AndroidManifest.xml revision 238fd930fc0131044d317d7c5ead756be89d1299
1<?xml version="1.0" encoding="utf-8"?> 2<!-- 3/* //device/apps/common/AndroidManifest.xml 4** 5** Copyright 2006, The Android Open Source Project 6** 7** Licensed under the Apache License, Version 2.0 (the "License"); 8** you may not use this file except in compliance with the License. 9** You may obtain a copy of the License at 10** 11** http://www.apache.org/licenses/LICENSE-2.0 12** 13** Unless required by applicable law or agreed to in writing, software 14** distributed under the License is distributed on an "AS IS" BASIS, 15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16** See the License for the specific language governing permissions and 17** limitations under the License. 18*/ 19--> 20<manifest xmlns:android="http://schemas.android.com/apk/res/android" 21 package="android" coreApp="true" android:sharedUserId="android.uid.system" 22 android:sharedUserLabel="@string/android_system_label"> 23 24 <!-- ================================================ --> 25 <!-- Special broadcasts that only the system can send --> 26 <!-- ================================================ --> 27 <eat-comment /> 28 29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" /> 30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" /> 31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" /> 32 <protected-broadcast android:name="android.intent.action.TIME_SET" /> 33 <protected-broadcast android:name="android.intent.action.TIME_TICK" /> 34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" /> 35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" /> 36 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" /> 37 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" /> 38 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" /> 39 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" /> 40 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" /> 41 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" /> 42 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" /> 43 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" /> 44 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" /> 45 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" /> 46 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" /> 47 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" /> 48 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" /> 49 <protected-broadcast android:name="android.intent.action.UID_REMOVED" /> 50 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" /> 51 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" /> 52 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" /> 53 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" /> 54 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" /> 55 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" /> 56 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" /> 57 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" /> 58 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" /> 59 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" /> 60 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" /> 61 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" /> 62 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" /> 63 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" /> 64 <protected-broadcast android:name="android.intent.action.REBOOT" /> 65 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" /> 66 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" /> 67 <protected-broadcast android:name="android.intent.action.USER_ADDED" /> 68 <protected-broadcast android:name="android.intent.action.USER_REMOVED" /> 69 <protected-broadcast android:name="android.intent.action.USER_STARTING" /> 70 <protected-broadcast android:name="android.intent.action.USER_STARTED" /> 71 <protected-broadcast android:name="android.intent.action.USER_STOPPING" /> 72 <protected-broadcast android:name="android.intent.action.USER_STOPPED" /> 73 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" /> 74 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" /> 75 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" /> 76 77 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" /> 78 79 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" /> 80 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" /> 81 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" /> 82 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" /> 83 84 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" /> 85 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" /> 86 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" /> 87 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" /> 88 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" /> 89 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" /> 90 91 <protected-broadcast android:name="android.backup.intent.RUN" /> 92 <protected-broadcast android:name="android.backup.intent.CLEAR" /> 93 <protected-broadcast android:name="android.backup.intent.INIT" /> 94 95 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" /> 96 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" /> 97 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" /> 98 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" /> 99 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" /> 100 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" /> 101 <protected-broadcast android:name="android.bluetooth.device.action.UUID" /> 102 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" /> 103 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" /> 104 <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" /> 105 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" /> 106 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" /> 107 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" /> 108 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" /> 109 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" /> 110 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" /> 111 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" /> 112 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" /> 113 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" /> 114 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" /> 115 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" /> 116 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" /> 117 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" /> 118 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" /> 119 <protected-broadcast 120 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" /> 121 <protected-broadcast 122 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" /> 123 <protected-broadcast 124 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" /> 125 <protected-broadcast 126 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" /> 127 <protected-broadcast 128 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" /> 129 <protected-broadcast 130 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" /> 131 <protected-broadcast 132 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" /> 133 <protected-broadcast 134 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" /> 135 <protected-broadcast 136 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" /> 137 <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" /> 138 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" /> 139 <protected-broadcast android:name="android.btopp.intent.action.BT_OPP_HANDOVER_STARTED" /> 140 <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" /> 141 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" /> 142 <protected-broadcast android:name="android.btopp.intent.action.BT_OPP_TRANSFER_PROGRESS" /> 143 <protected-broadcast android:name="android.btopp.intent.action.LIST" /> 144 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" /> 145 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" /> 146 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" /> 147 <protected-broadcast android:name="android.btopp.intent.action.HIDE" /> 148 <protected-broadcast android:name="android.btopp.intent.action.BT_OPP_TRANSFER_DONE" /> 149 <protected-broadcast android:name="android.btopp.intent.action.RETRY" /> 150 <protected-broadcast android:name="android.btopp.intent.action.OPEN" /> 151 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" /> 152 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" /> 153 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" /> 154 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" /> 155 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" /> 156 157 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" /> 158 159 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" /> 160 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 161 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 162 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" /> 163 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" /> 164 165 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" /> 166 <protected-broadcast android:name="android.intent.action.ANALOG_AUDIO_DOCK_PLUG" /> 167 <protected-broadcast android:name="android.intent.action.DIGITAL_AUDIO_DOCK_PLUG" /> 168 <protected-broadcast android:name="android.intent.action.HDMI_AUDIO_PLUG" /> 169 <protected-broadcast android:name="android.intent.action.USB_AUDIO_ACCESSORY_PLUG" /> 170 <protected-broadcast android:name="android.intent.action.USB_AUDIO_DEVICE_PLUG" /> 171 172 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" /> 173 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" /> 174 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" /> 175 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" /> 176 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" /> 177 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" /> 178 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" /> 179 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" /> 180 181 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" /> 182 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" /> 183 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" /> 184 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" /> 185 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" /> 186 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" /> 187 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" /> 188 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" /> 189 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" /> 190 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" /> 191 192 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" /> 193 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" /> 194 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" /> 195 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" /> 196 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" /> 197 198 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" /> 199 200 <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" /> 201 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" /> 202 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" /> 203 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" /> 204 205 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" /> 206 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" /> 207 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" /> 208 209 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" /> 210 211 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" /> 212 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" /> 213 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" /> 214 <protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" /> 215 216 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" /> 217 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" /> 218 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" /> 219 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" /> 220 <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" /> 221 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" /> 222 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" /> 223 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" /> 224 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" /> 225 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" /> 226 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" /> 227 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" /> 228 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" /> 229 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" /> 230 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" /> 231 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" /> 232 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" /> 233 <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" /> 234 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" /> 235 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" /> 236 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" /> 237 <protected-broadcast 238 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" /> 239 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" /> 240 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" /> 241 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" /> 242 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" /> 243 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" /> 244 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" /> 245 <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" /> 246 247 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" /> 248 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" /> 249 250 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" /> 251 252 <protected-broadcast android:name="android.intent.action.PHONE_STATE" /> 253 254 <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" /> 255 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" /> 256 <protected-broadcast android:name="android.location.MODE_CHANGED" /> 257 <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" /> 258 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" /> 259 260 <protected-broadcast 261 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" /> 262 263 <!-- ====================================== --> 264 <!-- Permissions for things that cost money --> 265 <!-- ====================================== --> 266 <eat-comment /> 267 268 <!-- Used for permissions that can be used to make the user spend money 269 without their direct involvement. --> 270 <permission-group android:name="android.permission-group.COST_MONEY" 271 android:label="@string/permgrouplab_costMoney" 272 android:description="@string/permgroupdesc_costMoney" /> 273 274 <!-- ================================== --> 275 <!-- Permissions for accessing messages --> 276 <!-- ================================== --> 277 <eat-comment /> 278 279 <!-- Used for permissions that allow an application to send messages 280 on behalf of the user or intercept messages being received by the 281 user. This is primarily intended for SMS/MMS messaging, such as 282 receiving or reading an MMS. --> 283 <permission-group android:name="android.permission-group.MESSAGES" 284 android:label="@string/permgrouplab_messages" 285 android:icon="@drawable/perm_group_messages" 286 android:description="@string/permgroupdesc_messages" 287 android:permissionGroupFlags="personalInfo" 288 android:priority="360"/> 289 290 <!-- Allows an application to send SMS messages. --> 291 <permission android:name="android.permission.SEND_SMS" 292 android:permissionGroup="android.permission-group.MESSAGES" 293 android:protectionLevel="dangerous" 294 android:permissionFlags="costsMoney" 295 android:label="@string/permlab_sendSms" 296 android:description="@string/permdesc_sendSms" /> 297 298 <!-- @SystemApi Allows an application (Phone) to send a request to other applications 299 to handle the respond-via-message action during incoming calls. 300 <p>Not for use by third-party applications. --> 301 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE" 302 android:permissionGroup="android.permission-group.MESSAGES" 303 android:protectionLevel="signature|system" 304 android:label="@string/permlab_sendRespondViaMessageRequest" 305 android:description="@string/permdesc_sendRespondViaMessageRequest" /> 306 307 <!-- Allows an application to monitor incoming SMS messages, to record 308 or perform processing on them. --> 309 <permission android:name="android.permission.RECEIVE_SMS" 310 android:permissionGroup="android.permission-group.MESSAGES" 311 android:protectionLevel="dangerous" 312 android:label="@string/permlab_receiveSms" 313 android:description="@string/permdesc_receiveSms" /> 314 315 <!-- Allows an application to monitor incoming MMS messages, to record 316 or perform processing on them. --> 317 <permission android:name="android.permission.RECEIVE_MMS" 318 android:permissionGroup="android.permission-group.MESSAGES" 319 android:protectionLevel="dangerous" 320 android:label="@string/permlab_receiveMms" 321 android:description="@string/permdesc_receiveMms" /> 322 323 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages, 324 to record or display them to the user. 325 <p>Not for use by third-party applications. 326 @hide Pending API council approval --> 327 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" 328 android:permissionGroup="android.permission-group.MESSAGES" 329 android:protectionLevel="signature|system" 330 android:label="@string/permlab_receiveEmergencyBroadcast" 331 android:description="@string/permdesc_receiveEmergencyBroadcast" /> 332 333 <!