->
397    <permission android:name="android.permission.RECEIVE_WAP_PUSH"
398        android:permissionGroup="android.permission-group.MESSAGES"
399        android:protectionLevel="dangerous"
400        android:label="@string/permlab_receiveWapPush"
401        android:description="@string/permdesc_receiveWapPush" />
402
403    <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
404         or perform processing on them. -->
405    <!-- @hide -->
406    <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
407        android:permissionGroup="android.permission-group.MESSAGES"
408        android:protectionLevel="dangerous"
409        android:label="@string/permlab_receiveBluetoothMap"
410        android:description="@string/permdesc_receiveBluetoothMap" />
411
412    <!-- =============================================================== -->
413    <!-- Permissions for accessing social info (contacts and social) -->
414    <!-- =============================================================== -->
415    <eat-comment />
416
417    <!-- Used for permissions that provide access to the user's social connections,
418         such as contacts, call logs, social stream, etc.  This includes
419         both reading and writing of this data (which should generally be
420         expressed as two distinct permissions). -->
421
422    <permission-group android:name="android.permission-group.SOCIAL_INFO"
423        android:label="@string/permgrouplab_socialInfo"
424        android:icon="@drawable/perm_group_social_info"
425        android:description="@string/permgroupdesc_socialInfo"
426        android:permissionGroupFlags="personalInfo"
427        android:priority="320" />
428
429    <!-- Allows an application to read the user's contacts data. -->
430    <permission android:name="android.permission.READ_CONTACTS"
431        android:permissionGroup="android.permission-group.SOCIAL_INFO"
432        android:protectionLevel="dangerous"
433        android:label="@string/permlab_readContacts"
434        android:description="@string/permdesc_readContacts" />
435
436    <!-- Allows an application to write (but not read) the user's
437         contacts data. -->
438    <permission android:name="android.permission.WRITE_CONTACTS"
439        android:permissionGroup="android.permission-group.SOCIAL_INFO"
440        android:protectionLevel="dangerous"
441        android:label="@string/permlab_writeContacts"
442        android:description="@string/permdesc_writeContacts" />
443
444    <!-- @SystemApi @hide Allows an application to execute contacts directory search.
445         This should only be used by ContactsProvider.
446         <p>Not for use by third-party applications. -->
447    <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
448        android:permissionGroup="android.permission-group.PERSONAL_INFO"
449        android:protectionLevel="signature|system" />
450
451    <!-- Allows an application to read the user's call log.
452         <p class="note"><strong>Note:</strong> If your app uses the
453         {@link #READ_CONTACTS} permission and <em>both</em> your <a
454         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
455         minSdkVersion}</a> and <a
456         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
457         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
458         grants your app this permission. If you don't need this permission, be sure your <a
459         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
460         targetSdkVersion}</a> is 16 or higher.</p> -->
461    <permission android:name="android.permission.READ_CALL_LOG"
462        android:permissionGroup="android.permission-group.SOCIAL_INFO"
463        android:protectionLevel="dangerous"
464        android:label="@string/permlab_readCallLog"
465        android:description="@string/permdesc_readCallLog" />
466
467    <!-- Allows an application to write (but not read) the user's
468         contacts data.
469         <p class="note"><strong>Note:</strong> If your app uses the
470         {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
471         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
472         minSdkVersion}</a> and <a
473         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
474         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
475         grants your app this permission. If you don't need this permission, be sure your <a
476         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
477         targetSdkVersion}</a> is 16 or higher.</p>  -->
478    <permission android:name="android.permission.WRITE_CALL_LOG"
479        android:permissionGroup="android.permission-group.SOCIAL_INFO"
480        android:protectionLevel="dangerous"
481        android:label="@string/permlab_writeCallLog"
482        android:description="@string/permdesc_writeCallLog" />
483
484  <!-- Allows an application to read from the user's social stream.
485       @deprecated This functionality will be unsupported in the future; cursors returned
486       will be empty. Please do not use. -->
487    <permission android:name="android.permission.READ_SOCIAL_STREAM"
488        android:permissionGroup="android.permission-group.SOCIAL_INFO"
489        android:protectionLevel="dangerous"
490        android:label="@string/permlab_readSocialStream"
491        android:description="@string/permdesc_readSocialStream" />
492
493    <!-- Allows an application to write (but not read) the user's
494         social stream data.
495         @deprecated This functionality will be unsupported in the future; cursors returned
496         will be empty. Please do not use. -->
497    <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
498        android:permissionGroup="android.permission-group.SOCIAL_INFO"
499        android:protectionLevel="dangerous"
500        android:label="@string/permlab_writeSocialStream"
501        android:description="@string/permdesc_writeSocialStream" />
502
503    <!-- =============================================================== -->
504    <!-- Permissions for accessing information about the device owner    -->
505    <!-- =============================================================== -->
506    <eat-comment />
507
508    <!-- Used for permissions that provide access to information about the device
509         user such as profile information.  This includes both reading and
510         writing of this data (which should generally be expressed as two
511         distinct permissions). -->
512    <permission-group android:name="android.permission-group.PERSONAL_INFO"
513        android:label="@string/permgrouplab_personalInfo"
514        android:icon="@drawable/perm_group_personal_info"
515        android:description="@string/permgroupdesc_personalInfo"
516        android:permissionGroupFlags="personalInfo"
517        android:priority="310" />
518
519    <!-- Allows an application to read the user's personal profile data. -->
520    <permission android:name="android.permission.READ_PROFILE"
521        android:permissionGroup="android.permission-group.PERSONAL_INFO"
522        android:protectionLevel="dangerous"
523        android:label="@string/permlab_readProfile"
524        android:description="@string/permdesc_readProfile" />
525
526    <!-- Allows an application to write (but not read) the user's
527         personal profile data. -->
528    <permission android:name="android.permission.WRITE_PROFILE"
529        android:permissionGroup="android.permission-group.PERSONAL_INFO"
530        android:protectionLevel="dangerous"
531        android:label="@string/permlab_writeProfile"
532        android:description="@string/permdesc_writeProfile" />
533
534    <!-- Allows an application to access data from sensors that the user uses to
535         measure what is happening inside his/her body, such as heart rate. -->
536    <permission android:name="android.permission.BODY_SENSORS"
537        android:permissionGroup="android.permission-group.PERSONAL_INFO"
538        android:label="@string/permlab_bodySensors"
539        android:description="@string/permdesc_bodySensors" />
540
541    <!-- =============================================================== -->
542    <!-- Permissions for accessing the device calendar                   -->
543    <!-- =============================================================== -->
544    <eat-comment />
545
546    <!-- Used for permissions that provide access to the device
547         calendar to create / view events.-->
548    <permission-group android:name="android.permission-group.CALENDAR"
549        android:label="@string/permgrouplab_calendar"
550        android:icon="@drawable/perm_group_calendar"
551        android:description="@string/permgroupdesc_calendar"
552        android:permissionGroupFlags="personalInfo"
553        android:priority="290" />
554
555    <!-- Allows an application to read the user's calendar data. -->
556    <permission android:name="android.permission.READ_CALENDAR"
557        android:permissionGroup="android.permission-group.PERSONAL_INFO"
558        android:protectionLevel="dangerous"
559        android:label="@string/permlab_readCalendar"
560        android:description="@string/permdesc_readCalendar" />
561
562    <!-- Allows an application to write (but not read) the user's
563         calendar data. -->
564    <permission android:name="android.permission.WRITE_CALENDAR"
565        android:permissionGroup="android.permission-group.PERSONAL_INFO"
566        android:protectionLevel="dangerous"
567        android:label="@string/permlab_writeCalendar"
568        android:description="@string/permdesc_writeCalendar" />
569
570    <!-- =============================================================== -->
571    <!-- Permissions for accessing the user dictionary-->
572    <!-- =============================================================== -->
573    <eat-comment />
574
575    <!-- Used for permissions that provide access to the user
576         calendar to create / view events.-->
577    <permission-group android:name="android.permission-group.USER_DICTIONARY"
578        android:label="@string/permgrouplab_dictionary"
579        android:icon="@drawable/perm_group_user_dictionary"
580        android:description="@string/permgroupdesc_dictionary"
581        android:permissionGroupFlags="personalInfo"
582        android:priority="170" />
583
584    <!-- Allows an application to read the user dictionary. This should
585         really only be required by an IME, or a dictionary editor like
586         the Settings app. -->
587    <permission android:name="android.permission.READ_USER_DICTIONARY"
588        android:permissionGroup="android.permission-group.USER_DICTIONARY"
589        android:protectionLevel="dangerous"
590        android:label="@string/permlab_readDictionary"
591        android:description="@string/permdesc_readDictionary" />
592
593    <!-- Used for permissions that provide access to the user
594         calendar to create / view events.-->
595    <permission-group android:name="android.permission-group.WRITE_USER_DICTIONARY"
596        android:label="@string/permgrouplab_writeDictionary"
597        android:icon="@drawable/perm_group_user_dictionary_write"
598        android:description="@string/permgroupdesc_writeDictionary"
599        android:priority="160" />
600
601    <!-- Allows an application to write to the user dictionary. -->
602    <permission android:name="android.permission.WRITE_USER_DICTIONARY"
603        android:permissionGroup="android.permission-group.WRITE_USER_DICTIONARY"
604        android:protectionLevel="normal"
605        android:label="@string/permlab_writeDictionary"
606        android:description="@string/permdesc_writeDictionary" />
607
608    <!-- =============================================================== -->
609    <!-- Permissions for accessing the user bookmarks                    -->
610    <!-- =============================================================== -->
611    <eat-comment />
612
613    <!-- Used for permissions that provide access to the user
614         bookmarks and browser history.-->
615    <permission-group android:name="android.permission-group.BOOKMARKS"
616        android:label="@string/permgrouplab_bookmarks"
617        android:icon="@drawable/perm_group_bookmarks"
618        android:description="@string/permgroupdesc_bookmarks"
619        android:permissionGroupFlags="personalInfo"
620        android:priority="300" />
621
622    <!-- Allows an application to read (but not write) the user's
623        browsing history and bookmarks. -->
624    <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
625        android:permissionGroup="android.permission-group.BOOKMARKS"
626        android:label="@string/permlab_readHistoryBookmarks"
627        android:description="@string/permdesc_readHistoryBookmarks"
628        android:protectionLevel="dangerous" />
629
630    <!-- Allows an application to write (but not read) the user's
631        browsing history and bookmarks. -->
632    <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
633        android:permissionGroup="android.permission-group.BOOKMARKS"
634        android:label="@string/permlab_writeHistoryBookmarks"
635        android:description="@string/permdesc_writeHistoryBookmarks"
636        android:protectionLevel="dangerous" />
637
638    <!-- =============================================================== -->
639    <!-- Permissions for setting the device alarm                        -->
640    <!-- =============================================================== -->
641    <eat-comment />
642
643    <!-- Used for permissions that provide access to device alarms. -->
644    <permission-group android:name="android.permission-group.DEVICE_ALARMS"
645        android:label="@string/permgrouplab_deviceAlarms"
646        android:icon="@drawable/perm_group_device_alarms"
647        android:description="@string/permgroupdesc_deviceAlarms"
648        android:permissionGroupFlags="personalInfo"
649        android:priority="210" />
650
651    <!-- Allows an application to broadcast an Intent to set an alarm for the
652         user. -->
653    <permission android:name="com.android.alarm.permission.SET_ALARM"
654        android:permissionGroup="android.permission-group.DEVICE_ALARMS"
655        android:label="@string/permlab_setAlarm"
656        android:description="@string/permdesc_setAlarm"
657        android:protectionLevel="normal" />
658
659    <!-- =============================================================== -->
660    <!-- Permissions for accessing the user voicemail                    -->
661    <!-- =============================================================== -->
662    <eat-comment />
663
664    <!-- Used for permissions that provide access to the user voicemail box. -->
665    <permission-group android:name="android.permission-group.VOICEMAIL"
666        android:label="@string/permgrouplab_voicemail"
667        android:icon="@drawable/perm_group_voicemail"
668        android:description="@string/permgroupdesc_voicemail"
669        android:permissionGroupFlags="personalInfo"
670        android:priority="280" />
671
672    <!-- Allows an application to add voicemails into the system. -->
673    <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
674        android:permissionGroup="android.permission-group.VOICEMAIL"
675        android:protectionLevel="dangerous"
676        android:label="@string/permlab_addVoicemail"
677        android:description="@string/permdesc_addVoicemail" />
678
679    <!-- Allows an application to modify and remove existing voicemails in the system -->
680    <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
681        android:permissionGroup="android.permission-group.VOICEMAIL"
682        android:protectionLevel="dangerous"
683        android:label="@string/permlab_writeVoicemail"
684        android:description="@string/permdesc_writeVoicemail" />
685
686    <!-- Allows an application to read voicemails in the system. -->
687    <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
688        android:permissionGroup="android.permission-group.VOICEMAIL"
689        android:protectionLevel="dangerous"
690        android:label="@string/permlab_readVoicemail"
691        android:description="@string/permdesc_readVoicemail" />
692
693    <!-- =============================================== -->
694    <!-- Permissions for enabling accessibility features -->
695    <!-- =============================================== -->
696    <eat-comment />
697
698    <!-- Used for permissions that allow requesting certain accessibility features. -->
699    <permission-group android:name="android.permission-group.ACCESSIBILITY_FEATURES"
700        android:label="@string/permgrouplab_accessibilityFeatures"
701        android:icon="@drawable/perm_group_accessibility_features"
702        android:description="@string/permgroupdesc_accessibilityFeatures"
703        android:priority="380" />
704
705    <!-- ======================================= -->
706    <!-- Permissions for accessing location info -->
707    <!-- ======================================= -->
708    <eat-comment />
709
710    <!-- Used for permissions that allow access to the user's current
711         location. -->
712    <permission-group android:name="android.permission-group.LOCATION"
713        android:label="@string/permgrouplab_location"
714        android:icon="@drawable/perm_group_location"
715        android:description="@string/permgroupdesc_location"
716        android:permissionGroupFlags="personalInfo"
717        android:priority="330" />
718
719    <!-- Allows an app to access precise location from location sources such
720         as GPS, cell towers, and Wi-Fi. -->
721    <permission android:name="android.permission.ACCESS_FINE_LOCATION"
722        android:permissionGroup="android.permission-group.LOCATION"
723        android:protectionLevel="dangerous"
724        android:label="@string/permlab_accessFineLocation"
725        android:description="@string/permdesc_accessFineLocation" />
726
727    <!-- Allows an app to access approximate location derived from network location
728         sources such as cell towers and Wi-Fi. -->
729    <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
730        android:permissionGroup="android.permission-group.LOCATION"
731        android:protectionLevel="dangerous"
732        android:label="@string/permlab_accessCoarseLocation"
733        android:description="@string/permdesc_accessCoarseLocation" />
734
735    <!-- Allows an application to create mock location providers for testing -->
736    <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
737        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
738        android:protectionLevel="dangerous"
739        android:label="@string/permlab_accessMockLocation"
740        android:description="@string/permdesc_accessMockLocation" />
741
742    <!-- Allows an application to access extra location provider commands -->
743    <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
744        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
745        android:protectionLevel="normal"
746        android:label="@string/permlab_accessLocationExtraCommands"
747        android:description="@string/permdesc_accessLocationExtraCommands" />
748
749    <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
750    <p>Not for use by third-party applications. -->
751    <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
752        android:protectionLevel="signature|system"
753        android:label="@string/permlab_installLocationProvider"
754        android:description="@string/permdesc_installLocationProvider" />
755
756    <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
757         This should only be used by HDMI-CEC service.
758    -->
759    <permission android:name="android.permission.HDMI_CEC"
760        android:protectionLevel="signatureOrSystem" />
761
762    <!-- @SystemApi Allows an application to use location features in hardware,
763         such as the geofencing api.
