AndroidManifest.xml revision 90d557b7a68e64e049a44560b76b959ef87f13d7
10792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang<?xml version="1.0" encoding="utf-8"?> 20792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang<!-- 30792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang/* //device/apps/common/AndroidManifest.xml 40792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** 50792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** Copyright 2006, The Android Open Source Project 60792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** 70792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** Licensed under the Apache License, Version 2.0 (the "License"); 80792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** you may not use this file except in compliance with the License. 90792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** You may obtain a copy of the License at 100792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** 110792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** http://www.apache.org/licenses/LICENSE-2.0 120792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** 130792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** Unless required by applicable law or agreed to in writing, software 140792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** distributed under the License is distributed on an "AS IS" BASIS, 150792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 160792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** See the License for the specific language governing permissions and 170792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang** limitations under the License. 180792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang*/ 19ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim--> 20ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim<manifest xmlns:android="http://schemas.android.com/apk/res/android" 215008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim package="android" coreApp="true" android:sharedUserId="android.uid.system" 225008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:sharedUserLabel="@string/android_system_label"> 235008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim 245008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <!-- ================================================ --> 255008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <!-- Special broadcasts that only the system can send --> 265008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <!-- ================================================ --> 275008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <eat-comment /> 285008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim 295008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <protected-broadcast android:name="android.intent.action.SCREEN_OFF" /> 300792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <protected-broadcast android:name="android.intent.action.SCREEN_ON" /> 3138db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <protected-broadcast android:name="android.intent.action.USER_PRESENT" /> 327ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim <protected-broadcast android:name="android.intent.action.TIME_SET" /> 330792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <protected-broadcast android:name="android.intent.action.TIME_TICK" /> 3438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" /> 3538db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <protected-broadcast android:name="android.intent.action.DATE_CHANGED" /> 365008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" /> 37c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" /> 387d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" /> 3960cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" /> 400340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" /> 41d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" /> 42d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" /> 436d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" /> 44d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" /> 459c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" /> 46f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" /> 4712e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" /> 48ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" /> 49119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <protected-broadcast android:name="android.intent.action.UID_REMOVED" /> 50a858d221ff86c497e745222ea15bab141e337636Jungshik Jang <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" /> 515008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" /> 5242c9800f4f3acef10d19dca39e8b739546407c04Jungshik Jang <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" /> 5367ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" /> 540792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <protected-broadcast android:name="android.intent.action.BATTERY_LOW" /> 5578d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" /> 56e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" /> 5738db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" /> 5878d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" /> 5938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" /> 607d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" /> 615008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" /> 627ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" /> 637d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" /> 642b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim <protected-broadcast android:name="android.intent.action.REBOOT" /> 650792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <protected-broadcast android:name="android.intent.action.DOCK_EVENT" /> 663ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" /> 678b308d93c8fdcc7304b33d9b445ae3807eae97c8Jungshik Jang <protected-broadcast android:name="android.intent.action.USER_ADDED" /> 6878d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <protected-broadcast android:name="android.intent.action.USER_REMOVED" /> 694893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim <protected-broadcast android:name="android.intent.action.USER_STARTING" /> 70959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo <protected-broadcast android:name="android.intent.action.USER_STARTED" /> 710792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <protected-broadcast android:name="android.intent.action.USER_STOPPING" /> 72a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang <protected-broadcast android:name="android.intent.action.USER_STOPPED" /> 733ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" /> 747e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" /> 754fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <protected-broadcast android:name="android.intent.action.USER_SWITCHED" /> 760792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang 77b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" /> 78b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" /> 79959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo 80959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" /> 8178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" /> 82f4eb72d53b4c5bc2286841006ad473ad4448bcf8Jinsuk Kim <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" /> 830340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" /> 8402bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" /> 851ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo 86a1fa91fe263c483cf13066e2847a440de2cd52a5Jungshik Jang <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" /> 870792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" /> 880792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" /> 890792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" /> 900792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" /> 910792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" /> 920792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang 930792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <protected-broadcast android:name="android.backup.intent.RUN" /> 94c7eba0f1db8928ca779933a564a06989e22a8532Jinsuk Kim <protected-broadcast android:name="android.backup.intent.CLEAR" /> 9578d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <protected-broadcast android:name="android.backup.intent.INIT" /> 96fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo 97fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" /> 98fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" /> 99fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" /> 100fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" /> 101fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" /> 102d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" /> 103d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang <protected-broadcast android:name="android.bluetooth.device.action.UUID" /> 104d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" /> 105d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" /> 106d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang <protected-broadcast android:name="android.bluetooth.device.action.FOUND" /> 107d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" /> 108d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" /> 109ece603b7955938d6001c376f351ca0a2219330acYuncheol Heo <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" /> 1104fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" /> 1114fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" /> 1124fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" /> 1134fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" /> 1144fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" /> 115d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" /> 116d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" /> 117d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" /> 118d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" /> 11902bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" /> 12002bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" /> 12102bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" /> 12202bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang <protected-broadcast 12302bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" /> 12402bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang <protected-broadcast 12502bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" /> 12602bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang <protected-broadcast 12702bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" /> 12802bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang <protected-broadcast 12902bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" /> 13002bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang <protected-broadcast 1311ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" /> 132f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang <protected-broadcast 13338db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" /> 13438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <protected-broadcast 135f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" /> 13638db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <protected-broadcast 13738db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:name="android.bluetooth.headsetclient.profile.action.RESULT" /> 13838db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <protected-broadcast 13938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" /> 14038db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <protected-broadcast 14138db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" /> 14238db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <protected-broadcast 14338db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" /> 14438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <protected-broadcast 14538db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" /> 14638db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <protected-broadcast 1471ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" /> 1481ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo <protected-broadcast 1491ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" /> 1501ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo <protected-broadcast 1511ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" /> 1521ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo <protected-broadcast 15338db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" /> 15438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <protected-broadcast 15538db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" /> 15638db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <protected-broadcast 1570792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" /> 1580792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <protected-broadcast 1590792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" /> 1600792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" /> 1610792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" /> 16278d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" /> 16378d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <protected-broadcast android:name="android.btopp.intent.action.LIST" /> 16478d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" /> 1650340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" /> 1660340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" /> 16778d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <protected-broadcast android:name="android.btopp.intent.action.HIDE" /> 168dbe6b45545dcd28e6aaf46986ed694196eb94de0Jungshik Jang <protected-broadcast android:name="android.btopp.intent.action.RETRY" /> 169dbe6b45545dcd28e6aaf46986ed694196eb94de0Jungshik Jang <protected-broadcast android:name="android.btopp.intent.action.OPEN" /> 17078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" /> 1714893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" /> 17278d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" /> 17378d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" /> 17478d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" /> 175f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang 1764893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" /> 1776d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim 1786d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" /> 1796d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 180f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 181119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" /> 182119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" /> 183119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim 184119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" /> 1859c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <protected-broadcast android:name="android.media.action.ANALOG_AUDIO_DOCK_PLUG" /> 1869c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <protected-broadcast android:name="android.media.action.DIGITAL_AUDIO_DOCK_PLUG" /> 1879c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" /> 188b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <protected-broadcast android:name="android.media.action.USB_AUDIO_ACCESSORY_PLUG" /> 18912e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang <protected-broadcast android:name="android.media.action.USB_AUDIO_DEVICE_PLUG" /> 190b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang 19192b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" /> 19292b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" /> 19392b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" /> 19492b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" /> 19592b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" /> 1964d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" /> 1974d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" /> 1984d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" /> 1994d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim 2004d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" /> 2014d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" /> 202ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" /> 203ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" /> 204ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" /> 205ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" /> 2064893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" /> 2070340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" /> 2080340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" /> 2095008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" /> 2105008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim 211f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" /> 212f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" /> 213f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" /> 2140792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" /> 2150792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" /> 2160792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang 2170340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" /> 2180340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim 2190340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" /> 2200340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" /> 2212b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" /> 22230c74d9ba60a7208a587ecd6dcdfef1cfbd7fce7Jinsuk Kim <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" /> 2232b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim 2242b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" /> 22530c74d9ba60a7208a587ecd6dcdfef1cfbd7fce7Jinsuk Kim <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" /> 2262b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" /> 227e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim 228e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" /> 229e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim 23075a77e7d6cbfc287c6126efd28b338b48b7ea70cYuncheol Heo <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" /> 23175a77e7d6cbfc287c6126efd28b338b48b7ea70cYuncheol Heo <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" /> 23238db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" /> 233c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim <protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" /> 23438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo 23538db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" /> 2361ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" /> 2371ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" /> 2381ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" /> 23938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" /> 24038db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" /> 241fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" /> 242fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" /> 243fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" /> 244867b4e0c55b4b1e432a3585fc945a999f066ef81Jungshik Jang <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" /> 245867b4e0c55b4b1e432a3585fc945a999f066ef81Jungshik Jang <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" /> 246867b4e0c55b4b1e432a3585fc945a999f066ef81Jungshik Jang <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" /> 247f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" /> 248f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" /> 249f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" /> 250f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" /> 251f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" /> 252f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" /> 253f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" /> 254f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" /> 255f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" /> 256f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <protected-broadcast 257f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" /> 258f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" /> 259f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" /> 260f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" /> 261f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" /> 262f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" /> 263f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" /> 264e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" /> 265e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" /> 266e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim 267e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" /> 2680792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" /> 2690792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang 2707d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" /> 2715008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim 2720792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <protected-broadcast android:name="android.intent.action.PHONE_STATE" /> 2730792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang 2747d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" /> 2757d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo 2767d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" /> 2777d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" /> 2787d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo <protected-broadcast android:name="android.location.MODE_CHANGED" /> 2797d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" /> 2807d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" /> 2817d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo 2827d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo <protected-broadcast 2837d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" /> 2847d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo 2857d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo <!-- Defined in RestrictionsManager --> 2867d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo <protected-broadcast 2877d9acc7a3eddb3e57c0b8312c3baf7ebb4f529d9Yuncheol Heo android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" /> 2880792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <!-- Defined in RestrictionsManager --> 2890792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang 2902f51aec689226e259d08bf04d838251f249572e3Jungshik Jang <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" /> 291c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" /> 2927ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 2937ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" /> 29408a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 2958b308d93c8fdcc7304b33d9b445ae3807eae97c8Jungshik Jang 296a9f10629f4bc1a82761917645ff4d2b6d42e47b3Jungshik Jang <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SUBSCRIPTION_CHANGED" /> 2973ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED" /> 298347a60449981fc934e5a84122df87c1447665548Yuncheol Heo <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" /> 2995008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" /> 300347a60449981fc934e5a84122df87c1447665548Yuncheol Heo <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" /> 301a9f10629f4bc1a82761917645ff4d2b6d42e47b3Jungshik Jang <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" /> 302a9f10629f4bc1a82761917645ff4d2b6d42e47b3Jungshik Jang 303fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo <!-- ====================================== --> 304a9f10629f4bc1a82761917645ff4d2b6d42e47b3Jungshik Jang <!-- Permissions for things that cost money --> 305a8a5e50c6f9ba3ae0ff59eda76354e93515d6f8fJinsuk Kim <!-- ====================================== --> 3060792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <eat-comment /> 3070792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang 3080792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <!-- Used for permissions that can be used to make the user spend money 309e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang without their direct involvement. --> 310f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <permission-group android:name="android.permission-group.COST_MONEY" 3110792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang android:label="@string/permgrouplab_costMoney" 3120792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang android:description="@string/permgroupdesc_costMoney" /> 313ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim 314f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <!-- ================================== --> 315f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <!-- Permissions for accessing messages --> 31675a77e7d6cbfc287c6126efd28b338b48b7ea70cYuncheol Heo <!-- ================================== --> 3178692fc68a413c7aca75f094bb02bcbabcc277c73Jinsuk Kim <eat-comment /> 31863a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo 31938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <!-- Used for permissions that allow an application to send messages 320f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim on behalf of the user or intercept messages being received by the 32138db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo user. This is primarily intended for SMS/MMS messaging, such as 32238db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo receiving or reading an MMS. --> 32338db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <permission-group android:name="android.permission-group.MESSAGES" 3241ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo android:label="@string/permgrouplab_messages" 3251ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo android:icon="@drawable/perm_group_messages" 32638db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:description="@string/permgroupdesc_messages" 3277ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim android:permissionGroupFlags="personalInfo" 32838db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:priority="360"/> 32925c20298ad04e0e591e0cfdc0bb9d01a985433abYuncheol Heo 33025c20298ad04e0e591e0cfdc0bb9d01a985433abYuncheol Heo <!-- Allows an application to send SMS messages. --> 33125c20298ad04e0e591e0cfdc0bb9d01a985433abYuncheol Heo <permission android:name="android.permission.SEND_SMS" 33225c20298ad04e0e591e0cfdc0bb9d01a985433abYuncheol Heo android:permissionGroup="android.permission-group.MESSAGES" 333fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo android:protectionLevel="dangerous" 334fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo android:permissionFlags="costsMoney" 335fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo android:label="@string/permlab_sendSms" 336fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo android:description="@string/permdesc_sendSms" /> 337fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo 33825c20298ad04e0e591e0cfdc0bb9d01a985433abYuncheol Heo <!-- @SystemApi Allows an application (Phone) to send a request to other applications 3395008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim to handle the respond-via-message action during incoming calls. 3405008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <p>Not for use by third-party applications. --> 34125c20298ad04e0e591e0cfdc0bb9d01a985433abYuncheol Heo <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE" 34225c20298ad04e0e591e0cfdc0bb9d01a985433abYuncheol Heo android:permissionGroup="android.permission-group.MESSAGES" 34325c20298ad04e0e591e0cfdc0bb9d01a985433abYuncheol Heo android:protectionLevel="signature|system" 3445008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:label="@string/permlab_sendRespondViaMessageRequest" 3455008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:description="@string/permdesc_sendRespondViaMessageRequest" /> 3465008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim 3475008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <!-- Allows an application to monitor incoming SMS messages, to record 3485008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim or perform processing on them. --> 3495008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <permission android:name="android.permission.RECEIVE_SMS" 3505008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:permissionGroup="android.permission-group.MESSAGES" 3515008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:protectionLevel="dangerous" 3525008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:label="@string/permlab_receiveSms" 3535691b2f2297b29dc83a7f83f77da517035b11cceJungshik Jang android:description="@string/permdesc_receiveSms" /> 3545008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim 3555008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <!-- Allows an application to monitor incoming MMS messages, to record 3565008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim or perform processing on them. --> 3575008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <permission android:name="android.permission.RECEIVE_MMS" 3585008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:permissionGroup="android.permission-group.MESSAGES" 3595008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:protectionLevel="dangerous" 3605008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:label="@string/permlab_receiveMms" 3615008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:description="@string/permdesc_receiveMms" /> 3625008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim 3635008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <!-- @SystemApi Allows an application to receive emergency cell broadcast messages, 364f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang to record or display them to the user. 3655008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <p>Not for use by third-party applications. 3665008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim @hide Pending API council approval --> 3675008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" 3685008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:permissionGroup="android.permission-group.MESSAGES" 3695008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:protectionLevel="signature|system" 3705008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:label="@string/permlab_receiveEmergencyBroadcast" 3715008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:description="@string/permdesc_receiveEmergencyBroadcast" /> 3725008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim 3735008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <!-- Allows an application to read previously received cell broadcast 3745008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim messages and to register a content observer to get notifications when 375350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang a cell broadcast has been received and added to the database. For 3765008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim emergency alerts, the database is updated immediately after the 3775008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim alert dialog and notification sound/vibration/speech are presented. 3785008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim The "read" column is then updated after the user dismisses the alert. 3795008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim This enables supplementary emergency assistance apps to start loading 3805008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim additional emergency information (if Internet access is available) 3815008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim when the alert is first received, and to delay presenting the info 38208a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo to the user until after the initial alert dialog is dismissed. 3835008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim @hide Pending API council approval --> 3845008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <permission android:name="android.permission.READ_CELL_BROADCASTS" 385f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:permissionGroup="android.permission-group.MESSAGES" 3865008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:protectionLevel="dangerous" 3875008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:label="@string/permlab_readCellBroadcasts" 3885008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:description="@string/permdesc_readCellBroadcasts" /> 3895008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim 3905008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <!-- Allows an application to read SMS messages. --> 3915008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <permission android:name="android.permission.READ_SMS" 3925008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:permissionGroup="android.permission-group.MESSAGES" 3935008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:protectionLevel="dangerous" 3945008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:label="@string/permlab_readSms" 3957ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim android:description="@string/permdesc_readSms" /> 3967ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim 3975008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <!-- Allows an application to write SMS messages. --> 3987ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim <permission android:name="android.permission.WRITE_SMS" 3997ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim android:permissionGroup="android.permission-group.MESSAGES" 4007ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim android:protectionLevel="dangerous" 4017ecfbaed6e902aea151bc1919cf7771bbd868fc4Jinsuk Kim android:label="@string/permlab_writeSms" 4025008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:description="@string/permdesc_writeSms" /> 4035008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim 4045008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <!-- Allows an application to monitor incoming WAP push messages. --> 4055008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <permission android:name="android.permission.RECEIVE_WAP_PUSH" 4065008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:permissionGroup="android.permission-group.MESSAGES" 4070792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang android:protectionLevel="dangerous" 408e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang android:label="@string/permlab_receiveWapPush" 409fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo android:description="@string/permdesc_receiveWapPush" /> 4105008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim 411fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record 412a9f10629f4bc1a82761917645ff4d2b6d42e47b3Jungshik Jang or perform processing on them. --> 413a9f10629f4bc1a82761917645ff4d2b6d42e47b3Jungshik Jang <!-- @hide --> 414a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP" 415fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo android:permissionGroup="android.permission-group.MESSAGES" 416a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang android:protectionLevel="dangerous" 4173ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang android:label="@string/permlab_receiveBluetoothMap" 4183ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang android:description="@string/permdesc_receiveBluetoothMap" /> 419fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo 4204b54271f1bbd29957c47433155c58aa792105d6dYuncheol Heo <!-- =============================================================== --> 4213ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <!-- Permissions for accessing social info (contacts and social) --> 4223ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <!-- =============================================================== --> 4233ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <eat-comment /> 4243ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang 4253ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <!-- Used for permissions that provide access to the user's social connections, 4263ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang such as contacts, call logs, social stream, etc. This includes 4273ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang both reading and writing of this data (which should generally be 428c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim expressed as two distinct permissions). --> 4293ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang 4303ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <permission-group android:name="android.permission-group.SOCIAL_INFO" 431410ca9c7a4a2d69af5c81e76320433bfda05cafeJungshik Jang android:label="@string/permgrouplab_socialInfo" 432410ca9c7a4a2d69af5c81e76320433bfda05cafeJungshik Jang android:icon="@drawable/perm_group_social_info" 433410ca9c7a4a2d69af5c81e76320433bfda05cafeJungshik Jang android:description="@string/permgroupdesc_socialInfo" 434410ca9c7a4a2d69af5c81e76320433bfda05cafeJungshik Jang android:permissionGroupFlags="personalInfo" 4353ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang android:priority="320" /> 4363ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang 4373ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <!-- Allows an application to read the user's contacts data. --> 4383ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <permission android:name="android.permission.READ_CONTACTS" 4393ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang android:permissionGroup="android.permission-group.SOCIAL_INFO" 4403ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang android:protectionLevel="dangerous" 4414893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim android:label="@string/permlab_readContacts" 442fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo android:description="@string/permdesc_readContacts" /> 443fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo 444fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo <!-- Allows an application to write (but not read) the user's 4453ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang contacts data. --> 4463ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <permission android:name="android.permission.WRITE_CONTACTS" 4473ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang android:permissionGroup="android.permission-group.SOCIAL_INFO" 4483ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang android:protectionLevel="dangerous" 4493ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang android:label="@string/permlab_writeContacts" 4503ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang android:description="@string/permdesc_writeContacts" /> 451a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang 452fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo <!-- @SystemApi @hide Allows an application to execute contacts directory search. 453a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang This should only be used by ContactsProvider. 4543ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <p>Not for use by third-party applications. --> 4553ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <permission android:name="android.permission.BIND_DIRECTORY_SEARCH" 4563ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang android:permissionGroup="android.permission-group.PERSONAL_INFO" 457fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo android:protectionLevel="signature|system" /> 4583ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang 4593ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <!-- Allows an application to read the user's call log. 4603ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <p class="note"><strong>Note:</strong> If your app uses the 4610340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim {@link #READ_CONTACTS} permission and <em>both</em> your <a 4620340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 463a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang minSdkVersion}</a> and <a 4642b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 465a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 4660340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim grants your app this permission. If you don't need this permission, be sure your <a 4670340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 4680340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim targetSdkVersion}</a> is 16 or higher.</p> --> 4690340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim <permission android:name="android.permission.READ_CALL_LOG" 4700340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim android:permissionGroup="android.permission-group.SOCIAL_INFO" 4710340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim android:protectionLevel="dangerous" 4720340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim android:label="@string/permlab_readCallLog" 4730340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim android:description="@string/permdesc_readCallLog" /> 4742b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim 4752b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim <!-- Allows an application to write (but not read) the user's 4762b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim contacts data. 47730c74d9ba60a7208a587ecd6dcdfef1cfbd7fce7Jinsuk Kim <p class="note"><strong>Note:</strong> If your app uses the 47830c74d9ba60a7208a587ecd6dcdfef1cfbd7fce7Jinsuk Kim {@link #WRITE_CONTACTS} permission and <em>both</em> your <a 479e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 4802b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim minSdkVersion}</a> and <a 48130c74d9ba60a7208a587ecd6dcdfef1cfbd7fce7Jinsuk Kim href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 48230c74d9ba60a7208a587ecd6dcdfef1cfbd7fce7Jinsuk Kim targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 483e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim grants your app this permission. If you don't need this permission, be sure your <a 4840340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 48530c74d9ba60a7208a587ecd6dcdfef1cfbd7fce7Jinsuk Kim targetSdkVersion}</a> is 16 or higher.</p> --> 48630c74d9ba60a7208a587ecd6dcdfef1cfbd7fce7Jinsuk Kim <permission android:name="android.permission.WRITE_CALL_LOG" 487e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:permissionGroup="android.permission-group.SOCIAL_INFO" 4880340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim android:protectionLevel="dangerous" 489f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:label="@string/permlab_writeCallLog" 490f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:description="@string/permdesc_writeCallLog" /> 491f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim 492f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <!-- Allows an application to read from the user's social stream. 493f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim @deprecated This functionality will be unsupported in the future; cursors returned 4940340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim will be empty. Please do not use. --> 495f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <permission android:name="android.permission.READ_SOCIAL_STREAM" 4960340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim android:permissionGroup="android.permission-group.SOCIAL_INFO" 497f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:protectionLevel="dangerous" 498f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:label="@string/permlab_readSocialStream" 499f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:description="@string/permdesc_readSocialStream" /> 500f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim 501f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <!-- Allows an application to write (but not read) the user's 502f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim social stream data. 503f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim @deprecated This functionality will be unsupported in the future; cursors returned 504f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim will be empty. Please do not use. --> 505f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <permission android:name="android.permission.WRITE_SOCIAL_STREAM" 506f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:permissionGroup="android.permission-group.SOCIAL_INFO" 507f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:protectionLevel="dangerous" 508f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:label="@string/permlab_writeSocialStream" 509f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:description="@string/permdesc_writeSocialStream" /> 5102b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim 5112b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim <!-- =============================================================== --> 512f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <!-- Permissions for accessing information about the device owner --> 5130340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim <!-- =============================================================== --> 5140340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim <eat-comment /> 5152738e2d872a22fe95a99941139863ff642fbd8e7Jungshik Jang 5162738e2d872a22fe95a99941139863ff642fbd8e7Jungshik Jang <!-- Used for permissions that provide access to information about the device 5172738e2d872a22fe95a99941139863ff642fbd8e7Jungshik Jang user such as profile information. This includes both reading and 5182738e2d872a22fe95a99941139863ff642fbd8e7Jungshik Jang writing of this data (which should generally be expressed as two 5190340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim distinct permissions). --> 5200340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim <permission-group android:name="android.permission-group.PERSONAL_INFO" 5210340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim android:label="@string/permgrouplab_personalInfo" 5220340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim android:icon="@drawable/perm_group_personal_info" 5230340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim android:description="@string/permgroupdesc_personalInfo" 5240340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim android:permissionGroupFlags="personalInfo" 5250340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim android:priority="310" /> 5262b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim 5270340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim <!-- Allows an application to read the user's personal profile data. --> 5280340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim <permission android:name="android.permission.READ_PROFILE" 529e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang android:permissionGroup="android.permission-group.PERSONAL_INFO" 530401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim android:protectionLevel="dangerous" 531401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim android:label="@string/permlab_readProfile" 532401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim android:description="@string/permdesc_readProfile" /> 533401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim 534401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim <!-- Allows an application to write (but not read) the user's 535401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim personal profile data. --> 536401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim <permission android:name="android.permission.WRITE_PROFILE" 537c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim android:permissionGroup="android.permission-group.PERSONAL_INFO" 538401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim android:protectionLevel="dangerous" 539401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim android:label="@string/permlab_writeProfile" 540401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim android:description="@string/permdesc_writeProfile" /> 541401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim 542401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim <!-- Allows an application to access data from sensors that the user uses to 543401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim measure what is happening inside his/her body, such as heart rate. --> 544401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim <permission android:name="android.permission.BODY_SENSORS" 545401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim android:permissionGroup="android.permission-group.PERSONAL_INFO" 546401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim android:label="@string/permlab_bodySensors" 547401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim android:description="@string/permdesc_bodySensors" /> 548401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim 549c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim <!-- =============================================================== --> 5502b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim <!-- Permissions for accessing the device calendar --> 551401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim <!-- =============================================================== --> 552401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim <eat-comment /> 55309ffc846af78f949d2847003db9f793bfb5eefaaJinsuk Kim 5542b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim <!-- Used for permissions that provide access to the device 55509ffc846af78f949d2847003db9f793bfb5eefaaJinsuk Kim calendar to create / view events.--> 55609ffc846af78f949d2847003db9f793bfb5eefaaJinsuk Kim <permission-group android:name="android.permission-group.CALENDAR" 557401e3de791c0e2a4348361fbd560da9530156e22Jinsuk Kim android:label="@string/permgrouplab_calendar" 558e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang android:icon="@drawable/perm_group_calendar" 559e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang android:description="@string/permgroupdesc_calendar" 560e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang android:permissionGroupFlags="personalInfo" 561e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang android:priority="290" /> 562e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang 563e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang <!-- Allows an application to read the user's calendar data. --> 564e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang <permission android:name="android.permission.READ_CALENDAR" 565e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang android:permissionGroup="android.permission-group.PERSONAL_INFO" 566e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang android:protectionLevel="dangerous" 567e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang android:label="@string/permlab_readCalendar" 568e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang android:description="@string/permdesc_readCalendar" /> 569e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang 570e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang <!-- Allows an application to write (but not read) the user's 571e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang calendar data. --> 572e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang <permission android:name="android.permission.WRITE_CALENDAR" 57367ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang android:permissionGroup="android.permission-group.PERSONAL_INFO" 574e9c77c88ea34a66f83a94f960547275c0ff6bd07Jungshik Jang android:protectionLevel="dangerous" 575c70d2295dd3fb87ce8c81c704688d1ad05043b4dJinsuk Kim android:label="@string/permlab_writeCalendar" 576c70d2295dd3fb87ce8c81c704688d1ad05043b4dJinsuk Kim android:description="@string/permdesc_writeCalendar" /> 5773ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang 5783ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <!-- =============================================================== --> 5793ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <!-- Permissions for accessing the user dictionary--> 5803ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <!-- =============================================================== --> 5813ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <eat-comment /> 5823ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang 5833ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <!-- Used for permissions that provide access to the user 5843ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang calendar to create / view events.--> 5853ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <permission-group android:name="android.permission-group.USER_DICTIONARY" 5863ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang android:label="@string/permgrouplab_dictionary" 5873ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang android:icon="@drawable/perm_group_user_dictionary" 5883ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang android:description="@string/permgroupdesc_dictionary" 5893ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang android:permissionGroupFlags="personalInfo" 590a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang android:priority="170" /> 59161f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang 5920340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim <!-- Allows an application to read the user dictionary. This should 59379c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang really only be required by an IME, or a dictionary editor like 59479c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang the Settings app. --> 59579c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang <permission android:name="android.permission.READ_USER_DICTIONARY" 59679c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang android:permissionGroup="android.permission-group.USER_DICTIONARY" 5978960d1b1552729e3dfd33deee951ac75933ad8e5Jinsuk Kim android:protectionLevel="dangerous" 598a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim android:label="@string/permlab_readDictionary" 599a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim android:description="@string/permdesc_readDictionary" /> 6003ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang 601092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang <!-- Used for permissions that provide access to the user 602092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang calendar to create / view events.--> 603092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang <permission-group android:name="android.permission-group.WRITE_USER_DICTIONARY" 604092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang android:label="@string/permgrouplab_writeDictionary" 605092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang android:icon="@drawable/perm_group_user_dictionary_write" 606092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang android:description="@string/permgroupdesc_writeDictionary" 607092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang android:priority="160" /> 60860cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang 60960cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang <!-- Allows an application to write to the user dictionary. --> 61060cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang <permission android:name="android.permission.WRITE_USER_DICTIONARY" 611339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang android:permissionGroup="android.permission-group.WRITE_USER_DICTIONARY" 6122b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim android:protectionLevel="normal" 6132b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim android:label="@string/permlab_writeDictionary" 61460cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang android:description="@string/permdesc_writeDictionary" /> 61560cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang 61660cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang <!-- =============================================================== --> 61760cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang <!-- Permissions for accessing the user bookmarks --> 61879c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang <!-- =============================================================== --> 61967ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang <eat-comment /> 62067ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang 62167ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang <!-- Used for permissions that provide access to the user 62263a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo bookmarks and browser history.--> 62363a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo <permission-group android:name="android.permission-group.BOOKMARKS" 62463a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo android:label="@string/permgrouplab_bookmarks" 62563a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo android:icon="@drawable/perm_group_bookmarks" 62663a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo android:description="@string/permgroupdesc_bookmarks" 62763a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo android:permissionGroupFlags="personalInfo" 62863a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo android:priority="300" /> 62963a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo 63063a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo <!-- Allows an application to read (but not write) the user's 63163a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo browsing history and bookmarks. --> 63267ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS" 633c70d2295dd3fb87ce8c81c704688d1ad05043b4dJinsuk Kim android:permissionGroup="android.permission-group.BOOKMARKS" 634c70d2295dd3fb87ce8c81c704688d1ad05043b4dJinsuk Kim android:label="@string/permlab_readHistoryBookmarks" 635c70d2295dd3fb87ce8c81c704688d1ad05043b4dJinsuk Kim android:description="@string/permdesc_readHistoryBookmarks" 636d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang android:protectionLevel="dangerous" /> 637c70d2295dd3fb87ce8c81c704688d1ad05043b4dJinsuk Kim 638a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang <!-- Allows an application to write (but not read) the user's 639d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang browsing history and bookmarks. --> 640a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS" 6415f75cbd8593e83eaf17cfac07186a3b6a7b7b1f1Jungshik Jang android:permissionGroup="android.permission-group.BOOKMARKS" 6425f75cbd8593e83eaf17cfac07186a3b6a7b7b1f1Jungshik Jang android:label="@string/permlab_writeHistoryBookmarks" 6435f75cbd8593e83eaf17cfac07186a3b6a7b7b1f1Jungshik Jang android:description="@string/permdesc_writeHistoryBookmarks" 644dbe6b45545dcd28e6aaf46986ed694196eb94de0Jungshik Jang android:protectionLevel="dangerous" /> 6455f75cbd8593e83eaf17cfac07186a3b6a7b7b1f1Jungshik Jang 6465f75cbd8593e83eaf17cfac07186a3b6a7b7b1f1Jungshik Jang <!-- =============================================================== --> 6475f75cbd8593e83eaf17cfac07186a3b6a7b7b1f1Jungshik Jang <!-- Permissions for setting the device alarm --> 6485f75cbd8593e83eaf17cfac07186a3b6a7b7b1f1Jungshik Jang <!-- =============================================================== --> 649d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang <eat-comment /> 650d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang 651a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang <!-- Used for permissions that provide access to device alarms. --> 652d643f764f72efc1e7aa67392bf9ac40720ae14c3Jungshik Jang <permission-group android:name="android.permission-group.DEVICE_ALARMS" 653a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang android:label="@string/permgrouplab_deviceAlarms" 6545f75cbd8593e83eaf17cfac07186a3b6a7b7b1f1Jungshik Jang android:icon="@drawable/perm_group_device_alarms" 655c70d2295dd3fb87ce8c81c704688d1ad05043b4dJinsuk Kim android:description="@string/permgroupdesc_deviceAlarms" 656c70d2295dd3fb87ce8c81c704688d1ad05043b4dJinsuk Kim android:permissionGroupFlags="personalInfo" 6576aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo android:priority="210" /> 6586aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo 6596aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo <!-- Allows an application to broadcast an Intent to set an alarm for the 6606aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo user. --> 6616aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo <permission android:name="com.android.alarm.permission.SET_ALARM" 6626aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo android:permissionGroup="android.permission-group.DEVICE_ALARMS" 6636aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo android:label="@string/permlab_setAlarm" 6646aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo android:description="@string/permdesc_setAlarm" 6656aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo android:protectionLevel="normal" /> 6666aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo 6676aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo <!-- =============================================================== --> 6686aae6528a6672497b1d1dffb5c083093d5c46dc8Yuncheol Heo <!