AndroidManifest.xml revision 29372ab484c916c0774c976d5b896a7cf19a2b91
1<?xml version="1.0" encoding="utf-8"?>
2<!--
3/* //device/apps/common/AndroidManifest.xml
4**
5** Copyright 2006, The Android Open Source Project
6**
7** Licensed under the Apache License, Version 2.0 (the "License");
8** you may not use this file except in compliance with the License.
9** You may obtain a copy of the License at
10**
11**     http://www.apache.org/licenses/LICENSE-2.0
12**
13** Unless required by applicable law or agreed to in writing, software
14** distributed under the License is distributed on an "AS IS" BASIS,
15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16** See the License for the specific language governing permissions and
17** limitations under the License.
18*/
19-->
20<manifest xmlns:android="http://schemas.android.com/apk/res/android"
21    package="android" coreApp="true" android:sharedUserId="android.uid.system"
22    android:sharedUserLabel="@string/android_system_label">
23
24    <!-- ================================================ -->
25    <!-- Special broadcasts that only the system can send -->
26    <!-- ================================================ -->
27    <eat-comment />
28
29    <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
30    <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
31    <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
32    <protected-broadcast android:name="android.intent.action.TIME_SET" />
33    <protected-broadcast android:name="android.intent.action.TIME_TICK" />
34    <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
35    <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
36    <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
37    <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
38    <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
39    <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
40    <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
41    <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
42    <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
43    <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
44    <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
45    <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
46    <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
47    <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
48    <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
49    <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
50    <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
51    <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
52    <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
53    <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
54    <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
55    <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
56    <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
57    <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
58    <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
59    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
60    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
61    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
62    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
63    <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
64    <protected-broadcast android:name="android.intent.action.REBOOT" />
65    <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
66    <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
67    <protected-broadcast android:name="android.intent.action.USER_ADDED" />
68    <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
69    <protected-broadcast android:name="android.intent.action.USER_STARTING" />
70    <protected-broadcast android:name="android.intent.action.USER_STARTED" />
71    <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
72    <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
73    <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
74    <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
75    <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
76
77    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
78
79    <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
80    <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
81    <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
82    <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
83
84    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
85    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
86    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
87    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
88    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
89    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
90
91    <protected-broadcast android:name="android.backup.intent.RUN" />
92    <protected-broadcast android:name="android.backup.intent.CLEAR" />
93    <protected-broadcast android:name="android.backup.intent.INIT" />
94
95    <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
96    <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
97    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
98    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
99    <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
100    <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
101    <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
102    <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
103    <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
104    <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
105    <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
106    <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
107    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
108    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
109    <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
110    <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
111    <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
112    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
113    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
114    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
115    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
116    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
117    <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
118    <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
119    <protected-broadcast
120        android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
121    <protected-broadcast
122        android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
123    <protected-broadcast
124        android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
125    <protected-broadcast
126        android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
127    <protected-broadcast
128        android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
129    <protected-broadcast
130        android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
131    <protected-broadcast
132        android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
133    <protected-broadcast
134        android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
135    <protected-broadcast
136        android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
137    <protected-broadcast
138        android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
139    <protected-broadcast
140        android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
141    <protected-broadcast
142        android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
143    <protected-broadcast
144        android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
145    <protected-broadcast
146        android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
147   <protected-broadcast
148        android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
149    <protected-broadcast
150        android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
151    <protected-broadcast
152        android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
153    <protected-broadcast
154        android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
155    <protected-broadcast
156        android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
157    <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" />
158    <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
159    <protected-broadcast android:name="android.btopp.intent.action.BT_OPP_HANDOVER_STARTED" />
160    <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" />
161    <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
162    <protected-broadcast android:name="android.btopp.intent.action.BT_OPP_TRANSFER_PROGRESS" />
163    <protected-broadcast android:name="android.btopp.intent.action.LIST" />
164    <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
165    <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
166    <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
167    <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
168    <protected-broadcast android:name="android.btopp.intent.action.BT_OPP_TRANSFER_DONE" />
169    <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
170    <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
171    <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
172    <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
173    <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
174    <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
175    <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
176
177    <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
178
179    <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
180    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
181    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
182    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
183    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
184
185    <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
186    <protected-broadcast android:name="android.intent.action.ANALOG_AUDIO_DOCK_PLUG" />
187    <protected-broadcast android:name="android.intent.action.DIGITAL_AUDIO_DOCK_PLUG" />
188    <protected-broadcast android:name="android.intent.action.HDMI_AUDIO_PLUG" />
189    <protected-broadcast android:name="android.intent.action.USB_AUDIO_ACCESSORY_PLUG" />
190    <protected-broadcast android:name="android.intent.action.USB_AUDIO_DEVICE_PLUG" />
191
192    <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
193    <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
194    <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
195    <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
196    <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
197    <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
198    <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
199    <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
200
201    <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
202    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
203    <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
204    <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
205    <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
206    <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
207    <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
208    <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
209    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
210    <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
211
212    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
213    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
214    <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
215    <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
216    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
217
218    <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
219
220    <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" />
221    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
222    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
223    <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
224
225    <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
226    <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
227    <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
228
229    <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
230
231    <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
232    <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
233    <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
234    <protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" />
235
236    <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
237    <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
238    <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
239    <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
240    <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
241    <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
242    <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
243    <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
244    <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
245    <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
246    <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
247    <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
248    <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
249    <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
250    <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
251    <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
252    <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
253    <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
254    <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
255    <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
256    <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
257    <protected-broadcast
258            android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
259    <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
260    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
261    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
262    <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
263    <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
264    <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
265    <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" />
266
267    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
268    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
269
270    <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
271
272    <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
273
274    <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
275    <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
276    <protected-broadcast android:name="android.location.MODE_CHANGED" />
277    <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
278    <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
279
280    <protected-broadcast
281        android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
282
283    <!-- Defined in RestrictionsManager -->
284    <protected-broadcast
285        android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
286    <!-- Defined in RestrictionsManager -->
287    <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
288
289    <!-- ====================================== -->
290    <!-- Permissions for things that cost money -->
291    <!-- ====================================== -->
292    <eat-comment />
293
294    <!-- Used for permissions that can be used to make the user spend money
295         without their direct involvement. -->
296    <permission-group android:name="android.permission-group.COST_MONEY"
297        android:label="@string/permgrouplab_costMoney"
298        android:description="@string/permgroupdesc_costMoney" />
299
300    <!-- ================================== -->
301    <!-- Permissions for accessing messages -->
302    <!-- ================================== -->
303    <eat-comment />
304
305    <!-- Used for permissions that allow an application to send messages
306         on behalf of the user or intercept messages being received by the
307         user.  This is primarily intended for SMS/MMS messaging, such as
308         receiving or reading an MMS. -->
309    <permission-group android:name="android.permission-group.MESSAGES"
310        android:label="@string/permgrouplab_messages"
311        android:icon="@drawable/perm_group_messages"
312        android:description="@string/permgroupdesc_messages"
313        android:permissionGroupFlags="personalInfo"
314        android:priority="360"/>
315
316    <!-- Allows an application to send SMS messages. -->
317    <permission android:name="android.permission.SEND_SMS"
318        android:permissionGroup="android.permission-group.MESSAGES"
319        android:protectionLevel="dangerous"
320        android:permissionFlags="costsMoney"
321        android:label="@string/permlab_sendSms"
322        android:description="@string/permdesc_sendSms" />
323
324    <!-- @SystemApi Allows an application (Phone) to send a request to other applications
325         to handle the respond-via-message action during incoming calls.
326         <p>Not for use by third-party applications. -->
327    <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
328        android:permissionGroup="android.permission-group.MESSAGES"
329        android:protectionLevel="signature|system"
330        android:label="@string/permlab_sendRespondViaMessageRequest"
331        android:description="@string/permdesc_sendRespondViaMessageRequest" />
332
333    <!-- Allows an application to monitor incoming SMS messages, to record
334         or perform processing on them. -->
335    <permission android:name="android.permission.RECEIVE_SMS"
336        android:permissionGroup="android.permission-group.MESSAGES"
337        android:protectionLevel="dangerous"
338        android:label="@string/permlab_receiveSms"
339        android:description="@string/permdesc_receiveSms" />
340
341    <!-- Allows an application to monitor incoming MMS messages, to record
342         or perform processing on them. -->
343    <permission android:name="android.permission.RECEIVE_MMS"
344        android:permissionGroup="android.permission-group.MESSAGES"
345        android:protectionLevel="dangerous"
346        android:label="@string/permlab_receiveMms"
347        android:description="@string/permdesc_receiveMms" />
348
349    <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
350         to record or display them to the user.
351         <p>Not for use by third-party applications.
352         @hide Pending API council approval -->
353    <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
354        android:permissionGroup="android.permission-group.MESSAGES"
355        android:protectionLevel="signature|system"
356        android:label="@string/permlab_receiveEmergencyBroadcast"
357        android:description="@string/permdesc_receiveEmergencyBroadcast" />
358
359    <!-- Allows an application to read previously received cell broadcast
360         messages and to register a content observer to get notifications when
361         a cell broadcast has been received and added to the database. For
362         emergency alerts, the database is updated immediately after the
363         alert dialog and notification sound/vibration/speech are presented.
364         The "read" column is then updated after the user dismisses the alert.
365         This enables supplementary emergency assistance apps to start loading
366         additional emergency information (if Internet access is available)
367         when the alert is first received, and to delay presenting the info
368         to the user until after the initial alert dialog is dismissed.
369         @hide Pending API council approval -->
370    <permission android:name="android.permission.READ_CELL_BROADCASTS"
371        android:permissionGroup="android.permission-group.MESSAGES"
372        android:protectionLevel="dangerous"
373        android:label="@string/permlab_readCellBroadcasts"
374        android:description="@string/permdesc_readCellBroadcasts" />
375
376    <!-- Allows an application to read SMS messages. -->
377    <permission android:name="android.permission.READ_SMS"
378        android:permissionGroup="android.permission-group.MESSAGES"
379        android:protectionLevel="dangerous"
380        android:label="@string/permlab_readSms"
381        android:description="@string/permdesc_readSms" />
382
383    <!-- Allows an application to write SMS messages. -->
384    <permission android:name="android.permission.WRITE_SMS"
385        android:permissionGroup="android.permission-group.MESSAGES"
386        android:protectionLevel="dangerous"
387        android:label="@string/permlab_writeSms"
388        android:description="@string/permdesc_writeSms" />
389
390    <!-- Allows an application to monitor incoming WAP push messages. -->
391    <permission android:name="android.permission.RECEIVE_WAP_PUSH"
392        android:permissionGroup="android.permission-group.MESSAGES"
393        android:protectionLevel="dangerous"
394        android:label="@string/permlab_receiveWapPush"
395        android:description="@string/permdesc_receiveWapPush" />
396
397    <!-- =============================================================== -->
398    <!-- Permissions for accessing social info (contacts and social) -->
399    <!-- =============================================================== -->
400    <eat-comment />
401
402    <!-- Used for permissions that provide access to the user's social connections,
403         such as contacts, call logs, social stream, etc.  This includes
404         both reading and writing of this data (which should generally be
405         expressed as two distinct permissions). -->
406
407    <permission-group android:name="android.permission-group.SOCIAL_INFO"
408        android:label="@string/permgrouplab_socialInfo"
409        android:icon="@drawable/perm_group_social_info"
410        android:description="@string/permgroupdesc_socialInfo"
411        android:permissionGroupFlags="personalInfo"
412        android:priority="320" />
413
414    <!-- Allows an application to read the user's contacts data. -->
415    <permission android:name="android.permission.READ_CONTACTS"
416        android:permissionGroup="android.permission-group.SOCIAL_INFO"
417        android:protectionLevel="dangerous"
418        android:label="@string/permlab_readContacts"
419        android:description="@string/permdesc_readContacts" />
420
421    <!-- Allows an application to write (but not read) the user's
422         contacts data. -->
423    <permission android:name="android.permission.WRITE_CONTACTS"
424        android:permissionGroup="android.permission-group.SOCIAL_INFO"
425        android:protectionLevel="dangerous"
426        android:label="@string/permlab_writeContacts"
427        android:description="@string/permdesc_writeContacts" />
428
429    <!-- @SystemApi @hide Allows an application to execute contacts directory search.
430         This should only be used by ContactsProvider.
431         <p>Not for use by third-party applications. -->
432    <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
433        android:permissionGroup="android.permission-group.PERSONAL_INFO"
434        android:protectionLevel="signature|system" />
435
436    <!-- Allows an application to read the user's call log.
437         <p class="note"><strong>Note:</strong> If your app uses the
438         {@link #READ_CONTACTS} permission and <em>both</em> your <a
439         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
440         minSdkVersion}</a> and <a
441         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
442         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
443         grants your app this permission. If you don't need this permission, be sure your <a
444         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
445         targetSdkVersion}</a> is 16 or higher.</p> -->
446    <permission android:name="android.permission.READ_CALL_LOG"
447        android:permissionGroup="android.permission-group.SOCIAL_INFO"
448        android:protectionLevel="dangerous"
449        android:label="@string/permlab_readCallLog"
450        android:description="@string/permdesc_readCallLog" />
451
452    <!-- Allows an application to write (but not read) the user's
453         contacts data.