764         <p>Not for use by third-party applications. -->
765    <permission android:name="android.permission.LOCATION_HARDWARE"
766        android:permissionGroup="android.permission-group.LOCATION"
767        android:protectionLevel="signature|system" />
768    <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
769
770    <!-- ======================================= -->
771    <!-- Permissions for accessing networks -->
772    <!-- ======================================= -->
773    <eat-comment />
774
775    <!-- Used for permissions that provide access to networking services.  The
776         main permission here is internet access, but this is also an
777         appropriate group for accessing or modifying any network configuration
778         or other related network operations. -->
779    <permission-group android:name="android.permission-group.NETWORK"
780        android:label="@string/permgrouplab_network"
781        android:icon="@drawable/perm_group_network"
782        android:description="@string/permgroupdesc_network"
783        android:priority="270" />
784
785    <!-- Allows applications to open network sockets. -->
786    <permission android:name="android.permission.INTERNET"
787        android:permissionGroup="android.permission-group.NETWORK"
788        android:protectionLevel="dangerous"
789        android:description="@string/permdesc_createNetworkSockets"
790        android:label="@string/permlab_createNetworkSockets" />
791
792    <!-- Allows applications to access information about networks -->
793    <permission android:name="android.permission.ACCESS_NETWORK_STATE"
794        android:permissionGroup="android.permission-group.NETWORK"
795        android:protectionLevel="normal"
796        android:description="@string/permdesc_accessNetworkState"
797        android:label="@string/permlab_accessNetworkState" />
798
799    <!-- Allows applications to access information about Wi-Fi networks -->
800    <permission android:name="android.permission.ACCESS_WIFI_STATE"
801        android:permissionGroup="android.permission-group.NETWORK"
802        android:protectionLevel="normal"
803        android:description="@string/permdesc_accessWifiState"
804        android:label="@string/permlab_accessWifiState" />
805
806    <!-- Allows applications to change Wi-Fi connectivity state -->
807    <permission android:name="android.permission.CHANGE_WIFI_STATE"
808        android:permissionGroup="android.permission-group.NETWORK"
809        android:protectionLevel="dangerous"
810        android:description="@string/permdesc_changeWifiState"
811        android:label="@string/permlab_changeWifiState" />
812
813    <!-- @SystemApi @hide Allows applications to read Wi-Fi credential.
814         <p>Not for use by third-party applications. -->
815    <permission android:name="android.permission.READ_WIFI_CREDENTIAL"
816        android:permissionGroup="android.permission-group.NETWORK"
817        android:protectionLevel="signature|system" />
818
819    <!-- @SystemApi @hide Allow system apps to receive broadcast
820         when a wifi network credential is changed.
821         <p>Not for use by third-party applications. -->
822    <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE"
823        android:permissionGroup="android.permission-group.NETWORK"
824        android:protectionLevel="signature|system" />
825
826    <!-- @hide -->
827    <permission android:name="android.permission.ACCESS_WIMAX_STATE"
828        android:permissionGroup="android.permission-group.NETWORK"
829        android:protectionLevel="normal"
830        android:description="@string/permdesc_accessWimaxState"
831        android:label="@string/permlab_accessWimaxState" />
832
833    <!-- @hide -->
834    <permission android:name="android.permission.CHANGE_WIMAX_STATE"
835        android:permissionGroup="android.permission-group.NETWORK"
836        android:protectionLevel="dangerous"
837        android:description="@string/permdesc_changeWimaxState"
838        android:label="@string/permlab_changeWimaxState" />
839
840    <!-- Allows applications to act as network scorers. @hide @SystemApi-->
841    <!-- TODO: Change protection level to normal when unhiding this API. -->
842    <permission android:name="android.permission.SCORE_NETWORKS"
843        android:permissionGroup="android.permission-group.NETWORK"
844        android:protectionLevel="signature|system"
845        android:description="@string/permdesc_scoreNetworks"
846        android:label="@string/permlab_scoreNetworks" />
847
848    <!-- ======================================= -->
849    <!-- Permissions for short range, peripheral networks -->
850    <!-- ======================================= -->
851    <eat-comment />
852
853    <!-- Used for permissions that provide access to other devices through Bluetooth.-->
854    <permission-group android:name="android.permission-group.BLUETOOTH_NETWORK"
855        android:label="@string/permgrouplab_bluetoothNetwork"
856        android:icon="@drawable/perm_group_bluetooth"
857        android:description="@string/permgroupdesc_bluetoothNetwork"
858        android:priority="260" />
859
860    <!-- Allows applications to connect to paired bluetooth devices -->
861    <permission android:name="android.permission.BLUETOOTH"
862        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
863        android:protectionLevel="dangerous"
864        android:description="@string/permdesc_bluetooth"
865        android:label="@string/permlab_bluetooth" />
866
867    <!-- Allows applications to discover and pair bluetooth devices -->
868    <permission android:name="android.permission.BLUETOOTH_ADMIN"
869        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
870        android:protectionLevel="dangerous"
871        android:description="@string/permdesc_bluetoothAdmin"
872        android:label="@string/permlab_bluetoothAdmin" />
873
874    <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction.
875         This is not available to third party applications. -->
876    <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
877        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
878        android:protectionLevel="system|signature"
879        android:description="@string/permdesc_bluetoothPriv"
880        android:label="@string/permlab_bluetoothPriv" />
881
882    <!-- Allows bluetooth stack to access files
883         @hide This should only be used by Bluetooth apk.
884    -->
885    <permission android:name="android.permission.BLUETOOTH_STACK"
886        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
887        android:protectionLevel="signature" />
888
889    <!-- Allows applications to perform I/O operations over NFC -->
890    <permission android:name="android.permission.NFC"
891        android:permissionGroup="android.permission-group.NETWORK"
892        android:protectionLevel="dangerous"
893        android:description="@string/permdesc_nfc"
894        android:label="@string/permlab_nfc" />
895
896    <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
897        @hide -->
898    <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
899        android:permissionGroup="android.permission-group.NETWORK"
900        android:protectionLevel="signature|system" />
901
902    <!-- @SystemApi @hide -->
903    <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
904        android:permissionGroup="android.permission-group.NETWORK"
905        android:protectionLevel="signature|system" />
906
907    <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
908	@hide -->
909    <permission android:name="android.permission.LOOP_RADIO"
910	android:permissionGroup="android.permission-group.NETWORK"
911	android:protectionLevel="signature|system" />
912
913    <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
914         @hide
915    -->
916    <permission android:name="android.permission.NFC_HANDOVER_STATUS"
917                android:label="@string/permlab_handoverStatus"
918                android:description="@string/permdesc_handoverStatus"
919                android:protectionLevel="signature|system" />
920
921    <!-- ================================== -->
922    <!-- Permissions for accessing accounts -->
923    <!-- ================================== -->
924    <eat-comment />
925
926    <!-- Permissions for direct access to the accounts managed
927         by the Account Manager. -->
928    <permission-group android:name="android.permission-group.ACCOUNTS"
929        android:label="@string/permgrouplab_accounts"
930        android:icon="@drawable/perm_group_accounts"
931        android:description="@string/permgroupdesc_accounts"
932        android:permissionGroupFlags="personalInfo"
933        android:priority="200" />
934
935    <!-- Allows access to the list of accounts in the Accounts Service -->
936    <permission android:name="android.permission.GET_ACCOUNTS"
937        android:permissionGroup="android.permission-group.ACCOUNTS"
938        android:protectionLevel="normal"
939        android:description="@string/permdesc_getAccounts"
940        android:label="@string/permlab_getAccounts" />
941
942    <!-- Allows an application to act as an AccountAuthenticator for
943         the AccountManager -->
944    <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
945        android:permissionGroup="android.permission-group.ACCOUNTS"
946        android:protectionLevel="dangerous"
947        android:label="@string/permlab_authenticateAccounts"
948        android:description="@string/permdesc_authenticateAccounts" />
949
950    <!-- Allows an application to request authtokens from the AccountManager -->
951    <permission android:name="android.permission.USE_CREDENTIALS"
952        android:permissionGroup="android.permission-group.ACCOUNTS"
953        android:protectionLevel="dangerous"
954        android:label="@string/permlab_useCredentials"
955        android:description="@string/permdesc_useCredentials" />
956
957    <!-- Allows an application to manage the list of accounts in the AccountManager -->
958    <permission android:name="android.permission.MANAGE_ACCOUNTS"
959        android:permissionGroup="android.permission-group.ACCOUNTS"
960        android:protectionLevel="dangerous"
961        android:label="@string/permlab_manageAccounts"
962        android:description="@string/permdesc_manageAccounts" />
963
964    <!-- @SystemApi Allows applications to call into AccountAuthenticators.
965    <p>Not for use by third-party applications. -->
966    <permission android:name="android.permission.ACCOUNT_MANAGER"
967        android:permissionGroup="android.permission-group.ACCOUNTS"
968        android:protectionLevel="signature"
969        android:description="@string/permdesc_accountManagerService"
970        android:label="@string/permlab_accountManagerService" />
971
972    <!-- ================================== -->
973    <!-- Permissions for accessing hardware that may effect battery life-->
974    <!-- ================================== -->
975    <eat-comment />
976
977    <!-- Used for permissions that provide direct access to the hardware on
978         the device that has an effect on battery life.  This includes vibrator,
979         flashlight,  etc. -->
980
981    <permission-group android:name="android.permission-group.AFFECTS_BATTERY"
982        android:label="@string/permgrouplab_affectsBattery"
983        android:icon="@drawable/perm_group_affects_battery"
984        android:description="@string/permgroupdesc_affectsBattery"
985        android:priority="180" />
986
987    <!-- Allows applications to enter Wi-Fi Multicast mode -->
988    <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
989        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
990        android:protectionLevel="dangerous"
991        android:description="@string/permdesc_changeWifiMulticastState"
992        android:label="@string/permlab_changeWifiMulticastState" />
993
994    <!-- Allows access to the vibrator -->
995    <permission android:name="android.permission.VIBRATE"
996        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
997        android:protectionLevel="normal"
998        android:label="@string/permlab_vibrate"
999        android:description="@string/permdesc_vibrate" />
1000
1001    <!-- Allows access to the flashlight -->
1002    <permission android:name="android.permission.FLASHLIGHT"
1003        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
1004        android:protectionLevel="normal"
1005        android:label="@string/permlab_flashlight"
1006        android:description="@string/permdesc_flashlight" />
1007
1008    <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
1009         from dimming -->
1010    <permission android:name="android.permission.WAKE_LOCK"
1011        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
1012        android:protectionLevel="normal"
1013        android:label="@string/permlab_wakeLock"
1014        android:description="@string/permdesc_wakeLock" />
1015
1016    <!-- Allows using the device's IR transmitter, if available -->
1017    <permission android:name="android.permission.TRANSMIT_IR"
1018        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
1019        android:protectionLevel="normal"
1020        android:label="@string/permlab_transmitIr"
1021        android:description="@string/permdesc_transmitIr" />
1022
1023    <!-- ==================================================== -->
1024    <!-- Permissions related to changing audio settings   -->
1025    <!-- ==================================================== -->
1026    <eat-comment />
1027
1028    <!-- Used for permissions that provide direct access to speaker settings
1029         the device. -->
1030    <permission-group android:name="android.permission-group.AUDIO_SETTINGS"
1031        android:label="@string/permgrouplab_audioSettings"
1032        android:icon="@drawable/perm_group_audio_settings"
1033        android:description="@string/permgroupdesc_audioSettings"
1034        android:priority="130" />
1035
1036    <!-- Allows an application to modify global audio settings -->
1037    <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
1038        android:permissionGroup="android.permission-group.AUDIO_SETTINGS"
1039        android:protectionLevel="normal"
1040        android:label="@string/permlab_modifyAudioSettings"
1041        android:description="@string/permdesc_modifyAudioSettings" />
1042
1043    <!-- ================================== -->
1044    <!-- Permissions for accessing hardware -->
1045    <!-- ================================== -->
1046    <eat-comment />
1047
1048    <!-- Used for permissions that provide direct access to the hardware on
1049         the device.  This includes audio, the camera, vibrator, etc. -->
1050    <permission-group android:name="android.permission-group.HARDWARE_CONTROLS"
1051        android:label="@string/permgrouplab_hardwareControls"
1052        android:description="@string/permgroupdesc_hardwareControls"
1053        android:priority="260"/>
1054
1055    <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
1056         @hide -->
1057    <permission android:name="android.permission.MANAGE_USB"
1058        android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1059        android:protectionLevel="signature|system"
1060        android:label="@string/permlab_manageUsb"
1061        android:description="@string/permdesc_manageUsb" />
1062
1063    <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
1064         For use only by the device side MTP implementation.
1065         @hide -->
1066    <permission android:name="android.permission.ACCESS_MTP"
1067        android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1068        android:protectionLevel="signature|system"
1069        android:label="@string/permlab_accessMtp"
1070        android:description="@string/permdesc_accessMtp" />
1071
1072    <!-- Allows access to hardware peripherals.  Intended only for hardware testing.