-- Allows an application to read previously received cell broadcast 334 messages and to register a content observer to get notifications when 335 a cell broadcast has been received and added to the database. For 336 emergency alerts, the database is updated immediately after the 337 alert dialog and notification sound/vibration/speech are presented. 338 The "read" column is then updated after the user dismisses the alert. 339 This enables supplementary emergency assistance apps to start loading 340 additional emergency information (if Internet access is available) 341 when the alert is first received, and to delay presenting the info 342 to the user until after the initial alert dialog is dismissed. 343 @hide Pending API council approval --> 344 <permission android:name="android.permission.READ_CELL_BROADCASTS" 345 android:permissionGroup="android.permission-group.MESSAGES" 346 android:protectionLevel="dangerous" 347 android:label="@string/permlab_readCellBroadcasts" 348 android:description="@string/permdesc_readCellBroadcasts" /> 349 350 <!-- Allows an application to read SMS messages. --> 351 <permission android:name="android.permission.READ_SMS" 352 android:permissionGroup="android.permission-group.MESSAGES" 353 android:protectionLevel="dangerous" 354 android:label="@string/permlab_readSms" 355 android:description="@string/permdesc_readSms" /> 356 357 <!-- Allows an application to write SMS messages. --> 358 <permission android:name="android.permission.WRITE_SMS" 359 android:permissionGroup="android.permission-group.MESSAGES" 360 android:protectionLevel="dangerous" 361 android:label="@string/permlab_writeSms" 362 android:description="@string/permdesc_writeSms" /> 363 364 <!-- Allows an application to monitor incoming WAP push messages. --> 365 <permission android:name="android.permission.RECEIVE_WAP_PUSH" 366 android:permissionGroup="android.permission-group.MESSAGES" 367 android:protectionLevel="dangerous" 368 android:label="@string/permlab_receiveWapPush" 369 android:description="@string/permdesc_receiveWapPush" /> 370 371 <!-- =============================================================== --> 372 <!-- Permissions for accessing social info (contacts and social) --> 373 <!-- =============================================================== --> 374 <eat-comment /> 375 376 <!-- Used for permissions that provide access to the user's social connections, 377 such as contacts, call logs, social stream, etc. This includes 378 both reading and writing of this data (which should generally be 379 expressed as two distinct permissions). --> 380 381 <permission-group android:name="android.permission-group.SOCIAL_INFO" 382 android:label="@string/permgrouplab_socialInfo" 383 android:icon="@drawable/perm_group_social_info" 384 android:description="@string/permgroupdesc_socialInfo" 385 android:permissionGroupFlags="personalInfo" 386 android:priority="320" /> 387 388 <!-- Allows an application to read the user's contacts data. --> 389 <permission android:name="android.permission.READ_CONTACTS" 390 android:permissionGroup="android.permission-group.SOCIAL_INFO" 391 android:protectionLevel="dangerous" 392 android:label="@string/permlab_readContacts" 393 android:description="@string/permdesc_readContacts" /> 394 395 <!-- Allows an application to write (but not read) the user's 396 contacts data. --> 397 <permission android:name="android.permission.WRITE_CONTACTS" 398 android:permissionGroup="android.permission-group.SOCIAL_INFO" 399 android:protectionLevel="dangerous" 400 android:label="@string/permlab_writeContacts" 401 android:description="@string/permdesc_writeContacts" /> 402 403 <!-- @SystemApi @hide Allows an application to execute contacts directory search. 404 This should only be used by ContactsProvider. 405 <p>Not for use by third-party applications. --> 406 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH" 407 android:permissionGroup="android.permission-group.PERSONAL_INFO" 408 android:protectionLevel="signature|system" /> 409 410 <!-- Allows an application to read the user's call log. 411 <p class="note"><strong>Note:</strong> If your app uses the 412 {@link #READ_CONTACTS} permission and <em>both</em> your <a 413 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 414 minSdkVersion}</a> and <a 415 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 416 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 417 grants your app this permission. If you don't need this permission, be sure your <a 418 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 419 targetSdkVersion}</a> is 16 or higher.</p> --> 420 <permission android:name="android.permission.READ_CALL_LOG" 421 android:permissionGroup="android.permission-group.SOCIAL_INFO" 422 android:protectionLevel="dangerous" 423 android:label="@string/permlab_readCallLog" 424 android:description="@string/permdesc_readCallLog" /> 425 426 <!-- Allows an application to write (but not read) the user's 427 contacts data. 428 <p class="note"><strong>Note:</strong> If your app uses the 429 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a 430 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 431 minSdkVersion}</a> and <a 432 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 433 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 434 grants your app this permission. If you don't need this permission, be sure your <a 435 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 436 targetSdkVersion}</a> is 16 or higher.</p> --> 437 <permission android:name="android.permission.WRITE_CALL_LOG" 438 android:permissionGroup="android.permission-group.SOCIAL_INFO" 439 android:protectionLevel="dangerous" 440 android:label="@string/permlab_writeCallLog" 441 android:description="@string/permdesc_writeCallLog" /> 442 443 <!-- Allows an application to read from the user's social stream. --> 444 <permission android:name="android.permission.READ_SOCIAL_STREAM" 445 android:permissionGroup="android.permission-group.SOCIAL_INFO" 446 android:protectionLevel="dangerous" 447 android:label="@string/permlab_readSocialStream" 448 android:description="@string/permdesc_readSocialStream" /> 449 450 <!-- Allows an application to write (but not read) the user's 451 social stream data. --> 452 <permission android:name="android.permission.WRITE_SOCIAL_STREAM" 453 android:permissionGroup="android.permission-group.SOCIAL_INFO" 454 android:protectionLevel="dangerous" 455 android:label="@string/permlab_writeSocialStream" 456 android:description="@string/permdesc_writeSocialStream" /> 457 458 <!-- =============================================================== --> 459 <!-- Permissions for accessing information about the device owner --> 460 <!-- =============================================================== --> 461 <eat-comment /> 462 463 <!-- Used for permissions that provide access to information about the device 464 user such as profile information. This includes both reading and 465 writing of this data (which should generally be expressed as two 466 distinct permissions). --> 467 <permission-group android:name="android.permission-group.PERSONAL_INFO" 468 android:label="@string/permgrouplab_personalInfo" 469 android:icon="@drawable/perm_group_personal_info" 470 android:description="@string/permgroupdesc_personalInfo" 471 android:permissionGroupFlags="personalInfo" 472 android:priority="310" /> 473 474 <!-- Allows an application to read the user's personal profile data. --> 475 <permission android:name="android.permission.READ_PROFILE" 476 android:permissionGroup="android.permission-group.PERSONAL_INFO" 477 android:protectionLevel="dangerous" 478 android:label="@string/permlab_readProfile" 479 android:description="@string/permdesc_readProfile" /> 480 481 <!-- Allows an application to write (but not read) the user's 482 personal profile data. --> 483 <permission android:name="android.permission.WRITE_PROFILE" 484 android:permissionGroup="android.permission-group.PERSONAL_INFO" 485 android:protectionLevel="dangerous" 486 android:label="@string/permlab_writeProfile" 487 android:description="@string/permdesc_writeProfile" /> 488 489 <!-- Allows an application to access data from sensors that the user uses to 490 measure what is happening inside his/her body, such as heart rate. --> 491 <permission android:name="android.permission.BODY_SENSORS" 492 android:permissionGroup="android.permission-group.PERSONAL_INFO" 493 android:label="@string/permlab_bodySensors" 494 android:description="@string/permdesc_bodySensors" /> 495 496 <!-- =============================================================== --> 497 <!-- Permissions for accessing the device calendar --> 498 <!-- =============================================================== --> 499 <eat-comment /> 500 501 <!-- Used for permissions that provide access to the device 502 calendar to create / view events.--> 503 <permission-group android:name="android.permission-group.CALENDAR" 504 android:label="@string/permgrouplab_calendar" 505 android:icon="@drawable/perm_group_calendar" 506 android:description="@string/permgroupdesc_calendar" 507 android:permissionGroupFlags="personalInfo" 508 android:priority="290" /> 509 510 <!-- Allows an application to read the user's calendar data. --> 511 <permission android:name="android.permission.READ_CALENDAR" 512 android:permissionGroup="android.permission-group.PERSONAL_INFO" 513 android:protectionLevel="dangerous" 514 android:label="@string/permlab_readCalendar" 515 android:description="@string/permdesc_readCalendar" /> 516 517 <!-- Allows an application to write (but not read) the user's 518 calendar data. --> 519 <permission android:name="android.permission.WRITE_CALENDAR" 520 android:permissionGroup="android.permission-group.PERSONAL_INFO" 521 android:protectionLevel="dangerous" 522 android:label="@string/permlab_writeCalendar" 523 android:description="@string/permdesc_writeCalendar" /> 524 525 <!-- =============================================================== --> 526 <!-- Permissions for accessing the user dictionary--> 527 <!-- =============================================================== --> 528 <eat-comment /> 529 530 <!-- Used for permissions that provide access to the user 531 calendar to create / view events.--> 532 <permission-group android:name="android.permission-group.USER_DICTIONARY" 533 android:label="@string/permgrouplab_dictionary" 534 android:icon="@drawable/perm_group_user_dictionary" 535 android:description="@string/permgroupdesc_dictionary" 536 android:permissionGroupFlags="personalInfo" 537 android:priority="170" /> 538 539 <!-- Allows an application to read the user dictionary. This should 540 really only be required by an IME, or a dictionary editor like 541 the Settings app. --> 542 <permission android:name="android.permission.READ_USER_DICTIONARY" 543 android:permissionGroup="android.permission-group.USER_DICTIONARY" 544 android:protectionLevel="dangerous" 545 android:label="@string/permlab_readDictionary" 546 android:description="@string/permdesc_readDictionary" /> 547 548 <!-- Used for permissions that provide access to the user 549 calendar to create / view events.--> 550 <permission-group android:name="android.permission-group.WRITE_USER_DICTIONARY" 551 android:label="@string/permgrouplab_writeDictionary" 552 android:icon="@drawable/perm_group_user_dictionary_write" 553 android:description="@string/permgroupdesc_writeDictionary" 554 android:priority="160" /> 555 556 <!-- Allows an application to write to the user dictionary. --> 557 <permission android:name="android.permission.WRITE_USER_DICTIONARY" 558 android:permissionGroup="android.permission-group.WRITE_USER_DICTIONARY" 559 android:protectionLevel="normal" 560 android:label="@string/permlab_writeDictionary" 561 android:description="@string/permdesc_writeDictionary" /> 562 563 <!-- =============================================================== --> 564 <!-- Permissions for accessing the user bookmarks --> 565 <!-- =============================================================== --> 566 <eat-comment /> 567 568 <!-- Used for permissions that provide access to the user 569 bookmarks and browser history.--> 570 <permission-group android:name="android.permission-group.BOOKMARKS" 571 android:label="@string/permgrouplab_bookmarks" 572 android:icon="@drawable/perm_group_bookmarks" 573 android:description="@string/permgroupdesc_bookmarks" 574 android:permissionGroupFlags="personalInfo" 575 android:priority="300" /> 576 577 <!-- Allows an application to read (but not write) the user's 578 browsing history and bookmarks. --> 579 <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS" 580 android:permissionGroup="android.permission-group.BOOKMARKS" 581 android:label="@string/permlab_readHistoryBookmarks" 582 android:description="@string/permdesc_readHistoryBookmarks" 583 android:protectionLevel="dangerous" /> 584 585 <!-- Allows an application to write (but not read) the user's 586 browsing history and bookmarks. --> 587 <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS" 588 android:permissionGroup="android.permission-group.BOOKMARKS" 589 android:label="@string/permlab_writeHistoryBookmarks" 590 android:description="@string/permdesc_writeHistoryBookmarks" 591 android:protectionLevel="dangerous" /> 592 593 <!-- =============================================================== --> 594 <!-- Permissions for setting the device alarm --> 595 <!-- =============================================================== --> 596 <eat-comment /> 597 598 <!-- Used for permissions that provide access to device alarms. --> 599 <permission-group android:name="android.permission-group.DEVICE_ALARMS" 600 android:label="@string/permgrouplab_deviceAlarms" 601 android:icon="@drawable/perm_group_device_alarms" 602 android:description="@string/permgroupdesc_deviceAlarms" 603 android:permissionGroupFlags="personalInfo" 604 android:priority="210" /> 605 606 <!-- Allows an application to broadcast an Intent to set an alarm for the 607 user. --> 608 <permission android:name="com.android.alarm.permission.SET_ALARM" 609 android:permissionGroup="android.permission-group.DEVICE_ALARMS" 610 android:label="@string/permlab_setAlarm" 611 android:description="@string/permdesc_setAlarm" 612 android:protectionLevel="normal" /> 613 614 <!-- =============================================================== --> 615 <!-- Permissions for accessing the user voicemail --> 616 <!-- =============================================================== --> 617 <eat-comment /> 618 619 <!-- Used for permissions that provide access to the user voicemail box. --> 620 <permission-group android:name="android.permission-group.VOICEMAIL" 621 android:label="@string/permgrouplab_voicemail" 622 android:icon="@drawable/perm_group_voicemail" 623 android:description="@string/permgroupdesc_voicemail" 624 android:permissionGroupFlags="personalInfo" 625 android:priority="280" /> 626 627 <!-- Allows an application to add voicemails into the system. --> 628 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL" 629 android:permissionGroup="android.permission-group.VOICEMAIL" 630 android:protectionLevel="dangerous" 631 android:label="@string/permlab_addVoicemail" 632 android:description="@string/permdesc_addVoicemail" /> 633 634 <!-- =============================================== --> 635 <!-- Permissions for enabling accessibility features --> 636 <!-- =============================================== --> 637 <eat-comment /> 638 639 <!-- Used for permissions that allow requesting certain accessibility features. --> 640 <permission-group android:name="android.permission-group.ACCESSIBILITY_FEATURES" 641 android:label="@string/permgrouplab_accessibilityFeatures" 642 android:icon="@drawable/perm_group_accessibility_features" 643 android:description="@string/permgroupdesc_accessibilityFeatures" 644 android:priority="380" /> 645 646 <!-- ======================================= --> 647 <!-- Permissions for accessing location info --> 648 <!-- ======================================= --> 649 <eat-comment /> 650 651 <!-- Used for permissions that allow access to the user's current 652 location. --> 653 <permission-group android:name="android.permission-group.LOCATION" 654 android:label="@string/permgrouplab_location" 655 android:icon="@drawable/perm_group_location" 656 android:description="@string/permgroupdesc_location" 657 android:permissionGroupFlags="personalInfo" 658 android:priority="330" /> 659 660 <!-- Allows an app to access precise location from location sources such 661 as GPS, cell towers, and Wi-Fi. --> 662 <permission android:name="android.permission.ACCESS_FINE_LOCATION" 663 android:permissionGroup="android.permission-group.LOCATION" 664 android:protectionLevel="dangerous" 665 android:label="@string/permlab_accessFineLocation" 666 android:description="@string/permdesc_accessFineLocation" /> 667 668 <!-- Allows an app to access approximate location derived from network location 669 sources such as cell towers and Wi-Fi. --> 670 <permission android:name="android.permission.ACCESS_COARSE_LOCATION" 671 android:permissionGroup="android.permission-group.LOCATION" 672 android:protectionLevel="dangerous" 673 android:label="@string/permlab_accessCoarseLocation" 674 android:description="@string/permdesc_accessCoarseLocation" /> 675 676 <!-- Allows an application to create mock location providers for testing --> 677 <permission android:name="android.permission.ACCESS_MOCK_LOCATION" 678 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 679 android:protectionLevel="dangerous" 680 android:label="@string/permlab_accessMockLocation" 681 android:description="@string/permdesc_accessMockLocation" /> 682 683 <!-- Allows an application to access extra location provider commands --> 684 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" 685 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 686 android:protectionLevel="normal" 687 android:label="@string/permlab_accessLocationExtraCommands" 688 android:description="@string/permdesc_accessLocationExtraCommands" /> 689 690 <!