AndroidManifest.xml revision 90d557b7a68e64e049a44560b76b959ef87f13d7
10792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang<?xml version="1.0" encoding="utf-8"?>
20792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang<!--
30792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang/* //device/apps/common/AndroidManifest.xml
40792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang**
50792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** Copyright 2006, The Android Open Source Project
60792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang**
70792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** Licensed under the Apache License, Version 2.0 (the "License");
80792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** you may not use this file except in compliance with the License.
90792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** You may obtain a copy of the License at
100792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang**
110792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang**     http://www.apache.org/licenses/LICENSE-2.0
120792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang**
130792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** Unless required by applicable law or agreed to in writing, software
140792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** distributed under the License is distributed on an "AS IS" BASIS,
150792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
160792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** See the License for the specific language governing permissions and
170792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** limitations under the License.
180792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang*/
19ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim-->
20ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim<manifest xmlns:android="http://schemas.android.com/apk/res/android"
215008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    package="android" coreApp="true" android:sharedUserId="android.uid.system"
225008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    android:sharedUserLabel="@string/android_system_label">
235008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim
245008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <!-- ================================================ -->
255008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <!-- Special broadcasts that only the system can send -->
265008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <!-- ================================================ -->
275008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <eat-comment />
285008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim
295008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
300792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
3138db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
327ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim    <protected-broadcast android:name="android.intent.action.TIME_SET" />
330792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <protected-broadcast android:name="android.intent.action.TIME_TICK" />
3438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
3538db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
365008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
37c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim    <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
387d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo    <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
3960cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang    <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
400340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim    <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
41d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang    <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
42d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang    <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
436d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim    <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
44d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang    <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
459c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim    <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
46f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
4712e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang    <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
48ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
49119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
50a858d221ff86c497e745222ea15bab141e337636Jungshik Jang    <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
515008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
5242c9800f4f3acef10d19dca39e8b739546407c04Jungshik Jang    <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
5367ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang    <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
540792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
5578d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
56e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang    <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
5738db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
5878d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
5938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
607d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
615008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
627ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
637d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo    <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
642b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim    <protected-broadcast android:name="android.intent.action.REBOOT" />
650792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
663ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
678b308d93c8fdcc7304b33d9b445ae3807eae97c8Jungshik Jang    <protected-broadcast android:name="android.intent.action.USER_ADDED" />
6878d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
694893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim    <protected-broadcast android:name="android.intent.action.USER_STARTING" />
70959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo    <protected-broadcast android:name="android.intent.action.USER_STARTED" />
710792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
72a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang    <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
733ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
747e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim    <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
754fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
760792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang
77b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
78b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" />
79959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo
80959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo    <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
8178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
82f4eb72d53b4c5bc2286841006ad473ad4448bcf8Jinsuk Kim    <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
830340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim    <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
8402bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang    <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" />
851ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo
86a1fa91fe263c483cf13066e2847a440de2cd52a5Jungshik Jang    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
870792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
880792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
890792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
900792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
910792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
920792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang
930792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <protected-broadcast android:name="android.backup.intent.RUN" />
94c7eba0f1db8928ca779933a564a06989e22a8532Jinsuk Kim    <protected-broadcast android:name="android.backup.intent.CLEAR" />
9578d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <protected-broadcast android:name="android.backup.intent.INIT" />
96fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo
97fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo    <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
98fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo    <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
99fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
100fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
101fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo    <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
102d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang    <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
103d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang    <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
104d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang    <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
105d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang    <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
106d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang    <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
107d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang    <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
108d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang    <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
109ece603b7955938d6001c376f351ca0a2219330acYuncheol Heo    <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
1104fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
1114fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
1124fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
1134fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
1144fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
115d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
116d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
117d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
118d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
11902bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
12002bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang    <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
12102bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang    <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
12202bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang    <protected-broadcast
12302bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang        android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
12402bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang    <protected-broadcast
12502bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang        android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
12602bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang    <protected-broadcast
12702bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang        android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
12802bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang    <protected-broadcast
12902bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang        android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
13002bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang    <protected-broadcast
1311ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo        android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
132f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang    <protected-broadcast
13338db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
13438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <protected-broadcast
135f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang        android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
13638db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <protected-broadcast
13738db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
13838db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <protected-broadcast
13938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
14038db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <protected-broadcast
14138db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
14238db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <protected-broadcast
14338db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
14438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <protected-broadcast
14538db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
14638db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <protected-broadcast
1471ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo        android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
1481ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo    <protected-broadcast
1491ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo        android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
1501ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo   <protected-broadcast
1511ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo        android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
1521ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo    <protected-broadcast
15338db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
15438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <protected-broadcast
15538db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
15638db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <protected-broadcast
1570792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang        android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
1580792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <protected-broadcast
1590792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang        android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
1600792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" />
1610792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
16278d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
16378d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <protected-broadcast android:name="android.btopp.intent.action.LIST" />
16478d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
1650340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim    <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
1660340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim    <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
16778d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
168dbe6b45545dcd28e6aaf46986ed694196eb94de0Jungshik Jang    <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
169dbe6b45545dcd28e6aaf46986ed694196eb94de0Jungshik Jang    <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
17078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
1714893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim    <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
17278d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
17378d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
17478d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
175f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang
1764893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim    <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
1776d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim
1786d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim    <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
1796d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
180f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
181119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
182119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
183119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim
184119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
1859c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim    <protected-broadcast android:name="android.media.action.ANALOG_AUDIO_DOCK_PLUG" />
1869c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim    <protected-broadcast android:name="android.media.action.DIGITAL_AUDIO_DOCK_PLUG" />
1879c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim    <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" />
188b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <protected-broadcast android:name="android.media.action.USB_AUDIO_ACCESSORY_PLUG" />
18912e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang    <protected-broadcast android:name="android.media.action.USB_AUDIO_DEVICE_PLUG" />
190b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang
19192b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim    <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
19292b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim    <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
19392b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim    <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
19492b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim    <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
19592b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim    <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
1964d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim    <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
1974d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim    <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
1984d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim    <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
1994d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim
2004d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim    <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
2014d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
202ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
203ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
204ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
205ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
2064893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim    <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
2070340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim    <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
2080340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
2095008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
2105008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim
211f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
212f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
213f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
2140792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
2150792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
2160792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang
2170340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim    <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
2180340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim
2190340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim    <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" />
2200340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
2212b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
22230c74d9ba60a7208a587ecd6dcdfef1cfbd7fce7Jinsuk Kim    <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
2232b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim
2242b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim    <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
22530c74d9ba60a7208a587ecd6dcdfef1cfbd7fce7Jinsuk Kim    <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
2262b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim    <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
227e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim
228e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
229e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim
23075a77e7d6cbfc287c6126efd28b338b48b7ea70cYuncheol Heo    <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
23175a77e7d6cbfc287c6126efd28b338b48b7ea70cYuncheol Heo    <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
23238db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
233c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim    <protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" />
23438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo
23538db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
2361ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo    <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
2371ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo    <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
2381ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo    <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
23938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
24038db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
241fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo    <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
242fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo    <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
243fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo    <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
244867b4e0c55b4b1e432a3585fc945a999f066ef81Jungshik Jang    <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
245867b4e0c55b4b1e432a3585fc945a999f066ef81Jungshik Jang    <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
246867b4e0c55b4b1e432a3585fc945a999f066ef81Jungshik Jang    <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
247f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
248f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
249f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
250f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
251f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
252f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
253f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
254f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
255f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
256f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <protected-broadcast
257f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim            android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
258f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
259f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
260f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
261f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
262f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
263f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
264e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
265e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" />
266e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim
267e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
2680792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
2690792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang
2707d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo    <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
2715008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim
2720792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
2730792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang
2747d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo    <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" />
2757d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo
2767d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo    <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
2777d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo    <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
2787d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo    <protected-broadcast android:name="android.location.MODE_CHANGED" />
2797d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo    <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
2807d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo    <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
2817d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo
2827d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo    <protected-broadcast
2837d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo        android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
2847d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo
2857d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo    <!-- Defined in RestrictionsManager -->
2867d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo    <protected-broadcast
2877d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo        android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
2880792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <!-- Defined in RestrictionsManager -->
2890792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang
2902f51aec689226e259d08bf04d838251f249572e3Jungshik Jang    <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
291c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
2927ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
2937ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
29408a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
2958b308d93c8fdcc7304b33d9b445ae3807eae97c8Jungshik Jang
296a9f10629f4bc1a82761917645ff4d2b6d42e47b3Jungshik Jang    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SUBSCRIPTION_CHANGED" />
2973ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED" />
298347a60449981fc934e5a84122df87c1447665548Yuncheol Heo    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" />
2995008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" />
300347a60449981fc934e5a84122df87c1447665548Yuncheol Heo    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" />
301a9f10629f4bc1a82761917645ff4d2b6d42e47b3Jungshik Jang    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" />
302a9f10629f4bc1a82761917645ff4d2b6d42e47b3Jungshik Jang
303fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo    <!-- ====================================== -->
304a9f10629f4bc1a82761917645ff4d2b6d42e47b3Jungshik Jang    <!-- Permissions for things that cost money -->
305a8a5e50c6f9ba3ae0ff59eda76354e93515d6f8fJinsuk Kim    <!-- ====================================== -->
3060792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <eat-comment />
3070792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang
3080792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <!-- Used for permissions that can be used to make the user spend money
309e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang         without their direct involvement. -->
310f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <permission-group android:name="android.permission-group.COST_MONEY"
3110792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang        android:label="@string/permgrouplab_costMoney"
3120792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang        android:description="@string/permgroupdesc_costMoney" />
313ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim
314f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <!-- ================================== -->
315f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <!-- Permissions for accessing messages -->
31675a77e7d6cbfc287c6126efd28b338b48b7ea70cYuncheol Heo    <!-- ================================== -->
3178692fc68a413c7aca75f094bb02bcbabcc277c73Jinsuk Kim    <eat-comment />
31863a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo
31938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <!-- Used for permissions that allow an application to send messages
320f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim         on behalf of the user or intercept messages being received by the
32138db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo         user.  This is primarily intended for SMS/MMS messaging, such as
32238db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo         receiving or reading an MMS. -->
32338db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <permission-group android:name="android.permission-group.MESSAGES"
3241ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo        android:label="@string/permgrouplab_messages"
3251ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo        android:icon="@drawable/perm_group_messages"
32638db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:description="@string/permgroupdesc_messages"
3277ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim        android:permissionGroupFlags="personalInfo"
32838db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:priority="360"/>
32925c20298ad04e0e591e0cfdc0bb9d01a985433abYuncheol Heo
33025c20298ad04e0e591e0cfdc0bb9d01a985433abYuncheol Heo    <!-- Allows an application to send SMS messages. -->
33125c20298ad04e0e591e0cfdc0bb9d01a985433abYuncheol Heo    <permission android:name="android.permission.SEND_SMS"
33225c20298ad04e0e591e0cfdc0bb9d01a985433abYuncheol Heo        android:permissionGroup="android.permission-group.MESSAGES"
333fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo        android:protectionLevel="dangerous"
334fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo        android:permissionFlags="costsMoney"
335fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo        android:label="@string/permlab_sendSms"
336fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo        android:description="@string/permdesc_sendSms" />
337fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo
33825c20298ad04e0e591e0cfdc0bb9d01a985433abYuncheol Heo    <!-- @SystemApi Allows an application (Phone) to send a request to other applications
3395008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim         to handle the respond-via-message action during incoming calls.
3405008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim         <p>Not for use by third-party applications. -->
34125c20298ad04e0e591e0cfdc0bb9d01a985433abYuncheol Heo    <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
34225c20298ad04e0e591e0cfdc0bb9d01a985433abYuncheol Heo        android:permissionGroup="android.permission-group.MESSAGES"
34325c20298ad04e0e591e0cfdc0bb9d01a985433abYuncheol Heo        android:protectionLevel="signature|system"
3445008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:label="@string/permlab_sendRespondViaMessageRequest"
3455008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:description="@string/permdesc_sendRespondViaMessageRequest" />
3465008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim
3475008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <!-- Allows an application to monitor incoming SMS messages, to record
3485008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim         or perform processing on them. -->
3495008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <permission android:name="android.permission.RECEIVE_SMS"
3505008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:permissionGroup="android.permission-group.MESSAGES"
3515008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:protectionLevel="dangerous"
3525008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:label="@string/permlab_receiveSms"
3535691b2f2297b29dc83a7f83f77da517035b11cceJungshik Jang        android:description="@string/permdesc_receiveSms" />
3545008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim
3555008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <!-- Allows an application to monitor incoming MMS messages, to record
3565008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim         or perform processing on them. -->
3575008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <permission android:name="android.permission.RECEIVE_MMS"
3585008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:permissionGroup="android.permission-group.MESSAGES"
3595008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:protectionLevel="dangerous"
3605008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:label="@string/permlab_receiveMms"
3615008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:description="@string/permdesc_receiveMms" />
3625008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim
3635008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
364f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang         to record or display them to the user.
3655008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim         <p>Not for use by third-party applications.
3665008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim         @hide Pending API council approval -->
3675008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
3685008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:permissionGroup="android.permission-group.MESSAGES"
3695008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:protectionLevel="signature|system"
3705008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:label="@string/permlab_receiveEmergencyBroadcast"
3715008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:description="@string/permdesc_receiveEmergencyBroadcast" />
3725008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim
3735008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <!-- Allows an application to read previously received cell broadcast
3745008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim         messages and to register a content observer to get notifications when
375350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang         a cell broadcast has been received and added to the database. For
3765008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim         emergency alerts, the database is updated immediately after the
3775008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim         alert dialog and notification sound/vibration/speech are presented.
3785008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim         The "read" column is then updated after the user dismisses the alert.
3795008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim         This enables supplementary emergency assistance apps to start loading
3805008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim         additional emergency information (if Internet access is available)
3815008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim         when the alert is first received, and to delay presenting the info
38208a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo         to the user until after the initial alert dialog is dismissed.
3835008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim         @hide Pending API council approval -->
3845008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <permission android:name="android.permission.READ_CELL_BROADCASTS"
385f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:permissionGroup="android.permission-group.MESSAGES"
3865008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:protectionLevel="dangerous"
3875008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:label="@string/permlab_readCellBroadcasts"
3885008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:description="@string/permdesc_readCellBroadcasts" />
3895008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim
3905008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <!-- Allows an application to read SMS messages. -->
3915008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <permission android:name="android.permission.READ_SMS"
3925008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:permissionGroup="android.permission-group.MESSAGES"
3935008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:protectionLevel="dangerous"
3945008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:label="@string/permlab_readSms"
3957ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim        android:description="@string/permdesc_readSms" />
3967ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim
3975008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <!-- Allows an application to write SMS messages. -->
3987ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim    <permission android:name="android.permission.WRITE_SMS"
3997ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim        android:permissionGroup="android.permission-group.MESSAGES"
4007ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim        android:protectionLevel="dangerous"
4017ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim        android:label="@string/permlab_writeSms"
4025008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:description="@string/permdesc_writeSms" />
4035008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim
4045008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <!-- Allows an application to monitor incoming WAP push messages. -->
4055008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <permission android:name="android.permission.RECEIVE_WAP_PUSH"
4065008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:permissionGroup="android.permission-group.MESSAGES"
4070792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang        android:protectionLevel="dangerous"
408e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang        android:label="@string/permlab_receiveWapPush"
409fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo        android:description="@string/permdesc_receiveWapPush" />
4105008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim
411fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo    <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
412a9f10629f4bc1a82761917645ff4d2b6d42e47b3Jungshik Jang         or perform processing on them. -->
413a9f10629f4bc1a82761917645ff4d2b6d42e47b3Jungshik Jang    <!-- @hide -->
414a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang    <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
415fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo        android:permissionGroup="android.permission-group.MESSAGES"
416a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang        android:protectionLevel="dangerous"
4173ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang        android:label="@string/permlab_receiveBluetoothMap"
4183ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang        android:description="@string/permdesc_receiveBluetoothMap" />
419fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo
4204b54271f1bbd29957c47433155c58aa792105d6dYuncheol Heo    <!-- =============================================================== -->
4213ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <!-- Permissions for accessing social info (contacts and social) -->
4223ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <!-- =============================================================== -->
4233ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <eat-comment />
4243ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang
4253ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <!-- Used for permissions that provide access to the user's social connections,
4263ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang         such as contacts, call logs, social stream, etc.  This includes
4273ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang         both reading and writing of this data (which should generally be
428c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim         expressed as two distinct permissions). -->
4293ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang
4303ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <permission-group android:name="android.permission-group.SOCIAL_INFO"
431410ca9c7a4a2d69af5c81e76320433bfda05cafeJungshik Jang        android:label="@string/permgrouplab_socialInfo"
432410ca9c7a4a2d69af5c81e76320433bfda05cafeJungshik Jang        android:icon="@drawable/perm_group_social_info"
433410ca9c7a4a2d69af5c81e76320433bfda05cafeJungshik Jang        android:description="@string/permgroupdesc_socialInfo"
434410ca9c7a4a2d69af5c81e76320433bfda05cafeJungshik Jang        android:permissionGroupFlags="personalInfo"
4353ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang        android:priority="320" />
4363ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang
4373ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <!-- Allows an application to read the user's contacts data. -->
4383ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <permission android:name="android.permission.READ_CONTACTS"
4393ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang        android:permissionGroup="android.permission-group.SOCIAL_INFO"
4403ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang        android:protectionLevel="dangerous"
4414893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim        android:label="@string/permlab_readContacts"
442fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo        android:description="@string/permdesc_readContacts" />
443fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo
444fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo    <!-- Allows an application to write (but not read) the user's
4453ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang         contacts data. -->
4463ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <permission android:name="android.permission.WRITE_CONTACTS"
4473ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang        android:permissionGroup="android.permission-group.SOCIAL_INFO"
4483ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang        android:protectionLevel="dangerous"
4493ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang        android:label="@string/permlab_writeContacts"
4503ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang        android:description="@string/permdesc_writeContacts" />
451a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang
452fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo    <!-- @SystemApi @hide Allows an application to execute contacts directory search.
453a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang         This should only be used by ContactsProvider.
4543ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang         <p>Not for use by third-party applications. -->
4553ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
4563ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang        android:permissionGroup="android.permission-group.PERSONAL_INFO"
457fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo        android:protectionLevel="signature|system" />
4583ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang
4593ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <!-- Allows an application to read the user's call log.