1073    <p>Not for use by third-party applications. -->
1074    <permission android:name="android.permission.HARDWARE_TEST"
1075        android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1076        android:protectionLevel="signature"
1077        android:label="@string/permlab_hardware_test"
1078        android:description="@string/permdesc_hardware_test" />
1079
1080    <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
1081         @hide -->
1082    <permission android:name="android.permission.NET_ADMIN"
1083        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1084        android:protectionLevel="signature" />
1085
1086    <!-- Allows registration for remote audio playback. @hide -->
1087    <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
1088        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1089        android:protectionLevel="signature" />
1090
1091    <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
1092         built-in tuners and HDMI-in's.
1093         @hide This should only be used by OEM's TvInputService's.
1094    -->
1095    <permission android:name="android.permission.TV_INPUT_HARDWARE"
1096        android:protectionLevel="signatureOrSystem" />
1097
1098    <!-- @hide Allows enabling/disabling OEM unlock
1099   <p>Not for use by third-party applications. -->
1100    <permission android:name="android.permission.OEM_UNLOCK_STATE"
1101                android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1102                android:protectionLevel="signature" />
1103
1104
1105    <!-- =========================================== -->
1106    <!-- Permissions associated with audio capture -->
1107    <!-- =========================================== -->
1108    <eat-comment />
1109
1110    <!-- Used for permissions that are associated with accessing
1111         microphone audio from the device. Note that phone calls also capture audio
1112         but are in a separate (more visible) permission group. -->
1113    <permission-group android:name="android.permission-group.MICROPHONE"
1114        android:label="@string/permgrouplab_microphone"
1115        android:icon="@drawable/perm_group_microphone"
1116        android:description="@string/permgroupdesc_microphone"
1117        android:permissionGroupFlags="personalInfo"
1118        android:priority="340" />
1119
1120    <!-- Allows an application to record audio -->
1121    <permission android:name="android.permission.RECORD_AUDIO"
1122        android:permissionGroup="android.permission-group.MICROPHONE"
1123        android:protectionLevel="dangerous"
1124        android:label="@string/permlab_recordAudio"
1125        android:description="@string/permdesc_recordAudio" />
1126
1127
1128    <!-- =========================================== -->
1129    <!-- Permissions associated with camera and image capture -->
1130    <!-- =========================================== -->
1131    <eat-comment />
1132
1133    <!-- Used for permissions that are associated with accessing
1134         camera or capturing images/video from the device. -->
1135    <permission-group android:name="android.permission-group.CAMERA"
1136        android:label="@string/permgrouplab_camera"
1137        android:icon="@drawable/perm_group_camera"
1138        android:description="@string/permgroupdesc_camera"
1139        android:permissionGroupFlags="personalInfo"
1140        android:priority="350" />
1141
1142    <!-- Required to be able to access the camera device.
1143         <p>This will automatically enforce the <a
1144         href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code
1145         &lt;uses-feature&gt;}</a> manifest element for <em>all</em> camera features.
1146         If you do not require all camera features or can properly operate if a camera
1147         is not available, then you must modify your manifest as appropriate in order to
1148         install on devices that don't support all camera features.</p> -->
1149    <permission android:name="android.permission.CAMERA"
1150        android:permissionGroup="android.permission-group.CAMERA"
1151        android:protectionLevel="dangerous"
1152        android:label="@string/permlab_camera"
1153        android:description="@string/permdesc_camera" />
1154
1155    <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
1156         a camera is in use by an application.
1157         @hide -->
1158    <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
1159        android:permissionGroup="android.permission-group.CAMERA"
1160        android:protectionLevel="signature|system"
1161        android:label="@string/permlab_cameraDisableTransmitLed"
1162        android:description="@string/permdesc_cameraDisableTransmitLed" />
1163
1164    <!-- =========================================== -->
1165    <!-- Permissions associated with telephony state -->
1166    <!-- =========================================== -->
1167    <eat-comment />
1168
1169    <!-- Used for permissions that are associated with accessing and modifying
1170         telephony state: placing calls, intercepting outgoing calls, reading
1171         and modifying the phone state. -->
1172    <permission-group android:name="android.permission-group.PHONE_CALLS"
1173        android:label="@string/permgrouplab_phoneCalls"
1174        android:icon="@drawable/perm_group_phone_calls"
1175        android:description="@string/permgroupdesc_phoneCalls"
1176        android:permissionGroupFlags="personalInfo"
1177        android:priority="370" />
1178
1179    <!-- Allows an application to see the number being dialed during an outgoing
1180         call with the option to redirect the call to a different number or
1181         abort the call altogether. -->
1182    <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
1183        android:permissionGroup="android.permission-group.PHONE_CALLS"
1184        android:protectionLevel="dangerous"
1185        android:label="@string/permlab_processOutgoingCalls"
1186        android:description="@string/permdesc_processOutgoingCalls" />
1187
1188    <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
1189         Does not include placing calls.
1190         <p>Not for use by third-party applications. -->
1191    <permission android:name="android.permission.MODIFY_PHONE_STATE"
1192        android:permissionGroup="android.permission-group.PHONE_CALLS"
1193        android:protectionLevel="signature|system"
1194        android:label="@string/permlab_modifyPhoneState"
1195        android:description="@string/permdesc_modifyPhoneState" />
1196
1197    <!-- Allows read only access to phone state.
1198         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1199         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1200         minSdkVersion}</a> and <a
1201         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1202         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1203         grants your app this permission. If you don't need this permission, be sure your <a
1204         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1205         targetSdkVersion}</a> is 4 or higher. -->
1206    <permission android:name="android.permission.READ_PHONE_STATE"
1207        android:permissionGroup="android.permission-group.PHONE_CALLS"
1208        android:protectionLevel="dangerous"
1209        android:label="@string/permlab_readPhoneState"
1210        android:description="@string/permdesc_readPhoneState" />
1211
1212    <!-- Allows read only access to precise phone state.
1213         @hide Pending API council approval -->
1214    <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
1215        android:permissionGroup="android.permission-group.PHONE_CALLS"
1216        android:protectionLevel="dangerous"
1217        android:label="@string/permlab_readPrecisePhoneState"
1218        android:description="@string/permdesc_readPrecisePhoneState" />
1219
1220    <!-- @SystemApi Allows read access to privileged phone state.
1221         @hide Used internally. -->
1222    <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
1223        android:permissionGroup="android.permission-group.PHONE_CALLS"
1224        android:protectionLevel="signature|system" />
1225
1226     <!-- Allows an application to initiate a phone call without going through
1227         the Dialer user interface for the user to confirm the call
1228         being placed. -->
1229    <permission android:name="android.permission.CALL_PHONE"
1230        android:permissionGroup="android.permission-group.PHONE_CALLS"
1231        android:protectionLevel="dangerous"
1232        android:permissionFlags="costsMoney"
1233        android:label="@string/permlab_callPhone"
1234        android:description="@string/permdesc_callPhone" />
1235
1236    <!-- Allows an application to use SIP service -->
1237    <permission android:name="android.permission.USE_SIP"
1238        android:permissionGroup="android.permission-group.PHONE_CALLS"
1239        android:protectionLevel="dangerous"
1240        android:description="@string/permdesc_use_sip"
1241        android:label="@string/permlab_use_sip" />
1242
1243    <!-- @SystemApi Allows an application to request CallHandlerService implementations.
1244         @hide -->
1245    <permission android:name="android.permission.BIND_CALL_SERVICE"
1246        android:permissionGroup="android.permission-group.PHONE_CALLS"
1247        android:protectionLevel="system|signature"
1248        android:description="@string/permdesc_bind_call_service"
1249        android:label="@string/permlab_bind_call_service" />
1250
1251    <!-- ================================== -->
1252    <!-- Permissions for sdcard interaction -->
1253    <!-- ================================== -->
1254    <eat-comment />
1255
1256    <!-- Group of permissions that are related to SD card access. -->
1257    <permission-group android:name="android.permission-group.STORAGE"
1258        android:label="@string/permgrouplab_storage"
1259        android:icon="@drawable/perm_group_storage"
1260        android:description="@string/permgroupdesc_storage"
1261        android:permissionGroupFlags="personalInfo"
1262        android:priority="240" />
1263
1264    <!-- Allows an application to read from external storage.
1265         <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
1266         granted this permission.</p>
1267         <p>This permission is enforced starting in API level 19.  Before API level 19, this
1268         permission is not enforced and all apps still have access to read from external storage.
1269         You can test your app with the permission enforced by enabling <em>Protect USB
1270         storage</em> under Developer options in the Settings app on a device running Android 4.1 or
1271         higher.</p>
1272         <p>Also starting in API level 19, this permission is <em>not</em> required to
1273         read/write files in your application-specific directories returned by
1274         {@link android.content.Context#getExternalFilesDir} and
1275         {@link android.content.Context#getExternalCacheDir}.
1276         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1277         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1278         minSdkVersion}</a> and <a
1279         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1280         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1281         grants your app this permission. If you don't need this permission, be sure your <a
1282         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1283         targetSdkVersion}</a> is 4 or higher.-->
1284    <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
1285        android:permissionGroup="android.permission-group.STORAGE"
1286        android:label="@string/permlab_sdcardRead"
1287        android:description="@string/permdesc_sdcardRead"
1288        android:protectionLevel="normal" />
1289
1290    <!-- Allows an application to write to external storage.
1291         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1292         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1293         minSdkVersion}</a> and <a
1294         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1295         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1296         grants your app this permission. If you don't need this permission, be sure your <a
1297         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1298         targetSdkVersion}</a> is 4 or higher.
1299         <p>Starting in API level 19, this permission is <em>not</em> required to
1300         read/write files in your application-specific directories returned by
1301         {@link android.content.Context#getExternalFilesDir} and
1302         {@link android.content.Context#getExternalCacheDir}. -->
1303    <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
1304        android:permissionGroup="android.permission-group.STORAGE"
1305        android:label="@string/permlab_sdcardWrite"
1306        android:description="@string/permdesc_sdcardWrite"
1307        android:protectionLevel="dangerous" />
1308
1309    <!-- @SystemApi Allows an application to write to internal media storage
1310         @hide  -->
1311    <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
1312        android:permissionGroup="android.permission-group.STORAGE"
1313        android:label="@string/permlab_mediaStorageWrite"
1314        android:description="@string/permdesc_mediaStorageWrite"
1315        android:protectionLevel="signature|system" />
1316
1317    <!-- Allows an application to manage access to documents, usually as part
1318         of a document picker. -->
1319    <permission android:name="android.permission.MANAGE_DOCUMENTS"
1320        android:permissionGroup="android.permission-group.STORAGE"
1321        android:label="@string/permlab_manageDocs"
1322        android:description="@string/permdesc_manageDocs"
1323        android:protectionLevel="signature" />
1324
1325    <!-- ================================== -->
1326    <!-- Permissions for screenlock         -->
1327    <!-- ================================== -->
1328    <eat-comment />
1329
1330    <!-- Group of permissions that are related to the screenlock. -->
1331    <permission-group android:name="android.permission-group.SCREENLOCK"
1332        android:label="@string/permgrouplab_screenlock"
1333        android:icon="@drawable/perm_group_screenlock"
1334        android:permissionGroupFlags="personalInfo"
1335        android:description="@string/permgroupdesc_screenlock"
1336        android:priority="230" />
1337
1338    <!-- Allows applications to disable the keyguard -->
1339    <permission android:name="android.permission.DISABLE_KEYGUARD"
1340        android:permissionGroup="android.permission-group.SCREENLOCK"
1341        android:protectionLevel="dangerous"
1342        android:description="@string/permdesc_disableKeyguard"
1343        android:label="@string/permlab_disableKeyguard" />
1344
1345    <!-- ================================== -->
1346    <!-- Permissions to access other installed applications  -->
1347    <!-- ================================== -->
1348    <eat-comment />
1349
1350    <!-- Group of permissions that are related to the other applications
1351         installed on the system.  Examples include such as listing
1352         running apps, or killing background processes. -->
1353    <permission-group android:name="android.permission-group.APP_INFO"
1354        android:label="@string/permgrouplab_appInfo"
1355        android:icon="@drawable/perm_group_app_info"
1356        android:description="@string/permgroupdesc_appInfo"
1357        android:priority="220" />
1358
1359    <!-- @SystemApi Allows an application to get information about the currently
1360         or recently running tasks. -->
1361    <permission android:name="android.permission.GET_TASKS"
1362        android:permissionGroup="android.permission-group.APP_INFO"
1363        android:protectionLevel="signature|system"
1364        android:label="@string/permlab_getTasks"
1365        android:description="@string/permdesc_getTasks" />
1366
1367    <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
1368         across the users on the device, using singleton services and
1369         user-targeted broadcasts.  This permission is not available to
1370         third party applications. -->
1371    <permission android:name="android.permission.INTERACT_ACROSS_USERS"
1372        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1373        android:protectionLevel="signature|system|development"
1374        android:label="@string/permlab_interactAcrossUsers"
1375        android:description="@string/permdesc_interactAcrossUsers" />
1376
1377    <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
1378         that removes restrictions on where broadcasts can be sent and allows other
1379         types of interactions. -->
1380    <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
1381        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1382        android:protectionLevel="signature"
1383        android:label="@string/permlab_interactAcrossUsersFull"
1384        android:description="@string/permdesc_interactAcrossUsersFull" />
1385
1386    <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
1387         users on the device. This permission is not available to
1388         third party applications. -->
1389    <permission android:name="android.permission.MANAGE_USERS"
1390        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1391        android:protectionLevel="signature|system"
1392        android:label="@string/permlab_manageUsers"
1393        android:description="@string/permdesc_manageUsers" />
1394
1395    <!-- Allows an application to get full detailed information about
1396         recently running tasks, with full fidelity to the real state.
