AndroidManifest.xml revision 99bd4eabd17c1211adcd8eb9afeb5e1c6077617c
1<?xml version="1.0" encoding="utf-8"?>
2<!--
3/* //device/apps/common/AndroidManifest.xml
4**
5** Copyright 2006, The Android Open Source Project
6**
7** Licensed under the Apache License, Version 2.0 (the "License");
8** you may not use this file except in compliance with the License.
9** You may obtain a copy of the License at
10**
11**     http://www.apache.org/licenses/LICENSE-2.0
12**
13** Unless required by applicable law or agreed to in writing, software
14** distributed under the License is distributed on an "AS IS" BASIS,
15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16** See the License for the specific language governing permissions and
17** limitations under the License.
18*/
19-->
20<manifest xmlns:android="http://schemas.android.com/apk/res/android"
21    package="android" coreApp="true" android:sharedUserId="android.uid.system"
22    android:sharedUserLabel="@string/android_system_label">
23
24    <!-- ================================================ -->
25    <!-- Special broadcasts that only the system can send -->
26    <!-- ================================================ -->
27    <eat-comment />
28
29    <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
30    <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
31    <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
32    <protected-broadcast android:name="android.intent.action.TIME_SET" />
33    <protected-broadcast android:name="android.intent.action.TIME_TICK" />
34    <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
35    <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
36    <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
37    <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
38    <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
39    <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
40    <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
41    <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
42    <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
43    <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
44    <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
45    <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
46    <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
47    <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
48    <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
49    <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
50    <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
51    <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
52    <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
53    <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
54    <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
55    <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
56    <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
57    <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
58    <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
59    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
60    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
61    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
62    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
63    <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
64    <protected-broadcast android:name="android.intent.action.REBOOT" />
65    <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
66    <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
67    <protected-broadcast android:name="android.intent.action.USER_ADDED" />
68    <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
69    <protected-broadcast android:name="android.intent.action.USER_STARTING" />
70    <protected-broadcast android:name="android.intent.action.USER_STARTED" />
71    <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
72    <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
73    <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
74    <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
75    <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
76
77    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
78
79    <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
80    <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
81    <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
82    <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
83
84    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
85    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
86    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
87    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
88    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
89    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
90
91    <protected-broadcast android:name="android.backup.intent.RUN" />
92    <protected-broadcast android:name="android.backup.intent.CLEAR" />
93    <protected-broadcast android:name="android.backup.intent.INIT" />
94
95    <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
96    <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
97    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
98    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
99    <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
100    <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
101    <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
102    <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
103    <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
104    <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
105    <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
106    <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
107    <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
108    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
109    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
110    <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
111    <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
112    <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
113    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
114    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
115    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
116    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
117    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
118    <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
119    <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
120    <protected-broadcast
121        android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
122    <protected-broadcast
123        android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
124    <protected-broadcast
125        android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
126    <protected-broadcast
127        android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
128    <protected-broadcast
129        android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
130    <protected-broadcast
131        android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
132    <protected-broadcast
133        android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
134    <protected-broadcast
135        android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
136    <protected-broadcast
137        android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
138    <protected-broadcast
139        android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
140    <protected-broadcast
141        android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
142    <protected-broadcast
143        android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
144    <protected-broadcast
145        android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
146    <protected-broadcast
147        android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
148   <protected-broadcast
149        android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
150    <protected-broadcast
151        android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
152    <protected-broadcast
153        android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
154    <protected-broadcast
155        android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
156    <protected-broadcast
157        android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
158    <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" />
159    <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
160    <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
161    <protected-broadcast android:name="android.btopp.intent.action.LIST" />
162    <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
163    <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
164    <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
165    <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
166    <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
167    <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
168    <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
169    <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
170    <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
171    <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
172    <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
173
174    <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
175
176    <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
177    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
178    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
179    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
180    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
181
182    <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
183    <protected-broadcast android:name="android.intent.action.ANALOG_AUDIO_DOCK_PLUG" />
184    <protected-broadcast android:name="android.intent.action.DIGITAL_AUDIO_DOCK_PLUG" />
185    <protected-broadcast android:name="android.intent.action.HDMI_AUDIO_PLUG" />
186    <protected-broadcast android:name="android.intent.action.USB_AUDIO_ACCESSORY_PLUG" />
187    <protected-broadcast android:name="android.intent.action.USB_AUDIO_DEVICE_PLUG" />
188
189    <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
190    <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
191    <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
192    <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
193    <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
194    <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
195    <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
196    <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
197
198    <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
199    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
200    <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
201    <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
202    <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
203    <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
204    <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
205    <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
206    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
207    <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
208
209    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
210    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
211    <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
212    <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
213    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
214
215    <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
216
217    <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" />
218    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
219    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
220    <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
221
222    <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
223    <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
224    <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
225
226    <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
227
228    <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
229    <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
230    <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
231    <protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" />
232
233    <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
234    <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
235    <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
236    <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
237    <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
238    <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
239    <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
240    <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
241    <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
242    <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
243    <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
244    <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
245    <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
246    <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
247    <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
248    <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
249    <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
250    <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
251    <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
252    <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
253    <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
254    <protected-broadcast
255            android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
256    <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
257    <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
258    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
259    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
260    <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
261    <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
262    <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
263    <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" />
264
265    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
266    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
267
268    <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
269
270    <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
271
272    <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
273    <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
274    <protected-broadcast android:name="android.location.MODE_CHANGED" />
275    <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
276    <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
277
278    <protected-broadcast
279        android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
280
281    <!-- Defined in RestrictionsManager -->
282    <protected-broadcast
283        android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
284    <!-- Defined in RestrictionsManager -->
285
286    <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
287    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
288    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
289    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
290    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
291
292
293    <!-- ====================================== -->
294    <!-- Permissions for things that cost money -->
295    <!-- ====================================== -->
296    <eat-comment />
297
298    <!-- Used for permissions that can be used to make the user spend money
299         without their direct involvement. -->
300    <permission-group android:name="android.permission-group.COST_MONEY"
301        android:label="@string/permgrouplab_costMoney"
302        android:description="@string/permgroupdesc_costMoney" />
303
304    <!-- ================================== -->
305    <!-- Permissions for accessing messages -->
306    <!-- ================================== -->
307    <eat-comment />
308
309    <!-- Used for permissions that allow an application to send messages
310         on behalf of the user or intercept messages being received by the
311         user.  This is primarily intended for SMS/MMS messaging, such as
312         receiving or reading an MMS. -->
313    <permission-group android:name="android.permission-group.MESSAGES"
314        android:label="@string/permgrouplab_messages"
315        android:icon="@drawable/perm_group_messages"
316        android:description="@string/permgroupdesc_messages"
317        android:permissionGroupFlags="personalInfo"
318        android:priority="360"/>
319
320    <!-- Allows an application to send SMS messages. -->
321    <permission android:name="android.permission.SEND_SMS"
322        android:permissionGroup="android.permission-group.MESSAGES"
323        android:protectionLevel="dangerous"
324        android:permissionFlags="costsMoney"
325        android:label="@string/permlab_sendSms"
326        android:description="@string/permdesc_sendSms" />
327
328    <!-- @SystemApi Allows an application (Phone) to send a request to other applications
329         to handle the respond-via-message action during incoming calls.
330         <p>Not for use by third-party applications. -->
331    <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
332        android:permissionGroup="android.permission-group.MESSAGES"
333        android:protectionLevel="signature|system"
334        android:label="@string/permlab_sendRespondViaMessageRequest"
335        android:description="@string/permdesc_sendRespondViaMessageRequest" />
336
337    <!-- Allows an application to monitor incoming SMS messages, to record
338         or perform processing on them. -->
339    <permission android:name="android.permission.RECEIVE_SMS"
340        android:permissionGroup="android.permission-group.MESSAGES"
341        android:protectionLevel="dangerous"
342        android:label="@string/permlab_receiveSms"
343        android:description="@string/permdesc_receiveSms" />
344
345    <!-- Allows an application to monitor incoming MMS messages, to record
346         or perform processing on them. -->
347    <permission android:name="android.permission.RECEIVE_MMS"
348        android:permissionGroup="android.permission-group.MESSAGES"
349        android:protectionLevel="dangerous"
350        android:label="@string/permlab_receiveMms"
351        android:description="@string/permdesc_receiveMms" />
352
353    <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
354         to record or display them to the user.
355         <p>Not for use by third-party applications.
356         @hide Pending API council approval -->
357    <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
358        android:permissionGroup="android.permission-group.MESSAGES"
359        android:protectionLevel="signature|system"
360        android:label="@string/permlab_receiveEmergencyBroadcast"
361        android:description="@string/permdesc_receiveEmergencyBroadcast" />
362
363    <!-- Allows an application to read previously received cell broadcast
364         messages and to register a content observer to get notifications when
365         a cell broadcast has been received and added to the database. For
366         emergency alerts, the database is updated immediately after the
367         alert dialog and notification sound/vibration/speech are presented.
368         The "read" column is then updated after the user dismisses the alert.
369         This enables supplementary emergency assistance apps to start loading
370         additional emergency information (if Internet access is available)
371         when the alert is first received, and to delay presenting the info
372         to the user until after the initial alert dialog is dismissed.
373         @hide Pending API council approval -->
374    <permission android:name="android.permission.READ_CELL_BROADCASTS"
375        android:permissionGroup="android.permission-group.MESSAGES"
376        android:protectionLevel="dangerous"
377        android:label="@string/permlab_readCellBroadcasts"
378        android:description="@string/permdesc_readCellBroadcasts" />
379
380    <!-- Allows an application to read SMS messages. -->
381    <permission android:name="android.permission.READ_SMS"
382        android:permissionGroup="android.permission-group.MESSAGES"
383        android:protectionLevel="dangerous"
384        android:label="@string/permlab_readSms"
385        android:description="@string/permdesc_readSms" />
386
387    <!-- Allows an application to write SMS messages. -->
388    <permission android:name="android.permission.WRITE_SMS"
389        android:permissionGroup="android.permission-group.MESSAGES"
390        android:protectionLevel="dangerous"
391        android:label="@string/permlab_writeSms"
392        android:description="@string/permdesc_writeSms" />
393
394    <!-- Allows an application to monitor incoming WAP push messages. -->
395    <permission android:name="android.permission.RECEIVE_WAP_PUSH"
396        android:permissionGroup="android.permission-group.MESSAGES"
397        android:protectionLevel="dangerous"
398        android:label="@string/permlab_receiveWapPush"
399        android:description="@string/permdesc_receiveWapPush" />
400
401    <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
402         or perform processing on them. -->
403    <!-- @hide -->
404    <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
405        android:permissionGroup="android.permission-group.MESSAGES"
406        android:protectionLevel="dangerous"
407        android:label="@string/permlab_receiveBluetoothMap"
408        android:description="@string/permdesc_receiveBluetoothMap" />
409
410    <!-- =============================================================== -->
411    <!-- Permissions for accessing social info (contacts and social) -->
412    <!-- =============================================================== -->
413    <eat-comment />
414
415    <!-- Used for permissions that provide access to the user's social connections,
416         such as contacts, call logs, social stream, etc.  This includes
417         both reading and writing of this data (which should generally be
418         expressed as two distinct permissions). -->
419
420    <permission-group android:name="android.permission-group.SOCIAL_INFO"
421        android:label="@string/permgrouplab_socialInfo"
422        android:icon="@drawable/perm_group_social_info"
423        android:description="@string/permgroupdesc_socialInfo"
424        android:permissionGroupFlags="personalInfo"
425        android:priority="320" />
426
427    <!-- Allows an application to read the user's contacts data. -->
428    <permission android:name="android.permission.READ_CONTACTS"
429        android:permissionGroup="android.permission-group.SOCIAL_INFO"
430        android:protectionLevel="dangerous"
431        android:label="@string/permlab_readContacts"
432        android:description="@string/permdesc_readContacts" />
433
434    <!-- Allows an application to write (but not read) the user's
435         contacts data. -->
436    <permission android:name="android.permission.WRITE_CONTACTS"
437        android:permissionGroup="android.permission-group.SOCIAL_INFO"
438        android:protectionLevel="dangerous"
439        android:label="@string/permlab_writeContacts"
440        android:description="@string/permdesc_writeContacts" />
441
442    <!-- @SystemApi @hide Allows an application to execute contacts directory search.
443         This should only be used by ContactsProvider.
444         <p>Not for use by third-party applications. -->
445    <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
446        android:permissionGroup="android.permission-group.PERSONAL_INFO"
447        android:protectionLevel="signature|system" />
448
449    <!-- Allows an application to read the user's call log.
450         <p class="note"><strong>Note:</strong> If your app uses the
451         {@link #READ_CONTACTS} permission and <em>both</em> your <a
452         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
453         minSdkVersion}</a> and <a
454         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
455         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
456         grants your app this permission. If you don't need this permission, be sure your <a
457         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
458         targetSdkVersion}</a> is 16 or higher.</p> -->
459    <permission android:name="android.permission.READ_CALL_LOG"
460        android:permissionGroup="android.permission-group.SOCIAL_INFO"
461        android:protectionLevel="dangerous"
462        android:label="@string/permlab_readCallLog"
463        android:description="@string/permdesc_readCallLog" />
464
465    <!-- Allows an application to write (but not read) the user's
466         contacts data.