4603ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang         <p class="note"><strong>Note:</strong> If your app uses the
4610340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim         {@link #READ_CONTACTS} permission and <em>both</em> your <a
4620340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
463a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang         minSdkVersion}</a> and <a
4642b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
465a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
4660340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim         grants your app this permission. If you don't need this permission, be sure your <a
4670340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
4680340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim         targetSdkVersion}</a> is 16 or higher.</p> -->
4690340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim    <permission android:name="android.permission.READ_CALL_LOG"
4700340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim        android:permissionGroup="android.permission-group.SOCIAL_INFO"
4710340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim        android:protectionLevel="dangerous"
4720340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim        android:label="@string/permlab_readCallLog"
4730340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim        android:description="@string/permdesc_readCallLog" />
4742b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim
4752b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim    <!-- Allows an application to write (but not read) the user's
4762b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim         contacts data.
47730c74d9ba60a7208a587ecd6dcdfef1cfbd7fce7Jinsuk Kim         <p class="note"><strong>Note:</strong> If your app uses the
47830c74d9ba60a7208a587ecd6dcdfef1cfbd7fce7Jinsuk Kim         {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
479e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
4802b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim         minSdkVersion}</a> and <a
48130c74d9ba60a7208a587ecd6dcdfef1cfbd7fce7Jinsuk Kim         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
48230c74d9ba60a7208a587ecd6dcdfef1cfbd7fce7Jinsuk Kim         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
483e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim         grants your app this permission. If you don't need this permission, be sure your <a
4840340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
48530c74d9ba60a7208a587ecd6dcdfef1cfbd7fce7Jinsuk Kim         targetSdkVersion}</a> is 16 or higher.</p>  -->
48630c74d9ba60a7208a587ecd6dcdfef1cfbd7fce7Jinsuk Kim    <permission android:name="android.permission.WRITE_CALL_LOG"
487e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:permissionGroup="android.permission-group.SOCIAL_INFO"
4880340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim        android:protectionLevel="dangerous"
489f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:label="@string/permlab_writeCallLog"
490f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:description="@string/permdesc_writeCallLog" />
491f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim
492f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim  <!-- Allows an application to read from the user's social stream.
493f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim       @deprecated This functionality will be unsupported in the future; cursors returned
4940340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim       will be empty. Please do not use. -->
495f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <permission android:name="android.permission.READ_SOCIAL_STREAM"
4960340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim        android:permissionGroup="android.permission-group.SOCIAL_INFO"
497f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:protectionLevel="dangerous"
498f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:label="@string/permlab_readSocialStream"
499f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:description="@string/permdesc_readSocialStream" />
500f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim
501f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <!-- Allows an application to write (but not read) the user's
502f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim         social stream data.
503f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim         @deprecated This functionality will be unsupported in the future; cursors returned
504f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim         will be empty. Please do not use. -->
505f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
506f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:permissionGroup="android.permission-group.SOCIAL_INFO"
507f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:protectionLevel="dangerous"
508f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:label="@string/permlab_writeSocialStream"
509f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:description="@string/permdesc_writeSocialStream" />
5102b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim
5112b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim    <!-- =============================================================== -->
512f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <!-- Permissions for accessing information about the device owner    -->
5130340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim    <!-- =============================================================== -->
5140340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim    <eat-comment />
5152738e2d872a22fe95a99941139863ff642fbd8e7Jungshik Jang
5162738e2d872a22fe95a99941139863ff642fbd8e7Jungshik Jang    <!-- Used for permissions that provide access to information about the device
5172738e2d872a22fe95a99941139863ff642fbd8e7Jungshik Jang         user such as profile information.  This includes both reading and
5182738e2d872a22fe95a99941139863ff642fbd8e7Jungshik Jang         writing of this data (which should generally be expressed as two
5190340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim         distinct permissions). -->
5200340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim    <permission-group android:name="android.permission-group.PERSONAL_INFO"
5210340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim        android:label="@string/permgrouplab_personalInfo"
5220340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim        android:icon="@drawable/perm_group_personal_info"
5230340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim        android:description="@string/permgroupdesc_personalInfo"
5240340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim        android:permissionGroupFlags="personalInfo"
5250340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim        android:priority="310" />
5262b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim
5270340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim    <!-- Allows an application to read the user's personal profile data. -->
5280340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim    <permission android:name="android.permission.READ_PROFILE"
529e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang        android:permissionGroup="android.permission-group.PERSONAL_INFO"
530401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim        android:protectionLevel="dangerous"
531401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim        android:label="@string/permlab_readProfile"
532401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim        android:description="@string/permdesc_readProfile" />
533401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim
534401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim    <!-- Allows an application to write (but not read) the user's
535401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim         personal profile data. -->
536401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim    <permission android:name="android.permission.WRITE_PROFILE"
537c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim        android:permissionGroup="android.permission-group.PERSONAL_INFO"
538401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim        android:protectionLevel="dangerous"
539401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim        android:label="@string/permlab_writeProfile"
540401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim        android:description="@string/permdesc_writeProfile" />
541401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim
542401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim    <!-- Allows an application to access data from sensors that the user uses to
543401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim         measure what is happening inside his/her body, such as heart rate. -->
544401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim    <permission android:name="android.permission.BODY_SENSORS"
545401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim        android:permissionGroup="android.permission-group.PERSONAL_INFO"
546401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim        android:label="@string/permlab_bodySensors"
547401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim        android:description="@string/permdesc_bodySensors" />
548401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim
549c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim    <!-- =============================================================== -->
5502b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim    <!-- Permissions for accessing the device calendar                   -->
551401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim    <!-- =============================================================== -->
552401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim    <eat-comment />
55309ffc846af78f949d2847003db9f793bfb5eefaaJinsuk Kim
5542b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim    <!-- Used for permissions that provide access to the device
55509ffc846af78f949d2847003db9f793bfb5eefaaJinsuk Kim         calendar to create / view events.-->
55609ffc846af78f949d2847003db9f793bfb5eefaaJinsuk Kim    <permission-group android:name="android.permission-group.CALENDAR"
557401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim        android:label="@string/permgrouplab_calendar"
558e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang        android:icon="@drawable/perm_group_calendar"
559e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang        android:description="@string/permgroupdesc_calendar"
560e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang        android:permissionGroupFlags="personalInfo"
561e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang        android:priority="290" />
562e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang
563e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang    <!-- Allows an application to read the user's calendar data. -->
564e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang    <permission android:name="android.permission.READ_CALENDAR"
565e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang        android:permissionGroup="android.permission-group.PERSONAL_INFO"
566e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang        android:protectionLevel="dangerous"
567e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang        android:label="@string/permlab_readCalendar"
568e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang        android:description="@string/permdesc_readCalendar" />
569e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang
570e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang    <!-- Allows an application to write (but not read) the user's
571e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang         calendar data. -->
572e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang    <permission android:name="android.permission.WRITE_CALENDAR"
57367ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang        android:permissionGroup="android.permission-group.PERSONAL_INFO"
574e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang        android:protectionLevel="dangerous"
575c70d2295dd3fb87ce8c81c704688d1ad05043b4dJinsuk Kim        android:label="@string/permlab_writeCalendar"
576c70d2295dd3fb87ce8c81c704688d1ad05043b4dJinsuk Kim        android:description="@string/permdesc_writeCalendar" />
5773ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang
5783ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <!-- =============================================================== -->
5793ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <!-- Permissions for accessing the user dictionary-->
5803ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <!-- =============================================================== -->
5813ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <eat-comment />
5823ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang
5833ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <!-- Used for permissions that provide access to the user
5843ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang         calendar to create / view events.-->
5853ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <permission-group android:name="android.permission-group.USER_DICTIONARY"
5863ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang        android:label="@string/permgrouplab_dictionary"
5873ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang        android:icon="@drawable/perm_group_user_dictionary"
5883ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang        android:description="@string/permgroupdesc_dictionary"
5893ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang        android:permissionGroupFlags="personalInfo"
590a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang        android:priority="170" />
59161f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang
5920340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim    <!-- Allows an application to read the user dictionary. This should
59379c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang         really only be required by an IME, or a dictionary editor like
59479c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang         the Settings app. -->
59579c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang    <permission android:name="android.permission.READ_USER_DICTIONARY"
59679c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang        android:permissionGroup="android.permission-group.USER_DICTIONARY"
5978960d1b1552729e3dfd33deee951ac75933ad8e5Jinsuk Kim        android:protectionLevel="dangerous"
598a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim        android:label="@string/permlab_readDictionary"
599a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim        android:description="@string/permdesc_readDictionary" />
6003ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang
601092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang    <!-- Used for permissions that provide access to the user
602092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang         calendar to create / view events.-->
603092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang    <permission-group android:name="android.permission-group.WRITE_USER_DICTIONARY"
604092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang        android:label="@string/permgrouplab_writeDictionary"
605092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang        android:icon="@drawable/perm_group_user_dictionary_write"
606092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang        android:description="@string/permgroupdesc_writeDictionary"
607092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang        android:priority="160" />
60860cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang
60960cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang    <!-- Allows an application to write to the user dictionary. -->
61060cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang    <permission android:name="android.permission.WRITE_USER_DICTIONARY"
611339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang        android:permissionGroup="android.permission-group.WRITE_USER_DICTIONARY"
6122b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim        android:protectionLevel="normal"
6132b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim        android:label="@string/permlab_writeDictionary"
61460cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang        android:description="@string/permdesc_writeDictionary" />
61560cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang
61660cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang    <!-- =============================================================== -->
61760cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang    <!-- Permissions for accessing the user bookmarks                    -->
61879c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang    <!-- =============================================================== -->
61967ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang    <eat-comment />
62067ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang
62167ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang    <!-- Used for permissions that provide access to the user
62263a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo         bookmarks and browser history.-->
62363a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo    <permission-group android:name="android.permission-group.BOOKMARKS"
62463a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo        android:label="@string/permgrouplab_bookmarks"
62563a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo        android:icon="@drawable/perm_group_bookmarks"
62663a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo        android:description="@string/permgroupdesc_bookmarks"
62763a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo        android:permissionGroupFlags="personalInfo"
62863a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo        android:priority="300" />
62963a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo
63063a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo    <!-- Allows an application to read (but not write) the user's
63163a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo        browsing history and bookmarks. -->
63267ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang    <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
633c70d2295dd3fb87ce8c81c704688d1ad05043b4dJinsuk Kim        android:permissionGroup="android.permission-group.BOOKMARKS"
634c70d2295dd3fb87ce8c81c704688d1ad05043b4dJinsuk Kim        android:label="@string/permlab_readHistoryBookmarks"
635c70d2295dd3fb87ce8c81c704688d1ad05043b4dJinsuk Kim        android:description="@string/permdesc_readHistoryBookmarks"
636d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang        android:protectionLevel="dangerous" />
637c70d2295dd3fb87ce8c81c704688d1ad05043b4dJinsuk Kim
638a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang    <!-- Allows an application to write (but not read) the user's
639d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang        browsing history and bookmarks. -->
640a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang    <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
6415f75cbd8593e83eaf17cfac07186a3b6a7b7b1f1Jungshik Jang        android:permissionGroup="android.permission-group.BOOKMARKS"
6425f75cbd8593e83eaf17cfac07186a3b6a7b7b1f1Jungshik Jang        android:label="@string/permlab_writeHistoryBookmarks"
6435f75cbd8593e83eaf17cfac07186a3b6a7b7b1f1Jungshik Jang        android:description="@string/permdesc_writeHistoryBookmarks"
644dbe6b45545dcd28e6aaf46986ed694196eb94de0Jungshik Jang        android:protectionLevel="dangerous" />
6455f75cbd8593e83eaf17cfac07186a3b6a7b7b1f1Jungshik Jang
6465f75cbd8593e83eaf17cfac07186a3b6a7b7b1f1Jungshik Jang    <!-- =============================================================== -->
6475f75cbd8593e83eaf17cfac07186a3b6a7b7b1f1Jungshik Jang    <!-- Permissions for setting the device alarm                        -->
6485f75cbd8593e83eaf17cfac07186a3b6a7b7b1f1Jungshik Jang    <!-- =============================================================== -->
649d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang    <eat-comment />
650d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang
651a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang    <!-- Used for permissions that provide access to device alarms. -->
652d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang    <permission-group android:name="android.permission-group.DEVICE_ALARMS"
653a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang        android:label="@string/permgrouplab_deviceAlarms"
6545f75cbd8593e83eaf17cfac07186a3b6a7b7b1f1Jungshik Jang        android:icon="@drawable/perm_group_device_alarms"
655c70d2295dd3fb87ce8c81c704688d1ad05043b4dJinsuk Kim        android:description="@string/permgroupdesc_deviceAlarms"
656c70d2295dd3fb87ce8c81c704688d1ad05043b4dJinsuk Kim        android:permissionGroupFlags="personalInfo"
6576aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo        android:priority="210" />
6586aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo
6596aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo    <!-- Allows an application to broadcast an Intent to set an alarm for the
6606aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo         user. -->
6616aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo    <permission android:name="com.android.alarm.permission.SET_ALARM"
6626aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo        android:permissionGroup="android.permission-group.DEVICE_ALARMS"
6636aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo        android:label="@string/permlab_setAlarm"
6646aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo        android:description="@string/permdesc_setAlarm"
6656aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo        android:protectionLevel="normal" />
6666aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo
6676aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo    <!-- =============================================================== -->
6686aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo    <!-- Permissions for accessing the user voicemail                    -->
669a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang    <!-- =============================================================== -->
670a1fa91fe263c483cf13066e2847a440de2cd52a5Jungshik Jang    <eat-comment />
671a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang
67275a77e7d6cbfc287c6126efd28b338b48b7ea70cYuncheol Heo    <!-- Used for permissions that provide access to the user voicemail box. -->
67375a77e7d6cbfc287c6126efd28b338b48b7ea70cYuncheol Heo    <permission-group android:name="android.permission-group.VOICEMAIL"
67475a77e7d6cbfc287c6126efd28b338b48b7ea70cYuncheol Heo        android:label="@string/permgrouplab_voicemail"
675092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang        android:icon="@drawable/perm_group_voicemail"
676092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang        android:description="@string/permgroupdesc_voicemail"
677092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang        android:permissionGroupFlags="personalInfo"
67879c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang        android:priority="280" />
67979c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang
68060cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang    <!-- Allows an application to add voicemails into the system. -->
68160cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang    <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
682a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang        android:permissionGroup="android.permission-group.VOICEMAIL"
683092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang        android:protectionLevel="dangerous"
684a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang        android:label="@string/permlab_addVoicemail"
685092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang        android:description="@string/permdesc_addVoicemail" />
68679c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang
687c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim    <!-- Allows an application to modify and remove existing voicemails in the system -->
688092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang    <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
689092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang        android:permissionGroup="android.permission-group.VOICEMAIL"
690092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang        android:protectionLevel="dangerous"
69160cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang        android:label="@string/permlab_writeVoicemail"
692c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim        android:description="@string/permdesc_writeVoicemail" />
693dbe6b45545dcd28e6aaf46986ed694196eb94de0Jungshik Jang
6943a959fca91bce393cc1ee79aa2985bb06542016eJungshik Jang    <!-- Allows an application to read voicemails in the system. -->
695092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang    <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
696a1fa91fe263c483cf13066e2847a440de2cd52a5Jungshik Jang        android:permissionGroup="android.permission-group.VOICEMAIL"
697a1fa91fe263c483cf13066e2847a440de2cd52a5Jungshik Jang        android:protectionLevel="dangerous"
69867ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang        android:label="@string/permlab_readVoicemail"
69967ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang        android:description="@string/permdesc_readVoicemail" />
70067ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang
701ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim    <!-- =============================================== -->
70267ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang    <!-- Permissions for enabling accessibility features -->
70367ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang    <!-- =============================================== -->
704a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang    <eat-comment />
705ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim
70660cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang    <!-- Used for permissions that allow requesting certain accessibility features. -->
70779c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang    <permission-group android:name="android.permission-group.ACCESSIBILITY_FEATURES"
708ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:label="@string/permgrouplab_accessibilityFeatures"
70960cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang        android:icon="@drawable/perm_group_accessibility_features"
710ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:description="@string/permgroupdesc_accessibilityFeatures"
71167ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang        android:priority="380" />
71267ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang
71302bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang    <!-- ======================================= -->
71402bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang    <!-- Permissions for accessing location info -->
71502bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang    <!-- ======================================= -->
71602bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang    <eat-comment />
71702bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang
7181de514256fd3015cf45256f3198ab5472024af9bJungshik Jang    <!-- Used for permissions that allow access to the user's current
7190f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang         location. -->
72002bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang    <permission-group android:name="android.permission-group.LOCATION"
7210f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang        android:label="@string/permgrouplab_location"
72202bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang        android:icon="@drawable/perm_group_location"
723a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang        android:description="@string/permgroupdesc_location"
7241de514256fd3015cf45256f3198ab5472024af9bJungshik Jang        android:permissionGroupFlags="personalInfo"
7251de514256fd3015cf45256f3198ab5472024af9bJungshik Jang        android:priority="330" />
726a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang
7271de514256fd3015cf45256f3198ab5472024af9bJungshik Jang    <!-- Allows an app to access precise location from location sources such
7281de514256fd3015cf45256f3198ab5472024af9bJungshik Jang         as GPS, cell towers, and Wi-Fi. -->
7290f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang    <permission android:name="android.permission.ACCESS_FINE_LOCATION"
7300f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang        android:permissionGroup="android.permission-group.LOCATION"
7310f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang        android:protectionLevel="dangerous"
732c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim        android:label="@string/permlab_accessFineLocation"
7330f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang        android:description="@string/permdesc_accessFineLocation" />
7340f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang
7350f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang    <!-- Allows an app to access approximate location derived from network location
736c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim         sources such as cell towers and Wi-Fi. -->
7370f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang    <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
7380f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang        android:permissionGroup="android.permission-group.LOCATION"
7390f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang        android:protectionLevel="dangerous"
7400f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang        android:label="@string/permlab_accessCoarseLocation"
74102bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang        android:description="@string/permdesc_accessCoarseLocation" />
74202bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang
74360cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang    <!-- Allows an application to create mock location providers for testing -->
74460cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang    <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
74560cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
74660cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang        android:protectionLevel="dangerous"
74760cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang        android:label="@string/permlab_accessMockLocation"
74879c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang        android:description="@string/permdesc_accessMockLocation" />
74979c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang
75079c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang    <!-- Allows an application to access extra location provider commands -->
75179c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang    <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
75279c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
753b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang        android:protectionLevel="normal"
754b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang        android:label="@string/permlab_accessLocationExtraCommands"
755b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang        android:description="@string/permdesc_accessLocationExtraCommands" />
756b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang
757b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang    <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
758b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang    <p>Not for use by third-party applications. -->
759b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang    <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
760b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang        android:protectionLevel="signature|system"
761b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang        android:label="@string/permlab_installLocationProvider"
762b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang        android:description="@string/permdesc_installLocationProvider" />
763b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang
764b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang    <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
765b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang         This should only be used by HDMI-CEC service.