1397         @hide -->
1398    <permission android:name="android.permission.GET_DETAILED_TASKS"
1399        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1400        android:protectionLevel="signature"
1401        android:label="@string/permlab_getDetailedTasks"
1402        android:description="@string/permdesc_getDetailedTasks" />
1403
1404    <!-- Allows an application to change the Z-order of tasks -->
1405    <permission android:name="android.permission.REORDER_TASKS"
1406        android:permissionGroup="android.permission-group.APP_INFO"
1407        android:protectionLevel="normal"
1408        android:label="@string/permlab_reorderTasks"
1409        android:description="@string/permdesc_reorderTasks" />
1410
1411    <!-- @hide Allows an application to change to remove/kill tasks -->
1412    <permission android:name="android.permission.REMOVE_TASKS"
1413        android:permissionGroup="android.permission-group.APP_INFO"
1414        android:protectionLevel="signature"
1415        android:label="@string/permlab_removeTasks"
1416        android:description="@string/permdesc_removeTasks" />
1417
1418    <!-- @SystemApi @hide Allows an application to create/manage/remove stacks -->
1419    <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
1420        android:permissionGroup="android.permission-group.APP_INFO"
1421        android:protectionLevel="signature|system"
1422        android:label="@string/permlab_manageActivityStacks"
1423        android:description="@string/permdesc_manageActivityStacks" />
1424
1425    <!-- Allows an application to start any activity, regardless of permission
1426         protection or exported state. @hide -->
1427    <permission android:name="android.permission.START_ANY_ACTIVITY"
1428        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1429        android:protectionLevel="signature"
1430        android:label="@string/permlab_startAnyActivity"
1431        android:description="@string/permdesc_startAnyActivity" />
1432
1433    <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
1434        API is no longer supported. -->
1435    <permission android:name="android.permission.RESTART_PACKAGES"
1436        android:permissionGroup="android.permission-group.APP_INFO"
1437        android:protectionLevel="normal"
1438        android:label="@string/permlab_killBackgroundProcesses"
1439        android:description="@string/permdesc_killBackgroundProcesses" />
1440
1441    <!-- Allows an application to call
1442        {@link android.app.ActivityManager#killBackgroundProcesses}. -->
1443    <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
1444        android:permissionGroup="android.permission-group.APP_INFO"
1445        android:protectionLevel="normal"
1446        android:label="@string/permlab_killBackgroundProcesses"
1447        android:description="@string/permdesc_killBackgroundProcesses" />
1448
1449    <!-- ================================== -->
1450    <!-- Permissions affecting the display of other applications  -->
1451    <!-- ================================== -->
1452    <eat-comment />
1453
1454    <!-- Group of permissions that allow manipulation of how
1455         another application displays UI to the user. -->
1456    <permission-group android:name="android.permission-group.DISPLAY"
1457        android:label="@string/permgrouplab_display"
1458        android:icon="@drawable/perm_group_display"
1459        android:description="@string/permgroupdesc_display"
1460        android:priority="190"/>
1461
1462    <!-- Allows an application to open windows using the type
1463         {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT},
1464         shown on top of all other applications.  Very few applications
1465         should use this permission; these windows are intended for
1466         system-level interaction with the user. -->
1467    <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
1468        android:permissionGroup="android.permission-group.DISPLAY"
1469        android:protectionLevel="dangerous"
1470        android:label="@string/permlab_systemAlertWindow"
1471        android:description="@string/permdesc_systemAlertWindow" />
1472
1473    <!-- ================================== -->
1474    <!-- Permissions affecting the system wallpaper -->
1475    <!-- ================================== -->
1476    <eat-comment />
1477
1478    <!-- Group of permissions that allow manipulation of how
1479         another application displays UI to the user. -->
1480    <permission-group android:name="android.permission-group.WALLPAPER"
1481        android:label="@string/permgrouplab_wallpaper"
1482        android:icon="@drawable/perm_group_wallpaper"
1483        android:description="@string/permgroupdesc_wallpaper"
1484        android:priority="150" />
1485
1486    <!-- Allows applications to set the wallpaper -->
1487    <permission android:name="android.permission.SET_WALLPAPER"
1488        android:permissionGroup="android.permission-group.WALLPAPER"
1489        android:protectionLevel="normal"
1490        android:label="@string/permlab_setWallpaper"
1491        android:description="@string/permdesc_setWallpaper" />
1492
1493    <!-- Allows applications to set the wallpaper hints -->
1494    <permission android:name="android.permission.SET_WALLPAPER_HINTS"
1495        android:permissionGroup="android.permission-group.WALLPAPER"
1496        android:protectionLevel="normal"
1497        android:label="@string/permlab_setWallpaperHints"
1498        android:description="@string/permdesc_setWallpaperHints" />
1499
1500    <!-- ============================================ -->
1501    <!-- Permissions for changing the system clock -->
1502    <!-- ============================================ -->
1503    <eat-comment />
1504
1505    <!-- Group of permissions that are related to system clock. -->
1506    <permission-group android:name="android.permission-group.SYSTEM_CLOCK"
1507        android:label="@string/permgrouplab_systemClock"
1508        android:icon="@drawable/perm_group_system_clock"
1509        android:description="@string/permgroupdesc_systemClock"
1510        android:priority="140" />
1511
1512    <!-- @SystemApi Allows applications to set the system time.
1513    <p>Not for use by third-party applications. -->
1514    <permission android:name="android.permission.SET_TIME"
1515        android:protectionLevel="signature|system"
1516        android:label="@string/permlab_setTime"
1517        android:description="@string/permdesc_setTime" />
1518
1519    <!-- Allows applications to set the system time zone -->
1520    <permission android:name="android.permission.SET_TIME_ZONE"
1521        android:permissionGroup="android.permission-group.SYSTEM_CLOCK"
1522        android:protectionLevel="normal"
1523        android:label="@string/permlab_setTimeZone"
1524        android:description="@string/permdesc_setTimeZone" />
1525
1526    <!-- ==================================================== -->
1527    <!-- Permissions related to changing status bar   -->
1528    <!-- ==================================================== -->
1529    <eat-comment />
1530
1531    <!-- Used for permissions that change the status bar -->
1532    <permission-group android:name="android.permission-group.STATUS_BAR"
1533        android:label="@string/permgrouplab_statusBar"
1534        android:icon="@drawable/perm_group_status_bar"
1535        android:description="@string/permgroupdesc_statusBar"
1536        android:priority="110" />
1537
1538    <!-- Allows an application to expand or collapse the status bar. -->
1539    <permission android:name="android.permission.EXPAND_STATUS_BAR"
1540        android:permissionGroup="android.permission-group.STATUS_BAR"
1541        android:protectionLevel="normal"
1542        android:label="@string/permlab_expandStatusBar"
1543        android:description="@string/permdesc_expandStatusBar" />
1544
1545    <!-- ============================================================== -->
1546    <!-- Permissions related to adding/removing shortcuts from Launcher -->
1547    <!-- ============================================================== -->
1548    <eat-comment />
1549
1550    <!-- Allows an application to install a shortcut in Launcher -->
1551    <permission
1552        android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
1553        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1554        android:protectionLevel="dangerous"
1555        android:label="@string/permlab_install_shortcut"
1556        android:description="@string/permdesc_install_shortcut" />
1557
1558        <!-- Allows an application to uninstall a shortcut in Launcher -->
1559    <permission
1560        android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
1561        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1562        android:protectionLevel="dangerous"
1563        android:label="@string/permlab_uninstall_shortcut"
1564        android:description="@string/permdesc_uninstall_shortcut"/>
1565
1566    <!-- ==================================================== -->
1567    <!-- Permissions related to accessing sync settings   -->
1568    <!-- ==================================================== -->
1569    <eat-comment />
1570
1571    <!-- Used for permissions that access the sync settings or sync
1572         related information. -->
1573    <permission-group android:name="android.permission-group.SYNC_SETTINGS"
1574        android:label="@string/permgrouplab_syncSettings"
1575        android:icon="@drawable/perm_group_sync_settings"
1576        android:description="@string/permgroupdesc_syncSettings"
1577        android:priority="120" />
1578
1579    <!-- Allows applications to read the sync settings -->
1580    <permission android:name="android.permission.READ_SYNC_SETTINGS"
1581        android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1582        android:protectionLevel="normal"
1583        android:description="@string/permdesc_readSyncSettings"
1584        android:label="@string/permlab_readSyncSettings" />
1585
1586    <!-- Allows applications to write the sync settings -->
1587    <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
1588        android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1589        android:protectionLevel="normal"
1590        android:description="@string/permdesc_writeSyncSettings"
1591        android:label="@string/permlab_writeSyncSettings" />
1592
1593    <!-- Allows applications to read the sync stats -->
1594    <permission android:name="android.permission.READ_SYNC_STATS"
1595        android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1596        android:protectionLevel="normal"
1597        android:description="@string/permdesc_readSyncStats"
1598        android:label="@string/permlab_readSyncStats" />
1599
1600
1601    <!-- ============================================ -->
1602    <!-- Permissions for low-level system interaction -->
1603    <!-- ============================================ -->
1604    <eat-comment />
1605
1606    <!-- Group of permissions that are related to system APIs.  Many
1607         of these are not permissions the user will be expected to understand,
1608         and such permissions should generally be marked as "normal" protection
1609         level so they don't get displayed.  This can also, however, be used
1610         for miscellaneous features that provide access to the operating system,
1611         such as writing the global system settings. -->
1612    <permission-group android:name="android.permission-group.SYSTEM_TOOLS"
1613        android:label="@string/permgrouplab_systemTools"
1614        android:icon="@drawable/perm_group_system_tools"
1615        android:description="@string/permgroupdesc_systemTools"
1616        android:priority="100" />
1617
1618    <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
1619    <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
1620        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1621        android:protectionLevel="signature"
1622        android:label="@string/permlab_setScreenCompatibility"
1623        android:description="@string/permdesc_setScreenCompatibility" />
1624
1625    <!-- Allows an application to access all multi-user external storage @hide -->
1626    <permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE"
1627        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1628        android:label="@string/permlab_sdcardAccessAll"
1629        android:description="@string/permdesc_sdcardAccessAll"
1630        android:protectionLevel="signature" />
1631
1632    <!-- @SystemApi Allows an application to modify the current configuration, such
1633         as locale. -->
1634    <permission android:name="android.permission.CHANGE_CONFIGURATION"
1635        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1636        android:protectionLevel="signature|system|development"
1637        android:label="@string/permlab_changeConfiguration"
1638        android:description="@string/permdesc_changeConfiguration" />
1639
1640    <!-- Allows an application to read or write the system settings. -->
1641    <permission android:name="android.permission.WRITE_SETTINGS"
1642        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1643        android:protectionLevel="normal"
1644        android:label="@string/permlab_writeSettings"
1645        android:description="@string/permdesc_writeSettings" />
1646
1647    <!-- @SystemApi Allows an application to modify the Google service map.
1648    <p>Not for use by third-party applications. -->
1649    <permission android:name="android.permission.WRITE_GSERVICES"
1650        android:protectionLevel="signature|system"
1651        android:label="@string/permlab_writeGservices"
1652        android:description="@string/permdesc_writeGservices" />
1653
1654    <!-- @SystemApi Allows an application to call
1655        {@link android.app.ActivityManager#forceStopPackage}.
1656        @hide -->
1657    <permission android:name="android.permission.FORCE_STOP_PACKAGES"
1658        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1659        android:protectionLevel="signature|system"
1660        android:label="@string/permlab_forceStopPackages"
1661        android:description="@string/permdesc_forceStopPackages" />
1662
1663    <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
1664         An active window is the window that has fired an accessibility event. -->
1665    <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
1666        android:permissionGroup="android.permission-group.PERSONAL_INFO"
1667        android:protectionLevel="signature|system"
1668        android:label="@string/permlab_retrieve_window_content"
1669        android:description="@string/permdesc_retrieve_window_content" />
1670
1671    <!-- @SystemApi Modify the global animation scaling factor.