454         <p class="note"><strong>Note:</strong> If your app uses the
455         {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
456         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
457         minSdkVersion}</a> and <a
458         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
459         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
460         grants your app this permission. If you don't need this permission, be sure your <a
461         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
462         targetSdkVersion}</a> is 16 or higher.</p>  -->
463    <permission android:name="android.permission.WRITE_CALL_LOG"
464        android:permissionGroup="android.permission-group.SOCIAL_INFO"
465        android:protectionLevel="dangerous"
466        android:label="@string/permlab_writeCallLog"
467        android:description="@string/permdesc_writeCallLog" />
468
469  <!-- Allows an application to read from the user's social stream. -->
470    <permission android:name="android.permission.READ_SOCIAL_STREAM"
471        android:permissionGroup="android.permission-group.SOCIAL_INFO"
472        android:protectionLevel="dangerous"
473        android:label="@string/permlab_readSocialStream"
474        android:description="@string/permdesc_readSocialStream" />
475
476    <!-- Allows an application to write (but not read) the user's
477         social stream data. -->
478    <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
479        android:permissionGroup="android.permission-group.SOCIAL_INFO"
480        android:protectionLevel="dangerous"
481        android:label="@string/permlab_writeSocialStream"
482        android:description="@string/permdesc_writeSocialStream" />
483
484    <!-- =============================================================== -->
485    <!-- Permissions for accessing information about the device owner    -->
486    <!-- =============================================================== -->
487    <eat-comment />
488
489    <!-- Used for permissions that provide access to information about the device
490         user such as profile information.  This includes both reading and
491         writing of this data (which should generally be expressed as two
492         distinct permissions). -->
493    <permission-group android:name="android.permission-group.PERSONAL_INFO"
494        android:label="@string/permgrouplab_personalInfo"
495        android:icon="@drawable/perm_group_personal_info"
496        android:description="@string/permgroupdesc_personalInfo"
497        android:permissionGroupFlags="personalInfo"
498        android:priority="310" />
499
500    <!-- Allows an application to read the user's personal profile data. -->
501    <permission android:name="android.permission.READ_PROFILE"
502        android:permissionGroup="android.permission-group.PERSONAL_INFO"
503        android:protectionLevel="dangerous"
504        android:label="@string/permlab_readProfile"
505        android:description="@string/permdesc_readProfile" />
506
507    <!-- Allows an application to write (but not read) the user's
508         personal profile data. -->
509    <permission android:name="android.permission.WRITE_PROFILE"
510        android:permissionGroup="android.permission-group.PERSONAL_INFO"
511        android:protectionLevel="dangerous"
512        android:label="@string/permlab_writeProfile"
513        android:description="@string/permdesc_writeProfile" />
514
515    <!-- Allows an application to access data from sensors that the user uses to
516         measure what is happening inside his/her body, such as heart rate. -->
517    <permission android:name="android.permission.BODY_SENSORS"
518        android:permissionGroup="android.permission-group.PERSONAL_INFO"
519        android:label="@string/permlab_bodySensors"
520        android:description="@string/permdesc_bodySensors" />
521
522    <!-- =============================================================== -->
523    <!-- Permissions for accessing the device calendar                   -->
524    <!-- =============================================================== -->
525    <eat-comment />
526
527    <!-- Used for permissions that provide access to the device
528         calendar to create / view events.-->
529    <permission-group android:name="android.permission-group.CALENDAR"
530        android:label="@string/permgrouplab_calendar"
531        android:icon="@drawable/perm_group_calendar"
532        android:description="@string/permgroupdesc_calendar"
533        android:permissionGroupFlags="personalInfo"
534        android:priority="290" />
535
536    <!-- Allows an application to read the user's calendar data. -->
537    <permission android:name="android.permission.READ_CALENDAR"
538        android:permissionGroup="android.permission-group.PERSONAL_INFO"
539        android:protectionLevel="dangerous"
540        android:label="@string/permlab_readCalendar"
541        android:description="@string/permdesc_readCalendar" />
542
543    <!-- Allows an application to write (but not read) the user's
544         calendar data. -->
545    <permission android:name="android.permission.WRITE_CALENDAR"
546        android:permissionGroup="android.permission-group.PERSONAL_INFO"
547        android:protectionLevel="dangerous"
548        android:label="@string/permlab_writeCalendar"
549        android:description="@string/permdesc_writeCalendar" />
550
551    <!-- =============================================================== -->
552    <!-- Permissions for accessing the user dictionary-->
553    <!-- =============================================================== -->
554    <eat-comment />
555
556    <!-- Used for permissions that provide access to the user
557         calendar to create / view events.-->
558    <permission-group android:name="android.permission-group.USER_DICTIONARY"
559        android:label="@string/permgrouplab_dictionary"
560        android:icon="@drawable/perm_group_user_dictionary"
561        android:description="@string/permgroupdesc_dictionary"
562        android:permissionGroupFlags="personalInfo"
563        android:priority="170" />
564
565    <!-- Allows an application to read the user dictionary. This should
566         really only be required by an IME, or a dictionary editor like
567         the Settings app. -->
568    <permission android:name="android.permission.READ_USER_DICTIONARY"
569        android:permissionGroup="android.permission-group.USER_DICTIONARY"
570        android:protectionLevel="dangerous"
571        android:label="@string/permlab_readDictionary"
572        android:description="@string/permdesc_readDictionary" />
573
574    <!-- Used for permissions that provide access to the user
575         calendar to create / view events.-->
576    <permission-group android:name="android.permission-group.WRITE_USER_DICTIONARY"
577        android:label="@string/permgrouplab_writeDictionary"
578        android:icon="@drawable/perm_group_user_dictionary_write"
579        android:description="@string/permgroupdesc_writeDictionary"
580        android:priority="160" />
581
582    <!-- Allows an application to write to the user dictionary. -->
583    <permission android:name="android.permission.WRITE_USER_DICTIONARY"
584        android:permissionGroup="android.permission-group.WRITE_USER_DICTIONARY"
585        android:protectionLevel="normal"
586        android:label="@string/permlab_writeDictionary"
587        android:description="@string/permdesc_writeDictionary" />
588
589    <!-- =============================================================== -->
590    <!-- Permissions for accessing the user bookmarks                    -->
591    <!-- =============================================================== -->
592    <eat-comment />
593
594    <!-- Used for permissions that provide access to the user
595         bookmarks and browser history.-->
596    <permission-group android:name="android.permission-group.BOOKMARKS"
597        android:label="@string/permgrouplab_bookmarks"
598        android:icon="@drawable/perm_group_bookmarks"
599        android:description="@string/permgroupdesc_bookmarks"
600        android:permissionGroupFlags="personalInfo"
601        android:priority="300" />
602
603    <!-- Allows an application to read (but not write) the user's
604        browsing history and bookmarks. -->
605    <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
606        android:permissionGroup="android.permission-group.BOOKMARKS"
607        android:label="@string/permlab_readHistoryBookmarks"
608        android:description="@string/permdesc_readHistoryBookmarks"
609        android:protectionLevel="dangerous" />
610
611    <!-- Allows an application to write (but not read) the user's
612        browsing history and bookmarks. -->
613    <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
614        android:permissionGroup="android.permission-group.BOOKMARKS"
615        android:label="@string/permlab_writeHistoryBookmarks"
616        android:description="@string/permdesc_writeHistoryBookmarks"
617        android:protectionLevel="dangerous" />
618
619    <!-- =============================================================== -->
620    <!-- Permissions for setting the device alarm                        -->
621    <!-- =============================================================== -->
622    <eat-comment />
623
624    <!-- Used for permissions that provide access to device alarms. -->
625    <permission-group android:name="android.permission-group.DEVICE_ALARMS"
626        android:label="@string/permgrouplab_deviceAlarms"
627        android:icon="@drawable/perm_group_device_alarms"
628        android:description="@string/permgroupdesc_deviceAlarms"
629        android:permissionGroupFlags="personalInfo"
630        android:priority="210" />
631
632    <!-- Allows an application to broadcast an Intent to set an alarm for the
633         user. -->
634    <permission android:name="com.android.alarm.permission.SET_ALARM"
635        android:permissionGroup="android.permission-group.DEVICE_ALARMS"
636        android:label="@string/permlab_setAlarm"
637        android:description="@string/permdesc_setAlarm"
638        android:protectionLevel="normal" />
639
640    <!-- =============================================================== -->
641    <!-- Permissions for accessing the user voicemail                    -->
642    <!-- =============================================================== -->
643    <eat-comment />
644
645    <!-- Used for permissions that provide access to the user voicemail box. -->
646    <permission-group android:name="android.permission-group.VOICEMAIL"
647        android:label="@string/permgrouplab_voicemail"
648        android:icon="@drawable/perm_group_voicemail"
649        android:description="@string/permgroupdesc_voicemail"
650        android:permissionGroupFlags="personalInfo"
651        android:priority="280" />
652
653   <!-- Allows an application to add voicemails into the system. -->
654    <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
655        android:permissionGroup="android.permission-group.VOICEMAIL"
656        android:protectionLevel="dangerous"
657        android:label="@string/permlab_addVoicemail"
658        android:description="@string/permdesc_addVoicemail" />
659
660    <!-- =============================================== -->
661    <!-- Permissions for enabling accessibility features -->
662    <!-- =============================================== -->
663    <eat-comment />
664
665    <!-- Used for permissions that allow requesting certain accessibility features. -->
666    <permission-group android:name="android.permission-group.ACCESSIBILITY_FEATURES"
667        android:label="@string/permgrouplab_accessibilityFeatures"
668        android:icon="@drawable/perm_group_accessibility_features"
669        android:description="@string/permgroupdesc_accessibilityFeatures"
670        android:priority="380" />
671
672    <!-- ======================================= -->
673    <!-- Permissions for accessing location info -->
674    <!-- ======================================= -->
675    <eat-comment />
676
677    <!-- Used for permissions that allow access to the user's current
678         location. -->
679    <permission-group android:name="android.permission-group.LOCATION"
680        android:label="@string/permgrouplab_location"
681        android:icon="@drawable/perm_group_location"
682        android:description="@string/permgroupdesc_location"
683        android:permissionGroupFlags="personalInfo"
684        android:priority="330" />
685
686    <!-- Allows an app to access precise location from location sources such
687         as GPS, cell towers, and Wi-Fi. -->
688    <permission android:name="android.permission.ACCESS_FINE_LOCATION"
689        android:permissionGroup="android.permission-group.LOCATION"
690        android:protectionLevel="dangerous"
691        android:label="@string/permlab_accessFineLocation"
692        android:description="@string/permdesc_accessFineLocation" />
693
694    <!-- Allows an app to access approximate location derived from network location
695         sources such as cell towers and Wi-Fi. -->
696    <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
697        android:permissionGroup="android.permission-group.LOCATION"
698        android:protectionLevel="dangerous"
699        android:label="@string/permlab_accessCoarseLocation"
700        android:description="@string/permdesc_accessCoarseLocation" />
701
702    <!-- Allows an application to create mock location providers for testing -->
703    <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
704        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
705        android:protectionLevel="dangerous"
706        android:label="@string/permlab_accessMockLocation"
707        android:description="@string/permdesc_accessMockLocation" />
708
709    <!-- Allows an application to access extra location provider commands -->
710    <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
711        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
712        android:protectionLevel="normal"
713        android:label="@string/permlab_accessLocationExtraCommands"
714        android:description="@string/permdesc_accessLocationExtraCommands" />
715
716    <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
717    <p>Not for use by third-party applications. -->
718    <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
719        android:protectionLevel="signature|system"
720        android:label="@string/permlab_installLocationProvider"
721        android:description="@string/permdesc_installLocationProvider" />
722
723    <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
724         This should only be used by HDMI-CEC service.
725    -->
726    <permission android:name="android.permission.HDMI_CEC"
727        android:protectionLevel="signatureOrSystem" />
728
729    <!-- @SystemApi Allows an application to use location features in hardware,
730         such as the geofencing api.
731         <p>Not for use by third-party applications. -->
732    <permission android:name="android.permission.LOCATION_HARDWARE"
733        android:permissionGroup="android.permission-group.LOCATION"
734        android:protectionLevel="signature|system" />
735    <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
736
737    <!-- ======================================= -->
738    <!-- Permissions for accessing networks -->
739    <!-- ======================================= -->
740    <eat-comment />
741
742    <!-- Used for permissions that provide access to networking services.  The
743         main permission here is internet access, but this is also an
744         appropriate group for accessing or modifying any network configuration
745         or other related network operations. -->
746    <permission-group android:name="android.permission-group.NETWORK"
747        android:label="@string/permgrouplab_network"
748        android:icon="@drawable/perm_group_network"
749        android:description="@string/permgroupdesc_network"
750        android:priority="270" />
751
752    <!-- Allows applications to open network sockets. -->
753    <permission android:name="android.permission.INTERNET"
754        android:permissionGroup="android.permission-group.NETWORK"
755        android:protectionLevel="dangerous"
756        android:description="@string/permdesc_createNetworkSockets"
757        android:label="@string/permlab_createNetworkSockets" />
758
759    <!-- Allows applications to access information about networks -->
760    <permission android:name="android.permission.ACCESS_NETWORK_STATE"
761        android:permissionGroup="android.permission-group.NETWORK"
762        android:protectionLevel="normal"
763        android:description="@string/permdesc_accessNetworkState"
764        android:label="@string/permlab_accessNetworkState" />
765
766    <!-- Allows applications to access information about Wi-Fi networks -->
767    <permission android:name="android.permission.ACCESS_WIFI_STATE"
768        android:permissionGroup="android.permission-group.NETWORK"
769        android:protectionLevel="normal"
770        android:description="@string/permdesc_accessWifiState"
771        android:label="@string/permlab_accessWifiState" />
772
773    <!-- Allows applications to change Wi-Fi connectivity state -->
774    <permission android:name="android.permission.CHANGE_WIFI_STATE"
775        android:permissionGroup="android.permission-group.NETWORK"
776        android:protectionLevel="dangerous"
777        android:description="@string/permdesc_changeWifiState"
778        android:label="@string/permlab_changeWifiState" />
779
780    <!-- @hide -->
781    <permission android:name="android.permission.ACCESS_WIMAX_STATE"
782        android:permissionGroup="android.permission-group.NETWORK"
783        android:protectionLevel="normal"
784        android:description="@string/permdesc_accessWimaxState"
785        android:label="@string/permlab_accessWimaxState" />
786
787    <!-- @hide -->
788    <permission android:name="android.permission.CHANGE_WIMAX_STATE"
789        android:permissionGroup="android.permission-group.NETWORK"
790        android:protectionLevel="dangerous"
791        android:description="@string/permdesc_changeWimaxState"
792        android:label="@string/permlab_changeWimaxState" />
793
794    <!-- Allows applications to act as network scorers. @hide -->
795    <permission android:name="android.permission.SCORE_NETWORKS"
796        android:permissionGroup="android.permission-group.NETWORK"
797        android:protectionLevel="normal"
798        android:description="@string/permdesc_scoreNetworks"
799        android:label="@string/permlab_scoreNetworks" />
800
801    <!-- ======================================= -->
802    <!-- Permissions for short range, peripheral networks -->
803    <!-- ======================================= -->
804    <eat-comment />
805
806    <!-- Used for permissions that provide access to other devices through Bluetooth.-->
807    <permission-group android:name="android.permission-group.BLUETOOTH_NETWORK"
808        android:label="@string/permgrouplab_bluetoothNetwork"
809        android:icon="@drawable/perm_group_bluetooth"
810        android:description="@string/permgroupdesc_bluetoothNetwork"
811        android:priority="260" />
812
813    <!-- Allows applications to connect to paired bluetooth devices -->
814    <permission android:name="android.permission.BLUETOOTH"
815        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
816        android:protectionLevel="dangerous"
817        android:description="@string/permdesc_bluetooth"
818        android:label="@string/permlab_bluetooth" />
819
820    <!-- Allows applications to discover and pair bluetooth devices -->
821    <permission android:name="android.permission.BLUETOOTH_ADMIN"
822        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
823        android:protectionLevel="dangerous"
824        android:description="@string/permdesc_bluetoothAdmin"
825        android:label="@string/permlab_bluetoothAdmin" />
826
827    <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction.