766b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang    -->
767b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang    <permission android:name="android.permission.HDMI_CEC"
768b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang        android:protectionLevel="signatureOrSystem" />
7693ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang
7703ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <!-- @SystemApi Allows an application to use location features in hardware,
771ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang         such as the geofencing api.
772f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang         <p>Not for use by third-party applications. -->
773f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <permission android:name="android.permission.LOCATION_HARDWARE"
774f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:permissionGroup="android.permission-group.LOCATION"
775f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:protectionLevel="signature|system" />
776f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
777ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang
778ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- ======================================= -->
779ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- Permissions for accessing networks -->
780410ca9c7a4a2d69af5c81e76320433bfda05cafeJungshik Jang    <!-- ======================================= -->
78142c9800f4f3acef10d19dca39e8b739546407c04Jungshik Jang    <eat-comment />
78242c9800f4f3acef10d19dca39e8b739546407c04Jungshik Jang
78361f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang    <!-- Used for permissions that provide access to networking services.  The
7842b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim         main permission here is internet access, but this is also an
7852b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim         appropriate group for accessing or modifying any network configuration
7863ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang         or other related network operations. -->
7873ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang    <permission-group android:name="android.permission-group.NETWORK"
7887df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:label="@string/permgrouplab_network"
789f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:icon="@drawable/perm_group_network"
790f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:description="@string/permgroupdesc_network"
791f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:priority="270" />
792f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim
793f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <!-- Allows applications to open network sockets. -->
794f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <permission android:name="android.permission.INTERNET"
795f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:permissionGroup="android.permission-group.NETWORK"
796f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:protectionLevel="dangerous"
797f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:description="@string/permdesc_createNetworkSockets"
798f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:label="@string/permlab_createNetworkSockets" />
799f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim
800f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <!-- Allows applications to access information about networks -->
8017df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <permission android:name="android.permission.ACCESS_NETWORK_STATE"
8027df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:permissionGroup="android.permission-group.NETWORK"
8037df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:protectionLevel="normal"
8047df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:description="@string/permdesc_accessNetworkState"
8057df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:label="@string/permlab_accessNetworkState" />
8067df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang
8077df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <!-- Allows applications to access information about Wi-Fi networks -->
8087df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <permission android:name="android.permission.ACCESS_WIFI_STATE"
8097df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:permissionGroup="android.permission-group.NETWORK"
8107df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:protectionLevel="normal"
8117df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:description="@string/permdesc_accessWifiState"
8127df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:label="@string/permlab_accessWifiState" />
8137df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang
8147df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <!-- Allows applications to change Wi-Fi connectivity state -->
8157df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <permission android:name="android.permission.CHANGE_WIFI_STATE"
8167df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:permissionGroup="android.permission-group.NETWORK"
8177df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:protectionLevel="dangerous"
8187df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:description="@string/permdesc_changeWifiState"
8197df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:label="@string/permlab_changeWifiState" />
8207df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang
8217df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <!-- @SystemApi @hide Allows applications to read Wi-Fi credential.
8227df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang         <p>Not for use by third-party applications. -->
8237df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <permission android:name="android.permission.READ_WIFI_CREDENTIAL"
8247df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:permissionGroup="android.permission-group.NETWORK"
8257df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:protectionLevel="signature|system" />
826ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim
827ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim    <!-- @hide -->
8287c5d31ea93d6f6770c34f7a2a364522d8cc4b5d8Yuncheol Heo    <permission android:name="android.permission.ACCESS_WIMAX_STATE"
8297c5d31ea93d6f6770c34f7a2a364522d8cc4b5d8Yuncheol Heo        android:permissionGroup="android.permission-group.NETWORK"
8307c5d31ea93d6f6770c34f7a2a364522d8cc4b5d8Yuncheol Heo        android:protectionLevel="normal"
8317c5d31ea93d6f6770c34f7a2a364522d8cc4b5d8Yuncheol Heo        android:description="@string/permdesc_accessWimaxState"
8327c5d31ea93d6f6770c34f7a2a364522d8cc4b5d8Yuncheol Heo        android:label="@string/permlab_accessWimaxState" />
8337df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang
8347df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <!-- @hide -->
8357df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <permission android:name="android.permission.CHANGE_WIMAX_STATE"
8367df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:permissionGroup="android.permission-group.NETWORK"
837ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:protectionLevel="dangerous"
8387df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:description="@string/permdesc_changeWimaxState"
8397df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:label="@string/permlab_changeWimaxState" />
8407df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang
8417df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <!-- Allows applications to act as network scorers. @hide @SystemApi-->
8427df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <!-- TODO: Change protection level to normal when unhiding this API. -->
8437df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <permission android:name="android.permission.SCORE_NETWORKS"
8447df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:permissionGroup="android.permission-group.NETWORK"
8457df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:protectionLevel="signature|system"
8467df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:description="@string/permdesc_scoreNetworks"
8477df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:label="@string/permlab_scoreNetworks" />
8487df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang
8497df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <!-- ======================================= -->
8507df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <!-- Permissions for short range, peripheral networks -->
8517df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <!-- ======================================= -->
8527df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <eat-comment />
8537df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang
8547df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <!-- Used for permissions that provide access to other devices through Bluetooth.-->
8557df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <permission-group android:name="android.permission-group.BLUETOOTH_NETWORK"
8567df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:label="@string/permgrouplab_bluetoothNetwork"
8577df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:icon="@drawable/perm_group_bluetooth"
8587df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:description="@string/permgroupdesc_bluetoothNetwork"
8597df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:priority="260" />
8607df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang
8617df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <!-- Allows applications to connect to paired bluetooth devices -->
8627df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <permission android:name="android.permission.BLUETOOTH"
8637df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
864ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:protectionLevel="dangerous"
8657df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:description="@string/permdesc_bluetooth"
8667df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:label="@string/permlab_bluetooth" />
867ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim
868ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim    <!-- Allows applications to discover and pair bluetooth devices -->
8697df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <permission android:name="android.permission.BLUETOOTH_ADMIN"
8707df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
871ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:protectionLevel="dangerous"
872ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:description="@string/permdesc_bluetoothAdmin"
8737df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang        android:label="@string/permlab_bluetoothAdmin" />
8747df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang
8757df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to
8767df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang         allow or disallow phonebook access or message access.
8777df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang         This is not available to third party applications. -->
8787df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang    <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
879ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
880ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:protectionLevel="system|signature"
881ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:description="@string/permdesc_bluetoothPriv"
882ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:label="@string/permlab_bluetoothPriv" />
883ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim
884ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim    <!-- Control access to email providers exclusively for Bluetooth
885ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim         @hide
886ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim    -->
887ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim    <permission android:name="android.permission.BLUETOOTH_MAP"
888ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
889ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:protectionLevel="signature"
890ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:description="@string/permdesc_bluetoothMap"
891ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:label="@string/permlab_bluetoothMap" />
892ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim
893ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim    <!-- Allows bluetooth stack to access files
894ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim         @hide This should only be used by Bluetooth apk.
895ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim    -->
896ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim    <permission android:name="android.permission.BLUETOOTH_STACK"
897ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
898ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:protectionLevel="signature" />
899ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim
900ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim    <!-- Allows applications to perform I/O operations over NFC -->
901ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim    <permission android:name="android.permission.NFC"
902ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:permissionGroup="android.permission-group.NETWORK"
903f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:protectionLevel="dangerous"
904f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:description="@string/permdesc_nfc"
905f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:label="@string/permlab_nfc" />
906f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim
907f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
908f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim         @hide -->
909f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
910f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:permissionGroup="android.permission-group.NETWORK"
911f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:protectionLevel="signature|system" />
912f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim
913f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <!-- @SystemApi @hide -->
914f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
915f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:permissionGroup="android.permission-group.NETWORK"
91678d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:protectionLevel="signature|system" />
91778d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim
91878d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
91978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim         @hide -->
92078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <permission android:name="android.permission.LOOP_RADIO"
92178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:permissionGroup="android.permission-group.NETWORK"
92278d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:protectionLevel="signature|system" />
92378d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim
92478d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
92578d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim         @hide
92678d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    -->
92778d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <permission android:name="android.permission.NFC_HANDOVER_STATUS"
92878d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim                android:label="@string/permlab_handoverStatus"
92978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim                android:description="@string/permdesc_handoverStatus"
93078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim                android:protectionLevel="signature|system" />
93178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim
93278d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <!-- ================================== -->
9336d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim    <!-- Permissions for accessing accounts -->
9346d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim    <!-- ================================== -->
9356d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim    <eat-comment />
9366d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim
9376d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim    <!-- Permissions for direct access to the accounts managed
9386d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim         by the Account Manager. -->
9396d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim    <permission-group android:name="android.permission-group.ACCOUNTS"
9406d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim        android:label="@string/permgrouplab_accounts"
941ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:icon="@drawable/perm_group_accounts"
9426d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim        android:description="@string/permgroupdesc_accounts"
9436d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim        android:permissionGroupFlags="personalInfo"
9446d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim        android:priority="200" />
9456d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim
9466d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim    <!-- Allows access to the list of accounts in the Accounts Service -->
9476d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim    <permission android:name="android.permission.GET_ACCOUNTS"
948ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:permissionGroup="android.permission-group.ACCOUNTS"
94938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:protectionLevel="normal"
950ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:description="@string/permdesc_getAccounts"
951ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:label="@string/permlab_getAccounts" />
952ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang
953ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- Allows an application to act as an AccountAuthenticator for
954ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang         the AccountManager -->
955ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
956ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:permissionGroup="android.permission-group.ACCOUNTS"
957ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:protectionLevel="dangerous"
958ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:label="@string/permlab_authenticateAccounts"
959ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:description="@string/permdesc_authenticateAccounts" />
960ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang
961ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- Allows an application to request authtokens from the AccountManager -->
962ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <permission android:name="android.permission.USE_CREDENTIALS"
963119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:permissionGroup="android.permission-group.ACCOUNTS"
964119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:protectionLevel="dangerous"
965119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:label="@string/permlab_useCredentials"
966119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:description="@string/permdesc_useCredentials" />
967119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim
968119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <!-- Allows an application to manage the list of accounts in the AccountManager -->
969119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <permission android:name="android.permission.MANAGE_ACCOUNTS"
970119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:permissionGroup="android.permission-group.ACCOUNTS"
971119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:protectionLevel="dangerous"
972119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:label="@string/permlab_manageAccounts"
973119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:description="@string/permdesc_manageAccounts" />
974119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim
975119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <!-- @SystemApi Allows applications to call into AccountAuthenticators.
976119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <p>Not for use by third-party applications. -->
977119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <permission android:name="android.permission.ACCOUNT_MANAGER"
978119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:permissionGroup="android.permission-group.ACCOUNTS"
979119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:protectionLevel="signature"
98012e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang        android:description="@string/permdesc_accountManagerService"
981f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:label="@string/permlab_accountManagerService" />
982f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang
983f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <!-- ================================== -->
984f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <!-- Permissions for accessing hardware that may effect battery life-->
985f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <!-- ================================== -->
986f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <eat-comment />
987b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang
988b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <!-- Used for permissions that provide direct access to the hardware on
989b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         the device that has an effect on battery life.  This includes vibrator,
990f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang         flashlight,  etc. -->
991b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang
992b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <permission-group android:name="android.permission-group.AFFECTS_BATTERY"
993b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:label="@string/permgrouplab_affectsBattery"
994b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:icon="@drawable/perm_group_affects_battery"
99578d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:description="@string/permgroupdesc_affectsBattery"
99678d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:priority="180" />
99778d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim
99878d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <!-- Allows applications to enter Wi-Fi Multicast mode -->
99978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
100078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
100178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:protectionLevel="dangerous"
100278d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:description="@string/permdesc_changeWifiMulticastState"
10030340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim        android:label="@string/permlab_changeWifiMulticastState" />
10040340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim
10050340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim    <!-- Allows access to the vibrator -->
10060340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim    <permission android:name="android.permission.VIBRATE"
100778d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
10080340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim        android:protectionLevel="normal"
100978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:label="@string/permlab_vibrate"
101078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:description="@string/permdesc_vibrate" />
101178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim
101261f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang    <!-- Allows access to the flashlight -->
10137e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim    <permission android:name="android.permission.FLASHLIGHT"
10147e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
10157e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim        android:protectionLevel="normal"
10167e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim        android:label="@string/permlab_flashlight"
10177e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim        android:description="@string/permdesc_flashlight" />
10187e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim
10197e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim    <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
102061f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang         from dimming -->
102161f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang    <permission android:name="android.permission.WAKE_LOCK"
102261f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
10237e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim        android:protectionLevel="normal"
10247e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim        android:label="@string/permlab_wakeLock"
102561f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang        android:description="@string/permdesc_wakeLock" />
102661f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang
10277e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim    <!-- Allows using the device's IR transmitter, if available -->
10287e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim    <permission android:name="android.permission.TRANSMIT_IR"
10297e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
10307e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim        android:protectionLevel="normal"
10317e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim        android:label="@string/permlab_transmitIr"
10328960d1b1552729e3dfd33deee951ac75933ad8e5Jinsuk Kim        android:description="@string/permdesc_transmitIr" />
1033a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim
1034a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim    <!-- ==================================================== -->
1035a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim    <!-- Permissions related to changing audio settings   -->
1036a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim    <!-- ==================================================== -->
103772b7d738d5b9254594726304cdb1777b54d95631Jinsuk Kim    <eat-comment />
103872b7d738d5b9254594726304cdb1777b54d95631Jinsuk Kim
103972b7d738d5b9254594726304cdb1777b54d95631Jinsuk Kim    <!-- Used for permissions that provide direct access to speaker settings
104072b7d738d5b9254594726304cdb1777b54d95631Jinsuk Kim         the device. -->
104179c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang    <permission-group android:name="android.permission-group.AUDIO_SETTINGS"
1042a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim        android:label="@string/permgrouplab_audioSettings"
1043a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim        android:icon="@drawable/perm_group_audio_settings"
1044c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim        android:description="@string/permgroupdesc_audioSettings"
1045a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim        android:priority="130" />
1046a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim
1047f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <!-- Allows an application to modify global audio settings -->
1048f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
1049f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:permissionGroup="android.permission-group.AUDIO_SETTINGS"
1050f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:protectionLevel="normal"
105187f22a2870ac363a5849a7252c1bd44ce2b809c2Jinsuk Kim        android:label="@string/permlab_modifyAudioSettings"
105287f22a2870ac363a5849a7252c1bd44ce2b809c2Jinsuk Kim        android:description="@string/permdesc_modifyAudioSettings" />
1053f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim
1054f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <!-- ================================== -->
1055f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <!-- Permissions for accessing hardware -->
1056f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <!-- ================================== -->
10577c5d31ea93d6f6770c34f7a2a364522d8cc4b5d8Yuncheol Heo    <eat-comment />
1058f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim
105987f22a2870ac363a5849a7252c1bd44ce2b809c2Jinsuk Kim    <!-- Used for permissions that provide direct access to the hardware on
10608960d1b1552729e3dfd33deee951ac75933ad8e5Jinsuk Kim         the device.  This includes audio, the camera, vibrator, etc. -->
1061a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim    <permission-group android:name="android.permission-group.HARDWARE_CONTROLS"
1062a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim        android:label="@string/permgrouplab_hardwareControls"
1063a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim        android:description="@string/permgroupdesc_hardwareControls"
1064a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim        android:priority="260"/>
1065a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim
1066a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim    <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
1067a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim         @hide -->
1068a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim    <permission android:name="android.permission.MANAGE_USB"
1069a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim        android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1070a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim        android:protectionLevel="signature|system"
107172b7d738d5b9254594726304cdb1777b54d95631Jinsuk Kim        android:label="@string/permlab_manageUsb"
107272b7d738d5b9254594726304cdb1777b54d95631Jinsuk Kim        android:description="@string/permdesc_manageUsb" />
107372b7d738d5b9254594726304cdb1777b54d95631Jinsuk Kim
107472b7d738d5b9254594726304cdb1777b54d95631Jinsuk Kim    <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
1075a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim         For use only by the device side MTP implementation.
1076a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim         @hide -->
1077a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim    <permission android:name="android.permission.ACCESS_MTP"
1078c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim        android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1079a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim        android:protectionLevel="signature|system"
1080a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim        android:label="@string/permlab_accessMtp"
10818333571bd5e0a08773a1679964f8d96227af3356Jinsuk Kim        android:description="@string/permdesc_accessMtp" />
1082a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim
1083a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim    <!-- Allows access to hardware peripherals.  Intended only for hardware testing.
1084a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim    <p>Not for use by third-party applications. -->
1085a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim    <permission android:name="android.permission.HARDWARE_TEST"
1086a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim        android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1087c068bb5a0468bf605b0398e6f0ea5721917de4eeJinsuk Kim        android:protectionLevel="signature"
1088a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim        android:label="@string/permlab_hardware_test"
1089a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim        android:description="@string/permdesc_hardware_test" />
1090a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim
1091a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim    <!-- @SystemApi Allows access to FM
1092f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim         @hide This is not a third-party API (intended for system apps).-->
1093f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <permission android:name="android.permission.ACCESS_FM_RADIO"
1094f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1095f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:protectionLevel="signature|system"
10964612a6e1116f1196e6aa64b5a6e3757ea48f94acJungshik Jang        android:label="@string/permlab_fm"
10974612a6e1116f1196e6aa64b5a6e3757ea48f94acJungshik Jang        android:description="@string/permdesc_fm" />
10984612a6e1116f1196e6aa64b5a6e3757ea48f94acJungshik Jang
10994612a6e1116f1196e6aa64b5a6e3757ea48f94acJungshik Jang    <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
11004612a6e1116f1196e6aa64b5a6e3757ea48f94acJungshik Jang         @hide -->
11014612a6e1116f1196e6aa64b5a6e3757ea48f94acJungshik Jang    <permission android:name="android.permission.NET_ADMIN"
11024612a6e1116f1196e6aa64b5a6e3757ea48f94acJungshik Jang        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
11034612a6e1116f1196e6aa64b5a6e3757ea48f94acJungshik Jang        android:protectionLevel="signature" />
1104a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim
1105a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim    <!-- Allows registration for remote audio playback. @hide -->
1106a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim    <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
1107a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1108a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim        android:protectionLevel="signature" />
1109a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim
11107fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim    <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
111178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim         built-in tuners and HDMI-in's.