1672    <p>Not for use by third-party applications. -->
1673    <permission android:name="android.permission.SET_ANIMATION_SCALE"
1674        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1675        android:protectionLevel="signature|system|development"
1676        android:label="@string/permlab_setAnimationScale"
1677        android:description="@string/permdesc_setAnimationScale" />
1678
1679    <!-- @deprecated This functionality will be removed in the future; please do
1680         not use. Allow an application to make its activities persistent. -->
1681    <permission android:name="android.permission.PERSISTENT_ACTIVITY"
1682        android:permissionGroup="android.permission-group.APP_INFO"
1683        android:protectionLevel="normal"
1684        android:label="@string/permlab_persistentActivity"
1685        android:description="@string/permdesc_persistentActivity" />
1686
1687    <!-- Allows an application to find out the space used by any package. -->
1688    <permission android:name="android.permission.GET_PACKAGE_SIZE"
1689        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1690        android:protectionLevel="normal"
1691        android:label="@string/permlab_getPackageSize"
1692        android:description="@string/permdesc_getPackageSize" />
1693
1694    <!-- @deprecated No longer useful, see
1695         {@link android.content.pm.PackageManager#addPackageToPreferred}
1696         for details. -->
1697    <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
1698        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1699        android:protectionLevel="signature"
1700        android:label="@string/permlab_setPreferredApplications"
1701        android:description="@string/permdesc_setPreferredApplications" />
1702
1703    <!-- Allows an application to receive the
1704         {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
1705         broadcast after the system finishes booting.  If you don't
1706         request this permission, you will not receive the broadcast at
1707         that time.  Though holding this permission does not have any
1708         security implications, it can have a negative impact on the
1709         user experience by increasing the amount of time it takes the
1710         system to start and allowing applications to have themselves
1711         running without the user being aware of them.  As such, you must
1712         explicitly declare your use of this facility to make that visible
1713         to the user. -->
1714    <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
1715        android:permissionGroup="android.permission-group.APP_INFO"
1716        android:protectionLevel="normal"
1717        android:label="@string/permlab_receiveBootCompleted"
1718        android:description="@string/permdesc_receiveBootCompleted" />
1719
1720    <!-- Allows an application to broadcast sticky intents.  These are
1721         broadcasts whose data is held by the system after being finished,
1722         so that clients can quickly retrieve that data without having
1723         to wait for the next broadcast. -->
1724    <permission android:name="android.permission.BROADCAST_STICKY"
1725        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1726        android:protectionLevel="normal"
1727        android:label="@string/permlab_broadcastSticky"
1728        android:description="@string/permdesc_broadcastSticky" />
1729
1730    <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
1731    <p>Not for use by third-party applications.-->
1732    <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
1733        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1734        android:protectionLevel="system|signature"
1735        android:label="@string/permlab_mount_unmount_filesystems"
1736        android:description="@string/permdesc_mount_unmount_filesystems" />
1737
1738    <!-- @SystemApi Allows formatting file systems for removable storage.
1739    <p>Not for use by third-party applications. -->
1740    <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
1741        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1742        android:protectionLevel="system|signature"
1743        android:label="@string/permlab_mount_format_filesystems"
1744        android:description="@string/permdesc_mount_format_filesystems" />
1745
1746    <!-- Allows access to ASEC non-destructive API calls
1747         @hide  -->
1748    <permission android:name="android.permission.ASEC_ACCESS"
1749        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1750        android:protectionLevel="signature"
1751        android:label="@string/permlab_asec_access"
1752        android:description="@string/permdesc_asec_access" />
1753
1754    <!-- Allows creation of ASEC volumes
1755         @hide  -->
1756    <permission android:name="android.permission.ASEC_CREATE"
1757        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1758        android:protectionLevel="signature"
1759        android:label="@string/permlab_asec_create"
1760        android:description="@string/permdesc_asec_create" />
1761
1762    <!-- Allows destruction of ASEC volumes
1763         @hide  -->
1764    <permission android:name="android.permission.ASEC_DESTROY"
1765        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1766        android:protectionLevel="signature"
1767        android:label="@string/permlab_asec_destroy"
1768        android:description="@string/permdesc_asec_destroy" />
1769
1770    <!-- Allows mount / unmount of ASEC volumes
1771         @hide  -->
1772    <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
1773        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1774        android:protectionLevel="signature"
1775        android:label="@string/permlab_asec_mount_unmount"
1776        android:description="@string/permdesc_asec_mount_unmount" />
1777
1778    <!-- Allows rename of ASEC volumes
1779         @hide  -->
1780    <permission android:name="android.permission.ASEC_RENAME"
1781        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1782        android:protectionLevel="signature"
1783        android:label="@string/permlab_asec_rename"
1784        android:description="@string/permdesc_asec_rename" />
1785
1786    <!-- @SystemApi Allows applications to write the apn settings.
1787    <p>Not for use by third-party applications. -->
1788    <permission android:name="android.permission.WRITE_APN_SETTINGS"
1789                android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1790                android:protectionLevel="signature|system"
1791                android:description="@string/permdesc_writeApnSettings"
1792                android:label="@string/permlab_writeApnSettings" />
1793
1794    <!-- Allows an application to allow access the subscribed feeds
1795         ContentProvider. -->
1796    <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
1797        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1798        android:label="@string/permlab_subscribedFeedsRead"
1799        android:description="@string/permdesc_subscribedFeedsRead"
1800        android:protectionLevel="normal" />
1801    <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
1802        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1803        android:label="@string/permlab_subscribedFeedsWrite"
1804        android:description="@string/permdesc_subscribedFeedsWrite"
1805        android:protectionLevel="dangerous" />
1806
1807    <!-- Allows applications to change network connectivity state -->
1808    <permission android:name="android.permission.CHANGE_NETWORK_STATE"
1809        android:permissionGroup="android.permission-group.NETWORK"
1810        android:protectionLevel="normal"
1811        android:description="@string/permdesc_changeNetworkState"
1812        android:label="@string/permlab_changeNetworkState" />
1813
1814    <!-- Allows an application to clear the caches of all installed
1815         applications on the device.  -->
1816    <permission android:name="android.permission.CLEAR_APP_CACHE"
1817        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1818        android:protectionLevel="dangerous"
1819        android:label="@string/permlab_clearAppCache"
1820        android:description="@string/permdesc_clearAppCache" />
1821
1822    <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
1823         @hide -->
1824    <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
1825        android:protectionLevel="signature|system"
1826        android:label="@string/permlab_anyCodecForPlayback"
1827        android:description="@string/permdesc_anyCodecForPlayback" />
1828
1829    <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
1830         behalf of the user.
1831         @hide -->
1832    <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
1833        android:protectionLevel="signature|system"
1834        android:label="@string/permlab_manageCaCertificates"
1835        android:description="@string/permdesc_manageCaCertificates" />
1836
1837    <!-- @SystemApi Allows an application to do certain operations needed for
1838         interacting with the recovery (system update) system. -->
1839    <permission android:name="android.permission.RECOVERY"
1840        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1841        android:protectionLevel="signature|system"
1842        android:label="@string/permlab_recovery"
1843        android:description="@string/permdesc_recovery" />
1844
1845    <!-- Allows the system to bind to an application's task services
1846         @hide -->
1847    <permission android:name="android.permission.BIND_JOB_SERVICE"
1848        android:protectionLevel="signature"
1849        android:label="@string/permlab_bindJobService"
1850        android:description="@string/permdesc_bindJobService" />
1851    <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
1852
1853    <!-- ========================================= -->
1854    <!-- Permissions for special development tools -->
1855    <!-- ========================================= -->
1856    <eat-comment />
1857
1858    <!-- Group of permissions that are related to development features.  These
1859         are not permissions that should appear in third-party applications; they
1860         protect APIs that are intended only to be used for development
1861         purposes. -->
1862    <permission-group android:name="android.permission-group.DEVELOPMENT_TOOLS"
1863        android:label="@string/permgrouplab_developmentTools"
1864        android:description="@string/permgroupdesc_developmentTools"
1865        android:priority="310" />
1866
1867    <!-- @SystemApi Allows an application to read or write the secure system settings.
1868    <p>Not for use by third-party applications. -->
1869    <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
1870        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1871        android:protectionLevel="signature|system|development"
1872        android:label="@string/permlab_writeSecureSettings"
1873        android:description="@string/permdesc_writeSecureSettings" />
1874
1875    <!-- @SystemApi Allows an application to retrieve state dump information from system services.
1876    <p>Not for use by third-party applications. -->
1877    <permission android:name="android.permission.DUMP"
1878        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1879        android:protectionLevel="signature|system|development"
1880        android:label="@string/permlab_dump"
1881        android:description="@string/permdesc_dump" />
1882
1883    <!-- @SystemApi Allows an application to read the low-level system log files.
1884    <p>Not for use by third-party applications, because
1885    Log entries can contain the user's private information. -->
1886    <permission android:name="android.permission.READ_LOGS"
1887        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1888        android:protectionLevel="signature|system|development"
1889        android:label="@string/permlab_readLogs"
1890        android:description="@string/permdesc_readLogs" />
1891
1892    <!-- @SystemApi Configure an application for debugging.
1893    <p>Not for use by third-party applications. -->
1894    <permission android:name="android.permission.SET_DEBUG_APP"
1895        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1896        android:protectionLevel="signature|system|development"
1897        android:label="@string/permlab_setDebugApp"
1898        android:description="@string/permdesc_setDebugApp" />
1899
1900    <!-- @SystemApi Allows an application to set the maximum number of (not needed)
1901         application processes that can be running.
1902         <p>Not for use by third-party applications. -->
1903    <permission android:name="android.permission.SET_PROCESS_LIMIT"
1904        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1905        android:protectionLevel="signature|system|development"
1906        android:label="@string/permlab_setProcessLimit"
1907        android:description="@string/permdesc_setProcessLimit" />
1908
1909    <!-- @SystemApi Allows an application to control whether activities are immediately
1910         finished when put in the background.
1911         <p>Not for use by third-party applications. -->
1912    <permission android:name="android.permission.SET_ALWAYS_FINISH"
1913        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1914        android:protectionLevel="signature|system|development"
1915        android:label="@string/permlab_setAlwaysFinish"
1916        android:description="@string/permdesc_setAlwaysFinish" />
1917
1918    <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
1919    <p>Not for use by third-party applications. -->
1920    <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
1921        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1922        android:protectionLevel="signature|system|development"
1923        android:label="@string/permlab_signalPersistentProcesses"
1924        android:description="@string/permdesc_signalPersistentProcesses" />
1925
1926    <!-- ==================================== -->
1927    <!-- Private (signature-only) permissions -->
1928    <!-- ==================================== -->
1929    <eat-comment />
1930
1931    <!-- @SystemApi Allows applications to RW to diagnostic resources.
1932    <p>Not for use by third-party applications. -->
1933    <permission android:name="android.permission.DIAGNOSTIC"
1934        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1935        android:protectionLevel="signature"
1936        android:description="@string/permdesc_diagnostic"
1937        android:label="@string/permlab_diagnostic" />
1938
1939    <!-- @SystemApi Allows an application to open, close, or disable the status bar
1940         and its icons.
1941         <p>Not for use by third-party applications. -->
1942    <permission android:name="android.permission.STATUS_BAR"
1943        android:label="@string/permlab_statusBar"
1944        android:description="@string/permdesc_statusBar"
1945        android:protectionLevel="signature|system" />
1946
1947    <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
1948    @hide -->
1949    <permission android:name="android.permission.STATUS_BAR_SERVICE"
1950        android:label="@string/permlab_statusBarService"
1951        android:description="@string/permdesc_statusBarService"
1952        android:protectionLevel="signature" />
1953
1954    <!-- Allows an application to force a BACK operation on whatever is the
1955         top activity.
1956         <p>Not for use by third-party applications. -->
1957    <permission android:name="android.permission.FORCE_BACK"
1958        android:label="@string/permlab_forceBack"
1959        android:description="@string/permdesc_forceBack"
1960        android:protectionLevel="signature" />
1961
1962    <!-- @SystemApi Allows an application to update device statistics.
1963    <p>Not for use by third-party applications. -->
1964    <permission android:name="android.permission.UPDATE_DEVICE_STATS"
1965        android:label="@string/permlab_updateBatteryStats"
1966        android:description="@string/permdesc_updateBatteryStats"
1967        android:protectionLevel="signature|system" />
1968
1969    <!-- @SystemApi @hide Allows an application to collect battery statistics -->
1970    <permission android:name="android.permission.GET_APP_OPS_STATS"
1971        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1972        android:label="@string/permlab_getAppOpsStats"
1973        android:description="@string/permdesc_getAppOpsStats"
1974        android:protectionLevel="signature|system|development" />
1975
1976    <!-- @SystemApi Allows an application to update application operation statistics. Not for
1977         use by third party apps. @hide -->
1978    <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
1979        android:label="@string/permlab_updateAppOpsStats"
1980        android:description="@string/permdesc_updateAppOpsStats"
1981        android:protectionLevel="signature|system" />
1982
1983    <!-- Allows an application to open windows that are for use by parts
1984         of the system user interface.
1985         <p>Not for use by third-party applications. -->
1986    <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
1987        android:label="@string/permlab_internalSystemWindow"
1988        android:description="@string/permdesc_internalSystemWindow"
1989        android:protectionLevel="signature" />
1990
1991    <!-- Allows an application to manage (create, destroy,
1992         Z-order) application tokens in the window manager.
1993         <p>Not for use by third-party applications. -->
1994    <permission android:name="android.permission.MANAGE_APP_TOKENS"
1995        android:label="@string/permlab_manageAppTokens"
1996        android:description="@string/permdesc_manageAppTokens"
1997        android:protectionLevel="signature" />
1998
1999    <!-- @hide Allows the application to temporarily freeze the screen for a
2000         full-screen transition. -->
2001    <permission android:name="android.permission.FREEZE_SCREEN"
2002        android:label="@string/permlab_freezeScreen"
2003        android:description="@string/permdesc_freezeScreen"
2004        android:protectionLevel="signature" />
2005
2006    <!-- Allows an application to inject user events (keys, touch, trackball)
2007         into the event stream and deliver them to ANY window.  Without this
2008         permission, you can only deliver events to windows in your own process.