467         <p class="note"><strong>Note:</strong> If your app uses the
468         {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
469         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
470         minSdkVersion}</a> and <a
471         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
472         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
473         grants your app this permission. If you don't need this permission, be sure your <a
474         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
475         targetSdkVersion}</a> is 16 or higher.</p>  -->
476    <permission android:name="android.permission.WRITE_CALL_LOG"
477        android:permissionGroup="android.permission-group.SOCIAL_INFO"
478        android:protectionLevel="dangerous"
479        android:label="@string/permlab_writeCallLog"
480        android:description="@string/permdesc_writeCallLog" />
481
482  <!-- Allows an application to read from the user's social stream. -->
483    <permission android:name="android.permission.READ_SOCIAL_STREAM"
484        android:permissionGroup="android.permission-group.SOCIAL_INFO"
485        android:protectionLevel="dangerous"
486        android:label="@string/permlab_readSocialStream"
487        android:description="@string/permdesc_readSocialStream" />
488
489    <!-- Allows an application to write (but not read) the user's
490         social stream data. -->
491    <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
492        android:permissionGroup="android.permission-group.SOCIAL_INFO"
493        android:protectionLevel="dangerous"
494        android:label="@string/permlab_writeSocialStream"
495        android:description="@string/permdesc_writeSocialStream" />
496
497    <!-- =============================================================== -->
498    <!-- Permissions for accessing information about the device owner    -->
499    <!-- =============================================================== -->
500    <eat-comment />
501
502    <!-- Used for permissions that provide access to information about the device
503         user such as profile information.  This includes both reading and
504         writing of this data (which should generally be expressed as two
505         distinct permissions). -->
506    <permission-group android:name="android.permission-group.PERSONAL_INFO"
507        android:label="@string/permgrouplab_personalInfo"
508        android:icon="@drawable/perm_group_personal_info"
509        android:description="@string/permgroupdesc_personalInfo"
510        android:permissionGroupFlags="personalInfo"
511        android:priority="310" />
512
513    <!-- Allows an application to read the user's personal profile data. -->
514    <permission android:name="android.permission.READ_PROFILE"
515        android:permissionGroup="android.permission-group.PERSONAL_INFO"
516        android:protectionLevel="dangerous"
517        android:label="@string/permlab_readProfile"
518        android:description="@string/permdesc_readProfile" />
519
520    <!-- Allows an application to write (but not read) the user's
521         personal profile data. -->
522    <permission android:name="android.permission.WRITE_PROFILE"
523        android:permissionGroup="android.permission-group.PERSONAL_INFO"
524        android:protectionLevel="dangerous"
525        android:label="@string/permlab_writeProfile"
526        android:description="@string/permdesc_writeProfile" />
527
528    <!-- Allows an application to access data from sensors that the user uses to
529         measure what is happening inside his/her body, such as heart rate. -->
530    <permission android:name="android.permission.BODY_SENSORS"
531        android:permissionGroup="android.permission-group.PERSONAL_INFO"
532        android:label="@string/permlab_bodySensors"
533        android:description="@string/permdesc_bodySensors" />
534
535    <!-- =============================================================== -->
536    <!-- Permissions for accessing the device calendar                   -->
537    <!-- =============================================================== -->
538    <eat-comment />
539
540    <!-- Used for permissions that provide access to the device
541         calendar to create / view events.-->
542    <permission-group android:name="android.permission-group.CALENDAR"
543        android:label="@string/permgrouplab_calendar"
544        android:icon="@drawable/perm_group_calendar"
545        android:description="@string/permgroupdesc_calendar"
546        android:permissionGroupFlags="personalInfo"
547        android:priority="290" />
548
549    <!-- Allows an application to read the user's calendar data. -->
550    <permission android:name="android.permission.READ_CALENDAR"
551        android:permissionGroup="android.permission-group.PERSONAL_INFO"
552        android:protectionLevel="dangerous"
553        android:label="@string/permlab_readCalendar"
554        android:description="@string/permdesc_readCalendar" />
555
556    <!-- Allows an application to write (but not read) the user's
557         calendar data. -->
558    <permission android:name="android.permission.WRITE_CALENDAR"
559        android:permissionGroup="android.permission-group.PERSONAL_INFO"
560        android:protectionLevel="dangerous"
561        android:label="@string/permlab_writeCalendar"
562        android:description="@string/permdesc_writeCalendar" />
563
564    <!-- =============================================================== -->
565    <!-- Permissions for accessing the user dictionary-->
566    <!-- =============================================================== -->
567    <eat-comment />
568
569    <!-- Used for permissions that provide access to the user
570         calendar to create / view events.-->
571    <permission-group android:name="android.permission-group.USER_DICTIONARY"
572        android:label="@string/permgrouplab_dictionary"
573        android:icon="@drawable/perm_group_user_dictionary"
574        android:description="@string/permgroupdesc_dictionary"
575        android:permissionGroupFlags="personalInfo"
576        android:priority="170" />
577
578    <!-- Allows an application to read the user dictionary. This should
579         really only be required by an IME, or a dictionary editor like
580         the Settings app. -->
581    <permission android:name="android.permission.READ_USER_DICTIONARY"
582        android:permissionGroup="android.permission-group.USER_DICTIONARY"
583        android:protectionLevel="dangerous"
584        android:label="@string/permlab_readDictionary"
585        android:description="@string/permdesc_readDictionary" />
586
587    <!-- Used for permissions that provide access to the user
588         calendar to create / view events.-->
589    <permission-group android:name="android.permission-group.WRITE_USER_DICTIONARY"
590        android:label="@string/permgrouplab_writeDictionary"
591        android:icon="@drawable/perm_group_user_dictionary_write"
592        android:description="@string/permgroupdesc_writeDictionary"
593        android:priority="160" />
594
595    <!-- Allows an application to write to the user dictionary. -->
596    <permission android:name="android.permission.WRITE_USER_DICTIONARY"
597        android:permissionGroup="android.permission-group.WRITE_USER_DICTIONARY"
598        android:protectionLevel="normal"
599        android:label="@string/permlab_writeDictionary"
600        android:description="@string/permdesc_writeDictionary" />
601
602    <!-- =============================================================== -->
603    <!-- Permissions for accessing the user bookmarks                    -->
604    <!-- =============================================================== -->
605    <eat-comment />
606
607    <!-- Used for permissions that provide access to the user
608         bookmarks and browser history.-->
609    <permission-group android:name="android.permission-group.BOOKMARKS"
610        android:label="@string/permgrouplab_bookmarks"
611        android:icon="@drawable/perm_group_bookmarks"
612        android:description="@string/permgroupdesc_bookmarks"
613        android:permissionGroupFlags="personalInfo"
614        android:priority="300" />
615
616    <!-- Allows an application to read (but not write) the user's
617        browsing history and bookmarks. -->
618    <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
619        android:permissionGroup="android.permission-group.BOOKMARKS"
620        android:label="@string/permlab_readHistoryBookmarks"
621        android:description="@string/permdesc_readHistoryBookmarks"
622        android:protectionLevel="dangerous" />
623
624    <!-- Allows an application to write (but not read) the user's
625        browsing history and bookmarks. -->
626    <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
627        android:permissionGroup="android.permission-group.BOOKMARKS"
628        android:label="@string/permlab_writeHistoryBookmarks"
629        android:description="@string/permdesc_writeHistoryBookmarks"
630        android:protectionLevel="dangerous" />
631
632    <!-- =============================================================== -->
633    <!-- Permissions for setting the device alarm                        -->
634    <!-- =============================================================== -->
635    <eat-comment />
636
637    <!-- Used for permissions that provide access to device alarms. -->
638    <permission-group android:name="android.permission-group.DEVICE_ALARMS"
639        android:label="@string/permgrouplab_deviceAlarms"
640        android:icon="@drawable/perm_group_device_alarms"
641        android:description="@string/permgroupdesc_deviceAlarms"
642        android:permissionGroupFlags="personalInfo"
643        android:priority="210" />
644
645    <!-- Allows an application to broadcast an Intent to set an alarm for the
646         user. -->
647    <permission android:name="com.android.alarm.permission.SET_ALARM"
648        android:permissionGroup="android.permission-group.DEVICE_ALARMS"
649        android:label="@string/permlab_setAlarm"
650        android:description="@string/permdesc_setAlarm"
651        android:protectionLevel="normal" />
652
653    <!-- =============================================================== -->
654    <!-- Permissions for accessing the user voicemail                    -->
655    <!-- =============================================================== -->
656    <eat-comment />
657
658    <!-- Used for permissions that provide access to the user voicemail box. -->
659    <permission-group android:name="android.permission-group.VOICEMAIL"
660        android:label="@string/permgrouplab_voicemail"
661        android:icon="@drawable/perm_group_voicemail"
662        android:description="@string/permgroupdesc_voicemail"
663        android:permissionGroupFlags="personalInfo"
664        android:priority="280" />
665
666    <!-- Allows an application to add voicemails into the system. -->
667    <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
668        android:permissionGroup="android.permission-group.VOICEMAIL"
669        android:protectionLevel="dangerous"
670        android:label="@string/permlab_addVoicemail"
671        android:description="@string/permdesc_addVoicemail" />
672
673    <!-- Allows an application to modify and remove existing voicemails in the system -->
674    <permission android:name="com.android.voicemail.permission.MANAGE_VOICEMAIL"
675        android:permissionGroup="android.permission-group.VOICEMAIL"
676        android:protectionLevel="dangerous"
677        android:label="@string/permlab_manageVoicemail"
678        android:description="@string/permdesc_manageVoicemail" />
679
680    <!-- Allows an application to read all the voicemails in the system. -->
681    <permission android:name="com.android.voicemail.permission.READ_ALL_VOICEMAIL"
682        android:permissionGroup="android.permission-group.VOICEMAIL"
683        android:protectionLevel="dangerous"
684        android:label="@string/permlab_readAllVoicemail"
685        android:description="@string/permdesc_readAllVoicemail" />
686
687    <!-- =============================================== -->
688    <!-- Permissions for enabling accessibility features -->
689    <!-- =============================================== -->
690    <eat-comment />
691
692    <!-- Used for permissions that allow requesting certain accessibility features. -->
693    <permission-group android:name="android.permission-group.ACCESSIBILITY_FEATURES"
694        android:label="@string/permgrouplab_accessibilityFeatures"
695        android:icon="@drawable/perm_group_accessibility_features"
696        android:description="@string/permgroupdesc_accessibilityFeatures"
697        android:priority="380" />
698
699    <!-- ======================================= -->
700    <!-- Permissions for accessing location info -->
701    <!-- ======================================= -->
702    <eat-comment />
703
704    <!-- Used for permissions that allow access to the user's current
705         location. -->
706    <permission-group android:name="android.permission-group.LOCATION"
707        android:label="@string/permgrouplab_location"
708        android:icon="@drawable/perm_group_location"
709        android:description="@string/permgroupdesc_location"
710        android:permissionGroupFlags="personalInfo"
711        android:priority="330" />
712
713    <!-- Allows an app to access precise location from location sources such
714         as GPS, cell towers, and Wi-Fi. -->
715    <permission android:name="android.permission.ACCESS_FINE_LOCATION"
716        android:permissionGroup="android.permission-group.LOCATION"
717        android:protectionLevel="dangerous"
718        android:label="@string/permlab_accessFineLocation"
719        android:description="@string/permdesc_accessFineLocation" />
720
721    <!-- Allows an app to access approximate location derived from network location
722         sources such as cell towers and Wi-Fi. -->
723    <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
724        android:permissionGroup="android.permission-group.LOCATION"
725        android:protectionLevel="dangerous"
726        android:label="@string/permlab_accessCoarseLocation"
727        android:description="@string/permdesc_accessCoarseLocation" />
728
729    <!-- Allows an application to create mock location providers for testing -->
730    <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
731        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
732        android:protectionLevel="dangerous"
733        android:label="@string/permlab_accessMockLocation"
734        android:description="@string/permdesc_accessMockLocation" />
735
736    <!-- Allows an application to access extra location provider commands -->
737    <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
738        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
739        android:protectionLevel="normal"
740        android:label="@string/permlab_accessLocationExtraCommands"
741        android:description="@string/permdesc_accessLocationExtraCommands" />
742
743    <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
744    <p>Not for use by third-party applications. -->
745    <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
746        android:protectionLevel="signature|system"
747        android:label="@string/permlab_installLocationProvider"
748        android:description="@string/permdesc_installLocationProvider" />
749
750    <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
751         This should only be used by HDMI-CEC service.
752    -->
753    <permission android:name="android.permission.HDMI_CEC"
754        android:protectionLevel="signatureOrSystem" />
755
756    <!-- @SystemApi Allows an application to use location features in hardware,
757         such as the geofencing api.
758         <p>Not for use by third-party applications. -->
759    <permission android:name="android.permission.LOCATION_HARDWARE"
760        android:permissionGroup="android.permission-group.LOCATION"
761        android:protectionLevel="signature|system" />
762    <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
763
764    <!-- ======================================= -->
765    <!-- Permissions for accessing networks -->
766    <!-- ======================================= -->
767    <eat-comment />
768
769    <!-- Used for permissions that provide access to networking services.  The
770         main permission here is internet access, but this is also an
771         appropriate group for accessing or modifying any network configuration
772         or other related network operations. -->
773    <permission-group android:name="android.permission-group.NETWORK"
774        android:label="@string/permgrouplab_network"
775        android:icon="@drawable/perm_group_network"
776        android:description="@string/permgroupdesc_network"
777        android:priority="270" />
778
779    <!-- Allows applications to open network sockets. -->
780    <permission android:name="android.permission.INTERNET"
781        android:permissionGroup="android.permission-group.NETWORK"
782        android:protectionLevel="dangerous"
783        android:description="@string/permdesc_createNetworkSockets"
784        android:label="@string/permlab_createNetworkSockets" />
785
786    <!-- Allows applications to access information about networks -->
787    <permission android:name="android.permission.ACCESS_NETWORK_STATE"
788        android:permissionGroup="android.permission-group.NETWORK"
789        android:protectionLevel="normal"
790        android:description="@string/permdesc_accessNetworkState"
791        android:label="@string/permlab_accessNetworkState" />
792
793    <!-- Allows applications to access information about Wi-Fi networks -->
794    <permission android:name="android.permission.ACCESS_WIFI_STATE"
795        android:permissionGroup="android.permission-group.NETWORK"
796        android:protectionLevel="normal"
797        android:description="@string/permdesc_accessWifiState"
798        android:label="@string/permlab_accessWifiState" />
799
800    <!-- Allows applications to change Wi-Fi connectivity state -->
801    <permission android:name="android.permission.CHANGE_WIFI_STATE"
802        android:permissionGroup="android.permission-group.NETWORK"
803        android:protectionLevel="dangerous"
804        android:description="@string/permdesc_changeWifiState"
805        android:label="@string/permlab_changeWifiState" />
806
807    <!-- @hide -->
808    <permission android:name="android.permission.ACCESS_WIMAX_STATE"
809        android:permissionGroup="android.permission-group.NETWORK"
810        android:protectionLevel="normal"
811        android:description="@string/permdesc_accessWimaxState"
812        android:label="@string/permlab_accessWimaxState" />
813
814    <!-- @hide -->
815    <permission android:name="android.permission.CHANGE_WIMAX_STATE"
816        android:permissionGroup="android.permission-group.NETWORK"
817        android:protectionLevel="dangerous"
818        android:description="@string/permdesc_changeWimaxState"
819        android:label="@string/permlab_changeWimaxState" />
820
821    <!-- Allows applications to act as network scorers. @hide -->
822    <permission android:name="android.permission.SCORE_NETWORKS"
823        android:permissionGroup="android.permission-group.NETWORK"
824        android:protectionLevel="normal"
825        android:description="@string/permdesc_scoreNetworks"
826        android:label="@string/permlab_scoreNetworks" />
827
828    <!-- ======================================= -->
829    <!-- Permissions for short range, peripheral networks -->
830    <!-- ======================================= -->
831    <eat-comment />
832
833    <!-- Used for permissions that provide access to other devices through Bluetooth.-->
834    <permission-group android:name="android.permission-group.BLUETOOTH_NETWORK"
835        android:label="@string/permgrouplab_bluetoothNetwork"
836        android:icon="@drawable/perm_group_bluetooth"
837        android:description="@string/permgroupdesc_bluetoothNetwork"
838        android:priority="260" />
839
840    <!-- Allows applications to connect to paired bluetooth devices -->
841    <permission android:name="android.permission.BLUETOOTH"
842        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
843        android:protectionLevel="dangerous"
844        android:description="@string/permdesc_bluetooth"
845        android:label="@string/permlab_bluetooth" />
846
847    <!-- Allows applications to discover and pair bluetooth devices -->
848    <permission android:name="android.permission.BLUETOOTH_ADMIN"
849        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
850        android:protectionLevel="dangerous"
851        android:description="@string/permdesc_bluetoothAdmin"
852        android:label="@string/permlab_bluetoothAdmin" />
853
854    <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction.