828         This is not available to third party applications. -->
829    <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
830        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
831        android:protectionLevel="system|signature"
832        android:description="@string/permdesc_bluetoothPriv"
833        android:label="@string/permlab_bluetoothPriv" />
834
835    <!-- Allows bluetooth stack to access files
836         @hide This should only be used by Bluetooth apk.
837    -->
838    <permission android:name="android.permission.BLUETOOTH_STACK"
839        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
840        android:protectionLevel="signature" />
841
842    <!-- Allows applications to perform I/O operations over NFC -->
843    <permission android:name="android.permission.NFC"
844        android:permissionGroup="android.permission-group.NETWORK"
845        android:protectionLevel="dangerous"
846        android:description="@string/permdesc_nfc"
847        android:label="@string/permlab_nfc" />
848
849    <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
850        @hide -->
851    <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
852        android:permissionGroup="android.permission-group.NETWORK"
853        android:protectionLevel="signature|system" />
854
855    <!-- @SystemApi @hide -->
856    <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
857        android:permissionGroup="android.permission-group.NETWORK"
858        android:protectionLevel="signature|system" />
859
860    <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
861	@hide -->
862    <permission android:name="android.permission.LOOP_RADIO"
863	android:permissionGroup="android.permission-group.NETWORK"
864	android:protectionLevel="signature|system" />
865
866    <!-- ================================== -->
867    <!-- Permissions for accessing accounts -->
868    <!-- ================================== -->
869    <eat-comment />
870
871    <!-- Permissions for direct access to the accounts managed
872         by the Account Manager. -->
873    <permission-group android:name="android.permission-group.ACCOUNTS"
874        android:label="@string/permgrouplab_accounts"
875        android:icon="@drawable/perm_group_accounts"
876        android:description="@string/permgroupdesc_accounts"
877        android:permissionGroupFlags="personalInfo"
878        android:priority="200" />
879
880    <!-- Allows access to the list of accounts in the Accounts Service -->
881    <permission android:name="android.permission.GET_ACCOUNTS"
882        android:permissionGroup="android.permission-group.ACCOUNTS"
883        android:protectionLevel="normal"
884        android:description="@string/permdesc_getAccounts"
885        android:label="@string/permlab_getAccounts" />
886
887    <!-- Allows an application to act as an AccountAuthenticator for
888         the AccountManager -->
889    <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
890        android:permissionGroup="android.permission-group.ACCOUNTS"
891        android:protectionLevel="dangerous"
892        android:label="@string/permlab_authenticateAccounts"
893        android:description="@string/permdesc_authenticateAccounts" />
894
895    <!-- Allows an application to request authtokens from the AccountManager -->
896    <permission android:name="android.permission.USE_CREDENTIALS"
897        android:permissionGroup="android.permission-group.ACCOUNTS"
898        android:protectionLevel="dangerous"
899        android:label="@string/permlab_useCredentials"
900        android:description="@string/permdesc_useCredentials" />
901
902    <!-- Allows an application to manage the list of accounts in the AccountManager -->
903    <permission android:name="android.permission.MANAGE_ACCOUNTS"
904        android:permissionGroup="android.permission-group.ACCOUNTS"
905        android:protectionLevel="dangerous"
906        android:label="@string/permlab_manageAccounts"
907        android:description="@string/permdesc_manageAccounts" />
908
909    <!-- @SystemApi Allows applications to call into AccountAuthenticators.
910    <p>Not for use by third-party applications. -->
911    <permission android:name="android.permission.ACCOUNT_MANAGER"
912        android:permissionGroup="android.permission-group.ACCOUNTS"
913        android:protectionLevel="signature"
914        android:description="@string/permdesc_accountManagerService"
915        android:label="@string/permlab_accountManagerService" />
916
917    <!-- ================================== -->
918    <!-- Permissions for accessing hardware that may effect battery life-->
919    <!-- ================================== -->
920    <eat-comment />
921
922    <!-- Used for permissions that provide direct access to the hardware on
923         the device that has an effect on battery life.  This includes vibrator,
924         flashlight,  etc. -->
925
926    <permission-group android:name="android.permission-group.AFFECTS_BATTERY"
927        android:label="@string/permgrouplab_affectsBattery"
928        android:icon="@drawable/perm_group_affects_battery"
929        android:description="@string/permgroupdesc_affectsBattery"
930        android:priority="180" />
931
932    <!-- Allows applications to enter Wi-Fi Multicast mode -->
933    <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
934        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
935        android:protectionLevel="dangerous"
936        android:description="@string/permdesc_changeWifiMulticastState"
937        android:label="@string/permlab_changeWifiMulticastState" />
938
939    <!-- Allows access to the vibrator -->
940    <permission android:name="android.permission.VIBRATE"
941        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
942        android:protectionLevel="normal"
943        android:label="@string/permlab_vibrate"
944        android:description="@string/permdesc_vibrate" />
945
946    <!-- Allows access to the flashlight -->
947    <permission android:name="android.permission.FLASHLIGHT"
948        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
949        android:protectionLevel="normal"
950        android:label="@string/permlab_flashlight"
951        android:description="@string/permdesc_flashlight" />
952
953    <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
954         from dimming -->
955    <permission android:name="android.permission.WAKE_LOCK"
956        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
957        android:protectionLevel="normal"
958        android:label="@string/permlab_wakeLock"
959        android:description="@string/permdesc_wakeLock" />
960
961    <!-- Allows using the device's IR transmitter, if available -->
962    <permission android:name="android.permission.TRANSMIT_IR"
963        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
964        android:protectionLevel="normal"
965        android:label="@string/permlab_transmitIr"
966        android:description="@string/permdesc_transmitIr" />
967
968    <!-- ==================================================== -->
969    <!-- Permissions related to changing audio settings   -->
970    <!-- ==================================================== -->
971    <eat-comment />
972
973    <!-- Used for permissions that provide direct access to speaker settings
974         the device. -->
975    <permission-group android:name="android.permission-group.AUDIO_SETTINGS"
976        android:label="@string/permgrouplab_audioSettings"
977        android:icon="@drawable/perm_group_audio_settings"
978        android:description="@string/permgroupdesc_audioSettings"
979        android:priority="130" />
980
981    <!-- Allows an application to modify global audio settings -->
982    <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
983        android:permissionGroup="android.permission-group.AUDIO_SETTINGS"
984        android:protectionLevel="normal"
985        android:label="@string/permlab_modifyAudioSettings"
986        android:description="@string/permdesc_modifyAudioSettings" />
987
988    <!-- ================================== -->
989    <!-- Permissions for accessing hardware -->
990    <!-- ================================== -->
991    <eat-comment />
992
993    <!-- Used for permissions that provide direct access to the hardware on
994         the device.  This includes audio, the camera, vibrator, etc. -->
995    <permission-group android:name="android.permission-group.HARDWARE_CONTROLS"
996        android:label="@string/permgrouplab_hardwareControls"
997        android:description="@string/permgroupdesc_hardwareControls"
998        android:priority="260"/>
999
1000    <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
1001         @hide -->
1002    <permission android:name="android.permission.MANAGE_USB"
1003        android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1004        android:protectionLevel="signature|system"
1005        android:label="@string/permlab_manageUsb"
1006        android:description="@string/permdesc_manageUsb" />
1007
1008    <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
1009         For use only by the device side MTP implementation.
1010         @hide -->
1011    <permission android:name="android.permission.ACCESS_MTP"
1012        android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1013        android:protectionLevel="signature|system"
1014        android:label="@string/permlab_accessMtp"
1015        android:description="@string/permdesc_accessMtp" />
1016
1017    <!-- Allows access to hardware peripherals.  Intended only for hardware testing.
1018    <p>Not for use by third-party applications. -->
1019    <permission android:name="android.permission.HARDWARE_TEST"
1020        android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1021        android:protectionLevel="signature"
1022        android:label="@string/permlab_hardware_test"
1023        android:description="@string/permdesc_hardware_test" />
1024
1025    <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
1026         @hide -->
1027    <permission android:name="android.permission.NET_ADMIN"
1028        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1029        android:protectionLevel="signature" />
1030
1031    <!-- Allows registration for remote audio playback. @hide -->
1032    <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
1033        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1034        android:protectionLevel="signature" />
1035
1036    <!-- Allows an application to communicate with a SIM card using logical
1037         channels. -->
1038    <permission android:name="android.permission.SIM_COMMUNICATION"
1039        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1040        android:label="@string/permlab_sim_communication"
1041        android:description="@string/permdesc_sim_communication"
1042        android:protectionLevel="dangerous" />
1043
1044    <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
1045         built-in tuners and HDMI-in's.
1046         @hide This should only be used by OEM's TvInputService's.
1047    -->
1048    <permission android:name="android.permission.TV_INPUT_HARDWARE"
1049        android:protectionLevel="signatureOrSystem" />
1050
1051    <!-- =========================================== -->
1052    <!-- Permissions associated with audio capture -->
1053    <!-- =========================================== -->
1054    <eat-comment />
1055
1056    <!-- Used for permissions that are associated with accessing
1057         microphone audio from the device. Note that phone calls also capture audio
1058         but are in a separate (more visible) permission group. -->
1059    <permission-group android:name="android.permission-group.MICROPHONE"
1060        android:label="@string/permgrouplab_microphone"
1061        android:icon="@drawable/perm_group_microphone"
1062        android:description="@string/permgroupdesc_microphone"
1063        android:permissionGroupFlags="personalInfo"
1064        android:priority="340" />
1065
1066    <!-- Allows an application to record audio -->
1067    <permission android:name="android.permission.RECORD_AUDIO"
1068        android:permissionGroup="android.permission-group.MICROPHONE"
1069        android:protectionLevel="dangerous"
1070        android:label="@string/permlab_recordAudio"
1071        android:description="@string/permdesc_recordAudio" />
1072
1073
1074    <!-- =========================================== -->
1075    <!-- Permissions associated with camera and image capture -->
1076    <!-- =========================================== -->
1077    <eat-comment />
1078
1079    <!-- Used for permissions that are associated with accessing
1080         camera or capturing images/video from the device. -->
1081    <permission-group android:name="android.permission-group.CAMERA"
1082        android:label="@string/permgrouplab_camera"
1083        android:icon="@drawable/perm_group_camera"
1084        android:description="@string/permgroupdesc_camera"
1085        android:permissionGroupFlags="personalInfo"
1086        android:priority="350" />
1087
1088    <!-- Required to be able to access the camera device.
1089         <p>This will automatically enforce the <a
1090         href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code
1091         &lt;uses-feature&gt;}</a> manifest element for <em>all</em> camera features.
1092         If you do not require all camera features or can properly operate if a camera
1093         is not available, then you must modify your manifest as appropriate in order to
1094         install on devices that don't support all camera features.</p> -->
1095    <permission android:name="android.permission.CAMERA"
1096        android:permissionGroup="android.permission-group.CAMERA"
1097        android:protectionLevel="dangerous"
1098        android:label="@string/permlab_camera"
1099        android:description="@string/permdesc_camera" />
1100
1101    <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
1102         a camera is in use by an application.
1103         @hide -->
1104    <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
1105        android:permissionGroup="android.permission-group.CAMERA"
1106        android:protectionLevel="signature|system"
1107        android:label="@string/permlab_cameraDisableTransmitLed"
1108        android:description="@string/permdesc_cameraDisableTransmitLed" />
1109
1110    <!-- =========================================== -->
1111    <!-- Permissions associated with telephony state -->
1112    <!-- =========================================== -->
1113    <eat-comment />
1114
1115    <!-- Used for permissions that are associated with accessing and modifying
1116         telephony state: placing calls, intercepting outgoing calls, reading
1117         and modifying the phone state. -->
1118    <permission-group android:name="android.permission-group.PHONE_CALLS"
1119        android:label="@string/permgrouplab_phoneCalls"
1120        android:icon="@drawable/perm_group_phone_calls"
1121        android:description="@string/permgroupdesc_phoneCalls"
1122        android:permissionGroupFlags="personalInfo"
1123        android:priority="370" />
1124
1125    <!-- Allows an application to see the number being dialed during an outgoing
1126         call with the option to redirect the call to a different number or
1127         abort the call altogether. -->
1128    <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
1129        android:permissionGroup="android.permission-group.PHONE_CALLS"
1130        android:protectionLevel="dangerous"
1131        android:label="@string/permlab_processOutgoingCalls"
1132        android:description="@string/permdesc_processOutgoingCalls" />
1133
1134    <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
1135         Does not include placing calls.
1136         <p>Not for use by third-party applications. -->
1137    <permission android:name="android.permission.MODIFY_PHONE_STATE"
1138        android:permissionGroup="android.permission-group.PHONE_CALLS"
1139        android:protectionLevel="signature|system"
1140        android:label="@string/permlab_modifyPhoneState"
1141        android:description="@string/permdesc_modifyPhoneState" />
1142
1143    <!-- Allows read only access to phone state.
1144         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1145         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1146         minSdkVersion}</a> and <a
1147         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1148         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1149         grants your app this permission. If you don't need this permission, be sure your <a
1150         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1151         targetSdkVersion}</a> is 4 or higher. -->
1152    <permission android:name="android.permission.READ_PHONE_STATE"
1153        android:permissionGroup="android.permission-group.PHONE_CALLS"
1154        android:protectionLevel="dangerous"
1155        android:label="@string/permlab_readPhoneState"
1156        android:description="@string/permdesc_readPhoneState" />
1157
1158    <!-- Allows read only access to precise phone state.
1159         @hide Pending API council approval -->
1160    <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
1161        android:permissionGroup="android.permission-group.PHONE_CALLS"
1162        android:protectionLevel="dangerous"
1163        android:label="@string/permlab_readPrecisePhoneState"
1164        android:description="@string/permdesc_readPrecisePhoneState" />
1165
1166    <!-- @SystemApi Allows read access to privileged phone state.
1167         @hide Used internally. -->
1168    <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
1169        android:permissionGroup="android.permission-group.PHONE_CALLS"
1170        android:protectionLevel="signature|system" />
1171
1172     <!-- Allows an application to initiate a phone call without going through
1173         the Dialer user interface for the user to confirm the call
1174         being placed. -->
1175    <permission android:name="android.permission.CALL_PHONE"
1176        android:permissionGroup="android.permission-group.PHONE_CALLS"
1177        android:protectionLevel="dangerous"
1178        android:permissionFlags="costsMoney"
1179        android:label="@string/permlab_callPhone"
1180        android:description="@string/permdesc_callPhone" />
1181
1182    <!-- Allows an application to use SIP service -->
1183    <permission android:name="android.permission.USE_SIP"
1184        android:permissionGroup="android.permission-group.PHONE_CALLS"
1185        android:protectionLevel="dangerous"
1186        android:description="@string/permdesc_use_sip"
1187        android:label="@string/permlab_use_sip" />
1188
1189    <!-- @SystemApi Allows an application to request CallHandlerService implementations.