-- @SystemApi Allows an application to install a location provider into the Location Manager. 691 <p>Not for use by third-party applications. --> 692 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER" 693 android:protectionLevel="signature|system" 694 android:label="@string/permlab_installLocationProvider" 695 android:description="@string/permdesc_installLocationProvider" /> 696 697 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files. 698 This should only be used by HDMI-CEC service. 699 --> 700 <permission android:name="android.permission.HDMI_CEC" 701 android:protectionLevel="signatureOrSystem" /> 702 703 <!-- @SystemApi Allows an application to use location features in hardware, 704 such as the geofencing api. 705 <p>Not for use by third-party applications. --> 706 <permission android:name="android.permission.LOCATION_HARDWARE" 707 android:permissionGroup="android.permission-group.LOCATION" 708 android:protectionLevel="signature|system" /> 709 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/> 710 711 <!-- ======================================= --> 712 <!-- Permissions for accessing networks --> 713 <!-- ======================================= --> 714 <eat-comment /> 715 716 <!-- Used for permissions that provide access to networking services. The 717 main permission here is internet access, but this is also an 718 appropriate group for accessing or modifying any network configuration 719 or other related network operations. --> 720 <permission-group android:name="android.permission-group.NETWORK" 721 android:label="@string/permgrouplab_network" 722 android:icon="@drawable/perm_group_network" 723 android:description="@string/permgroupdesc_network" 724 android:priority="270" /> 725 726 <!-- Allows applications to open network sockets. --> 727 <permission android:name="android.permission.INTERNET" 728 android:permissionGroup="android.permission-group.NETWORK" 729 android:protectionLevel="dangerous" 730 android:description="@string/permdesc_createNetworkSockets" 731 android:label="@string/permlab_createNetworkSockets" /> 732 733 <!-- Allows applications to access information about networks --> 734 <permission android:name="android.permission.ACCESS_NETWORK_STATE" 735 android:permissionGroup="android.permission-group.NETWORK" 736 android:protectionLevel="normal" 737 android:description="@string/permdesc_accessNetworkState" 738 android:label="@string/permlab_accessNetworkState" /> 739 740 <!-- Allows applications to access information about Wi-Fi networks --> 741 <permission android:name="android.permission.ACCESS_WIFI_STATE" 742 android:permissionGroup="android.permission-group.NETWORK" 743 android:protectionLevel="normal" 744 android:description="@string/permdesc_accessWifiState" 745 android:label="@string/permlab_accessWifiState" /> 746 747 <!-- Allows applications to change Wi-Fi connectivity state --> 748 <permission android:name="android.permission.CHANGE_WIFI_STATE" 749 android:permissionGroup="android.permission-group.NETWORK" 750 android:protectionLevel="dangerous" 751 android:description="@string/permdesc_changeWifiState" 752 android:label="@string/permlab_changeWifiState" /> 753 754 <!-- @hide --> 755 <permission android:name="android.permission.ACCESS_WIMAX_STATE" 756 android:permissionGroup="android.permission-group.NETWORK" 757 android:protectionLevel="normal" 758 android:description="@string/permdesc_accessWimaxState" 759 android:label="@string/permlab_accessWimaxState" /> 760 761 <!-- @hide --> 762 <permission android:name="android.permission.CHANGE_WIMAX_STATE" 763 android:permissionGroup="android.permission-group.NETWORK" 764 android:protectionLevel="dangerous" 765 android:description="@string/permdesc_changeWimaxState" 766 android:label="@string/permlab_changeWimaxState" /> 767 768 <!-- Allows applications to act as network scorers. @hide --> 769 <permission android:name="android.permission.SCORE_NETWORKS" 770 android:permissionGroup="android.permission-group.NETWORK" 771 android:protectionLevel="normal" 772 android:description="@string/permdesc_scoreNetworks" 773 android:label="@string/permlab_scoreNetworks" /> 774 775 <!-- ======================================= --> 776 <!-- Permissions for short range, peripheral networks --> 777 <!-- ======================================= --> 778 <eat-comment /> 779 780 <!-- Used for permissions that provide access to other devices through Bluetooth.--> 781 <permission-group android:name="android.permission-group.BLUETOOTH_NETWORK" 782 android:label="@string/permgrouplab_bluetoothNetwork" 783 android:icon="@drawable/perm_group_bluetooth" 784 android:description="@string/permgroupdesc_bluetoothNetwork" 785 android:priority="260" /> 786 787 <!-- Allows applications to connect to paired bluetooth devices --> 788 <permission android:name="android.permission.BLUETOOTH" 789 android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK" 790 android:protectionLevel="dangerous" 791 android:description="@string/permdesc_bluetooth" 792 android:label="@string/permlab_bluetooth" /> 793 794 <!-- Allows applications to discover and pair bluetooth devices --> 795 <permission android:name="android.permission.BLUETOOTH_ADMIN" 796 android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK" 797 android:protectionLevel="dangerous" 798 android:description="@string/permdesc_bluetoothAdmin" 799 android:label="@string/permlab_bluetoothAdmin" /> 800 801 <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction. 802 This is not available to third party applications. --> 803 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED" 804 android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK" 805 android:protectionLevel="system|signature" 806 android:description="@string/permdesc_bluetoothPriv" 807 android:label="@string/permlab_bluetoothPriv" /> 808 809 <!-- Allows bluetooth stack to access files 810 @hide This should only be used by Bluetooth apk. 811 --> 812 <permission android:name="android.permission.BLUETOOTH_STACK" 813 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 814 android:protectionLevel="signature" /> 815 816 <!-- Allows applications to perform I/O operations over NFC --> 817 <permission android:name="android.permission.NFC" 818 android:permissionGroup="android.permission-group.NETWORK" 819 android:protectionLevel="dangerous" 820 android:description="@string/permdesc_nfc" 821 android:label="@string/permlab_nfc" /> 822 823 <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs. 824 @hide --> 825 <permission android:name="android.permission.CONNECTIVITY_INTERNAL" 826 android:permissionGroup="android.permission-group.NETWORK" 827 android:protectionLevel="signature|system" /> 828 829 <!-- @SystemApi @hide --> 830 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE" 831 android:permissionGroup="android.permission-group.NETWORK" 832 android:protectionLevel="signature|system" /> 833 834 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device. 835 @hide --> 836 <permission android:name="android.permission.LOOP_RADIO" 837 android:permissionGroup="android.permission-group.NETWORK" 838 android:protectionLevel="signature|system" /> 839 840 <!-- ================================== --> 841 <!-- Permissions for accessing accounts --> 842 <!-- ================================== --> 843 <eat-comment /> 844 845 <!-- Permissions for direct access to the accounts managed 846 by the Account Manager. --> 847 <permission-group android:name="android.permission-group.ACCOUNTS" 848 android:label="@string/permgrouplab_accounts" 849 android:icon="@drawable/perm_group_accounts" 850 android:description="@string/permgroupdesc_accounts" 851 android:permissionGroupFlags="personalInfo" 852 android:priority="200" /> 853 854 <!-- Allows access to the list of accounts in the Accounts Service --> 855 <permission android:name="android.permission.GET_ACCOUNTS" 856 android:permissionGroup="android.permission-group.ACCOUNTS" 857 android:protectionLevel="normal" 858 android:description="@string/permdesc_getAccounts" 859 android:label="@string/permlab_getAccounts" /> 860 861 <!-- Allows an application to act as an AccountAuthenticator for 862 the AccountManager --> 863 <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS" 864 android:permissionGroup="android.permission-group.ACCOUNTS" 865 android:protectionLevel="dangerous" 866 android:label="@string/permlab_authenticateAccounts" 867 android:description="@string/permdesc_authenticateAccounts" /> 868 869 <!-- Allows an application to request authtokens from the AccountManager --> 870 <permission android:name="android.permission.USE_CREDENTIALS" 871 android:permissionGroup="android.permission-group.ACCOUNTS" 872 android:protectionLevel="dangerous" 873 android:label="@string/permlab_useCredentials" 874 android:description="@string/permdesc_useCredentials" /> 875 876 <!-- Allows an application to manage the list of accounts in the AccountManager --> 877 <permission android:name="android.permission.MANAGE_ACCOUNTS" 878 android:permissionGroup="android.permission-group.ACCOUNTS" 879 android:protectionLevel="dangerous" 880 android:label="@string/permlab_manageAccounts" 881 android:description="@string/permdesc_manageAccounts" /> 882 883 <!-- @SystemApi Allows applications to call into AccountAuthenticators. 884 <p>Not for use by third-party applications. --> 885 <permission android:name="android.permission.ACCOUNT_MANAGER" 886 android:permissionGroup="android.permission-group.ACCOUNTS" 887 android:protectionLevel="signature" 888 android:description="@string/permdesc_accountManagerService" 889 android:label="@string/permlab_accountManagerService" /> 890 891 <!-- ================================== --> 892 <!-- Permissions for accessing hardware that may effect battery life--> 893 <!-- ================================== --> 894 <eat-comment /> 895 896 <!-- Used for permissions that provide direct access to the hardware on 897 the device that has an effect on battery life. This includes vibrator, 898 flashlight, etc. --> 899 900 <permission-group android:name="android.permission-group.AFFECTS_BATTERY" 901 android:label="@string/permgrouplab_affectsBattery" 902 android:icon="@drawable/perm_group_affects_battery" 903 android:description="@string/permgroupdesc_affectsBattery" 904 android:priority="180" /> 905 906 <!-- Allows applications to enter Wi-Fi Multicast mode --> 907 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE" 908 android:permissionGroup="android.permission-group.AFFECTS_BATTERY" 909 android:protectionLevel="dangerous" 910 android:description="@string/permdesc_changeWifiMulticastState" 911 android:label="@string/permlab_changeWifiMulticastState" /> 912 913 <!-- Allows access to the vibrator --> 914 <permission android:name="android.permission.VIBRATE" 915 android:permissionGroup="android.permission-group.AFFECTS_BATTERY" 916 android:protectionLevel="normal" 917 android:label="@string/permlab_vibrate" 918 android:description="@string/permdesc_vibrate" /> 919 920 <!-- Allows access to the flashlight --> 921 <permission android:name="android.permission.FLASHLIGHT" 922 android:permissionGroup="android.permission-group.AFFECTS_BATTERY" 923 android:protectionLevel="normal" 924 android:label="@string/permlab_flashlight" 925 android:description="@string/permdesc_flashlight" /> 926 927 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen 928 from dimming --> 929 <permission android:name="android.permission.WAKE_LOCK" 930 android:permissionGroup="android.permission-group.AFFECTS_BATTERY" 931 android:protectionLevel="normal" 932 android:label="@string/permlab_wakeLock" 933 android:description="@string/permdesc_wakeLock" /> 934 935 <!-- Allows using the device's IR transmitter, if available --> 936 <permission android:name="android.permission.TRANSMIT_IR" 937 android:permissionGroup="android.permission-group.AFFECTS_BATTERY" 938 android:protectionLevel="normal" 939 android:label="@string/permlab_transmitIr" 940 android:description="@string/permdesc_transmitIr" /> 941 942 <!-- ==================================================== --> 943 <!-- Permissions related to changing audio settings --> 944 <!-- ==================================================== --> 945 <eat-comment /> 946 947 <!-- Used for permissions that provide direct access to speaker settings 948 the device. --> 949 <permission-group android:name="android.permission-group.AUDIO_SETTINGS" 950 android:label="@string/permgrouplab_audioSettings" 951 android:icon="@drawable/perm_group_audio_settings" 952 android:description="@string/permgroupdesc_audioSettings" 953 android:priority="130" /> 954 955 <!-- Allows an application to modify global audio settings --> 956 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" 957 android:permissionGroup="android.permission-group.AUDIO_SETTINGS" 958 android:protectionLevel="normal" 959 android:label="@string/permlab_modifyAudioSettings" 960 android:description="@string/permdesc_modifyAudioSettings" /> 961 962 <!-- ================================== --> 963 <!-- Permissions for accessing hardware --> 964 <!-- ================================== --> 965 <eat-comment /> 966 967 <!-- Used for permissions that provide direct access to the hardware on 968 the device. This includes audio, the camera, vibrator, etc. --> 969 <permission-group android:name="android.permission-group.HARDWARE_CONTROLS" 970 android:label="@string/permgrouplab_hardwareControls" 971 android:description="@string/permgroupdesc_hardwareControls" 972 android:priority="260"/> 973 974 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices 975 @hide --> 976 <permission android:name="android.permission.MANAGE_USB" 977 android:permissionGroup="android.permission-group.HARDWARE_CONTROLS" 978 android:protectionLevel="signature|system" 979 android:label="@string/permlab_manageUsb" 980 android:description="@string/permdesc_manageUsb" /> 981 982 <!-- @SystemApi Allows an application to access the MTP USB kernel driver. 983 For use only by the device side MTP implementation. 984 @hide --> 985 <permission android:name="android.permission.ACCESS_MTP" 986 android:permissionGroup="android.permission-group.HARDWARE_CONTROLS" 987 android:protectionLevel="signature|system" 988 android:label="@string/permlab_accessMtp" 989 android:description="@string/permdesc_accessMtp" /> 990 991 <!-- Allows access to hardware peripherals. Intended only for hardware testing. 992 <p>Not for use by third-party applications. --> 993 <permission android:name="android.permission.HARDWARE_TEST" 994 android:permissionGroup="android.permission-group.HARDWARE_CONTROLS" 995 android:protectionLevel="signature" 996 android:label="@string/permlab_hardware_test" 997 android:description="@string/permdesc_hardware_test" /> 998 999 <!-- Allows access to configure network interfaces, configure/use IPSec, etc. 1000 @hide --> 1001 <permission android:name="android.permission.NET_ADMIN" 1002 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1003 android:protectionLevel="signature" /> 1004 1005 <!-- Allows registration for remote audio playback. @hide --> 1006 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK" 1007 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1008 android:protectionLevel="signature" /> 1009 1010 <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as 1011 built-in tuners and HDMI-in's. 1012 @hide This should only be used by OEM's TvInputService's. 1013 --> 1014 <permission android:name="android.permission.TV_INPUT_HARDWARE" 1015 android:protectionLevel="signatureOrSystem" /> 1016 1017 <!-- =========================================== --> 1018 <!-- Permissions associated with audio capture --> 1019 <!-- =========================================== --> 1020 <eat-comment /> 1021 1022 <!-- Used for permissions that are associated with accessing 1023 microphone audio from the device. Note that phone calls also capture audio 1024 but are in a separate (more visible) permission group. --> 1025 <permission-group android:name="android.permission-group.MICROPHONE" 1026 android:label="@string/permgrouplab_microphone" 1027 android:icon="@drawable/perm_group_microphone" 1028 android:description="@string/permgroupdesc_microphone" 1029 android:permissionGroupFlags="personalInfo" 1030 android:priority="340" /> 1031 1032 <!-- Allows an application to record audio --> 1033 <permission android:name="android.permission.RECORD_AUDIO" 1034 android:permissionGroup="android.permission-group.MICROPHONE" 1035 android:protectionLevel="dangerous" 1036 android:label="@string/permlab_recordAudio" 1037 android:description="@string/permdesc_recordAudio" /> 1038 1039 1040 <!-- =========================================== --> 1041 <!-- Permissions associated with camera and image capture --> 1042 <!-- =========================================== --> 1043 <eat-comment /> 1044 1045 <!-- Used for permissions that are associated with accessing 1046 camera or capturing images/video from the device. --> 1047 <permission-group android:name="android.permission-group.CAMERA" 1048 android:label="@string/permgrouplab_camera" 1049 android:icon="@drawable/perm_group_camera" 1050 android:description="@string/permgroupdesc_camera" 1051 android:permissionGroupFlags="personalInfo" 1052 android:priority="350" /> 1053 1054 <!-- Required to be able to access the camera device. 1055 <p>This will automatically enforce the <a 1056 href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code 1057 <uses-feature>}</a> manifest element for <em>all</em> camera features. 1058 If you do not require all camera features or can properly operate if a camera 1059 is not available, then you must modify your manifest as appropriate in order to 1060 install on devices that don't support all camera features.