855         This is not available to third party applications. -->
856    <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
857        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
858        android:protectionLevel="system|signature"
859        android:description="@string/permdesc_bluetoothPriv"
860        android:label="@string/permlab_bluetoothPriv" />
861
862    <!-- Allows bluetooth stack to access files
863         @hide This should only be used by Bluetooth apk.
864    -->
865    <permission android:name="android.permission.BLUETOOTH_STACK"
866        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
867        android:protectionLevel="signature" />
868
869    <!-- Allows applications to perform I/O operations over NFC -->
870    <permission android:name="android.permission.NFC"
871        android:permissionGroup="android.permission-group.NETWORK"
872        android:protectionLevel="dangerous"
873        android:description="@string/permdesc_nfc"
874        android:label="@string/permlab_nfc" />
875
876    <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
877        @hide -->
878    <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
879        android:permissionGroup="android.permission-group.NETWORK"
880        android:protectionLevel="signature|system" />
881
882    <!-- @SystemApi @hide -->
883    <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
884        android:permissionGroup="android.permission-group.NETWORK"
885        android:protectionLevel="signature|system" />
886
887    <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
888	@hide -->
889    <permission android:name="android.permission.LOOP_RADIO"
890	android:permissionGroup="android.permission-group.NETWORK"
891	android:protectionLevel="signature|system" />
892
893    <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
894         @hide
895    -->
896    <permission android:name="android.permission.NFC_HANDOVER_STATUS"
897                android:label="@string/permlab_handoverStatus"
898                android:description="@string/permdesc_handoverStatus"
899                android:protectionLevel="signature|system" />
900
901    <!-- ================================== -->
902    <!-- Permissions for accessing accounts -->
903    <!-- ================================== -->
904    <eat-comment />
905
906    <!-- Permissions for direct access to the accounts managed
907         by the Account Manager. -->
908    <permission-group android:name="android.permission-group.ACCOUNTS"
909        android:label="@string/permgrouplab_accounts"
910        android:icon="@drawable/perm_group_accounts"
911        android:description="@string/permgroupdesc_accounts"
912        android:permissionGroupFlags="personalInfo"
913        android:priority="200" />
914
915    <!-- Allows access to the list of accounts in the Accounts Service -->
916    <permission android:name="android.permission.GET_ACCOUNTS"
917        android:permissionGroup="android.permission-group.ACCOUNTS"
918        android:protectionLevel="normal"
919        android:description="@string/permdesc_getAccounts"
920        android:label="@string/permlab_getAccounts" />
921
922    <!-- Allows an application to act as an AccountAuthenticator for
923         the AccountManager -->
924    <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
925        android:permissionGroup="android.permission-group.ACCOUNTS"
926        android:protectionLevel="dangerous"
927        android:label="@string/permlab_authenticateAccounts"
928        android:description="@string/permdesc_authenticateAccounts" />
929
930    <!-- Allows an application to request authtokens from the AccountManager -->
931    <permission android:name="android.permission.USE_CREDENTIALS"
932        android:permissionGroup="android.permission-group.ACCOUNTS"
933        android:protectionLevel="dangerous"
934        android:label="@string/permlab_useCredentials"
935        android:description="@string/permdesc_useCredentials" />
936
937    <!-- Allows an application to manage the list of accounts in the AccountManager -->
938    <permission android:name="android.permission.MANAGE_ACCOUNTS"
939        android:permissionGroup="android.permission-group.ACCOUNTS"
940        android:protectionLevel="dangerous"
941        android:label="@string/permlab_manageAccounts"
942        android:description="@string/permdesc_manageAccounts" />
943
944    <!-- @SystemApi Allows applications to call into AccountAuthenticators.
945    <p>Not for use by third-party applications. -->
946    <permission android:name="android.permission.ACCOUNT_MANAGER"
947        android:permissionGroup="android.permission-group.ACCOUNTS"
948        android:protectionLevel="signature"
949        android:description="@string/permdesc_accountManagerService"
950        android:label="@string/permlab_accountManagerService" />
951
952    <!-- ================================== -->
953    <!-- Permissions for accessing hardware that may effect battery life-->
954    <!-- ================================== -->
955    <eat-comment />
956
957    <!-- Used for permissions that provide direct access to the hardware on
958         the device that has an effect on battery life.  This includes vibrator,
959         flashlight,  etc. -->
960
961    <permission-group android:name="android.permission-group.AFFECTS_BATTERY"
962        android:label="@string/permgrouplab_affectsBattery"
963        android:icon="@drawable/perm_group_affects_battery"
964        android:description="@string/permgroupdesc_affectsBattery"
965        android:priority="180" />
966
967    <!-- Allows applications to enter Wi-Fi Multicast mode -->
968    <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
969        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
970        android:protectionLevel="dangerous"
971        android:description="@string/permdesc_changeWifiMulticastState"
972        android:label="@string/permlab_changeWifiMulticastState" />
973
974    <!-- Allows access to the vibrator -->
975    <permission android:name="android.permission.VIBRATE"
976        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
977        android:protectionLevel="normal"
978        android:label="@string/permlab_vibrate"
979        android:description="@string/permdesc_vibrate" />
980
981    <!-- Allows access to the flashlight -->
982    <permission android:name="android.permission.FLASHLIGHT"
983        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
984        android:protectionLevel="normal"
985        android:label="@string/permlab_flashlight"
986        android:description="@string/permdesc_flashlight" />
987
988    <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
989         from dimming -->
990    <permission android:name="android.permission.WAKE_LOCK"
991        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
992        android:protectionLevel="normal"
993        android:label="@string/permlab_wakeLock"
994        android:description="@string/permdesc_wakeLock" />
995
996    <!-- Allows using the device's IR transmitter, if available -->
997    <permission android:name="android.permission.TRANSMIT_IR"
998        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
999        android:protectionLevel="normal"
1000        android:label="@string/permlab_transmitIr"
1001        android:description="@string/permdesc_transmitIr" />
1002
1003    <!-- ==================================================== -->
1004    <!-- Permissions related to changing audio settings   -->
1005    <!-- ==================================================== -->
1006    <eat-comment />
1007
1008    <!-- Used for permissions that provide direct access to speaker settings
1009         the device. -->
1010    <permission-group android:name="android.permission-group.AUDIO_SETTINGS"
1011        android:label="@string/permgrouplab_audioSettings"
1012        android:icon="@drawable/perm_group_audio_settings"
1013        android:description="@string/permgroupdesc_audioSettings"
1014        android:priority="130" />
1015
1016    <!-- Allows an application to modify global audio settings -->
1017    <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
1018        android:permissionGroup="android.permission-group.AUDIO_SETTINGS"
1019        android:protectionLevel="normal"
1020        android:label="@string/permlab_modifyAudioSettings"
1021        android:description="@string/permdesc_modifyAudioSettings" />
1022
1023    <!-- ================================== -->
1024    <!-- Permissions for accessing hardware -->
1025    <!-- ================================== -->
1026    <eat-comment />
1027
1028    <!-- Used for permissions that provide direct access to the hardware on
1029         the device.  This includes audio, the camera, vibrator, etc. -->
1030    <permission-group android:name="android.permission-group.HARDWARE_CONTROLS"
1031        android:label="@string/permgrouplab_hardwareControls"
1032        android:description="@string/permgroupdesc_hardwareControls"
1033        android:priority="260"/>
1034
1035    <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
1036         @hide -->
1037    <permission android:name="android.permission.MANAGE_USB"
1038        android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1039        android:protectionLevel="signature|system"
1040        android:label="@string/permlab_manageUsb"
1041        android:description="@string/permdesc_manageUsb" />
1042
1043    <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
1044         For use only by the device side MTP implementation.
1045         @hide -->
1046    <permission android:name="android.permission.ACCESS_MTP"
1047        android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1048        android:protectionLevel="signature|system"
1049        android:label="@string/permlab_accessMtp"
1050        android:description="@string/permdesc_accessMtp" />
1051
1052    <!-- Allows access to hardware peripherals.  Intended only for hardware testing.
1053    <p>Not for use by third-party applications. -->
1054    <permission android:name="android.permission.HARDWARE_TEST"
1055        android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1056        android:protectionLevel="signature"
1057        android:label="@string/permlab_hardware_test"
1058        android:description="@string/permdesc_hardware_test" />
1059
1060    <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
1061         @hide -->
1062    <permission android:name="android.permission.NET_ADMIN"
1063        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1064        android:protectionLevel="signature" />
1065
1066    <!-- Allows registration for remote audio playback. @hide -->
1067    <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
1068        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1069        android:protectionLevel="signature" />
1070
1071    <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
1072         built-in tuners and HDMI-in's.
1073         @hide This should only be used by OEM's TvInputService's.
1074    -->
1075    <permission android:name="android.permission.TV_INPUT_HARDWARE"
1076        android:protectionLevel="signatureOrSystem" />
1077
1078    <!-- =========================================== -->
1079    <!-- Permissions associated with audio capture -->
1080    <!-- =========================================== -->
1081    <eat-comment />
1082
1083    <!-- Used for permissions that are associated with accessing
1084         microphone audio from the device. Note that phone calls also capture audio
1085         but are in a separate (more visible) permission group. -->
1086    <permission-group android:name="android.permission-group.MICROPHONE"
1087        android:label="@string/permgrouplab_microphone"
1088        android:icon="@drawable/perm_group_microphone"
1089        android:description="@string/permgroupdesc_microphone"
1090        android:permissionGroupFlags="personalInfo"
1091        android:priority="340" />
1092
1093    <!-- Allows an application to record audio -->
1094    <permission android:name="android.permission.RECORD_AUDIO"
1095        android:permissionGroup="android.permission-group.MICROPHONE"
1096        android:protectionLevel="dangerous"
1097        android:label="@string/permlab_recordAudio"
1098        android:description="@string/permdesc_recordAudio" />
1099
1100
1101    <!-- =========================================== -->
1102    <!-- Permissions associated with camera and image capture -->
1103    <!-- =========================================== -->
1104    <eat-comment />
1105
1106    <!-- Used for permissions that are associated with accessing
1107         camera or capturing images/video from the device. -->
1108    <permission-group android:name="android.permission-group.CAMERA"
1109        android:label="@string/permgrouplab_camera"
1110        android:icon="@drawable/perm_group_camera"
1111        android:description="@string/permgroupdesc_camera"
1112        android:permissionGroupFlags="personalInfo"
1113        android:priority="350" />
1114
1115    <!-- Required to be able to access the camera device.
1116         <p>This will automatically enforce the <a
1117         href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code
1118         &lt;uses-feature&gt;}</a> manifest element for <em>all</em> camera features.
1119         If you do not require all camera features or can properly operate if a camera
1120         is not available, then you must modify your manifest as appropriate in order to
1121         install on devices that don't support all camera features.</p> -->
1122    <permission android:name="android.permission.CAMERA"
1123        android:permissionGroup="android.permission-group.CAMERA"
1124        android:protectionLevel="dangerous"
1125        android:label="@string/permlab_camera"
1126        android:description="@string/permdesc_camera" />
1127
1128    <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
1129         a camera is in use by an application.
1130         @hide -->
1131    <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
1132        android:permissionGroup="android.permission-group.CAMERA"
1133        android:protectionLevel="signature|system"
1134        android:label="@string/permlab_cameraDisableTransmitLed"
1135        android:description="@string/permdesc_cameraDisableTransmitLed" />
1136
1137    <!-- =========================================== -->
1138    <!-- Permissions associated with telephony state -->
1139    <!-- =========================================== -->
1140    <eat-comment />
1141
1142    <!-- Used for permissions that are associated with accessing and modifying
1143         telephony state: placing calls, intercepting outgoing calls, reading
1144         and modifying the phone state. -->
1145    <permission-group android:name="android.permission-group.PHONE_CALLS"
1146        android:label="@string/permgrouplab_phoneCalls"
1147        android:icon="@drawable/perm_group_phone_calls"
1148        android:description="@string/permgroupdesc_phoneCalls"
1149        android:permissionGroupFlags="personalInfo"
1150        android:priority="370" />
1151
1152    <!-- Allows an application to see the number being dialed during an outgoing
1153         call with the option to redirect the call to a different number or
1154         abort the call altogether. -->
1155    <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
1156        android:permissionGroup="android.permission-group.PHONE_CALLS"
1157        android:protectionLevel="dangerous"
1158        android:label="@string/permlab_processOutgoingCalls"
1159        android:description="@string/permdesc_processOutgoingCalls" />
1160
1161    <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
1162         Does not include placing calls.
1163         <p>Not for use by third-party applications. -->
1164    <permission android:name="android.permission.MODIFY_PHONE_STATE"
1165        android:permissionGroup="android.permission-group.PHONE_CALLS"
1166        android:protectionLevel="signature|system"
1167        android:label="@string/permlab_modifyPhoneState"
1168        android:description="@string/permdesc_modifyPhoneState" />
1169
1170    <!-- Allows read only access to phone state.
1171         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1172         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1173         minSdkVersion}</a> and <a
1174         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1175         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1176         grants your app this permission. If you don't need this permission, be sure your <a
1177         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1178         targetSdkVersion}</a> is 4 or higher. -->
1179    <permission android:name="android.permission.READ_PHONE_STATE"
1180        android:permissionGroup="android.permission-group.PHONE_CALLS"
1181        android:protectionLevel="dangerous"
1182        android:label="@string/permlab_readPhoneState"
1183        android:description="@string/permdesc_readPhoneState" />
1184
1185    <!-- Allows read only access to precise phone state.
1186         @hide Pending API council approval -->
1187    <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
1188        android:permissionGroup="android.permission-group.PHONE_CALLS"
1189        android:protectionLevel="dangerous"
1190        android:label="@string/permlab_readPrecisePhoneState"
1191        android:description="@string/permdesc_readPrecisePhoneState" />
1192
1193    <!-- @SystemApi Allows read access to privileged phone state.
1194         @hide Used internally. -->
1195    <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
1196        android:permissionGroup="android.permission-group.PHONE_CALLS"
1197        android:protectionLevel="signature|system" />
1198
1199     <!-- Allows an application to initiate a phone call without going through
1200         the Dialer user interface for the user to confirm the call
1201         being placed. -->
1202    <permission android:name="android.permission.CALL_PHONE"
1203        android:permissionGroup="android.permission-group.PHONE_CALLS"
1204        android:protectionLevel="dangerous"
1205        android:permissionFlags="costsMoney"
1206        android:label="@string/permlab_callPhone"
1207        android:description="@string/permdesc_callPhone" />
1208
1209    <!-- Allows an application to use SIP service -->
1210    <permission android:name="android.permission.USE_SIP"
1211        android:permissionGroup="android.permission-group.PHONE_CALLS"
1212        android:protectionLevel="dangerous"
1213        android:description="@string/permdesc_use_sip"
1214        android:label="@string/permlab_use_sip" />
1215
1216    <!-- @SystemApi Allows an application to request CallHandlerService implementations.