2009         <p>Not for use by third-party applications. -->
2010    <permission android:name="android.permission.INJECT_EVENTS"
2011        android:label="@string/permlab_injectEvents"
2012        android:description="@string/permdesc_injectEvents"
2013        android:protectionLevel="signature" />
2014
2015    <!-- @hide Allows an application to register an input filter which filters the stream
2016         of user events (keys, touch, trackball) before they are dispatched to any window. -->
2017    <permission android:name="android.permission.FILTER_EVENTS"
2018        android:label="@string/permlab_filter_events"
2019        android:description="@string/permdesc_filter_events"
2020        android:protectionLevel="signature" />
2021
2022    <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
2023    <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
2024        android:label="@string/permlab_retrieveWindowToken"
2025        android:description="@string/permdesc_retrieveWindowToken"
2026        android:protectionLevel="signature" />
2027
2028    <!-- @hide Allows an application to collect frame statistics -->
2029    <permission android:name="android.permission.FRAME_STATS"
2030         android:label="@string/permlab_frameStats"
2031         android:description="@string/permdesc_frameStats"
2032         android:protectionLevel="signature" />
2033
2034    <!-- @hide Allows an application to temporary enable accessibility on the device. -->
2035    <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
2036        android:label="@string/permlab_temporary_enable_accessibility"
2037        android:description="@string/permdesc_temporary_enable_accessibility"
2038        android:protectionLevel="signature" />
2039
2040    <!-- Allows an application to watch and control how activities are
2041         started globally in the system.  Only for is in debugging
2042         (usually the monkey command).
2043         <p>Not for use by third-party applications. -->
2044    <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
2045        android:label="@string/permlab_runSetActivityWatcher"
2046        android:description="@string/permdesc_runSetActivityWatcher"
2047        android:protectionLevel="signature" />
2048
2049    <!-- @SystemApi Allows an application to call the activity manager shutdown() API
2050         to put the higher-level system there into a shutdown state.
2051         @hide -->
2052    <permission android:name="android.permission.SHUTDOWN"
2053        android:label="@string/permlab_shutdown"
2054        android:description="@string/permdesc_shutdown"
2055        android:protectionLevel="signature|system" />
2056
2057    <!-- @SystemApi Allows an application to tell the activity manager to temporarily
2058         stop application switches, putting it into a special mode that
2059         prevents applications from immediately switching away from some
2060         critical UI such as the home screen.
2061         @hide -->
2062    <permission android:name="android.permission.STOP_APP_SWITCHES"
2063        android:label="@string/permlab_stopAppSwitches"
2064        android:description="@string/permdesc_stopAppSwitches"
2065        android:protectionLevel="signature|system" />
2066
2067    <!-- Allows an application to retrieve private information about
2068         the current top activity, such as any assist context it can provide.
2069         <p>Not for use by third-party applications. -->
2070    <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
2071        android:label="@string/permlab_getTopActivityInfo"
2072        android:description="@string/permdesc_getTopActivityInfo"
2073        android:protectionLevel="signature" />
2074
2075    <!-- Allows an application to retrieve the current state of keys and
2076         switches.
2077         <p>Not for use by third-party applications.
2078         @deprecated The API that used this permission has been removed. -->
2079    <permission android:name="android.permission.READ_INPUT_STATE"
2080        android:label="@string/permlab_readInputState"
2081        android:description="@string/permdesc_readInputState"
2082        android:protectionLevel="signature" />
2083
2084    <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
2085         to ensure that only the system can bind to it. -->
2086    <permission android:name="android.permission.BIND_INPUT_METHOD"
2087        android:label="@string/permlab_bindInputMethod"
2088        android:description="@string/permdesc_bindInputMethod"
2089        android:protectionLevel="signature" />
2090
2091    <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
2092         to ensure that only the system can bind to it. -->
2093    <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
2094        android:label="@string/permlab_bindAccessibilityService"
2095        android:description="@string/permdesc_bindAccessibilityService"
2096        android:protectionLevel="signature" />
2097
2098    <!-- Must be required by a {@link android.printservice.PrintService},
2099         to ensure that only the system can bind to it. -->
2100    <permission android:name="android.permission.BIND_PRINT_SERVICE"
2101        android:label="@string/permlab_bindPrintService"
2102        android:description="@string/permdesc_bindPrintService"
2103        android:protectionLevel="signature" />
2104
2105    <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
2106         or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
2107         the system can bind to it. -->
2108    <permission android:name="android.permission.BIND_NFC_SERVICE"
2109        android:label="@string/permlab_bindNfcService"
2110        android:description="@string/permdesc_bindNfcService"
2111        android:protectionLevel="signature" />
2112
2113    <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
2114         @hide -->
2115    <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
2116        android:label="@string/permlab_bindPrintSpoolerService"
2117        android:description="@string/permdesc_bindPrintSpoolerService"
2118        android:protectionLevel="signature" />
2119
2120    <!-- Must be required by a TextService (e.g. SpellCheckerService)
2121         to ensure that only the system can bind to it. -->
2122    <permission android:name="android.permission.BIND_TEXT_SERVICE"
2123        android:label="@string/permlab_bindTextService"
2124        android:description="@string/permdesc_bindTextService"
2125        android:protectionLevel="signature" />
2126
2127    <!-- Must be required by a {@link android.net.VpnService},
2128         to ensure that only the system can bind to it. -->
2129    <permission android:name="android.permission.BIND_VPN_SERVICE"
2130        android:label="@string/permlab_bindVpnService"
2131        android:description="@string/permdesc_bindVpnService"
2132        android:protectionLevel="signature" />
2133
2134    <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
2135         to ensure that only the system can bind to it. -->
2136    <permission android:name="android.permission.BIND_WALLPAPER"
2137        android:label="@string/permlab_bindWallpaper"
2138        android:description="@string/permdesc_bindWallpaper"
2139        android:protectionLevel="signature|system" />
2140
2141    <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
2142         to ensure that only the system can bind to it. -->
2143    <permission android:name="android.permission.BIND_VOICE_INTERACTION"
2144        android:label="@string/permlab_bindVoiceInteraction"
2145        android:description="@string/permdesc_bindVoiceInteraction"
2146        android:protectionLevel="signature" />
2147
2148    <!-- Must be required by hotword enrollment application,
2149         to ensure that only the system can interact with it.
2150         @hide <p>Not for use by third-party applications.</p> -->
2151    <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
2152        android:label="@string/permlab_manageVoiceKeyphrases"
2153        android:description="@string/permdesc_manageVoiceKeyphrases"
2154        android:protectionLevel="signature|system" />
2155
2156    <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
2157         to ensure that only the system can bind to it.
2158         @hide -->
2159    <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
2160        android:label="@string/permlab_bindRemoteDisplay"
2161        android:description="@string/permdesc_bindRemoteDisplay"
2162        android:protectionLevel="signature" />
2163
2164    <!-- Must be required by a {@link android.media.tv.TvInputService}
2165         to ensure that only the system can bind to it. -->
2166    <permission android:name="android.permission.BIND_TV_INPUT"
2167        android:label="@string/permlab_bindTvInput"
2168        android:description="@string/permdesc_bindTvInput"
2169        android:protectionLevel="signature|system" />
2170
2171    <!-- Must be required by a {@link android.media.routing.MediaRouteService}
2172         to ensure that only the system can interact with it.
2173         @hide -->
2174    <permission android:name="android.permission.BIND_ROUTE_PROVIDER"
2175        android:label="@string/permlab_bindRouteProvider"
2176        android:description="@string/permdesc_bindRouteProvider"
2177        android:protectionLevel="signature" />
2178
2179    <!-- Must be required by device administration receiver, to ensure that only the
2180         system can interact with it. -->
2181    <permission android:name="android.permission.BIND_DEVICE_ADMIN"
2182        android:label="@string/permlab_bindDeviceAdmin"
2183        android:description="@string/permdesc_bindDeviceAdmin"
2184        android:protectionLevel="signature" />
2185
2186    <!-- @SystemApi Required to add or remove another application as a device admin.
2187         <p>Not for use by third-party applications.
2188         @hide -->
2189    <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
2190        android:label="@string/permlab_manageDeviceAdmins"
2191        android:description="@string/permdesc_manageDeviceAdmins"
2192        android:protectionLevel="signature|system" />
2193
2194    <!-- Allows low-level access to setting the orientation (actually
2195         rotation) of the screen.
2196         <p>Not for use by third-party applications. -->
2197    <permission android:name="android.permission.SET_ORIENTATION"
2198        android:label="@string/permlab_setOrientation"
2199        android:description="@string/permdesc_setOrientation"
2200        android:protectionLevel="signature" />
2201
2202    <!-- Allows low-level access to setting the pointer speed.
2203         <p>Not for use by third-party applications. -->
2204    <permission android:name="android.permission.SET_POINTER_SPEED"
2205        android:label="@string/permlab_setPointerSpeed"
2206        android:description="@string/permdesc_setPointerSpeed"
2207        android:protectionLevel="signature" />
2208
2209    <!-- Allows low-level access to setting input device calibration.
2210         <p>Not for use by normal applications.
2211         @hide -->
2212    <permission android:name="android.permission.SET_INPUT_CALIBRATION"
2213        android:label="@string/permlab_setInputCalibration"
2214        android:description="@string/permdesc_setInputCalibration"
2215        android:protectionLevel="signature" />
2216
2217    <!-- Allows low-level access to setting the keyboard layout.
2218         <p>Not for use by third-party applications.
2219         @hide -->
2220    <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
2221        android:label="@string/permlab_setKeyboardLayout"
2222        android:description="@string/permdesc_setKeyboardLayout"
2223        android:protectionLevel="signature" />
2224
2225    <!-- @SystemApi Allows an application to install packages.
2226    <p>Not for use by third-party applications. -->
2227    <permission android:name="android.permission.INSTALL_PACKAGES"
2228        android:label="@string/permlab_installPackages"
2229        android:description="@string/permdesc_installPackages"
2230        android:protectionLevel="signature|system" />
2231
2232    <!-- Allows an application to clear user data.
2233    <p>Not for use by third-party applications. -->
2234    <permission android:name="android.permission.CLEAR_APP_USER_DATA"
2235        android:label="@string/permlab_clearAppUserData"
2236        android:description="@string/permdesc_clearAppUserData"
2237        android:protectionLevel="signature" />
2238
2239    <!-- @SystemApi Allows an application to delete cache files.
2240    <p>Not for use by third-party applications. -->
2241    <permission android:name="android.permission.DELETE_CACHE_FILES"
2242        android:label="@string/permlab_deleteCacheFiles"
2243        android:description="@string/permdesc_deleteCacheFiles"
2244        android:protectionLevel="signature|system" />
2245
2246    <!-- @SystemApi Allows an application to delete packages.
2247    <p>Not for use by third-party applications. -->
2248    <permission android:name="android.permission.DELETE_PACKAGES"
2249        android:label="@string/permlab_deletePackages"
2250        android:description="@string/permdesc_deletePackages"
2251        android:protectionLevel="signature|system" />
2252
2253    <!-- @SystemApi Allows an application to move location of installed package.
2254         @hide -->
2255    <permission android:name="android.permission.MOVE_PACKAGE"
2256        android:label="@string/permlab_movePackage"
2257        android:description="@string/permdesc_movePackage"
2258        android:protectionLevel="signature|system" />
2259
2260    <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
2261         enabled or not.
2262         <p>Not for use by third-party applications. -->
2263    <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
2264        android:label="@string/permlab_changeComponentState"
2265        android:description="@string/permdesc_changeComponentState"
2266        android:protectionLevel="signature|system" />
2267
2268    <!-- @hide Allows an application to grant or revoke specific permissions. -->
2269    <permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS"
2270        android:label="@string/permlab_grantRevokePermissions"
2271        android:description="@string/permdesc_grantRevokePermissions"
2272        android:protectionLevel="signature" />
2273
2274    <!-- Allows an application to use SurfaceFlinger's low level features.
2275    <p>Not for use by third-party applications. -->
2276    <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
2277        android:label="@string/permlab_accessSurfaceFlinger"
2278        android:description="@string/permdesc_accessSurfaceFlinger"
2279        android:protectionLevel="signature" />
2280
2281    <!-- @SystemApi Allows an application to take screen shots and more generally
2282         get access to the frame buffer data.
2283         <p>Not for use by third-party applications. -->
2284    <permission android:name="android.permission.READ_FRAME_BUFFER"
2285        android:label="@string/permlab_readFrameBuffer"
2286        android:description="@string/permdesc_readFrameBuffer"
2287        android:protectionLevel="signature|system" />
2288
2289    <!-- Allows an application to use InputFlinger's low level features.
2290         @hide -->
2291    <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
2292        android:label="@string/permlab_accessInputFlinger"
2293        android:description="@string/permdesc_accessInputFlinger"
2294        android:protectionLevel="signature" />
2295
2296    <!-- Allows an application to configure and connect to Wifi displays
2297         @hide -->
2298    <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
2299        android:label="@string/permlab_configureWifiDisplay"
2300        android:description="@string/permdesc_configureWifiDisplay"
2301        android:protectionLevel="signature" />
2302
2303    <!-- Allows an application to control low-level features of Wifi displays
2304         such as opening an RTSP socket.  This permission should only be used
2305         by the display manager.
2306         @hide -->
2307    <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
2308        android:label="@string/permlab_controlWifiDisplay"
2309        android:description="@string/permdesc_controlWifiDisplay"
2310        android:protectionLevel="signature" />
2311
2312    <!-- @SystemApi Allows an application to capture audio output.
2313         <p>Not for use by third-party applications.</p> -->
2314    <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
2315        android:label="@string/permlab_captureAudioOutput"
2316        android:description="@string/permdesc_captureAudioOutput"
2317        android:protectionLevel="signature|system" />
2318
2319    <!-- @SystemApi Allows an application to capture audio for hotword detection.
2320         <p>Not for use by third-party applications.</p>
2321         @hide -->
2322    <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
2323        android:label="@string/permlab_captureAudioHotword"
2324        android:description="@string/permdesc_captureAudioHotword"
2325        android:protectionLevel="signature|system" />
2326
2327    <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
2328         <p>Not for use by third-party applications.</p>
2329         @hide -->
2330    <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
2331        android:label="@string/permlab_modifyAudioRouting"
2332        android:description="@string/permdesc_modifyAudioRouting"
2333        android:protectionLevel="signature|system" />
2334
2335    <!-- @SystemApi Allows an application to capture video output.