1190         @hide -->
1191    <permission android:name="android.permission.BIND_CALL_SERVICE"
1192        android:permissionGroup="android.permission-group.PHONE_CALLS"
1193        android:protectionLevel="system|signature"
1194        android:description="@string/permdesc_bind_call_service"
1195        android:label="@string/permlab_bind_call_service" />
1196
1197    <!-- ================================== -->
1198    <!-- Permissions for sdcard interaction -->
1199    <!-- ================================== -->
1200    <eat-comment />
1201
1202    <!-- Group of permissions that are related to SD card access. -->
1203    <permission-group android:name="android.permission-group.STORAGE"
1204        android:label="@string/permgrouplab_storage"
1205        android:icon="@drawable/perm_group_storage"
1206        android:description="@string/permgroupdesc_storage"
1207        android:permissionGroupFlags="personalInfo"
1208        android:priority="240" />
1209
1210    <!-- Allows an application to read from external storage.
1211         <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
1212         granted this permission.</p>
1213         <p>This permission is enforced starting in API level 19.  Before API level 19, this
1214         permission is not enforced and all apps still have access to read from external storage.
1215         You can test your app with the permission enforced by enabling <em>Protect USB
1216         storage</em> under Developer options in the Settings app on a device running Android 4.1 or
1217         higher.</p>
1218         <p>Also starting in API level 19, this permission is <em>not</em> required to
1219         read/write files in your application-specific directories returned by
1220         {@link android.content.Context#getExternalFilesDir} and
1221         {@link android.content.Context#getExternalCacheDir}.
1222         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1223         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1224         minSdkVersion}</a> and <a
1225         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1226         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1227         grants your app this permission. If you don't need this permission, be sure your <a
1228         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1229         targetSdkVersion}</a> is 4 or higher.-->
1230    <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
1231        android:permissionGroup="android.permission-group.STORAGE"
1232        android:label="@string/permlab_sdcardRead"
1233        android:description="@string/permdesc_sdcardRead"
1234        android:protectionLevel="normal" />
1235
1236    <!-- Allows an application to write to external storage.
1237         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1238         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1239         minSdkVersion}</a> and <a
1240         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1241         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1242         grants your app this permission. If you don't need this permission, be sure your <a
1243         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1244         targetSdkVersion}</a> is 4 or higher.
1245         <p>Starting in API level 19, this permission is <em>not</em> required to
1246         read/write files in your application-specific directories returned by
1247         {@link android.content.Context#getExternalFilesDir} and
1248         {@link android.content.Context#getExternalCacheDir}. -->
1249    <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
1250        android:permissionGroup="android.permission-group.STORAGE"
1251        android:label="@string/permlab_sdcardWrite"
1252        android:description="@string/permdesc_sdcardWrite"
1253        android:protectionLevel="dangerous" />
1254
1255    <!-- @SystemApi Allows an application to write to internal media storage
1256         @hide  -->
1257    <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
1258        android:permissionGroup="android.permission-group.STORAGE"
1259        android:label="@string/permlab_mediaStorageWrite"
1260        android:description="@string/permdesc_mediaStorageWrite"
1261        android:protectionLevel="signature|system" />
1262
1263    <!-- Allows an application to manage access to documents, usually as part
1264         of a document picker. -->
1265    <permission android:name="android.permission.MANAGE_DOCUMENTS"
1266        android:permissionGroup="android.permission-group.STORAGE"
1267        android:label="@string/permlab_manageDocs"
1268        android:description="@string/permdesc_manageDocs"
1269        android:protectionLevel="signature" />
1270
1271    <!-- ================================== -->
1272    <!-- Permissions for screenlock         -->
1273    <!-- ================================== -->
1274    <eat-comment />
1275
1276    <!-- Group of permissions that are related to the screenlock. -->
1277    <permission-group android:name="android.permission-group.SCREENLOCK"
1278        android:label="@string/permgrouplab_screenlock"
1279        android:icon="@drawable/perm_group_screenlock"
1280        android:permissionGroupFlags="personalInfo"
1281        android:description="@string/permgroupdesc_screenlock"
1282        android:priority="230" />
1283
1284    <!-- Allows applications to disable the keyguard -->
1285    <permission android:name="android.permission.DISABLE_KEYGUARD"
1286        android:permissionGroup="android.permission-group.SCREENLOCK"
1287        android:protectionLevel="dangerous"
1288        android:description="@string/permdesc_disableKeyguard"
1289        android:label="@string/permlab_disableKeyguard" />
1290
1291    <!-- ================================== -->
1292    <!-- Permissions to access other installed applications  -->
1293    <!-- ================================== -->
1294    <eat-comment />
1295
1296    <!-- Group of permissions that are related to the other applications
1297         installed on the system.  Examples include such as listing
1298         running apps, or killing background processes. -->
1299    <permission-group android:name="android.permission-group.APP_INFO"
1300        android:label="@string/permgrouplab_appInfo"
1301        android:icon="@drawable/perm_group_app_info"
1302        android:description="@string/permgroupdesc_appInfo"
1303        android:priority="220" />
1304
1305    <!-- @SystemApi Allows an application to get information about the currently
1306         or recently running tasks. -->
1307    <permission android:name="android.permission.GET_TASKS"
1308        android:permissionGroup="android.permission-group.APP_INFO"
1309        android:protectionLevel="signature|system"
1310        android:label="@string/permlab_getTasks"
1311        android:description="@string/permdesc_getTasks" />
1312
1313    <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
1314         across the users on the device, using singleton services and
1315         user-targeted broadcasts.  This permission is not available to
1316         third party applications. -->
1317    <permission android:name="android.permission.INTERACT_ACROSS_USERS"
1318        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1319        android:protectionLevel="signature|system|development"
1320        android:label="@string/permlab_interactAcrossUsers"
1321        android:description="@string/permdesc_interactAcrossUsers" />
1322
1323    <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
1324         that removes restrictions on where broadcasts can be sent and allows other
1325         types of interactions. -->
1326    <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
1327        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1328        android:protectionLevel="signature"
1329        android:label="@string/permlab_interactAcrossUsersFull"
1330        android:description="@string/permdesc_interactAcrossUsersFull" />
1331
1332    <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
1333         users on the device. This permission is not available to
1334         third party applications. -->
1335    <permission android:name="android.permission.MANAGE_USERS"
1336        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1337        android:protectionLevel="signature|system"
1338        android:label="@string/permlab_manageUsers"
1339        android:description="@string/permdesc_manageUsers" />
1340
1341    <!-- Allows an application to get full detailed information about
1342         recently running tasks, with full fidelity to the real state.
1343         @hide -->
1344    <permission android:name="android.permission.GET_DETAILED_TASKS"
1345        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1346        android:protectionLevel="signature"
1347        android:label="@string/permlab_getDetailedTasks"
1348        android:description="@string/permdesc_getDetailedTasks" />
1349
1350    <!-- Allows an application to change the Z-order of tasks -->
1351    <permission android:name="android.permission.REORDER_TASKS"
1352        android:permissionGroup="android.permission-group.APP_INFO"
1353        android:protectionLevel="normal"
1354        android:label="@string/permlab_reorderTasks"
1355        android:description="@string/permdesc_reorderTasks" />
1356
1357    <!-- @hide Allows an application to change to remove/kill tasks -->
1358    <permission android:name="android.permission.REMOVE_TASKS"
1359        android:permissionGroup="android.permission-group.APP_INFO"
1360        android:protectionLevel="signature"
1361        android:label="@string/permlab_removeTasks"
1362        android:description="@string/permdesc_removeTasks" />
1363
1364    <!-- @SystemApi @hide Allows an application to create/manage/remove stacks -->
1365    <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
1366        android:permissionGroup="android.permission-group.APP_INFO"
1367        android:protectionLevel="signature|system"
1368        android:label="@string/permlab_manageActivityStacks"
1369        android:description="@string/permdesc_manageActivityStacks" />
1370
1371    <!-- Allows an application to start any activity, regardless of permission
1372         protection or exported state. @hide -->
1373    <permission android:name="android.permission.START_ANY_ACTIVITY"
1374        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1375        android:protectionLevel="signature"
1376        android:label="@string/permlab_startAnyActivity"
1377        android:description="@string/permdesc_startAnyActivity" />
1378
1379    <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
1380        API is no longer supported. -->
1381    <permission android:name="android.permission.RESTART_PACKAGES"
1382        android:permissionGroup="android.permission-group.APP_INFO"
1383        android:protectionLevel="normal"
1384        android:label="@string/permlab_killBackgroundProcesses"
1385        android:description="@string/permdesc_killBackgroundProcesses" />
1386
1387    <!-- Allows an application to call
1388        {@link android.app.ActivityManager#killBackgroundProcesses}. -->
1389    <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
1390        android:permissionGroup="android.permission-group.APP_INFO"
1391        android:protectionLevel="normal"
1392        android:label="@string/permlab_killBackgroundProcesses"
1393        android:description="@string/permdesc_killBackgroundProcesses" />
1394
1395    <!-- ================================== -->
1396    <!-- Permissions affecting the display of other applications  -->
1397    <!-- ================================== -->
1398    <eat-comment />
1399
1400    <!-- Group of permissions that allow manipulation of how
1401         another application displays UI to the user. -->
1402    <permission-group android:name="android.permission-group.DISPLAY"
1403        android:label="@string/permgrouplab_display"
1404        android:icon="@drawable/perm_group_display"
1405        android:description="@string/permgroupdesc_display"
1406        android:priority="190"/>
1407
1408    <!-- Allows an application to open windows using the type
1409         {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT},
1410         shown on top of all other applications.  Very few applications
1411         should use this permission; these windows are intended for
1412         system-level interaction with the user. -->
1413    <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
1414        android:permissionGroup="android.permission-group.DISPLAY"
1415        android:protectionLevel="dangerous"
1416        android:label="@string/permlab_systemAlertWindow"
1417        android:description="@string/permdesc_systemAlertWindow" />
1418
1419    <!-- ================================== -->
1420    <!-- Permissions affecting the system wallpaper -->
1421    <!-- ================================== -->
1422    <eat-comment />
1423
1424    <!-- Group of permissions that allow manipulation of how
1425         another application displays UI to the user. -->
1426    <permission-group android:name="android.permission-group.WALLPAPER"
1427        android:label="@string/permgrouplab_wallpaper"
1428        android:icon="@drawable/perm_group_wallpaper"
1429        android:description="@string/permgroupdesc_wallpaper"
1430        android:priority="150" />
1431
1432    <!-- Allows applications to set the wallpaper -->
1433    <permission android:name="android.permission.SET_WALLPAPER"
1434        android:permissionGroup="android.permission-group.WALLPAPER"
1435        android:protectionLevel="normal"
1436        android:label="@string/permlab_setWallpaper"
1437        android:description="@string/permdesc_setWallpaper" />
1438
1439    <!-- Allows applications to set the wallpaper hints -->
1440    <permission android:name="android.permission.SET_WALLPAPER_HINTS"
1441        android:permissionGroup="android.permission-group.WALLPAPER"
1442        android:protectionLevel="normal"
1443        android:label="@string/permlab_setWallpaperHints"
1444        android:description="@string/permdesc_setWallpaperHints" />
1445
1446    <!-- ============================================ -->
1447    <!-- Permissions for changing the system clock -->
1448    <!-- ============================================ -->
1449    <eat-comment />
1450
1451    <!-- Group of permissions that are related to system clock. -->
1452    <permission-group android:name="android.permission-group.SYSTEM_CLOCK"
1453        android:label="@string/permgrouplab_systemClock"
1454        android:icon="@drawable/perm_group_system_clock"
1455        android:description="@string/permgroupdesc_systemClock"
1456        android:priority="140" />
1457
1458    <!-- @SystemApi Allows applications to set the system time.
1459    <p>Not for use by third-party applications. -->
1460    <permission android:name="android.permission.SET_TIME"
1461        android:protectionLevel="signature|system"
1462        android:label="@string/permlab_setTime"
1463        android:description="@string/permdesc_setTime" />
1464
1465    <!-- Allows applications to set the system time zone -->
1466    <permission android:name="android.permission.SET_TIME_ZONE"
1467        android:permissionGroup="android.permission-group.SYSTEM_CLOCK"
1468        android:protectionLevel="normal"
1469        android:label="@string/permlab_setTimeZone"
1470        android:description="@string/permdesc_setTimeZone" />
1471
1472    <!-- ==================================================== -->
1473    <!-- Permissions related to changing status bar   -->
1474    <!-- ==================================================== -->
1475    <eat-comment />
1476
1477    <!-- Used for permissions that change the status bar -->
1478    <permission-group android:name="android.permission-group.STATUS_BAR"
1479        android:label="@string/permgrouplab_statusBar"
1480        android:icon="@drawable/perm_group_status_bar"
1481        android:description="@string/permgroupdesc_statusBar"
1482        android:priority="110" />
1483
1484    <!-- Allows an application to expand or collapse the status bar. -->
1485    <permission android:name="android.permission.EXPAND_STATUS_BAR"
1486        android:permissionGroup="android.permission-group.STATUS_BAR"
1487        android:protectionLevel="normal"
1488        android:label="@string/permlab_expandStatusBar"
1489        android:description="@string/permdesc_expandStatusBar" />
1490
1491    <!-- ============================================================== -->
1492    <!-- Permissions related to adding/removing shortcuts from Launcher -->
1493    <!-- ============================================================== -->
1494    <eat-comment />
1495
1496    <!-- Allows an application to install a shortcut in Launcher -->
1497    <permission
1498        android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
1499        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1500        android:protectionLevel="dangerous"
1501        android:label="@string/permlab_install_shortcut"
1502        android:description="@string/permdesc_install_shortcut" />
1503
1504        <!-- Allows an application to uninstall a shortcut in Launcher -->
1505    <permission
1506        android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
1507        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1508        android:protectionLevel="dangerous"
1509        android:label="@string/permlab_uninstall_shortcut"
1510        android:description="@string/permdesc_uninstall_shortcut"/>
1511
1512    <!-- ==================================================== -->
1513    <!-- Permissions related to accessing sync settings   -->
1514    <!-- ==================================================== -->
1515    <eat-comment />
1516
1517    <!-- Used for permissions that access the sync settings or sync
1518         related information. -->
1519    <permission-group android:name="android.permission-group.SYNC_SETTINGS"
1520        android:label="@string/permgrouplab_syncSettings"
1521        android:icon="@drawable/perm_group_sync_settings"
1522        android:description="@string/permgroupdesc_syncSettings"
1523        android:priority="120" />
1524
1525    <!-- Allows applications to read the sync settings -->
1526    <permission android:name="android.permission.READ_SYNC_SETTINGS"
1527        android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1528        android:protectionLevel="normal"
1529        android:description="@string/permdesc_readSyncSettings"
1530        android:label="@string/permlab_readSyncSettings" />
1531
1532    <!-- Allows applications to write the sync settings -->
1533    <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
1534        android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1535        android:protectionLevel="normal"
1536        android:description="@string/permdesc_writeSyncSettings"
1537        android:label="@string/permlab_writeSyncSettings" />
1538
1539    <!-- Allows applications to read the sync stats -->
1540    <permission android:name="android.permission.READ_SYNC_STATS"
1541        android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1542        android:protectionLevel="normal"
1543        android:description="@string/permdesc_readSyncStats"
1544        android:label="@string/permlab_readSyncStats" />
1545
1546
1547    <!-- ============================================ -->
1548    <!-- Permissions for low-level system interaction -->
1549    <!-- ============================================ -->
1550    <eat-comment />
1551
1552    <!-- Group of permissions that are related to system APIs.  Many
1553         of these are not permissions the user will be expected to understand,
1554         and such permissions should generally be marked as "normal" protection
1555         level so they don't get displayed.  This can also, however, be used
1556         for miscellaneous features that provide access to the operating system,
1557         such as writing the global system settings. -->
1558    <permission-group android:name="android.permission-group.SYSTEM_TOOLS"
1559        android:label="@string/permgrouplab_systemTools"
1560        android:icon="@drawable/perm_group_system_tools"
1561        android:description="@string/permgroupdesc_systemTools"
1562        android:priority="100" />
1563
1564    <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
1565    <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
1566        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1567        android:protectionLevel="signature"
1568        android:label="@string/permlab_setScreenCompatibility"
1569        android:description="@string/permdesc_setScreenCompatibility" />
1570
1571    <!-- Allows an application to access all multi-user external storage @hide -->
1572    <permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE"
1573        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1574        android:label="@string/permlab_sdcardAccessAll"
1575        android:description="@string/permdesc_sdcardAccessAll"
1576        android:protectionLevel="signature" />
1577
1578    <!-- @SystemApi Allows an application to modify the current configuration, such
1579         as locale. -->
1580    <permission android:name="android.permission.CHANGE_CONFIGURATION"
1581        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1582        android:protectionLevel="signature|system|development"
1583        android:label="@string/permlab_changeConfiguration"
1584        android:description="@string/permdesc_changeConfiguration" />
1585
1586    <!-- Allows an application to read or write the system settings. -->
1587    <permission android:name="android.permission.WRITE_SETTINGS"
1588        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1589        android:protectionLevel="normal"
1590        android:label="@string/permlab_writeSettings"
1591        android:description="@string/permdesc_writeSettings" />
1592
1593    <!-- @SystemApi Allows an application to modify the Google service map.