1217         @hide -->
1218    <permission android:name="android.permission.BIND_CALL_SERVICE"
1219        android:permissionGroup="android.permission-group.PHONE_CALLS"
1220        android:protectionLevel="system|signature"
1221        android:description="@string/permdesc_bind_call_service"
1222        android:label="@string/permlab_bind_call_service" />
1223
1224    <!-- ================================== -->
1225    <!-- Permissions for sdcard interaction -->
1226    <!-- ================================== -->
1227    <eat-comment />
1228
1229    <!-- Group of permissions that are related to SD card access. -->
1230    <permission-group android:name="android.permission-group.STORAGE"
1231        android:label="@string/permgrouplab_storage"
1232        android:icon="@drawable/perm_group_storage"
1233        android:description="@string/permgroupdesc_storage"
1234        android:permissionGroupFlags="personalInfo"
1235        android:priority="240" />
1236
1237    <!-- Allows an application to read from external storage.
1238         <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
1239         granted this permission.</p>
1240         <p>This permission is enforced starting in API level 19.  Before API level 19, this
1241         permission is not enforced and all apps still have access to read from external storage.
1242         You can test your app with the permission enforced by enabling <em>Protect USB
1243         storage</em> under Developer options in the Settings app on a device running Android 4.1 or
1244         higher.</p>
1245         <p>Also starting in API level 19, this permission is <em>not</em> required to
1246         read/write files in your application-specific directories returned by
1247         {@link android.content.Context#getExternalFilesDir} and
1248         {@link android.content.Context#getExternalCacheDir}.
1249         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1250         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1251         minSdkVersion}</a> and <a
1252         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1253         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1254         grants your app this permission. If you don't need this permission, be sure your <a
1255         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1256         targetSdkVersion}</a> is 4 or higher.-->
1257    <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
1258        android:permissionGroup="android.permission-group.STORAGE"
1259        android:label="@string/permlab_sdcardRead"
1260        android:description="@string/permdesc_sdcardRead"
1261        android:protectionLevel="normal" />
1262
1263    <!-- Allows an application to write to external storage.
1264         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1265         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1266         minSdkVersion}</a> and <a
1267         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1268         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1269         grants your app this permission. If you don't need this permission, be sure your <a
1270         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1271         targetSdkVersion}</a> is 4 or higher.
1272         <p>Starting in API level 19, this permission is <em>not</em> required to
1273         read/write files in your application-specific directories returned by
1274         {@link android.content.Context#getExternalFilesDir} and
1275         {@link android.content.Context#getExternalCacheDir}. -->
1276    <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
1277        android:permissionGroup="android.permission-group.STORAGE"
1278        android:label="@string/permlab_sdcardWrite"
1279        android:description="@string/permdesc_sdcardWrite"
1280        android:protectionLevel="dangerous" />
1281
1282    <!-- @SystemApi Allows an application to write to internal media storage
1283         @hide  -->
1284    <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
1285        android:permissionGroup="android.permission-group.STORAGE"
1286        android:label="@string/permlab_mediaStorageWrite"
1287        android:description="@string/permdesc_mediaStorageWrite"
1288        android:protectionLevel="signature|system" />
1289
1290    <!-- Allows an application to manage access to documents, usually as part
1291         of a document picker. -->
1292    <permission android:name="android.permission.MANAGE_DOCUMENTS"
1293        android:permissionGroup="android.permission-group.STORAGE"
1294        android:label="@string/permlab_manageDocs"
1295        android:description="@string/permdesc_manageDocs"
1296        android:protectionLevel="signature" />
1297
1298    <!-- ================================== -->
1299    <!-- Permissions for screenlock         -->
1300    <!-- ================================== -->
1301    <eat-comment />
1302
1303    <!-- Group of permissions that are related to the screenlock. -->
1304    <permission-group android:name="android.permission-group.SCREENLOCK"
1305        android:label="@string/permgrouplab_screenlock"
1306        android:icon="@drawable/perm_group_screenlock"
1307        android:permissionGroupFlags="personalInfo"
1308        android:description="@string/permgroupdesc_screenlock"
1309        android:priority="230" />
1310
1311    <!-- Allows applications to disable the keyguard -->
1312    <permission android:name="android.permission.DISABLE_KEYGUARD"
1313        android:permissionGroup="android.permission-group.SCREENLOCK"
1314        android:protectionLevel="dangerous"
1315        android:description="@string/permdesc_disableKeyguard"
1316        android:label="@string/permlab_disableKeyguard" />
1317
1318    <!-- ================================== -->
1319    <!-- Permissions to access other installed applications  -->
1320    <!-- ================================== -->
1321    <eat-comment />
1322
1323    <!-- Group of permissions that are related to the other applications
1324         installed on the system.  Examples include such as listing
1325         running apps, or killing background processes. -->
1326    <permission-group android:name="android.permission-group.APP_INFO"
1327        android:label="@string/permgrouplab_appInfo"
1328        android:icon="@drawable/perm_group_app_info"
1329        android:description="@string/permgroupdesc_appInfo"
1330        android:priority="220" />
1331
1332    <!-- @SystemApi Allows an application to get information about the currently
1333         or recently running tasks. -->
1334    <permission android:name="android.permission.GET_TASKS"
1335        android:permissionGroup="android.permission-group.APP_INFO"
1336        android:protectionLevel="signature|system"
1337        android:label="@string/permlab_getTasks"
1338        android:description="@string/permdesc_getTasks" />
1339
1340    <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
1341         across the users on the device, using singleton services and
1342         user-targeted broadcasts.  This permission is not available to
1343         third party applications. -->
1344    <permission android:name="android.permission.INTERACT_ACROSS_USERS"
1345        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1346        android:protectionLevel="signature|system|development"
1347        android:label="@string/permlab_interactAcrossUsers"
1348        android:description="@string/permdesc_interactAcrossUsers" />
1349
1350    <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
1351         that removes restrictions on where broadcasts can be sent and allows other
1352         types of interactions. -->
1353    <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
1354        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1355        android:protectionLevel="signature"
1356        android:label="@string/permlab_interactAcrossUsersFull"
1357        android:description="@string/permdesc_interactAcrossUsersFull" />
1358
1359    <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
1360         users on the device. This permission is not available to
1361         third party applications. -->
1362    <permission android:name="android.permission.MANAGE_USERS"
1363        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1364        android:protectionLevel="signature|system"
1365        android:label="@string/permlab_manageUsers"
1366        android:description="@string/permdesc_manageUsers" />
1367
1368    <!-- Allows an application to get full detailed information about
1369         recently running tasks, with full fidelity to the real state.
1370         @hide -->
1371    <permission android:name="android.permission.GET_DETAILED_TASKS"
1372        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1373        android:protectionLevel="signature"
1374        android:label="@string/permlab_getDetailedTasks"
1375        android:description="@string/permdesc_getDetailedTasks" />
1376
1377    <!-- Allows an application to change the Z-order of tasks -->
1378    <permission android:name="android.permission.REORDER_TASKS"
1379        android:permissionGroup="android.permission-group.APP_INFO"
1380        android:protectionLevel="normal"
1381        android:label="@string/permlab_reorderTasks"
1382        android:description="@string/permdesc_reorderTasks" />
1383
1384    <!-- @hide Allows an application to change to remove/kill tasks -->
1385    <permission android:name="android.permission.REMOVE_TASKS"
1386        android:permissionGroup="android.permission-group.APP_INFO"
1387        android:protectionLevel="signature"
1388        android:label="@string/permlab_removeTasks"
1389        android:description="@string/permdesc_removeTasks" />
1390
1391    <!-- @SystemApi @hide Allows an application to create/manage/remove stacks -->
1392    <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
1393        android:permissionGroup="android.permission-group.APP_INFO"
1394        android:protectionLevel="signature|system"
1395        android:label="@string/permlab_manageActivityStacks"
1396        android:description="@string/permdesc_manageActivityStacks" />
1397
1398    <!-- Allows an application to start any activity, regardless of permission
1399         protection or exported state. @hide -->
1400    <permission android:name="android.permission.START_ANY_ACTIVITY"
1401        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1402        android:protectionLevel="signature"
1403        android:label="@string/permlab_startAnyActivity"
1404        android:description="@string/permdesc_startAnyActivity" />
1405
1406    <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
1407        API is no longer supported. -->
1408    <permission android:name="android.permission.RESTART_PACKAGES"
1409        android:permissionGroup="android.permission-group.APP_INFO"
1410        android:protectionLevel="normal"
1411        android:label="@string/permlab_killBackgroundProcesses"
1412        android:description="@string/permdesc_killBackgroundProcesses" />
1413
1414    <!-- Allows an application to call
1415        {@link android.app.ActivityManager#killBackgroundProcesses}. -->
1416    <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
1417        android:permissionGroup="android.permission-group.APP_INFO"
1418        android:protectionLevel="normal"
1419        android:label="@string/permlab_killBackgroundProcesses"
1420        android:description="@string/permdesc_killBackgroundProcesses" />
1421
1422    <!-- ================================== -->
1423    <!-- Permissions affecting the display of other applications  -->
1424    <!-- ================================== -->
1425    <eat-comment />
1426
1427    <!-- Group of permissions that allow manipulation of how
1428         another application displays UI to the user. -->
1429    <permission-group android:name="android.permission-group.DISPLAY"
1430        android:label="@string/permgrouplab_display"
1431        android:icon="@drawable/perm_group_display"
1432        android:description="@string/permgroupdesc_display"
1433        android:priority="190"/>
1434
1435    <!-- Allows an application to open windows using the type
1436         {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT},
1437         shown on top of all other applications.  Very few applications
1438         should use this permission; these windows are intended for
1439         system-level interaction with the user. -->
1440    <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
1441        android:permissionGroup="android.permission-group.DISPLAY"
1442        android:protectionLevel="dangerous"
1443        android:label="@string/permlab_systemAlertWindow"
1444        android:description="@string/permdesc_systemAlertWindow" />
1445
1446    <!-- ================================== -->
1447    <!-- Permissions affecting the system wallpaper -->
1448    <!-- ================================== -->
1449    <eat-comment />
1450
1451    <!-- Group of permissions that allow manipulation of how
1452         another application displays UI to the user. -->
1453    <permission-group android:name="android.permission-group.WALLPAPER"
1454        android:label="@string/permgrouplab_wallpaper"
1455        android:icon="@drawable/perm_group_wallpaper"
1456        android:description="@string/permgroupdesc_wallpaper"
1457        android:priority="150" />
1458
1459    <!-- Allows applications to set the wallpaper -->
1460    <permission android:name="android.permission.SET_WALLPAPER"
1461        android:permissionGroup="android.permission-group.WALLPAPER"
1462        android:protectionLevel="normal"
1463        android:label="@string/permlab_setWallpaper"
1464        android:description="@string/permdesc_setWallpaper" />
1465
1466    <!-- Allows applications to set the wallpaper hints -->
1467    <permission android:name="android.permission.SET_WALLPAPER_HINTS"
1468        android:permissionGroup="android.permission-group.WALLPAPER"
1469        android:protectionLevel="normal"
1470        android:label="@string/permlab_setWallpaperHints"
1471        android:description="@string/permdesc_setWallpaperHints" />
1472
1473    <!-- ============================================ -->
1474    <!-- Permissions for changing the system clock -->
1475    <!-- ============================================ -->
1476    <eat-comment />
1477
1478    <!-- Group of permissions that are related to system clock. -->
1479    <permission-group android:name="android.permission-group.SYSTEM_CLOCK"
1480        android:label="@string/permgrouplab_systemClock"
1481        android:icon="@drawable/perm_group_system_clock"
1482        android:description="@string/permgroupdesc_systemClock"
1483        android:priority="140" />
1484
1485    <!-- @SystemApi Allows applications to set the system time.