-- Permissions for accessing the user voicemail --> 669a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang <!-- =============================================================== --> 670a1fa91fe263c483cf13066e2847a440de2cd52a5Jungshik Jang <eat-comment /> 671a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang 67275a77e7d6cbfc287c6126efd28b338b48b7ea70cYuncheol Heo <!-- Used for permissions that provide access to the user voicemail box. --> 67375a77e7d6cbfc287c6126efd28b338b48b7ea70cYuncheol Heo <permission-group android:name="android.permission-group.VOICEMAIL" 67475a77e7d6cbfc287c6126efd28b338b48b7ea70cYuncheol Heo android:label="@string/permgrouplab_voicemail" 675092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang android:icon="@drawable/perm_group_voicemail" 676092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang android:description="@string/permgroupdesc_voicemail" 677092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang android:permissionGroupFlags="personalInfo" 67879c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang android:priority="280" /> 67979c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang 68060cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang <!-- Allows an application to add voicemails into the system. --> 68160cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL" 682a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang android:permissionGroup="android.permission-group.VOICEMAIL" 683092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang android:protectionLevel="dangerous" 684a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang android:label="@string/permlab_addVoicemail" 685092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang android:description="@string/permdesc_addVoicemail" /> 68679c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang 687c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim <!-- Allows an application to modify and remove existing voicemails in the system --> 688092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL" 689092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang android:permissionGroup="android.permission-group.VOICEMAIL" 690092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang android:protectionLevel="dangerous" 69160cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang android:label="@string/permlab_writeVoicemail" 692c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim android:description="@string/permdesc_writeVoicemail" /> 693dbe6b45545dcd28e6aaf46986ed694196eb94de0Jungshik Jang 6943a959fca91bce393cc1ee79aa2985bb06542016eJungshik Jang <!-- Allows an application to read voicemails in the system. --> 695092b445ef898e3c1e5b2918b554480940f0f5a28Jungshik Jang <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL" 696a1fa91fe263c483cf13066e2847a440de2cd52a5Jungshik Jang android:permissionGroup="android.permission-group.VOICEMAIL" 697a1fa91fe263c483cf13066e2847a440de2cd52a5Jungshik Jang android:protectionLevel="dangerous" 69867ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang android:label="@string/permlab_readVoicemail" 69967ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang android:description="@string/permdesc_readVoicemail" /> 70067ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang 701ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim <!-- =============================================== --> 70267ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang <!-- Permissions for enabling accessibility features --> 70367ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang <!-- =============================================== --> 704a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang <eat-comment /> 705ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim 70660cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang <!-- Used for permissions that allow requesting certain accessibility features. --> 70779c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang <permission-group android:name="android.permission-group.ACCESSIBILITY_FEATURES" 708ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:label="@string/permgrouplab_accessibilityFeatures" 70960cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang android:icon="@drawable/perm_group_accessibility_features" 710ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:description="@string/permgroupdesc_accessibilityFeatures" 71167ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang android:priority="380" /> 71267ea521d14f366fe5aac09e512865d31bfa0ee53Jungshik Jang 71302bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang <!-- ======================================= --> 71402bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang <!-- Permissions for accessing location info --> 71502bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang <!-- ======================================= --> 71602bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang <eat-comment /> 71702bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang 7181de514256fd3015cf45256f3198ab5472024af9bJungshik Jang <!-- Used for permissions that allow access to the user's current 7190f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang location. --> 72002bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang <permission-group android:name="android.permission-group.LOCATION" 7210f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang android:label="@string/permgrouplab_location" 72202bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang android:icon="@drawable/perm_group_location" 723a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang android:description="@string/permgroupdesc_location" 7241de514256fd3015cf45256f3198ab5472024af9bJungshik Jang android:permissionGroupFlags="personalInfo" 7251de514256fd3015cf45256f3198ab5472024af9bJungshik Jang android:priority="330" /> 726a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang 7271de514256fd3015cf45256f3198ab5472024af9bJungshik Jang <!-- Allows an app to access precise location from location sources such 7281de514256fd3015cf45256f3198ab5472024af9bJungshik Jang as GPS, cell towers, and Wi-Fi. --> 7290f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang <permission android:name="android.permission.ACCESS_FINE_LOCATION" 7300f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang android:permissionGroup="android.permission-group.LOCATION" 7310f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang android:protectionLevel="dangerous" 732c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim android:label="@string/permlab_accessFineLocation" 7330f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang android:description="@string/permdesc_accessFineLocation" /> 7340f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang 7350f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang <!-- Allows an app to access approximate location derived from network location 736c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim sources such as cell towers and Wi-Fi. --> 7370f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang <permission android:name="android.permission.ACCESS_COARSE_LOCATION" 7380f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang android:permissionGroup="android.permission-group.LOCATION" 7390f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang android:protectionLevel="dangerous" 7400f8b4b770c49b83fa8260833d8e1ec5c721a05d3Jungshik Jang android:label="@string/permlab_accessCoarseLocation" 74102bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang android:description="@string/permdesc_accessCoarseLocation" /> 74202bb4265ac41e1974ec7d4793e6c2a0ed2adc3c4Jungshik Jang 74360cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang <!-- Allows an application to create mock location providers for testing --> 74460cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang <permission android:name="android.permission.ACCESS_MOCK_LOCATION" 74560cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 74660cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang android:protectionLevel="dangerous" 74760cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang android:label="@string/permlab_accessMockLocation" 74879c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang android:description="@string/permdesc_accessMockLocation" /> 74979c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang 75079c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang <!-- Allows an application to access extra location provider commands --> 75179c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" 75279c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 753b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang android:protectionLevel="normal" 754b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang android:label="@string/permlab_accessLocationExtraCommands" 755b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang android:description="@string/permdesc_accessLocationExtraCommands" /> 756b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang 757b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang <!-- @SystemApi Allows an application to install a location provider into the Location Manager. 758b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang <p>Not for use by third-party applications. --> 759b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER" 760b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang android:protectionLevel="signature|system" 761b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang android:label="@string/permlab_installLocationProvider" 762b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang android:description="@string/permdesc_installLocationProvider" /> 763b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang 764b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files. 765b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang This should only be used by HDMI-CEC service. 766b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang --> 767b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang <permission android:name="android.permission.HDMI_CEC" 768b69aafbfaddd8a6ac84b366b5db640cdd7e95354Jungshik Jang android:protectionLevel="signatureOrSystem" /> 7693ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang 7703ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <!-- @SystemApi Allows an application to use location features in hardware, 771ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang such as the geofencing api. 772f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <p>Not for use by third-party applications. --> 773f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <permission android:name="android.permission.LOCATION_HARDWARE" 774f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:permissionGroup="android.permission-group.LOCATION" 775f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:protectionLevel="signature|system" /> 776f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <uses-permission android:name="android.permission.LOCATION_HARDWARE"/> 777ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang 778ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- ======================================= --> 779ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- Permissions for accessing networks --> 780410ca9c7a4a2d69af5c81e76320433bfda05cafeJungshik Jang <!-- ======================================= --> 78142c9800f4f3acef10d19dca39e8b739546407c04Jungshik Jang <eat-comment /> 78242c9800f4f3acef10d19dca39e8b739546407c04Jungshik Jang 78361f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang <!-- Used for permissions that provide access to networking services. The 7842b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim main permission here is internet access, but this is also an 7852b152015ff94f20b9ec3ef284fb83105f8b3c831Jinsuk Kim appropriate group for accessing or modifying any network configuration 7863ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang or other related network operations. --> 7873ee65720e91c7f92ad5a034d7052122a606aa8d5Jungshik Jang <permission-group android:name="android.permission-group.NETWORK" 7887df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:label="@string/permgrouplab_network" 789f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:icon="@drawable/perm_group_network" 790f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:description="@string/permgroupdesc_network" 791f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:priority="270" /> 792f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim 793f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <!-- Allows applications to open network sockets. --> 794f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <permission android:name="android.permission.INTERNET" 795f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:permissionGroup="android.permission-group.NETWORK" 796f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:protectionLevel="dangerous" 797f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:description="@string/permdesc_createNetworkSockets" 798f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:label="@string/permlab_createNetworkSockets" /> 799f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim 800f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <!-- Allows applications to access information about networks --> 8017df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <permission android:name="android.permission.ACCESS_NETWORK_STATE" 8027df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:permissionGroup="android.permission-group.NETWORK" 8037df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:protectionLevel="normal" 8047df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:description="@string/permdesc_accessNetworkState" 8057df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:label="@string/permlab_accessNetworkState" /> 8067df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang 8077df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <!-- Allows applications to access information about Wi-Fi networks --> 8087df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <permission android:name="android.permission.ACCESS_WIFI_STATE" 8097df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:permissionGroup="android.permission-group.NETWORK" 8107df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:protectionLevel="normal" 8117df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:description="@string/permdesc_accessWifiState" 8127df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:label="@string/permlab_accessWifiState" /> 8137df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang 8147df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <!-- Allows applications to change Wi-Fi connectivity state --> 8157df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <permission android:name="android.permission.CHANGE_WIFI_STATE" 8167df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:permissionGroup="android.permission-group.NETWORK" 8177df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:protectionLevel="dangerous" 8187df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:description="@string/permdesc_changeWifiState" 8197df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:label="@string/permlab_changeWifiState" /> 8207df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang 8217df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <!-- @SystemApi @hide Allows applications to read Wi-Fi credential. 8227df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <p>Not for use by third-party applications. --> 8237df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <permission android:name="android.permission.READ_WIFI_CREDENTIAL" 8247df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:permissionGroup="android.permission-group.NETWORK" 8257df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:protectionLevel="signature|system" /> 826ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim 827ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim <!-- @hide --> 8287c5d31ea93d6f6770c34f7a2a364522d8cc4b5d8Yuncheol Heo <permission android:name="android.permission.ACCESS_WIMAX_STATE" 8297c5d31ea93d6f6770c34f7a2a364522d8cc4b5d8Yuncheol Heo android:permissionGroup="android.permission-group.NETWORK" 8307c5d31ea93d6f6770c34f7a2a364522d8cc4b5d8Yuncheol Heo android:protectionLevel="normal" 8317c5d31ea93d6f6770c34f7a2a364522d8cc4b5d8Yuncheol Heo android:description="@string/permdesc_accessWimaxState" 8327c5d31ea93d6f6770c34f7a2a364522d8cc4b5d8Yuncheol Heo android:label="@string/permlab_accessWimaxState" /> 8337df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang 8347df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <!-- @hide --> 8357df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <permission android:name="android.permission.CHANGE_WIMAX_STATE" 8367df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:permissionGroup="android.permission-group.NETWORK" 837ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:protectionLevel="dangerous" 8387df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:description="@string/permdesc_changeWimaxState" 8397df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:label="@string/permlab_changeWimaxState" /> 8407df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang 8417df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <!-- Allows applications to act as network scorers. @hide @SystemApi--> 8427df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <!-- TODO: Change protection level to normal when unhiding this API. --> 8437df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <permission android:name="android.permission.SCORE_NETWORKS" 8447df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:permissionGroup="android.permission-group.NETWORK" 8457df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:protectionLevel="signature|system" 8467df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:description="@string/permdesc_scoreNetworks" 8477df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:label="@string/permlab_scoreNetworks" /> 8487df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang 8497df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <!-- ======================================= --> 8507df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <!-- Permissions for short range, peripheral networks --> 8517df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <!-- ======================================= --> 8527df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <eat-comment /> 8537df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang 8547df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <!-- Used for permissions that provide access to other devices through Bluetooth.--> 8557df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <permission-group android:name="android.permission-group.BLUETOOTH_NETWORK" 8567df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:label="@string/permgrouplab_bluetoothNetwork" 8577df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:icon="@drawable/perm_group_bluetooth" 8587df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:description="@string/permgroupdesc_bluetoothNetwork" 8597df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:priority="260" /> 8607df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang 8617df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <!-- Allows applications to connect to paired bluetooth devices --> 8627df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <permission android:name="android.permission.BLUETOOTH" 8637df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK" 864ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:protectionLevel="dangerous" 8657df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:description="@string/permdesc_bluetooth" 8667df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:label="@string/permlab_bluetooth" /> 867ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim 868ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim <!-- Allows applications to discover and pair bluetooth devices --> 8697df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <permission android:name="android.permission.BLUETOOTH_ADMIN" 8707df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK" 871ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:protectionLevel="dangerous" 872ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:description="@string/permdesc_bluetoothAdmin" 8737df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang android:label="@string/permlab_bluetoothAdmin" /> 8747df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang 8757df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to 8767df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang allow or disallow phonebook access or message access. 8777df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang This is not available to third party applications. --> 8787df52862dae1fa33c84725c613b0d9b88c1b28b6Jungshik Jang <permission android:name="android.permission.BLUETOOTH_PRIVILEGED" 879ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK" 880ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:protectionLevel="system|signature" 881ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:description="@string/permdesc_bluetoothPriv" 882ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:label="@string/permlab_bluetoothPriv" /> 883ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim 884ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim <!-- Control access to email providers exclusively for Bluetooth 885ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim @hide 886ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim --> 887ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim <permission android:name="android.permission.BLUETOOTH_MAP" 888ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK" 889ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:protectionLevel="signature" 890ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:description="@string/permdesc_bluetoothMap" 891ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:label="@string/permlab_bluetoothMap" /> 892ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim 893ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim <!-- Allows bluetooth stack to access files 894ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim @hide This should only be used by Bluetooth apk. 895ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim --> 896ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim <permission android:name="android.permission.BLUETOOTH_STACK" 897ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 898ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:protectionLevel="signature" /> 899ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim 900ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim <!-- Allows applications to perform I/O operations over NFC --> 901ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim <permission android:name="android.permission.NFC" 902ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:permissionGroup="android.permission-group.NETWORK" 903f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:protectionLevel="dangerous" 904f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:description="@string/permdesc_nfc" 905f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:label="@string/permlab_nfc" /> 906f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim 907f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs. 908f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim @hide --> 909f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <permission android:name="android.permission.CONNECTIVITY_INTERNAL" 910f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:permissionGroup="android.permission-group.NETWORK" 911f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:protectionLevel="signature|system" /> 912f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim 913f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <!-- @SystemApi @hide --> 914f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE" 915f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:permissionGroup="android.permission-group.NETWORK" 91678d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:protectionLevel="signature|system" /> 91778d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim 91878d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device. 91978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim @hide --> 92078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <permission android:name="android.permission.LOOP_RADIO" 92178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:permissionGroup="android.permission-group.NETWORK" 92278d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:protectionLevel="signature|system" /> 92378d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim 92478d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth 92578d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim @hide 92678d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim --> 92778d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <permission android:name="android.permission.NFC_HANDOVER_STATUS" 92878d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:label="@string/permlab_handoverStatus" 92978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:description="@string/permdesc_handoverStatus" 93078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:protectionLevel="signature|system" /> 93178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim 93278d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <!-- ================================== --> 9336d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim <!-- Permissions for accessing accounts --> 9346d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim <!-- ================================== --> 9356d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim <eat-comment /> 9366d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim 9376d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim <!-- Permissions for direct access to the accounts managed 9386d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim by the Account Manager. --> 9396d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim <permission-group android:name="android.permission-group.ACCOUNTS" 9406d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim android:label="@string/permgrouplab_accounts" 941ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:icon="@drawable/perm_group_accounts" 9426d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim android:description="@string/permgroupdesc_accounts" 9436d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim android:permissionGroupFlags="personalInfo" 9446d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim android:priority="200" /> 9456d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim 9466d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim <!-- Allows access to the list of accounts in the Accounts Service --> 9476d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim <permission android:name="android.permission.GET_ACCOUNTS" 948ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:permissionGroup="android.permission-group.ACCOUNTS" 94938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:protectionLevel="normal" 950ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:description="@string/permdesc_getAccounts" 951ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:label="@string/permlab_getAccounts" /> 952ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang 953ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- Allows an application to act as an AccountAuthenticator for 954ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang the AccountManager --> 955ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS" 956ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:permissionGroup="android.permission-group.ACCOUNTS" 957ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:protectionLevel="dangerous" 958ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:label="@string/permlab_authenticateAccounts" 959ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:description="@string/permdesc_authenticateAccounts" /> 960ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang 961ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- Allows an application to request authtokens from the AccountManager --> 962ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <permission android:name="android.permission.USE_CREDENTIALS" 963119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:permissionGroup="android.permission-group.ACCOUNTS" 964119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:protectionLevel="dangerous" 965119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:label="@string/permlab_useCredentials" 966119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:description="@string/permdesc_useCredentials" /> 967119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim 968119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <!-- Allows an application to manage the list of accounts in the AccountManager --> 969119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <permission android:name="android.permission.MANAGE_ACCOUNTS" 970119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:permissionGroup="android.permission-group.ACCOUNTS" 971119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:protectionLevel="dangerous" 972119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:label="@string/permlab_manageAccounts" 973119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:description="@string/permdesc_manageAccounts" /> 974119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim 975119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <!-- @SystemApi Allows applications to call into AccountAuthenticators. 976119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <p>Not for use by third-party applications. --> 977119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <permission android:name="android.permission.ACCOUNT_MANAGER" 978119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:permissionGroup="android.permission-group.ACCOUNTS" 979119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:protectionLevel="signature" 98012e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang android:description="@string/permdesc_accountManagerService" 981f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:label="@string/permlab_accountManagerService" /> 982f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang 983f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <!-- ================================== --> 984f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <!-- Permissions for accessing hardware that may effect battery life--> 985f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <!-- ================================== --> 986f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <eat-comment /> 987b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang 988b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <!-- Used for permissions that provide direct access to the hardware on 989b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang the device that has an effect on battery life. This includes vibrator, 990f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang flashlight, etc. --> 991b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang 992b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <permission-group android:name="android.permission-group.AFFECTS_BATTERY" 993b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:label="@string/permgrouplab_affectsBattery" 994b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:icon="@drawable/perm_group_affects_battery" 99578d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:description="@string/permgroupdesc_affectsBattery" 99678d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:priority="180" /> 99778d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim 99878d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <!-- Allows applications to enter Wi-Fi Multicast mode --> 99978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE" 100078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:permissionGroup="android.permission-group.AFFECTS_BATTERY" 100178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:protectionLevel="dangerous" 100278d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:description="@string/permdesc_changeWifiMulticastState" 10030340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim android:label="@string/permlab_changeWifiMulticastState" /> 10040340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim 10050340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim <!-- Allows access to the vibrator --> 10060340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim <permission android:name="android.permission.VIBRATE" 100778d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:permissionGroup="android.permission-group.AFFECTS_BATTERY" 10080340bbc89f8162f9c2a298c98b03bfcdd1bc6e87Jinsuk Kim android:protectionLevel="normal" 100978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:label="@string/permlab_vibrate" 101078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:description="@string/permdesc_vibrate" /> 101178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim 101261f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang <!-- Allows access to the flashlight --> 10137e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim <permission android:name="android.permission.FLASHLIGHT" 10147e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim android:permissionGroup="android.permission-group.AFFECTS_BATTERY" 10157e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim android:protectionLevel="normal" 10167e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim android:label="@string/permlab_flashlight" 10177e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim android:description="@string/permdesc_flashlight" /> 10187e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim 10197e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen 102061f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang from dimming --> 102161f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang <permission android:name="android.permission.WAKE_LOCK" 102261f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang android:permissionGroup="android.permission-group.AFFECTS_BATTERY" 10237e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim android:protectionLevel="normal" 10247e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim android:label="@string/permlab_wakeLock" 102561f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang android:description="@string/permdesc_wakeLock" /> 102661f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang 10277e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim <!-- Allows using the device's IR transmitter, if available --> 10287e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim <permission android:name="android.permission.TRANSMIT_IR" 10297e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim android:permissionGroup="android.permission-group.AFFECTS_BATTERY" 10307e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim android:protectionLevel="normal" 10317e74206693f4ee93afb902d5b3446e2384f2a13dJinsuk Kim android:label="@string/permlab_transmitIr" 10328960d1b1552729e3dfd33deee951ac75933ad8e5Jinsuk Kim android:description="@string/permdesc_transmitIr" /> 1033a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim 1034a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim <!-- ==================================================== --> 1035a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim <!-- Permissions related to changing audio settings --> 1036a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim <!-- ==================================================== --> 103772b7d738d5b9254594726304cdb1777b54d95631Jinsuk Kim <eat-comment /> 103872b7d738d5b9254594726304cdb1777b54d95631Jinsuk Kim 103972b7d738d5b9254594726304cdb1777b54d95631Jinsuk Kim <!-- Used for permissions that provide direct access to speaker settings 104072b7d738d5b9254594726304cdb1777b54d95631Jinsuk Kim the device. --> 104179c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang <permission-group android:name="android.permission-group.AUDIO_SETTINGS" 1042a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim android:label="@string/permgrouplab_audioSettings" 1043a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim android:icon="@drawable/perm_group_audio_settings" 1044c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim android:description="@string/permgroupdesc_audioSettings" 1045a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim android:priority="130" /> 1046a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim 1047f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <!-- Allows an application to modify global audio settings --> 1048f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" 1049f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:permissionGroup="android.permission-group.AUDIO_SETTINGS" 1050f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:protectionLevel="normal" 105187f22a2870ac363a5849a7252c1bd44ce2b809c2Jinsuk Kim android:label="@string/permlab_modifyAudioSettings" 105287f22a2870ac363a5849a7252c1bd44ce2b809c2Jinsuk Kim android:description="@string/permdesc_modifyAudioSettings" /> 1053f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim 1054f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <!-- ================================== --> 1055f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <!-- Permissions for accessing hardware --> 1056f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <!-- ================================== --> 10577c5d31ea93d6f6770c34f7a2a364522d8cc4b5d8Yuncheol Heo <eat-comment /> 1058f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim 105987f22a2870ac363a5849a7252c1bd44ce2b809c2Jinsuk Kim <!-- Used for permissions that provide direct access to the hardware on 10608960d1b1552729e3dfd33deee951ac75933ad8e5Jinsuk Kim the device. This includes audio, the camera, vibrator, etc. --> 1061a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim <permission-group android:name="android.permission-group.HARDWARE_CONTROLS" 1062a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim android:label="@string/permgrouplab_hardwareControls" 1063a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim android:description="@string/permgroupdesc_hardwareControls" 1064a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim android:priority="260"/> 1065a6ce7708d6124224399241503fadcafe0c4684d4Jinsuk Kim 1066a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices 1067a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim @hide --> 1068a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim <permission android:name="android.permission.MANAGE_USB" 1069a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim android:permissionGroup="android.permission-group.HARDWARE_CONTROLS" 1070a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim android:protectionLevel="signature|system" 107172b7d738d5b9254594726304cdb1777b54d95631Jinsuk Kim android:label="@string/permlab_manageUsb" 107272b7d738d5b9254594726304cdb1777b54d95631Jinsuk Kim android:description="@string/permdesc_manageUsb" /> 107372b7d738d5b9254594726304cdb1777b54d95631Jinsuk Kim 107472b7d738d5b9254594726304cdb1777b54d95631Jinsuk Kim <!-- @SystemApi Allows an application to access the MTP USB kernel driver. 1075a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim For use only by the device side MTP implementation. 1076a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim @hide --> 1077a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim <permission android:name="android.permission.ACCESS_MTP" 1078c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim android:permissionGroup="android.permission-group.HARDWARE_CONTROLS" 1079a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim android:protectionLevel="signature|system" 1080a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim android:label="@string/permlab_accessMtp" 10818333571bd5e0a08773a1679964f8d96227af3356Jinsuk Kim android:description="@string/permdesc_accessMtp" /> 1082a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim 1083a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim <!-- Allows access to hardware peripherals. Intended only for hardware testing. 1084a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim <p>Not for use by third-party applications. --> 1085a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim <permission android:name="android.permission.HARDWARE_TEST" 1086a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim android:permissionGroup="android.permission-group.HARDWARE_CONTROLS" 1087c068bb5a0468bf605b0398e6f0ea5721917de4eeJinsuk Kim android:protectionLevel="signature" 1088a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim android:label="@string/permlab_hardware_test" 1089a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim android:description="@string/permdesc_hardware_test" /> 1090a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim 1091a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim <!-- @SystemApi Allows access to FM 1092f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim @hide This is not a third-party API (intended for system apps).--> 1093f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <permission android:name="android.permission.ACCESS_FM_RADIO" 1094f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:permissionGroup="android.permission-group.HARDWARE_CONTROLS" 1095f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:protectionLevel="signature|system" 10964612a6e1116f1196e6aa64b5a6e3757ea48f94acJungshik Jang android:label="@string/permlab_fm" 10974612a6e1116f1196e6aa64b5a6e3757ea48f94acJungshik Jang android:description="@string/permdesc_fm" /> 10984612a6e1116f1196e6aa64b5a6e3757ea48f94acJungshik Jang 10994612a6e1116f1196e6aa64b5a6e3757ea48f94acJungshik Jang <!-- Allows access to configure network interfaces, configure/use IPSec, etc. 11004612a6e1116f1196e6aa64b5a6e3757ea48f94acJungshik Jang @hide --> 11014612a6e1116f1196e6aa64b5a6e3757ea48f94acJungshik Jang <permission android:name="android.permission.NET_ADMIN" 11024612a6e1116f1196e6aa64b5a6e3757ea48f94acJungshik Jang android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 11034612a6e1116f1196e6aa64b5a6e3757ea48f94acJungshik Jang android:protectionLevel="signature" /> 1104a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim 1105a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim <!-- Allows registration for remote audio playback. @hide --> 1106a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK" 1107a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1108a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim android:protectionLevel="signature" /> 1109a062a9339add79a84862a34e363e3e454a6ec435Jinsuk Kim 11107fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as 111178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim built-in tuners and HDMI-in's. 11127fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim @hide This should only be used by OEM's TvInputService's. 11137fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim --> 11147fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim <permission android:name="android.permission.TV_INPUT_HARDWARE" 11157fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim android:protectionLevel="signatureOrSystem" /> 11167fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim 11177fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim <!-- @SystemApi Allows to capture a frame of TV input hardware such as 111878d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim built-in tuners and HDMI-in's. 111978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim @hide <p>Not for use by third-party applications. 112078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim --> 11217fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim <permission android:name="android.permission.CAPTURE_TV_INPUT" 112278d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:protectionLevel="signatureOrSystem" /> 11237fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim 11247fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim <!-- @hide Allows enabling/disabling OEM unlock 11257fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim <p>Not for use by third-party applications. --> 11267fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim <permission android:name="android.permission.OEM_UNLOCK_STATE" 11277fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 11287fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim android:protectionLevel="signature" /> 112978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim 113078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim 113178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <!-- =========================================== --> 11327fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim <!-- Permissions associated with audio capture --> 113378d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <!-- =========================================== --> 1134f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <eat-comment /> 113578d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim 113678d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <!-- Used for permissions that are associated with accessing 113778d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim microphone audio from the device. Note that phone calls also capture audio 11387fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim but are in a separate (more visible) permission group. --> 113978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <permission-group android:name="android.permission-group.MICROPHONE" 1140f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:label="@string/permgrouplab_microphone" 114178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:icon="@drawable/perm_group_microphone" 11426d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim android:description="@string/permgroupdesc_microphone" 11436d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim android:permissionGroupFlags="personalInfo" 11446d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim android:priority="340" /> 11456d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim 1146f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <!-- Allows an application to record audio --> 11476d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim <permission android:name="android.permission.RECORD_AUDIO" 11486d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim android:permissionGroup="android.permission-group.MICROPHONE" 11496d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim android:protectionLevel="dangerous" 11506d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim android:label="@string/permlab_recordAudio" 11516d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim android:description="@string/permdesc_recordAudio" /> 11522738e2d872a22fe95a99941139863ff642fbd8e7Jungshik Jang 11536d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim 1154ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- =========================================== --> 1155ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- Permissions associated with camera and image capture --> 1156ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- =========================================== --> 1157ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <eat-comment /> 1158ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang 1159ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- Used for permissions that are associated with accessing 1160ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang camera or capturing images/video from the device. --> 1161ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <permission-group android:name="android.permission-group.CAMERA" 1162e9cf1583c74fd03977c1ecb14520663710f14439Jungshik Jang android:label="@string/permgrouplab_camera" 1163ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:icon="@drawable/perm_group_camera" 1164ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:description="@string/permgroupdesc_camera" 1165ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:permissionGroupFlags="personalInfo" 1166ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:priority="350" /> 1167ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang 1168ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- Required to be able to access the camera device. 1169ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <p>This will automatically enforce the <a 1170ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code 1171ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <uses-feature>}</a> manifest element for <em>all</em> camera features. 1172377dcbd53af4529c352d453424539b069909fce4Jungshik Jang If you do not require all camera features or can properly operate if a camera 1173ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang is not available, then you must modify your manifest as appropriate in order to 1174ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang install on devices that don't support all camera features.</p> --> 1175ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <permission android:name="android.permission.CAMERA" 1176ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:permissionGroup="android.permission-group.CAMERA" 1177ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:protectionLevel="dangerous" 1178ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:label="@string/permlab_camera" 1179ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:description="@string/permdesc_camera" /> 1180ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang 1181ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when 1182ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang a camera is in use by an application. 1183ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang @hide --> 1184c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED" 1185ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:permissionGroup="android.permission-group.CAMERA" 1186ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:protectionLevel="signature|system" 1187ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:label="@string/permlab_cameraDisableTransmitLed" 1188ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:description="@string/permdesc_cameraDisableTransmitLed" /> 1189ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang 1190ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- =========================================== --> 1191ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- Permissions associated with telephony state --> 1192ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- =========================================== --> 1193ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <eat-comment /> 1194ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang 1195ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- Used for permissions that are associated with accessing and modifying 1196ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang telephony state: placing calls, intercepting outgoing calls, reading 1197ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang and modifying the phone state. --> 1198ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <permission-group android:name="android.permission-group.PHONE_CALLS" 1199ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:label="@string/permgrouplab_phoneCalls" 1200ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:icon="@drawable/perm_group_phone_calls" 1201ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:description="@string/permgroupdesc_phoneCalls" 1202ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:permissionGroupFlags="personalInfo" 1203ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:priority="370" /> 1204ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang 120592b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim <!-- Allows an application to see the number being dialed during an outgoing 120692b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim call with the option to redirect the call to a different number or 12079c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim abort the call altogether. --> 12089c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <permission android:name="android.permission.PROCESS_OUTGOING_CALLS" 12099c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim android:permissionGroup="android.permission-group.PHONE_CALLS" 12109c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim android:protectionLevel="dangerous" 12119c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim android:label="@string/permlab_processOutgoingCalls" 12129c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim android:description="@string/permdesc_processOutgoingCalls" /> 121361f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang 12149c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc. 12159c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim Does not include placing calls. 12169c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <p>Not for use by third-party applications. --> 12179c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <permission android:name="android.permission.MODIFY_PHONE_STATE" 1218ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:permissionGroup="android.permission-group.PHONE_CALLS" 1219ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:protectionLevel="signature|system" 1220ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:label="@string/permlab_modifyPhoneState" 1221ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim android:description="@string/permdesc_modifyPhoneState" /> 1222ed0864557b3340ab7db00e2dc95b29c4b8bb485dJinsuk Kim 12239c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <!-- Allows read only access to phone state. 12249c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <p class="note"><strong>Note:</strong> If <em>both</em> your <a 12259c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 12269c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim minSdkVersion}</a> and <a 122741d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 122841d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 122941d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang grants your app this permission. If you don't need this permission, be sure your <a 123041d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 123141d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang targetSdkVersion}</a> is 4 or higher. --> 123241d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang <permission android:name="android.permission.READ_PHONE_STATE" 123341d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang android:permissionGroup="android.permission-group.PHONE_CALLS" 123441d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang android:protectionLevel="dangerous" 123541d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang android:label="@string/permlab_readPhoneState" 123641d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang android:description="@string/permdesc_readPhoneState" /> 123741d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang 123841d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang <!-- Allows read only access to precise phone state. 123941d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang @hide Pending API council approval --> 124041d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang <permission android:name="android.permission.READ_PRECISE_PHONE_STATE" 124141d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang android:permissionGroup="android.permission-group.PHONE_CALLS" 124241d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang android:protectionLevel="dangerous" 124341d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang android:label="@string/permlab_readPrecisePhoneState" 124441d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang android:description="@string/permdesc_readPrecisePhoneState" /> 124541d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang 124641d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang <!-- @SystemApi Allows read access to privileged phone state. 124741d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang @hide Used internally. --> 124841d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" 124941d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang android:permissionGroup="android.permission-group.PHONE_CALLS" 125041d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang android:protectionLevel="signature|system" /> 125141d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang 125241d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang <!-- Allows an application to initiate a phone call without going through 125341d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang the Dialer user interface for the user to confirm the call 125441d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang being placed. --> 125541d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang <permission android:name="android.permission.CALL_PHONE" 125641d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang android:permissionGroup="android.permission-group.PHONE_CALLS" 125741d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang android:protectionLevel="dangerous" 125841d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang android:permissionFlags="costsMoney" 125941d974631c5f525da49c88d34cecedd5a4cfeda8Jungshik Jang android:label="@string/permlab_callPhone" 1260a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang android:description="@string/permdesc_callPhone" /> 1261a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang 1262a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang <!-- Allows an application to use SIP service --> 1263a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang <permission android:name="android.permission.USE_SIP" 1264a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang android:permissionGroup="android.permission-group.PHONE_CALLS" 1265a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang android:protectionLevel="dangerous" 1266a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang android:description="@string/permdesc_use_sip" 126738db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:label="@string/permlab_use_sip" /> 1268a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang 1269a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang <!-- @SystemApi Allows an application to bind to InCallService implementations. 1270a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang @hide --> 1271a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang <permission android:name="android.permission.BIND_INCALL_SERVICE" 1272a13da0d5913757e2456020c69481f98d0e44c090Jungshik Jang android:permissionGroup="android.permission-group.PHONE_CALLS" 1273160a6e5b99de15ce755e2e5521dce32d81ab180aJinsuk Kim android:protectionLevel="system|signature" 1274160a6e5b99de15ce755e2e5521dce32d81ab180aJinsuk Kim android:description="@string/permdesc_bind_incall_service" 12754d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim android:label="@string/permlab_bind_incall_service" /> 12764d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim 12774d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim <!-- @SystemApi Allows an application to bind to ConnectionService implementations. 12784d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim @hide --> 12794d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim <permission android:name="android.permission.BIND_CONNECTION_SERVICE" 12804d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim android:permissionGroup="android.permission-group.PHONE_CALLS" 12814d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim android:protectionLevel="system|signature" 1282119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:description="@string/permdesc_bind_connection_service" 1283119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:label="@string/permlab_bind_connection_service" /> 1284119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim 1285119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <!-- @SystemApi Allows an application to control the in-call experience. 1286119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim @hide --> 1287f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE" 1288119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:permissionGroup="android.permission-group.PHONE_CALLS" 1289119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:protectionLevel="system|signature" 1290119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:description="@string/permdesc_control_incall_experience" 1291119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:label="@string/permlab_control_incall_experience" /> 1292119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim 1293119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <!-- ================================== --> 1294119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <!-- Permissions for sdcard interaction --> 1295119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <!-- ================================== --> 1296119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <eat-comment /> 1297119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim 1298119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <!-- Group of permissions that are related to SD card access. --> 1299119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <permission-group android:name="android.permission-group.STORAGE" 1300119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:label="@string/permgrouplab_storage" 1301119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:icon="@drawable/perm_group_storage" 1302119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:description="@string/permgroupdesc_storage" 1303119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:permissionGroupFlags="personalInfo" 1304119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:priority="240" /> 1305119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim 1306119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <!-- Allows an application to read from external storage. 1307119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly 1308119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim granted this permission.</p> 1309119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <p>This permission is enforced starting in API level 19. Before API level 19, this 1310119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim permission is not enforced and all apps still have access to read from external storage. 1311119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim You can test your app with the permission enforced by enabling <em>Protect USB 131212e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang storage</em> under Developer options in the Settings app on a device running Android 4.1 or 1313a6b2a7a59ab79b2d91412c1095d1c49b8dc9d507Jungshik Jang higher.</p> 1314a6b2a7a59ab79b2d91412c1095d1c49b8dc9d507Jungshik Jang <p>Also starting in API level 19, this permission is <em>not</em> required to 131512e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang read/write files in your application-specific directories returned by 131612e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang {@link android.content.Context#getExternalFilesDir} and 1317b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang {@link android.content.Context#getExternalCacheDir}. 1318b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <p class="note"><strong>Note:</strong> If <em>both</em> your <a 1319b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 1320b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang minSdkVersion}</a> and <a 1321b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1322b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 1323b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang grants your app this permission. If you don't need this permission, be sure your <a 1324b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1325b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang targetSdkVersion}</a> is 4 or higher.--> 1326b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <permission android:name="android.permission.READ_EXTERNAL_STORAGE" 1327b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:permissionGroup="android.permission-group.STORAGE" 1328b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:label="@string/permlab_sdcardRead" 1329b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:description="@string/permdesc_sdcardRead" 1330b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:protectionLevel="normal" /> 1331b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang 1332b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <!-- Allows an application to write to external storage. 1333b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <p class="note"><strong>Note:</strong> If <em>both</em> your <a 1334b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 1335b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang minSdkVersion}</a> and <a 1336b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1337b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 1338b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang grants your app this permission. If you don't need this permission, be sure your <a 1339b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1340b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang targetSdkVersion}</a> is 4 or higher. 1341b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <p>Starting in API level 19, this permission is <em>not</em> required to 1342b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang read/write files in your application-specific directories returned by 1343b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang {@link android.content.Context#getExternalFilesDir} and 1344b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang {@link android.content.Context#getExternalCacheDir}. --> 1345a6b2a7a59ab79b2d91412c1095d1c49b8dc9d507Jungshik Jang <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" 1346a6b2a7a59ab79b2d91412c1095d1c49b8dc9d507Jungshik Jang android:permissionGroup="android.permission-group.STORAGE" 1347a6b2a7a59ab79b2d91412c1095d1c49b8dc9d507Jungshik Jang android:label="@string/permlab_sdcardWrite" 1348b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:description="@string/permdesc_sdcardWrite" 1349b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:protectionLevel="dangerous" /> 1350b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang 1351b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <!-- @SystemApi Allows an application to write to internal media storage 1352b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang @hide --> 1353b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <permission android:name="android.permission.WRITE_MEDIA_STORAGE" 1354b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:permissionGroup="android.permission-group.STORAGE" 1355b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:label="@string/permlab_mediaStorageWrite" 1356b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:description="@string/permdesc_mediaStorageWrite" 1357b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:protectionLevel="signature|system" /> 1358b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang 1359b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <!-- Allows an application to manage access to documents, usually as part 1360bffb0635aaaaf9140d9120e3f3d95a4f7391a0acJungshik Jang of a document picker. --> 1361bffb0635aaaaf9140d9120e3f3d95a4f7391a0acJungshik Jang <permission android:name="android.permission.MANAGE_DOCUMENTS" 1362bffb0635aaaaf9140d9120e3f3d95a4f7391a0acJungshik Jang android:permissionGroup="android.permission-group.STORAGE" 1363b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:label="@string/permlab_manageDocs" 1364b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:description="@string/permdesc_manageDocs" 1365b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:protectionLevel="signature" /> 1366b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang 1367b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <!-- ================================== --> 1368b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <!-- Permissions for screenlock --> 1369b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <!-- ================================== --> 1370b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <eat-comment /> 1371b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang 1372b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <!-- Group of permissions that are related to the screenlock. --> 1373b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <permission-group android:name="android.permission-group.SCREENLOCK" 1374b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:label="@string/permgrouplab_screenlock" 1375a6b2a7a59ab79b2d91412c1095d1c49b8dc9d507Jungshik Jang android:icon="@drawable/perm_group_screenlock" 1376f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:permissionGroupFlags="personalInfo" 1377f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:description="@string/permgroupdesc_screenlock" 1378f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:priority="230" /> 1379f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang 1380f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <!-- Allows applications to disable the keyguard --> 1381f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <permission android:name="android.permission.DISABLE_KEYGUARD" 1382f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:permissionGroup="android.permission-group.SCREENLOCK" 1383f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:protectionLevel="dangerous" 1384f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:description="@string/permdesc_disableKeyguard" 1385f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:label="@string/permlab_disableKeyguard" /> 1386f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang 1387f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <!-- ================================== --> 1388f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <!-- Permissions to access other installed applications --> 1389f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <!-- ================================== --> 1390f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <eat-comment /> 1391f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang 1392f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <!-- Group of permissions that are related to the other applications 1393f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang installed on the system. Examples include such as listing 1394f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang running apps, or killing background processes. --> 1395f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <permission-group android:name="android.permission-group.APP_INFO" 1396f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:label="@string/permgrouplab_appInfo" 1397f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:icon="@drawable/perm_group_app_info" 1398f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:description="@string/permgroupdesc_appInfo" 1399f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:priority="220" /> 1400f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang 1401f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <!-- @deprecated No longer enforced. --> 1402f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <permission android:name="android.permission.GET_TASKS" 1403f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:permissionGroup="android.permission-group.APP_INFO" 1404959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo android:protectionLevel="normal" 1405959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo android:label="@string/permlab_getTasks" 1406959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo android:description="@string/permdesc_getTasks" /> 1407959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo 1408959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really 1409959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo give access to task information. We need this new one because there are 1410959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo many existing apps that use add libraries and such that have validation 1411959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo code to ensure the app has requested the GET_TASKS permission by seeing 1412959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo if it has been granted the permission... if it hasn't, it kills the app 1413959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo with a message about being upset. So we need to have it continue to look 1414959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo like the app is getting that permission, even though it will never be 1415959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo checked, and new privileged apps can now request this one for real access. 1416959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo @hide 1417959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo @SystemApi --> 1418959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo <permission android:name="android.permission.REAL_GET_TASKS" 1419959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo android:permissionGroup="android.permission-group.APP_INFO" 1420959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo android:protectionLevel="signature|system" 1421959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo android:label="@string/permlab_getTasks" 1422959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo android:description="@string/permdesc_getTasks" /> 1423959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo 1424959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo. 1425959d2db12c7c6a06465af1251bc4cece580a72a3Terry Heo @hide --> 142678d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <permission android:name="android.permission.START_TASKS_FROM_RECENTS" 142778d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1428a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang android:protectionLevel="signature|system" 142979c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang android:label="@string/permlab_startTasksFromRecents" 143079c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang android:description="@string/permdesc_startTasksFromRecents" /> 143179c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang 14327fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions 14337fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim across the users on the device, using singleton services and 1434c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim user-targeted broadcasts. This permission is not available to 14357fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim third party applications. --> 14367fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim <permission android:name="android.permission.INTERACT_ACROSS_USERS" 143779c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 143878d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:protectionLevel="signature|system|development" 143978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:label="@string/permlab_interactAcrossUsers" 1440a5b7414970c85217e88015e78ecbc5ba093dead3Jungshik Jang android:description="@string/permdesc_interactAcrossUsers" /> 144179c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang 144279c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS} 144379c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang that removes restrictions on where broadcasts can be sent and allows other 14447fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim types of interactions. --> 14457fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL" 1446c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 14477fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim android:protectionLevel="signature" 14487fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim android:label="@string/permlab_interactAcrossUsersFull" 144979c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang android:description="@string/permdesc_interactAcrossUsersFull" /> 145078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim 145178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage 145278d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim users on the device. This permission is not available to 145378d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim third party applications. --> 145478d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <permission android:name="android.permission.MANAGE_USERS" 145578d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 145678d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:protectionLevel="signature|system" 145778d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:label="@string/permlab_manageUsers" 145878d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:description="@string/permdesc_manageUsers" /> 145978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim 146078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <!-- Allows an application to get full detailed information about 146178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim recently running tasks, with full fidelity to the real state. 146278d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim @hide --> 146378d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <permission android:name="android.permission.GET_DETAILED_TASKS" 146478d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 146578d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:protectionLevel="signature" 146678d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:label="@string/permlab_getDetailedTasks" 146778d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:description="@string/permdesc_getDetailedTasks" /> 146878d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim 146978d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <!-- Allows an application to change the Z-order of tasks --> 147078d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim <permission android:name="android.permission.REORDER_TASKS" 147178d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:permissionGroup="android.permission-group.APP_INFO" 147278d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:protectionLevel="normal" 147378d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:label="@string/permlab_reorderTasks" 147478d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim android:description="@string/permdesc_reorderTasks" /> 147578d695d8ba532214b02e7f18e0ccf89cf099163dJinsuk Kim 14767fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim <!-- @hide Allows an application to change to remove/kill tasks --> 14776d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim <permission android:name="android.permission.REMOVE_TASKS" 14784893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim android:permissionGroup="android.permission-group.APP_INFO" 14794893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim android:protectionLevel="signature" 14804893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim android:label="@string/permlab_removeTasks" 14814893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim android:description="@string/permdesc_removeTasks" /> 14824893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim 14834893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim <!-- @SystemApi @hide Allows an application to create/manage/remove stacks --> 14844893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS" 14856d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim android:permissionGroup="android.permission-group.APP_INFO" 14864893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim android:protectionLevel="signature|system" 14874893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim android:label="@string/permlab_manageActivityStacks" 14884893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim android:description="@string/permdesc_manageActivityStacks" /> 14894893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim 149061daf6b38e7a7ada2a6ca5a60539a54b9c6810bdJungshik Jang <!-- Allows an application to start any activity, regardless of permission 14914893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim protection or exported state. @hide --> 1492f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <permission android:name="android.permission.START_ANY_ACTIVITY" 14934893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1494f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:protectionLevel="signature" 14954893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim android:label="@string/permlab_startAnyActivity" 14964893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim android:description="@string/permdesc_startAnyActivity" /> 14976d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim 14986d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim <!-- @deprecated The {@link android.app.ActivityManager#restartPackage} 14996d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim API is no longer supported. --> 15006d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim <permission android:name="android.permission.RESTART_PACKAGES" 15016d97f5b91c6c82f28a2a3a5d3b922f0e5844e733Jinsuk Kim android:permissionGroup="android.permission-group.APP_INFO" 1502ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:protectionLevel="normal" 1503ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:label="@string/permlab_killBackgroundProcesses" 1504ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:description="@string/permdesc_killBackgroundProcesses" /> 1505ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang 1506ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- Allows an application to call 1507ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang {@link android.app.ActivityManager#killBackgroundProcesses}. --> 1508ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES" 1509ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:permissionGroup="android.permission-group.APP_INFO" 1510ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:protectionLevel="normal" 1511ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:label="@string/permlab_killBackgroundProcesses" 1512ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:description="@string/permdesc_killBackgroundProcesses" /> 1513ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang 1514ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- ================================== --> 1515ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- Permissions affecting the display of other applications --> 1516ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- ================================== --> 1517ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <eat-comment /> 1518ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang 1519ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- Group of permissions that allow manipulation of how 1520ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang another application displays UI to the user. --> 1521ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <permission-group android:name="android.permission-group.DISPLAY" 1522ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:label="@string/permgrouplab_display" 1523ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:icon="@drawable/perm_group_display" 1524ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:description="@string/permgroupdesc_display" 1525ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:priority="190"/> 1526ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang 1527ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- Allows an application to open windows using the type 1528ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT}, 15299c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim shown on top of all other applications. Very few applications 1530f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang should use this permission; these windows are intended for 1531f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang system-level interaction with the user. --> 1532f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <permission android:name="android.permission.SYSTEM_ALERT_WINDOW" 1533f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:permissionGroup="android.permission-group.DISPLAY" 1534f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:protectionLevel="dangerous" 1535f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:label="@string/permlab_systemAlertWindow" 15369c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim android:description="@string/permdesc_systemAlertWindow" /> 15379c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim 15389c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <!-- ================================== --> 1539f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <!-- Permissions affecting the system wallpaper --> 15409c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <!-- ================================== --> 15419c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <eat-comment /> 15429c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim 15439c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <!-- Group of permissions that allow manipulation of how 15449c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim another application displays UI to the user. --> 15459c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <permission-group android:name="android.permission-group.WALLPAPER" 1546f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:label="@string/permgrouplab_wallpaper" 15479c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim android:icon="@drawable/perm_group_wallpaper" 15489c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim android:description="@string/permgroupdesc_wallpaper" 15499c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim android:priority="150" /> 15509c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim 15519c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <!-- Allows applications to set the wallpaper --> 15529c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <permission android:name="android.permission.SET_WALLPAPER" 15539c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim android:permissionGroup="android.permission-group.WALLPAPER" 15549c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim android:protectionLevel="normal" 15559c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim android:label="@string/permlab_setWallpaper" 155661f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang android:description="@string/permdesc_setWallpaper" /> 15579c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim 1558f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <!-- Allows applications to set the wallpaper hints --> 15599c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <permission android:name="android.permission.SET_WALLPAPER_HINTS" 1560f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:permissionGroup="android.permission-group.WALLPAPER" 15619c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim android:protectionLevel="normal" 15629c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim android:label="@string/permlab_setWallpaperHints" 15639c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim android:description="@string/permdesc_setWallpaperHints" /> 15649c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim 15659c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <!-- ============================================ --> 15669c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <!-- Permissions for changing the system clock --> 15679c37e1f53ea4734bfe5ae156dc5399ce5f2c7cccJinsuk Kim <!-- ============================================ --> 156812e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang <eat-comment /> 1569b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang 1570f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <!-- Group of permissions that are related to system clock. --> 1571b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <permission-group android:name="android.permission-group.SYSTEM_CLOCK" 157212e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang android:label="@string/permgrouplab_systemClock" 1573b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:icon="@drawable/perm_group_system_clock" 157412e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang android:description="@string/permgroupdesc_systemClock" 1575b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:priority="140" /> 1576b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang 1577b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <!-- @SystemApi Allows applications to set the system time. 1578b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <p>Not for use by third-party applications. --> 1579b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <permission android:name="android.permission.SET_TIME" 1580b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:protectionLevel="signature|system" 1581f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:label="@string/permlab_setTime" 158212e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang android:description="@string/permdesc_setTime" /> 1583f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang 158412e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang <!-- Allows applications to set the system time zone --> 158512e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang <permission android:name="android.permission.SET_TIME_ZONE" 1586b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:permissionGroup="android.permission-group.SYSTEM_CLOCK" 1587b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:protectionLevel="normal" 1588b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:label="@string/permlab_setTimeZone" 1589b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang android:description="@string/permdesc_setTimeZone" /> 1590b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang 1591b6591b8e5399099dc6b7693e0fc719b613aba89cJungshik Jang <!-- ==================================================== --> 159212e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang <!-- Permissions related to changing status bar --> 159312e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang <!-- ==================================================== --> 1594f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <eat-comment /> 159512e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang 1596f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <!-- Used for permissions that change the status bar --> 159712e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang <permission-group android:name="android.permission-group.STATUS_BAR" 159812e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang android:label="@string/permgrouplab_statusBar" 159912e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang android:icon="@drawable/perm_group_status_bar" 160012e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang android:description="@string/permgroupdesc_statusBar" 160112e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang android:priority="110" /> 160212e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang 160312e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang <!-- Allows an application to expand or collapse the status bar. --> 160412e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang <permission android:name="android.permission.EXPAND_STATUS_BAR" 160512e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang android:permissionGroup="android.permission-group.STATUS_BAR" 1606f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:protectionLevel="normal" 160712e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang android:label="@string/permlab_expandStatusBar" 1608f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:description="@string/permdesc_expandStatusBar" /> 160912e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang 1610e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang <!-- ============================================================== --> 1611e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang <!-- Permissions related to adding/removing shortcuts from Launcher --> 1612e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang <!-- ============================================================== --> 1613e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang <eat-comment /> 1614e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang 1615e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang <!-- Allows an application to install a shortcut in Launcher --> 1616e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang <permission 1617e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang android:name="com.android.launcher.permission.INSTALL_SHORTCUT" 1618f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1619e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang android:protectionLevel="dangerous" 1620f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:label="@string/permlab_install_shortcut" 1621e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang android:description="@string/permdesc_install_shortcut" /> 1622e5a9337ebe738633cf7b66141cdf76efcdc5754cJungshik Jang 162312e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang <!-- Allows an application to uninstall a shortcut in Launcher --> 162412e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang <permission 162512e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT" 162612e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 162712e5dcefe136b58562f39604e6a8460ac92cb895Jungshik Jang android:protectionLevel="dangerous" 16287fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim android:label="@string/permlab_uninstall_shortcut" 16297fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim android:description="@string/permdesc_uninstall_shortcut"/> 16307fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim 16317fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim <!-- ==================================================== --> 16327fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim <!-- Permissions related to accessing sync settings --> 16337fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim <!-- ==================================================== --> 16347fe2ae0fe9c24f0a1a5ddf20850069b56af2c2fdJinsuk Kim <eat-comment /> 163563a2e0696ce2a04fbe0f1f00cfe9c93189f944daYuncheol Heo 1636f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <!-- Used for permissions that access the sync settings or sync 1637ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang related information. --> 1638ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <permission-group android:name="android.permission-group.SYNC_SETTINGS" 1639ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:label="@string/permgrouplab_syncSettings" 1640ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:icon="@drawable/perm_group_sync_settings" 1641ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:description="@string/permgroupdesc_syncSettings" 1642ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang android:priority="120" /> 1643ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang 1644ea67c183fe5511ad99aeaae1a32b5245bd020e36Jungshik Jang <!-- Allows applications to read the sync settings --> 16454893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim <permission android:name="android.permission.READ_SYNC_SETTINGS" 16464893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim android:permissionGroup="android.permission-group.SYNC_SETTINGS" 164760cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang android:protectionLevel="normal" 1648f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:description="@string/permdesc_readSyncSettings" 1649f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:label="@string/permlab_readSyncSettings" /> 165060cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang 165160cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang <!-- Allows applications to write the sync settings --> 165260cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang <permission android:name="android.permission.WRITE_SYNC_SETTINGS" 165360cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang android:permissionGroup="android.permission-group.SYNC_SETTINGS" 16544893c7efde52411ad051ef5c20251439f4098eacJinsuk Kim android:protectionLevel="normal" 165560cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang android:description="@string/permdesc_writeSyncSettings" 165660cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang android:label="@string/permlab_writeSyncSettings" /> 165760cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang 165860cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang <!-- Allows applications to read the sync stats --> 165960cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang <permission android:name="android.permission.READ_SYNC_STATS" 166060cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang android:permissionGroup="android.permission-group.SYNC_SETTINGS" 1661e81e108c4035ea8933525baa8108cb392f8abf5dJungshik Jang android:protectionLevel="normal" 1662e81e108c4035ea8933525baa8108cb392f8abf5dJungshik Jang android:description="@string/permdesc_readSyncStats" 166379c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang android:label="@string/permlab_readSyncStats" /> 166461f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang 166579c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang 166679c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang <!-- ============================================ --> 1667e946ed8f54c5ee0e58e168df00d4f418e1eed7a7Yuncheol Heo <!-- Permissions for low-level system interaction --> 1668e946ed8f54c5ee0e58e168df00d4f418e1eed7a7Yuncheol Heo <!-- ============================================ --> 1669e946ed8f54c5ee0e58e168df00d4f418e1eed7a7Yuncheol Heo <eat-comment /> 1670e946ed8f54c5ee0e58e168df00d4f418e1eed7a7Yuncheol Heo 167179c58a4b97f27ede6a1b680d2fece9c2a0edf7b7Jungshik Jang <!-- Group of permissions that are related to system APIs. Many 1672c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim of these are not permissions the user will be expected to understand, 167361f4fbd2e8436a1ecd478c2a1f516d064a24d43bJungshik Jang and such permissions should generally be marked as "normal" protection 167460cffce420db4c3395f86d3b9bb36003adf26f5dJungshik Jang level so they don't get displayed. This can also, however, be used 1675a858d221ff86c497e745222ea15bab141e337636Jungshik Jang for miscellaneous features that provide access to the operating system, 1676a858d221ff86c497e745222ea15bab141e337636Jungshik Jang such as writing the global system settings. --> 1677a858d221ff86c497e745222ea15bab141e337636Jungshik Jang <permission-group android:name="android.permission-group.SYSTEM_TOOLS" 1678a858d221ff86c497e745222ea15bab141e337636Jungshik Jang android:label="@string/permgrouplab_systemTools" 167992b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim android:icon="@drawable/perm_group_system_tools" 168092b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim android:description="@string/permgroupdesc_systemTools" 168192b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim android:priority="100" /> 168292b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim 168392b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim <!-- @SystemApi @hide Change the screen compatibility mode of applications --> 168492b77cf9cbf512e7141cad6fef5a38d0682dde43Jinsuk Kim <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY" 168538db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1686f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang android:protectionLevel="signature" 168738db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:label="@string/permlab_setScreenCompatibility" 1688f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang android:description="@string/permdesc_setScreenCompatibility" /> 168938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo 169038db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <!-- Allows an application to access all multi-user external storage @hide --> 169138db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE" 1692f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS" 169338db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:label="@string/permlab_sdcardAccessAll" 1694f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang android:description="@string/permdesc_sdcardAccessAll" 1695c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim android:protectionLevel="signature" /> 1696c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim 169738db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <!-- @SystemApi Allows an application to modify the current configuration, such 169838db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo as locale. --> 1699f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang <permission android:name="android.permission.CHANGE_CONFIGURATION" 170038db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS" 1701f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang android:protectionLevel="signature|system|development" 1702c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim android:label="@string/permlab_changeConfiguration" 1703c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim android:description="@string/permdesc_changeConfiguration" /> 170438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo 170538db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <!-- Allows an application to read or write the system settings. --> 1706f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang <permission android:name="android.permission.WRITE_SETTINGS" 170738db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1708f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang android:protectionLevel="normal" 1709c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim android:label="@string/permlab_writeSettings" 171038db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:description="@string/permdesc_writeSettings" /> 171138db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo 171238db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <!-- @SystemApi Allows an application to modify the Google service map. 171338db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <p>Not for use by third-party applications. --> 171438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <permission android:name="android.permission.WRITE_GSERVICES" 1715fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo android:protectionLevel="signature|system" 171638db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:label="@string/permlab_writeGservices" 171738db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:description="@string/permdesc_writeGservices" /> 171838db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo 171938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <!-- @SystemApi Allows an application to call 172038db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo {@link android.app.ActivityManager#forceStopPackage}. 172138db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo @hide --> 172238db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <permission android:name="android.permission.FORCE_STOP_PACKAGES" 172338db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 172438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:protectionLevel="signature|system" 172538db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:label="@string/permlab_forceStopPackages" 172638db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:description="@string/permdesc_forceStopPackages" /> 1727c12035cd40d01b032013f515cb509e6c8791cf65Jeff Brown 172838db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <!-- @SystemApi @hide Allows an application to retrieve the content of the active window 172938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo An active window is the window that has fired an accessibility event. --> 173038db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT" 173138db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:permissionGroup="android.permission-group.PERSONAL_INFO" 173238db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:protectionLevel="signature|system" 173338db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:label="@string/permlab_retrieve_window_content" 173438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:description="@string/permdesc_retrieve_window_content" /> 1735c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim 173638db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <!-- @SystemApi Modify the global animation scaling factor. 1737a9f10629f4bc1a82761917645ff4d2b6d42e47b3Jungshik Jang <p>Not for use by third-party applications. --> 1738fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo <permission android:name="android.permission.SET_ANIMATION_SCALE" 1739fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1740fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo android:protectionLevel="signature|system|development" 1741fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo android:label="@string/permlab_setAnimationScale" 1742fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo android:description="@string/permdesc_setAnimationScale" /> 1743a9f10629f4bc1a82761917645ff4d2b6d42e47b3Jungshik Jang 174438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <!-- @deprecated This functionality will be removed in the future; please do 174538db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo not use. Allow an application to make its activities persistent. --> 174638db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <permission android:name="android.permission.PERSISTENT_ACTIVITY" 174738db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:permissionGroup="android.permission-group.APP_INFO" 174838db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:protectionLevel="normal" 174938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:label="@string/permlab_persistentActivity" 175038db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:description="@string/permdesc_persistentActivity" /> 175138db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo 175238db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <!-- Allows an application to find out the space used by any package. --> 1753c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim <permission android:name="android.permission.GET_PACKAGE_SIZE" 17544fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 17554fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang android:protectionLevel="normal" 17564fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang android:label="@string/permlab_getPackageSize" 17574fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang android:description="@string/permdesc_getPackageSize" /> 17584fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang 17594fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <!-- @deprecated No longer useful, see 17604fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang {@link android.content.pm.PackageManager#addPackageToPreferred} 17614fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang for details. --> 17624fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS" 17634b54271f1bbd29957c47433155c58aa792105d6dYuncheol Heo android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 17644b54271f1bbd29957c47433155c58aa792105d6dYuncheol Heo android:protectionLevel="signature" 17654b54271f1bbd29957c47433155c58aa792105d6dYuncheol Heo android:label="@string/permlab_setPreferredApplications" 17664fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang android:description="@string/permdesc_setPreferredApplications" /> 17674fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang 17684fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <!-- Allows an application to receive the 17694fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is 17704fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang broadcast after the system finishes booting. If you don't 17711ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo request this permission, you will not receive the broadcast at 17721ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo that time. Though holding this permission does not have any 17731ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo security implications, it can have a negative impact on the 17741ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo user experience by increasing the amount of time it takes the 17751ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo system to start and allowing applications to have themselves 17761ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo running without the user being aware of them. As such, you must 17771ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo explicitly declare your use of this facility to make that visible 17781ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo to the user. --> 17791ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" 17801ca0a43251a31bb1b4253dc404316cc4b840f497Terry Heo android:permissionGroup="android.permission-group.APP_INFO" 1781f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang android:protectionLevel="normal" 1782f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang android:label="@string/permlab_receiveBootCompleted" 1783f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang android:description="@string/permdesc_receiveBootCompleted" /> 1784f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang 1785f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang <!-- Allows an application to broadcast sticky intents. These are 1786f67113f7abd536cc3eb888344bf925762aa5278eJungshik Jang broadcasts whose data is held by the system after being finished, 17874fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang so that clients can quickly retrieve that data without having 1788350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang to wait for the next broadcast. --> 1789350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang <permission android:name="android.permission.BROADCAST_STICKY" 1790350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1791350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang android:protectionLevel="normal" 1792350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang android:label="@string/permlab_broadcastSticky" 1793350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang android:description="@string/permdesc_broadcastSticky" /> 1794350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang 179538db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <!-- @SystemApi Allows mounting and unmounting file systems for removable storage. 1796350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang <p>Not for use by third-party applications.--> 1797f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS" 179838db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 179938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:protectionLevel="system|signature" 180038db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:label="@string/permlab_mount_unmount_filesystems" 18014fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang android:description="@string/permdesc_mount_unmount_filesystems" /> 18024fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang 18034fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <!-- @SystemApi Allows formatting file systems for removable storage. 18044fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <p>Not for use by third-party applications. --> 18054fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS" 18064fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 18074fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang android:protectionLevel="system|signature" 18084fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang android:label="@string/permlab_mount_format_filesystems" 18094fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang android:description="@string/permdesc_mount_format_filesystems" /> 18104fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang 18114fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <!-- Allows access to ASEC non-destructive API calls 181238db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo @hide --> 18134fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <permission android:name="android.permission.ASEC_ACCESS" 18144fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1815c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim android:protectionLevel="signature" 181638db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:label="@string/permlab_asec_access" 181738db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:description="@string/permdesc_asec_access" /> 1818c0c20d0522d7756d80f011e7a54bf3b51c78df41Jinsuk Kim 181938db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <!-- Allows creation of ASEC volumes 18204fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang @hide --> 182138db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo <permission android:name="android.permission.ASEC_CREATE" 182238db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 18235008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:protectionLevel="signature" 182438db629d897e9d7c8e31ce0a7e985981e3e12996Yuncheol Heo android:label="@string/permlab_asec_create" 18254d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim android:description="@string/permdesc_asec_create" /> 1826119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim 1827119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <!-- Allows destruction of ASEC volumes 1828119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim @hide --> 1829119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <permission android:name="android.permission.ASEC_DESTROY" 1830119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1831119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:protectionLevel="signature" 1832119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:label="@string/permlab_asec_destroy" 1833119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:description="@string/permdesc_asec_destroy" /> 1834119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim 1835119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <!-- Allows mount / unmount of ASEC volumes 1836119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim @hide --> 1837119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT" 1838119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1839119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:protectionLevel="signature" 1840119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:label="@string/permlab_asec_mount_unmount" 1841119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:description="@string/permdesc_asec_mount_unmount" /> 1842119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim 1843119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <!-- Allows rename of ASEC volumes 1844119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim @hide --> 1845119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <permission android:name="android.permission.ASEC_RENAME" 1846119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1847119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:protectionLevel="signature" 1848119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:label="@string/permlab_asec_rename" 1849119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:description="@string/permdesc_asec_rename" /> 1850119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim 1851119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <!-- @SystemApi Allows applications to write the apn settings. 1852119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <p>Not for use by third-party applications. --> 1853119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim <permission android:name="android.permission.WRITE_APN_SETTINGS" 1854119160a68195bcb2f5bdf4a269807e01228eca97Jinsuk Kim android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1855f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:protectionLevel="signature|system" 1856f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:description="@string/permdesc_writeApnSettings" 1857f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:label="@string/permlab_writeApnSettings" /> 1858f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang 1859f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <!-- Allows an application to allow access the subscribed feeds 1860f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang ContentProvider. --> 1861f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ" 1862f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1863f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:label="@string/permlab_subscribedFeedsRead" 1864f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:description="@string/permdesc_subscribedFeedsRead" 1865f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:protectionLevel="normal" /> 1866f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE" 1867f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1868f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:label="@string/permlab_subscribedFeedsWrite" 1869f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:description="@string/permdesc_subscribedFeedsWrite" 1870f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:protectionLevel="dangerous" /> 1871f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang 1872f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <!-- Allows applications to change network connectivity state --> 1873f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <permission android:name="android.permission.CHANGE_NETWORK_STATE" 1874f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:permissionGroup="android.permission-group.NETWORK" 1875f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:protectionLevel="normal" 1876f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:description="@string/permdesc_changeNetworkState" 1877f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:label="@string/permlab_changeNetworkState" /> 1878f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang 1879f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <!-- Allows an application to clear the caches of all installed 1880f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang applications on the device. --> 1881f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang <permission android:name="android.permission.CLEAR_APP_CACHE" 1882f424932cfb1b16b01a37500d09e295912700a51dJungshik Jang android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 18834d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim android:protectionLevel="dangerous" 18844d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim android:label="@string/permlab_clearAppCache" 18854d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim android:description="@string/permdesc_clearAppCache" /> 18864d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim 18874d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim <!-- @SystemApi Allows an application to use any media decoder when decoding for playback 18884d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim @hide --> 18894d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK" 18904d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim android:protectionLevel="signature|system" 18914d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim android:label="@string/permlab_anyCodecForPlayback" 18924d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim android:description="@string/permdesc_anyCodecForPlayback" /> 18934d43d93743222311c6377d4904c19ccb93699d3bJinsuk Kim 18944fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on 18954fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang behalf of the user. 1896350e68d0b80c22e6ec37dd683134f46079619803Jungshik Jang @hide --> 18975008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <permission android:name="android.permission.MANAGE_CA_CERTIFICATES" 18985008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:protectionLevel="signature|system" 18995008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:label="@string/permlab_manageCaCertificates" 19005008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:description="@string/permdesc_manageCaCertificates" /> 19015008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim 19025008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <!-- @SystemApi Allows an application to do certain operations needed for 19034fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang interacting with the recovery (system update) system. 19044fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang @hide --> 19055008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim <permission android:name="android.permission.RECOVERY" 19065008486b09c588bf3409b70d9ee29225e8593c64Jinsuk Kim android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 1907f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:protectionLevel="signature|system" 19084fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang android:label="@string/permlab_recovery" 19094fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang android:description="@string/permdesc_recovery" /> 19104fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang 19114fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <!-- Allows the system to bind to an application's task services 19124fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang @hide --> 19134fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <permission android:name="android.permission.BIND_JOB_SERVICE" 1914fc44e4e03c5f6486efb7457965dcf7eaf36bc971Yuncheol Heo android:protectionLevel="signature" 19154fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang android:label="@string/permlab_bindJobService" 19164fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang android:description="@string/permdesc_bindJobService" /> 19174fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/> 19184fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang 19194fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <!-- ========================================= --> 19204fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <!-- Permissions for special development tools --> 19214fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <!-- ========================================= --> 19224fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <eat-comment /> 19234fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang 19244fc1d105fc279bf7df6c876e160672866bdad8e7Jungshik Jang <!-- Group of permissions that are related to development features. These 1925867b4e0c55b4b1e432a3585fc945a999f066ef81Jungshik Jang are not permissions that should appear in third-party applications; they 1926867b4e0c55b4b1e432a3585fc945a999f066ef81Jungshik Jang protect APIs that are intended only to be used for development 1927867b4e0c55b4b1e432a3585fc945a999f066ef81Jungshik Jang purposes. --> 1928867b4e0c55b4b1e432a3585fc945a999f066ef81Jungshik Jang <permission-group android:name="android.permission-group.DEVELOPMENT_TOOLS" 1929867b4e0c55b4b1e432a3585fc945a999f066ef81Jungshik Jang android:label="@string/permgrouplab_developmentTools" 1930e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:description="@string/permgroupdesc_developmentTools" 1931e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:priority="310" /> 1932e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim 1933e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <!-- @SystemApi Allows an application to read or write the secure system settings. 1934e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <p>Not for use by third-party applications. --> 1935e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <permission android:name="android.permission.WRITE_SECURE_SETTINGS" 1936e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS" 1937e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:protectionLevel="signature|system|development" 1938e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:label="@string/permlab_writeSecureSettings" 1939e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:description="@string/permdesc_writeSecureSettings" /> 1940e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim 1941e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <!-- @SystemApi Allows an application to retrieve state dump information from system services. 1942e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <p>Not for use by third-party applications. --> 1943e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <permission android:name="android.permission.DUMP" 1944e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS" 1945e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:protectionLevel="signature|system|development" 1946e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:label="@string/permlab_dump" 1947e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:description="@string/permdesc_dump" /> 1948e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim 1949e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <!-- @SystemApi Allows an application to read the low-level system log files. 1950e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <p>Not for use by third-party applications, because 1951e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim Log entries can contain the user's private information. --> 1952e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <permission android:name="android.permission.READ_LOGS" 1953e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS" 1954e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:protectionLevel="signature|system|development" 1955e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:label="@string/permlab_readLogs" 1956e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:description="@string/permdesc_readLogs" /> 1957e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim 1958e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <!-- @SystemApi Configure an application for debugging. 1959e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <p>Not for use by third-party applications. --> 1960e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <permission android:name="android.permission.SET_DEBUG_APP" 1961e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS" 1962e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:protectionLevel="signature|system|development" 1963e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:label="@string/permlab_setDebugApp" 1964e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:description="@string/permdesc_setDebugApp" /> 1965e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim 1966e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <!-- @SystemApi Allows an application to set the maximum number of (not needed) 1967e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim application processes that can be running. 1968e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <p>Not for use by third-party applications. --> 1969e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <permission android:name="android.permission.SET_PROCESS_LIMIT" 1970e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS" 1971e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:protectionLevel="signature|system|development" 1972e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:label="@string/permlab_setProcessLimit" 1973f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim android:description="@string/permdesc_setProcessLimit" /> 1974e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim 1975e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <!-- @SystemApi Allows an application to control whether activities are immediately 1976e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim finished when put in the background. 1977e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <p>Not for use by third-party applications. --> 1978e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim <permission android:name="android.permission.SET_ALWAYS_FINISH" 1979e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS" 1980e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim android:protectionLevel="signature|system|development" 1981867b4e0c55b4b1e432a3585fc945a999f066ef81Jungshik Jang android:label="@string/permlab_setAlwaysFinish" 198208a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo android:description="@string/permdesc_setAlwaysFinish" /> 1983e9f6ed3b11fb8ebae5e73db1e4736b86cae272d9Jinsuk Kim 1984f286b4d86b4b2ac91edb88d0336810e46d9a16ceJinsuk Kim <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes. 198508a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo <p>Not for use by third-party applications. --> 198608a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES" 198708a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS" 198808a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo android:protectionLevel="signature|system|development" 198908a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo android:label="@string/permlab_signalPersistentProcesses" 199008a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo android:description="@string/permdesc_signalPersistentProcesses" /> 199108a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo 199208a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo <!-- ==================================== --> 199308a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo <!-- Private (signature-only) permissions --> 199408a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo <!-- ==================================== --> 199508a1be81d7b597f858164fee6a4934264259b3aeYuncheol Heo <eat-comment /> 1996339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang 1997339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang <!-- @SystemApi Allows applications to RW to diagnostic resources. 1998339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang <p>Not for use by third-party applications. --> 1999339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang <permission android:name="android.permission.DIAGNOSTIC" 2000339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2001339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang android:protectionLevel="signature" 2002339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang android:description="@string/permdesc_diagnostic" 2003339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang android:label="@string/permlab_diagnostic" /> 2004339227da7cf025ce4ae0c85ddc52643d63972321Jungshik Jang 20050792d37385e60aa8d73f8df174d0a32f4f618bc4Jungshik Jang <!-- @SystemApi Allows an application to open, close, or disable the status bar 2006 and its icons. 2007 <p>Not for use by third-party applications. --> 2008 <permission android:name="android.permission.STATUS_BAR" 2009 android:label="@string/permlab_statusBar" 2010 android:description="@string/permdesc_statusBar" 2011 android:protectionLevel="signature|system" /> 2012 2013 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk 2014 @hide --> 2015 <permission android:name="android.permission.STATUS_BAR_SERVICE" 2016 android:label="@string/permlab_statusBarService" 2017 android:description="@string/permdesc_statusBarService" 2018 android:protectionLevel="signature" /> 2019 2020 <!-- Allows an application to force a BACK operation on whatever is the 2021 top activity. 2022 <p>Not for use by third-party applications. --> 2023 <permission android:name="android.permission.FORCE_BACK" 2024 android:label="@string/permlab_forceBack" 2025 android:description="@string/permdesc_forceBack" 2026 android:protectionLevel="signature" /> 2027 2028 <!-- @SystemApi Allows an application to update device statistics. 2029 <p>Not for use by third-party applications. --> 2030 <permission android:name="android.permission.UPDATE_DEVICE_STATS" 2031 android:label="@string/permlab_updateBatteryStats" 2032 android:description="@string/permdesc_updateBatteryStats" 2033 android:protectionLevel="signature|system" /> 2034 2035 <!-- @SystemApi @hide Allows an application to collect battery statistics --> 2036 <permission android:name="android.permission.GET_APP_OPS_STATS" 2037 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2038 android:label="@string/permlab_getAppOpsStats" 2039 android:description="@string/permdesc_getAppOpsStats" 2040 android:protectionLevel="signature|system|development" /> 2041 2042 <!-- @SystemApi Allows an application to update application operation statistics. Not for 2043 use by third party apps. @hide --> 2044 <permission android:name="android.permission.UPDATE_APP_OPS_STATS" 2045 android:label="@string/permlab_updateAppOpsStats" 2046 android:description="@string/permdesc_updateAppOpsStats" 2047 android:protectionLevel="signature|system" /> 2048 2049 <!-- Allows an application to open windows that are for use by parts 2050 of the system user interface. 2051 <p>Not for use by third-party applications. --> 2052 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW" 2053 android:label="@string/permlab_internalSystemWindow" 2054 android:description="@string/permdesc_internalSystemWindow" 2055 android:protectionLevel="signature" /> 2056 2057 <!-- Allows an application to manage (create, destroy, 2058 Z-order) application tokens in the window manager. 2059 <p>Not for use by third-party applications. --> 2060 <permission android:name="android.permission.MANAGE_APP_TOKENS" 2061 android:label="@string/permlab_manageAppTokens" 2062 android:description="@string/permdesc_manageAppTokens" 2063 android:protectionLevel="signature" /> 2064 2065 <!-- @hide Allows the application to temporarily freeze the screen for a 2066 full-screen transition. --> 2067 <permission android:name="android.permission.FREEZE_SCREEN" 2068 android:label="@string/permlab_freezeScreen" 2069 android:description="@string/permdesc_freezeScreen" 2070 android:protectionLevel="signature" /> 2071 2072 <!-- Allows an application to inject user events (keys, touch, trackball) 2073 into the event stream and deliver them to ANY window. Without this 2074 permission, you can only deliver events to windows in your own process. 2075 <p>Not for use by third-party applications. --> 2076 <permission android:name="android.permission.INJECT_EVENTS" 2077 android:label="@string/permlab_injectEvents" 2078 android:description="@string/permdesc_injectEvents" 2079 android:protectionLevel="signature" /> 2080 2081 <!-- @hide Allows an application to register an input filter which filters the stream 2082 of user events (keys, touch, trackball) before they are dispatched to any window. --> 2083 <permission android:name="android.permission.FILTER_EVENTS" 2084 android:label="@string/permlab_filter_events" 2085 android:description="@string/permdesc_filter_events" 2086 android:protectionLevel="signature" /> 2087 2088 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. --> 2089 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN" 2090 android:label="@string/permlab_retrieveWindowToken" 2091 android:description="@string/permdesc_retrieveWindowToken" 2092 android:protectionLevel="signature" /> 2093 2094 <!-- @hide Allows an application to collect frame statistics --> 2095 <permission android:name="android.permission.FRAME_STATS" 2096 android:label="@string/permlab_frameStats" 2097 android:description="@string/permdesc_frameStats" 2098 android:protectionLevel="signature" /> 2099 2100 <!-- @hide Allows an application to temporary enable accessibility on the device. --> 2101 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY" 2102 android:label="@string/permlab_temporary_enable_accessibility" 2103 android:description="@string/permdesc_temporary_enable_accessibility" 2104 android:protectionLevel="signature" /> 2105 2106 <!-- Allows an application to watch and control how activities are 2107 started globally in the system. Only for is in debugging 2108 (usually the monkey command). 2109 <p>Not for use by third-party applications. --> 2110 <permission android:name="android.permission.SET_ACTIVITY_WATCHER" 2111 android:label="@string/permlab_runSetActivityWatcher" 2112 android:description="@string/permdesc_runSetActivityWatcher" 2113 android:protectionLevel="signature" /> 2114 2115 <!-- @SystemApi Allows an application to call the activity manager shutdown() API 2116 to put the higher-level system there into a shutdown state. 2117 @hide --> 2118 <permission android:name="android.permission.SHUTDOWN" 2119 android:label="@string/permlab_shutdown" 2120 android:description="@string/permdesc_shutdown" 2121 android:protectionLevel="signature|system" /> 2122 2123 <!-- @SystemApi Allows an application to tell the activity manager to temporarily 2124 stop application switches, putting it into a special mode that 2125 prevents applications from immediately switching away from some 2126 critical UI such as the home screen. 2127 @hide --> 2128 <permission android:name="android.permission.STOP_APP_SWITCHES" 2129 android:label="@string/permlab_stopAppSwitches" 2130 android:description="@string/permdesc_stopAppSwitches" 2131 android:protectionLevel="signature|system" /> 2132 2133 <!-- Allows an application to retrieve private information about 2134 the current top activity, such as any assist context it can provide. 2135 <p>Not for use by third-party applications. --> 2136 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO" 2137 android:label="@string/permlab_getTopActivityInfo" 2138 android:description="@string/permdesc_getTopActivityInfo" 2139 android:protectionLevel="signature" /> 2140 2141 <!-- Allows an application to retrieve the current state of keys and 2142 switches. 2143 <p>Not for use by third-party applications. 2144 @deprecated The API that used this permission has been removed. --> 2145 <permission android:name="android.permission.READ_INPUT_STATE" 2146 android:label="@string/permlab_readInputState" 2147 android:description="@string/permdesc_readInputState" 2148 android:protectionLevel="signature" /> 2149 2150 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService}, 2151 to ensure that only the system can bind to it. --> 2152 <permission android:name="android.permission.BIND_INPUT_METHOD" 2153 android:label="@string/permlab_bindInputMethod" 2154 android:description="@string/permdesc_bindInputMethod" 2155 android:protectionLevel="signature" /> 2156 2157 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService}, 2158 to ensure that only the system can bind to it. --> 2159 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE" 2160 android:label="@string/permlab_bindAccessibilityService" 2161 android:description="@string/permdesc_bindAccessibilityService" 2162 android:protectionLevel="signature" /> 2163 2164 <!-- Must be required by a {@link android.printservice.PrintService}, 2165 to ensure that only the system can bind to it. --> 2166 <permission android:name="android.permission.BIND_PRINT_SERVICE" 2167 android:label="@string/permlab_bindPrintService" 2168 android:description="@string/permdesc_bindPrintService" 2169 android:protectionLevel="signature" /> 2170 2171 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService} 2172 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only 2173 the system can bind to it. --> 2174 <permission android:name="android.permission.BIND_NFC_SERVICE" 2175 android:label="@string/permlab_bindNfcService" 2176 android:description="@string/permdesc_bindNfcService" 2177 android:protectionLevel="signature" /> 2178 2179 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it. 2180 @hide --> 2181 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE" 2182 android:label="@string/permlab_bindPrintSpoolerService" 2183 android:description="@string/permdesc_bindPrintSpoolerService" 2184 android:protectionLevel="signature" /> 2185 2186 <!-- Must be required by a TextService (e.g. SpellCheckerService) 2187 to ensure that only the system can bind to it. --> 2188 <permission android:name="android.permission.BIND_TEXT_SERVICE" 2189 android:label="@string/permlab_bindTextService" 2190 android:description="@string/permdesc_bindTextService" 2191 android:protectionLevel="signature" /> 2192 2193 <!-- Must be required by a {@link android.net.VpnService}, 2194 to ensure that only the system can bind to it. --> 2195 <permission android:name="android.permission.BIND_VPN_SERVICE" 2196 android:label="@string/permlab_bindVpnService" 2197 android:description="@string/permdesc_bindVpnService" 2198 android:protectionLevel="signature" /> 2199 2200 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService}, 2201 to ensure that only the system can bind to it. --> 2202 <permission android:name="android.permission.BIND_WALLPAPER" 2203 android:label="@string/permlab_bindWallpaper" 2204 android:description="@string/permdesc_bindWallpaper" 2205 android:protectionLevel="signature|system" /> 2206 2207 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService}, 2208 to ensure that only the system can bind to it. --> 2209 <permission android:name="android.permission.BIND_VOICE_INTERACTION" 2210 android:label="@string/permlab_bindVoiceInteraction" 2211 android:description="@string/permdesc_bindVoiceInteraction" 2212 android:protectionLevel="signature" /> 2213 2214 <!-- Must be required by hotword enrollment application, 2215 to ensure that only the system can interact with it. 2216 @hide <p>Not for use by third-party applications.</p> --> 2217 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES" 2218 android:label="@string/permlab_manageVoiceKeyphrases" 2219 android:description="@string/permdesc_manageVoiceKeyphrases" 2220 android:protectionLevel="signature|system" /> 2221 2222 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider}, 2223 to ensure that only the system can bind to it. 2224 @hide --> 2225 <permission android:name="android.permission.BIND_REMOTE_DISPLAY" 2226 android:label="@string/permlab_bindRemoteDisplay" 2227 android:description="@string/permdesc_bindRemoteDisplay" 2228 android:protectionLevel="signature" /> 2229 2230 <!-- Must be required by a {@link android.media.tv.TvInputService} 2231 to ensure that only the system can bind to it. --> 2232 <permission android:name="android.permission.BIND_TV_INPUT" 2233 android:label="@string/permlab_bindTvInput" 2234 android:description="@string/permdesc_bindTvInput" 2235 android:protectionLevel="signature|system" /> 2236 2237 <!-- @SystemApi Allows an application to modify parental controls 2238 <p>Not for use by third-party applications. 2239 @hide --> 2240 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS" 2241 android:label="@string/permlab_modifyParentalControls" 2242 android:description="@string/permdesc_modifyParentalControls" 2243 android:protectionLevel="signature|system" /> 2244 2245 <!-- Must be required by device administration receiver, to ensure that only the 2246 system can interact with it. --> 2247 <permission android:name="android.permission.BIND_DEVICE_ADMIN" 2248 android:label="@string/permlab_bindDeviceAdmin" 2249 android:description="@string/permdesc_bindDeviceAdmin" 2250 android:protectionLevel="signature" /> 2251 2252 <!-- @SystemApi Required to add or remove another application as a device admin. 2253 <p>Not for use by third-party applications. 2254 @hide --> 2255 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS" 2256 android:label="@string/permlab_manageDeviceAdmins" 2257 android:description="@string/permdesc_manageDeviceAdmins" 2258 android:protectionLevel="signature|system" /> 2259 2260 <!-- Allows low-level access to setting the orientation (actually 2261 rotation) of the screen. 2262 <p>Not for use by third-party applications. --> 2263 <permission android:name="android.permission.SET_ORIENTATION" 2264 android:label="@string/permlab_setOrientation" 2265 android:description="@string/permdesc_setOrientation" 2266 android:protectionLevel="signature" /> 2267 2268 <!-- Allows low-level access to setting the pointer speed. 2269 <p>Not for use by third-party applications. --> 2270 <permission android:name="android.permission.SET_POINTER_SPEED" 2271 android:label="@string/permlab_setPointerSpeed" 2272 android:description="@string/permdesc_setPointerSpeed" 2273 android:protectionLevel="signature" /> 2274 2275 <!-- Allows low-level access to setting input device calibration. 2276 <p>Not for use by normal applications. 2277 @hide --> 2278 <permission android:name="android.permission.SET_INPUT_CALIBRATION" 2279 android:label="@string/permlab_setInputCalibration" 2280 android:description="@string/permdesc_setInputCalibration" 2281 android:protectionLevel="signature" /> 2282 2283 <!-- Allows low-level access to setting the keyboard layout. 2284 <p>Not for use by third-party applications. 2285 @hide --> 2286 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT" 2287 android:label="@string/permlab_setKeyboardLayout" 2288 android:description="@string/permdesc_setKeyboardLayout" 2289 android:protectionLevel="signature" /> 2290 2291 <!-- @SystemApi Allows an application to install packages. 2292 <p>Not for use by third-party applications. --> 2293 <permission android:name="android.permission.INSTALL_PACKAGES" 2294 android:label="@string/permlab_installPackages" 2295 android:description="@string/permdesc_installPackages" 2296 android:protectionLevel="signature|system" /> 2297 2298 <!-- Allows an application to clear user data. 2299 <p>Not for use by third-party applications. --> 2300 <permission android:name="android.permission.CLEAR_APP_USER_DATA" 2301 android:label="@string/permlab_clearAppUserData" 2302 android:description="@string/permdesc_clearAppUserData" 2303 android:protectionLevel="signature" /> 2304 2305 <!-- @SystemApi Allows an application to delete cache files. 2306 <p>Not for use by third-party applications. --> 2307 <permission android:name="android.permission.DELETE_CACHE_FILES" 2308 android:label="@string/permlab_deleteCacheFiles" 2309 android:description="@string/permdesc_deleteCacheFiles" 2310 android:protectionLevel="signature|system" /> 2311 2312 <!-- @SystemApi Allows an application to delete packages. 2313 <p>Not for use by third-party applications. --> 2314 <permission android:name="android.permission.DELETE_PACKAGES" 2315 android:label="@string/permlab_deletePackages" 2316 android:description="@string/permdesc_deletePackages" 2317 android:protectionLevel="signature|system" /> 2318 2319 <!-- @SystemApi Allows an application to move location of installed package. 2320 @hide --> 2321 <permission android:name="android.permission.MOVE_PACKAGE" 2322 android:label="@string/permlab_movePackage" 2323 android:description="@string/permdesc_movePackage" 2324 android:protectionLevel="signature|system" /> 2325 2326 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is 2327 enabled or not. 2328 <p>Not for use by third-party applications. --> 2329 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE" 2330 android:label="@string/permlab_changeComponentState" 2331 android:description="@string/permdesc_changeComponentState" 2332 android:protectionLevel="signature|system" /> 2333 2334 <!-- @hide Allows an application to grant or revoke specific permissions. --> 2335 <permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS" 2336 android:label="@string/permlab_grantRevokePermissions" 2337 android:description="@string/permdesc_grantRevokePermissions" 2338 android:protectionLevel="signature" /> 2339 2340 <!-- Allows an application to use SurfaceFlinger's low level features. 2341 <p>Not for use by third-party applications. --> 2342 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER" 2343 android:label="@string/permlab_accessSurfaceFlinger" 2344 android:description="@string/permdesc_accessSurfaceFlinger" 2345 android:protectionLevel="signature" /> 2346 2347 <!-- @SystemApi Allows an application to take screen shots and more generally 2348 get access to the frame buffer data. 2349 <p>Not for use by third-party applications. --> 2350 <permission android:name="android.permission.READ_FRAME_BUFFER" 2351 android:label="@string/permlab_readFrameBuffer" 2352 android:description="@string/permdesc_readFrameBuffer" 2353 android:protectionLevel="signature|system" /> 2354 2355 <!-- Allows an application to use InputFlinger's low level features. 2356 @hide --> 2357 <permission android:name="android.permission.ACCESS_INPUT_FLINGER" 2358 android:label="@string/permlab_accessInputFlinger" 2359 android:description="@string/permdesc_accessInputFlinger" 2360 android:protectionLevel="signature" /> 2361 2362 <!-- Allows an application to configure and connect to Wifi displays 2363 @hide --> 2364 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY" 2365 android:label="@string/permlab_configureWifiDisplay" 2366 android:description="@string/permdesc_configureWifiDisplay" 2367 android:protectionLevel="signature" /> 2368 2369 <!-- Allows an application to control low-level features of Wifi displays 2370 such as opening an RTSP socket. This permission should only be used 2371 by the display manager. 2372 @hide --> 2373 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY" 2374 android:label="@string/permlab_controlWifiDisplay" 2375 android:description="@string/permdesc_controlWifiDisplay" 2376 android:protectionLevel="signature" /> 2377 2378 <!-- @SystemApi Allows an application to capture audio output. 2379 <p>Not for use by third-party applications.</p> --> 2380 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT" 2381 android:label="@string/permlab_captureAudioOutput" 2382 android:description="@string/permdesc_captureAudioOutput" 2383 android:protectionLevel="signature|system" /> 2384 2385 <!-- @SystemApi Allows an application to capture audio for hotword detection. 2386 <p>Not for use by third-party applications.</p> 2387 @hide --> 2388 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD" 2389 android:label="@string/permlab_captureAudioHotword" 2390 android:description="@string/permdesc_captureAudioHotword" 2391 android:protectionLevel="signature|system" /> 2392 2393 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions. 2394 <p>Not for use by third-party applications.</p> 2395 @hide --> 2396 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING" 2397 android:label="@string/permlab_modifyAudioRouting" 2398 android:description="@string/permdesc_modifyAudioRouting" 2399 android:protectionLevel="signature|system" /> 2400 2401 <!-- @SystemApi Allows an application to capture video output. 2402 <p>Not for use by third-party applications.</p> --> 2403 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT" 2404 android:label="@string/permlab_captureVideoOutput" 2405 android:description="@string/permdesc_captureVideoOutput" 2406 android:protectionLevel="signature|system" /> 2407 2408 <!-- @SystemApi Allows an application to capture secure video output. 2409 <p>Not for use by third-party applications.</p> --> 2410 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT" 2411 android:label="@string/permlab_captureSecureVideoOutput" 2412 android:description="@string/permdesc_captureSecureVideoOutput" 2413 android:protectionLevel="signature|system" /> 2414 2415 <!-- @SystemApi Allows an application to know what content is playing and control its playback. 2416 <p>Not for use by third-party applications due to privacy of media consumption</p> --> 2417 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL" 2418 android:label="@string/permlab_mediaContentControl" 2419 android:description="@string/permdesc_mediaContentControl" 2420 android:protectionLevel="signature|system" /> 2421 2422 <!-- Required to be able to disable the device (very dangerous!). 2423 <p>Not for use by third-party applications.. --> 2424 <permission android:name="android.permission.BRICK" 2425 android:label="@string/permlab_brick" 2426 android:description="@string/permdesc_brick" 2427 android:protectionLevel="signature" /> 2428 2429 <!-- @SystemApi Required to be able to reboot the device. 