11127fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim         @hide This should only be used by OEM's TvInputService's.
11137fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim    -->
11147fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim    <permission android:name="android.permission.TV_INPUT_HARDWARE"
11157fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim        android:protectionLevel="signatureOrSystem" />
11167fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim
11177fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim    <!-- @SystemApi Allows to capture a frame of TV input hardware such as
111878d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim         built-in tuners and HDMI-in's.
111978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim         @hide <p>Not for use by third-party applications.
112078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    -->
11217fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim    <permission android:name="android.permission.CAPTURE_TV_INPUT"
112278d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:protectionLevel="signatureOrSystem" />
11237fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim
11247fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim    <!-- @hide Allows enabling/disabling OEM unlock
11257fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim   <p>Not for use by third-party applications. -->
11267fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim    <permission android:name="android.permission.OEM_UNLOCK_STATE"
11277fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim                android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
11287fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim                android:protectionLevel="signature" />
112978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim
113078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim
113178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <!-- =========================================== -->
11327fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim    <!-- Permissions associated with audio capture -->
113378d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <!-- =========================================== -->
1134f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <eat-comment />
113578d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim
113678d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <!-- Used for permissions that are associated with accessing
113778d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim         microphone audio from the device. Note that phone calls also capture audio
11387fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim         but are in a separate (more visible) permission group. -->
113978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <permission-group android:name="android.permission-group.MICROPHONE"
1140f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:label="@string/permgrouplab_microphone"
114178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:icon="@drawable/perm_group_microphone"
11426d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim        android:description="@string/permgroupdesc_microphone"
11436d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim        android:permissionGroupFlags="personalInfo"
11446d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim        android:priority="340" />
11456d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim
1146f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <!-- Allows an application to record audio -->
11476d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim    <permission android:name="android.permission.RECORD_AUDIO"
11486d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim        android:permissionGroup="android.permission-group.MICROPHONE"
11496d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim        android:protectionLevel="dangerous"
11506d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim        android:label="@string/permlab_recordAudio"
11516d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim        android:description="@string/permdesc_recordAudio" />
11522738e2d872a22fe95a99941139863ff642fbd8e7Jungshik Jang
11536d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim
1154ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- =========================================== -->
1155ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- Permissions associated with camera and image capture -->
1156ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- =========================================== -->
1157ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <eat-comment />
1158ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang
1159ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- Used for permissions that are associated with accessing
1160ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang         camera or capturing images/video from the device. -->
1161ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <permission-group android:name="android.permission-group.CAMERA"
1162e9cf1583c74fd03977c1ecb14520663710f14439Jungshik Jang        android:label="@string/permgrouplab_camera"
1163ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:icon="@drawable/perm_group_camera"
1164ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:description="@string/permgroupdesc_camera"
1165ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:permissionGroupFlags="personalInfo"
1166ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:priority="350" />
1167ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang
1168ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- Required to be able to access the camera device.
1169ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang         <p>This will automatically enforce the <a
1170ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang         href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code
1171ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang         &lt;uses-feature&gt;}</a> manifest element for <em>all</em> camera features.
1172377dcbd53af4529c352d453424539b069909fce4Jungshik Jang         If you do not require all camera features or can properly operate if a camera
1173ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang         is not available, then you must modify your manifest as appropriate in order to
1174ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang         install on devices that don't support all camera features.</p> -->
1175ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <permission android:name="android.permission.CAMERA"
1176ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:permissionGroup="android.permission-group.CAMERA"
1177ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:protectionLevel="dangerous"
1178ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:label="@string/permlab_camera"
1179ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:description="@string/permdesc_camera" />
1180ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang
1181ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
1182ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang         a camera is in use by an application.
1183ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang         @hide -->
1184c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim    <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
1185ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:permissionGroup="android.permission-group.CAMERA"
1186ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:protectionLevel="signature|system"
1187ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:label="@string/permlab_cameraDisableTransmitLed"
1188ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:description="@string/permdesc_cameraDisableTransmitLed" />
1189ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang
1190ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- =========================================== -->
1191ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- Permissions associated with telephony state -->
1192ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- =========================================== -->
1193ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <eat-comment />
1194ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang
1195ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- Used for permissions that are associated with accessing and modifying
1196ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang         telephony state: placing calls, intercepting outgoing calls, reading
1197ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang         and modifying the phone state. -->
1198ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <permission-group android:name="android.permission-group.PHONE_CALLS"
1199ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:label="@string/permgrouplab_phoneCalls"
1200ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:icon="@drawable/perm_group_phone_calls"
1201ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:description="@string/permgroupdesc_phoneCalls"
1202ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:permissionGroupFlags="personalInfo"
1203ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:priority="370" />
1204ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang
120592b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim    <!-- Allows an application to see the number being dialed during an outgoing
120692b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim         call with the option to redirect the call to a different number or
12079c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim         abort the call altogether. -->
12089c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim    <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
12099c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim        android:permissionGroup="android.permission-group.PHONE_CALLS"
12109c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim        android:protectionLevel="dangerous"
12119c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim        android:label="@string/permlab_processOutgoingCalls"
12129c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim        android:description="@string/permdesc_processOutgoingCalls" />
121361f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang
12149c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim    <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
12159c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim         Does not include placing calls.
12169c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim         <p>Not for use by third-party applications. -->
12179c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim    <permission android:name="android.permission.MODIFY_PHONE_STATE"
1218ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:permissionGroup="android.permission-group.PHONE_CALLS"
1219ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:protectionLevel="signature|system"
1220ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:label="@string/permlab_modifyPhoneState"
1221ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim        android:description="@string/permdesc_modifyPhoneState" />
1222ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim
12239c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim    <!-- Allows read only access to phone state.
12249c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
12259c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
12269c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim         minSdkVersion}</a> and <a
122741d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
122841d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
122941d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang         grants your app this permission. If you don't need this permission, be sure your <a
123041d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
123141d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang         targetSdkVersion}</a> is 4 or higher. -->
123241d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang    <permission android:name="android.permission.READ_PHONE_STATE"
123341d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang        android:permissionGroup="android.permission-group.PHONE_CALLS"
123441d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang        android:protectionLevel="dangerous"
123541d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang        android:label="@string/permlab_readPhoneState"
123641d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang        android:description="@string/permdesc_readPhoneState" />
123741d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang
123841d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang    <!-- Allows read only access to precise phone state.
123941d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang         @hide Pending API council approval -->
124041d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang    <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
124141d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang        android:permissionGroup="android.permission-group.PHONE_CALLS"
124241d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang        android:protectionLevel="dangerous"
124341d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang        android:label="@string/permlab_readPrecisePhoneState"
124441d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang        android:description="@string/permdesc_readPrecisePhoneState" />
124541d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang
124641d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang    <!-- @SystemApi Allows read access to privileged phone state.
124741d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang         @hide Used internally. -->
124841d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang    <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
124941d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang        android:permissionGroup="android.permission-group.PHONE_CALLS"
125041d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang        android:protectionLevel="signature|system" />
125141d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang
125241d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang     <!-- Allows an application to initiate a phone call without going through
125341d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang         the Dialer user interface for the user to confirm the call
125441d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang         being placed. -->
125541d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang    <permission android:name="android.permission.CALL_PHONE"
125641d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang        android:permissionGroup="android.permission-group.PHONE_CALLS"
125741d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang        android:protectionLevel="dangerous"
125841d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang        android:permissionFlags="costsMoney"
125941d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang        android:label="@string/permlab_callPhone"
1260a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang        android:description="@string/permdesc_callPhone" />
1261a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang
1262a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang    <!-- Allows an application to use SIP service -->
1263a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang    <permission android:name="android.permission.USE_SIP"
1264a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang        android:permissionGroup="android.permission-group.PHONE_CALLS"
1265a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang        android:protectionLevel="dangerous"
1266a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang        android:description="@string/permdesc_use_sip"
126738db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:label="@string/permlab_use_sip" />
1268a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang
1269a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang    <!-- @SystemApi Allows an application to bind to InCallService implementations.
1270a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang         @hide -->
1271a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang    <permission android:name="android.permission.BIND_INCALL_SERVICE"
1272a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang        android:permissionGroup="android.permission-group.PHONE_CALLS"
1273160a6e5b99de15ce755e2e5521dce32d81ab180aJinsuk Kim        android:protectionLevel="system|signature"
1274160a6e5b99de15ce755e2e5521dce32d81ab180aJinsuk Kim        android:description="@string/permdesc_bind_incall_service"
12754d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim        android:label="@string/permlab_bind_incall_service" />
12764d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim
12774d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim    <!-- @SystemApi Allows an application to bind to ConnectionService implementations.
12784d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim         @hide -->
12794d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim    <permission android:name="android.permission.BIND_CONNECTION_SERVICE"
12804d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim                android:permissionGroup="android.permission-group.PHONE_CALLS"
12814d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim                android:protectionLevel="system|signature"
1282119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim                android:description="@string/permdesc_bind_connection_service"
1283119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim                android:label="@string/permlab_bind_connection_service" />
1284119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim
1285119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <!-- @SystemApi Allows an application to control the in-call experience.
1286119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim         @hide -->
1287f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE"
1288119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim                android:permissionGroup="android.permission-group.PHONE_CALLS"
1289119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim                android:protectionLevel="system|signature"
1290119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim                android:description="@string/permdesc_control_incall_experience"
1291119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim                android:label="@string/permlab_control_incall_experience" />
1292119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim
1293119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <!-- ================================== -->
1294119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <!-- Permissions for sdcard interaction -->
1295119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <!-- ================================== -->
1296119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <eat-comment />
1297119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim
1298119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <!-- Group of permissions that are related to SD card access. -->
1299119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <permission-group android:name="android.permission-group.STORAGE"
1300119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:label="@string/permgrouplab_storage"
1301119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:icon="@drawable/perm_group_storage"
1302119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:description="@string/permgroupdesc_storage"
1303119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:permissionGroupFlags="personalInfo"
1304119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:priority="240" />
1305119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim
1306119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <!-- Allows an application to read from external storage.
1307119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim         <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
1308119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim         granted this permission.</p>
1309119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim         <p>This permission is enforced starting in API level 19.  Before API level 19, this
1310119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim         permission is not enforced and all apps still have access to read from external storage.
1311119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim         You can test your app with the permission enforced by enabling <em>Protect USB
131212e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang         storage</em> under Developer options in the Settings app on a device running Android 4.1 or
1313a6b2a7a59ab79b2d91412c1095d1c49b8dc9d507Jungshik Jang         higher.</p>
1314a6b2a7a59ab79b2d91412c1095d1c49b8dc9d507Jungshik Jang         <p>Also starting in API level 19, this permission is <em>not</em> required to
131512e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang         read/write files in your application-specific directories returned by
131612e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang         {@link android.content.Context#getExternalFilesDir} and
1317b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         {@link android.content.Context#getExternalCacheDir}.
1318b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1319b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1320b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         minSdkVersion}</a> and <a
1321b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1322b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1323b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         grants your app this permission. If you don't need this permission, be sure your <a
1324b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1325b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         targetSdkVersion}</a> is 4 or higher.-->
1326b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
1327b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:permissionGroup="android.permission-group.STORAGE"
1328b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:label="@string/permlab_sdcardRead"
1329b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:description="@string/permdesc_sdcardRead"
1330b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:protectionLevel="normal" />
1331b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang
1332b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <!-- Allows an application to write to external storage.
1333b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1334b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1335b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         minSdkVersion}</a> and <a
1336b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1337b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1338b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         grants your app this permission. If you don't need this permission, be sure your <a
1339b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1340b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         targetSdkVersion}</a> is 4 or higher.
1341b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         <p>Starting in API level 19, this permission is <em>not</em> required to
1342b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         read/write files in your application-specific directories returned by
1343b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         {@link android.content.Context#getExternalFilesDir} and
1344b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         {@link android.content.Context#getExternalCacheDir}. -->
1345a6b2a7a59ab79b2d91412c1095d1c49b8dc9d507Jungshik Jang    <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
1346a6b2a7a59ab79b2d91412c1095d1c49b8dc9d507Jungshik Jang        android:permissionGroup="android.permission-group.STORAGE"
1347a6b2a7a59ab79b2d91412c1095d1c49b8dc9d507Jungshik Jang        android:label="@string/permlab_sdcardWrite"
1348b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:description="@string/permdesc_sdcardWrite"
1349b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:protectionLevel="dangerous" />
1350b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang
1351b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <!-- @SystemApi Allows an application to write to internal media storage
1352b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang         @hide  -->
1353b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
1354b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:permissionGroup="android.permission-group.STORAGE"
1355b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:label="@string/permlab_mediaStorageWrite"
1356b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:description="@string/permdesc_mediaStorageWrite"
1357b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:protectionLevel="signature|system" />
1358b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang
1359b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <!-- Allows an application to manage access to documents, usually as part
1360bffb0635aaaaf9140d9120e3f3d95a4f7391a0acJungshik Jang         of a document picker. -->
1361bffb0635aaaaf9140d9120e3f3d95a4f7391a0acJungshik Jang    <permission android:name="android.permission.MANAGE_DOCUMENTS"
1362bffb0635aaaaf9140d9120e3f3d95a4f7391a0acJungshik Jang        android:permissionGroup="android.permission-group.STORAGE"
1363b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:label="@string/permlab_manageDocs"
1364b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:description="@string/permdesc_manageDocs"
1365b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:protectionLevel="signature" />
1366b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang
1367b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <!-- ================================== -->
1368b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <!-- Permissions for screenlock         -->
1369b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <!-- ================================== -->
1370b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <eat-comment />
1371b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang
1372b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <!-- Group of permissions that are related to the screenlock. -->
1373b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <permission-group android:name="android.permission-group.SCREENLOCK"
1374b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:label="@string/permgrouplab_screenlock"
1375a6b2a7a59ab79b2d91412c1095d1c49b8dc9d507Jungshik Jang        android:icon="@drawable/perm_group_screenlock"
1376f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:permissionGroupFlags="personalInfo"
1377f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:description="@string/permgroupdesc_screenlock"
1378f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:priority="230" />
1379f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang
1380f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <!-- Allows applications to disable the keyguard -->
1381f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <permission android:name="android.permission.DISABLE_KEYGUARD"
1382f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:permissionGroup="android.permission-group.SCREENLOCK"
1383f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:protectionLevel="dangerous"
1384f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:description="@string/permdesc_disableKeyguard"
1385f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:label="@string/permlab_disableKeyguard" />
1386f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang
1387f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <!-- ================================== -->
1388f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <!-- Permissions to access other installed applications  -->
1389f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <!-- ================================== -->
1390f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <eat-comment />
1391f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang
1392f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <!-- Group of permissions that are related to the other applications
1393f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang         installed on the system.  Examples include such as listing
1394f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang         running apps, or killing background processes. -->
1395f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <permission-group android:name="android.permission-group.APP_INFO"
1396f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:label="@string/permgrouplab_appInfo"
1397f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:icon="@drawable/perm_group_app_info"
1398f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:description="@string/permgroupdesc_appInfo"
1399f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:priority="220" />
1400f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang
1401f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <!-- @deprecated No longer enforced. -->
1402f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <permission android:name="android.permission.GET_TASKS"
1403f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:permissionGroup="android.permission-group.APP_INFO"
1404959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo        android:protectionLevel="normal"
1405959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo        android:label="@string/permlab_getTasks"
1406959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo        android:description="@string/permdesc_getTasks" />
1407959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo
1408959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo    <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really
1409959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo         give access to task information.  We need this new one because there are
1410959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo         many existing apps that use add libraries and such that have validation
1411959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo         code to ensure the app has requested the GET_TASKS permission by seeing
1412959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo         if it has been granted the permission...  if it hasn't, it kills the app
1413959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo         with a message about being upset.  So we need to have it continue to look
1414959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo         like the app is getting that permission, even though it will never be
1415959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo         checked, and new privileged apps can now request this one for real access.
1416959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo         @hide
1417959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo         @SystemApi -->
1418959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo    <permission android:name="android.permission.REAL_GET_TASKS"
1419959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo        android:permissionGroup="android.permission-group.APP_INFO"
1420959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo        android:protectionLevel="signature|system"
1421959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo        android:label="@string/permlab_getTasks"
1422959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo        android:description="@string/permdesc_getTasks" />
1423959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo
1424959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo    <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo.
1425959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo         @hide -->
142678d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <permission android:name="android.permission.START_TASKS_FROM_RECENTS"
142778d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1428a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang        android:protectionLevel="signature|system"
142979c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang        android:label="@string/permlab_startTasksFromRecents"
143079c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang        android:description="@string/permdesc_startTasksFromRecents" />
143179c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang
14327fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim    <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
14337fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim         across the users on the device, using singleton services and
1434c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim         user-targeted broadcasts.  This permission is not available to
14357fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim         third party applications. -->
14367fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim    <permission android:name="android.permission.INTERACT_ACROSS_USERS"
143779c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
143878d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:protectionLevel="signature|system|development"
143978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:label="@string/permlab_interactAcrossUsers"
1440a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang        android:description="@string/permdesc_interactAcrossUsers" />
144179c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang
144279c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang    <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
144379c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang         that removes restrictions on where broadcasts can be sent and allows other
14447fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim         types of interactions. -->
14457fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim    <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
1446c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
14477fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim        android:protectionLevel="signature"
14487fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim        android:label="@string/permlab_interactAcrossUsersFull"
144979c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang        android:description="@string/permdesc_interactAcrossUsersFull" />
145078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim
145178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
145278d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim         users on the device. This permission is not available to
145378d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim         third party applications. -->
145478d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <permission android:name="android.permission.MANAGE_USERS"
145578d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
145678d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:protectionLevel="signature|system"
145778d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:label="@string/permlab_manageUsers"
145878d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:description="@string/permdesc_manageUsers" />
145978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim
146078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <!-- Allows an application to get full detailed information about
146178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim         recently running tasks, with full fidelity to the real state.