</p> --> 1061 <permission android:name="android.permission.CAMERA" 1062 android:permissionGroup="android.permission-group.CAMERA" 1063 android:protectionLevel="dangerous" 1064 android:label="@string/permlab_camera" 1065 android:description="@string/permdesc_camera" /> 1066 1067 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when 1068 a camera is in use by an application. 1069 @hide --> 1070 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED" 1071 android:permissionGroup="android.permission-group.CAMERA" 1072 android:protectionLevel="signature|system" 1073 android:label="@string/permlab_cameraDisableTransmitLed" 1074 android:description="@string/permdesc_cameraDisableTransmitLed" /> 1075 1076 <!-- =========================================== --> 1077 <!-- Permissions associated with telephony state --> 1078 <!-- =========================================== --> 1079 <eat-comment /> 1080 1081 <!-- Used for permissions that are associated with accessing and modifying 1082 telephony state: placing calls, intercepting outgoing calls, reading 1083 and modifying the phone state. --> 1084 <permission-group android:name="android.permission-group.PHONE_CALLS" 1085 android:label="@string/permgrouplab_phoneCalls" 1086 android:icon="@drawable/perm_group_phone_calls" 1087 android:description="@string/permgroupdesc_phoneCalls" 1088 android:permissionGroupFlags="personalInfo" 1089 android:priority="370" /> 1090 1091 <!-- Allows an application to see the number being dialed during an outgoing 1092 call with the option to redirect the call to a different number or 1093 abort the call altogether. --> 1094 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS" 1095 android:permissionGroup="android.permission-group.PHONE_CALLS" 1096 android:protectionLevel="dangerous" 1097 android:label="@string/permlab_processOutgoingCalls" 1098 android:description="@string/permdesc_processOutgoingCalls" /> 1099 1100 <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc. 1101 Does not include placing calls. 1102 <p>Not for use by third-party applications. --> 1103 <permission android:name="android.permission.MODIFY_PHONE_STATE" 1104 android:permissionGroup="android.permission-group.PHONE_CALLS" 1105 android:protectionLevel="signature|system" 1106 android:label="@string/permlab_modifyPhoneState" 1107 android:description="@string/permdesc_modifyPhoneState" /> 1108 1109 <!-- Allows read only access to phone state. 1110 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 1111 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 1112 minSdkVersion}</a> and <a 1113 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1114 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 1115 grants your app this permission. If you don't need this permission, be sure your <a 1116 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1117 targetSdkVersion}</a> is 4 or higher. --> 1118 <permission android:name="android.permission.READ_PHONE_STATE" 1119 android:permissionGroup="android.permission-group.PHONE_CALLS" 1120 android:protectionLevel="dangerous" 1121 android:label="@string/permlab_readPhoneState" 1122 android:description="@string/permdesc_readPhoneState" /> 1123 1124 <!-- Allows read only access to precise phone state. 1125 @hide Pending API council approval --> 1126 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE" 1127 android:permissionGroup="android.permission-group.PHONE_CALLS" 1128 android:protectionLevel="dangerous" 1129 android:label="@string/permlab_readPrecisePhoneState" 1130 android:description="@string/permdesc_readPrecisePhoneState" /> 1131 1132 <!-- @SystemApi Allows read access to privileged phone state. 1133 @hide Used internally. --> 1134 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" 1135 android:permissionGroup="android.permission-group.PHONE_CALLS" 1136 android:protectionLevel="signature|system" /> 1137 1138 <!-- Allows an application to initiate a phone call without going through 1139 the Dialer user interface for the user to confirm the call 1140 being placed. --> 1141 <permission android:name="android.permission.CALL_PHONE" 1142 android:permissionGroup="android.permission-group.PHONE_CALLS" 1143 android:protectionLevel="dangerous" 1144 android:permissionFlags="costsMoney" 1145 android:label="@string/permlab_callPhone" 1146 android:description="@string/permdesc_callPhone" /> 1147 1148 <!-- Allows an application to use SIP service --> 1149 <permission android:name="android.permission.USE_SIP" 1150 android:permissionGroup="android.permission-group.PHONE_CALLS" 1151 android:protectionLevel="dangerous" 1152 android:description="@string/permdesc_use_sip" 1153 android:label="@string/permlab_use_sip" /> 1154 1155 <!-- @SystemApi Allows an application to request CallHandlerService implementations. 1156 @hide --> 1157 <permission android:name="android.permission.BIND_CALL_SERVICE" 1158 android:permissionGroup="android.permission-group.PHONE_CALLS" 1159 android:protectionLevel="system|signature" 1160 android:description="@string/permdesc_bind_call_service" 1161 android:label="@string/permlab_bind_call_service" /> 1162 1163 <!-- ================================== --> 1164 <!-- Permissions for sdcard interaction --> 1165 <!-- ================================== --> 1166 <eat-comment /> 1167 1168 <!-- Group of permissions that are related to SD card access. --> 1169 <permission-group android:name="android.permission-group.STORAGE" 1170 android:label="@string/permgrouplab_storage" 1171 android:icon="@drawable/perm_group_storage" 1172 android:description="@string/permgroupdesc_storage" 1173 android:permissionGroupFlags="personalInfo" 1174 android:priority="240" /> 1175 1176 <!-- Allows an application to read from external storage. 1177 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly 1178 granted this permission.</p> 1179 <p>This permission is enforced starting in API level 19. Before API level 19, this 1180 permission is not enforced and all apps still have access to read from external storage. 1181 You can test your app with the permission enforced by enabling <em>Protect USB 1182 storage</em> under Developer options in the Settings app on a device running Android 4.1 or 1183 higher.</p> 1184 <p>Also starting in API level 19, this permission is <em>not</em> required to 1185 read/write files in your application-specific directories returned by 1186 {@link android.content.Context#getExternalFilesDir} and 1187 {@link android.content.Context#getExternalCacheDir}. 1188 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 1189 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 1190 minSdkVersion}</a> and <a 1191 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1192 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 1193 grants your app this permission. If you don't need this permission, be sure your <a 1194 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1195 targetSdkVersion}</a> is 4 or higher.--> 1196 <permission android:name="android.permission.READ_EXTERNAL_STORAGE" 1197 android:permissionGroup="android.permission-group.STORAGE" 1198 android:label="@string/permlab_sdcardRead" 1199 android:description="@string/permdesc_sdcardRead" 1200 android:protectionLevel="normal" /> 1201 1202 <!-- Allows an application to write to external storage. 1203 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 1204 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 1205 minSdkVersion}</a> and <a 1206 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1207 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 1208 grants your app this permission. If you don't need this permission, be sure your <a 1209 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1210 targetSdkVersion}</a> is 4 or higher. 1211 <p>Starting in API level 19, this permission is <em>not</em> required to 1212 read/write files in your application-specific directories returned by 1213 {@link android.content.Context#getExternalFilesDir} and 1214 {@link android.content.Context#getExternalCacheDir}. --> 1215 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" 1216 android:permissionGroup="android.permission-group.STORAGE" 1217 android:label="@string/permlab_sdcardWrite" 1218 android:description="@string/permdesc_sdcardWrite" 1219 android:protectionLevel="dangerous" /> 1220 1221 <!-- @SystemApi Allows an application to write to internal media storage 1222 @hide --> 1223 <permission android:name="android.permission.WRITE_MEDIA_STORAGE" 1224 android:permissionGroup="android.permission-group.STORAGE" 1225 android:label="@string/permlab_mediaStorageWrite" 1226 android:description="@string/permdesc_mediaStorageWrite" 1227 android:protectionLevel="signature|system" /> 1228 1229 <!-- Allows an application to manage access to documents, usually as part 1230 of a document picker. --> 1231 <permission android:name="android.permission.MANAGE_DOCUMENTS" 1232 android:permissionGroup="android.permission-group.STORAGE" 1233 android:label="@string/permlab_manageDocs" 1234 android:description="@string/permdesc_manageDocs" 1235 android:protectionLevel="signature" /> 1236 1237 <!-- ================================== --> 1238 <!-- Permissions for screenlock --> 1239 <!-- ================================== --> 1240 <eat-comment /> 1241 1242 <!-- Group of permissions that are related to the screenlock. --> 1243 <permission-group android:name="android.permission-group.SCREENLOCK" 1244 android:label="@string/permgrouplab_screenlock" 1245 android:icon="@drawable/perm_group_screenlock" 1246 android:permissionGroupFlags="personalInfo" 1247 android:description="@string/permgroupdesc_screenlock" 1248 android:priority="230" /> 1249 1250 <!-- Allows applications to disable the keyguard --> 1251 <permission android:name="android.permission.DISABLE_KEYGUARD" 1252 android:permissionGroup="android.permission-group.SCREENLOCK" 1253 android:protectionLevel="dangerous" 1254 android:description="@string/permdesc_disableKeyguard" 1255 android:label="@string/permlab_disableKeyguard" /> 1256 1257 <!-- ================================== --> 1258 <!-- Permissions to access other installed applications --> 1259 <!-- ================================== --> 1260 <eat-comment /> 1261 1262 <!-- Group of permissions that are related to the other applications 1263 installed on the system. Examples include such as listing 1264 running apps, or killing background processes. --> 1265 <permission-group android:name="android.permission-group.APP_INFO" 1266 android:label="@string/permgrouplab_appInfo" 1267 android:icon="@drawable/perm_group_app_info" 1268 android:description="@string/permgroupdesc_appInfo" 1269 android:priority="220" /> 1270 1271 <!-- @SystemApi Allows an application to get information about the currently 1272 or recently running tasks. --> 1273 <permission android:name="android.permission.GET_TASKS" 1274 android:permissionGroup="android.permission-group.APP_INFO" 1275 android:protectionLevel="signature|system" 1276 android:label="@string/permlab_getTasks" 1277 android:description="@string/permdesc_getTasks" /> 1278 1279 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions 1280 across the users on the device, using singleton services and 1281 user-targeted broadcasts. This permission is not available to 1282 third party applications. --> 1283 <permission android:name="android.permission.INTERACT_ACROSS_USERS" 1284 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1285 android:protectionLevel="signature|system|development" 1286 android:label="@string/permlab_interactAcrossUsers" 1287 android:description="@string/permdesc_interactAcrossUsers" /> 1288 1289 <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS} 1290 that removes restrictions on where broadcasts can be sent and allows other 1291 types of interactions. --> 1292 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL" 1293 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1294 android:protectionLevel="signature" 1295 android:label="@string/permlab_interactAcrossUsersFull" 1296 android:description="@string/permdesc_interactAcrossUsersFull" /> 1297 1298 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage 1299 users on the device. This permission is not available to 1300 third party applications. --> 1301 <permission android:name="android.permission.MANAGE_USERS" 1302 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1303 android:protectionLevel="signature|system" 1304 android:label="@string/permlab_manageUsers" 1305 android:description="@string/permdesc_manageUsers" /> 1306 1307 <!-- Allows an application to get full detailed information about 1308 recently running tasks, with full fidelity to the real state. 1309 @hide --> 1310 <permission android:name="android.permission.GET_DETAILED_TASKS" 1311 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1312 android:protectionLevel="signature" 1313 android:label="@string/permlab_getDetailedTasks" 1314 android:description="@string/permdesc_getDetailedTasks" /> 1315 1316 <!-- Allows an application to change the Z-order of tasks --> 1317 <permission android:name="android.permission.REORDER_TASKS" 1318 android:permissionGroup="android.permission-group.APP_INFO" 1319 android:protectionLevel="normal" 1320 android:label="@string/permlab_reorderTasks" 1321 android:description="@string/permdesc_reorderTasks" /> 1322 1323 <!-- @hide Allows an application to change to remove/kill tasks --> 1324 <permission android:name="android.permission.REMOVE_TASKS" 1325 android:permissionGroup="android.permission-group.APP_INFO" 1326 android:protectionLevel="signature" 1327 android:label="@string/permlab_removeTasks" 1328 android:description="@string/permdesc_removeTasks" /> 1329 1330 <!-- @SystemApi @hide Allows an application to create/manage/remove stacks --> 1331 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS" 1332 android:permissionGroup="android.permission-group.APP_INFO" 1333 android:protectionLevel="signature|system" 1334 android:label="@string/permlab_manageActivityStacks" 1335 android:description="@string/permdesc_manageActivityStacks" /> 1336 1337 <!-- Allows an application to start any activity, regardless of permission 1338 protection or exported state. @hide --> 1339 <permission android:name="android.permission.START_ANY_ACTIVITY" 1340 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1341 android:protectionLevel="signature" 1342 android:label="@string/permlab_startAnyActivity" 1343 android:description="@string/permdesc_startAnyActivity" /> 1344 1345 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage} 1346 API is no longer supported. --> 1347 <permission android:name="android.permission.RESTART_PACKAGES" 1348 android:permissionGroup="android.permission-group.APP_INFO" 1349 android:protectionLevel="normal" 1350 android:label="@string/permlab_killBackgroundProcesses" 1351 android:description="@string/permdesc_killBackgroundProcesses" /> 1352 1353 <!-- Allows an application to call 1354 {@link android.app.ActivityManager#killBackgroundProcesses}. --> 1355 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES" 1356 android:permissionGroup="android.permission-group.APP_INFO" 1357 android:protectionLevel="normal" 1358 android:label="@string/permlab_killBackgroundProcesses" 1359 android:description="@string/permdesc_killBackgroundProcesses" /> 1360 1361 <!-- ================================== --> 1362 <!-- Permissions affecting the display of other applications --> 1363 <!-- ================================== --> 1364 <eat-comment /> 1365 1366 <!-- Group of permissions that allow manipulation of how 1367 another application displays UI to the user. --> 1368 <permission-group android:name="android.permission-group.DISPLAY" 1369 android:label="@string/permgrouplab_display" 1370 android:icon="@drawable/perm_group_display" 1371 android:description="@string/permgroupdesc_display" 1372 android:priority="190"/> 1373 1374 <!-- Allows an application to open windows using the type 1375 {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT}, 1376 shown on top of all other applications. Very few applications 1377 should use this permission; these windows are intended for 1378 system-level interaction with the user. --> 1379 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW" 1380 android:permissionGroup="android.permission-group.DISPLAY" 1381 android:protectionLevel="dangerous" 1382 android:label="@string/permlab_systemAlertWindow" 1383 android:description="@string/permdesc_systemAlertWindow" /> 1384 1385 <!-- ================================== --> 1386 <!-- Permissions affecting the system wallpaper --> 1387 <!-- ================================== --> 1388 <eat-comment /> 1389 1390 <!-- Group of permissions that allow manipulation of how 1391 another application displays UI to the user. --> 1392 <permission-group android:name="android.permission-group.WALLPAPER" 1393 android:label="@string/permgrouplab_wallpaper" 1394 android:icon="@drawable/perm_group_wallpaper" 1395 android:description="@string/permgroupdesc_wallpaper" 1396 android:priority="150" /> 1397 1398 <!-- Allows applications to set the wallpaper --> 1399 <permission android:name="android.permission.SET_WALLPAPER" 1400 android:permissionGroup="android.permission-group.WALLPAPER" 1401 android:protectionLevel="normal" 1402 android:label="@string/permlab_setWallpaper" 1403 android:description="@string/permdesc_setWallpaper" /> 1404 1405 <!-- Allows applications to set the wallpaper hints --> 1406 <permission android:name="android.permission.SET_WALLPAPER_HINTS" 1407 android:permissionGroup="android.permission-group.WALLPAPER" 1408 android:protectionLevel="normal" 1409 android:label="@string/permlab_setWallpaperHints" 1410 android:description="@string/permdesc_setWallpaperHints" /> 1411 1412 <!-- ============================================ --> 1413 <!-- Permissions for changing the system clock --> 1414 <!