2336         <p>Not for use by third-party applications.</p> -->
2337    <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
2338        android:label="@string/permlab_captureVideoOutput"
2339        android:description="@string/permdesc_captureVideoOutput"
2340        android:protectionLevel="signature|system" />
2341
2342    <!-- @SystemApi Allows an application to capture secure video output.
2343         <p>Not for use by third-party applications.</p> -->
2344    <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
2345        android:label="@string/permlab_captureSecureVideoOutput"
2346        android:description="@string/permdesc_captureSecureVideoOutput"
2347        android:protectionLevel="signature|system" />
2348
2349    <!-- @SystemApi Allows an application to know what content is playing and control its playback.
2350         <p>Not for use by third-party applications due to privacy of media consumption</p>  -->
2351    <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
2352        android:label="@string/permlab_mediaContentControl"
2353        android:description="@string/permdesc_mediaContentControl"
2354        android:protectionLevel="signature|system" />
2355
2356    <!-- Required to be able to disable the device (very dangerous!).
2357    <p>Not for use by third-party applications.. -->
2358    <permission android:name="android.permission.BRICK"
2359        android:label="@string/permlab_brick"
2360        android:description="@string/permdesc_brick"
2361        android:protectionLevel="signature" />
2362
2363    <!-- @SystemApi Required to be able to reboot the device.
2364    <p>Not for use by third-party applications. -->
2365    <permission android:name="android.permission.REBOOT"
2366        android:label="@string/permlab_reboot"
2367        android:description="@string/permdesc_reboot"
2368        android:protectionLevel="signature|system" />
2369
2370   <!-- Allows low-level access to power management.
2371   <p>Not for use by third-party applications. -->
2372    <permission android:name="android.permission.DEVICE_POWER"
2373        android:label="@string/permlab_devicePower"
2374        android:description="@string/permdesc_devicePower"
2375        android:protectionLevel="signature" />
2376
2377   <!-- @hide Allows low-level access to tun tap driver -->
2378    <permission android:name="android.permission.NET_TUNNELING"
2379        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2380        android:protectionLevel="signature" />
2381
2382    <!-- Run as a manufacturer test application, running as the root user.
2383         Only available when the device is running in manufacturer test mode.
2384         <p>Not for use by third-party applications. -->
2385    <permission android:name="android.permission.FACTORY_TEST"
2386        android:label="@string/permlab_factoryTest"
2387        android:description="@string/permdesc_factoryTest"
2388        android:protectionLevel="signature" />
2389
2390    <!-- Allows an application to broadcast a notification that an application
2391         package has been removed.
2392         <p>Not for use by third-party applications. -->
2393    <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
2394        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2395        android:label="@string/permlab_broadcastPackageRemoved"
2396        android:description="@string/permdesc_broadcastPackageRemoved"
2397        android:protectionLevel="signature" />
2398
2399    <!-- Allows an application to broadcast an SMS receipt notification.
2400    <p>Not for use by third-party applications. -->
2401    <permission android:name="android.permission.BROADCAST_SMS"
2402        android:permissionGroup="android.permission-group.MESSAGES"
2403        android:label="@string/permlab_broadcastSmsReceived"
2404        android:description="@string/permdesc_broadcastSmsReceived"
2405        android:protectionLevel="signature" />
2406
2407    <!-- Allows an application to broadcast a WAP PUSH receipt notification.
2408    <p>Not for use by third-party applications. -->
2409    <permission android:name="android.permission.BROADCAST_WAP_PUSH"
2410        android:permissionGroup="android.permission-group.MESSAGES"
2411        android:label="@string/permlab_broadcastWapPush"
2412        android:description="@string/permdesc_broadcastWapPush"
2413        android:protectionLevel="signature" />
2414
2415    <!-- @SystemApi Allows an application to broadcast a SCORE_NETWORKS request.
2416         <p>Not for use by third-party applications. @hide -->
2417    <permission android:name="android.permission.BROADCAST_SCORE_NETWORKS"
2418        android:label="@string/permlab_broadcastScoreNetworks"
2419        android:description="@string/permdesc_broadcastScoreNetworks"
2420        android:protectionLevel="signature|system" />
2421
2422    <!-- @SystemApi Not for use by third-party applications. -->
2423    <permission android:name="android.permission.MASTER_CLEAR"
2424        android:label="@string/permlab_masterClear"
2425        android:description="@string/permdesc_masterClear"
2426        android:protectionLevel="signature|system" />
2427
2428    <!-- @SystemApi Allows an application to call any phone number, including emergency
2429         numbers, without going through the Dialer user interface for the user
2430         to confirm the call being placed.
2431         <p>Not for use by third-party applications. -->
2432    <permission android:name="android.permission.CALL_PRIVILEGED"
2433        android:label="@string/permlab_callPrivileged"
2434        android:description="@string/permdesc_callPrivileged"
2435        android:protectionLevel="signature|system" />
2436
2437    <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
2438    <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
2439        android:label="@string/permlab_performCdmaProvisioning"
2440        android:description="@string/permdesc_performCdmaProvisioning"
2441        android:protectionLevel="signature|system" />
2442
2443    <!-- @SystemApi Allows enabling/disabling location update notifications from
2444         the radio.
2445         <p>Not for use by third-party applications. -->
2446    <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
2447        android:label="@string/permlab_locationUpdates"
2448        android:description="@string/permdesc_locationUpdates"
2449        android:protectionLevel="signature|system" />
2450
2451    <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
2452         database, to change values that get uploaded.
2453         <p>Not for use by third-party applications. -->
2454    <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
2455        android:label="@string/permlab_checkinProperties"
2456        android:description="@string/permdesc_checkinProperties"
2457        android:protectionLevel="signature|system" />
2458
2459    <!-- @SystemApi Allows an application to collect component usage
2460         statistics @hide -->
2461    <permission android:name="android.permission.PACKAGE_USAGE_STATS"
2462        android:label="@string/permlab_pkgUsageStats"
2463        android:description="@string/permdesc_pkgUsageStats"
2464        android:protectionLevel="signature|system" />
2465    <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" />
2466
2467    <!-- @SystemApi Allows an application to collect battery statistics -->
2468    <permission android:name="android.permission.BATTERY_STATS"
2469        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2470        android:label="@string/permlab_batteryStats"
2471        android:description="@string/permdesc_batteryStats"
2472        android:protectionLevel="signature|system" />
2473
2474    <!-- @SystemApi Allows an application to control the backup and restore process.
2475    <p>Not for use by third-party applications.
2476         @hide pending API council -->
2477    <permission android:name="android.permission.BACKUP"
2478        android:label="@string/permlab_backup"
2479        android:description="@string/permdesc_backup"
2480        android:protectionLevel="signature|system" />
2481
2482    <!-- Allows a package to launch the secure full-backup confirmation UI.
2483         ONLY the system process may hold this permission.
2484         @hide -->
2485    <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
2486        android:label="@string/permlab_confirm_full_backup"
2487        android:description="@string/permdesc_confirm_full_backup"
2488        android:protectionLevel="signature" />
2489
2490    <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
2491         to ensure that only the system can bind to it. -->
2492    <permission android:name="android.permission.BIND_REMOTEVIEWS"
2493        android:label="@string/permlab_bindRemoteViews"
2494        android:description="@string/permdesc_bindRemoteViews"
2495        android:protectionLevel="signature|system" />
2496
2497    <!-- @SystemApi Allows an application to tell the AppWidget service which application
2498         can access AppWidget's data.  The normal user flow is that a user
2499         picks an AppWidget to go into a particular host, thereby giving that
2500         host application access to the private data from the AppWidget app.
2501         An application that has this permission should honor that contract.
2502         <p>Not for use by third-party applications. -->
2503    <permission android:name="android.permission.BIND_APPWIDGET"
2504        android:permissionGroup="android.permission-group.PERSONAL_INFO"
2505        android:label="@string/permlab_bindGadget"
2506        android:description="@string/permdesc_bindGadget"
2507        android:protectionLevel="signature|system" />
2508
2509    <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
2510         keyguard widget
2511         @hide -->
2512    <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
2513        android:permissionGroup="android.permission-group.PERSONAL_INFO"
2514        android:protectionLevel="signature|system" />
2515
2516    <!-- @SystemApi Internal permission allowing an application to query/set which
2517         applications can bind AppWidgets.
2518         @hide -->
2519    <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
2520        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2521        android:protectionLevel="signature|system" />
2522
2523    <!-- Allows applications to change the background data setting.
2524    <p>Not for use by third-party applications.
2525         @hide pending API council -->
2526    <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
2527        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2528        android:protectionLevel="signature"
2529        android:description="@string/permdesc_changeBackgroundDataSetting"
2530        android:label="@string/permlab_changeBackgroundDataSetting" />
2531
2532    <!-- @SystemApi This permission can be used on content providers to allow the global
2533         search system to access their data.  Typically it used when the
2534         provider has some permissions protecting it (which global search
2535         would not be expected to hold), and added as a read-only permission
2536         to the path in the provider where global search queries are
2537         performed.  This permission can not be held by regular applications;
2538         it is used by applications to protect themselves from everyone else
2539         besides global search. -->
2540    <permission android:name="android.permission.GLOBAL_SEARCH"
2541        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2542        android:protectionLevel="signature|system" />
2543
2544    <!-- Internal permission protecting access to the global search
2545         system: ensures that only the system can access the provider
2546         to perform queries (since this otherwise provides unrestricted
2547         access to a variety of content providers), and to write the
2548         search statistics (to keep applications from gaming the source
2549         ranking).
2550         @hide -->
2551    <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
2552        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2553        android:protectionLevel="signature" />
2554
2555    <!-- @SystemApi Internal permission to allows an application to read indexable data.
2556        @hide -->
2557    <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
2558        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2559        android:protectionLevel="signature|system" />
2560
2561    <!-- @SystemApi Allows applications to set a live wallpaper.
2562         @hide XXX Change to signature once the picker is moved to its
2563         own apk as Ghod Intended. -->
2564    <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
2565        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2566        android:protectionLevel="signature|system" />
2567
2568    <!-- @SystemApi Allows applications to read dream settings and dream state.
2569         @hide -->
2570    <permission android:name="android.permission.READ_DREAM_STATE"
2571        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2572        android:protectionLevel="signature|system" />
2573
2574    <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
2575         @hide -->
2576    <permission android:name="android.permission.WRITE_DREAM_STATE"
2577        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2578        android:protectionLevel="signature|system" />
2579
2580    <!-- @SystemApi Allow an application to read and write the cache partition.
2581         @hide -->
2582    <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
2583        android:label="@string/permlab_cache_filesystem"
2584        android:description="@string/permdesc_cache_filesystem"
2585        android:protectionLevel="signature|system" />
2586
2587    <!-- Must be required by default container service so that only
2588         the system can bind to it and use it to copy
2589         protected data to secure containers or files
2590         accessible to the system.
2591         @hide -->
2592    <permission android:name="android.permission.COPY_PROTECTED_DATA"
2593        android:label="@string/permlab_copyProtectedData"
2594        android:description="@string/permlab_copyProtectedData"
2595        android:protectionLevel="signature" />
2596
2597    <!-- @SystemApi Internal permission protecting access to the encryption methods
2598        @hide
2599    -->
2600    <permission android:name="android.permission.CRYPT_KEEPER"
2601        android:protectionLevel="signature|system" />
2602
2603    <!-- @SystemApi Allows an application to read historical network usage for
2604         specific networks and applications. @hide -->
2605    <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
2606        android:label="@string/permlab_readNetworkUsageHistory"
2607        android:description="@string/permdesc_readNetworkUsageHistory"
2608        android:protectionLevel="signature|system" />
2609
2610    <!-- Allows an application to manage network policies (such as warning and disable
2611         limits) and to define application-specific rules. @hide -->
2612    <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
2613        android:label="@string/permlab_manageNetworkPolicy"
2614        android:description="@string/permdesc_manageNetworkPolicy"
2615        android:protectionLevel="signature" />
2616
2617    <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used
2618         by system services like download manager and media server. Not for use by
2619         third party apps. @hide -->
2620    <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
2621        android:label="@string/permlab_modifyNetworkAccounting"
2622        android:description="@string/permdesc_modifyNetworkAccounting"
2623        android:protectionLevel="signature|system" />
2624
2625    <!-- C2DM permission.
2626         @hide Used internally.
2627     -->
2628    <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
2629          android:protectionLevel="signature" />
2630    <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
2631
2632    <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
2633         trust it to verify packages.
2634    -->
2635    <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
2636        android:label="@string/permlab_packageVerificationAgent"
2637        android:description="@string/permdesc_packageVerificationAgent"
2638        android:protectionLevel="signature|system" />
2639
2640    <!-- Must be required by package verifier receiver, to ensure that only the
2641         system can interact with it.
2642         @hide
2643    -->
2644    <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
2645        android:label="@string/permlab_bindPackageVerifier"
2646        android:description="@string/permdesc_bindPackageVerifier"
2647        android:protectionLevel="signature" />
2648
2649    <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
2650         @hide -->
2651    <permission android:name="android.permission.SERIAL_PORT"
2652        android:label="@string/permlab_serialPort"
2653        android:description="@string/permdesc_serialPort"
2654        android:protectionLevel="signature|system" />
2655
2656    <!-- Allows the holder to access content providers from outside an ApplicationThread.