1594    <p>Not for use by third-party applications. -->
1595    <permission android:name="android.permission.WRITE_GSERVICES"
1596        android:protectionLevel="signature|system"
1597        android:label="@string/permlab_writeGservices"
1598        android:description="@string/permdesc_writeGservices" />
1599
1600    <!-- @SystemApi Allows an application to call
1601        {@link android.app.ActivityManager#forceStopPackage}.
1602        @hide -->
1603    <permission android:name="android.permission.FORCE_STOP_PACKAGES"
1604        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1605        android:protectionLevel="signature|system"
1606        android:label="@string/permlab_forceStopPackages"
1607        android:description="@string/permdesc_forceStopPackages" />
1608
1609    <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
1610         An active window is the window that has fired an accessibility event. -->
1611    <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
1612        android:permissionGroup="android.permission-group.PERSONAL_INFO"
1613        android:protectionLevel="signature|system"
1614        android:label="@string/permlab_retrieve_window_content"
1615        android:description="@string/permdesc_retrieve_window_content" />
1616
1617    <!-- @SystemApi Modify the global animation scaling factor.
1618    <p>Not for use by third-party applications. -->
1619    <permission android:name="android.permission.SET_ANIMATION_SCALE"
1620        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1621        android:protectionLevel="signature|system|development"
1622        android:label="@string/permlab_setAnimationScale"
1623        android:description="@string/permdesc_setAnimationScale" />
1624
1625    <!-- @deprecated This functionality will be removed in the future; please do
1626         not use. Allow an application to make its activities persistent. -->
1627    <permission android:name="android.permission.PERSISTENT_ACTIVITY"
1628        android:permissionGroup="android.permission-group.APP_INFO"
1629        android:protectionLevel="normal"
1630        android:label="@string/permlab_persistentActivity"
1631        android:description="@string/permdesc_persistentActivity" />
1632
1633    <!-- Allows an application to find out the space used by any package. -->
1634    <permission android:name="android.permission.GET_PACKAGE_SIZE"
1635        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1636        android:protectionLevel="normal"
1637        android:label="@string/permlab_getPackageSize"
1638        android:description="@string/permdesc_getPackageSize" />
1639
1640    <!-- @deprecated No longer useful, see
1641         {@link android.content.pm.PackageManager#addPackageToPreferred}
1642         for details. -->
1643    <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
1644        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1645        android:protectionLevel="signature"
1646        android:label="@string/permlab_setPreferredApplications"
1647        android:description="@string/permdesc_setPreferredApplications" />
1648
1649    <!-- Allows an application to receive the
1650         {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
1651         broadcast after the system finishes booting.  If you don't
1652         request this permission, you will not receive the broadcast at
1653         that time.  Though holding this permission does not have any
1654         security implications, it can have a negative impact on the
1655         user experience by increasing the amount of time it takes the
1656         system to start and allowing applications to have themselves
1657         running without the user being aware of them.  As such, you must
1658         explicitly declare your use of this facility to make that visible
1659         to the user. -->
1660    <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
1661        android:permissionGroup="android.permission-group.APP_INFO"
1662        android:protectionLevel="normal"
1663        android:label="@string/permlab_receiveBootCompleted"
1664        android:description="@string/permdesc_receiveBootCompleted" />
1665
1666    <!-- Allows an application to broadcast sticky intents.  These are
1667         broadcasts whose data is held by the system after being finished,
1668         so that clients can quickly retrieve that data without having
1669         to wait for the next broadcast. -->
1670    <permission android:name="android.permission.BROADCAST_STICKY"
1671        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1672        android:protectionLevel="normal"
1673        android:label="@string/permlab_broadcastSticky"
1674        android:description="@string/permdesc_broadcastSticky" />
1675
1676    <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
1677    <p>Not for use by third-party applications.-->
1678    <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
1679        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1680        android:protectionLevel="system|signature"
1681        android:label="@string/permlab_mount_unmount_filesystems"
1682        android:description="@string/permdesc_mount_unmount_filesystems" />
1683
1684    <!-- @SystemApi Allows formatting file systems for removable storage.
1685    <p>Not for use by third-party applications. -->
1686    <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
1687        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1688        android:protectionLevel="system|signature"
1689        android:label="@string/permlab_mount_format_filesystems"
1690        android:description="@string/permdesc_mount_format_filesystems" />
1691
1692    <!-- Allows access to ASEC non-destructive API calls
1693         @hide  -->
1694    <permission android:name="android.permission.ASEC_ACCESS"
1695        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1696        android:protectionLevel="signature"
1697        android:label="@string/permlab_asec_access"
1698        android:description="@string/permdesc_asec_access" />
1699
1700    <!-- Allows creation of ASEC volumes
1701         @hide  -->
1702    <permission android:name="android.permission.ASEC_CREATE"
1703        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1704        android:protectionLevel="signature"
1705        android:label="@string/permlab_asec_create"
1706        android:description="@string/permdesc_asec_create" />
1707
1708    <!-- Allows destruction of ASEC volumes
1709         @hide  -->
1710    <permission android:name="android.permission.ASEC_DESTROY"
1711        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1712        android:protectionLevel="signature"
1713        android:label="@string/permlab_asec_destroy"
1714        android:description="@string/permdesc_asec_destroy" />
1715
1716    <!-- Allows mount / unmount of ASEC volumes
1717         @hide  -->
1718    <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
1719        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1720        android:protectionLevel="signature"
1721        android:label="@string/permlab_asec_mount_unmount"
1722        android:description="@string/permdesc_asec_mount_unmount" />
1723
1724    <!-- Allows rename of ASEC volumes
1725         @hide  -->
1726    <permission android:name="android.permission.ASEC_RENAME"
1727        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1728        android:protectionLevel="signature"
1729        android:label="@string/permlab_asec_rename"
1730        android:description="@string/permdesc_asec_rename" />
1731
1732    <!-- @SystemApi Allows applications to write the apn settings.
1733    <p>Not for use by third-party applications. -->
1734    <permission android:name="android.permission.WRITE_APN_SETTINGS"
1735                android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1736                android:protectionLevel="signature|system"
1737                android:description="@string/permdesc_writeApnSettings"
1738                android:label="@string/permlab_writeApnSettings" />
1739
1740    <!-- Allows an application to allow access the subscribed feeds
1741         ContentProvider. -->
1742    <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
1743        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1744        android:label="@string/permlab_subscribedFeedsRead"
1745        android:description="@string/permdesc_subscribedFeedsRead"
1746        android:protectionLevel="normal" />
1747    <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
1748        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1749        android:label="@string/permlab_subscribedFeedsWrite"
1750        android:description="@string/permdesc_subscribedFeedsWrite"
1751        android:protectionLevel="dangerous" />
1752
1753    <!-- Allows applications to change network connectivity state -->
1754    <permission android:name="android.permission.CHANGE_NETWORK_STATE"
1755        android:permissionGroup="android.permission-group.NETWORK"
1756        android:protectionLevel="normal"
1757        android:description="@string/permdesc_changeNetworkState"
1758        android:label="@string/permlab_changeNetworkState" />
1759
1760    <!-- Allows an application to clear the caches of all installed
1761         applications on the device.  -->
1762    <permission android:name="android.permission.CLEAR_APP_CACHE"
1763        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1764        android:protectionLevel="dangerous"
1765        android:label="@string/permlab_clearAppCache"
1766        android:description="@string/permdesc_clearAppCache" />
1767
1768    <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
1769         @hide -->
1770    <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
1771        android:protectionLevel="signature|system"
1772        android:label="@string/permlab_anyCodecForPlayback"
1773        android:description="@string/permdesc_anyCodecForPlayback" />
1774
1775    <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
1776         behalf of the user.
1777         @hide -->
1778    <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
1779        android:protectionLevel="signature|system"
1780        android:label="@string/permlab_manageCaCertificates"
1781        android:description="@string/permdesc_manageCaCertificates" />
1782
1783    <!-- @SystemApi Allows an application to do certain operations needed for
1784         interacting with the recovery (system update) system. -->
1785    <permission android:name="android.permission.RECOVERY"
1786        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1787        android:protectionLevel="signature|system"
1788        android:label="@string/permlab_recovery"
1789        android:description="@string/permdesc_recovery" />
1790
1791    <!-- Allows the system to bind to an application's task services
1792         @hide -->
1793    <permission android:name="android.permission.BIND_JOB_SERVICE"
1794        android:protectionLevel="signature"
1795        android:label="@string/permlab_bindJobService"
1796        android:description="@string/permdesc_bindJobService" />
1797    <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
1798
1799    <!-- ========================================= -->
1800    <!-- Permissions for special development tools -->
1801    <!-- ========================================= -->
1802    <eat-comment />
1803
1804    <!-- Group of permissions that are related to development features.  These
1805         are not permissions that should appear in third-party applications; they
1806         protect APIs that are intended only to be used for development
1807         purposes. -->
1808    <permission-group android:name="android.permission-group.DEVELOPMENT_TOOLS"
1809        android:label="@string/permgrouplab_developmentTools"
1810        android:description="@string/permgroupdesc_developmentTools"
1811        android:priority="310" />
1812
1813    <!-- @SystemApi Allows an application to read or write the secure system settings.
1814    <p>Not for use by third-party applications. -->
1815    <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
1816        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1817        android:protectionLevel="signature|system|development"
1818        android:label="@string/permlab_writeSecureSettings"
1819        android:description="@string/permdesc_writeSecureSettings" />
1820
1821    <!-- @SystemApi Allows an application to retrieve state dump information from system services.
1822    <p>Not for use by third-party applications. -->
1823    <permission android:name="android.permission.DUMP"
1824        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1825        android:protectionLevel="signature|system|development"
1826        android:label="@string/permlab_dump"
1827        android:description="@string/permdesc_dump" />
1828
1829    <!-- @SystemApi Allows an application to read the low-level system log files.
1830    <p>Not for use by third-party applications, because
1831    Log entries can contain the user's private information. -->
1832    <permission android:name="android.permission.READ_LOGS"
1833        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1834        android:protectionLevel="signature|system|development"
1835        android:label="@string/permlab_readLogs"
1836        android:description="@string/permdesc_readLogs" />
1837
1838    <!-- @SystemApi Configure an application for debugging.
1839    <p>Not for use by third-party applications. -->
1840    <permission android:name="android.permission.SET_DEBUG_APP"
1841        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1842        android:protectionLevel="signature|system|development"
1843        android:label="@string/permlab_setDebugApp"
1844        android:description="@string/permdesc_setDebugApp" />
1845
1846    <!-- @SystemApi Allows an application to set the maximum number of (not needed)
1847         application processes that can be running.
1848         <p>Not for use by third-party applications. -->
1849    <permission android:name="android.permission.SET_PROCESS_LIMIT"
1850        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1851        android:protectionLevel="signature|system|development"
1852        android:label="@string/permlab_setProcessLimit"
1853        android:description="@string/permdesc_setProcessLimit" />
1854
1855    <!-- @SystemApi Allows an application to control whether activities are immediately
1856         finished when put in the background.
1857         <p>Not for use by third-party applications. -->
1858    <permission android:name="android.permission.SET_ALWAYS_FINISH"
1859        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1860        android:protectionLevel="signature|system|development"
1861        android:label="@string/permlab_setAlwaysFinish"
1862        android:description="@string/permdesc_setAlwaysFinish" />
1863
1864    <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
1865    <p>Not for use by third-party applications. -->
1866    <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
1867        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1868        android:protectionLevel="signature|system|development"
1869        android:label="@string/permlab_signalPersistentProcesses"
1870        android:description="@string/permdesc_signalPersistentProcesses" />
1871
1872    <!-- ==================================== -->
1873    <!-- Private (signature-only) permissions -->
1874    <!-- ==================================== -->
1875    <eat-comment />
1876
1877    <!-- @SystemApi Allows applications to RW to diagnostic resources.