-- ============================================ --> 1415 <eat-comment /> 1416 1417 <!-- Group of permissions that are related to system clock. --> 1418 <permission-group android:name="android.permission-group.SYSTEM_CLOCK" 1419 android:label="@string/permgrouplab_systemClock" 1420 android:icon="@drawable/perm_group_system_clock" 1421 android:description="@string/permgroupdesc_systemClock" 1422 android:priority="140" /> 1423 1424 <!-- @SystemApi Allows applications to set the system time. 1425 <p>Not for use by third-party applications. --> 1426 <permission android:name="android.permission.SET_TIME" 1427 android:protectionLevel="signature|system" 1428 android:label="@string/permlab_setTime" 1429 android:description="@string/permdesc_setTime" /> 1430 1431 <!-- Allows applications to set the system time zone --> 1432 <permission android:name="android.permission.SET_TIME_ZONE" 1433 android:permissionGroup="android.permission-group.SYSTEM_CLOCK" 1434 android:protectionLevel="normal" 1435 android:label="@string/permlab_setTimeZone" 1436 android:description="@string/permdesc_setTimeZone" /> 1437 1438 <!-- ==================================================== --> 1439 <!-- Permissions related to changing status bar --> 1440 <!-- ==================================================== --> 1441 <eat-comment /> 1442 1443 <!-- Used for permissions that change the status bar --> 1444 <permission-group android:name="android.permission-group.STATUS_BAR" 1445 android:label="@string/permgrouplab_statusBar" 1446 android:icon="@drawable/perm_group_status_bar" 1447 android:description="@string/permgroupdesc_statusBar" 1448 android:priority="110" /> 1449 1450 <!-- Allows an application to expand or collapse the status bar. --> 1451 <permission android:name="android.permission.EXPAND_STATUS_BAR" 1452 android:permissionGroup="android.permission-group.STATUS_BAR" 1453 android:protectionLevel="normal" 1454 android:label="@string/permlab_expandStatusBar" 1455 android:description="@string/permdesc_expandStatusBar" /> 1456 1457 <!-- ============================================================== --> 1458 <!-- Permissions related to adding/removing shortcuts from Launcher --> 1459 <!-- ============================================================== --> 1460 <eat-comment /> 1461 1462 <!-- Allows an application to install a shortcut in Launcher --> 1463 <permission 1464 android:name="com.android.launcher.permission.INSTALL_SHORTCUT" 1465 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1466 android:protectionLevel="dangerous" 1467 android:label="@string/permlab_install_shortcut" 1468 android:description="@string/permdesc_install_shortcut" /> 1469 1470 <!-- Allows an application to uninstall a shortcut in Launcher --> 1471 <permission 1472 android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT" 1473 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1474 android:protectionLevel="dangerous" 1475 android:label="@string/permlab_uninstall_shortcut" 1476 android:description="@string/permdesc_uninstall_shortcut"/> 1477 1478 <!-- ==================================================== --> 1479 <!-- Permissions related to accessing sync settings --> 1480 <!-- ==================================================== --> 1481 <eat-comment /> 1482 1483 <!-- Used for permissions that access the sync settings or sync 1484 related information. --> 1485 <permission-group android:name="android.permission-group.SYNC_SETTINGS" 1486 android:label="@string/permgrouplab_syncSettings" 1487 android:icon="@drawable/perm_group_sync_settings" 1488 android:description="@string/permgroupdesc_syncSettings" 1489 android:priority="120" /> 1490 1491 <!-- Allows applications to read the sync settings --> 1492 <permission android:name="android.permission.READ_SYNC_SETTINGS" 1493 android:permissionGroup="android.permission-group.SYNC_SETTINGS" 1494 android:protectionLevel="normal" 1495 android:description="@string/permdesc_readSyncSettings" 1496 android:label="@string/permlab_readSyncSettings" /> 1497 1498 <!-- Allows applications to write the sync settings --> 1499 <permission android:name="android.permission.WRITE_SYNC_SETTINGS" 1500 android:permissionGroup="android.permission-group.SYNC_SETTINGS" 1501 android:protectionLevel="normal" 1502 android:description="@string/permdesc_writeSyncSettings" 1503 android:label="@string/permlab_writeSyncSettings" /> 1504 1505 <!-- Allows applications to read the sync stats --> 1506 <permission android:name="android.permission.READ_SYNC_STATS" 1507 android:permissionGroup="android.permission-group.SYNC_SETTINGS" 1508 android:protectionLevel="normal" 1509 android:description="@string/permdesc_readSyncStats" 1510 android:label="@string/permlab_readSyncStats" /> 1511 1512 1513 <!-- ============================================ --> 1514 <!-- Permissions for low-level system interaction --> 1515 <!-- ============================================ --> 1516 <eat-comment /> 1517 1518 <!-- Group of permissions that are related to system APIs. Many 1519 of these are not permissions the user will be expected to understand, 1520 and such permissions should generally be marked as "normal" protection 1521 level so they don't get displayed. This can also, however, be used 1522 for miscellaneous features that provide access to the operating system, 1523 such as writing the global system settings. --> 1524 <permission-group android:name="android.permission-group.SYSTEM_TOOLS" 1525 android:label="@string/permgrouplab_systemTools" 1526 android:icon="@drawable/perm_group_system_tools" 1527 android:description="@string/permgroupdesc_systemTools" 1528 android:priority="100" /> 1529 1530 <!-- @SystemApi @hide Change the screen compatibility mode of applications --> 1531 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY" 1532 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1533 android:protectionLevel="signature" 1534 android:label="@string/permlab_setScreenCompatibility" 1535 android:description="@string/permdesc_setScreenCompatibility" /> 1536 1537 <!-- Allows an application to access all multi-user external storage @hide --> 1538 <permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE" 1539 android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS" 1540 android:label="@string/permlab_sdcardAccessAll" 1541 android:description="@string/permdesc_sdcardAccessAll" 1542 android:protectionLevel="signature" /> 1543 1544 <!-- @SystemApi Allows an application to modify the current configuration, such 1545 as locale. --> 1546 <permission android:name="android.permission.CHANGE_CONFIGURATION" 1547 android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS" 1548 android:protectionLevel="signature|system|development" 1549 android:label="@string/permlab_changeConfiguration" 1550 android:description="@string/permdesc_changeConfiguration" /> 1551 1552 <!-- Allows an application to read or write the system settings. --> 1553 <permission android:name="android.permission.WRITE_SETTINGS" 1554 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1555 android:protectionLevel="normal" 1556 android:label="@string/permlab_writeSettings" 1557 android:description="@string/permdesc_writeSettings" /> 1558 1559 <!-- @SystemApi Allows an application to modify the Google service map. 1560 <p>Not for use by third-party applications. --> 1561 <permission android:name="android.permission.WRITE_GSERVICES" 1562 android:protectionLevel="signature|system" 1563 android:label="@string/permlab_writeGservices" 1564 android:description="@string/permdesc_writeGservices" /> 1565 1566 <!-- @SystemApi Allows an application to call 1567 {@link android.app.ActivityManager#forceStopPackage}. 1568 @hide --> 1569 <permission android:name="android.permission.FORCE_STOP_PACKAGES" 1570 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1571 android:protectionLevel="signature|system" 1572 android:label="@string/permlab_forceStopPackages" 1573 android:description="@string/permdesc_forceStopPackages" /> 1574 1575 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window 1576 An active window is the window that has fired an accessibility event. --> 1577 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT" 1578 android:permissionGroup="android.permission-group.PERSONAL_INFO" 1579 android:protectionLevel="signature|system" 1580 android:label="@string/permlab_retrieve_window_content" 1581 android:description="@string/permdesc_retrieve_window_content" /> 1582 1583 <!-- @SystemApi Modify the global animation scaling factor. 1584 <p>Not for use by third-party applications. --> 1585 <permission android:name="android.permission.SET_ANIMATION_SCALE" 1586 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1587 android:protectionLevel="signature|system|development" 1588 android:label="@string/permlab_setAnimationScale" 1589 android:description="@string/permdesc_setAnimationScale" /> 1590 1591 <!-- @deprecated This functionality will be removed in the future; please do 1592 not use. Allow an application to make its activities persistent. --> 1593 <permission android:name="android.permission.PERSISTENT_ACTIVITY" 1594 android:permissionGroup="android.permission-group.APP_INFO" 1595 android:protectionLevel="normal" 1596 android:label="@string/permlab_persistentActivity" 1597 android:description="@string/permdesc_persistentActivity" /> 1598 1599 <!-- Allows an application to find out the space used by any package. --> 1600 <permission android:name="android.permission.GET_PACKAGE_SIZE" 1601 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1602 android:protectionLevel="normal" 1603 android:label="@string/permlab_getPackageSize" 1604 android:description="@string/permdesc_getPackageSize" /> 1605 1606 <!-- @deprecated No longer useful, see 1607 {@link android.content.pm.PackageManager#addPackageToPreferred} 1608 for details. --> 1609 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS" 1610 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1611 android:protectionLevel="signature" 1612 android:label="@string/permlab_setPreferredApplications" 1613 android:description="@string/permdesc_setPreferredApplications" /> 1614 1615 <!-- Allows an application to receive the 1616 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is 1617 broadcast after the system finishes booting. If you don't 1618 request this permission, you will not receive the broadcast at 1619 that time. Though holding this permission does not have any 1620 security implications, it can have a negative impact on the 1621 user experience by increasing the amount of time it takes the 1622 system to start and allowing applications to have themselves 1623 running without the user being aware of them. As such, you must 1624 explicitly declare your use of this facility to make that visible 1625 to the user. --> 1626 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" 1627 android:permissionGroup="android.permission-group.APP_INFO" 1628 android:protectionLevel="normal" 1629 android:label="@string/permlab_receiveBootCompleted" 1630 android:description="@string/permdesc_receiveBootCompleted" /> 1631 1632 <!-- Allows an application to broadcast sticky intents. These are 1633 broadcasts whose data is held by the system after being finished, 1634 so that clients can quickly retrieve that data without having 1635 to wait for the next broadcast. --> 1636 <permission android:name="android.permission.BROADCAST_STICKY" 1637 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1638 android:protectionLevel="normal" 1639 android:label="@string/permlab_broadcastSticky" 1640 android:description="@string/permdesc_broadcastSticky" /> 1641 1642 <!-- @SystemApi Allows mounting and unmounting file systems for removable storage. 1643 <p>Not for use by third-party applications.--> 1644 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS" 1645 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1646 android:protectionLevel="system|signature" 1647 android:label="@string/permlab_mount_unmount_filesystems" 1648 android:description="@string/permdesc_mount_unmount_filesystems" /> 1649 1650 <!-- @SystemApi Allows formatting file systems for removable storage. 1651 <p>Not for use by third-party applications. --> 1652 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS" 1653 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1654 android:protectionLevel="system|signature" 1655 android:label="@string/permlab_mount_format_filesystems" 1656 android:description="@string/permdesc_mount_format_filesystems" /> 1657 1658 <!-- Allows access to ASEC non-destructive API calls 1659 @hide --> 1660 <permission android:name="android.permission.ASEC_ACCESS" 1661 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1662 android:protectionLevel="signature" 1663 android:label="@string/permlab_asec_access" 1664 android:description="@string/permdesc_asec_access" /> 1665 1666 <!-- Allows creation of ASEC volumes 1667 @hide --> 1668 <permission android:name="android.permission.ASEC_CREATE" 1669 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1670 android:protectionLevel="signature" 1671 android:label="@string/permlab_asec_create" 1672 android:description="@string/permdesc_asec_create" /> 1673 1674 <!-- Allows destruction of ASEC volumes 1675 @hide --> 1676 <permission android:name="android.permission.ASEC_DESTROY" 1677 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1678 android:protectionLevel="signature" 1679 android:label="@string/permlab_asec_destroy" 1680 android:description="@string/permdesc_asec_destroy" /> 1681 1682 <!-- Allows mount / unmount of ASEC volumes 1683 @hide --> 1684 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT" 1685 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1686 android:protectionLevel="signature" 1687 android:label="@string/permlab_asec_mount_unmount" 1688 android:description="@string/permdesc_asec_mount_unmount" /> 1689 1690 <!-- Allows rename of ASEC volumes 1691 @hide --> 1692 <permission android:name="android.permission.ASEC_RENAME" 1693 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1694 android:protectionLevel="signature" 1695 android:label="@string/permlab_asec_rename" 1696 android:description="@string/permdesc_asec_rename" /> 1697 1698 <!-- @SystemApi Allows applications to write the apn settings. 1699 <p>Not for use by third-party applications. --> 1700 <permission android:name="android.permission.WRITE_APN_SETTINGS" 1701 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1702 android:protectionLevel="signature|system" 1703 android:description="@string/permdesc_writeApnSettings" 1704 android:label="@string/permlab_writeApnSettings" /> 1705 1706 <!-- Allows an application to allow access the subscribed feeds 1707 ContentProvider. --> 1708 <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ" 1709 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1710 android:label="@string/permlab_subscribedFeedsRead" 1711 android:description="@string/permdesc_subscribedFeedsRead" 1712 android:protectionLevel="normal" /> 1713 <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE" 1714 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1715 android:label="@string/permlab_subscribedFeedsWrite" 1716 android:description="@string/permdesc_subscribedFeedsWrite" 1717 android:protectionLevel="dangerous" /> 1718 1719 <!-- Allows applications to change network connectivity state --> 1720 <permission android:name="android.permission.CHANGE_NETWORK_STATE" 1721 android:permissionGroup="android.permission-group.NETWORK" 1722 android:protectionLevel="normal" 1723 android:description="@string/permdesc_changeNetworkState" 1724 android:label="@string/permlab_changeNetworkState" /> 1725 1726 <!-- Allows an application to clear the caches of all installed 1727 applications on the device. --> 1728 <permission android:name="android.permission.CLEAR_APP_CACHE" 1729 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1730 android:protectionLevel="dangerous" 1731 android:label="@string/permlab_clearAppCache" 1732 android:description="@string/permdesc_clearAppCache" /> 1733 1734 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback 1735 @hide --> 1736 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK" 1737 android:protectionLevel="signature|system" 1738 android:label="@string/permlab_anyCodecForPlayback" 1739 android:description="@string/permdesc_anyCodecForPlayback" /> 1740 1741 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on 1742 behalf of the user. 1743 @hide --> 1744 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES" 1745 android:protectionLevel="signature|system" 1746 android:label="@string/permlab_manageCaCertificates" 1747 android:description="@string/permdesc_manageCaCertificates" /> 1748 1749 <!-- @SystemApi Allows an application to do certain operations needed for 1750 interacting with the recovery (system update) system. --> 1751 <permission android:name="android.permission.RECOVERY" 1752 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1753 android:protectionLevel="signature|system" 1754 android:label="@string/permlab_recovery" 1755 android:description="@string/permdesc_recovery" /> 1756 1757 <!-- Allows the system to bind to an application's idle services 1758 @hide --> 1759 <permission android:name="android.permission.BIND_IDLE_SERVICE" 1760 android:protectionLevel="signature" 1761 android:label="@string/permlab_bindIdleService" 1762 android:description="@string/permdesc_bindIdleService" /> 1763 1764 <!-- ========================================= --> 1765 <!-- Permissions for special development tools --> 1766 <!-- ========================================= --> 1767 <eat-comment /> 1768 1769 <!