146278d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim         @hide -->
146378d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <permission android:name="android.permission.GET_DETAILED_TASKS"
146478d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
146578d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:protectionLevel="signature"
146678d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:label="@string/permlab_getDetailedTasks"
146778d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:description="@string/permdesc_getDetailedTasks" />
146878d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim
146978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <!-- Allows an application to change the Z-order of tasks -->
147078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim    <permission android:name="android.permission.REORDER_TASKS"
147178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:permissionGroup="android.permission-group.APP_INFO"
147278d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:protectionLevel="normal"
147378d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:label="@string/permlab_reorderTasks"
147478d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim        android:description="@string/permdesc_reorderTasks" />
147578d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim
14767fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim    <!-- @hide Allows an application to change to remove/kill tasks -->
14776d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim    <permission android:name="android.permission.REMOVE_TASKS"
14784893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim        android:permissionGroup="android.permission-group.APP_INFO"
14794893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim        android:protectionLevel="signature"
14804893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim        android:label="@string/permlab_removeTasks"
14814893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim        android:description="@string/permdesc_removeTasks" />
14824893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim
14834893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim    <!-- @SystemApi @hide Allows an application to create/manage/remove stacks -->
14844893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim    <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
14856d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim        android:permissionGroup="android.permission-group.APP_INFO"
14864893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim        android:protectionLevel="signature|system"
14874893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim        android:label="@string/permlab_manageActivityStacks"
14884893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim        android:description="@string/permdesc_manageActivityStacks" />
14894893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim
149061daf6b38e7a7ada2a6ca5a60539a54b9c6810bdJungshik Jang    <!-- Allows an application to start any activity, regardless of permission
14914893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim         protection or exported state. @hide -->
1492f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <permission android:name="android.permission.START_ANY_ACTIVITY"
14934893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1494f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:protectionLevel="signature"
14954893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim        android:label="@string/permlab_startAnyActivity"
14964893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim        android:description="@string/permdesc_startAnyActivity" />
14976d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim
14986d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim    <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
14996d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim        API is no longer supported. -->
15006d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim    <permission android:name="android.permission.RESTART_PACKAGES"
15016d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim        android:permissionGroup="android.permission-group.APP_INFO"
1502ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:protectionLevel="normal"
1503ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:label="@string/permlab_killBackgroundProcesses"
1504ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:description="@string/permdesc_killBackgroundProcesses" />
1505ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang
1506ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- Allows an application to call
1507ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        {@link android.app.ActivityManager#killBackgroundProcesses}. -->
1508ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
1509ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:permissionGroup="android.permission-group.APP_INFO"
1510ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:protectionLevel="normal"
1511ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:label="@string/permlab_killBackgroundProcesses"
1512ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:description="@string/permdesc_killBackgroundProcesses" />
1513ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang
1514ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- ================================== -->
1515ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- Permissions affecting the display of other applications  -->
1516ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- ================================== -->
1517ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <eat-comment />
1518ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang
1519ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- Group of permissions that allow manipulation of how
1520ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang         another application displays UI to the user. -->
1521ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <permission-group android:name="android.permission-group.DISPLAY"
1522ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:label="@string/permgrouplab_display"
1523ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:icon="@drawable/perm_group_display"
1524ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:description="@string/permgroupdesc_display"
1525ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:priority="190"/>
1526ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang
1527ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- Allows an application to open windows using the type
1528ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang         {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT},
15299c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim         shown on top of all other applications.  Very few applications
1530f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang         should use this permission; these windows are intended for
1531f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang         system-level interaction with the user. -->
1532f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
1533f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:permissionGroup="android.permission-group.DISPLAY"
1534f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:protectionLevel="dangerous"
1535f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:label="@string/permlab_systemAlertWindow"
15369c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim        android:description="@string/permdesc_systemAlertWindow" />
15379c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim
15389c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim    <!-- ================================== -->
1539f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <!-- Permissions affecting the system wallpaper -->
15409c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim    <!-- ================================== -->
15419c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim    <eat-comment />
15429c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim
15439c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim    <!-- Group of permissions that allow manipulation of how
15449c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim         another application displays UI to the user. -->
15459c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim    <permission-group android:name="android.permission-group.WALLPAPER"
1546f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:label="@string/permgrouplab_wallpaper"
15479c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim        android:icon="@drawable/perm_group_wallpaper"
15489c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim        android:description="@string/permgroupdesc_wallpaper"
15499c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim        android:priority="150" />
15509c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim
15519c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim    <!-- Allows applications to set the wallpaper -->
15529c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim    <permission android:name="android.permission.SET_WALLPAPER"
15539c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim        android:permissionGroup="android.permission-group.WALLPAPER"
15549c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim        android:protectionLevel="normal"
15559c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim        android:label="@string/permlab_setWallpaper"
155661f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang        android:description="@string/permdesc_setWallpaper" />
15579c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim
1558f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <!-- Allows applications to set the wallpaper hints -->
15599c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim    <permission android:name="android.permission.SET_WALLPAPER_HINTS"
1560f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:permissionGroup="android.permission-group.WALLPAPER"
15619c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim        android:protectionLevel="normal"
15629c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim        android:label="@string/permlab_setWallpaperHints"
15639c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim        android:description="@string/permdesc_setWallpaperHints" />
15649c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim
15659c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim    <!-- ============================================ -->
15669c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim    <!-- Permissions for changing the system clock -->
15679c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim    <!-- ============================================ -->
156812e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang    <eat-comment />
1569b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang
1570f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <!-- Group of permissions that are related to system clock. -->
1571b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <permission-group android:name="android.permission-group.SYSTEM_CLOCK"
157212e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang        android:label="@string/permgrouplab_systemClock"
1573b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:icon="@drawable/perm_group_system_clock"
157412e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang        android:description="@string/permgroupdesc_systemClock"
1575b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:priority="140" />
1576b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang
1577b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <!-- @SystemApi Allows applications to set the system time.
1578b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <p>Not for use by third-party applications. -->
1579b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <permission android:name="android.permission.SET_TIME"
1580b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:protectionLevel="signature|system"
1581f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:label="@string/permlab_setTime"
158212e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang        android:description="@string/permdesc_setTime" />
1583f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang
158412e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang    <!-- Allows applications to set the system time zone -->
158512e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang    <permission android:name="android.permission.SET_TIME_ZONE"
1586b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:permissionGroup="android.permission-group.SYSTEM_CLOCK"
1587b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:protectionLevel="normal"
1588b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:label="@string/permlab_setTimeZone"
1589b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang        android:description="@string/permdesc_setTimeZone" />
1590b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang
1591b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang    <!-- ==================================================== -->
159212e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang    <!-- Permissions related to changing status bar   -->
159312e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang    <!-- ==================================================== -->
1594f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <eat-comment />
159512e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang
1596f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <!-- Used for permissions that change the status bar -->
159712e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang    <permission-group android:name="android.permission-group.STATUS_BAR"
159812e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang        android:label="@string/permgrouplab_statusBar"
159912e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang        android:icon="@drawable/perm_group_status_bar"
160012e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang        android:description="@string/permgroupdesc_statusBar"
160112e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang        android:priority="110" />
160212e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang
160312e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang    <!-- Allows an application to expand or collapse the status bar. -->
160412e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang    <permission android:name="android.permission.EXPAND_STATUS_BAR"
160512e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang        android:permissionGroup="android.permission-group.STATUS_BAR"
1606f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:protectionLevel="normal"
160712e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang        android:label="@string/permlab_expandStatusBar"
1608f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:description="@string/permdesc_expandStatusBar" />
160912e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang
1610e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang    <!-- ============================================================== -->
1611e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang    <!-- Permissions related to adding/removing shortcuts from Launcher -->
1612e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang    <!-- ============================================================== -->
1613e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang    <eat-comment />
1614e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang
1615e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang    <!-- Allows an application to install a shortcut in Launcher -->
1616e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang    <permission
1617e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang        android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
1618f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1619e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang        android:protectionLevel="dangerous"
1620f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:label="@string/permlab_install_shortcut"
1621e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang        android:description="@string/permdesc_install_shortcut" />
1622e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang
162312e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang        <!-- Allows an application to uninstall a shortcut in Launcher -->
162412e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang    <permission
162512e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang        android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
162612e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
162712e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang        android:protectionLevel="dangerous"
16287fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim        android:label="@string/permlab_uninstall_shortcut"
16297fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim        android:description="@string/permdesc_uninstall_shortcut"/>
16307fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim
16317fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim    <!-- ==================================================== -->
16327fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim    <!-- Permissions related to accessing sync settings   -->
16337fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim    <!-- ==================================================== -->
16347fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim    <eat-comment />
163563a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo
1636f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <!-- Used for permissions that access the sync settings or sync
1637ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang         related information. -->
1638ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <permission-group android:name="android.permission-group.SYNC_SETTINGS"
1639ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:label="@string/permgrouplab_syncSettings"
1640ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:icon="@drawable/perm_group_sync_settings"
1641ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:description="@string/permgroupdesc_syncSettings"
1642ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang        android:priority="120" />
1643ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang
1644ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang    <!-- Allows applications to read the sync settings -->
16454893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim    <permission android:name="android.permission.READ_SYNC_SETTINGS"
16464893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim        android:permissionGroup="android.permission-group.SYNC_SETTINGS"
164760cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang        android:protectionLevel="normal"
1648f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:description="@string/permdesc_readSyncSettings"
1649f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:label="@string/permlab_readSyncSettings" />
165060cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang
165160cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang    <!-- Allows applications to write the sync settings -->
165260cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang    <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
165360cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang        android:permissionGroup="android.permission-group.SYNC_SETTINGS"
16544893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim        android:protectionLevel="normal"
165560cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang        android:description="@string/permdesc_writeSyncSettings"
165660cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang        android:label="@string/permlab_writeSyncSettings" />
165760cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang
165860cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang    <!-- Allows applications to read the sync stats -->
165960cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang    <permission android:name="android.permission.READ_SYNC_STATS"
166060cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang        android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1661e81e108c4035ea8933525baa8108cb392f8abf5dJungshik Jang        android:protectionLevel="normal"
1662e81e108c4035ea8933525baa8108cb392f8abf5dJungshik Jang        android:description="@string/permdesc_readSyncStats"
166379c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang        android:label="@string/permlab_readSyncStats" />
166461f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang
166579c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang
166679c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang    <!-- ============================================ -->
1667e946ed8f54c5ee0e58e168df00d4f418e1eed7a7Yuncheol Heo    <!-- Permissions for low-level system interaction -->
1668e946ed8f54c5ee0e58e168df00d4f418e1eed7a7Yuncheol Heo    <!-- ============================================ -->
1669e946ed8f54c5ee0e58e168df00d4f418e1eed7a7Yuncheol Heo    <eat-comment />
1670e946ed8f54c5ee0e58e168df00d4f418e1eed7a7Yuncheol Heo
167179c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang    <!-- Group of permissions that are related to system APIs.  Many
1672c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim         of these are not permissions the user will be expected to understand,
167361f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang         and such permissions should generally be marked as "normal" protection
167460cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang         level so they don't get displayed.  This can also, however, be used
1675a858d221ff86c497e745222ea15bab141e337636Jungshik Jang         for miscellaneous features that provide access to the operating system,
1676a858d221ff86c497e745222ea15bab141e337636Jungshik Jang         such as writing the global system settings. -->
1677a858d221ff86c497e745222ea15bab141e337636Jungshik Jang    <permission-group android:name="android.permission-group.SYSTEM_TOOLS"
1678a858d221ff86c497e745222ea15bab141e337636Jungshik Jang        android:label="@string/permgrouplab_systemTools"
167992b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim        android:icon="@drawable/perm_group_system_tools"
168092b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim        android:description="@string/permgroupdesc_systemTools"
168192b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim        android:priority="100" />
168292b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim
168392b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim    <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
168492b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim    <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
168538db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1686f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang        android:protectionLevel="signature"
168738db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:label="@string/permlab_setScreenCompatibility"
1688f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang        android:description="@string/permdesc_setScreenCompatibility" />
168938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo
169038db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <!-- Allows an application to access all multi-user external storage @hide -->
169138db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE"
1692f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
169338db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:label="@string/permlab_sdcardAccessAll"
1694f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang        android:description="@string/permdesc_sdcardAccessAll"
1695c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim        android:protectionLevel="signature" />
1696c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim
169738db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <!-- @SystemApi Allows an application to modify the current configuration, such
169838db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo         as locale. -->
1699f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang    <permission android:name="android.permission.CHANGE_CONFIGURATION"
170038db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1701f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang        android:protectionLevel="signature|system|development"
1702c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim        android:label="@string/permlab_changeConfiguration"
1703c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim        android:description="@string/permdesc_changeConfiguration" />
170438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo
170538db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <!-- Allows an application to read or write the system settings. -->
1706f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang    <permission android:name="android.permission.WRITE_SETTINGS"
170738db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1708f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang        android:protectionLevel="normal"
1709c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim        android:label="@string/permlab_writeSettings"
171038db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:description="@string/permdesc_writeSettings" />
171138db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo
171238db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <!-- @SystemApi Allows an application to modify the Google service map.
171338db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <p>Not for use by third-party applications. -->
171438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <permission android:name="android.permission.WRITE_GSERVICES"
1715fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo        android:protectionLevel="signature|system"
171638db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:label="@string/permlab_writeGservices"
171738db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:description="@string/permdesc_writeGservices" />
171838db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo
171938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <!-- @SystemApi Allows an application to call
172038db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        {@link android.app.ActivityManager#forceStopPackage}.
172138db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        @hide -->
172238db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <permission android:name="android.permission.FORCE_STOP_PACKAGES"
172338db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
172438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:protectionLevel="signature|system"
172538db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:label="@string/permlab_forceStopPackages"
172638db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:description="@string/permdesc_forceStopPackages" />
1727c12035cd40d01b032013f515cb509e6c8791cf65Jeff Brown
172838db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
172938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo         An active window is the window that has fired an accessibility event. -->
173038db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
173138db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:permissionGroup="android.permission-group.PERSONAL_INFO"
173238db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:protectionLevel="signature|system"
173338db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:label="@string/permlab_retrieve_window_content"
173438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:description="@string/permdesc_retrieve_window_content" />
1735c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim
173638db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <!-- @SystemApi Modify the global animation scaling factor.
1737a9f10629f4bc1a82761917645ff4d2b6d42e47b3Jungshik Jang    <p>Not for use by third-party applications. -->
1738fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo    <permission android:name="android.permission.SET_ANIMATION_SCALE"
1739fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1740fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo        android:protectionLevel="signature|system|development"
1741fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo        android:label="@string/permlab_setAnimationScale"
1742fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo        android:description="@string/permdesc_setAnimationScale" />
1743a9f10629f4bc1a82761917645ff4d2b6d42e47b3Jungshik Jang
174438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <!-- @deprecated This functionality will be removed in the future; please do
174538db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo         not use. Allow an application to make its activities persistent. -->
174638db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <permission android:name="android.permission.PERSISTENT_ACTIVITY"
174738db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:permissionGroup="android.permission-group.APP_INFO"
174838db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:protectionLevel="normal"
174938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:label="@string/permlab_persistentActivity"
175038db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:description="@string/permdesc_persistentActivity" />
175138db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo
175238db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <!-- Allows an application to find out the space used by any package. -->
1753c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim    <permission android:name="android.permission.GET_PACKAGE_SIZE"
17544fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
17554fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang        android:protectionLevel="normal"
17564fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang        android:label="@string/permlab_getPackageSize"
17574fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang        android:description="@string/permdesc_getPackageSize" />
17584fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang
17594fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <!-- @deprecated No longer useful, see
17604fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang         {@link android.content.pm.PackageManager#addPackageToPreferred}
17614fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang         for details. -->
17624fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
17634b54271f1bbd29957c47433155c58aa792105d6dYuncheol Heo        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
17644b54271f1bbd29957c47433155c58aa792105d6dYuncheol Heo        android:protectionLevel="signature"
17654b54271f1bbd29957c47433155c58aa792105d6dYuncheol Heo        android:label="@string/permlab_setPreferredApplications"
17664fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang        android:description="@string/permdesc_setPreferredApplications" />
17674fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang
17684fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <!-- Allows an application to receive the
17694fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang         {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
17704fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang         broadcast after the system finishes booting.  If you don't
17711ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo         request this permission, you will not receive the broadcast at
17721ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo         that time.  Though holding this permission does not have any
17731ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo         security implications, it can have a negative impact on the
17741ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo         user experience by increasing the amount of time it takes the
17751ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo         system to start and allowing applications to have themselves
17761ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo         running without the user being aware of them.  As such, you must
17771ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo         explicitly declare your use of this facility to make that visible
17781ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo         to the user. -->
17791ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo    <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
17801ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo        android:permissionGroup="android.permission-group.APP_INFO"
1781f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang        android:protectionLevel="normal"
1782f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang        android:label="@string/permlab_receiveBootCompleted"
1783f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang        android:description="@string/permdesc_receiveBootCompleted" />
1784f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang
1785f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang    <!-- Allows an application to broadcast sticky intents.  These are
1786f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang         broadcasts whose data is held by the system after being finished,
17874fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang         so that clients can quickly retrieve that data without having
1788350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang         to wait for the next broadcast. -->
1789350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang    <permission android:name="android.permission.BROADCAST_STICKY"
1790350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1791350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang        android:protectionLevel="normal"
1792350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang        android:label="@string/permlab_broadcastSticky"
1793350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang        android:description="@string/permdesc_broadcastSticky" />
1794350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang
179538db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
1796350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang    <p>Not for use by third-party applications.-->
1797f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
179838db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
179938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:protectionLevel="system|signature"
180038db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:label="@string/permlab_mount_unmount_filesystems"
18014fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang        android:description="@string/permdesc_mount_unmount_filesystems" />
18024fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang
18034fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <!-- @SystemApi Allows formatting file systems for removable storage.