1878    <p>Not for use by third-party applications. -->
1879    <permission android:name="android.permission.DIAGNOSTIC"
1880        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1881        android:protectionLevel="signature"
1882        android:description="@string/permdesc_diagnostic"
1883        android:label="@string/permlab_diagnostic" />
1884
1885    <!-- @SystemApi Allows an application to open, close, or disable the status bar
1886         and its icons.
1887         <p>Not for use by third-party applications. -->
1888    <permission android:name="android.permission.STATUS_BAR"
1889        android:label="@string/permlab_statusBar"
1890        android:description="@string/permdesc_statusBar"
1891        android:protectionLevel="signature|system" />
1892
1893    <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
1894    @hide -->
1895    <permission android:name="android.permission.STATUS_BAR_SERVICE"
1896        android:label="@string/permlab_statusBarService"
1897        android:description="@string/permdesc_statusBarService"
1898        android:protectionLevel="signature" />
1899
1900    <!-- Allows an application to force a BACK operation on whatever is the
1901         top activity.
1902         <p>Not for use by third-party applications. -->
1903    <permission android:name="android.permission.FORCE_BACK"
1904        android:label="@string/permlab_forceBack"
1905        android:description="@string/permdesc_forceBack"
1906        android:protectionLevel="signature" />
1907
1908    <!-- @SystemApi Allows an application to update device statistics.
1909    <p>Not for use by third-party applications. -->
1910    <permission android:name="android.permission.UPDATE_DEVICE_STATS"
1911        android:label="@string/permlab_updateBatteryStats"
1912        android:description="@string/permdesc_updateBatteryStats"
1913        android:protectionLevel="signature|system" />
1914
1915    <!-- @SystemApi @hide Allows an application to collect battery statistics -->
1916    <permission android:name="android.permission.GET_APP_OPS_STATS"
1917        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1918        android:label="@string/permlab_getAppOpsStats"
1919        android:description="@string/permdesc_getAppOpsStats"
1920        android:protectionLevel="signature|system|development" />
1921
1922    <!-- @SystemApi Allows an application to update application operation statistics. Not for
1923         use by third party apps. @hide -->
1924    <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
1925        android:label="@string/permlab_updateAppOpsStats"
1926        android:description="@string/permdesc_updateAppOpsStats"
1927        android:protectionLevel="signature|system" />
1928
1929    <!-- Allows an application to open windows that are for use by parts
1930         of the system user interface.
1931         <p>Not for use by third-party applications. -->
1932    <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
1933        android:label="@string/permlab_internalSystemWindow"
1934        android:description="@string/permdesc_internalSystemWindow"
1935        android:protectionLevel="signature" />
1936
1937    <!-- Allows an application to manage (create, destroy,
1938         Z-order) application tokens in the window manager.
1939         <p>Not for use by third-party applications. -->
1940    <permission android:name="android.permission.MANAGE_APP_TOKENS"
1941        android:label="@string/permlab_manageAppTokens"
1942        android:description="@string/permdesc_manageAppTokens"
1943        android:protectionLevel="signature" />
1944
1945    <!-- @hide Allows the application to temporarily freeze the screen for a
1946         full-screen transition. -->
1947    <permission android:name="android.permission.FREEZE_SCREEN"
1948        android:label="@string/permlab_freezeScreen"
1949        android:description="@string/permdesc_freezeScreen"
1950        android:protectionLevel="signature" />
1951
1952    <!-- Allows an application to inject user events (keys, touch, trackball)
1953         into the event stream and deliver them to ANY window.  Without this
1954         permission, you can only deliver events to windows in your own process.
1955         <p>Not for use by third-party applications. -->
1956    <permission android:name="android.permission.INJECT_EVENTS"
1957        android:label="@string/permlab_injectEvents"
1958        android:description="@string/permdesc_injectEvents"
1959        android:protectionLevel="signature" />
1960
1961    <!-- @hide Allows an application to register an input filter which filters the stream
1962         of user events (keys, touch, trackball) before they are dispatched to any window. -->
1963    <permission android:name="android.permission.FILTER_EVENTS"
1964        android:label="@string/permlab_filter_events"
1965        android:description="@string/permdesc_filter_events"
1966        android:protectionLevel="signature" />
1967
1968    <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
1969    <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
1970        android:label="@string/permlab_retrieveWindowToken"
1971        android:description="@string/permdesc_retrieveWindowToken"
1972        android:protectionLevel="signature" />
1973
1974    <!-- @hide Allows an application to collect frame statistics -->
1975    <permission android:name="android.permission.FRAME_STATS"
1976         android:label="@string/permlab_frameStats"
1977         android:description="@string/permdesc_frameStats"
1978         android:protectionLevel="signature" />
1979
1980    <!-- @hide Allows an application to temporary enable accessibility on the device. -->
1981    <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
1982        android:label="@string/permlab_temporary_enable_accessibility"
1983        android:description="@string/permdesc_temporary_enable_accessibility"
1984        android:protectionLevel="signature" />
1985
1986    <!-- Allows an application to watch and control how activities are
1987         started globally in the system.  Only for is in debugging
1988         (usually the monkey command).
1989         <p>Not for use by third-party applications. -->
1990    <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
1991        android:label="@string/permlab_runSetActivityWatcher"
1992        android:description="@string/permdesc_runSetActivityWatcher"
1993        android:protectionLevel="signature" />
1994
1995    <!-- @SystemApi Allows an application to call the activity manager shutdown() API
1996         to put the higher-level system there into a shutdown state.
1997         @hide -->
1998    <permission android:name="android.permission.SHUTDOWN"
1999        android:label="@string/permlab_shutdown"
2000        android:description="@string/permdesc_shutdown"
2001        android:protectionLevel="signature|system" />
2002
2003    <!-- @SystemApi Allows an application to tell the activity manager to temporarily
2004         stop application switches, putting it into a special mode that
2005         prevents applications from immediately switching away from some
2006         critical UI such as the home screen.
2007         @hide -->
2008    <permission android:name="android.permission.STOP_APP_SWITCHES"
2009        android:label="@string/permlab_stopAppSwitches"
2010        android:description="@string/permdesc_stopAppSwitches"
2011        android:protectionLevel="signature|system" />
2012
2013    <!-- Allows an application to retrieve private information about
2014         the current top activity, such as any assist context it can provide.
2015         <p>Not for use by third-party applications. -->
2016    <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
2017        android:label="@string/permlab_getTopActivityInfo"
2018        android:description="@string/permdesc_getTopActivityInfo"
2019        android:protectionLevel="signature" />
2020
2021    <!-- Allows an application to retrieve the current state of keys and
2022         switches.
2023         <p>Not for use by third-party applications.
2024         @deprecated The API that used this permission has been removed. -->
2025    <permission android:name="android.permission.READ_INPUT_STATE"
2026        android:label="@string/permlab_readInputState"
2027        android:description="@string/permdesc_readInputState"
2028        android:protectionLevel="signature" />
2029
2030    <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
2031         to ensure that only the system can bind to it. -->
2032    <permission android:name="android.permission.BIND_INPUT_METHOD"
2033        android:label="@string/permlab_bindInputMethod"
2034        android:description="@string/permdesc_bindInputMethod"
2035        android:protectionLevel="signature" />
2036
2037    <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
2038         to ensure that only the system can bind to it. -->
2039    <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
2040        android:label="@string/permlab_bindAccessibilityService"
2041        android:description="@string/permdesc_bindAccessibilityService"
2042        android:protectionLevel="signature" />
2043
2044    <!-- Must be required by a {@link android.printservice.PrintService},
2045         to ensure that only the system can bind to it. -->
2046    <permission android:name="android.permission.BIND_PRINT_SERVICE"
2047        android:label="@string/permlab_bindPrintService"
2048        android:description="@string/permdesc_bindPrintService"
2049        android:protectionLevel="signature" />
2050
2051    <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
2052         or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
2053         the system can bind to it. -->
2054    <permission android:name="android.permission.BIND_NFC_SERVICE"
2055        android:label="@string/permlab_bindNfcService"
2056        android:description="@string/permdesc_bindNfcService"
2057        android:protectionLevel="signature" />
2058
2059    <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
2060         @hide -->
2061    <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
2062        android:label="@string/permlab_bindPrintSpoolerService"
2063        android:description="@string/permdesc_bindPrintSpoolerService"
2064        android:protectionLevel="signature" />
2065
2066    <!-- Must be required by a TextService (e.g. SpellCheckerService)
2067         to ensure that only the system can bind to it. -->
2068    <permission android:name="android.permission.BIND_TEXT_SERVICE"
2069        android:label="@string/permlab_bindTextService"
2070        android:description="@string/permdesc_bindTextService"
2071        android:protectionLevel="signature" />
2072
2073    <!-- Must be required by a {@link android.net.VpnService},
2074         to ensure that only the system can bind to it. -->
2075    <permission android:name="android.permission.BIND_VPN_SERVICE"
2076        android:label="@string/permlab_bindVpnService"
2077        android:description="@string/permdesc_bindVpnService"
2078        android:protectionLevel="signature" />
2079
2080    <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
2081         to ensure that only the system can bind to it. -->
2082    <permission android:name="android.permission.BIND_WALLPAPER"
2083        android:label="@string/permlab_bindWallpaper"
2084        android:description="@string/permdesc_bindWallpaper"
2085        android:protectionLevel="signature|system" />
2086
2087    <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
2088         to ensure that only the system can bind to it. -->
2089    <permission android:name="android.permission.BIND_VOICE_INTERACTION"
2090        android:label="@string/permlab_bindVoiceInteraction"
2091        android:description="@string/permdesc_bindVoiceInteraction"
2092        android:protectionLevel="signature" />
2093
2094    <!-- Must be required by hotword enrollment application,
2095         to ensure that only the system can interact with it.
2096         @hide <p>Not for use by third-party applications.</p> -->
2097    <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
2098        android:label="@string/permlab_manageVoiceKeyphrases"
2099        android:description="@string/permdesc_manageVoiceKeyphrases"
2100        android:protectionLevel="signature|system" />
2101
2102    <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
2103         to ensure that only the system can bind to it.
2104         @hide -->
2105    <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
2106        android:label="@string/permlab_bindRemoteDisplay"
2107        android:description="@string/permdesc_bindRemoteDisplay"
2108        android:protectionLevel="signature" />
2109
2110    <!-- Must be required by a {@link android.media.tv.TvInputService}
2111         to ensure that only the system can bind to it. -->
2112    <permission android:name="android.permission.BIND_TV_INPUT"
2113        android:label="@string/permlab_bindTvInput"
2114        android:description="@string/permdesc_bindTvInput"
2115        android:protectionLevel="signature|system" />
2116
2117    <!-- Must be required by a {@link android.media.routeprovider.RouteProviderService}
2118         to ensure that only the system can interact with it.
2119         @hide -->
2120    <permission android:name="android.permission.BIND_ROUTE_PROVIDER"
2121        android:label="@string/permlab_bindRouteProvider"
2122        android:description="@string/permdesc_bindRouteProvider"
2123        android:protectionLevel="signature" />
2124
2125    <!-- Must be required by device administration receiver, to ensure that only the
2126         system can interact with it. -->
2127    <permission android:name="android.permission.BIND_DEVICE_ADMIN"
2128        android:label="@string/permlab_bindDeviceAdmin"
2129        android:description="@string/permdesc_bindDeviceAdmin"
2130        android:protectionLevel="signature" />
2131
2132    <!-- @SystemApi Required to add or remove another application as a device admin.
2133         <p>Not for use by third-party applications.
2134         @hide -->
2135    <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
2136        android:label="@string/permlab_manageDeviceAdmins"
2137        android:description="@string/permdesc_manageDeviceAdmins"
2138        android:protectionLevel="signature|system" />
2139
2140    <!-- Allows low-level access to setting the orientation (actually
2141         rotation) of the screen.
2142         <p>Not for use by third-party applications. -->
2143    <permission android:name="android.permission.SET_ORIENTATION"
2144        android:label="@string/permlab_setOrientation"
2145        android:description="@string/permdesc_setOrientation"
2146        android:protectionLevel="signature" />
2147
2148    <!-- Allows low-level access to setting the pointer speed.
2149         <p>Not for use by third-party applications. -->
2150    <permission android:name="android.permission.SET_POINTER_SPEED"
2151        android:label="@string/permlab_setPointerSpeed"
2152        android:description="@string/permdesc_setPointerSpeed"
2153        android:protectionLevel="signature" />
2154
2155    <!-- Allows low-level access to setting input device calibration.
2156         <p>Not for use by normal applications.
2157         @hide -->
2158    <permission android:name="android.permission.SET_INPUT_CALIBRATION"
2159        android:label="@string/permlab_setInputCalibration"
2160        android:description="@string/permdesc_setInputCalibration"
2161        android:protectionLevel="signature" />
2162
2163    <!-- Allows low-level access to setting the keyboard layout.
2164         <p>Not for use by third-party applications.
2165         @hide -->
2166    <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
2167        android:label="@string/permlab_setKeyboardLayout"
2168        android:description="@string/permdesc_setKeyboardLayout"
2169        android:protectionLevel="signature" />
2170
2171    <!-- @SystemApi Allows an application to install packages.
2172    <p>Not for use by third-party applications. -->
2173    <permission android:name="android.permission.INSTALL_PACKAGES"
2174        android:label="@string/permlab_installPackages"
2175        android:description="@string/permdesc_installPackages"
2176        android:protectionLevel="signature|system" />
2177
2178    <!-- Allows an application to clear user data.
2179    <p>Not for use by third-party applications. -->
2180    <permission android:name="android.permission.CLEAR_APP_USER_DATA"
2181        android:label="@string/permlab_clearAppUserData"
2182        android:description="@string/permdesc_clearAppUserData"
2183        android:protectionLevel="signature" />
2184
2185    <!-- @SystemApi Allows an application to delete cache files.
2186    <p>Not for use by third-party applications. -->
2187    <permission android:name="android.permission.DELETE_CACHE_FILES"
2188        android:label="@string/permlab_deleteCacheFiles"
2189        android:description="@string/permdesc_deleteCacheFiles"
2190        android:protectionLevel="signature|system" />
2191
2192    <!-- @SystemApi Allows an application to delete packages.
2193    <p>Not for use by third-party applications. -->
2194    <permission android:name="android.permission.DELETE_PACKAGES"
2195        android:label="@string/permlab_deletePackages"
2196        android:description="@string/permdesc_deletePackages"
2197        android:protectionLevel="signature|system" />
2198
2199    <!-- @SystemApi Allows an application to move location of installed package.
2200         @hide -->
2201    <permission android:name="android.permission.MOVE_PACKAGE"
2202        android:label="@string/permlab_movePackage"
2203        android:description="@string/permdesc_movePackage"
2204        android:protectionLevel="signature|system" />
2205
2206    <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
2207         enabled or not.