-- Group of permissions that are related to development features. These 1770 are not permissions that should appear in third-party applications; they 1771 protect APIs that are intended only to be used for development 1772 purposes. --> 1773 <permission-group android:name="android.permission-group.DEVELOPMENT_TOOLS" 1774 android:label="@string/permgrouplab_developmentTools" 1775 android:description="@string/permgroupdesc_developmentTools" 1776 android:priority="310" /> 1777 1778 <!-- @SystemApi Allows an application to read or write the secure system settings. 1779 <p>Not for use by third-party applications. --> 1780 <permission android:name="android.permission.WRITE_SECURE_SETTINGS" 1781 android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS" 1782 android:protectionLevel="signature|system|development" 1783 android:label="@string/permlab_writeSecureSettings" 1784 android:description="@string/permdesc_writeSecureSettings" /> 1785 1786 <!-- @SystemApi Allows an application to retrieve state dump information from system services. 1787 <p>Not for use by third-party applications. --> 1788 <permission android:name="android.permission.DUMP" 1789 android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS" 1790 android:protectionLevel="signature|system|development" 1791 android:label="@string/permlab_dump" 1792 android:description="@string/permdesc_dump" /> 1793 1794 <!-- @SystemApi Allows an application to read the low-level system log files. 1795 <p>Not for use by third-party applications, because 1796 Log entries can contain the user's private information. --> 1797 <permission android:name="android.permission.READ_LOGS" 1798 android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS" 1799 android:protectionLevel="signature|system|development" 1800 android:label="@string/permlab_readLogs" 1801 android:description="@string/permdesc_readLogs" /> 1802 1803 <!-- @SystemApi Configure an application for debugging. 1804 <p>Not for use by third-party applications. --> 1805 <permission android:name="android.permission.SET_DEBUG_APP" 1806 android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS" 1807 android:protectionLevel="signature|system|development" 1808 android:label="@string/permlab_setDebugApp" 1809 android:description="@string/permdesc_setDebugApp" /> 1810 1811 <!-- @SystemApi Allows an application to set the maximum number of (not needed) 1812 application processes that can be running. 1813 <p>Not for use by third-party applications. --> 1814 <permission android:name="android.permission.SET_PROCESS_LIMIT" 1815 android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS" 1816 android:protectionLevel="signature|system|development" 1817 android:label="@string/permlab_setProcessLimit" 1818 android:description="@string/permdesc_setProcessLimit" /> 1819 1820 <!-- @SystemApi Allows an application to control whether activities are immediately 1821 finished when put in the background. 1822 <p>Not for use by third-party applications. --> 1823 <permission android:name="android.permission.SET_ALWAYS_FINISH" 1824 android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS" 1825 android:protectionLevel="signature|system|development" 1826 android:label="@string/permlab_setAlwaysFinish" 1827 android:description="@string/permdesc_setAlwaysFinish" /> 1828 1829 <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes. 1830 <p>Not for use by third-party applications. --> 1831 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES" 1832 android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS" 1833 android:protectionLevel="signature|system|development" 1834 android:label="@string/permlab_signalPersistentProcesses" 1835 android:description="@string/permdesc_signalPersistentProcesses" /> 1836 1837 <!-- ==================================== --> 1838 <!-- Private (signature-only) permissions --> 1839 <!-- ==================================== --> 1840 <eat-comment /> 1841 1842 <!-- @SystemApi Allows applications to RW to diagnostic resources. 1843 <p>Not for use by third-party applications. --> 1844 <permission android:name="android.permission.DIAGNOSTIC" 1845 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1846 android:protectionLevel="signature" 1847 android:description="@string/permdesc_diagnostic" 1848 android:label="@string/permlab_diagnostic" /> 1849 1850 <!-- @SystemApi Allows an application to open, close, or disable the status bar 1851 and its icons. 1852 <p>Not for use by third-party applications. --> 1853 <permission android:name="android.permission.STATUS_BAR" 1854 android:label="@string/permlab_statusBar" 1855 android:description="@string/permdesc_statusBar" 1856 android:protectionLevel="signature|system" /> 1857 1858 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk 1859 @hide --> 1860 <permission android:name="android.permission.STATUS_BAR_SERVICE" 1861 android:label="@string/permlab_statusBarService" 1862 android:description="@string/permdesc_statusBarService" 1863 android:protectionLevel="signature" /> 1864 1865 <!-- Allows an application to force a BACK operation on whatever is the 1866 top activity. 1867 <p>Not for use by third-party applications. --> 1868 <permission android:name="android.permission.FORCE_BACK" 1869 android:label="@string/permlab_forceBack" 1870 android:description="@string/permdesc_forceBack" 1871 android:protectionLevel="signature" /> 1872 1873 <!-- @SystemApi Allows an application to update device statistics. 1874 <p>Not for use by third-party applications. --> 1875 <permission android:name="android.permission.UPDATE_DEVICE_STATS" 1876 android:label="@string/permlab_updateBatteryStats" 1877 android:description="@string/permdesc_updateBatteryStats" 1878 android:protectionLevel="signature|system" /> 1879 1880 <!-- @SystemApi @hide Allows an application to collect battery statistics --> 1881 <permission android:name="android.permission.GET_APP_OPS_STATS" 1882 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1883 android:label="@string/permlab_getAppOpsStats" 1884 android:description="@string/permdesc_getAppOpsStats" 1885 android:protectionLevel="signature|system|development" /> 1886 1887 <!-- @SystemApi Allows an application to update application operation statistics. Not for 1888 use by third party apps. @hide --> 1889 <permission android:name="android.permission.UPDATE_APP_OPS_STATS" 1890 android:label="@string/permlab_updateAppOpsStats" 1891 android:description="@string/permdesc_updateAppOpsStats" 1892 android:protectionLevel="signature|system" /> 1893 1894 <!-- Allows an application to open windows that are for use by parts 1895 of the system user interface. 1896 <p>Not for use by third-party applications. --> 1897 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW" 1898 android:label="@string/permlab_internalSystemWindow" 1899 android:description="@string/permdesc_internalSystemWindow" 1900 android:protectionLevel="signature" /> 1901 1902 <!-- Allows an application to manage (create, destroy, 1903 Z-order) application tokens in the window manager. 1904 <p>Not for use by third-party applications. --> 1905 <permission android:name="android.permission.MANAGE_APP_TOKENS" 1906 android:label="@string/permlab_manageAppTokens" 1907 android:description="@string/permdesc_manageAppTokens" 1908 android:protectionLevel="signature" /> 1909 1910 <!-- @hide Allows the application to temporarily freeze the screen for a 1911 full-screen transition. --> 1912 <permission android:name="android.permission.FREEZE_SCREEN" 1913 android:label="@string/permlab_freezeScreen" 1914 android:description="@string/permdesc_freezeScreen" 1915 android:protectionLevel="signature" /> 1916 1917 <!-- Allows an application to inject user events (keys, touch, trackball) 1918 into the event stream and deliver them to ANY window. Without this 1919 permission, you can only deliver events to windows in your own process. 1920 <p>Not for use by third-party applications. --> 1921 <permission android:name="android.permission.INJECT_EVENTS" 1922 android:label="@string/permlab_injectEvents" 1923 android:description="@string/permdesc_injectEvents" 1924 android:protectionLevel="signature" /> 1925 1926 <!-- @hide Allows an application to register an input filter which filters the stream 1927 of user events (keys, touch, trackball) before they are dispatched to any window. --> 1928 <permission android:name="android.permission.FILTER_EVENTS" 1929 android:label="@string/permlab_filter_events" 1930 android:description="@string/permdesc_filter_events" 1931 android:protectionLevel="signature" /> 1932 1933 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. --> 1934 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN" 1935 android:label="@string/permlab_retrieveWindowToken" 1936 android:description="@string/permdesc_retrieveWindowToken" 1937 android:protectionLevel="signature" /> 1938 1939 <!-- @hide Allows an application to collect frame statistics --> 1940 <permission android:name="android.permission.FRAME_STATS" 1941 android:label="@string/permlab_frameStats" 1942 android:description="@string/permdesc_frameStats" 1943 android:protectionLevel="signature" /> 1944 1945 <!-- @hide Allows an application to temporary enable accessibility on the device. --> 1946 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY" 1947 android:label="@string/permlab_temporary_enable_accessibility" 1948 android:description="@string/permdesc_temporary_enable_accessibility" 1949 android:protectionLevel="signature" /> 1950 1951 <!-- Allows an application to watch and control how activities are 1952 started globally in the system. Only for is in debugging 1953 (usually the monkey command). 1954 <p>Not for use by third-party applications. --> 1955 <permission android:name="android.permission.SET_ACTIVITY_WATCHER" 1956 android:label="@string/permlab_runSetActivityWatcher" 1957 android:description="@string/permdesc_runSetActivityWatcher" 1958 android:protectionLevel="signature" /> 1959 1960 <!-- @SystemApi Allows an application to call the activity manager shutdown() API 1961 to put the higher-level system there into a shutdown state. 1962 @hide --> 1963 <permission android:name="android.permission.SHUTDOWN" 1964 android:label="@string/permlab_shutdown" 1965 android:description="@string/permdesc_shutdown" 1966 android:protectionLevel="signature|system" /> 1967 1968 <!-- @SystemApi Allows an application to tell the activity manager to temporarily 1969 stop application switches, putting it into a special mode that 1970 prevents applications from immediately switching away from some 1971 critical UI such as the home screen. 1972 @hide --> 1973 <permission android:name="android.permission.STOP_APP_SWITCHES" 1974 android:label="@string/permlab_stopAppSwitches" 1975 android:description="@string/permdesc_stopAppSwitches" 1976 android:protectionLevel="signature|system" /> 1977 1978 <!-- Allows an application to retrieve private information about 1979 the current top activity, such as any assist context it can provide. 1980 <p>Not for use by third-party applications. --> 1981 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO" 1982 android:label="@string/permlab_getTopActivityInfo" 1983 android:description="@string/permdesc_getTopActivityInfo" 1984 android:protectionLevel="signature" /> 1985 1986 <!-- Allows an application to retrieve the current state of keys and 1987 switches. 1988 <p>Not for use by third-party applications. 1989 @deprecated The API that used this permission has been removed. --> 1990 <permission android:name="android.permission.READ_INPUT_STATE" 1991 android:label="@string/permlab_readInputState" 1992 android:description="@string/permdesc_readInputState" 1993 android:protectionLevel="signature" /> 1994 1995 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService}, 1996 to ensure that only the system can bind to it. --> 1997 <permission android:name="android.permission.BIND_INPUT_METHOD" 1998 android:label="@string/permlab_bindInputMethod" 1999 android:description="@string/permdesc_bindInputMethod" 2000 android:protectionLevel="signature" /> 2001 2002 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService}, 2003 to ensure that only the system can bind to it. --> 2004 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE" 2005 android:label="@string/permlab_bindAccessibilityService" 2006 android:description="@string/permdesc_bindAccessibilityService" 2007 android:protectionLevel="signature" /> 2008 2009 <!-- Must be required by a {@link android.printservice.PrintService}, 2010 to ensure that only the system can bind to it. --> 2011 <permission android:name="android.permission.BIND_PRINT_SERVICE" 2012 android:label="@string/permlab_bindPrintService" 2013 android:description="@string/permdesc_bindPrintService" 2014 android:protectionLevel="signature" /> 2015 2016 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService} 2017 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only 2018 the system can bind to it. --> 2019 <permission android:name="android.permission.BIND_NFC_SERVICE" 2020 android:label="@string/permlab_bindNfcService" 2021 android:description="@string/permdesc_bindNfcService" 2022 android:protectionLevel="signature" /> 2023 2024 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it. 2025 @hide --> 2026 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE" 2027 android:label="@string/permlab_bindPrintSpoolerService" 2028 android:description="@string/permdesc_bindPrintSpoolerService" 2029 android:protectionLevel="signature" /> 2030 2031 <!-- Must be required by a TextService (e.g. SpellCheckerService) 2032 to ensure that only the system can bind to it. --> 2033 <permission android:name="android.permission.BIND_TEXT_SERVICE" 2034 android:label="@string/permlab_bindTextService" 2035 android:description="@string/permdesc_bindTextService" 2036 android:protectionLevel="signature" /> 2037 2038 <!-- Must be required by a {@link android.net.VpnService}, 2039 to ensure that only the system can bind to it. --> 2040 <permission android:name="android.permission.BIND_VPN_SERVICE" 2041 android:label="@string/permlab_bindVpnService" 2042 android:description="@string/permdesc_bindVpnService" 2043 android:protectionLevel="signature" /> 2044 2045 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService}, 2046 to ensure that only the system can bind to it. --> 2047 <permission android:name="android.permission.BIND_WALLPAPER" 2048 android:label="@string/permlab_bindWallpaper" 2049 android:description="@string/permdesc_bindWallpaper" 2050 android:protectionLevel="signature|system" /> 2051 2052 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService}, 2053 to ensure that only the system can bind to it. --> 2054 <permission android:name="android.permission.BIND_VOICE_INTERACTION" 2055 android:label="@string/permlab_bindVoiceInteraction" 2056 android:description="@string/permdesc_bindVoiceInteraction" 2057 android:protectionLevel="signature" /> 2058 2059 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider}, 2060 to ensure that only the system can bind to it. 2061 @hide --> 2062 <permission android:name="android.permission.BIND_REMOTE_DISPLAY" 2063 android:label="@string/permlab_bindRemoteDisplay" 2064 android:description="@string/permdesc_bindRemoteDisplay" 2065 android:protectionLevel="signature" /> 2066 2067 <!-- Must be required by a {@link android.media.tv.TvInputService} 2068 to ensure that only the system can bind to it. --> 2069 <permission android:name="android.permission.BIND_TV_INPUT" 2070 android:label="@string/permlab_bindTvInput" 2071 android:description="@string/permdesc_bindTvInput" 2072 android:protectionLevel="signature|system" /> 2073 2074 <!-- Must be required by a {@link android.media.routeprovider.RouteProviderService} 2075 to ensure that only the system can interact with it. 2076 @hide --> 2077 <permission android:name="android.permission.BIND_ROUTE_PROVIDER" 2078 android:label="@string/permlab_bindRouteProvider" 2079 android:description="@string/permdesc_bindRouteProvider" 2080 android:protectionLevel="signature" /> 2081 2082 <!-- Must be required by device administration receiver, to ensure that only the 2083 system can interact with it. --> 2084 <permission android:name="android.permission.BIND_DEVICE_ADMIN" 2085 android:label="@string/permlab_bindDeviceAdmin" 2086 android:description="@string/permdesc_bindDeviceAdmin" 2087 android:protectionLevel="signature" /> 2088 2089 <!-- @SystemApi Required to add or remove another application as a device admin. 2090 <p>Not for use by third-party applications. 2091 @hide --> 2092 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS" 2093 android:label="@string/permlab_manageDeviceAdmins" 2094 android:description="@string/permdesc_manageDeviceAdmins" 2095 android:protectionLevel="signature|system" /> 2096 2097 <!-- Allows low-level access to setting the orientation (actually 2098 rotation) of the screen. 2099 <p>Not for use by third-party applications. --> 2100 <permission android:name="android.permission.SET_ORIENTATION" 2101 android:label="@string/permlab_setOrientation" 2102 android:description="@string/permdesc_setOrientation" 2103 android:protectionLevel="signature" /> 2104 2105 <!-- Allows low-level access to setting the pointer speed. 2106 <p>Not for use by third-party applications. --> 2107 <permission android:name="android.permission.SET_POINTER_SPEED" 2108 android:label="@string/permlab_setPointerSpeed" 2109 android:description="@string/permdesc_setPointerSpeed" 2110 android:protectionLevel="signature" /> 2111 2112 <!-- Allows low-level access to setting input device calibration. 2113 <p>Not for use by normal applications. 2114 @hide --> 2115 <permission android:name="android.permission.SET_INPUT_CALIBRATION" 2116 android:label="@string/permlab_setInputCalibration" 2117 android:description="@string/permdesc_setInputCalibration" 2118 android:protectionLevel="signature" /> 2119 2120 <!-- Allows low-level access to setting the keyboard layout. 2121 <p>Not for use by third-party applications. 