18044fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <p>Not for use by third-party applications. -->
18054fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
18064fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
18074fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang        android:protectionLevel="system|signature"
18084fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang        android:label="@string/permlab_mount_format_filesystems"
18094fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang        android:description="@string/permdesc_mount_format_filesystems" />
18104fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang
18114fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <!-- Allows access to ASEC non-destructive API calls
181238db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo         @hide  -->
18134fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <permission android:name="android.permission.ASEC_ACCESS"
18144fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1815c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim        android:protectionLevel="signature"
181638db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:label="@string/permlab_asec_access"
181738db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:description="@string/permdesc_asec_access" />
1818c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim
181938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <!-- Allows creation of ASEC volumes
18204fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang         @hide  -->
182138db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo    <permission android:name="android.permission.ASEC_CREATE"
182238db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
18235008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:protectionLevel="signature"
182438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo        android:label="@string/permlab_asec_create"
18254d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim        android:description="@string/permdesc_asec_create" />
1826119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim
1827119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <!-- Allows destruction of ASEC volumes
1828119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim         @hide  -->
1829119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <permission android:name="android.permission.ASEC_DESTROY"
1830119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1831119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:protectionLevel="signature"
1832119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:label="@string/permlab_asec_destroy"
1833119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:description="@string/permdesc_asec_destroy" />
1834119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim
1835119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <!-- Allows mount / unmount of ASEC volumes
1836119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim         @hide  -->
1837119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
1838119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1839119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:protectionLevel="signature"
1840119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:label="@string/permlab_asec_mount_unmount"
1841119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:description="@string/permdesc_asec_mount_unmount" />
1842119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim
1843119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <!-- Allows rename of ASEC volumes
1844119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim         @hide  -->
1845119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <permission android:name="android.permission.ASEC_RENAME"
1846119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1847119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:protectionLevel="signature"
1848119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:label="@string/permlab_asec_rename"
1849119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim        android:description="@string/permdesc_asec_rename" />
1850119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim
1851119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <!-- @SystemApi Allows applications to write the apn settings.
1852119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <p>Not for use by third-party applications. -->
1853119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim    <permission android:name="android.permission.WRITE_APN_SETTINGS"
1854119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim                android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1855f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang                android:protectionLevel="signature|system"
1856f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang                android:description="@string/permdesc_writeApnSettings"
1857f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang                android:label="@string/permlab_writeApnSettings" />
1858f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang
1859f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <!-- Allows an application to allow access the subscribed feeds
1860f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang         ContentProvider. -->
1861f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
1862f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1863f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:label="@string/permlab_subscribedFeedsRead"
1864f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:description="@string/permdesc_subscribedFeedsRead"
1865f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:protectionLevel="normal" />
1866f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
1867f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1868f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:label="@string/permlab_subscribedFeedsWrite"
1869f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:description="@string/permdesc_subscribedFeedsWrite"
1870f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:protectionLevel="dangerous" />
1871f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang
1872f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <!-- Allows applications to change network connectivity state -->
1873f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <permission android:name="android.permission.CHANGE_NETWORK_STATE"
1874f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:permissionGroup="android.permission-group.NETWORK"
1875f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:protectionLevel="normal"
1876f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:description="@string/permdesc_changeNetworkState"
1877f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:label="@string/permlab_changeNetworkState" />
1878f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang
1879f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <!-- Allows an application to clear the caches of all installed
1880f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang         applications on the device.  -->
1881f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang    <permission android:name="android.permission.CLEAR_APP_CACHE"
1882f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
18834d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim        android:protectionLevel="dangerous"
18844d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim        android:label="@string/permlab_clearAppCache"
18854d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim        android:description="@string/permdesc_clearAppCache" />
18864d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim
18874d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim    <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
18884d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim         @hide -->
18894d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim    <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
18904d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim        android:protectionLevel="signature|system"
18914d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim        android:label="@string/permlab_anyCodecForPlayback"
18924d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim        android:description="@string/permdesc_anyCodecForPlayback" />
18934d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim
18944fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
18954fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang         behalf of the user.
1896350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang         @hide -->
18975008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
18985008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:protectionLevel="signature|system"
18995008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:label="@string/permlab_manageCaCertificates"
19005008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:description="@string/permdesc_manageCaCertificates" />
19015008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim
19025008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <!-- @SystemApi Allows an application to do certain operations needed for
19034fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang         interacting with the recovery (system update) system.
19044fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang         @hide -->
19055008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim    <permission android:name="android.permission.RECOVERY"
19065008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1907f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:protectionLevel="signature|system"
19084fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang        android:label="@string/permlab_recovery"
19094fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang        android:description="@string/permdesc_recovery" />
19104fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang
19114fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <!-- Allows the system to bind to an application's task services
19124fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang         @hide -->
19134fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <permission android:name="android.permission.BIND_JOB_SERVICE"
1914fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo        android:protectionLevel="signature"
19154fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang        android:label="@string/permlab_bindJobService"
19164fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang        android:description="@string/permdesc_bindJobService" />
19174fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
19184fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang
19194fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <!-- ========================================= -->
19204fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <!-- Permissions for special development tools -->
19214fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <!-- ========================================= -->
19224fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <eat-comment />
19234fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang
19244fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang    <!-- Group of permissions that are related to development features.  These
1925867b4e0c55b4b1e432a3585fc945a999f066ef81Jungshik Jang         are not permissions that should appear in third-party applications; they
1926867b4e0c55b4b1e432a3585fc945a999f066ef81Jungshik Jang         protect APIs that are intended only to be used for development
1927867b4e0c55b4b1e432a3585fc945a999f066ef81Jungshik Jang         purposes. -->
1928867b4e0c55b4b1e432a3585fc945a999f066ef81Jungshik Jang    <permission-group android:name="android.permission-group.DEVELOPMENT_TOOLS"
1929867b4e0c55b4b1e432a3585fc945a999f066ef81Jungshik Jang        android:label="@string/permgrouplab_developmentTools"
1930e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:description="@string/permgroupdesc_developmentTools"
1931e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:priority="310" />
1932e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim
1933e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <!-- @SystemApi Allows an application to read or write the secure system settings.
1934e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <p>Not for use by third-party applications. -->
1935e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
1936e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1937e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:protectionLevel="signature|system|development"
1938e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:label="@string/permlab_writeSecureSettings"
1939e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:description="@string/permdesc_writeSecureSettings" />
1940e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim
1941e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <!-- @SystemApi Allows an application to retrieve state dump information from system services.
1942e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <p>Not for use by third-party applications. -->
1943e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <permission android:name="android.permission.DUMP"
1944e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1945e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:protectionLevel="signature|system|development"
1946e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:label="@string/permlab_dump"
1947e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:description="@string/permdesc_dump" />
1948e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim
1949e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <!-- @SystemApi Allows an application to read the low-level system log files.
1950e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <p>Not for use by third-party applications, because
1951e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    Log entries can contain the user's private information. -->
1952e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <permission android:name="android.permission.READ_LOGS"
1953e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1954e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:protectionLevel="signature|system|development"
1955e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:label="@string/permlab_readLogs"
1956e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:description="@string/permdesc_readLogs" />
1957e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim
1958e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <!-- @SystemApi Configure an application for debugging.
1959e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <p>Not for use by third-party applications. -->
1960e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <permission android:name="android.permission.SET_DEBUG_APP"
1961e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1962e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:protectionLevel="signature|system|development"
1963e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:label="@string/permlab_setDebugApp"
1964e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:description="@string/permdesc_setDebugApp" />
1965e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim
1966e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <!-- @SystemApi Allows an application to set the maximum number of (not needed)
1967e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim         application processes that can be running.
1968e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim         <p>Not for use by third-party applications. -->
1969e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <permission android:name="android.permission.SET_PROCESS_LIMIT"
1970e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1971e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:protectionLevel="signature|system|development"
1972e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:label="@string/permlab_setProcessLimit"
1973f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim        android:description="@string/permdesc_setProcessLimit" />
1974e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim
1975e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <!-- @SystemApi Allows an application to control whether activities are immediately
1976e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim         finished when put in the background.
1977e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim         <p>Not for use by third-party applications. -->
1978e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim    <permission android:name="android.permission.SET_ALWAYS_FINISH"
1979e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1980e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim        android:protectionLevel="signature|system|development"
1981867b4e0c55b4b1e432a3585fc945a999f066ef81Jungshik Jang        android:label="@string/permlab_setAlwaysFinish"
198208a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo        android:description="@string/permdesc_setAlwaysFinish" />
1983e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim
1984f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim    <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
198508a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo    <p>Not for use by third-party applications. -->
198608a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo    <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
198708a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
198808a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo        android:protectionLevel="signature|system|development"
198908a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo        android:label="@string/permlab_signalPersistentProcesses"
199008a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo        android:description="@string/permdesc_signalPersistentProcesses" />
199108a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo
199208a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo    <!-- ==================================== -->
199308a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo    <!-- Private (signature-only) permissions -->
199408a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo    <!-- ==================================== -->
199508a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo    <eat-comment />
1996339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang
1997339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang    <!-- @SystemApi Allows applications to RW to diagnostic resources.
1998339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang    <p>Not for use by third-party applications. -->
1999339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang    <permission android:name="android.permission.DIAGNOSTIC"
2000339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2001339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang        android:protectionLevel="signature"
2002339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang        android:description="@string/permdesc_diagnostic"
2003339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang        android:label="@string/permlab_diagnostic" />
2004339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang
20050792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang    <!-- @SystemApi Allows an application to open, close, or disable the status bar
2006         and its icons.
2007         <p>Not for use by third-party applications. -->
2008    <permission android:name="android.permission.STATUS_BAR"
2009        android:label="@string/permlab_statusBar"
2010        android:description="@string/permdesc_statusBar"
2011        android:protectionLevel="signature|system" />
2012
2013    <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
2014    @hide -->
2015    <permission android:name="android.permission.STATUS_BAR_SERVICE"
2016        android:label="@string/permlab_statusBarService"
2017        android:description="@string/permdesc_statusBarService"
2018        android:protectionLevel="signature" />
2019
2020    <!-- Allows an application to force a BACK operation on whatever is the
2021         top activity.
2022         <p>Not for use by third-party applications. -->
2023    <permission android:name="android.permission.FORCE_BACK"
2024        android:label="@string/permlab_forceBack"
2025        android:description="@string/permdesc_forceBack"
2026        android:protectionLevel="signature" />
2027
2028    <!-- @SystemApi Allows an application to update device statistics.
2029    <p>Not for use by third-party applications. -->
2030    <permission android:name="android.permission.UPDATE_DEVICE_STATS"
2031        android:label="@string/permlab_updateBatteryStats"
2032        android:description="@string/permdesc_updateBatteryStats"
2033        android:protectionLevel="signature|system" />
2034
2035    <!-- @SystemApi @hide Allows an application to collect battery statistics -->
2036    <permission android:name="android.permission.GET_APP_OPS_STATS"
2037        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2038        android:label="@string/permlab_getAppOpsStats"
2039        android:description="@string/permdesc_getAppOpsStats"
2040        android:protectionLevel="signature|system|development" />
2041
2042    <!-- @SystemApi Allows an application to update application operation statistics. Not for
2043         use by third party apps. @hide -->
2044    <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
2045        android:label="@string/permlab_updateAppOpsStats"
2046        android:description="@string/permdesc_updateAppOpsStats"
2047        android:protectionLevel="signature|system" />
2048
2049    <!-- Allows an application to open windows that are for use by parts
2050         of the system user interface.
2051         <p>Not for use by third-party applications. -->
2052    <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
2053        android:label="@string/permlab_internalSystemWindow"
2054        android:description="@string/permdesc_internalSystemWindow"
2055        android:protectionLevel="signature" />
2056
2057    <!-- Allows an application to manage (create, destroy,
2058         Z-order) application tokens in the window manager.
2059         <p>Not for use by third-party applications. -->
2060    <permission android:name="android.permission.MANAGE_APP_TOKENS"
2061        android:label="@string/permlab_manageAppTokens"
2062        android:description="@string/permdesc_manageAppTokens"
2063        android:protectionLevel="signature" />
2064
2065    <!-- @hide Allows the application to temporarily freeze the screen for a
2066         full-screen transition. -->
2067    <permission android:name="android.permission.FREEZE_SCREEN"
2068        android:label="@string/permlab_freezeScreen"
2069        android:description="@string/permdesc_freezeScreen"
2070        android:protectionLevel="signature" />
2071
2072    <!-- Allows an application to inject user events (keys, touch, trackball)
2073         into the event stream and deliver them to ANY window.  Without this
2074         permission, you can only deliver events to windows in your own process.
2075         <p>Not for use by third-party applications. -->
2076    <permission android:name="android.permission.INJECT_EVENTS"
2077        android:label="@string/permlab_injectEvents"
2078        android:description="@string/permdesc_injectEvents"
2079        android:protectionLevel="signature" />
2080
2081    <!-- @hide Allows an application to register an input filter which filters the stream
2082         of user events (keys, touch, trackball) before they are dispatched to any window. -->
2083    <permission android:name="android.permission.FILTER_EVENTS"
2084        android:label="@string/permlab_filter_events"
2085        android:description="@string/permdesc_filter_events"
2086        android:protectionLevel="signature" />
2087
2088    <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
2089    <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
2090        android:label="@string/permlab_retrieveWindowToken"
2091        android:description="@string/permdesc_retrieveWindowToken"
2092        android:protectionLevel="signature" />
2093
2094    <!-- @hide Allows an application to collect frame statistics -->
2095    <permission android:name="android.permission.FRAME_STATS"
2096         android:label="@string/permlab_frameStats"
2097         android:description="@string/permdesc_frameStats"
2098         android:protectionLevel="signature" />
2099
2100    <!-- @hide Allows an application to temporary enable accessibility on the device. -->
2101    <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
2102        android:label="@string/permlab_temporary_enable_accessibility"
2103        android:description="@string/permdesc_temporary_enable_accessibility"
2104        android:protectionLevel="signature" />
2105
2106    <!-- Allows an application to watch and control how activities are
2107         started globally in the system.  Only for is in debugging
2108         (usually the monkey command).
2109         <p>Not for use by third-party applications. -->
2110    <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
2111        android:label="@string/permlab_runSetActivityWatcher"
2112        android:description="@string/permdesc_runSetActivityWatcher"
2113        android:protectionLevel="signature" />
2114
2115    <!-- @SystemApi Allows an application to call the activity manager shutdown() API
2116         to put the higher-level system there into a shutdown state.
2117         @hide -->
2118    <permission android:name="android.permission.SHUTDOWN"
2119        android:label="@string/permlab_shutdown"
2120        android:description="@string/permdesc_shutdown"
2121        android:protectionLevel="signature|system" />
2122
2123    <!-- @SystemApi Allows an application to tell the activity manager to temporarily
2124         stop application switches, putting it into a special mode that
2125         prevents applications from immediately switching away from some
2126         critical UI such as the home screen.
2127         @hide -->
2128    <permission android:name="android.permission.STOP_APP_SWITCHES"
2129        android:label="@string/permlab_stopAppSwitches"
2130        android:description="@string/permdesc_stopAppSwitches"
2131        android:protectionLevel="signature|system" />
2132
2133    <!-- Allows an application to retrieve private information about
2134         the current top activity, such as any assist context it can provide.
2135         <p>Not for use by third-party applications. -->
2136    <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
2137        android:label="@string/permlab_getTopActivityInfo"
2138        android:description="@string/permdesc_getTopActivityInfo"
2139        android:protectionLevel="signature" />
2140
2141    <!-- Allows an application to retrieve the current state of keys and
2142         switches.
2143         <p>Not for use by third-party applications.
2144         @deprecated The API that used this permission has been removed. -->
2145    <permission android:name="android.permission.READ_INPUT_STATE"
2146        android:label="@string/permlab_readInputState"
2147        android:description="@string/permdesc_readInputState"
2148        android:protectionLevel="signature" />
2149
2150    <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
2151         to ensure that only the system can bind to it. -->
2152    <permission android:name="android.permission.BIND_INPUT_METHOD"
2153        android:label="@string/permlab_bindInputMethod"
2154        android:description="@string/permdesc_bindInputMethod"
2155        android:protectionLevel="signature" />
2156
2157    <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
2158         to ensure that only the system can bind to it. -->
2159    <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
2160        android:label="@string/permlab_bindAccessibilityService"
2161        android:description="@string/permdesc_bindAccessibilityService"
2162        android:protectionLevel="signature" />
2163
2164    <!-- Must be required by a {@link android.printservice.PrintService},
2165         to ensure that only the system can bind to it. -->
2166    <permission android:name="android.permission.BIND_PRINT_SERVICE"
2167        android:label="@string/permlab_bindPrintService"
2168        android:description="@string/permdesc_bindPrintService"
2169        android:protectionLevel="signature" />
2170
2171    <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
2172         or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
2173         the system can bind to it. -->
2174    <permission android:name="android.permission.BIND_NFC_SERVICE"
2175        android:label="@string/permlab_bindNfcService"
2176        android:description="@string/permdesc_bindNfcService"
2177        android:protectionLevel="signature" />
2178
2179    <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
2180         @hide -->
2181    <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
2182        android:label="@string/permlab_bindPrintSpoolerService"
2183        android:description="@string/permdesc_bindPrintSpoolerService"
2184        android:protectionLevel="signature" />
2185
2186    <!-- Must be required by a TextService (e.g. SpellCheckerService)
2187         to ensure that only the system can bind to it. -->
2188    <permission android:name="android.permission.BIND_TEXT_SERVICE"
2189        android:label="@string/permlab_bindTextService"
2190        android:description="@string/permdesc_bindTextService"
2191        android:protectionLevel="signature" />
2192
2193    <!-- Must be required by a {@link android.net.VpnService},
2194         to ensure that only the system can bind to it. -->
2195    <permission android:name="android.permission.BIND_VPN_SERVICE"
2196        android:label="@string/permlab_bindVpnService"
2197        android:description="@string/permdesc_bindVpnService"
2198        android:protectionLevel="signature" />
2199
2200    <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
2201         to ensure that only the system can bind to it. -->
2202    <permission android:name="android.permission.BIND_WALLPAPER"
2203        android:label="@string/permlab_bindWallpaper"
2204        android:description="@string/permdesc_bindWallpaper"
2205        android:protectionLevel="signature|system" />
2206
2207    <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
2208         to ensure that only the system can bind to it. -->
2209    <permission android:name="android.permission.BIND_VOICE_INTERACTION"
2210        android:label="@string/permlab_bindVoiceInteraction"
2211        android:description="@string/permdesc_bindVoiceInteraction"
2212        android:protectionLevel="signature" />
2213
2214    <!-- Must be required by hotword enrollment application,
2215         to ensure that only the system can interact with it.