1486    <p>Not for use by third-party applications. -->
1487    <permission android:name="android.permission.SET_TIME"
1488        android:protectionLevel="signature|system"
1489        android:label="@string/permlab_setTime"
1490        android:description="@string/permdesc_setTime" />
1491
1492    <!-- Allows applications to set the system time zone -->
1493    <permission android:name="android.permission.SET_TIME_ZONE"
1494        android:permissionGroup="android.permission-group.SYSTEM_CLOCK"
1495        android:protectionLevel="normal"
1496        android:label="@string/permlab_setTimeZone"
1497        android:description="@string/permdesc_setTimeZone" />
1498
1499    <!-- ==================================================== -->
1500    <!-- Permissions related to changing status bar   -->
1501    <!-- ==================================================== -->
1502    <eat-comment />
1503
1504    <!-- Used for permissions that change the status bar -->
1505    <permission-group android:name="android.permission-group.STATUS_BAR"
1506        android:label="@string/permgrouplab_statusBar"
1507        android:icon="@drawable/perm_group_status_bar"
1508        android:description="@string/permgroupdesc_statusBar"
1509        android:priority="110" />
1510
1511    <!-- Allows an application to expand or collapse the status bar. -->
1512    <permission android:name="android.permission.EXPAND_STATUS_BAR"
1513        android:permissionGroup="android.permission-group.STATUS_BAR"
1514        android:protectionLevel="normal"
1515        android:label="@string/permlab_expandStatusBar"
1516        android:description="@string/permdesc_expandStatusBar" />
1517
1518    <!-- ============================================================== -->
1519    <!-- Permissions related to adding/removing shortcuts from Launcher -->
1520    <!-- ============================================================== -->
1521    <eat-comment />
1522
1523    <!-- Allows an application to install a shortcut in Launcher -->
1524    <permission
1525        android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
1526        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1527        android:protectionLevel="dangerous"
1528        android:label="@string/permlab_install_shortcut"
1529        android:description="@string/permdesc_install_shortcut" />
1530
1531        <!-- Allows an application to uninstall a shortcut in Launcher -->
1532    <permission
1533        android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
1534        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1535        android:protectionLevel="dangerous"
1536        android:label="@string/permlab_uninstall_shortcut"
1537        android:description="@string/permdesc_uninstall_shortcut"/>
1538
1539    <!-- ==================================================== -->
1540    <!-- Permissions related to accessing sync settings   -->
1541    <!-- ==================================================== -->
1542    <eat-comment />
1543
1544    <!-- Used for permissions that access the sync settings or sync
1545         related information. -->
1546    <permission-group android:name="android.permission-group.SYNC_SETTINGS"
1547        android:label="@string/permgrouplab_syncSettings"
1548        android:icon="@drawable/perm_group_sync_settings"
1549        android:description="@string/permgroupdesc_syncSettings"
1550        android:priority="120" />
1551
1552    <!-- Allows applications to read the sync settings -->
1553    <permission android:name="android.permission.READ_SYNC_SETTINGS"
1554        android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1555        android:protectionLevel="normal"
1556        android:description="@string/permdesc_readSyncSettings"
1557        android:label="@string/permlab_readSyncSettings" />
1558
1559    <!-- Allows applications to write the sync settings -->
1560    <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
1561        android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1562        android:protectionLevel="normal"
1563        android:description="@string/permdesc_writeSyncSettings"
1564        android:label="@string/permlab_writeSyncSettings" />
1565
1566    <!-- Allows applications to read the sync stats -->
1567    <permission android:name="android.permission.READ_SYNC_STATS"
1568        android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1569        android:protectionLevel="normal"
1570        android:description="@string/permdesc_readSyncStats"
1571        android:label="@string/permlab_readSyncStats" />
1572
1573
1574    <!-- ============================================ -->
1575    <!-- Permissions for low-level system interaction -->
1576    <!-- ============================================ -->
1577    <eat-comment />
1578
1579    <!-- Group of permissions that are related to system APIs.  Many
1580         of these are not permissions the user will be expected to understand,
1581         and such permissions should generally be marked as "normal" protection
1582         level so they don't get displayed.  This can also, however, be used
1583         for miscellaneous features that provide access to the operating system,
1584         such as writing the global system settings. -->
1585    <permission-group android:name="android.permission-group.SYSTEM_TOOLS"
1586        android:label="@string/permgrouplab_systemTools"
1587        android:icon="@drawable/perm_group_system_tools"
1588        android:description="@string/permgroupdesc_systemTools"
1589        android:priority="100" />
1590
1591    <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
1592    <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
1593        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1594        android:protectionLevel="signature"
1595        android:label="@string/permlab_setScreenCompatibility"
1596        android:description="@string/permdesc_setScreenCompatibility" />
1597
1598    <!-- Allows an application to access all multi-user external storage @hide -->
1599    <permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE"
1600        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1601        android:label="@string/permlab_sdcardAccessAll"
1602        android:description="@string/permdesc_sdcardAccessAll"
1603        android:protectionLevel="signature" />
1604
1605    <!-- @SystemApi Allows an application to modify the current configuration, such
1606         as locale. -->
1607    <permission android:name="android.permission.CHANGE_CONFIGURATION"
1608        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1609        android:protectionLevel="signature|system|development"
1610        android:label="@string/permlab_changeConfiguration"
1611        android:description="@string/permdesc_changeConfiguration" />
1612
1613    <!-- Allows an application to read or write the system settings. -->
1614    <permission android:name="android.permission.WRITE_SETTINGS"
1615        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1616        android:protectionLevel="normal"
1617        android:label="@string/permlab_writeSettings"
1618        android:description="@string/permdesc_writeSettings" />
1619
1620    <!-- @SystemApi Allows an application to modify the Google service map.
1621    <p>Not for use by third-party applications. -->
1622    <permission android:name="android.permission.WRITE_GSERVICES"
1623        android:protectionLevel="signature|system"
1624        android:label="@string/permlab_writeGservices"
1625        android:description="@string/permdesc_writeGservices" />
1626
1627    <!-- @SystemApi Allows an application to call
1628        {@link android.app.ActivityManager#forceStopPackage}.
1629        @hide -->
1630    <permission android:name="android.permission.FORCE_STOP_PACKAGES"
1631        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1632        android:protectionLevel="signature|system"
1633        android:label="@string/permlab_forceStopPackages"
1634        android:description="@string/permdesc_forceStopPackages" />
1635
1636    <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
1637         An active window is the window that has fired an accessibility event. -->
1638    <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
1639        android:permissionGroup="android.permission-group.PERSONAL_INFO"
1640        android:protectionLevel="signature|system"
1641        android:label="@string/permlab_retrieve_window_content"
1642        android:description="@string/permdesc_retrieve_window_content" />
1643
1644    <!-- @SystemApi Modify the global animation scaling factor.
1645    <p>Not for use by third-party applications. -->
1646    <permission android:name="android.permission.SET_ANIMATION_SCALE"
1647        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1648        android:protectionLevel="signature|system|development"
1649        android:label="@string/permlab_setAnimationScale"
1650        android:description="@string/permdesc_setAnimationScale" />
1651
1652    <!-- @deprecated This functionality will be removed in the future; please do
1653         not use. Allow an application to make its activities persistent. -->
1654    <permission android:name="android.permission.PERSISTENT_ACTIVITY"
1655        android:permissionGroup="android.permission-group.APP_INFO"
1656        android:protectionLevel="normal"
1657        android:label="@string/permlab_persistentActivity"
1658        android:description="@string/permdesc_persistentActivity" />
1659
1660    <!-- Allows an application to find out the space used by any package. -->
1661    <permission android:name="android.permission.GET_PACKAGE_SIZE"
1662        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1663        android:protectionLevel="normal"
1664        android:label="@string/permlab_getPackageSize"
1665        android:description="@string/permdesc_getPackageSize" />
1666
1667    <!-- @deprecated No longer useful, see
1668         {@link android.content.pm.PackageManager#addPackageToPreferred}
1669         for details. -->
1670    <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
1671        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1672        android:protectionLevel="signature"
1673        android:label="@string/permlab_setPreferredApplications"
1674        android:description="@string/permdesc_setPreferredApplications" />
1675
1676    <!-- Allows an application to receive the
1677         {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
1678         broadcast after the system finishes booting.  If you don't
1679         request this permission, you will not receive the broadcast at
1680         that time.  Though holding this permission does not have any
1681         security implications, it can have a negative impact on the
1682         user experience by increasing the amount of time it takes the
1683         system to start and allowing applications to have themselves
1684         running without the user being aware of them.  As such, you must
1685         explicitly declare your use of this facility to make that visible
1686         to the user. -->
1687    <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
1688        android:permissionGroup="android.permission-group.APP_INFO"
1689        android:protectionLevel="normal"
1690        android:label="@string/permlab_receiveBootCompleted"
1691        android:description="@string/permdesc_receiveBootCompleted" />
1692
1693    <!-- Allows an application to broadcast sticky intents.  These are
1694         broadcasts whose data is held by the system after being finished,
1695         so that clients can quickly retrieve that data without having
1696         to wait for the next broadcast. -->
1697    <permission android:name="android.permission.BROADCAST_STICKY"
1698        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1699        android:protectionLevel="normal"
1700        android:label="@string/permlab_broadcastSticky"
1701        android:description="@string/permdesc_broadcastSticky" />
1702
1703    <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
1704    <p>Not for use by third-party applications.-->
1705    <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
1706        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1707        android:protectionLevel="system|signature"
1708        android:label="@string/permlab_mount_unmount_filesystems"
1709        android:description="@string/permdesc_mount_unmount_filesystems" />
1710
1711    <!-- @SystemApi Allows formatting file systems for removable storage.
1712    <p>Not for use by third-party applications. -->
1713    <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
1714        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1715        android:protectionLevel="system|signature"
1716        android:label="@string/permlab_mount_format_filesystems"
1717        android:description="@string/permdesc_mount_format_filesystems" />
1718
1719    <!-- Allows access to ASEC non-destructive API calls
1720         @hide  -->
1721    <permission android:name="android.permission.ASEC_ACCESS"
1722        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1723        android:protectionLevel="signature"
1724        android:label="@string/permlab_asec_access"
1725        android:description="@string/permdesc_asec_access" />
1726
1727    <!-- Allows creation of ASEC volumes
1728         @hide  -->
1729    <permission android:name="android.permission.ASEC_CREATE"
1730        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1731        android:protectionLevel="signature"
1732        android:label="@string/permlab_asec_create"
1733        android:description="@string/permdesc_asec_create" />
1734
1735    <!-- Allows destruction of ASEC volumes
1736         @hide  -->
1737    <permission android:name="android.permission.ASEC_DESTROY"
1738        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1739        android:protectionLevel="signature"
1740        android:label="@string/permlab_asec_destroy"
1741        android:description="@string/permdesc_asec_destroy" />
1742
1743    <!-- Allows mount / unmount of ASEC volumes
1744         @hide  -->
1745    <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
1746        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1747        android:protectionLevel="signature"
1748        android:label="@string/permlab_asec_mount_unmount"
1749        android:description="@string/permdesc_asec_mount_unmount" />
1750
1751    <!-- Allows rename of ASEC volumes
1752         @hide  -->
1753    <permission android:name="android.permission.ASEC_RENAME"
1754        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1755        android:protectionLevel="signature"
1756        android:label="@string/permlab_asec_rename"
1757        android:description="@string/permdesc_asec_rename" />
1758
1759    <!-- @SystemApi Allows applications to write the apn settings.
1760    <p>Not for use by third-party applications. -->
1761    <permission android:name="android.permission.WRITE_APN_SETTINGS"
1762                android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1763                android:protectionLevel="signature|system"
1764                android:description="@string/permdesc_writeApnSettings"
1765                android:label="@string/permlab_writeApnSettings" />
1766
1767    <!-- Allows an application to allow access the subscribed feeds
1768         ContentProvider. -->
1769    <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
1770        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1771        android:label="@string/permlab_subscribedFeedsRead"
1772        android:description="@string/permdesc_subscribedFeedsRead"
1773        android:protectionLevel="normal" />
1774    <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
1775        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1776        android:label="@string/permlab_subscribedFeedsWrite"
1777        android:description="@string/permdesc_subscribedFeedsWrite"
1778        android:protectionLevel="dangerous" />
1779
1780    <!-- Allows applications to change network connectivity state -->
1781    <permission android:name="android.permission.CHANGE_NETWORK_STATE"
1782        android:permissionGroup="android.permission-group.NETWORK"
1783        android:protectionLevel="normal"
1784        android:description="@string/permdesc_changeNetworkState"
1785        android:label="@string/permlab_changeNetworkState" />
1786
1787    <!-- Allows an application to clear the caches of all installed
1788         applications on the device.  -->
1789    <permission android:name="android.permission.CLEAR_APP_CACHE"
1790        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1791        android:protectionLevel="dangerous"
1792        android:label="@string/permlab_clearAppCache"
1793        android:description="@string/permdesc_clearAppCache" />
1794
1795    <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
1796         @hide -->
1797    <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
1798        android:protectionLevel="signature|system"
1799        android:label="@string/permlab_anyCodecForPlayback"
1800        android:description="@string/permdesc_anyCodecForPlayback" />
1801
1802    <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
1803         behalf of the user.
1804         @hide -->
1805    <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
1806        android:protectionLevel="signature|system"
1807        android:label="@string/permlab_manageCaCertificates"
1808        android:description="@string/permdesc_manageCaCertificates" />
1809
1810    <!-- @SystemApi Allows an application to do certain operations needed for
1811         interacting with the recovery (system update) system. -->
1812    <permission android:name="android.permission.RECOVERY"
1813        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1814        android:protectionLevel="signature|system"
1815        android:label="@string/permlab_recovery"
1816        android:description="@string/permdesc_recovery" />
1817
1818    <!-- Allows the system to bind to an application's task services
1819         @hide -->
1820    <permission android:name="android.permission.BIND_JOB_SERVICE"
1821        android:protectionLevel="signature"
1822        android:label="@string/permlab_bindJobService"
1823        android:description="@string/permdesc_bindJobService" />
1824    <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
1825
1826    <!-- ========================================= -->
1827    <!-- Permissions for special development tools -->
1828    <!-- ========================================= -->
1829    <eat-comment />
1830
1831    <!-- Group of permissions that are related to development features.  These
1832         are not permissions that should appear in third-party applications; they
1833         protect APIs that are intended only to be used for development
1834         purposes. -->
1835    <permission-group android:name="android.permission-group.DEVELOPMENT_TOOLS"
1836        android:label="@string/permgrouplab_developmentTools"
1837        android:description="@string/permgroupdesc_developmentTools"
1838        android:priority="310" />
1839
1840    <!-- @SystemApi Allows an application to read or write the secure system settings.
1841    <p>Not for use by third-party applications. -->
1842    <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
1843        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1844        android:protectionLevel="signature|system|development"
1845        android:label="@string/permlab_writeSecureSettings"
1846        android:description="@string/permdesc_writeSecureSettings" />
1847
1848    <!-- @SystemApi Allows an application to retrieve state dump information from system services.
1849    <p>Not for use by third-party applications. -->
1850    <permission android:name="android.permission.DUMP"
1851        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1852        android:protectionLevel="signature|system|development"
1853        android:label="@string/permlab_dump"
1854        android:description="@string/permdesc_dump" />
1855
1856    <!-- @SystemApi Allows an application to read the low-level system log files.
1857    <p>Not for use by third-party applications, because
1858    Log entries can contain the user's private information. -->
1859    <permission android:name="android.permission.READ_LOGS"
1860        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1861        android:protectionLevel="signature|system|development"
1862        android:label="@string/permlab_readLogs"
1863        android:description="@string/permdesc_readLogs" />
1864
1865    <!-- @SystemApi Configure an application for debugging.
1866    <p>Not for use by third-party applications. -->
1867    <permission android:name="android.permission.SET_DEBUG_APP"
1868        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1869        android:protectionLevel="signature|system|development"
1870        android:label="@string/permlab_setDebugApp"
1871        android:description="@string/permdesc_setDebugApp" />
1872
1873    <!-- @SystemApi Allows an application to set the maximum number of (not needed)
1874         application processes that can be running.
1875         <p>Not for use by third-party applications. -->
1876    <permission android:name="android.permission.SET_PROCESS_LIMIT"
1877        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1878        android:protectionLevel="signature|system|development"
1879        android:label="@string/permlab_setProcessLimit"
1880        android:description="@string/permdesc_setProcessLimit" />
1881
1882    <!-- @SystemApi Allows an application to control whether activities are immediately
1883         finished when put in the background.
1884         <p>Not for use by third-party applications. -->
1885    <permission android:name="android.permission.SET_ALWAYS_FINISH"
1886        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1887        android:protectionLevel="signature|system|development"
1888        android:label="@string/permlab_setAlwaysFinish"
1889        android:description="@string/permdesc_setAlwaysFinish" />
1890
1891    <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
1892    <p>Not for use by third-party applications. -->
1893    <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
1894        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1895        android:protectionLevel="signature|system|development"
1896        android:label="@string/permlab_signalPersistentProcesses"
1897        android:description="@string/permdesc_signalPersistentProcesses" />
1898
1899    <!-- ==================================== -->
1900    <!-- Private (signature-only) permissions -->
1901    <!-- ==================================== -->
1902    <eat-comment />
1903
1904    <!-- @SystemApi Allows applications to RW to diagnostic resources.
1905    <p>Not for use by third-party applications. -->
1906    <permission android:name="android.permission.DIAGNOSTIC"
1907        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1908        android:protectionLevel="signature"
1909        android:description="@string/permdesc_diagnostic"
1910        android:label="@string/permlab_diagnostic" />
1911
1912    <!-- @SystemApi Allows an application to open, close, or disable the status bar
1913         and its icons.