2208         <p>Not for use by third-party applications. -->
2209    <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
2210        android:label="@string/permlab_changeComponentState"
2211        android:description="@string/permdesc_changeComponentState"
2212        android:protectionLevel="signature|system" />
2213
2214    <!-- @hide Allows an application to grant or revoke specific permissions. -->
2215    <permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS"
2216        android:label="@string/permlab_grantRevokePermissions"
2217        android:description="@string/permdesc_grantRevokePermissions"
2218        android:protectionLevel="signature" />
2219
2220    <!-- Allows an application to use SurfaceFlinger's low level features.
2221    <p>Not for use by third-party applications. -->
2222    <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
2223        android:label="@string/permlab_accessSurfaceFlinger"
2224        android:description="@string/permdesc_accessSurfaceFlinger"
2225        android:protectionLevel="signature" />
2226
2227    <!-- @SystemApi Allows an application to take screen shots and more generally
2228         get access to the frame buffer data.
2229         <p>Not for use by third-party applications. -->
2230    <permission android:name="android.permission.READ_FRAME_BUFFER"
2231        android:label="@string/permlab_readFrameBuffer"
2232        android:description="@string/permdesc_readFrameBuffer"
2233        android:protectionLevel="signature|system" />
2234
2235    <!-- Allows an application to use InputFlinger's low level features.
2236         @hide -->
2237    <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
2238        android:label="@string/permlab_accessInputFlinger"
2239        android:description="@string/permdesc_accessInputFlinger"
2240        android:protectionLevel="signature" />
2241
2242    <!-- Allows an application to configure and connect to Wifi displays
2243         @hide -->
2244    <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
2245        android:label="@string/permlab_configureWifiDisplay"
2246        android:description="@string/permdesc_configureWifiDisplay"
2247        android:protectionLevel="signature" />
2248
2249    <!-- Allows an application to control low-level features of Wifi displays
2250         such as opening an RTSP socket.  This permission should only be used
2251         by the display manager.
2252         @hide -->
2253    <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
2254        android:label="@string/permlab_controlWifiDisplay"
2255        android:description="@string/permdesc_controlWifiDisplay"
2256        android:protectionLevel="signature" />
2257
2258    <!-- @SystemApi Allows an application to capture audio output.
2259         <p>Not for use by third-party applications.</p> -->
2260    <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
2261        android:label="@string/permlab_captureAudioOutput"
2262        android:description="@string/permdesc_captureAudioOutput"
2263        android:protectionLevel="signature|system" />
2264
2265    <!-- @SystemApi Allows an application to capture audio for hotword detection.
2266         <p>Not for use by third-party applications.</p>
2267         @hide -->
2268    <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
2269        android:label="@string/permlab_captureAudioHotword"
2270        android:description="@string/permdesc_captureAudioHotword"
2271        android:protectionLevel="signature|system" />
2272
2273    <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
2274         <p>Not for use by third-party applications.</p>
2275         @hide -->
2276    <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
2277        android:label="@string/permlab_modifyAudioRouting"
2278        android:description="@string/permdesc_modifyAudioRouting"
2279        android:protectionLevel="signature|system" />
2280
2281    <!-- @SystemApi Allows an application to capture video output.
2282         <p>Not for use by third-party applications.</p> -->
2283    <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
2284        android:label="@string/permlab_captureVideoOutput"
2285        android:description="@string/permdesc_captureVideoOutput"
2286        android:protectionLevel="signature|system" />
2287
2288    <!-- @SystemApi Allows an application to capture secure video output.
2289         <p>Not for use by third-party applications.</p> -->
2290    <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
2291        android:label="@string/permlab_captureSecureVideoOutput"
2292        android:description="@string/permdesc_captureSecureVideoOutput"
2293        android:protectionLevel="signature|system" />
2294
2295    <!-- @SystemApi Allows an application to know what content is playing and control its playback.
2296         <p>Not for use by third-party applications due to privacy of media consumption</p>  -->
2297    <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
2298        android:label="@string/permlab_mediaContentControl"
2299        android:description="@string/permdesc_mediaContentControl"
2300        android:protectionLevel="signature|system" />
2301
2302    <!-- Required to be able to disable the device (very dangerous!).
2303    <p>Not for use by third-party applications.. -->
2304    <permission android:name="android.permission.BRICK"
2305        android:label="@string/permlab_brick"
2306        android:description="@string/permdesc_brick"
2307        android:protectionLevel="signature" />
2308
2309    <!-- @SystemApi Required to be able to reboot the device.
2310    <p>Not for use by third-party applications. -->
2311    <permission android:name="android.permission.REBOOT"
2312        android:label="@string/permlab_reboot"
2313        android:description="@string/permdesc_reboot"
2314        android:protectionLevel="signature|system" />
2315
2316   <!-- Allows low-level access to power management.
2317   <p>Not for use by third-party applications. -->
2318    <permission android:name="android.permission.DEVICE_POWER"
2319        android:label="@string/permlab_devicePower"
2320        android:description="@string/permdesc_devicePower"
2321        android:protectionLevel="signature" />
2322
2323   <!-- @hide Allows low-level access to tun tap driver -->
2324    <permission android:name="android.permission.NET_TUNNELING"
2325        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2326        android:protectionLevel="signature" />
2327
2328    <!-- Run as a manufacturer test application, running as the root user.
2329         Only available when the device is running in manufacturer test mode.
2330         <p>Not for use by third-party applications. -->
2331    <permission android:name="android.permission.FACTORY_TEST"
2332        android:label="@string/permlab_factoryTest"
2333        android:description="@string/permdesc_factoryTest"
2334        android:protectionLevel="signature" />
2335
2336    <!-- Allows an application to broadcast a notification that an application
2337         package has been removed.
2338         <p>Not for use by third-party applications. -->
2339    <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
2340        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2341        android:label="@string/permlab_broadcastPackageRemoved"
2342        android:description="@string/permdesc_broadcastPackageRemoved"
2343        android:protectionLevel="signature" />
2344
2345    <!-- Allows an application to broadcast an SMS receipt notification.
2346    <p>Not for use by third-party applications. -->
2347    <permission android:name="android.permission.BROADCAST_SMS"
2348        android:permissionGroup="android.permission-group.MESSAGES"
2349        android:label="@string/permlab_broadcastSmsReceived"
2350        android:description="@string/permdesc_broadcastSmsReceived"
2351        android:protectionLevel="signature" />
2352
2353    <!-- Allows an application to broadcast a WAP PUSH receipt notification.
2354    <p>Not for use by third-party applications. -->
2355    <permission android:name="android.permission.BROADCAST_WAP_PUSH"
2356        android:permissionGroup="android.permission-group.MESSAGES"
2357        android:label="@string/permlab_broadcastWapPush"
2358        android:description="@string/permdesc_broadcastWapPush"
2359        android:protectionLevel="signature" />
2360
2361    <!-- @SystemApi Allows an application to broadcast a SCORE_NETWORKS request.
2362         <p>Not for use by third-party applications. @hide -->
2363    <permission android:name="android.permission.BROADCAST_SCORE_NETWORKS"
2364        android:label="@string/permlab_broadcastScoreNetworks"
2365        android:description="@string/permdesc_broadcastScoreNetworks"
2366        android:protectionLevel="signature|system" />
2367
2368    <!-- @SystemApi Not for use by third-party applications. -->
2369    <permission android:name="android.permission.MASTER_CLEAR"
2370        android:label="@string/permlab_masterClear"
2371        android:description="@string/permdesc_masterClear"
2372        android:protectionLevel="signature|system" />
2373
2374    <!-- @SystemApi Allows an application to call any phone number, including emergency
2375         numbers, without going through the Dialer user interface for the user
2376         to confirm the call being placed.
2377         <p>Not for use by third-party applications. -->
2378    <permission android:name="android.permission.CALL_PRIVILEGED"
2379        android:label="@string/permlab_callPrivileged"
2380        android:description="@string/permdesc_callPrivileged"
2381        android:protectionLevel="signature|system" />
2382
2383    <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
2384    <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
2385        android:label="@string/permlab_performCdmaProvisioning"
2386        android:description="@string/permdesc_performCdmaProvisioning"
2387        android:protectionLevel="signature|system" />
2388
2389    <!-- @SystemApi Allows enabling/disabling location update notifications from
2390         the radio.
2391         <p>Not for use by third-party applications. -->
2392    <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
2393        android:label="@string/permlab_locationUpdates"
2394        android:description="@string/permdesc_locationUpdates"
2395        android:protectionLevel="signature|system" />
2396
2397    <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
2398         database, to change values that get uploaded.
2399         <p>Not for use by third-party applications. -->
2400    <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
2401        android:label="@string/permlab_checkinProperties"
2402        android:description="@string/permdesc_checkinProperties"
2403        android:protectionLevel="signature|system" />
2404
2405    <!-- @SystemApi Allows an application to collect component usage
2406         statistics @hide -->
2407    <permission android:name="android.permission.PACKAGE_USAGE_STATS"
2408        android:label="@string/permlab_pkgUsageStats"
2409        android:description="@string/permdesc_pkgUsageStats"
2410        android:protectionLevel="signature|system" />
2411
2412    <!-- @SystemApi Allows an application to collect battery statistics -->
2413    <permission android:name="android.permission.BATTERY_STATS"
2414        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2415        android:label="@string/permlab_batteryStats"
2416        android:description="@string/permdesc_batteryStats"
2417        android:protectionLevel="signature|system" />
2418
2419    <!-- @SystemApi Allows an application to control the backup and restore process.
2420    <p>Not for use by third-party applications.
2421         @hide pending API council -->
2422    <permission android:name="android.permission.BACKUP"
2423        android:label="@string/permlab_backup"
2424        android:description="@string/permdesc_backup"
2425        android:protectionLevel="signature|system" />
2426
2427    <!-- Allows a package to launch the secure full-backup confirmation UI.
2428         ONLY the system process may hold this permission.
2429         @hide -->
2430    <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
2431        android:label="@string/permlab_confirm_full_backup"
2432        android:description="@string/permdesc_confirm_full_backup"
2433        android:protectionLevel="signature" />
2434
2435    <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
2436         to ensure that only the system can bind to it. -->
2437    <permission android:name="android.permission.BIND_REMOTEVIEWS"
2438        android:label="@string/permlab_bindRemoteViews"
2439        android:description="@string/permdesc_bindRemoteViews"
2440        android:protectionLevel="signature|system" />
2441
2442    <!-- @SystemApi Allows an application to tell the AppWidget service which application
2443         can access AppWidget's data.  The normal user flow is that a user
2444         picks an AppWidget to go into a particular host, thereby giving that
2445         host application access to the private data from the AppWidget app.
2446         An application that has this permission should honor that contract.
2447         <p>Not for use by third-party applications. -->
2448    <permission android:name="android.permission.BIND_APPWIDGET"
2449        android:permissionGroup="android.permission-group.PERSONAL_INFO"
2450        android:label="@string/permlab_bindGadget"
2451        android:description="@string/permdesc_bindGadget"
2452        android:protectionLevel="signature|system" />
2453
2454    <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
2455         keyguard widget
2456         @hide -->
2457    <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
2458        android:permissionGroup="android.permission-group.PERSONAL_INFO"
2459        android:protectionLevel="signature|system" />
2460
2461    <!-- @SystemApi Internal permission allowing an application to query/set which
2462         applications can bind AppWidgets.
2463         @hide -->
2464    <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
2465        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2466        android:protectionLevel="signature|system" />
2467
2468    <!-- Allows applications to change the background data setting.
2469    <p>Not for use by third-party applications.
2470         @hide pending API council -->
2471    <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
2472        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2473        android:protectionLevel="signature"
2474        android:description="@string/permdesc_changeBackgroundDataSetting"
2475        android:label="@string/permlab_changeBackgroundDataSetting" />
2476
2477    <!-- @SystemApi This permission can be used on content providers to allow the global
2478         search system to access their data.  Typically it used when the
2479         provider has some permissions protecting it (which global search
2480         would not be expected to hold), and added as a read-only permission
2481         to the path in the provider where global search queries are
2482         performed.  This permission can not be held by regular applications;
2483         it is used by applications to protect themselves from everyone else
2484         besides global search. -->
2485    <permission android:name="android.permission.GLOBAL_SEARCH"
2486        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2487        android:protectionLevel="signature|system" />
2488
2489    <!-- Internal permission protecting access to the global search
2490         system: ensures that only the system can access the provider
2491         to perform queries (since this otherwise provides unrestricted
2492         access to a variety of content providers), and to write the
2493         search statistics (to keep applications from gaming the source
2494         ranking).
2495         @hide -->
2496    <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
2497        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2498        android:protectionLevel="signature" />
2499
2500    <!-- @SystemApi Internal permission to allows an application to read indexable data.
2501        @hide -->
2502    <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
2503        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2504        android:protectionLevel="signature|system" />
2505
2506    <!-- @SystemApi Allows applications to set a live wallpaper.
2507         @hide XXX Change to signature once the picker is moved to its
2508         own apk as Ghod Intended. -->
2509    <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
2510        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2511        android:protectionLevel="signature|system" />
2512
2513    <!-- @SystemApi Allows applications to read dream settings and dream state.
2514         @hide -->
2515    <permission android:name="android.permission.READ_DREAM_STATE"
2516        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2517        android:protectionLevel="signature|system" />
2518
2519    <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
2520         @hide -->
2521    <permission android:name="android.permission.WRITE_DREAM_STATE"
2522        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2523        android:protectionLevel="signature|system" />
2524
2525    <!-- @SystemApi Allow an application to read and write the cache partition.
2526         @hide -->
2527    <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
2528        android:label="@string/permlab_cache_filesystem"
2529        android:description="@string/permdesc_cache_filesystem"
2530        android:protectionLevel="signature|system" />
2531
2532    <!-- Must be required by default container service so that only
2533         the system can bind to it and use it to copy
2534         protected data to secure containers or files
2535         accessible to the system.
2536         @hide -->
2537    <permission android:name="android.permission.COPY_PROTECTED_DATA"
2538        android:label="@string/permlab_copyProtectedData"
2539        android:description="@string/permlab_copyProtectedData"
2540        android:protectionLevel="signature" />
2541
2542    <!-- @SystemApi Internal permission protecting access to the encryption methods
2543        @hide
2544    -->
2545    <permission android:name="android.permission.CRYPT_KEEPER"
2546        android:protectionLevel="signature|system" />
2547
2548    <!-- @SystemApi Allows an application to read historical network usage for
2549         specific networks and applications. @hide -->
2550    <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
2551        android:label="@string/permlab_readNetworkUsageHistory"
2552        android:description="@string/permdesc_readNetworkUsageHistory"
2553        android:protectionLevel="signature|system" />
2554
2555    <!-- Allows an application to manage network policies (such as warning and disable
2556         limits) and to define application-specific rules. @hide -->
2557    <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
2558        android:label="@string/permlab_manageNetworkPolicy"
2559        android:description="@string/permdesc_manageNetworkPolicy"
2560        android:protectionLevel="signature" />
2561
2562    <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used
2563         by system services like download manager and media server. Not for use by
2564         third party apps. @hide -->
2565    <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
2566        android:label="@string/permlab_modifyNetworkAccounting"
2567        android:description="@string/permdesc_modifyNetworkAccounting"
2568        android:protectionLevel="signature|system" />
2569
2570    <!-- @SystemApi Allows an application to mark traffic as from another user for per user routing.