2216         @hide <p>Not for use by third-party applications.</p> -->
2217    <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
2218        android:label="@string/permlab_manageVoiceKeyphrases"
2219        android:description="@string/permdesc_manageVoiceKeyphrases"
2220        android:protectionLevel="signature|system" />
2221
2222    <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
2223         to ensure that only the system can bind to it.
2224         @hide -->
2225    <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
2226        android:label="@string/permlab_bindRemoteDisplay"
2227        android:description="@string/permdesc_bindRemoteDisplay"
2228        android:protectionLevel="signature" />
2229
2230    <!-- Must be required by a {@link android.media.tv.TvInputService}
2231         to ensure that only the system can bind to it. -->
2232    <permission android:name="android.permission.BIND_TV_INPUT"
2233        android:label="@string/permlab_bindTvInput"
2234        android:description="@string/permdesc_bindTvInput"
2235        android:protectionLevel="signature|system" />
2236
2237    <!-- @SystemApi Allows an application to modify parental controls
2238         <p>Not for use by third-party applications.
2239         @hide -->
2240    <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS"
2241        android:label="@string/permlab_modifyParentalControls"
2242        android:description="@string/permdesc_modifyParentalControls"
2243        android:protectionLevel="signature|system" />
2244
2245    <!-- Must be required by device administration receiver, to ensure that only the
2246         system can interact with it. -->
2247    <permission android:name="android.permission.BIND_DEVICE_ADMIN"
2248        android:label="@string/permlab_bindDeviceAdmin"
2249        android:description="@string/permdesc_bindDeviceAdmin"
2250        android:protectionLevel="signature" />
2251
2252    <!-- @SystemApi Required to add or remove another application as a device admin.
2253         <p>Not for use by third-party applications.
2254         @hide -->
2255    <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
2256        android:label="@string/permlab_manageDeviceAdmins"
2257        android:description="@string/permdesc_manageDeviceAdmins"
2258        android:protectionLevel="signature|system" />
2259
2260    <!-- Allows low-level access to setting the orientation (actually
2261         rotation) of the screen.
2262         <p>Not for use by third-party applications. -->
2263    <permission android:name="android.permission.SET_ORIENTATION"
2264        android:label="@string/permlab_setOrientation"
2265        android:description="@string/permdesc_setOrientation"
2266        android:protectionLevel="signature" />
2267
2268    <!-- Allows low-level access to setting the pointer speed.
2269         <p>Not for use by third-party applications. -->
2270    <permission android:name="android.permission.SET_POINTER_SPEED"
2271        android:label="@string/permlab_setPointerSpeed"
2272        android:description="@string/permdesc_setPointerSpeed"
2273        android:protectionLevel="signature" />
2274
2275    <!-- Allows low-level access to setting input device calibration.
2276         <p>Not for use by normal applications.
2277         @hide -->
2278    <permission android:name="android.permission.SET_INPUT_CALIBRATION"
2279        android:label="@string/permlab_setInputCalibration"
2280        android:description="@string/permdesc_setInputCalibration"
2281        android:protectionLevel="signature" />
2282
2283    <!-- Allows low-level access to setting the keyboard layout.
2284         <p>Not for use by third-party applications.
2285         @hide -->
2286    <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
2287        android:label="@string/permlab_setKeyboardLayout"
2288        android:description="@string/permdesc_setKeyboardLayout"
2289        android:protectionLevel="signature" />
2290
2291    <!-- @SystemApi Allows an application to install packages.
2292    <p>Not for use by third-party applications. -->
2293    <permission android:name="android.permission.INSTALL_PACKAGES"
2294        android:label="@string/permlab_installPackages"
2295        android:description="@string/permdesc_installPackages"
2296        android:protectionLevel="signature|system" />
2297
2298    <!-- Allows an application to clear user data.
2299    <p>Not for use by third-party applications. -->
2300    <permission android:name="android.permission.CLEAR_APP_USER_DATA"
2301        android:label="@string/permlab_clearAppUserData"
2302        android:description="@string/permdesc_clearAppUserData"
2303        android:protectionLevel="signature" />
2304
2305    <!-- @SystemApi Allows an application to delete cache files.
2306    <p>Not for use by third-party applications. -->
2307    <permission android:name="android.permission.DELETE_CACHE_FILES"
2308        android:label="@string/permlab_deleteCacheFiles"
2309        android:description="@string/permdesc_deleteCacheFiles"
2310        android:protectionLevel="signature|system" />
2311
2312    <!-- @SystemApi Allows an application to delete packages.
2313    <p>Not for use by third-party applications. -->
2314    <permission android:name="android.permission.DELETE_PACKAGES"
2315        android:label="@string/permlab_deletePackages"
2316        android:description="@string/permdesc_deletePackages"
2317        android:protectionLevel="signature|system" />
2318
2319    <!-- @SystemApi Allows an application to move location of installed package.
2320         @hide -->
2321    <permission android:name="android.permission.MOVE_PACKAGE"
2322        android:label="@string/permlab_movePackage"
2323        android:description="@string/permdesc_movePackage"
2324        android:protectionLevel="signature|system" />
2325
2326    <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
2327         enabled or not.
2328         <p>Not for use by third-party applications. -->
2329    <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
2330        android:label="@string/permlab_changeComponentState"
2331        android:description="@string/permdesc_changeComponentState"
2332        android:protectionLevel="signature|system" />
2333
2334    <!-- @hide Allows an application to grant or revoke specific permissions. -->
2335    <permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS"
2336        android:label="@string/permlab_grantRevokePermissions"
2337        android:description="@string/permdesc_grantRevokePermissions"
2338        android:protectionLevel="signature" />
2339
2340    <!-- Allows an application to use SurfaceFlinger's low level features.
2341    <p>Not for use by third-party applications. -->
2342    <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
2343        android:label="@string/permlab_accessSurfaceFlinger"
2344        android:description="@string/permdesc_accessSurfaceFlinger"
2345        android:protectionLevel="signature" />
2346
2347    <!-- @SystemApi Allows an application to take screen shots and more generally
2348         get access to the frame buffer data.
2349         <p>Not for use by third-party applications. -->
2350    <permission android:name="android.permission.READ_FRAME_BUFFER"
2351        android:label="@string/permlab_readFrameBuffer"
2352        android:description="@string/permdesc_readFrameBuffer"
2353        android:protectionLevel="signature|system" />
2354
2355    <!-- Allows an application to use InputFlinger's low level features.
2356         @hide -->
2357    <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
2358        android:label="@string/permlab_accessInputFlinger"
2359        android:description="@string/permdesc_accessInputFlinger"
2360        android:protectionLevel="signature" />
2361
2362    <!-- Allows an application to configure and connect to Wifi displays
2363         @hide -->
2364    <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
2365        android:label="@string/permlab_configureWifiDisplay"
2366        android:description="@string/permdesc_configureWifiDisplay"
2367        android:protectionLevel="signature" />
2368
2369    <!-- Allows an application to control low-level features of Wifi displays
2370         such as opening an RTSP socket.  This permission should only be used
2371         by the display manager.
2372         @hide -->
2373    <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
2374        android:label="@string/permlab_controlWifiDisplay"
2375        android:description="@string/permdesc_controlWifiDisplay"
2376        android:protectionLevel="signature" />
2377
2378    <!-- @SystemApi Allows an application to capture audio output.
2379         <p>Not for use by third-party applications.</p> -->
2380    <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
2381        android:label="@string/permlab_captureAudioOutput"
2382        android:description="@string/permdesc_captureAudioOutput"
2383        android:protectionLevel="signature|system" />
2384
2385    <!-- @SystemApi Allows an application to capture audio for hotword detection.
2386         <p>Not for use by third-party applications.</p>
2387         @hide -->
2388    <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
2389        android:label="@string/permlab_captureAudioHotword"
2390        android:description="@string/permdesc_captureAudioHotword"
2391        android:protectionLevel="signature|system" />
2392
2393    <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
2394         <p>Not for use by third-party applications.</p>
2395         @hide -->
2396    <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
2397        android:label="@string/permlab_modifyAudioRouting"
2398        android:description="@string/permdesc_modifyAudioRouting"
2399        android:protectionLevel="signature|system" />
2400
2401    <!-- @SystemApi Allows an application to capture video output.
2402         <p>Not for use by third-party applications.</p> -->
2403    <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
2404        android:label="@string/permlab_captureVideoOutput"
2405        android:description="@string/permdesc_captureVideoOutput"
2406        android:protectionLevel="signature|system" />
2407
2408    <!-- @SystemApi Allows an application to capture secure video output.
2409         <p>Not for use by third-party applications.</p> -->
2410    <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
2411        android:label="@string/permlab_captureSecureVideoOutput"
2412        android:description="@string/permdesc_captureSecureVideoOutput"
2413        android:protectionLevel="signature|system" />
2414
2415    <!-- @SystemApi Allows an application to know what content is playing and control its playback.
2416         <p>Not for use by third-party applications due to privacy of media consumption</p>  -->
2417    <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
2418        android:label="@string/permlab_mediaContentControl"
2419        android:description="@string/permdesc_mediaContentControl"
2420        android:protectionLevel="signature|system" />
2421
2422    <!-- Required to be able to disable the device (very dangerous!).
2423    <p>Not for use by third-party applications.. -->
2424    <permission android:name="android.permission.BRICK"
2425        android:label="@string/permlab_brick"
2426        android:description="@string/permdesc_brick"
2427        android:protectionLevel="signature" />
2428
2429    <!-- @SystemApi Required to be able to reboot the device.
2430    <p>Not for use by third-party applications. -->
2431    <permission android:name="android.permission.REBOOT"
2432        android:label="@string/permlab_reboot"
2433        android:description="@string/permdesc_reboot"
2434        android:protectionLevel="signature|system" />
2435
2436   <!-- Allows low-level access to power management.
2437   <p>Not for use by third-party applications. -->
2438    <permission android:name="android.permission.DEVICE_POWER"
2439        android:label="@string/permlab_devicePower"
2440        android:description="@string/permdesc_devicePower"
2441        android:protectionLevel="signature" />
2442
2443   <!-- Allows access to the PowerManager.userActivity function.
2444   <p>Not for use by third-party applications. @hide @SystemApi -->
2445    <permission android:name="android.permission.USER_ACTIVITY"
2446        android:label="@string/permlab_userActivity"
2447        android:description="@string/permdesc_userActivity"
2448        android:protectionLevel="signature|system" />
2449
2450   <!-- @hide Allows low-level access to tun tap driver -->
2451    <permission android:name="android.permission.NET_TUNNELING"
2452        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2453        android:protectionLevel="signature" />
2454
2455    <!-- Run as a manufacturer test application, running as the root user.
2456         Only available when the device is running in manufacturer test mode.
2457         <p>Not for use by third-party applications. -->
2458    <permission android:name="android.permission.FACTORY_TEST"
2459        android:label="@string/permlab_factoryTest"
2460        android:description="@string/permdesc_factoryTest"
2461        android:protectionLevel="signature" />
2462
2463    <!-- Allows an application to broadcast a notification that an application
2464         package has been removed.
2465         <p>Not for use by third-party applications. -->
2466    <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
2467        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2468        android:label="@string/permlab_broadcastPackageRemoved"
2469        android:description="@string/permdesc_broadcastPackageRemoved"
2470        android:protectionLevel="signature" />
2471
2472    <!-- Allows an application to broadcast an SMS receipt notification.
2473    <p>Not for use by third-party applications. -->
2474    <permission android:name="android.permission.BROADCAST_SMS"
2475        android:permissionGroup="android.permission-group.MESSAGES"
2476        android:label="@string/permlab_broadcastSmsReceived"
2477        android:description="@string/permdesc_broadcastSmsReceived"
2478        android:protectionLevel="signature" />
2479
2480    <!-- Allows an application to broadcast a WAP PUSH receipt notification.
2481    <p>Not for use by third-party applications. -->
2482    <permission android:name="android.permission.BROADCAST_WAP_PUSH"
2483        android:permissionGroup="android.permission-group.MESSAGES"
2484        android:label="@string/permlab_broadcastWapPush"
2485        android:description="@string/permdesc_broadcastWapPush"
2486        android:protectionLevel="signature" />
2487
2488    <!-- @SystemApi Allows an application to broadcast a SCORE_NETWORKS request.
2489         <p>Not for use by third-party applications. @hide -->
2490    <permission android:name="android.permission.BROADCAST_SCORE_NETWORKS"
2491        android:label="@string/permlab_broadcastScoreNetworks"
2492        android:description="@string/permdesc_broadcastScoreNetworks"
2493        android:protectionLevel="signature|system" />
2494
2495    <!-- @SystemApi Not for use by third-party applications. -->
2496    <permission android:name="android.permission.MASTER_CLEAR"
2497        android:label="@string/permlab_masterClear"
2498        android:description="@string/permdesc_masterClear"
2499        android:protectionLevel="signature|system" />
2500
2501    <!-- @SystemApi Allows an application to call any phone number, including emergency
2502         numbers, without going through the Dialer user interface for the user
2503         to confirm the call being placed.
2504         <p>Not for use by third-party applications. -->
2505    <permission android:name="android.permission.CALL_PRIVILEGED"
2506        android:label="@string/permlab_callPrivileged"
2507        android:description="@string/permdesc_callPrivileged"
2508        android:protectionLevel="signature|system" />
2509
2510    <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
2511    <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
2512        android:label="@string/permlab_performCdmaProvisioning"
2513        android:description="@string/permdesc_performCdmaProvisioning"
2514        android:protectionLevel="signature|system" />
2515
2516    <!-- @SystemApi Allows enabling/disabling location update notifications from
2517         the radio.
2518         <p>Not for use by third-party applications. -->
2519    <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
2520        android:label="@string/permlab_locationUpdates"
2521        android:description="@string/permdesc_locationUpdates"
2522        android:protectionLevel="signature|system" />
2523
2524    <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
2525         database, to change values that get uploaded.
2526         <p>Not for use by third-party applications. -->
2527    <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
2528        android:label="@string/permlab_checkinProperties"
2529        android:description="@string/permdesc_checkinProperties"
2530        android:protectionLevel="signature|system" />
2531
2532    <!-- @SystemApi Allows an application to collect component usage
2533         statistics @hide -->
2534    <permission android:name="android.permission.PACKAGE_USAGE_STATS"
2535        android:label="@string/permlab_pkgUsageStats"
2536        android:description="@string/permdesc_pkgUsageStats"
2537        android:protectionLevel="signature|development|appop" />
2538    <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" />
2539
2540    <!-- @SystemApi Allows an application to collect battery statistics -->
2541    <permission android:name="android.permission.BATTERY_STATS"
2542        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2543        android:label="@string/permlab_batteryStats"
2544        android:description="@string/permdesc_batteryStats"
2545        android:protectionLevel="signature|system|development" />
2546
2547    <!-- @SystemApi Allows an application to control the backup and restore process.
2548    <p>Not for use by third-party applications.
2549         @hide pending API council -->
2550    <permission android:name="android.permission.BACKUP"
2551        android:label="@string/permlab_backup"
2552        android:description="@string/permdesc_backup"
2553        android:protectionLevel="signature|system" />
2554
2555    <!-- Allows a package to launch the secure full-backup confirmation UI.
2556         ONLY the system process may hold this permission.
2557         @hide -->
2558    <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
2559        android:label="@string/permlab_confirm_full_backup"
2560        android:description="@string/permdesc_confirm_full_backup"
2561        android:protectionLevel="signature" />
2562
2563    <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
2564         to ensure that only the system can bind to it. -->
2565    <permission android:name="android.permission.BIND_REMOTEVIEWS"
2566        android:label="@string/permlab_bindRemoteViews"
2567        android:description="@string/permdesc_bindRemoteViews"
2568        android:protectionLevel="signature|system" />
2569
2570    <!-- @SystemApi Allows an application to tell the AppWidget service which application
2571         can access AppWidget's data.  The normal user flow is that a user
2572         picks an AppWidget to go into a particular host, thereby giving that
2573         host application access to the private data from the AppWidget app.
2574         An application that has this permission should honor that contract.
2575         <p>Not for use by third-party applications. -->
2576    <permission android:name="android.permission.BIND_APPWIDGET"
2577        android:permissionGroup="android.permission-group.PERSONAL_INFO"
2578        android:label="@string/permlab_bindGadget"
2579        android:description="@string/permdesc_bindGadget"
2580        android:protectionLevel="signature|system" />
2581
2582    <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
2583         keyguard widget
2584         @hide -->
2585    <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
2586        android:permissionGroup="android.permission-group.PERSONAL_INFO"
2587        android:protectionLevel="signature|system" />
2588
2589    <!-- @SystemApi Internal permission allowing an application to query/set which
2590         applications can bind AppWidgets.
2591         @hide -->
2592    <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
2593        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2594        android:protectionLevel="signature|system" />
2595
2596    <!-- Allows applications to change the background data setting.
2597    <p>Not for use by third-party applications.
2598         @hide pending API council -->
2599    <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
2600        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2601        android:protectionLevel="signature"
2602        android:description="@string/permdesc_changeBackgroundDataSetting"
2603        android:label="@string/permlab_changeBackgroundDataSetting" />
2604
2605    <!-- @SystemApi This permission can be used on content providers to allow the global
2606         search system to access their data.  Typically it used when the
2607         provider has some permissions protecting it (which global search
2608         would not be expected to hold), and added as a read-only permission
2609         to the path in the provider where global search queries are
2610         performed.  This permission can not be held by regular applications;
2611         it is used by applications to protect themselves from everyone else
2612         besides global search. -->
2613    <permission android:name="android.permission.GLOBAL_SEARCH"
2614        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2615        android:protectionLevel="signature|system" />
2616
2617    <!-- Internal permission protecting access to the global search
2618         system: ensures that only the system can access the provider
2619         to perform queries (since this otherwise provides unrestricted
2620         access to a variety of content providers), and to write the
2621         search statistics (to keep applications from gaming the source
2622         ranking).