1914         <p>Not for use by third-party applications. -->
1915    <permission android:name="android.permission.STATUS_BAR"
1916        android:label="@string/permlab_statusBar"
1917        android:description="@string/permdesc_statusBar"
1918        android:protectionLevel="signature|system" />
1919
1920    <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
1921    @hide -->
1922    <permission android:name="android.permission.STATUS_BAR_SERVICE"
1923        android:label="@string/permlab_statusBarService"
1924        android:description="@string/permdesc_statusBarService"
1925        android:protectionLevel="signature" />
1926
1927    <!-- Allows an application to force a BACK operation on whatever is the
1928         top activity.
1929         <p>Not for use by third-party applications. -->
1930    <permission android:name="android.permission.FORCE_BACK"
1931        android:label="@string/permlab_forceBack"
1932        android:description="@string/permdesc_forceBack"
1933        android:protectionLevel="signature" />
1934
1935    <!-- @SystemApi Allows an application to update device statistics.
1936    <p>Not for use by third-party applications. -->
1937    <permission android:name="android.permission.UPDATE_DEVICE_STATS"
1938        android:label="@string/permlab_updateBatteryStats"
1939        android:description="@string/permdesc_updateBatteryStats"
1940        android:protectionLevel="signature|system" />
1941
1942    <!-- @SystemApi @hide Allows an application to collect battery statistics -->
1943    <permission android:name="android.permission.GET_APP_OPS_STATS"
1944        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1945        android:label="@string/permlab_getAppOpsStats"
1946        android:description="@string/permdesc_getAppOpsStats"
1947        android:protectionLevel="signature|system|development" />
1948
1949    <!-- @SystemApi Allows an application to update application operation statistics. Not for
1950         use by third party apps. @hide -->
1951    <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
1952        android:label="@string/permlab_updateAppOpsStats"
1953        android:description="@string/permdesc_updateAppOpsStats"
1954        android:protectionLevel="signature|system" />
1955
1956    <!-- Allows an application to open windows that are for use by parts
1957         of the system user interface.
1958         <p>Not for use by third-party applications. -->
1959    <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
1960        android:label="@string/permlab_internalSystemWindow"
1961        android:description="@string/permdesc_internalSystemWindow"
1962        android:protectionLevel="signature" />
1963
1964    <!-- Allows an application to manage (create, destroy,
1965         Z-order) application tokens in the window manager.
1966         <p>Not for use by third-party applications. -->
1967    <permission android:name="android.permission.MANAGE_APP_TOKENS"
1968        android:label="@string/permlab_manageAppTokens"
1969        android:description="@string/permdesc_manageAppTokens"
1970        android:protectionLevel="signature" />
1971
1972    <!-- @hide Allows the application to temporarily freeze the screen for a
1973         full-screen transition. -->
1974    <permission android:name="android.permission.FREEZE_SCREEN"
1975        android:label="@string/permlab_freezeScreen"
1976        android:description="@string/permdesc_freezeScreen"
1977        android:protectionLevel="signature" />
1978
1979    <!-- Allows an application to inject user events (keys, touch, trackball)
1980         into the event stream and deliver them to ANY window.  Without this
1981         permission, you can only deliver events to windows in your own process.
1982         <p>Not for use by third-party applications. -->
1983    <permission android:name="android.permission.INJECT_EVENTS"
1984        android:label="@string/permlab_injectEvents"
1985        android:description="@string/permdesc_injectEvents"
1986        android:protectionLevel="signature" />
1987
1988    <!-- @hide Allows an application to register an input filter which filters the stream
1989         of user events (keys, touch, trackball) before they are dispatched to any window. -->
1990    <permission android:name="android.permission.FILTER_EVENTS"
1991        android:label="@string/permlab_filter_events"
1992        android:description="@string/permdesc_filter_events"
1993        android:protectionLevel="signature" />
1994
1995    <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
1996    <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
1997        android:label="@string/permlab_retrieveWindowToken"
1998        android:description="@string/permdesc_retrieveWindowToken"
1999        android:protectionLevel="signature" />
2000
2001    <!-- @hide Allows an application to collect frame statistics -->
2002    <permission android:name="android.permission.FRAME_STATS"
2003         android:label="@string/permlab_frameStats"
2004         android:description="@string/permdesc_frameStats"
2005         android:protectionLevel="signature" />
2006
2007    <!-- @hide Allows an application to temporary enable accessibility on the device. -->
2008    <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
2009        android:label="@string/permlab_temporary_enable_accessibility"
2010        android:description="@string/permdesc_temporary_enable_accessibility"
2011        android:protectionLevel="signature" />
2012
2013    <!-- Allows an application to watch and control how activities are
2014         started globally in the system.  Only for is in debugging
2015         (usually the monkey command).
2016         <p>Not for use by third-party applications. -->
2017    <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
2018        android:label="@string/permlab_runSetActivityWatcher"
2019        android:description="@string/permdesc_runSetActivityWatcher"
2020        android:protectionLevel="signature" />
2021
2022    <!-- @SystemApi Allows an application to call the activity manager shutdown() API
2023         to put the higher-level system there into a shutdown state.
2024         @hide -->
2025    <permission android:name="android.permission.SHUTDOWN"
2026        android:label="@string/permlab_shutdown"
2027        android:description="@string/permdesc_shutdown"
2028        android:protectionLevel="signature|system" />
2029
2030    <!-- @SystemApi Allows an application to tell the activity manager to temporarily
2031         stop application switches, putting it into a special mode that
2032         prevents applications from immediately switching away from some
2033         critical UI such as the home screen.
2034         @hide -->
2035    <permission android:name="android.permission.STOP_APP_SWITCHES"
2036        android:label="@string/permlab_stopAppSwitches"
2037        android:description="@string/permdesc_stopAppSwitches"
2038        android:protectionLevel="signature|system" />
2039
2040    <!-- Allows an application to retrieve private information about
2041         the current top activity, such as any assist context it can provide.
2042         <p>Not for use by third-party applications. -->
2043    <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
2044        android:label="@string/permlab_getTopActivityInfo"
2045        android:description="@string/permdesc_getTopActivityInfo"
2046        android:protectionLevel="signature" />
2047
2048    <!-- Allows an application to retrieve the current state of keys and
2049         switches.
2050         <p>Not for use by third-party applications.
2051         @deprecated The API that used this permission has been removed. -->
2052    <permission android:name="android.permission.READ_INPUT_STATE"
2053        android:label="@string/permlab_readInputState"
2054        android:description="@string/permdesc_readInputState"
2055        android:protectionLevel="signature" />
2056
2057    <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
2058         to ensure that only the system can bind to it. -->
2059    <permission android:name="android.permission.BIND_INPUT_METHOD"
2060        android:label="@string/permlab_bindInputMethod"
2061        android:description="@string/permdesc_bindInputMethod"
2062        android:protectionLevel="signature" />
2063
2064    <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
2065         to ensure that only the system can bind to it. -->
2066    <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
2067        android:label="@string/permlab_bindAccessibilityService"
2068        android:description="@string/permdesc_bindAccessibilityService"
2069        android:protectionLevel="signature" />
2070
2071    <!-- Must be required by a {@link android.printservice.PrintService},
2072         to ensure that only the system can bind to it. -->
2073    <permission android:name="android.permission.BIND_PRINT_SERVICE"
2074        android:label="@string/permlab_bindPrintService"
2075        android:description="@string/permdesc_bindPrintService"
2076        android:protectionLevel="signature" />
2077
2078    <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
2079         or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
2080         the system can bind to it. -->
2081    <permission android:name="android.permission.BIND_NFC_SERVICE"
2082        android:label="@string/permlab_bindNfcService"
2083        android:description="@string/permdesc_bindNfcService"
2084        android:protectionLevel="signature" />
2085
2086    <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
2087         @hide -->
2088    <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
2089        android:label="@string/permlab_bindPrintSpoolerService"
2090        android:description="@string/permdesc_bindPrintSpoolerService"
2091        android:protectionLevel="signature" />
2092
2093    <!-- Must be required by a TextService (e.g. SpellCheckerService)
2094         to ensure that only the system can bind to it. -->
2095    <permission android:name="android.permission.BIND_TEXT_SERVICE"
2096        android:label="@string/permlab_bindTextService"
2097        android:description="@string/permdesc_bindTextService"
2098        android:protectionLevel="signature" />
2099
2100    <!-- Must be required by a {@link android.net.VpnService},
2101         to ensure that only the system can bind to it. -->
2102    <permission android:name="android.permission.BIND_VPN_SERVICE"
2103        android:label="@string/permlab_bindVpnService"
2104        android:description="@string/permdesc_bindVpnService"
2105        android:protectionLevel="signature" />
2106
2107    <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
2108         to ensure that only the system can bind to it. -->
2109    <permission android:name="android.permission.BIND_WALLPAPER"
2110        android:label="@string/permlab_bindWallpaper"
2111        android:description="@string/permdesc_bindWallpaper"
2112        android:protectionLevel="signature|system" />
2113
2114    <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
2115         to ensure that only the system can bind to it. -->
2116    <permission android:name="android.permission.BIND_VOICE_INTERACTION"
2117        android:label="@string/permlab_bindVoiceInteraction"
2118        android:description="@string/permdesc_bindVoiceInteraction"
2119        android:protectionLevel="signature" />
2120
2121    <!-- Must be required by hotword enrollment application,
2122         to ensure that only the system can interact with it.
2123         @hide <p>Not for use by third-party applications.</p> -->
2124    <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
2125        android:label="@string/permlab_manageVoiceKeyphrases"
2126        android:description="@string/permdesc_manageVoiceKeyphrases"
2127        android:protectionLevel="signature|system" />
2128
2129    <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
2130         to ensure that only the system can bind to it.
2131         @hide -->
2132    <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
2133        android:label="@string/permlab_bindRemoteDisplay"
2134        android:description="@string/permdesc_bindRemoteDisplay"
2135        android:protectionLevel="signature" />
2136
2137    <!-- Must be required by a {@link android.media.tv.TvInputService}
2138         to ensure that only the system can bind to it. -->
2139    <permission android:name="android.permission.BIND_TV_INPUT"
2140        android:label="@string/permlab_bindTvInput"
2141        android:description="@string/permdesc_bindTvInput"
2142        android:protectionLevel="signature|system" />
2143
2144    <!-- Must be required by a {@link android.media.routeprovider.RouteProviderService}
2145         to ensure that only the system can interact with it.
2146         @hide -->
2147    <permission android:name="android.permission.BIND_ROUTE_PROVIDER"
2148        android:label="@string/permlab_bindRouteProvider"
2149        android:description="@string/permdesc_bindRouteProvider"
2150        android:protectionLevel="signature" />
2151
2152    <!-- Must be required by device administration receiver, to ensure that only the
2153         system can interact with it. -->
2154    <permission android:name="android.permission.BIND_DEVICE_ADMIN"
2155        android:label="@string/permlab_bindDeviceAdmin"
2156        android:description="@string/permdesc_bindDeviceAdmin"
2157        android:protectionLevel="signature" />
2158
2159    <!-- @SystemApi Required to add or remove another application as a device admin.
2160         <p>Not for use by third-party applications.
2161         @hide -->
2162    <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
2163        android:label="@string/permlab_manageDeviceAdmins"
2164        android:description="@string/permdesc_manageDeviceAdmins"
2165        android:protectionLevel="signature|system" />
2166
2167    <!-- Allows low-level access to setting the orientation (actually
2168         rotation) of the screen.
2169         <p>Not for use by third-party applications. -->
2170    <permission android:name="android.permission.SET_ORIENTATION"
2171        android:label="@string/permlab_setOrientation"
2172        android:description="@string/permdesc_setOrientation"
2173        android:protectionLevel="signature" />
2174
2175    <!-- Allows low-level access to setting the pointer speed.
2176         <p>Not for use by third-party applications. -->
2177    <permission android:name="android.permission.SET_POINTER_SPEED"
2178        android:label="@string/permlab_setPointerSpeed"
2179        android:description="@string/permdesc_setPointerSpeed"
2180        android:protectionLevel="signature" />
2181
2182    <!-- Allows low-level access to setting input device calibration.
2183         <p>Not for use by normal applications.
2184         @hide -->
2185    <permission android:name="android.permission.SET_INPUT_CALIBRATION"
2186        android:label="@string/permlab_setInputCalibration"
2187        android:description="@string/permdesc_setInputCalibration"
2188        android:protectionLevel="signature" />
2189
2190    <!-- Allows low-level access to setting the keyboard layout.
2191         <p>Not for use by third-party applications.
2192         @hide -->
2193    <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
2194        android:label="@string/permlab_setKeyboardLayout"
2195        android:description="@string/permdesc_setKeyboardLayout"
2196        android:protectionLevel="signature" />
2197
2198    <!-- @SystemApi Allows an application to install packages.
2199    <p>Not for use by third-party applications. -->
2200    <permission android:name="android.permission.INSTALL_PACKAGES"
2201        android:label="@string/permlab_installPackages"
2202        android:description="@string/permdesc_installPackages"
2203        android:protectionLevel="signature|system" />
2204
2205    <!-- Allows an application to clear user data.
2206    <p>Not for use by third-party applications. -->
2207    <permission android:name="android.permission.CLEAR_APP_USER_DATA"
2208        android:label="@string/permlab_clearAppUserData"
2209        android:description="@string/permdesc_clearAppUserData"
2210        android:protectionLevel="signature" />
2211
2212    <!-- @SystemApi Allows an application to delete cache files.
2213    <p>Not for use by third-party applications. -->
2214    <permission android:name="android.permission.DELETE_CACHE_FILES"
2215        android:label="@string/permlab_deleteCacheFiles"
2216        android:description="@string/permdesc_deleteCacheFiles"
2217        android:protectionLevel="signature|system" />
2218
2219    <!-- @SystemApi Allows an application to delete packages.
2220    <p>Not for use by third-party applications. -->
2221    <permission android:name="android.permission.DELETE_PACKAGES"
2222        android:label="@string/permlab_deletePackages"
2223        android:description="@string/permdesc_deletePackages"
2224        android:protectionLevel="signature|system" />
2225
2226    <!-- @SystemApi Allows an application to move location of installed package.
2227         @hide -->
2228    <permission android:name="android.permission.MOVE_PACKAGE"
2229        android:label="@string/permlab_movePackage"
2230        android:description="@string/permdesc_movePackage"
2231        android:protectionLevel="signature|system" />
2232
2233    <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
2234         enabled or not.
2235         <p>Not for use by third-party applications. -->
2236    <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
2237        android:label="@string/permlab_changeComponentState"
2238        android:description="@string/permdesc_changeComponentState"
2239        android:protectionLevel="signature|system" />
2240
2241    <!-- @hide Allows an application to grant or revoke specific permissions. -->
2242    <permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS"
2243        android:label="@string/permlab_grantRevokePermissions"
2244        android:description="@string/permdesc_grantRevokePermissions"
2245        android:protectionLevel="signature" />
2246
2247    <!-- Allows an application to use SurfaceFlinger's low level features.