2122 @hide --> 2123 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT" 2124 android:label="@string/permlab_setKeyboardLayout" 2125 android:description="@string/permdesc_setKeyboardLayout" 2126 android:protectionLevel="signature" /> 2127 2128 <!-- @SystemApi Allows an application to install packages. 2129 <p>Not for use by third-party applications. --> 2130 <permission android:name="android.permission.INSTALL_PACKAGES" 2131 android:label="@string/permlab_installPackages" 2132 android:description="@string/permdesc_installPackages" 2133 android:protectionLevel="signature|system" /> 2134 2135 <!-- Allows an application to clear user data. 2136 <p>Not for use by third-party applications. --> 2137 <permission android:name="android.permission.CLEAR_APP_USER_DATA" 2138 android:label="@string/permlab_clearAppUserData" 2139 android:description="@string/permdesc_clearAppUserData" 2140 android:protectionLevel="signature" /> 2141 2142 <!-- @SystemApi Allows an application to delete cache files. 2143 <p>Not for use by third-party applications. --> 2144 <permission android:name="android.permission.DELETE_CACHE_FILES" 2145 android:label="@string/permlab_deleteCacheFiles" 2146 android:description="@string/permdesc_deleteCacheFiles" 2147 android:protectionLevel="signature|system" /> 2148 2149 <!-- @SystemApi Allows an application to delete packages. 2150 <p>Not for use by third-party applications. --> 2151 <permission android:name="android.permission.DELETE_PACKAGES" 2152 android:label="@string/permlab_deletePackages" 2153 android:description="@string/permdesc_deletePackages" 2154 android:protectionLevel="signature|system" /> 2155 2156 <!-- @SystemApi Allows an application to move location of installed package. 2157 @hide --> 2158 <permission android:name="android.permission.MOVE_PACKAGE" 2159 android:label="@string/permlab_movePackage" 2160 android:description="@string/permdesc_movePackage" 2161 android:protectionLevel="signature|system" /> 2162 2163 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is 2164 enabled or not. 2165 <p>Not for use by third-party applications. --> 2166 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE" 2167 android:label="@string/permlab_changeComponentState" 2168 android:description="@string/permdesc_changeComponentState" 2169 android:protectionLevel="signature|system" /> 2170 2171 <!-- @hide Allows an application to grant or revoke specific permissions. --> 2172 <permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS" 2173 android:label="@string/permlab_grantRevokePermissions" 2174 android:description="@string/permdesc_grantRevokePermissions" 2175 android:protectionLevel="signature" /> 2176 2177 <!-- Allows an application to use SurfaceFlinger's low level features. 2178 <p>Not for use by third-party applications. --> 2179 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER" 2180 android:label="@string/permlab_accessSurfaceFlinger" 2181 android:description="@string/permdesc_accessSurfaceFlinger" 2182 android:protectionLevel="signature" /> 2183 2184 <!-- @SystemApi Allows an application to take screen shots and more generally 2185 get access to the frame buffer data. 2186 <p>Not for use by third-party applications. --> 2187 <permission android:name="android.permission.READ_FRAME_BUFFER" 2188 android:label="@string/permlab_readFrameBuffer" 2189 android:description="@string/permdesc_readFrameBuffer" 2190 android:protectionLevel="signature|system" /> 2191 2192 <!-- Allows an application to use InputFlinger's low level features. 2193 <p>Not for use by third-party applications. --> 2194 <permission android:name="android.permission.ACCESS_INPUT_FLINGER" 2195 android:label="@string/permlab_accessInputFlinger" 2196 android:description="@string/permdesc_accessInputFlinger" 2197 android:protectionLevel="signature" /> 2198 2199 <!-- Allows an application to configure and connect to Wifi displays 2200 @hide --> 2201 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY" 2202 android:label="@string/permlab_configureWifiDisplay" 2203 android:description="@string/permdesc_configureWifiDisplay" 2204 android:protectionLevel="signature" /> 2205 2206 <!-- Allows an application to control low-level features of Wifi displays 2207 such as opening an RTSP socket. This permission should only be used 2208 by the display manager. 2209 @hide --> 2210 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY" 2211 android:label="@string/permlab_controlWifiDisplay" 2212 android:description="@string/permdesc_controlWifiDisplay" 2213 android:protectionLevel="signature" /> 2214 2215 <!-- @SystemApi Allows an application to capture audio output. 2216 <p>Not for use by third-party applications.</p> --> 2217 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT" 2218 android:label="@string/permlab_captureAudioOutput" 2219 android:description="@string/permdesc_captureAudioOutput" 2220 android:protectionLevel="signature|system" /> 2221 2222 <!-- @SystemApi Allows an application to capture audio for hotword detection. 2223 <p>Not for use by third-party applications.</p> 2224 @hide --> 2225 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD" 2226 android:label="@string/permlab_captureAudioHotword" 2227 android:description="@string/permdesc_captureAudioHotword" 2228 android:protectionLevel="signature|system" /> 2229 2230 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions. 2231 <p>Not for use by third-party applications.</p> 2232 @hide --> 2233 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING" 2234 android:label="@string/permlab_modifyAudioRouting" 2235 android:description="@string/permdesc_modifyAudioRouting" 2236 android:protectionLevel="signature|system" /> 2237 2238 <!-- @SystemApi Allows an application to capture video output. 2239 <p>Not for use by third-party applications.</p> --> 2240 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT" 2241 android:label="@string/permlab_captureVideoOutput" 2242 android:description="@string/permdesc_captureVideoOutput" 2243 android:protectionLevel="signature|system" /> 2244 2245 <!-- @SystemApi Allows an application to capture secure video output. 2246 <p>Not for use by third-party applications.</p> --> 2247 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT" 2248 android:label="@string/permlab_captureSecureVideoOutput" 2249 android:description="@string/permdesc_captureSecureVideoOutput" 2250 android:protectionLevel="signature|system" /> 2251 2252 <!-- @SystemApi Allows an application to know what content is playing and control its playback. 2253 <p>Not for use by third-party applications due to privacy of media consumption</p> --> 2254 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL" 2255 android:label="@string/permlab_mediaContentControl" 2256 android:description="@string/permdesc_mediaContentControl" 2257 android:protectionLevel="signature|system" /> 2258 2259 <!-- Required to be able to disable the device (very dangerous!). 2260 <p>Not for use by third-party applications.. --> 2261 <permission android:name="android.permission.BRICK" 2262 android:label="@string/permlab_brick" 2263 android:description="@string/permdesc_brick" 2264 android:protectionLevel="signature" /> 2265 2266 <!-- @SystemApi Required to be able to reboot the device. 2267 <p>Not for use by third-party applications. --> 2268 <permission android:name="android.permission.REBOOT" 2269 android:label="@string/permlab_reboot" 2270 android:description="@string/permdesc_reboot" 2271 android:protectionLevel="signature|system" /> 2272 2273 <!-- Allows low-level access to power management. 2274 <p>Not for use by third-party applications. --> 2275 <permission android:name="android.permission.DEVICE_POWER" 2276 android:label="@string/permlab_devicePower" 2277 android:description="@string/permdesc_devicePower" 2278 android:protectionLevel="signature" /> 2279 2280 <!-- @hide Allows low-level access to tun tap driver --> 2281 <permission android:name="android.permission.NET_TUNNELING" 2282 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2283 android:protectionLevel="signature" /> 2284 2285 <!-- Run as a manufacturer test application, running as the root user. 2286 Only available when the device is running in manufacturer test mode. 2287 <p>Not for use by third-party applications. --> 2288 <permission android:name="android.permission.FACTORY_TEST" 2289 android:label="@string/permlab_factoryTest" 2290 android:description="@string/permdesc_factoryTest" 2291 android:protectionLevel="signature" /> 2292 2293 <!-- Allows an application to broadcast a notification that an application 2294 package has been removed. 2295 <p>Not for use by third-party applications. --> 2296 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED" 2297 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2298 android:label="@string/permlab_broadcastPackageRemoved" 2299 android:description="@string/permdesc_broadcastPackageRemoved" 2300 android:protectionLevel="signature" /> 2301 2302 <!-- Allows an application to broadcast an SMS receipt notification. 2303 <p>Not for use by third-party applications. --> 2304 <permission android:name="android.permission.BROADCAST_SMS" 2305 android:permissionGroup="android.permission-group.MESSAGES" 2306 android:label="@string/permlab_broadcastSmsReceived" 2307 android:description="@string/permdesc_broadcastSmsReceived" 2308 android:protectionLevel="signature" /> 2309 2310 <!-- Allows an application to broadcast a WAP PUSH receipt notification. 2311 <p>Not for use by third-party applications. --> 2312 <permission android:name="android.permission.BROADCAST_WAP_PUSH" 2313 android:permissionGroup="android.permission-group.MESSAGES" 2314 android:label="@string/permlab_broadcastWapPush" 2315 android:description="@string/permdesc_broadcastWapPush" 2316 android:protectionLevel="signature" /> 2317 2318 <!-- @SystemApi Allows an application to broadcast a SCORE_NETWORKS request. 2319 <p>Not for use by third-party applications. @hide --> 2320 <permission android:name="android.permission.BROADCAST_SCORE_NETWORKS" 2321 android:label="@string/permlab_broadcastScoreNetworks" 2322 android:description="@string/permdesc_broadcastScoreNetworks" 2323 android:protectionLevel="signature|system" /> 2324 2325 <!-- @SystemApi Not for use by third-party applications. --> 2326 <permission android:name="android.permission.MASTER_CLEAR" 2327 android:label="@string/permlab_masterClear" 2328 android:description="@string/permdesc_masterClear" 2329 android:protectionLevel="signature|system" /> 2330 2331 <!-- @SystemApi Allows an application to call any phone number, including emergency 2332 numbers, without going through the Dialer user interface for the user 2333 to confirm the call being placed. 2334 <p>Not for use by third-party applications. --> 2335 <permission android:name="android.permission.CALL_PRIVILEGED" 2336 android:label="@string/permlab_callPrivileged" 2337 android:description="@string/permdesc_callPrivileged" 2338 android:protectionLevel="signature|system" /> 2339 2340 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide --> 2341 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING" 2342 android:label="@string/permlab_performCdmaProvisioning" 2343 android:description="@string/permdesc_performCdmaProvisioning" 2344 android:protectionLevel="signature|system" /> 2345 2346 <!-- @SystemApi Allows enabling/disabling location update notifications from 2347 the radio. 2348 <p>Not for use by third-party applications. --> 2349 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES" 2350 android:label="@string/permlab_locationUpdates" 2351 android:description="@string/permdesc_locationUpdates" 2352 android:protectionLevel="signature|system" /> 2353 2354 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin 2355 database, to change values that get uploaded. 2356 <p>Not for use by third-party applications. --> 2357 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES" 2358 android:label="@string/permlab_checkinProperties" 2359 android:description="@string/permdesc_checkinProperties" 2360 android:protectionLevel="signature|system" /> 2361 2362 <!-- @SystemApi Allows an application to collect component usage 2363 statistics @hide --> 2364 <permission android:name="android.permission.PACKAGE_USAGE_STATS" 2365 android:label="@string/permlab_pkgUsageStats" 2366 android:description="@string/permdesc_pkgUsageStats" 2367 android:protectionLevel="signature|system" /> 2368 2369 <!-- @SystemApi Allows an application to collect battery statistics --> 2370 <permission android:name="android.permission.BATTERY_STATS" 2371 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2372 android:label="@string/permlab_batteryStats" 2373 android:description="@string/permdesc_batteryStats" 2374 android:protectionLevel="signature|system" /> 2375 2376 <!-- @SystemApi Allows an application to control the backup and restore process. 2377 <p>Not for use by third-party applications. 2378 @hide pending API council --> 2379 <permission android:name="android.permission.BACKUP" 2380 android:label="@string/permlab_backup" 2381 android:description="@string/permdesc_backup" 2382 android:protectionLevel="signature|system" /> 2383 2384 <!-- Allows a package to launch the secure full-backup confirmation UI. 2385 ONLY the system process may hold this permission. 2386 @hide --> 2387 <permission android:name="android.permission.CONFIRM_FULL_BACKUP" 2388 android:label="@string/permlab_confirm_full_backup" 2389 android:description="@string/permdesc_confirm_full_backup" 2390 android:protectionLevel="signature" /> 2391 2392 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService}, 2393 to ensure that only the system can bind to it. --> 2394 <permission android:name="android.permission.BIND_REMOTEVIEWS" 2395 android:label="@string/permlab_bindRemoteViews" 2396 android:description="@string/permdesc_bindRemoteViews" 2397 android:protectionLevel="signature|system" /> 2398 2399 <!-- @SystemApi Allows an application to tell the AppWidget service which application 2400 can access AppWidget's data. The normal user flow is that a user 2401 picks an AppWidget to go into a particular host, thereby giving that 2402 host application access to the private data from the AppWidget app. 2403 An application that has this permission should honor that contract. 2404 <p>Not for use by third-party applications. --> 2405 <permission android:name="android.permission.BIND_APPWIDGET" 2406 android:permissionGroup="android.permission-group.PERSONAL_INFO" 2407 android:label="@string/permlab_bindGadget" 2408 android:description="@string/permdesc_bindGadget" 2409 android:protectionLevel="signature|system" /> 2410 2411 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new 2412 keyguard widget 2413 @hide --> 2414 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET" 2415 android:permissionGroup="android.permission-group.PERSONAL_INFO" 2416 android:protectionLevel="signature|system" /> 2417 2418 <!-- @SystemApi Internal permission allowing an application to query/set which 2419 applications can bind AppWidgets. 2420 @hide --> 2421 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS" 2422 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2423 android:protectionLevel="signature|system" /> 2424 2425 <!-- Allows applications to change the background data setting. 2426 <p>Not for use by third-party applications. 2427 @hide pending API council --> 2428 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING" 2429 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2430 android:protectionLevel="signature" 2431 android:description="@string/permdesc_changeBackgroundDataSetting" 2432 android:label="@string/permlab_changeBackgroundDataSetting" /> 2433 2434 <!-- @SystemApi This permission can be used on content providers to allow the global 2435 search system to access their data. Typically it used when the 2436 provider has some permissions protecting it (which global search 2437 would not be expected to hold), and added as a read-only permission 2438 to the path in the provider where global search queries are 2439 performed. This permission can not be held by regular applications; 2440 it is used by applications to protect themselves from everyone else 2441 besides global search. --> 2442 <permission android:name="android.permission.GLOBAL_SEARCH" 2443 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2444 android:protectionLevel="signature|system" /> 2445 2446 <!-- Internal permission protecting access to the global search 2447 system: ensures that only the system can access the provider 2448 to perform queries (since this otherwise provides unrestricted 2449 access to a variety of content providers), and to write the 2450 search statistics (to keep applications from gaming the source 2451 ranking). 2452 @hide --> 2453 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL" 2454 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2455 android:protectionLevel="signature" /> 2456 2457 <!-- @SystemApi Internal permission to allows an application to read indexable data. 2458 @hide --> 2459 <permission android:name="android.permission.READ_SEARCH_INDEXABLES" 2460 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2461 android:protectionLevel="signature|system" /> 2462 2463 <!-- @SystemApi Allows applications to set a live wallpaper. 2464 @hide XXX Change to signature once the picker is moved to its 2465 own apk as Ghod Intended. --> 2466 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT" 2467 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2468 android:protectionLevel="signature|system" /> 2469 2470 <!-- @SystemApi Allows applications to read dream settings and dream state. 