2623         @hide -->
2624    <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
2625        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2626        android:protectionLevel="signature" />
2627
2628    <!-- @SystemApi Internal permission to allows an application to read indexable data.
2629        @hide -->
2630    <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
2631        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2632        android:protectionLevel="signature|system" />
2633
2634    <!-- @SystemApi Allows applications to set a live wallpaper.
2635         @hide XXX Change to signature once the picker is moved to its
2636         own apk as Ghod Intended. -->
2637    <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
2638        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2639        android:protectionLevel="signature|system" />
2640
2641    <!-- @SystemApi Allows applications to read dream settings and dream state.
2642         @hide -->
2643    <permission android:name="android.permission.READ_DREAM_STATE"
2644        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2645        android:protectionLevel="signature|system" />
2646
2647    <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
2648         @hide -->
2649    <permission android:name="android.permission.WRITE_DREAM_STATE"
2650        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2651        android:protectionLevel="signature|system" />
2652
2653    <!-- @SystemApi Allow an application to read and write the cache partition.
2654         @hide -->
2655    <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
2656        android:label="@string/permlab_cache_filesystem"
2657        android:description="@string/permdesc_cache_filesystem"
2658        android:protectionLevel="signature|system" />
2659
2660    <!-- Must be required by default container service so that only
2661         the system can bind to it and use it to copy
2662         protected data to secure containers or files
2663         accessible to the system.
2664         @hide -->
2665    <permission android:name="android.permission.COPY_PROTECTED_DATA"
2666        android:label="@string/permlab_copyProtectedData"
2667        android:description="@string/permlab_copyProtectedData"
2668        android:protectionLevel="signature" />
2669
2670    <!-- @SystemApi Internal permission protecting access to the encryption methods
2671        @hide
2672    -->
2673    <permission android:name="android.permission.CRYPT_KEEPER"
2674        android:protectionLevel="signature|system" />
2675
2676    <!-- @SystemApi Allows an application to read historical network usage for
2677         specific networks and applications. @hide -->
2678    <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
2679        android:label="@string/permlab_readNetworkUsageHistory"
2680        android:description="@string/permdesc_readNetworkUsageHistory"
2681        android:protectionLevel="signature|system" />
2682
2683    <!-- Allows an application to manage network policies (such as warning and disable
2684         limits) and to define application-specific rules. @hide -->
2685    <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
2686        android:label="@string/permlab_manageNetworkPolicy"
2687        android:description="@string/permdesc_manageNetworkPolicy"
2688        android:protectionLevel="signature" />
2689
2690    <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used
2691         by system services like download manager and media server. Not for use by
2692         third party apps. @hide -->
2693    <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
2694        android:label="@string/permlab_modifyNetworkAccounting"
2695        android:description="@string/permdesc_modifyNetworkAccounting"
2696        android:protectionLevel="signature|system" />
2697
2698    <!-- C2DM permission.
2699         @hide Used internally.
2700     -->
2701    <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
2702          android:protectionLevel="signature" />
2703    <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
2704
2705    <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
2706         trust it to verify packages.
2707    -->
2708    <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
2709        android:label="@string/permlab_packageVerificationAgent"
2710        android:description="@string/permdesc_packageVerificationAgent"
2711        android:protectionLevel="signature|system" />
2712
2713    <!-- Must be required by package verifier receiver, to ensure that only the
2714         system can interact with it.
2715         @hide
2716    -->
2717    <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
2718        android:label="@string/permlab_bindPackageVerifier"
2719        android:description="@string/permdesc_bindPackageVerifier"
2720        android:protectionLevel="signature" />
2721
2722    <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
2723         @hide -->
2724    <permission android:name="android.permission.SERIAL_PORT"
2725        android:label="@string/permlab_serialPort"
2726        android:description="@string/permdesc_serialPort"
2727        android:protectionLevel="signature|system" />
2728
2729    <!-- Allows the holder to access content providers from outside an ApplicationThread.
2730         This permission is enforced by the ActivityManagerService on the corresponding APIs,
2731         in particular ActivityManagerService#getContentProviderExternal(String) and
2732         ActivityManagerService#removeContentProviderExternal(String).
2733         @hide
2734    -->
2735    <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
2736        android:label="@string/permlab_accessContentProvidersExternally"
2737        android:description="@string/permdesc_accessContentProvidersExternally"
2738        android:protectionLevel="signature" />
2739
2740    <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
2741         OTA reboot *not* occur while the lock is held.
2742         @hide -->
2743    <permission android:name="android.permission.UPDATE_LOCK"
2744        android:label="@string/permlab_updateLock"
2745        android:description="@string/permdesc_updateLock"
2746        android:protectionLevel="signatureOrSystem" />
2747
2748    <!-- @SystemApi Allows an application to read the current set of notifications, including
2749         any metadata and intents attached.
2750         @hide -->
2751    <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
2752        android:label="@string/permlab_accessNotifications"
2753        android:description="@string/permdesc_accessNotifications"
2754        android:protectionLevel="signature|system" />
2755
2756    <!-- Allows access to keyguard secure storage.  Only allowed for system processes.
2757        @hide -->
2758    <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
2759        android:protectionLevel="signature"
2760        android:label="@string/permlab_access_keyguard_secure_storage"
2761        android:description="@string/permdesc_access_keyguard_secure_storage" />
2762
2763    <!-- Allows an application to control keyguard.  Only allowed for system processes.
2764        @hide -->
2765    <permission android:name="android.permission.CONTROL_KEYGUARD"
2766        android:protectionLevel="signature"
2767        android:label="@string/permlab_control_keyguard"
2768        android:description="@string/permdesc_control_keyguard" />
2769
2770    <!-- Allows an application to listen to trust changes.  Only allowed for system processes.
2771        @hide -->
2772    <permission android:name="android.permission.TRUST_LISTENER"
2773                android:protectionLevel="signature"
2774                android:label="@string/permlab_trust_listener"
2775                android:description="@string/permdesc_trust_listener" />
2776
2777    <!-- @SystemApi Allows an application to provide a trust agent.
2778         @hide For security reasons, this is a platform-only permission. -->
2779    <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
2780                android:protectionLevel="signatureOrSystem"
2781                android:label="@string/permlab_provide_trust_agent"
2782                android:description="@string/permdesc_provide_trust_agent" />
2783
2784    <!-- Allows an application to launch the trust agent settings activity.
2785        @hide -->
2786    <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
2787        android:protectionLevel="signatureOrSystem"
2788        android:label="@string/permlab_launch_trust_agent_settings"
2789        android:description="@string/permdesc_launch_trust_agent_settings" />
2790
2791    <!-- @SystemApi Must be required by an {@link
2792        android.service.trust.TrustAgentService},
2793        to ensure that only the system can bind to it.
2794        @hide -->
2795    <permission android:name="android.permission.BIND_TRUST_AGENT"
2796                android:protectionLevel="signature"
2797                android:label="@string/permlab_bind_trust_agent_service"
2798                android:description="@string/permdesc_bind_trust_agent_service" />
2799
2800    <!-- Must be required by an {@link
2801         android.service.notification.NotificationListenerService},
2802         to ensure that only the system can bind to it. -->
2803    <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
2804        android:label="@string/permlab_bindNotificationListenerService"
2805        android:description="@string/permdesc_bindNotificationListenerService"
2806        android:protectionLevel="signature" />
2807
2808    <!-- @SystemApi Must be required by a {@link
2809         android.service.notification.ConditionProviderService},
2810         to ensure that only the system can bind to it.
2811         @hide -->
2812    <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
2813        android:label="@string/permlab_bindConditionProviderService"
2814        android:description="@string/permdesc_bindConditionProviderService"
2815        android:protectionLevel="signature" />
2816
2817    <!-- Must be required by an {@link android.service.dreams.DreamService},
2818         to ensure that only the system can bind to it. -->
2819    <permission android:name="android.permission.BIND_DREAM_SERVICE"
2820        android:label="@string/permlab_bindDreamService"
2821        android:description="@string/permdesc_bindDreamService"
2822        android:protectionLevel="signature" />
2823
2824    <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
2825         carrier setup application to enforce that this permission is required
2826         @hide This is not a third-party API (intended for OEMs and system apps). -->
2827    <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
2828        android:label="@string/permlab_invokeCarrierSetup"
2829        android:description="@string/permdesc_invokeCarrierSetup"
2830        android:protectionLevel="signature|system" />
2831
2832    <!-- @SystemApi Allows an application to listen for network condition observations.
2833         @hide This is not a third-party API (intended for system apps). -->
2834    <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
2835        android:label="@string/permlab_accessNetworkConditions"
2836        android:description="@string/permdesc_accessNetworkConditions"
2837        android:protectionLevel="signature|system" />
2838
2839    <!-- @SystemApi Allows an application to provision and access DRM certificates
2840         @hide This is not a third-party API (intended for system apps). -->
2841    <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
2842        android:label="@string/permlab_accessDrmCertificates"
2843        android:description="@string/permdesc_accessDrmCertificates"
2844        android:protectionLevel="signature|system" />
2845
2846    <!-- Api Allows an application to manage media projection sessions.
2847         @hide This is not a third-party API (intended for system apps). -->
2848    <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION"
2849        android:label="@string/permlab_manageMediaProjection"
2850        android:description="@string/permdesc_manageMediaProjection"
2851        android:protectionLevel="signature" />
2852
2853    <!-- @SystemApi Allows an application to read install sessions
2854         @hide This is not a third-party API (intended for system apps). -->
2855    <permission android:name="android.permission.READ_INSTALL_SESSIONS"
2856        android:label="@string/permlab_readInstallSessions"
2857        android:description="@string/permdesc_readInstallSessions" />
2858
2859    <!-- @SystemApi Allows an application to remove DRM certificates
2860         @hide This is not a third-party API (intended for system apps). -->
2861    <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES"
2862        android:label="@string/permlab_removeDrmCertificates"
2863        android:description="@string/permdesc_removeDrmCertificates"
2864        android:protectionLevel="signature|system" />
2865
2866    <!-- The system process is explicitly the only one allowed to launch the
2867         confirmation UI for full backup/restore -->
2868    <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
2869
2870    <application android:process="system"
2871                 android:persistent="true"
2872                 android:hasCode="false"
2873                 android:label="@string/android_system_label"
2874                 android:allowClearUserData="false"
2875                 android:backupAgent="com.android.server.backup.SystemBackupAgent"
2876                 android:killAfterRestore="false"
2877                 android:icon="@drawable/ic_launcher_android"
2878                 android:supportsRtl="true">
2879        <activity android:name="com.android.internal.app.ChooserActivity"
2880                android:theme="@style/Theme.DeviceDefault.Resolver"
2881                android:finishOnCloseSystemDialogs="true"
2882                android:excludeFromRecents="true"
2883                android:documentLaunchMode="never"
2884                android:relinquishTaskIdentity="true"
2885                android:process=":ui">
2886            <intent-filter>
2887                <action android:name="android.intent.action.CHOOSER" />
2888                <category android:name="android.intent.category.DEFAULT" />
2889            </intent-filter>
2890        </activity>
2891        <activity android:name="com.android.internal.app.IntentForwarderActivity"
2892                android:finishOnCloseSystemDialogs="true"
2893                android:theme="@style/Theme.NoDisplay"
2894                android:excludeFromRecents="true"
2895                android:label="@string/user_owner_label"
2896                android:exported="true"
2897                >
2898        </activity>
2899        <activity-alias android:name="com.android.internal.app.ForwardIntentToUserOwner"
2900                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2901                android:exported="true"
2902                android:label="@string/user_owner_label">
2903        </activity-alias>
2904        <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
2905                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2906                android:icon="@drawable/ic_corp_icon"
2907                android:exported="true"
2908                android:label="@string/managed_profile_label">
2909        </activity-alias>
2910        <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
2911                android:theme="@style/Theme.Material.Dialog"
2912                android:label="@string/heavy_weight_switcher_title"
2913                android:finishOnCloseSystemDialogs="true"
2914                android:excludeFromRecents="true"
2915                android:process=":ui">
2916        </activity>
2917        <activity android:name="com.android.internal.app.PlatLogoActivity"
2918                android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
2919                android:process=":ui">
2920        </activity>
2921        <activity android:name="com.android.internal.app.DisableCarModeActivity"
2922                android:theme="@style/Theme.NoDisplay"
2923                android:excludeFromRecents="true"
2924                android:process=":ui">
2925        </activity>
2926
2927        <activity android:name="android.accounts.ChooseAccountActivity"
2928                android:excludeFromRecents="true"
2929                android:exported="true"
2930                android:theme="@android:style/Theme.Material.Dialog"
2931                android:label="@string/choose_account_label"
2932                android:process=":ui">
2933        </activity>
2934
2935        <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
2936                android:excludeFromRecents="true"
2937                android:exported="true"
2938                android:theme="@android:style/Theme.Material.Dialog"
2939                android:label="@string/choose_account_label"
2940                android:process=":ui">
2941        </activity>
2942
2943        <activity android:name="android.accounts.ChooseAccountTypeActivity"
2944                android:excludeFromRecents="true"
2945                android:theme="@android:style/Theme.Material.Dialog"
2946                android:label="@string/choose_account_label"
2947                android:process=":ui">
2948        </activity>
2949
2950        <activity android:name="android.accounts.CantAddAccountActivity"
2951                android:excludeFromRecents="true"
2952                android:exported="true"
2953                android:theme="@android:style/Theme.Material.Dialog.NoActionBar"
2954                android:process=":ui">
2955        </activity>
2956
2957        <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
2958                android:excludeFromRecents="true"
2959                android:exported="true"
2960                android:theme="@android:style/Theme.Material.DialogWhenLarge"
2961                android:process=":ui">
2962        </activity>
2963
2964        <activity android:name="android.content.SyncActivityTooManyDeletes"
2965               android:theme="@android:style/Theme.Holo.Dialog"
2966               android:label="@string/sync_too_many_deletes"
2967               android:process=":ui">
2968        </activity>
2969
2970        <activity android:name="com.android.server.ShutdownActivity"
2971            android:permission="android.permission.SHUTDOWN"
2972            android:excludeFromRecents="true">
2973            <intent-filter>
2974                <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" />
2975                <category android:name="android.intent.category.DEFAULT" />
2976            </intent-filter>
2977            <intent-filter>
2978                <action android:name="android.intent.action.REBOOT" />
2979                <category android:name="android.intent.category.DEFAULT" />
2980            </intent-filter>
2981        </activity>
2982
2983        <activity android:name="com.android.internal.app.NetInitiatedActivity"
2984                android:theme="@style/Theme.Holo.Dialog.Alert"
2985                android:excludeFromRecents="true"
2986                android:process=":ui">
2987        </activity>
2988
2989        <activity android:name="com.android.internal.app.RestrictionsPinActivity"
2990                android:theme="@style/Theme.Material.Light.Dialog.Alert"
2991                android:excludeFromRecents="true"
2992                android:windowSoftInputMode="adjustPan"
2993                android:process=":ui">
2994            <intent-filter android:priority="100">
2995                <action android:name="android.intent.action.RESTRICTIONS_CHALLENGE" />
2996                <category android:name="android.intent.category.DEFAULT" />
2997            </intent-filter>
2998        </activity>
2999
3000        <receiver android:name="com.android.server.BootReceiver"
3001                android:primaryUserOnly="true">
3002            <intent-filter android:priority="1000">
3003                <action android:name="android.intent.action.BOOT_COMPLETED" />
3004            </intent-filter>
3005        </receiver>
3006
3007        <receiver android:name="com.android.server.updates.CertPinInstallReceiver" >
3008            <intent-filter>
3009                <action android:name="android.intent.action.UPDATE_PINS" />
3010                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3011            </intent-filter>
3012        </receiver>
3013
3014        <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" >
3015            <intent-filter>
3016                <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
3017                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3018            </intent-filter>
3019        </receiver>
3020
3021        <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" >
3022            <intent-filter>
3023                <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
3024                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3025            </intent-filter>
3026        </receiver>
3027
3028        <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" >
3029            <intent-filter>
3030                <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
3031                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3032            </intent-filter>
3033        </receiver>
3034
3035        <receiver android:name="com.android.server.updates.TZInfoInstallReceiver" >
3036            <intent-filter>
3037                <action android:name="android.intent.action.UPDATE_TZINFO" />
3038                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3039            </intent-filter>
3040        </receiver>
3041
3042        <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" >
3043            <intent-filter>
3044                <action android:name="android.intent.action.UPDATE_SEPOLICY" />
3045                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3046            </intent-filter>
3047        </receiver>
3048
3049        <receiver android:name="com.android.server.MasterClearReceiver"
3050            android:permission="android.permission.MASTER_CLEAR">
3051            <intent-filter
3052                    android:priority="100" >
3053                <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR -->
3054                <action android:name="android.intent.action.MASTER_CLEAR" />
3055
3056                <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
3057                <action android:name="com.google.android.c2dm.intent.RECEIVE" />
3058                <category android:name="android.intent.category.MASTER_CLEAR" />
3059            </intent-filter>
3060        </receiver>
3061
3062        <service android:name="com.android.internal.os.storage.ExternalStorageFormatter"
3063            android:permission="android.permission.MASTER_CLEAR"
3064            android:exported="true" />
3065
3066        <service android:name="android.hardware.location.GeofenceHardwareService"
3067            android:permission="android.permission.LOCATION_HARDWARE"
3068            android:exported="false" />
3069
3070        <service android:name="com.android.internal.backup.LocalTransportService"
3071                android:permission="android.permission.CONFIRM_FULL_BACKUP"
3072                android:exported="false">
3073            <intent-filter>
3074                <action android:name="android.backup.TRANSPORT_HOST" />
3075            </intent-filter>
3076        </service>
3077
3078        <service android:name="com.android.server.MountServiceIdler"
3079                 android:exported="true"
3080                 android:permission="android.permission.BIND_JOB_SERVICE" >
3081        </service>
3082
3083        <service android:name="com.android.server.backup.FullBackupJob"
3084                 android:exported="true"
3085                 android:permission="android.permission.BIND_JOB_SERVICE" >
3086        </service>
3087
3088        <service
3089            android:name="com.android.server.pm.BackgroundDexOptService"
3090            android:exported="true"
3091            android:permission="android.permission.BIND_JOB_SERVICE">
3092        </service>
3093
3094    </application>
3095
3096</manifest>
3097