2248    <p>Not for use by third-party applications. -->
2249    <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
2250        android:label="@string/permlab_accessSurfaceFlinger"
2251        android:description="@string/permdesc_accessSurfaceFlinger"
2252        android:protectionLevel="signature" />
2253
2254    <!-- @SystemApi Allows an application to take screen shots and more generally
2255         get access to the frame buffer data.
2256         <p>Not for use by third-party applications. -->
2257    <permission android:name="android.permission.READ_FRAME_BUFFER"
2258        android:label="@string/permlab_readFrameBuffer"
2259        android:description="@string/permdesc_readFrameBuffer"
2260        android:protectionLevel="signature|system" />
2261
2262    <!-- Allows an application to use InputFlinger's low level features.
2263         @hide -->
2264    <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
2265        android:label="@string/permlab_accessInputFlinger"
2266        android:description="@string/permdesc_accessInputFlinger"
2267        android:protectionLevel="signature" />
2268
2269    <!-- Allows an application to configure and connect to Wifi displays
2270         @hide -->
2271    <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
2272        android:label="@string/permlab_configureWifiDisplay"
2273        android:description="@string/permdesc_configureWifiDisplay"
2274        android:protectionLevel="signature" />
2275
2276    <!-- Allows an application to control low-level features of Wifi displays
2277         such as opening an RTSP socket.  This permission should only be used
2278         by the display manager.
2279         @hide -->
2280    <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
2281        android:label="@string/permlab_controlWifiDisplay"
2282        android:description="@string/permdesc_controlWifiDisplay"
2283        android:protectionLevel="signature" />
2284
2285    <!-- @SystemApi Allows an application to capture audio output.
2286         <p>Not for use by third-party applications.</p> -->
2287    <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
2288        android:label="@string/permlab_captureAudioOutput"
2289        android:description="@string/permdesc_captureAudioOutput"
2290        android:protectionLevel="signature|system" />
2291
2292    <!-- @SystemApi Allows an application to capture audio for hotword detection.
2293         <p>Not for use by third-party applications.</p>
2294         @hide -->
2295    <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
2296        android:label="@string/permlab_captureAudioHotword"
2297        android:description="@string/permdesc_captureAudioHotword"
2298        android:protectionLevel="signature|system" />
2299
2300    <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
2301         <p>Not for use by third-party applications.</p>
2302         @hide -->
2303    <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
2304        android:label="@string/permlab_modifyAudioRouting"
2305        android:description="@string/permdesc_modifyAudioRouting"
2306        android:protectionLevel="signature|system" />
2307
2308    <!-- @SystemApi Allows an application to capture video output.
2309         <p>Not for use by third-party applications.</p> -->
2310    <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
2311        android:label="@string/permlab_captureVideoOutput"
2312        android:description="@string/permdesc_captureVideoOutput"
2313        android:protectionLevel="signature|system" />
2314
2315    <!-- @SystemApi Allows an application to capture secure video output.
2316         <p>Not for use by third-party applications.</p> -->
2317    <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
2318        android:label="@string/permlab_captureSecureVideoOutput"
2319        android:description="@string/permdesc_captureSecureVideoOutput"
2320        android:protectionLevel="signature|system" />
2321
2322    <!-- @SystemApi Allows an application to know what content is playing and control its playback.
2323         <p>Not for use by third-party applications due to privacy of media consumption</p>  -->
2324    <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
2325        android:label="@string/permlab_mediaContentControl"
2326        android:description="@string/permdesc_mediaContentControl"
2327        android:protectionLevel="signature|system" />
2328
2329    <!-- Required to be able to disable the device (very dangerous!).
2330    <p>Not for use by third-party applications.. -->
2331    <permission android:name="android.permission.BRICK"
2332        android:label="@string/permlab_brick"
2333        android:description="@string/permdesc_brick"
2334        android:protectionLevel="signature" />
2335
2336    <!-- @SystemApi Required to be able to reboot the device.
2337    <p>Not for use by third-party applications. -->
2338    <permission android:name="android.permission.REBOOT"
2339        android:label="@string/permlab_reboot"
2340        android:description="@string/permdesc_reboot"
2341        android:protectionLevel="signature|system" />
2342
2343   <!-- Allows low-level access to power management.
2344   <p>Not for use by third-party applications. -->
2345    <permission android:name="android.permission.DEVICE_POWER"
2346        android:label="@string/permlab_devicePower"
2347        android:description="@string/permdesc_devicePower"
2348        android:protectionLevel="signature" />
2349
2350   <!-- @hide Allows low-level access to tun tap driver -->
2351    <permission android:name="android.permission.NET_TUNNELING"
2352        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2353        android:protectionLevel="signature" />
2354
2355    <!-- Run as a manufacturer test application, running as the root user.
2356         Only available when the device is running in manufacturer test mode.
2357         <p>Not for use by third-party applications. -->
2358    <permission android:name="android.permission.FACTORY_TEST"
2359        android:label="@string/permlab_factoryTest"
2360        android:description="@string/permdesc_factoryTest"
2361        android:protectionLevel="signature" />
2362
2363    <!-- Allows an application to broadcast a notification that an application
2364         package has been removed.
2365         <p>Not for use by third-party applications. -->
2366    <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
2367        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2368        android:label="@string/permlab_broadcastPackageRemoved"
2369        android:description="@string/permdesc_broadcastPackageRemoved"
2370        android:protectionLevel="signature" />
2371
2372    <!-- Allows an application to broadcast an SMS receipt notification.
2373    <p>Not for use by third-party applications. -->
2374    <permission android:name="android.permission.BROADCAST_SMS"
2375        android:permissionGroup="android.permission-group.MESSAGES"
2376        android:label="@string/permlab_broadcastSmsReceived"
2377        android:description="@string/permdesc_broadcastSmsReceived"
2378        android:protectionLevel="signature" />
2379
2380    <!-- Allows an application to broadcast a WAP PUSH receipt notification.
2381    <p>Not for use by third-party applications. -->
2382    <permission android:name="android.permission.BROADCAST_WAP_PUSH"
2383        android:permissionGroup="android.permission-group.MESSAGES"
2384        android:label="@string/permlab_broadcastWapPush"
2385        android:description="@string/permdesc_broadcastWapPush"
2386        android:protectionLevel="signature" />
2387
2388    <!-- @SystemApi Allows an application to broadcast a SCORE_NETWORKS request.
2389         <p>Not for use by third-party applications. @hide -->
2390    <permission android:name="android.permission.BROADCAST_SCORE_NETWORKS"
2391        android:label="@string/permlab_broadcastScoreNetworks"
2392        android:description="@string/permdesc_broadcastScoreNetworks"
2393        android:protectionLevel="signature|system" />
2394
2395    <!-- @SystemApi Not for use by third-party applications. -->
2396    <permission android:name="android.permission.MASTER_CLEAR"
2397        android:label="@string/permlab_masterClear"
2398        android:description="@string/permdesc_masterClear"
2399        android:protectionLevel="signature|system" />
2400
2401    <!-- @SystemApi Allows an application to call any phone number, including emergency
2402         numbers, without going through the Dialer user interface for the user
2403         to confirm the call being placed.
2404         <p>Not for use by third-party applications. -->
2405    <permission android:name="android.permission.CALL_PRIVILEGED"
2406        android:label="@string/permlab_callPrivileged"
2407        android:description="@string/permdesc_callPrivileged"
2408        android:protectionLevel="signature|system" />
2409
2410    <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
2411    <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
2412        android:label="@string/permlab_performCdmaProvisioning"
2413        android:description="@string/permdesc_performCdmaProvisioning"
2414        android:protectionLevel="signature|system" />
2415
2416    <!-- @SystemApi Allows enabling/disabling location update notifications from
2417         the radio.
2418         <p>Not for use by third-party applications. -->
2419    <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
2420        android:label="@string/permlab_locationUpdates"
2421        android:description="@string/permdesc_locationUpdates"
2422        android:protectionLevel="signature|system" />
2423
2424    <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
2425         database, to change values that get uploaded.
2426         <p>Not for use by third-party applications. -->
2427    <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
2428        android:label="@string/permlab_checkinProperties"
2429        android:description="@string/permdesc_checkinProperties"
2430        android:protectionLevel="signature|system" />
2431
2432    <!-- @SystemApi Allows an application to collect component usage
2433         statistics @hide -->
2434    <permission android:name="android.permission.PACKAGE_USAGE_STATS"
2435        android:label="@string/permlab_pkgUsageStats"
2436        android:description="@string/permdesc_pkgUsageStats"
2437        android:protectionLevel="signature|system" />
2438
2439    <!-- @SystemApi Allows an application to collect battery statistics -->
2440    <permission android:name="android.permission.BATTERY_STATS"
2441        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2442        android:label="@string/permlab_batteryStats"
2443        android:description="@string/permdesc_batteryStats"
2444        android:protectionLevel="signature|system" />
2445
2446    <!-- @SystemApi Allows an application to control the backup and restore process.
2447    <p>Not for use by third-party applications.
2448         @hide pending API council -->
2449    <permission android:name="android.permission.BACKUP"
2450        android:label="@string/permlab_backup"
2451        android:description="@string/permdesc_backup"
2452        android:protectionLevel="signature|system" />
2453
2454    <!-- Allows a package to launch the secure full-backup confirmation UI.
2455         ONLY the system process may hold this permission.
2456         @hide -->
2457    <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
2458        android:label="@string/permlab_confirm_full_backup"
2459        android:description="@string/permdesc_confirm_full_backup"
2460        android:protectionLevel="signature" />
2461
2462    <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
2463         to ensure that only the system can bind to it. -->
2464    <permission android:name="android.permission.BIND_REMOTEVIEWS"
2465        android:label="@string/permlab_bindRemoteViews"
2466        android:description="@string/permdesc_bindRemoteViews"
2467        android:protectionLevel="signature|system" />
2468
2469    <!-- @SystemApi Allows an application to tell the AppWidget service which application
2470         can access AppWidget's data.  The normal user flow is that a user
2471         picks an AppWidget to go into a particular host, thereby giving that
2472         host application access to the private data from the AppWidget app.
2473         An application that has this permission should honor that contract.
2474         <p>Not for use by third-party applications. -->
2475    <permission android:name="android.permission.BIND_APPWIDGET"
2476        android:permissionGroup="android.permission-group.PERSONAL_INFO"
2477        android:label="@string/permlab_bindGadget"
2478        android:description="@string/permdesc_bindGadget"
2479        android:protectionLevel="signature|system" />
2480
2481    <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
2482         keyguard widget
2483         @hide -->
2484    <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
2485        android:permissionGroup="android.permission-group.PERSONAL_INFO"
2486        android:protectionLevel="signature|system" />
2487
2488    <!-- @SystemApi Internal permission allowing an application to query/set which
2489         applications can bind AppWidgets.
2490         @hide -->
2491    <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
2492        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2493        android:protectionLevel="signature|system" />
2494
2495    <!-- Allows applications to change the background data setting.
2496    <p>Not for use by third-party applications.
2497         @hide pending API council -->
2498    <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
2499        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2500        android:protectionLevel="signature"
2501        android:description="@string/permdesc_changeBackgroundDataSetting"
2502        android:label="@string/permlab_changeBackgroundDataSetting" />
2503
2504    <!-- @SystemApi This permission can be used on content providers to allow the global
2505         search system to access their data.  Typically it used when the
2506         provider has some permissions protecting it (which global search
2507         would not be expected to hold), and added as a read-only permission
2508         to the path in the provider where global search queries are
2509         performed.  This permission can not be held by regular applications;
2510         it is used by applications to protect themselves from everyone else
2511         besides global search. -->
2512    <permission android:name="android.permission.GLOBAL_SEARCH"
2513        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2514        android:protectionLevel="signature|system" />
2515
2516    <!-- Internal permission protecting access to the global search
2517         system: ensures that only the system can access the provider
2518         to perform queries (since this otherwise provides unrestricted
2519         access to a variety of content providers), and to write the
2520         search statistics (to keep applications from gaming the source
2521         ranking).
2522         @hide -->
2523    <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
2524        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2525        android:protectionLevel="signature" />
2526
2527    <!-- @SystemApi Internal permission to allows an application to read indexable data.
2528        @hide -->
2529    <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
2530        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2531        android:protectionLevel="signature|system" />
2532
2533    <!-- @SystemApi Allows applications to set a live wallpaper.
2534         @hide XXX Change to signature once the picker is moved to its
2535         own apk as Ghod Intended. -->
2536    <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
2537        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2538        android:protectionLevel="signature|system" />
2539
2540    <!-- @SystemApi Allows applications to read dream settings and dream state.
2541         @hide -->
2542    <permission android:name="android.permission.READ_DREAM_STATE"
2543        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2544        android:protectionLevel="signature|system" />
2545
2546    <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
2547         @hide -->
2548    <permission android:name="android.permission.WRITE_DREAM_STATE"
2549        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2550        android:protectionLevel="signature|system" />
2551
2552    <!-- @SystemApi Allow an application to read and write the cache partition.
2553         @hide -->
2554    <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
2555        android:label="@string/permlab_cache_filesystem"
2556        android:description="@string/permdesc_cache_filesystem"
2557        android:protectionLevel="signature|system" />
2558
2559    <!-- Must be required by default container service so that only
2560         the system can bind to it and use it to copy
2561         protected data to secure containers or files
2562         accessible to the system.
2563         @hide -->
2564    <permission android:name="android.permission.COPY_PROTECTED_DATA"
2565        android:label="@string/permlab_copyProtectedData"
2566        android:description="@string/permlab_copyProtectedData"
2567        android:protectionLevel="signature" />
2568
2569    <!-- @SystemApi Internal permission protecting access to the encryption methods
2570        @hide
2571    -->
2572    <permission android:name="android.permission.CRYPT_KEEPER"
2573        android:protectionLevel="signature|system" />
2574
2575    <!-- @SystemApi Allows an application to read historical network usage for
2576         specific networks and applications. @hide -->
2577    <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
2578        android:label="@string/permlab_readNetworkUsageHistory"
2579        android:description="@string/permdesc_readNetworkUsageHistory"
2580        android:protectionLevel="signature|system" />
2581
2582    <!-- Allows an application to manage network policies (such as warning and disable
2583         limits) and to define application-specific rules. @hide -->
2584    <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
2585        android:label="@string/permlab_manageNetworkPolicy"
2586        android:description="@string/permdesc_manageNetworkPolicy"
2587        android:protectionLevel="signature" />
2588
2589    <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used
2590         by system services like download manager and media server. Not for use by
2591         third party apps. @hide -->
2592    <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
2593        android:label="@string/permlab_modifyNetworkAccounting"
2594        android:description="@string/permdesc_modifyNetworkAccounting"
2595        android:protectionLevel="signature|system" />
2596
2597    <!-- @SystemApi Allows an application to mark traffic as from another user for per user routing.