2430 <p>Not for use by third-party applications. --> 2431 <permission android:name="android.permission.REBOOT" 2432 android:label="@string/permlab_reboot" 2433 android:description="@string/permdesc_reboot" 2434 android:protectionLevel="signature|system" /> 2435 2436 <!-- Allows low-level access to power management. 2437 <p>Not for use by third-party applications. --> 2438 <permission android:name="android.permission.DEVICE_POWER" 2439 android:label="@string/permlab_devicePower" 2440 android:description="@string/permdesc_devicePower" 2441 android:protectionLevel="signature" /> 2442 2443 <!-- Allows access to the PowerManager.userActivity function. 2444 <p>Not for use by third-party applications. @hide @SystemApi --> 2445 <permission android:name="android.permission.USER_ACTIVITY" 2446 android:label="@string/permlab_userActivity" 2447 android:description="@string/permdesc_userActivity" 2448 android:protectionLevel="signature|system" /> 2449 2450 <!-- @hide Allows low-level access to tun tap driver --> 2451 <permission android:name="android.permission.NET_TUNNELING" 2452 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2453 android:protectionLevel="signature" /> 2454 2455 <!-- Run as a manufacturer test application, running as the root user. 2456 Only available when the device is running in manufacturer test mode. 2457 <p>Not for use by third-party applications. --> 2458 <permission android:name="android.permission.FACTORY_TEST" 2459 android:label="@string/permlab_factoryTest" 2460 android:description="@string/permdesc_factoryTest" 2461 android:protectionLevel="signature" /> 2462 2463 <!-- Allows an application to broadcast a notification that an application 2464 package has been removed. 2465 <p>Not for use by third-party applications. --> 2466 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED" 2467 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2468 android:label="@string/permlab_broadcastPackageRemoved" 2469 android:description="@string/permdesc_broadcastPackageRemoved" 2470 android:protectionLevel="signature" /> 2471 2472 <!-- Allows an application to broadcast an SMS receipt notification. 2473 <p>Not for use by third-party applications. --> 2474 <permission android:name="android.permission.BROADCAST_SMS" 2475 android:permissionGroup="android.permission-group.MESSAGES" 2476 android:label="@string/permlab_broadcastSmsReceived" 2477 android:description="@string/permdesc_broadcastSmsReceived" 2478 android:protectionLevel="signature" /> 2479 2480 <!-- Allows an application to broadcast a WAP PUSH receipt notification. 2481 <p>Not for use by third-party applications. --> 2482 <permission android:name="android.permission.BROADCAST_WAP_PUSH" 2483 android:permissionGroup="android.permission-group.MESSAGES" 2484 android:label="@string/permlab_broadcastWapPush" 2485 android:description="@string/permdesc_broadcastWapPush" 2486 android:protectionLevel="signature" /> 2487 2488 <!-- @SystemApi Allows an application to broadcast a SCORE_NETWORKS request. 2489 <p>Not for use by third-party applications. @hide --> 2490 <permission android:name="android.permission.BROADCAST_SCORE_NETWORKS" 2491 android:label="@string/permlab_broadcastScoreNetworks" 2492 android:description="@string/permdesc_broadcastScoreNetworks" 2493 android:protectionLevel="signature|system" /> 2494 2495 <!-- @SystemApi Not for use by third-party applications. --> 2496 <permission android:name="android.permission.MASTER_CLEAR" 2497 android:label="@string/permlab_masterClear" 2498 android:description="@string/permdesc_masterClear" 2499 android:protectionLevel="signature|system" /> 2500 2501 <!-- @SystemApi Allows an application to call any phone number, including emergency 2502 numbers, without going through the Dialer user interface for the user 2503 to confirm the call being placed. 2504 <p>Not for use by third-party applications. --> 2505 <permission android:name="android.permission.CALL_PRIVILEGED" 2506 android:label="@string/permlab_callPrivileged" 2507 android:description="@string/permdesc_callPrivileged" 2508 android:protectionLevel="signature|system" /> 2509 2510 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide --> 2511 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING" 2512 android:label="@string/permlab_performCdmaProvisioning" 2513 android:description="@string/permdesc_performCdmaProvisioning" 2514 android:protectionLevel="signature|system" /> 2515 2516 <!-- @SystemApi Allows enabling/disabling location update notifications from 2517 the radio. 2518 <p>Not for use by third-party applications. --> 2519 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES" 2520 android:label="@string/permlab_locationUpdates" 2521 android:description="@string/permdesc_locationUpdates" 2522 android:protectionLevel="signature|system" /> 2523 2524 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin 2525 database, to change values that get uploaded. 2526 <p>Not for use by third-party applications. --> 2527 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES" 2528 android:label="@string/permlab_checkinProperties" 2529 android:description="@string/permdesc_checkinProperties" 2530 android:protectionLevel="signature|system" /> 2531 2532 <!-- @SystemApi Allows an application to collect component usage 2533 statistics @hide --> 2534 <permission android:name="android.permission.PACKAGE_USAGE_STATS" 2535 android:label="@string/permlab_pkgUsageStats" 2536 android:description="@string/permdesc_pkgUsageStats" 2537 android:protectionLevel="signature|development|appop" /> 2538 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" /> 2539 2540 <!-- @SystemApi Allows an application to collect battery statistics --> 2541 <permission android:name="android.permission.BATTERY_STATS" 2542 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2543 android:label="@string/permlab_batteryStats" 2544 android:description="@string/permdesc_batteryStats" 2545 android:protectionLevel="signature|system|development" /> 2546 2547 <!-- @SystemApi Allows an application to control the backup and restore process. 2548 <p>Not for use by third-party applications. 2549 @hide pending API council --> 2550 <permission android:name="android.permission.BACKUP" 2551 android:label="@string/permlab_backup" 2552 android:description="@string/permdesc_backup" 2553 android:protectionLevel="signature|system" /> 2554 2555 <!-- Allows a package to launch the secure full-backup confirmation UI. 2556 ONLY the system process may hold this permission. 2557 @hide --> 2558 <permission android:name="android.permission.CONFIRM_FULL_BACKUP" 2559 android:label="@string/permlab_confirm_full_backup" 2560 android:description="@string/permdesc_confirm_full_backup" 2561 android:protectionLevel="signature" /> 2562 2563 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService}, 2564 to ensure that only the system can bind to it. --> 2565 <permission android:name="android.permission.BIND_REMOTEVIEWS" 2566 android:label="@string/permlab_bindRemoteViews" 2567 android:description="@string/permdesc_bindRemoteViews" 2568 android:protectionLevel="signature|system" /> 2569 2570 <!-- @SystemApi Allows an application to tell the AppWidget service which application 2571 can access AppWidget's data. The normal user flow is that a user 2572 picks an AppWidget to go into a particular host, thereby giving that 2573 host application access to the private data from the AppWidget app. 2574 An application that has this permission should honor that contract. 2575 <p>Not for use by third-party applications. --> 2576 <permission android:name="android.permission.BIND_APPWIDGET" 2577 android:permissionGroup="android.permission-group.PERSONAL_INFO" 2578 android:label="@string/permlab_bindGadget" 2579 android:description="@string/permdesc_bindGadget" 2580 android:protectionLevel="signature|system" /> 2581 2582 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new 2583 keyguard widget 2584 @hide --> 2585 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET" 2586 android:permissionGroup="android.permission-group.PERSONAL_INFO" 2587 android:protectionLevel="signature|system" /> 2588 2589 <!-- @SystemApi Internal permission allowing an application to query/set which 2590 applications can bind AppWidgets. 2591 @hide --> 2592 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS" 2593 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2594 android:protectionLevel="signature|system" /> 2595 2596 <!-- Allows applications to change the background data setting. 2597 <p>Not for use by third-party applications. 2598 @hide pending API council --> 2599 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING" 2600 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2601 android:protectionLevel="signature" 2602 android:description="@string/permdesc_changeBackgroundDataSetting" 2603 android:label="@string/permlab_changeBackgroundDataSetting" /> 2604 2605 <!-- @SystemApi This permission can be used on content providers to allow the global 2606 search system to access their data. Typically it used when the 2607 provider has some permissions protecting it (which global search 2608 would not be expected to hold), and added as a read-only permission 2609 to the path in the provider where global search queries are 2610 performed. This permission can not be held by regular applications; 2611 it is used by applications to protect themselves from everyone else 2612 besides global search. --> 2613 <permission android:name="android.permission.GLOBAL_SEARCH" 2614 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2615 android:protectionLevel="signature|system" /> 2616 2617 <!-- Internal permission protecting access to the global search 2618 system: ensures that only the system can access the provider 2619 to perform queries (since this otherwise provides unrestricted 2620 access to a variety of content providers), and to write the 2621 search statistics (to keep applications from gaming the source 2622 ranking). 2623 @hide --> 2624 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL" 2625 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2626 android:protectionLevel="signature" /> 2627 2628 <!-- @SystemApi Internal permission to allows an application to read indexable data. 2629 @hide --> 2630 <permission android:name="android.permission.READ_SEARCH_INDEXABLES" 2631 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2632 android:protectionLevel="signature|system" /> 2633 2634 <!-- @SystemApi Allows applications to set a live wallpaper. 2635 @hide XXX Change to signature once the picker is moved to its 2636 own apk as Ghod Intended. --> 2637 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT" 2638 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2639 android:protectionLevel="signature|system" /> 2640 2641 <!-- @SystemApi Allows applications to read dream settings and dream state. 2642 @hide --> 2643 <permission android:name="android.permission.READ_DREAM_STATE" 2644 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2645 android:protectionLevel="signature|system" /> 2646 2647 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming. 2648 @hide --> 2649 <permission android:name="android.permission.WRITE_DREAM_STATE" 2650 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 2651 android:protectionLevel="signature|system" /> 2652 2653 <!-- @SystemApi Allow an application to read and write the cache partition. 2654 @hide --> 2655 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM" 2656 android:label="@string/permlab_cache_filesystem" 2657 android:description="@string/permdesc_cache_filesystem" 2658 android:protectionLevel="signature|system" /> 2659 2660 <!-- Must be required by default container service so that only 2661 the system can bind to it and use it to copy 2662 protected data to secure containers or files 2663 accessible to the system. 2664 @hide --> 2665 <permission android:name="android.permission.COPY_PROTECTED_DATA" 2666 android:label="@string/permlab_copyProtectedData" 2667 android:description="@string/permlab_copyProtectedData" 2668 android:protectionLevel="signature" /> 2669 2670 <!-- @SystemApi Internal permission protecting access to the encryption methods 2671 @hide 2672 --> 2673 <permission android:name="android.permission.CRYPT_KEEPER" 2674 android:protectionLevel="signature|system" /> 2675 2676 <!-- @SystemApi Allows an application to read historical network usage for 2677 specific networks and applications. @hide --> 2678 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY" 2679 android:label="@string/permlab_readNetworkUsageHistory" 2680 android:description="@string/permdesc_readNetworkUsageHistory" 2681 android:protectionLevel="signature|system" /> 2682 2683 <!-- Allows an application to manage network policies (such as warning and disable 2684 limits) and to define application-specific rules. @hide --> 2685 <permission android:name="android.permission.MANAGE_NETWORK_POLICY" 2686 android:label="@string/permlab_manageNetworkPolicy" 2687 android:description="@string/permdesc_manageNetworkPolicy" 2688 android:protectionLevel="signature" /> 2689 2690 <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used 2691 by system services like download manager and media server. Not for use by 2692 third party apps. @hide --> 2693 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING" 2694 android:label="@string/permlab_modifyNetworkAccounting" 2695 android:description="@string/permdesc_modifyNetworkAccounting" 2696 android:protectionLevel="signature|system" /> 2697 2698 <!-- C2DM permission. 2699 @hide Used internally. 2700 --> 2701 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE" 2702 android:protectionLevel="signature" /> 2703 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/> 2704 2705 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will 2706 trust it to verify packages. 2707 --> 2708 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT" 2709 android:label="@string/permlab_packageVerificationAgent" 2710 android:description="@string/permdesc_packageVerificationAgent" 2711 android:protectionLevel="signature|system" /> 2712 2713 <!-- Must be required by package verifier receiver, to ensure that only the 2714 system can interact with it. 2715 @hide 2716 --> 2717 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER" 2718 android:label="@string/permlab_bindPackageVerifier" 2719 android:description="@string/permdesc_bindPackageVerifier" 2720 android:protectionLevel="signature" /> 2721 2722 <!-- @SystemApi Allows applications to access serial ports via the SerialManager. 2723 @hide --> 2724 <permission android:name="android.permission.SERIAL_PORT" 2725 android:label="@string/permlab_serialPort" 2726 android:description="@string/permdesc_serialPort" 2727 android:protectionLevel="signature|system" /> 2728 2729 <!-- Allows the holder to access content providers from outside an ApplicationThread. 2730 This permission is enforced by the ActivityManagerService on the corresponding APIs, 2731 in particular ActivityManagerService#getContentProviderExternal(String) and 2732 ActivityManagerService#removeContentProviderExternal(String). 2733 @hide 2734 --> 2735 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY" 2736 android:label="@string/permlab_accessContentProvidersExternally" 2737 android:description="@string/permdesc_accessContentProvidersExternally" 2738 android:protectionLevel="signature" /> 2739 2740 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless 2741 OTA reboot *not* occur while the lock is held. 2742 @hide --> 2743 <permission android:name="android.permission.UPDATE_LOCK" 2744 android:label="@string/permlab_updateLock" 2745 android:description="@string/permdesc_updateLock" 2746 android:protectionLevel="signatureOrSystem" /> 2747 2748 <!-- @SystemApi Allows an application to read the current set of notifications, including 2749 any metadata and intents attached. 2750 @hide --> 2751 <permission android:name="android.permission.ACCESS_NOTIFICATIONS" 2752 android:label="@string/permlab_accessNotifications" 2753 android:description="@string/permdesc_accessNotifications" 2754 android:protectionLevel="signature|system" /> 2755 2756 <!-- Allows access to keyguard secure storage. Only allowed for system processes. 2757 @hide --> 2758 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE" 2759 android:protectionLevel="signature" 2760 android:label="@string/permlab_access_keyguard_secure_storage" 2761 android:description="@string/permdesc_access_keyguard_secure_storage" /> 2762 2763 <!-- Allows an application to control keyguard. Only allowed for system processes. 2764 @hide --> 2765 <permission android:name="android.permission.CONTROL_KEYGUARD" 2766 android:protectionLevel="signature" 2767 android:label="@string/permlab_control_keyguard" 2768 android:description="@string/permdesc_control_keyguard" /> 2769 2770 <!-- Allows an application to listen to trust changes. Only allowed for system processes. 2771 @hide --> 2772 <permission android:name="android.permission.TRUST_LISTENER" 2773 android:protectionLevel="signature" 2774 android:label="@string/permlab_trust_listener" 2775 android:description="@string/permdesc_trust_listener" /> 2776 2777 <!-- @SystemApi Allows an application to provide a trust agent. 2778 @hide For security reasons, this is a platform-only permission. --> 2779 <permission android:name="android.permission.PROVIDE_TRUST_AGENT" 2780 android:protectionLevel="signatureOrSystem" 2781 android:label="@string/permlab_provide_trust_agent" 2782 android:description="@string/permdesc_provide_trust_agent" /> 2783 2784 <!-- Allows an application to launch the trust agent settings activity. 2785 @hide --> 2786 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS" 2787 android:protectionLevel="signatureOrSystem" 2788 android:label="@string/permlab_launch_trust_agent_settings" 2789 android:description="@string/permdesc_launch_trust_agent_settings" /> 2790 2791 <!-- @SystemApi Must be required by an {@link 2792 android.service.trust.TrustAgentService}, 2793 to ensure that only the system can bind to it. 2794 @hide --> 2795 <permission android:name="android.permission.BIND_TRUST_AGENT" 2796 android:protectionLevel="signature" 2797 android:label="@string/permlab_bind_trust_agent_service" 2798 android:description="@string/permdesc_bind_trust_agent_service" /> 2799 2800 <!-- Must be required by an {@link 2801 android.service.notification.NotificationListenerService}, 2802 to ensure that only the system can bind to it. --> 2803 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE" 2804 android:label="@string/permlab_bindNotificationListenerService" 2805 android:description="@string/permdesc_bindNotificationListenerService" 2806 android:protectionLevel="signature" /> 2807 2808 <!-- @SystemApi Must be required by a {@link 2809 android.service.notification.ConditionProviderService}, 2810 to ensure that only the system can bind to it. 2811 @hide --> 2812 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE" 2813 android:label="@string/permlab_bindConditionProviderService" 2814 android:description="@string/permdesc_bindConditionProviderService" 2815 android:protectionLevel="signature" /> 2816 2817 <!-- Must be required by an {@link android.service.dreams.DreamService}, 2818 to ensure that only the system can bind to it. --> 2819 <permission android:name="android.permission.BIND_DREAM_SERVICE" 2820 android:label="@string/permlab_bindDreamService" 2821 android:description="@string/permdesc_bindDreamService" 2822 android:protectionLevel="signature" /> 2823 2824 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the 2825 carrier setup application to enforce that this permission is required 2826 @hide This is not a third-party API (intended for OEMs and system apps). --> 2827 <permission android:name="android.permission.INVOKE_CARRIER_SETUP" 2828 android:label="@string/permlab_invokeCarrierSetup" 2829 android:description="@string/permdesc_invokeCarrierSetup" 2830 android:protectionLevel="signature|system" /> 2831 2832 <!-- @SystemApi Allows an application to listen for network condition observations. 2833 @hide This is not a third-party API (intended for system apps). --> 2834 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS" 2835 android:label="@string/permlab_accessNetworkConditions" 2836 android:description="@string/permdesc_accessNetworkConditions" 2837 android:protectionLevel="signature|system" /> 2838 2839 <!-- @SystemApi Allows an application to provision and access DRM certificates 2840 @hide This is not a third-party API (intended for system apps). --> 2841 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES" 2842 android:label="@string/permlab_accessDrmCertificates" 2843 android:description="@string/permdesc_accessDrmCertificates" 2844 android:protectionLevel="signature|system" /> 2845 2846 <!-- Api Allows an application to manage media projection sessions. 2847 @hide This is not a third-party API (intended for system apps). --> 2848 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION" 2849 android:label="@string/permlab_manageMediaProjection" 2850 android:description="@string/permdesc_manageMediaProjection" 2851 android:protectionLevel="signature" /> 2852 2853 <!-- @SystemApi Allows an application to read install sessions 2854 @hide This is not a third-party API (intended for system apps). --> 2855 <permission android:name="android.permission.READ_INSTALL_SESSIONS" 2856 android:label="@string/permlab_readInstallSessions" 2857 android:description="@string/permdesc_readInstallSessions" /> 2858 2859 <!-- @SystemApi Allows an application to remove DRM certificates 2860 @hide This is not a third-party API (intended for system apps). --> 2861 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES" 2862 android:label="@string/permlab_removeDrmCertificates" 2863 android:description="@string/permdesc_removeDrmCertificates" 2864 android:protectionLevel="signature|system" /> 2865 2866 <!-- The system process is explicitly the only one allowed to launch the 2867 confirmation UI for full backup/restore --> 2868 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/> 2869 2870 <application android:process="system" 2871 android:persistent="true" 2872 android:hasCode="false" 2873 android:label="@string/android_system_label" 2874 android:allowClearUserData="false" 2875 android:backupAgent="com.android.server.backup.SystemBackupAgent" 2876 android:killAfterRestore="false" 2877 android:icon="@drawable/ic_launcher_android" 2878 android:supportsRtl="true"> 2879 <activity android:name="com.android.internal.app.ChooserActivity" 2880 android:theme="@style/Theme.DeviceDefault.Resolver" 2881 android:finishOnCloseSystemDialogs="true" 2882 android:excludeFromRecents="true" 2883 android:documentLaunchMode="never" 2884 android:relinquishTaskIdentity="true" 2885 android:process=":ui"> 2886 <intent-filter> 2887 <action android:name="android.intent.action.CHOOSER" /> 2888 <category android:name="android.intent.category.DEFAULT" /> 2889 </intent-filter> 2890 </activity> 2891 <activity android:name="com.android.internal.app.IntentForwarderActivity" 2892 android:finishOnCloseSystemDialogs="true" 2893 android:theme="@style/Theme.NoDisplay" 2894 android:excludeFromRecents="true" 2895 android:label="@string/user_owner_label" 2896 android:exported="true" 2897 > 2898 </activity> 2899 <activity-alias android:name="com.android.internal.app.ForwardIntentToUserOwner" 2900 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 2901 android:exported="true" 2902 android:label="@string/user_owner_label"> 2903 </activity-alias> 2904 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile" 2905 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 2906 android:icon="@drawable/ic_corp_icon" 2907 android:exported="true" 2908 android:label="@string/managed_profile_label"> 2909 </activity-alias> 2910 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity" 2911 android:theme="@style/Theme.Material.Dialog" 2912 android:label="@string/heavy_weight_switcher_title" 2913 android:finishOnCloseSystemDialogs="true" 2914 android:excludeFromRecents="true" 2915 android:process=":ui"> 2916 </activity> 2917 <activity android:name="com.android.internal.app.PlatLogoActivity" 2918 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen" 2919 android:process=":ui"> 2920 </activity> 2921 <activity android:name="com.android.internal.app.DisableCarModeActivity" 2922 android:theme="@style/Theme.NoDisplay" 2923 android:excludeFromRecents="true" 2924 android:process=":ui"> 2925 </activity> 2926 2927 <activity android:name="android.accounts.ChooseAccountActivity" 2928 android:excludeFromRecents="true" 2929 android:exported="true" 2930 android:theme="@android:style/Theme.Material.Dialog" 2931 android:label="@string/choose_account_label" 2932 android:process=":ui"> 2933 </activity> 2934 2935 <activity android:name="android.accounts.ChooseTypeAndAccountActivity" 2936 android:excludeFromRecents="true" 2937 android:exported="true" 2938 android:theme="@android:style/Theme.Material.Dialog" 2939 android:label="@string/choose_account_label" 2940 android:process=":ui"> 2941 </activity> 2942 2943 <activity android:name="android.accounts.ChooseAccountTypeActivity" 2944 android:excludeFromRecents="true" 2945 android:theme="@android:style/Theme.Material.Dialog" 2946 android:label="@string/choose_account_label" 2947 android:process=":ui"> 2948 </activity> 2949 2950 <activity android:name="android.accounts.CantAddAccountActivity" 2951 android:excludeFromRecents="true" 2952 android:exported="true" 2953 android:theme="@android:style/Theme.Material.Dialog.NoActionBar" 2954 android:process=":ui"> 2955 </activity> 2956 2957 <activity android:name="android.accounts.GrantCredentialsPermissionActivity" 2958 android:excludeFromRecents="true" 2959 android:exported="true" 2960 android:theme="@android:style/Theme.Material.DialogWhenLarge" 2961 android:process=":ui"> 2962 </activity> 2963 2964 <activity android:name="android.content.SyncActivityTooManyDeletes" 2965 android:theme="@android:style/Theme.Holo.Dialog" 2966 android:label="@string/sync_too_many_deletes" 2967 android:process=":ui"> 2968 </activity> 2969 2970 <activity android:name="com.android.server.ShutdownActivity" 2971 android:permission="android.permission.SHUTDOWN" 2972 android:excludeFromRecents="true"> 2973 <intent-filter> 2974 <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" /> 2975 <category android:name="android.intent.category.DEFAULT" /> 2976 </intent-filter> 2977 <intent-filter> 2978 <action android:name="android.intent.action.REBOOT" /> 2979 <category android:name="android.intent.category.DEFAULT" /> 2980 </intent-filter> 2981 </activity> 2982 2983 <activity android:name="com.android.internal.app.NetInitiatedActivity" 2984 android:theme="@style/Theme.Holo.Dialog.Alert" 2985 android:excludeFromRecents="true" 2986 android:process=":ui"> 2987 </activity> 2988 2989 <activity android:name="com.android.internal.app.RestrictionsPinActivity" 2990 android:theme="@style/Theme.Material.Light.Dialog.Alert" 2991 android:excludeFromRecents="true" 2992 android:windowSoftInputMode="adjustPan" 2993 android:process=":ui"> 2994 <intent-filter android:priority="100"> 2995 <action android:name="android.intent.action.RESTRICTIONS_CHALLENGE" /> 2996 <category android:name="android.intent.category.DEFAULT" /> 2997 </intent-filter> 2998 </activity> 2999 3000 <receiver android:name="com.android.server.BootReceiver" 3001 android:primaryUserOnly="true"> 3002 <intent-filter android:priority="1000"> 3003 <action android:name="android.intent.action.BOOT_COMPLETED" /> 3004 </intent-filter> 3005 </receiver> 3006 3007 <receiver android:name="com.android.server.updates.CertPinInstallReceiver" > 3008 <intent-filter> 3009 <action android:name="android.intent.action.UPDATE_PINS" /> 3010 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3011 </intent-filter> 3012 </receiver> 3013 3014 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" > 3015 <intent-filter> 3016 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" /> 3017 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3018 </intent-filter> 3019 </receiver> 3020 3021 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" > 3022 <intent-filter> 3023 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" /> 3024 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3025 </intent-filter> 3026 </receiver> 3027 3028 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" > 3029 <intent-filter> 3030 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" /> 3031 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3032 </intent-filter> 3033 </receiver> 3034 3035 <receiver android:name="com.android.server.updates.TZInfoInstallReceiver" > 3036 <intent-filter> 3037 <action android:name="android.intent.action.UPDATE_TZINFO" /> 3038 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3039 </intent-filter> 3040 </receiver> 3041 3042 <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" > 3043 <intent-filter> 3044 <action android:name="android.intent.action.UPDATE_SEPOLICY" /> 3045 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 3046 </intent-filter> 3047 </receiver> 3048 3049 <receiver android:name="com.android.server.MasterClearReceiver" 3050 android:permission="android.permission.MASTER_CLEAR"> 3051 <intent-filter 3052 android:priority="100" > 3053 <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR --> 3054 <action android:name="android.intent.action.MASTER_CLEAR" /> 3055 3056 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR --> 3057 <action android:name="com.google.android.c2dm.intent.RECEIVE" /> 3058 <category android:name="android.intent.category.MASTER_CLEAR" /> 3059 </intent-filter> 3060 </receiver> 3061 3062 <service android:name="com.android.internal.os.storage.ExternalStorageFormatter" 3063 android:permission="android.permission.MASTER_CLEAR" 3064 android:exported="true" /> 3065 3066 <service android:name="android.hardware.location.GeofenceHardwareService" 3067 android:permission="android.permission.LOCATION_HARDWARE" 3068 android:exported="false" /> 3069 3070 <service android:name="com.android.internal.backup.LocalTransportService" 3071 android:permission="android.permission.CONFIRM_FULL_BACKUP" 3072 android:exported="false"> 3073 <intent-filter> 3074 <action android:name="android.backup.TRANSPORT_HOST" /> 3075 </intent-filter> 3076 </service> 3077 3078 <service android:name="com.android.server.MountServiceIdler" 3079 android:exported="true" 3080 android:permission="android.permission.BIND_JOB_SERVICE" > 3081 </service> 3082 3083 <service android:name="com.android.server.backup.FullBackupJob" 3084 android:exported="true" 3085 android:permission="android.permission.BIND_JOB_SERVICE" > 3086 </service> 3087 3088 <service 3089 android:name="com.android.server.pm.BackgroundDexOptService" 3090 android:exported="true" 3091 android:permission="android.permission.BIND_JOB_SERVICE"> 3092 </service> 3093 3094 </application> 3095 3096</manifest> 3097