2571         Used by system wide services like media server that execute delegated network connections
2572         for users.
2573         @hide
2574    -->
2575    <permission android:name="android.permission.MARK_NETWORK_SOCKET"
2576        android:label="@string/permlab_markNetworkSocket"
2577        android:description="@string/permdesc_markNetworkSocket"
2578        android:protectionLevel="signature|system" />
2579
2580    <!-- C2DM permission.
2581         @hide Used internally.
2582     -->
2583    <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
2584          android:protectionLevel="signature" />
2585    <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
2586
2587    <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
2588         trust it to verify packages.
2589    -->
2590    <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
2591        android:label="@string/permlab_packageVerificationAgent"
2592        android:description="@string/permdesc_packageVerificationAgent"
2593        android:protectionLevel="signature|system" />
2594
2595    <!-- Must be required by package verifier receiver, to ensure that only the
2596         system can interact with it.
2597         @hide
2598    -->
2599    <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
2600        android:label="@string/permlab_bindPackageVerifier"
2601        android:description="@string/permdesc_bindPackageVerifier"
2602        android:protectionLevel="signature" />
2603
2604    <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
2605         @hide -->
2606    <permission android:name="android.permission.SERIAL_PORT"
2607        android:label="@string/permlab_serialPort"
2608        android:description="@string/permdesc_serialPort"
2609        android:protectionLevel="signature|system" />
2610
2611    <!-- Allows the holder to access content providers from outside an ApplicationThread.
2612         This permission is enforced by the ActivityManagerService on the corresponding APIs,
2613         in particular ActivityManagerService#getContentProviderExternal(String) and
2614         ActivityManagerService#removeContentProviderExternal(String).
2615         @hide
2616    -->
2617    <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
2618        android:label="@string/permlab_accessContentProvidersExternally"
2619        android:description="@string/permdesc_accessContentProvidersExternally"
2620        android:protectionLevel="signature" />
2621
2622    <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
2623         OTA reboot *not* occur while the lock is held.
2624         @hide -->
2625    <permission android:name="android.permission.UPDATE_LOCK"
2626        android:label="@string/permlab_updateLock"
2627        android:description="@string/permdesc_updateLock"
2628        android:protectionLevel="signatureOrSystem" />
2629
2630    <!-- @SystemApi Allows an application to read the current set of notifications, including
2631         any metadata and intents attached.
2632         @hide -->
2633    <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
2634        android:label="@string/permlab_accessNotifications"
2635        android:description="@string/permdesc_accessNotifications"
2636        android:protectionLevel="signature|system" />
2637
2638    <!-- Allows access to keyguard secure storage.  Only allowed for system processes.
2639        @hide -->
2640    <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
2641        android:protectionLevel="signature"
2642        android:label="@string/permlab_access_keyguard_secure_storage"
2643        android:description="@string/permdesc_access_keyguard_secure_storage" />
2644
2645    <!-- Allows an application to control keyguard.  Only allowed for system processes.
2646        @hide -->
2647    <permission android:name="android.permission.CONTROL_KEYGUARD"
2648        android:protectionLevel="signature"
2649        android:label="@string/permlab_control_keyguard"
2650        android:description="@string/permdesc_control_keyguard" />
2651
2652    <!-- Allows an application to listen to trust changes.  Only allowed for system processes.
2653        @hide -->
2654    <permission android:name="android.permission.TRUST_LISTENER"
2655                android:protectionLevel="signature"
2656                android:label="@string/permlab_trust_listener"
2657                android:description="@string/permdesc_trust_listener" />
2658
2659    <!-- @SystemApi Allows an application to provide a trust agent.
2660         @hide For security reasons, this is a platform-only permission. -->
2661    <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
2662                android:protectionLevel="signatureOrSystem"
2663                android:label="@string/permlab_provide_trust_agent"
2664                android:description="@string/permdesc_provide_trust_agent" />
2665
2666    <!-- Allows an application to launch the trust agent settings activity.
2667        @hide -->
2668    <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
2669        android:protectionLevel="signatureOrSystem"
2670        android:label="@string/permlab_launch_trust_agent_settings"
2671        android:description="@string/permdesc_launch_trust_agent_settings" />
2672
2673    <!-- Must be required by an {@link
2674         android.service.trust.TrustAgentService},
2675         to ensure that only the system can bind to it. -->
2676    <permission android:name="android.permission.BIND_TRUST_AGENT"
2677                android:protectionLevel="signature"
2678                android:label="@string/permlab_bind_trust_agent_service"
2679                android:description="@string/permdesc_bind_trust_agent_service" />
2680
2681    <!-- Must be required by an {@link
2682         android.service.notification.NotificationListenerService},
2683         to ensure that only the system can bind to it. -->
2684    <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
2685        android:label="@string/permlab_bindNotificationListenerService"
2686        android:description="@string/permdesc_bindNotificationListenerService"
2687        android:protectionLevel="signature" />
2688
2689    <!-- Must be required by an {@link
2690         android.service.notification.ConditionProviderService},
2691         to ensure that only the system can bind to it.
2692         @hide -->
2693    <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
2694        android:label="@string/permlab_bindConditionProviderService"
2695        android:description="@string/permdesc_bindConditionProviderService"
2696        android:protectionLevel="signature" />
2697
2698    <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
2699         carrier setup application to enforce that this permission is required
2700         @hide This is not a third-party API (intended for OEMs and system apps). -->
2701    <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
2702        android:label="@string/permlab_invokeCarrierSetup"
2703        android:description="@string/permdesc_invokeCarrierSetup"
2704        android:protectionLevel="signature|system" />
2705
2706    <!-- @SystemApi Allows an application to listen for network condition observations.
2707         @hide This is not a third-party API (intended for system apps). -->
2708    <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
2709        android:label="@string/permlab_accessNetworkConditions"
2710        android:description="@string/permdesc_accessNetworkConditions"
2711        android:protectionLevel="signature|system" />
2712
2713    <!-- @SystemApi Allows an application to provision and access DRM certificates
2714         @hide This is not a third-party API (intended for system apps). -->
2715    <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
2716        android:label="@string/permlab_accessDrmCertificates"
2717        android:description="@string/permdesc_accessDrmCertificates"
2718        android:protectionLevel="signature|system" />
2719
2720    <!-- The system process is explicitly the only one allowed to launch the
2721         confirmation UI for full backup/restore -->
2722    <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
2723
2724    <application android:process="system"
2725                 android:persistent="true"
2726                 android:hasCode="false"
2727                 android:label="@string/android_system_label"
2728                 android:allowClearUserData="false"
2729                 android:backupAgent="com.android.server.backup.SystemBackupAgent"
2730                 android:killAfterRestore="false"
2731                 android:icon="@drawable/ic_launcher_android"
2732                 android:supportsRtl="true">
2733        <activity android:name="com.android.internal.app.ChooserActivity"
2734                android:theme="@style/Theme.Holo.Dialog.Alert"
2735                android:finishOnCloseSystemDialogs="true"
2736                android:excludeFromRecents="true"
2737                android:multiprocess="true"
2738                android:documentLaunchMode="never">
2739            <intent-filter>
2740                <action android:name="android.intent.action.CHOOSER" />
2741                <category android:name="android.intent.category.DEFAULT" />
2742            </intent-filter>
2743        </activity>
2744        <activity android:name="com.android.internal.app.IntentForwarderActivity"
2745                android:finishOnCloseSystemDialogs="true"
2746                android:theme="@style/Theme.NoDisplay"
2747                android:excludeFromRecents="true"
2748                android:label="@string/user_owner_label"
2749                android:exported="true"
2750                >
2751        </activity>
2752        <activity-alias android:name="com.android.internal.app.ForwardIntentToUserOwner"
2753                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2754                android:icon="@drawable/personal_icon"
2755                android:exported="true"
2756                android:label="@string/user_owner_label">
2757        </activity-alias>
2758        <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
2759                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2760                android:icon="@drawable/ic_afw_icon"
2761                android:exported="true"
2762                android:label="@string/managed_profile_label">
2763        </activity-alias>
2764        <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
2765                android:theme="@style/Theme.Holo.Dialog"
2766                android:label="@string/heavy_weight_switcher_title"
2767                android:finishOnCloseSystemDialogs="true"
2768                android:excludeFromRecents="true"
2769                android:process=":ui">
2770        </activity>
2771        <activity android:name="com.android.internal.app.PlatLogoActivity"
2772                android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
2773                android:process=":ui">
2774        </activity>
2775        <activity android:name="com.android.internal.app.DisableCarModeActivity"
2776                android:theme="@style/Theme.NoDisplay"
2777                android:excludeFromRecents="true"
2778                android:process=":ui">
2779        </activity>
2780
2781        <activity android:name="android.accounts.ChooseAccountActivity"
2782                android:excludeFromRecents="true"
2783                android:exported="true"
2784                android:theme="@android:style/Theme.Holo.Dialog"
2785                android:label="@string/choose_account_label"
2786                android:process=":ui">
2787        </activity>
2788
2789        <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
2790                android:excludeFromRecents="true"
2791                android:exported="true"
2792                android:theme="@android:style/Theme.Holo.Dialog"
2793                android:label="@string/choose_account_label"
2794                android:process=":ui">
2795        </activity>
2796
2797        <activity android:name="android.accounts.ChooseAccountTypeActivity"
2798                android:excludeFromRecents="true"
2799                android:theme="@android:style/Theme.Holo.Dialog"
2800                android:label="@string/choose_account_label"
2801                android:process=":ui">
2802        </activity>
2803
2804        <activity android:name="android.accounts.CantAddAccountActivity"
2805                android:excludeFromRecents="true"
2806                android:exported="true"
2807                android:theme="@android:style/Theme.Holo.Dialog.NoActionBar"
2808                android:process=":ui">
2809        </activity>
2810
2811        <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
2812                android:excludeFromRecents="true"
2813                android:exported="true"
2814                android:theme="@android:style/Theme.Holo.DialogWhenLarge"
2815                android:process=":ui">
2816        </activity>
2817
2818        <activity android:name="android.content.SyncActivityTooManyDeletes"
2819               android:theme="@android:style/Theme.Holo.Dialog"
2820               android:label="@string/sync_too_many_deletes"
2821               android:process=":ui">
2822        </activity>
2823
2824        <activity android:name="com.android.server.ShutdownActivity"
2825            android:permission="android.permission.SHUTDOWN"
2826            android:excludeFromRecents="true">
2827            <intent-filter>
2828                <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" />
2829                <category android:name="android.intent.category.DEFAULT" />
2830            </intent-filter>
2831            <intent-filter>
2832                <action android:name="android.intent.action.REBOOT" />
2833                <category android:name="android.intent.category.DEFAULT" />
2834            </intent-filter>
2835        </activity>
2836
2837        <activity android:name="com.android.internal.app.NetInitiatedActivity"
2838                android:theme="@style/Theme.Holo.Dialog.Alert"
2839                android:excludeFromRecents="true"
2840                android:process=":ui">
2841        </activity>
2842
2843        <activity android:name="com.android.internal.app.RestrictionsPinActivity"
2844                android:theme="@style/Theme.Material.Light.Dialog.Alert"
2845                android:excludeFromRecents="true"
2846                android:windowSoftInputMode="adjustPan"
2847                android:process=":ui">
2848            <intent-filter android:priority="100">
2849                <action android:name="android.intent.action.RESTRICTIONS_CHALLENGE" />
2850                <category android:name="android.intent.category.DEFAULT" />
2851            </intent-filter>
2852        </activity>
2853
2854        <receiver android:name="com.android.server.BootReceiver"
2855                android:primaryUserOnly="true">
2856            <intent-filter android:priority="1000">
2857                <action android:name="android.intent.action.BOOT_COMPLETED" />
2858            </intent-filter>
2859        </receiver>
2860
2861        <receiver android:name="com.android.server.updates.CertPinInstallReceiver" >
2862            <intent-filter>
2863                <action android:name="android.intent.action.UPDATE_PINS" />
2864            </intent-filter>
2865        </receiver>
2866
2867        <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" >
2868            <intent-filter>
2869                <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
2870            </intent-filter>
2871        </receiver>
2872
2873        <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" >
2874            <intent-filter>
2875                <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
2876            </intent-filter>
2877        </receiver>
2878
2879        <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" >
2880            <intent-filter>
2881                <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
2882            </intent-filter>
2883        </receiver>
2884
2885        <receiver android:name="com.android.server.updates.TZInfoInstallReceiver" >
2886            <intent-filter>
2887                <action android:name="android.intent.action.UPDATE_TZINFO" />
2888            </intent-filter>
2889        </receiver>
2890
2891        <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" >
2892            <intent-filter>
2893                <action android:name="android.intent.action.UPDATE_SEPOLICY" />
2894            </intent-filter>
2895        </receiver>
2896
2897        <receiver android:name="com.android.server.MasterClearReceiver"
2898            android:permission="android.permission.MASTER_CLEAR">
2899            <intent-filter
2900                    android:priority="100" >
2901                <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR -->
2902                <action android:name="android.intent.action.MASTER_CLEAR" />
2903
2904                <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
2905                <action android:name="com.google.android.c2dm.intent.RECEIVE" />
2906                <category android:name="android.intent.category.MASTER_CLEAR" />
2907            </intent-filter>
2908        </receiver>
2909
2910        <service android:name="com.android.internal.os.storage.ExternalStorageFormatter"
2911            android:permission="android.permission.MASTER_CLEAR"
2912            android:exported="true" />
2913
2914        <service android:name="android.hardware.location.GeofenceHardwareService"
2915            android:permission="android.permission.LOCATION_HARDWARE"
2916            android:exported="false" />
2917
2918        <service android:name="com.android.internal.backup.LocalTransportService"
2919                android:permission="android.permission.CONFIRM_FULL_BACKUP"
2920                android:exported="false">
2921            <intent-filter>
2922                <action android:name="android.backup.TRANSPORT_HOST" />
2923            </intent-filter>
2924        </service>
2925
2926        <service android:name="com.android.server.MountServiceIdler"
2927                 android:exported="true"
2928                 android:permission="android.permission.BIND_JOB_SERVICE" >
2929        </service>
2930
2931    </application>
2932
2933</manifest>
2934