2657         This permission is enforced by the ActivityManagerService on the corresponding APIs,
2658         in particular ActivityManagerService#getContentProviderExternal(String) and
2659         ActivityManagerService#removeContentProviderExternal(String).
2660         @hide
2661    -->
2662    <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
2663        android:label="@string/permlab_accessContentProvidersExternally"
2664        android:description="@string/permdesc_accessContentProvidersExternally"
2665        android:protectionLevel="signature" />
2666
2667    <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
2668         OTA reboot *not* occur while the lock is held.
2669         @hide -->
2670    <permission android:name="android.permission.UPDATE_LOCK"
2671        android:label="@string/permlab_updateLock"
2672        android:description="@string/permdesc_updateLock"
2673        android:protectionLevel="signatureOrSystem" />
2674
2675    <!-- @SystemApi Allows an application to read the current set of notifications, including
2676         any metadata and intents attached.
2677         @hide -->
2678    <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
2679        android:label="@string/permlab_accessNotifications"
2680        android:description="@string/permdesc_accessNotifications"
2681        android:protectionLevel="signature|system" />
2682
2683    <!-- Allows access to keyguard secure storage.  Only allowed for system processes.
2684        @hide -->
2685    <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
2686        android:protectionLevel="signature"
2687        android:label="@string/permlab_access_keyguard_secure_storage"
2688        android:description="@string/permdesc_access_keyguard_secure_storage" />
2689
2690    <!-- Allows an application to control keyguard.  Only allowed for system processes.
2691        @hide -->
2692    <permission android:name="android.permission.CONTROL_KEYGUARD"
2693        android:protectionLevel="signature"
2694        android:label="@string/permlab_control_keyguard"
2695        android:description="@string/permdesc_control_keyguard" />
2696
2697    <!-- Allows an application to listen to trust changes.  Only allowed for system processes.
2698        @hide -->
2699    <permission android:name="android.permission.TRUST_LISTENER"
2700                android:protectionLevel="signature"
2701                android:label="@string/permlab_trust_listener"
2702                android:description="@string/permdesc_trust_listener" />
2703
2704    <!-- @SystemApi Allows an application to provide a trust agent.
2705         @hide For security reasons, this is a platform-only permission. -->
2706    <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
2707                android:protectionLevel="signatureOrSystem"
2708                android:label="@string/permlab_provide_trust_agent"
2709                android:description="@string/permdesc_provide_trust_agent" />
2710
2711    <!-- Allows an application to launch the trust agent settings activity.
2712        @hide -->
2713    <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
2714        android:protectionLevel="signatureOrSystem"
2715        android:label="@string/permlab_launch_trust_agent_settings"
2716        android:description="@string/permdesc_launch_trust_agent_settings" />
2717
2718    <!-- Must be required by an {@link
2719         android.service.trust.TrustAgentService},
2720         to ensure that only the system can bind to it. -->
2721    <permission android:name="android.permission.BIND_TRUST_AGENT"
2722                android:protectionLevel="signature"
2723                android:label="@string/permlab_bind_trust_agent_service"
2724                android:description="@string/permdesc_bind_trust_agent_service" />
2725
2726    <!-- Must be required by an {@link
2727         android.service.notification.NotificationListenerService},
2728         to ensure that only the system can bind to it. -->
2729    <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
2730        android:label="@string/permlab_bindNotificationListenerService"
2731        android:description="@string/permdesc_bindNotificationListenerService"
2732        android:protectionLevel="signature" />
2733
2734    <!-- Must be required by an {@link
2735         android.service.notification.ConditionProviderService},
2736         to ensure that only the system can bind to it.
2737         @hide -->
2738    <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
2739        android:label="@string/permlab_bindConditionProviderService"
2740        android:description="@string/permdesc_bindConditionProviderService"
2741        android:protectionLevel="signature" />
2742
2743    <!-- Must be required by a {@link android.media.routing.MediaRouteService},
2744         to ensure that only the system can bind to it. -->
2745    <permission android:name="android.permission.BIND_MEDIA_ROUTE_SERVICE"
2746        android:label="@string/permlab_bindMediaRouteService"
2747        android:description="@string/permdesc_bindMediaRouteService"
2748        android:protectionLevel="signature" />
2749
2750    <!-- Must be required by an {@link android.service.dreams.DreamService},
2751         to ensure that only the system can bind to it. -->
2752    <permission android:name="android.permission.BIND_DREAM_SERVICE"
2753        android:label="@string/permlab_bindDreamService"
2754        android:description="@string/permdesc_bindDreamService"
2755        android:protectionLevel="signature" />
2756
2757    <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
2758         carrier setup application to enforce that this permission is required
2759         @hide This is not a third-party API (intended for OEMs and system apps). -->
2760    <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
2761        android:label="@string/permlab_invokeCarrierSetup"
2762        android:description="@string/permdesc_invokeCarrierSetup"
2763        android:protectionLevel="signature|system" />
2764
2765    <!-- @SystemApi Allows an application to listen for network condition observations.
2766         @hide This is not a third-party API (intended for system apps). -->
2767    <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
2768        android:label="@string/permlab_accessNetworkConditions"
2769        android:description="@string/permdesc_accessNetworkConditions"
2770        android:protectionLevel="signature|system" />
2771
2772    <!-- @SystemApi Allows an application to provision and access DRM certificates
2773         @hide This is not a third-party API (intended for system apps). -->
2774    <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
2775        android:label="@string/permlab_accessDrmCertificates"
2776        android:description="@string/permdesc_accessDrmCertificates"
2777        android:protectionLevel="signature|system" />
2778
2779    <!-- Api Allows an application to create media projection sessions.
2780         @hide This is not a third-party API (intended for system apps). -->
2781    <permission android:name="android.permission.CREATE_MEDIA_PROJECTION"
2782        android:label="@string/permlab_createMediaProjection"
2783        android:description="@string/permdesc_createMediaProjection"
2784        android:protectionLevel="signature" />
2785
2786    <!-- The system process is explicitly the only one allowed to launch the
2787         confirmation UI for full backup/restore -->
2788    <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
2789
2790    <application android:process="system"
2791                 android:persistent="true"
2792                 android:hasCode="false"
2793                 android:label="@string/android_system_label"
2794                 android:allowClearUserData="false"
2795                 android:backupAgent="com.android.server.backup.SystemBackupAgent"
2796                 android:killAfterRestore="false"
2797                 android:icon="@drawable/ic_launcher_android"
2798                 android:supportsRtl="true">
2799        <activity android:name="com.android.internal.app.ChooserActivity"
2800                android:theme="@style/Theme.DeviceDefault.Resolver"
2801                android:finishOnCloseSystemDialogs="true"
2802                android:excludeFromRecents="true"
2803                android:documentLaunchMode="never"
2804                android:relinquishTaskIdentity="true"
2805                android:process=":ui">
2806            <intent-filter>
2807                <action android:name="android.intent.action.CHOOSER" />
2808                <category android:name="android.intent.category.DEFAULT" />
2809            </intent-filter>
2810        </activity>
2811        <activity android:name="com.android.internal.app.IntentForwarderActivity"
2812                android:finishOnCloseSystemDialogs="true"
2813                android:theme="@style/Theme.NoDisplay"
2814                android:excludeFromRecents="true"
2815                android:label="@string/user_owner_label"
2816                android:exported="true"
2817                >
2818        </activity>
2819        <activity-alias android:name="com.android.internal.app.ForwardIntentToUserOwner"
2820                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2821                android:icon="@drawable/personal_icon"
2822                android:exported="true"
2823                android:label="@string/user_owner_label">
2824        </activity-alias>
2825        <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
2826                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2827                android:icon="@drawable/ic_afw_icon"
2828                android:exported="true"
2829                android:label="@string/managed_profile_label">
2830        </activity-alias>
2831        <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
2832                android:theme="@style/Theme.Holo.Dialog"
2833                android:label="@string/heavy_weight_switcher_title"
2834                android:finishOnCloseSystemDialogs="true"
2835                android:excludeFromRecents="true"
2836                android:process=":ui">
2837        </activity>
2838        <activity android:name="com.android.internal.app.PlatLogoActivity"
2839                android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
2840                android:process=":ui">
2841        </activity>
2842        <activity android:name="com.android.internal.app.DisableCarModeActivity"
2843                android:theme="@style/Theme.NoDisplay"
2844                android:excludeFromRecents="true"
2845                android:process=":ui">
2846        </activity>
2847
2848        <activity android:name="android.accounts.ChooseAccountActivity"
2849                android:excludeFromRecents="true"
2850                android:exported="true"
2851                android:theme="@android:style/Theme.Holo.Dialog"
2852                android:label="@string/choose_account_label"
2853                android:process=":ui">
2854        </activity>
2855
2856        <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
2857                android:excludeFromRecents="true"
2858                android:exported="true"
2859                android:theme="@android:style/Theme.Holo.Dialog"
2860                android:label="@string/choose_account_label"
2861                android:process=":ui">
2862        </activity>
2863
2864        <activity android:name="android.accounts.ChooseAccountTypeActivity"
2865                android:excludeFromRecents="true"
2866                android:theme="@android:style/Theme.Holo.Dialog"
2867                android:label="@string/choose_account_label"
2868                android:process=":ui">
2869        </activity>
2870
2871        <activity android:name="android.accounts.CantAddAccountActivity"
2872                android:excludeFromRecents="true"
2873                android:exported="true"
2874                android:theme="@android:style/Theme.Holo.Dialog.NoActionBar"
2875                android:process=":ui">
2876        </activity>
2877
2878        <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
2879                android:excludeFromRecents="true"
2880                android:exported="true"
2881                android:theme="@android:style/Theme.Holo.DialogWhenLarge"
2882                android:process=":ui">
2883        </activity>
2884
2885        <activity android:name="android.content.SyncActivityTooManyDeletes"
2886               android:theme="@android:style/Theme.Holo.Dialog"
2887               android:label="@string/sync_too_many_deletes"
2888               android:process=":ui">
2889        </activity>
2890
2891        <activity android:name="com.android.server.ShutdownActivity"
2892            android:permission="android.permission.SHUTDOWN"
2893            android:excludeFromRecents="true">
2894            <intent-filter>
2895                <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" />
2896                <category android:name="android.intent.category.DEFAULT" />
2897            </intent-filter>
2898            <intent-filter>
2899                <action android:name="android.intent.action.REBOOT" />
2900                <category android:name="android.intent.category.DEFAULT" />
2901            </intent-filter>
2902        </activity>
2903
2904        <activity android:name="com.android.internal.app.NetInitiatedActivity"
2905                android:theme="@style/Theme.Holo.Dialog.Alert"
2906                android:excludeFromRecents="true"
2907                android:process=":ui">
2908        </activity>
2909
2910        <activity android:name="com.android.internal.app.RestrictionsPinActivity"
2911                android:theme="@style/Theme.Material.Light.Dialog.Alert"
2912                android:excludeFromRecents="true"
2913                android:windowSoftInputMode="adjustPan"
2914                android:process=":ui">
2915            <intent-filter android:priority="100">
2916                <action android:name="android.intent.action.RESTRICTIONS_CHALLENGE" />
2917                <category android:name="android.intent.category.DEFAULT" />
2918            </intent-filter>
2919        </activity>
2920
2921        <receiver android:name="com.android.server.BootReceiver"
2922                android:primaryUserOnly="true">
2923            <intent-filter android:priority="1000">
2924                <action android:name="android.intent.action.BOOT_COMPLETED" />
2925            </intent-filter>
2926        </receiver>
2927
2928        <receiver android:name="com.android.server.updates.CertPinInstallReceiver" >
2929            <intent-filter>
2930                <action android:name="android.intent.action.UPDATE_PINS" />
2931                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2932            </intent-filter>
2933        </receiver>
2934
2935        <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" >
2936            <intent-filter>
2937                <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
2938                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2939            </intent-filter>
2940        </receiver>
2941
2942        <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" >
2943            <intent-filter>
2944                <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
2945                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2946            </intent-filter>
2947        </receiver>
2948
2949        <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" >
2950            <intent-filter>
2951                <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
2952                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2953            </intent-filter>
2954        </receiver>
2955
2956        <receiver android:name="com.android.server.updates.TZInfoInstallReceiver" >
2957            <intent-filter>
2958                <action android:name="android.intent.action.UPDATE_TZINFO" />
2959                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2960            </intent-filter>
2961        </receiver>
2962
2963        <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" >
2964            <intent-filter>
2965                <action android:name="android.intent.action.UPDATE_SEPOLICY" />
2966                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2967            </intent-filter>
2968        </receiver>
2969
2970        <receiver android:name="com.android.server.MasterClearReceiver"
2971            android:permission="android.permission.MASTER_CLEAR">
2972            <intent-filter
2973                    android:priority="100" >
2974                <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR -->
2975                <action android:name="android.intent.action.MASTER_CLEAR" />
2976
2977                <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
2978                <action android:name="com.google.android.c2dm.intent.RECEIVE" />
2979                <category android:name="android.intent.category.MASTER_CLEAR" />
2980            </intent-filter>
2981        </receiver>
2982
2983        <service android:name="com.android.internal.os.storage.ExternalStorageFormatter"
2984            android:permission="android.permission.MASTER_CLEAR"
2985            android:exported="true" />
2986
2987        <service android:name="android.hardware.location.GeofenceHardwareService"
2988            android:permission="android.permission.LOCATION_HARDWARE"
2989            android:exported="false" />
2990
2991        <service android:name="com.android.internal.backup.LocalTransportService"
2992                android:permission="android.permission.CONFIRM_FULL_BACKUP"
2993                android:exported="false">
2994            <intent-filter>
2995                <action android:name="android.backup.TRANSPORT_HOST" />
2996            </intent-filter>
2997        </service>
2998
2999        <service android:name="com.android.server.MountServiceIdler"
3000                 android:exported="true"
3001                 android:permission="android.permission.BIND_JOB_SERVICE" >
3002        </service>
3003
3004        <service
3005            android:name="com.android.server.pm.BackgroundDexOptService"
3006            android:exported="true"
3007            android:permission="android.permission.BIND_JOB_SERVICE">
3008        </service>
3009
3010    </application>
3011
3012</manifest>
3013