2471 @hide --> 2472 <permission android:name="android.permission.READ_DREAM_STATE" 2473 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2474 android:protectionLevel="signature|system" /> 2475 2476 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming. 2477 @hide --> 2478 <permission android:name="android.permission.WRITE_DREAM_STATE" 2479 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2480 android:protectionLevel="signature|system" /> 2481 2482 <!-- @SystemApi Allow an application to read and write the cache partition. 2483 @hide --> 2484 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM" 2485 android:label="@string/permlab_cache_filesystem" 2486 android:description="@string/permdesc_cache_filesystem" 2487 android:protectionLevel="signature|system" /> 2488 2489 <!-- Must be required by default container service so that only 2490 the system can bind to it and use it to copy 2491 protected data to secure containers or files 2492 accessible to the system. 2493 @hide --> 2494 <permission android:name="android.permission.COPY_PROTECTED_DATA" 2495 android:label="@string/permlab_copyProtectedData" 2496 android:description="@string/permlab_copyProtectedData" 2497 android:protectionLevel="signature" /> 2498 2499 <!-- @SystemApi Internal permission protecting access to the encryption methods 2500 @hide 2501 --> 2502 <permission android:name="android.permission.CRYPT_KEEPER" 2503 android:protectionLevel="signature|system" /> 2504 2505 <!-- @SystemApi Allows an application to read historical network usage for 2506 specific networks and applications. @hide --> 2507 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY" 2508 android:label="@string/permlab_readNetworkUsageHistory" 2509 android:description="@string/permdesc_readNetworkUsageHistory" 2510 android:protectionLevel="signature|system" /> 2511 2512 <!-- Allows an application to manage network policies (such as warning and disable 2513 limits) and to define application-specific rules. @hide --> 2514 <permission android:name="android.permission.MANAGE_NETWORK_POLICY" 2515 android:label="@string/permlab_manageNetworkPolicy" 2516 android:description="@string/permdesc_manageNetworkPolicy" 2517 android:protectionLevel="signature" /> 2518 2519 <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used 2520 by system services like download manager and media server. Not for use by 2521 third party apps. @hide --> 2522 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING" 2523 android:label="@string/permlab_modifyNetworkAccounting" 2524 android:description="@string/permdesc_modifyNetworkAccounting" 2525 android:protectionLevel="signature|system" /> 2526 2527 <!-- @SystemApi Allows an application to mark traffic as from another user for per user routing. 2528 Used by system wide services like media server that execute delegated network connections 2529 for users. 2530 @hide 2531 --> 2532 <permission android:name="android.permission.MARK_NETWORK_SOCKET" 2533 android:label="@string/permlab_markNetworkSocket" 2534 android:description="@string/permdesc_markNetworkSocket" 2535 android:protectionLevel="signature|system" /> 2536 2537 <!-- C2DM permission. 2538 @hide Used internally. 2539 --> 2540 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE" 2541 android:protectionLevel="signature" /> 2542 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/> 2543 2544 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will 2545 trust it to verify packages. 2546 --> 2547 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT" 2548 android:label="@string/permlab_packageVerificationAgent" 2549 android:description="@string/permdesc_packageVerificationAgent" 2550 android:protectionLevel="signature|system" /> 2551 2552 <!-- Must be required by package verifier receiver, to ensure that only the 2553 system can interact with it. 2554 @hide 2555 --> 2556 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER" 2557 android:label="@string/permlab_bindPackageVerifier" 2558 android:description="@string/permdesc_bindPackageVerifier" 2559 android:protectionLevel="signature" /> 2560 2561 <!-- @SystemApi Allows applications to access serial ports via the SerialManager. 2562 @hide --> 2563 <permission android:name="android.permission.SERIAL_PORT" 2564 android:label="@string/permlab_serialPort" 2565 android:description="@string/permdesc_serialPort" 2566 android:protectionLevel="signature|system" /> 2567 2568 <!-- Allows the holder to access content providers from outside an ApplicationThread. 2569 This permission is enforced by the ActivityManagerService on the corresponding APIs, 2570 in particular ActivityManagerService#getContentProviderExternal(String) and 2571 ActivityManagerService#removeContentProviderExternal(String). 2572 @hide 2573 --> 2574 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY" 2575 android:label="@string/permlab_accessContentProvidersExternally" 2576 android:description="@string/permdesc_accessContentProvidersExternally" 2577 android:protectionLevel="signature" /> 2578 2579 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless 2580 OTA reboot *not* occur while the lock is held. 2581 @hide --> 2582 <permission android:name="android.permission.UPDATE_LOCK" 2583 android:label="@string/permlab_updateLock" 2584 android:description="@string/permdesc_updateLock" 2585 android:protectionLevel="signatureOrSystem" /> 2586 2587 <!-- @SystemApi Allows an application to read the current set of notifications, including 2588 any metadata and intents attached. 2589 @hide --> 2590 <permission android:name="android.permission.ACCESS_NOTIFICATIONS" 2591 android:label="@string/permlab_accessNotifications" 2592 android:description="@string/permdesc_accessNotifications" 2593 android:protectionLevel="signature|system" /> 2594 2595 <!-- Allows access to keyguard secure storage. Only allowed for system processes. 2596 @hide --> 2597 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE" 2598 android:protectionLevel="signature" 2599 android:label="@string/permlab_access_keyguard_secure_storage" 2600 android:description="@string/permdesc_access_keyguard_secure_storage" /> 2601 2602 <!-- Allows an application to control keyguard. Only allowed for system processes. 2603 @hide --> 2604 <permission android:name="android.permission.CONTROL_KEYGUARD" 2605 android:protectionLevel="signature" 2606 android:label="@string/permlab_control_keyguard" 2607 android:description="@string/permdesc_control_keyguard" /> 2608 2609 <!-- Allows an application to listen to trust changes. Only allowed for system processes. 2610 @hide --> 2611 <permission android:name="android.permission.TRUST_LISTENER" 2612 android:protectionLevel="signature" 2613 android:label="@string/permlab_trust_listener" 2614 android:description="@string/permdesc_trust_listener" /> 2615 2616 <!-- @SystemApi Allows an application to provide a trust agent. 2617 @hide For security reasons, this is a platform-only permission. --> 2618 <permission android:name="android.permission.PROVIDE_TRUST_AGENT" 2619 android:protectionLevel="signatureOrSystem" 2620 android:label="@string/permlab_provide_trust_agent" 2621 android:description="@string/permdesc_provide_trust_agent" /> 2622 2623 <!-- Must be required by an {@link 2624 android.service.trust.TrustAgentService}, 2625 to ensure that only the system can bind to it. 2626 @hide --> 2627 <permission android:name="android.permission.BIND_TRUST_AGENT" 2628 android:protectionLevel="signature" 2629 android:label="@string/permlab_bind_trust_agent_service" 2630 android:description="@string/permdesc_bind_trust_agent_service" /> 2631 2632 <!-- Must be required by an {@link 2633 android.service.notification.NotificationListenerService}, 2634 to ensure that only the system can bind to it. --> 2635 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE" 2636 android:label="@string/permlab_bindNotificationListenerService" 2637 android:description="@string/permdesc_bindNotificationListenerService" 2638 android:protectionLevel="signature" /> 2639 2640 <!-- Must be required by an {@link 2641 android.service.notification.ConditionProviderService}, 2642 to ensure that only the system can bind to it. 2643 @hide --> 2644 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE" 2645 android:label="@string/permlab_bindConditionProviderService" 2646 android:description="@string/permdesc_bindConditionProviderService" 2647 android:protectionLevel="signature" /> 2648 2649 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the 2650 carrier setup application to enforce that this permission is required 2651 @hide This is not a third-party API (intended for OEMs and system apps). --> 2652 <permission android:name="android.permission.INVOKE_CARRIER_SETUP" 2653 android:label="@string/permlab_invokeCarrierSetup" 2654 android:description="@string/permdesc_invokeCarrierSetup" 2655 android:protectionLevel="signature|system" /> 2656 2657 <!-- @SystemApi Allows an application to listen for network condition observations. 2658 @hide This is not a third-party API (intended for system apps). --> 2659 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS" 2660 android:label="@string/permlab_accessNetworkConditions" 2661 android:description="@string/permdesc_accessNetworkConditions" 2662 android:protectionLevel="signature|system" /> 2663 2664 <!-- @SystemApi Allows an application to provision and access DRM certificates 2665 @hide This is not a third-party API (intended for system apps). --> 2666 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES" 2667 android:label="@string/permlab_accessDrmCertificates" 2668 android:description="@string/permdesc_accessDrmCertificates" 2669 android:protectionLevel="signature|system" /> 2670 2671 <!-- The system process is explicitly the only one allowed to launch the 2672 confirmation UI for full backup/restore --> 2673 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/> 2674 2675 <application android:process="system" 2676 android:persistent="true" 2677 android:hasCode="false" 2678 android:label="@string/android_system_label" 2679 android:allowClearUserData="false" 2680 android:backupAgent="com.android.server.backup.SystemBackupAgent" 2681 android:killAfterRestore="false" 2682 android:icon="@drawable/ic_launcher_android" 2683 android:supportsRtl="true"> 2684 <activity android:name="com.android.internal.app.ChooserActivity" 2685 android:theme="@style/Theme.Holo.Dialog.Alert" 2686 android:finishOnCloseSystemDialogs="true" 2687 android:excludeFromRecents="true" 2688 android:multiprocess="true"> 2689 <intent-filter> 2690 <action android:name="android.intent.action.CHOOSER" /> 2691 <category android:name="android.intent.category.DEFAULT" /> 2692 </intent-filter> 2693 </activity> 2694 <activity android:name="com.android.internal.app.IntentForwarderActivity" 2695 android:finishOnCloseSystemDialogs="true" 2696 android:theme="@style/Theme.NoDisplay" 2697 android:excludeFromRecents="true" 2698 android:label="@string/user_owner_label" 2699 android:exported="true" 2700 > 2701 </activity> 2702 <activity-alias android:name="com.android.internal.app.ForwardIntentToUserOwner" 2703 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 2704 android:icon="@drawable/personal_icon" 2705 android:exported="true" 2706 android:label="@string/user_owner_label"> 2707 </activity-alias> 2708 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile" 2709 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 2710 android:icon="@drawable/work_icon" 2711 android:exported="true" 2712 android:label="@string/managed_profile_label"> 2713 </activity-alias> 2714 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity" 2715 android:theme="@style/Theme.Holo.Dialog" 2716 android:label="@string/heavy_weight_switcher_title" 2717 android:finishOnCloseSystemDialogs="true" 2718 android:excludeFromRecents="true" 2719 android:process=":ui"> 2720 </activity> 2721 <activity android:name="com.android.internal.app.PlatLogoActivity" 2722 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen" 2723 android:process=":ui"> 2724 </activity> 2725 <activity android:name="com.android.internal.app.DisableCarModeActivity" 2726 android:theme="@style/Theme.NoDisplay" 2727 android:excludeFromRecents="true" 2728 android:process=":ui"> 2729 </activity> 2730 2731 <activity android:name="android.accounts.ChooseAccountActivity" 2732 android:excludeFromRecents="true" 2733 android:exported="true" 2734 android:theme="@android:style/Theme.Holo.Dialog" 2735 android:label="@string/choose_account_label" 2736 android:process=":ui"> 2737 </activity> 2738 2739 <activity android:name="android.accounts.ChooseTypeAndAccountActivity" 2740 android:excludeFromRecents="true" 2741 android:exported="true" 2742 android:theme="@android:style/Theme.Holo.Dialog" 2743 android:label="@string/choose_account_label" 2744 android:process=":ui"> 2745 </activity> 2746 2747 <activity android:name="android.accounts.ChooseAccountTypeActivity" 2748 android:excludeFromRecents="true" 2749 android:theme="@android:style/Theme.Holo.Dialog" 2750 android:label="@string/choose_account_label" 2751 android:process=":ui"> 2752 </activity> 2753 2754 <activity android:name="android.accounts.CantAddAccountActivity" 2755 android:excludeFromRecents="true" 2756 android:exported="true" 2757 android:theme="@android:style/Theme.Holo.Dialog.NoActionBar" 2758 android:process=":ui"> 2759 </activity> 2760 2761 <activity android:name="android.accounts.GrantCredentialsPermissionActivity" 2762 android:excludeFromRecents="true" 2763 android:exported="true" 2764 android:theme="@android:style/Theme.Holo.DialogWhenLarge" 2765 android:process=":ui"> 2766 </activity> 2767 2768 <activity android:name="android.content.SyncActivityTooManyDeletes" 2769 android:theme="@android:style/Theme.Holo.Dialog" 2770 android:label="@string/sync_too_many_deletes" 2771 android:process=":ui"> 2772 </activity> 2773 2774 <activity android:name="com.android.server.ShutdownActivity" 2775 android:permission="android.permission.SHUTDOWN" 2776 android:excludeFromRecents="true"> 2777 <intent-filter> 2778 <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" /> 2779 <category android:name="android.intent.category.DEFAULT" /> 2780 </intent-filter> 2781 <intent-filter> 2782 <action android:name="android.intent.action.REBOOT" /> 2783 <category android:name="android.intent.category.DEFAULT" /> 2784 </intent-filter> 2785 </activity> 2786 2787 <activity android:name="com.android.internal.app.NetInitiatedActivity" 2788 android:theme="@style/Theme.Holo.Dialog.Alert" 2789 android:excludeFromRecents="true" 2790 android:process=":ui"> 2791 </activity> 2792 2793 <activity android:name="com.android.internal.app.RestrictionsPinActivity" 2794 android:theme="@style/Theme.Holo.Dialog.Alert" 2795 android:excludeFromRecents="true" 2796 android:windowSoftInputMode="adjustPan" 2797 android:process=":ui"> 2798 <intent-filter android:priority="100"> 2799 <action android:name="android.intent.action.RESTRICTIONS_CHALLENGE" /> 2800 <category android:name="android.intent.category.DEFAULT" /> 2801 </intent-filter> 2802 </activity> 2803 2804 <receiver android:name="com.android.server.BootReceiver" 2805 android:primaryUserOnly="true"> 2806 <intent-filter android:priority="1000"> 2807 <action android:name="android.intent.action.BOOT_COMPLETED" /> 2808 </intent-filter> 2809 </receiver> 2810 2811 <receiver android:name="com.android.server.updates.CertPinInstallReceiver" > 2812 <intent-filter> 2813 <action android:name="android.intent.action.UPDATE_PINS" /> 2814 </intent-filter> 2815 </receiver> 2816 2817 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" > 2818 <intent-filter> 2819 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" /> 2820 </intent-filter> 2821 </receiver> 2822 2823 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" > 2824 <intent-filter> 2825 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" /> 2826 </intent-filter> 2827 </receiver> 2828 2829 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" > 2830 <intent-filter> 2831 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" /> 2832 </intent-filter> 2833 </receiver> 2834 2835 <receiver android:name="com.android.server.updates.TZInfoInstallReceiver" > 2836 <intent-filter> 2837 <action android:name="android.intent.action.UPDATE_TZINFO" /> 2838 </intent-filter> 2839 </receiver> 2840 2841 <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" > 2842 <intent-filter> 2843 <action android:name="android.intent.action.UPDATE_SEPOLICY" /> 2844 </intent-filter> 2845 </receiver> 2846 2847 <receiver android:name="com.android.server.MasterClearReceiver" 2848 android:permission="android.permission.MASTER_CLEAR"> 2849 <intent-filter 2850 android:priority="100" > 2851 <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR --> 2852 <action android:name="android.intent.action.MASTER_CLEAR" /> 2853 2854 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR --> 2855 <action android:name="com.google.android.c2dm.intent.RECEIVE" /> 2856 <category android:name="android.intent.category.MASTER_CLEAR" /> 2857 </intent-filter> 2858 </receiver> 2859 2860 <service android:name="com.android.internal.os.storage.ExternalStorageFormatter" 2861 android:permission="android.permission.MASTER_CLEAR" 2862 android:exported="true" /> 2863 2864 <service android:name="android.hardware.location.GeofenceHardwareService" 2865 android:permission="android.permission.LOCATION_HARDWARE" 2866 android:exported="false" /> 2867 2868 <service android:name="com.android.internal.backup.LocalTransportService" 2869 android:permission="android.permission.CONFIRM_FULL_BACKUP" 2870 android:exported="false"> 2871 <intent-filter> 2872 <action android:name="android.backup.TRANSPORT_HOST" /> 2873 </intent-filter> 2874 </service> 2875 2876 <service android:name="com.android.server.MountServiceIdler" 2877 android:exported="false" 2878 android:permission="android.permission.BIND_IDLE_SERVICE" > 2879 <intent-filter> 2880 <action android:name="android.service.idle.IdleService" /> 2881 </intent-filter> 2882 </service> 2883 2884 </application> 2885 2886</manifest> 2887