2598         Used by system wide services like media server that execute delegated network connections
2599         for users.
2600         @hide
2601    -->
2602    <permission android:name="android.permission.MARK_NETWORK_SOCKET"
2603        android:label="@string/permlab_markNetworkSocket"
2604        android:description="@string/permdesc_markNetworkSocket"
2605        android:protectionLevel="signature|system" />
2606
2607    <!-- C2DM permission.
2608         @hide Used internally.
2609     -->
2610    <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
2611          android:protectionLevel="signature" />
2612    <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
2613
2614    <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
2615         trust it to verify packages.
2616    -->
2617    <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
2618        android:label="@string/permlab_packageVerificationAgent"
2619        android:description="@string/permdesc_packageVerificationAgent"
2620        android:protectionLevel="signature|system" />
2621
2622    <!-- Must be required by package verifier receiver, to ensure that only the
2623         system can interact with it.
2624         @hide
2625    -->
2626    <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
2627        android:label="@string/permlab_bindPackageVerifier"
2628        android:description="@string/permdesc_bindPackageVerifier"
2629        android:protectionLevel="signature" />
2630
2631    <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
2632         @hide -->
2633    <permission android:name="android.permission.SERIAL_PORT"
2634        android:label="@string/permlab_serialPort"
2635        android:description="@string/permdesc_serialPort"
2636        android:protectionLevel="signature|system" />
2637
2638    <!-- Allows the holder to access content providers from outside an ApplicationThread.
2639         This permission is enforced by the ActivityManagerService on the corresponding APIs,
2640         in particular ActivityManagerService#getContentProviderExternal(String) and
2641         ActivityManagerService#removeContentProviderExternal(String).
2642         @hide
2643    -->
2644    <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
2645        android:label="@string/permlab_accessContentProvidersExternally"
2646        android:description="@string/permdesc_accessContentProvidersExternally"
2647        android:protectionLevel="signature" />
2648
2649    <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
2650         OTA reboot *not* occur while the lock is held.
2651         @hide -->
2652    <permission android:name="android.permission.UPDATE_LOCK"
2653        android:label="@string/permlab_updateLock"
2654        android:description="@string/permdesc_updateLock"
2655        android:protectionLevel="signatureOrSystem" />
2656
2657    <!-- @SystemApi Allows an application to read the current set of notifications, including
2658         any metadata and intents attached.
2659         @hide -->
2660    <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
2661        android:label="@string/permlab_accessNotifications"
2662        android:description="@string/permdesc_accessNotifications"
2663        android:protectionLevel="signature|system" />
2664
2665    <!-- Allows access to keyguard secure storage.  Only allowed for system processes.
2666        @hide -->
2667    <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
2668        android:protectionLevel="signature"
2669        android:label="@string/permlab_access_keyguard_secure_storage"
2670        android:description="@string/permdesc_access_keyguard_secure_storage" />
2671
2672    <!-- Allows an application to control keyguard.  Only allowed for system processes.
2673        @hide -->
2674    <permission android:name="android.permission.CONTROL_KEYGUARD"
2675        android:protectionLevel="signature"
2676        android:label="@string/permlab_control_keyguard"
2677        android:description="@string/permdesc_control_keyguard" />
2678
2679    <!-- Allows an application to listen to trust changes.  Only allowed for system processes.
2680        @hide -->
2681    <permission android:name="android.permission.TRUST_LISTENER"
2682                android:protectionLevel="signature"
2683                android:label="@string/permlab_trust_listener"
2684                android:description="@string/permdesc_trust_listener" />
2685
2686    <!-- @SystemApi Allows an application to provide a trust agent.
2687         @hide For security reasons, this is a platform-only permission. -->
2688    <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
2689                android:protectionLevel="signatureOrSystem"
2690                android:label="@string/permlab_provide_trust_agent"
2691                android:description="@string/permdesc_provide_trust_agent" />
2692
2693    <!-- Allows an application to launch the trust agent settings activity.
2694        @hide -->
2695    <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
2696        android:protectionLevel="signatureOrSystem"
2697        android:label="@string/permlab_launch_trust_agent_settings"
2698        android:description="@string/permdesc_launch_trust_agent_settings" />
2699
2700    <!-- Must be required by an {@link
2701         android.service.trust.TrustAgentService},
2702         to ensure that only the system can bind to it. -->
2703    <permission android:name="android.permission.BIND_TRUST_AGENT"
2704                android:protectionLevel="signature"
2705                android:label="@string/permlab_bind_trust_agent_service"
2706                android:description="@string/permdesc_bind_trust_agent_service" />
2707
2708    <!-- Must be required by an {@link
2709         android.service.notification.NotificationListenerService},
2710         to ensure that only the system can bind to it. -->
2711    <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
2712        android:label="@string/permlab_bindNotificationListenerService"
2713        android:description="@string/permdesc_bindNotificationListenerService"
2714        android:protectionLevel="signature" />
2715
2716    <!-- Must be required by an {@link
2717         android.service.notification.ConditionProviderService},
2718         to ensure that only the system can bind to it.
2719         @hide -->
2720    <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
2721        android:label="@string/permlab_bindConditionProviderService"
2722        android:description="@string/permdesc_bindConditionProviderService"
2723        android:protectionLevel="signature" />
2724
2725    <!-- Must be required by an {@link android.service.dreams.DreamService},
2726         to ensure that only the system can bind to it. -->
2727    <permission android:name="android.permission.BIND_DREAM_SERVICE"
2728        android:label="@string/permlab_bindDreamService"
2729        android:description="@string/permdesc_bindDreamService"
2730        android:protectionLevel="signature" />
2731
2732    <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
2733         carrier setup application to enforce that this permission is required
2734         @hide This is not a third-party API (intended for OEMs and system apps). -->
2735    <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
2736        android:label="@string/permlab_invokeCarrierSetup"
2737        android:description="@string/permdesc_invokeCarrierSetup"
2738        android:protectionLevel="signature|system" />
2739
2740    <!-- @SystemApi Allows an application to listen for network condition observations.
2741         @hide This is not a third-party API (intended for system apps). -->
2742    <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
2743        android:label="@string/permlab_accessNetworkConditions"
2744        android:description="@string/permdesc_accessNetworkConditions"
2745        android:protectionLevel="signature|system" />
2746
2747    <!-- @SystemApi Allows an application to provision and access DRM certificates
2748         @hide This is not a third-party API (intended for system apps). -->
2749    <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
2750        android:label="@string/permlab_accessDrmCertificates"
2751        android:description="@string/permdesc_accessDrmCertificates"
2752        android:protectionLevel="signature|system" />
2753
2754    <!-- The system process is explicitly the only one allowed to launch the
2755         confirmation UI for full backup/restore -->
2756    <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
2757
2758    <application android:process="system"
2759                 android:persistent="true"
2760                 android:hasCode="false"
2761                 android:label="@string/android_system_label"
2762                 android:allowClearUserData="false"
2763                 android:backupAgent="com.android.server.backup.SystemBackupAgent"
2764                 android:killAfterRestore="false"
2765                 android:icon="@drawable/ic_launcher_android"
2766                 android:supportsRtl="true">
2767        <activity android:name="com.android.internal.app.ChooserActivity"
2768                android:theme="@style/Theme.Holo.Dialog.Alert"
2769                android:finishOnCloseSystemDialogs="true"
2770                android:excludeFromRecents="true"
2771                android:multiprocess="true"
2772                android:documentLaunchMode="never"
2773                android:relinquishTaskIdentity="true">
2774            <intent-filter>
2775                <action android:name="android.intent.action.CHOOSER" />
2776                <category android:name="android.intent.category.DEFAULT" />
2777            </intent-filter>
2778        </activity>
2779        <activity android:name="com.android.internal.app.IntentForwarderActivity"
2780                android:finishOnCloseSystemDialogs="true"
2781                android:theme="@style/Theme.NoDisplay"
2782                android:excludeFromRecents="true"
2783                android:label="@string/user_owner_label"
2784                android:exported="true"
2785                >
2786        </activity>
2787        <activity-alias android:name="com.android.internal.app.ForwardIntentToUserOwner"
2788                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2789                android:icon="@drawable/personal_icon"
2790                android:exported="true"
2791                android:label="@string/user_owner_label">
2792        </activity-alias>
2793        <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
2794                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2795                android:icon="@drawable/ic_afw_icon"
2796                android:exported="true"
2797                android:label="@string/managed_profile_label">
2798        </activity-alias>
2799        <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
2800                android:theme="@style/Theme.Holo.Dialog"
2801                android:label="@string/heavy_weight_switcher_title"
2802                android:finishOnCloseSystemDialogs="true"
2803                android:excludeFromRecents="true"
2804                android:process=":ui">
2805        </activity>
2806        <activity android:name="com.android.internal.app.PlatLogoActivity"
2807                android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
2808                android:process=":ui">
2809        </activity>
2810        <activity android:name="com.android.internal.app.DisableCarModeActivity"
2811                android:theme="@style/Theme.NoDisplay"
2812                android:excludeFromRecents="true"
2813                android:process=":ui">
2814        </activity>
2815
2816        <activity android:name="android.accounts.ChooseAccountActivity"
2817                android:excludeFromRecents="true"
2818                android:exported="true"
2819                android:theme="@android:style/Theme.Holo.Dialog"
2820                android:label="@string/choose_account_label"
2821                android:process=":ui">
2822        </activity>
2823
2824        <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
2825                android:excludeFromRecents="true"
2826                android:exported="true"
2827                android:theme="@android:style/Theme.Holo.Dialog"
2828                android:label="@string/choose_account_label"
2829                android:process=":ui">
2830        </activity>
2831
2832        <activity android:name="android.accounts.ChooseAccountTypeActivity"
2833                android:excludeFromRecents="true"
2834                android:theme="@android:style/Theme.Holo.Dialog"
2835                android:label="@string/choose_account_label"
2836                android:process=":ui">
2837        </activity>
2838
2839        <activity android:name="android.accounts.CantAddAccountActivity"
2840                android:excludeFromRecents="true"
2841                android:exported="true"
2842                android:theme="@android:style/Theme.Holo.Dialog.NoActionBar"
2843                android:process=":ui">
2844        </activity>
2845
2846        <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
2847                android:excludeFromRecents="true"
2848                android:exported="true"
2849                android:theme="@android:style/Theme.Holo.DialogWhenLarge"
2850                android:process=":ui">
2851        </activity>
2852
2853        <activity android:name="android.content.SyncActivityTooManyDeletes"
2854               android:theme="@android:style/Theme.Holo.Dialog"
2855               android:label="@string/sync_too_many_deletes"
2856               android:process=":ui">
2857        </activity>
2858
2859        <activity android:name="com.android.server.ShutdownActivity"
2860            android:permission="android.permission.SHUTDOWN"
2861            android:excludeFromRecents="true">
2862            <intent-filter>
2863                <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" />
2864                <category android:name="android.intent.category.DEFAULT" />
2865            </intent-filter>
2866            <intent-filter>
2867                <action android:name="android.intent.action.REBOOT" />
2868                <category android:name="android.intent.category.DEFAULT" />
2869            </intent-filter>
2870        </activity>
2871
2872        <activity android:name="com.android.internal.app.NetInitiatedActivity"
2873                android:theme="@style/Theme.Holo.Dialog.Alert"
2874                android:excludeFromRecents="true"
2875                android:process=":ui">
2876        </activity>
2877
2878        <activity android:name="com.android.internal.app.RestrictionsPinActivity"
2879                android:theme="@style/Theme.Material.Light.Dialog.Alert"
2880                android:excludeFromRecents="true"
2881                android:windowSoftInputMode="adjustPan"
2882                android:process=":ui">
2883            <intent-filter android:priority="100">
2884                <action android:name="android.intent.action.RESTRICTIONS_CHALLENGE" />
2885                <category android:name="android.intent.category.DEFAULT" />
2886            </intent-filter>
2887        </activity>
2888
2889        <receiver android:name="com.android.server.BootReceiver"
2890                android:primaryUserOnly="true">
2891            <intent-filter android:priority="1000">
2892                <action android:name="android.intent.action.BOOT_COMPLETED" />
2893            </intent-filter>
2894        </receiver>
2895
2896        <receiver android:name="com.android.server.updates.CertPinInstallReceiver" >
2897            <intent-filter>
2898                <action android:name="android.intent.action.UPDATE_PINS" />
2899                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2900            </intent-filter>
2901        </receiver>
2902
2903        <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" >
2904            <intent-filter>
2905                <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
2906                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2907            </intent-filter>
2908        </receiver>
2909
2910        <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" >
2911            <intent-filter>
2912                <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
2913                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2914            </intent-filter>
2915        </receiver>
2916
2917        <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" >
2918            <intent-filter>
2919                <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
2920                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2921            </intent-filter>
2922        </receiver>
2923
2924        <receiver android:name="com.android.server.updates.TZInfoInstallReceiver" >
2925            <intent-filter>
2926                <action android:name="android.intent.action.UPDATE_TZINFO" />
2927                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2928            </intent-filter>
2929        </receiver>
2930
2931        <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" >
2932            <intent-filter>
2933                <action android:name="android.intent.action.UPDATE_SEPOLICY" />
2934                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2935            </intent-filter>
2936        </receiver>
2937
2938        <receiver android:name="com.android.server.MasterClearReceiver"
2939            android:permission="android.permission.MASTER_CLEAR">
2940            <intent-filter
2941                    android:priority="100" >
2942                <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR -->
2943                <action android:name="android.intent.action.MASTER_CLEAR" />
2944
2945                <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
2946                <action android:name="com.google.android.c2dm.intent.RECEIVE" />
2947                <category android:name="android.intent.category.MASTER_CLEAR" />
2948            </intent-filter>
2949        </receiver>
2950
2951        <service android:name="com.android.internal.os.storage.ExternalStorageFormatter"
2952            android:permission="android.permission.MASTER_CLEAR"
2953            android:exported="true" />
2954
2955        <service android:name="android.hardware.location.GeofenceHardwareService"
2956            android:permission="android.permission.LOCATION_HARDWARE"
2957            android:exported="false" />
2958
2959        <service android:name="com.android.internal.backup.LocalTransportService"
2960                android:permission="android.permission.CONFIRM_FULL_BACKUP"
2961                android:exported="false">
2962            <intent-filter>
2963                <action android:name="android.backup.TRANSPORT_HOST" />
2964            </intent-filter>
2965        </service>
2966
2967        <service android:name="com.android.server.MountServiceIdler"
2968                 android:exported="true"
2969                 android:permission="android.permission.BIND_JOB_SERVICE" >
2970        </service>
2971
2972        <service
2973            android:name="com.android.server.pm.BackgroundDexOptService"
2974            android:exported="true"
2975            android:permission="android.permission.BIND_JOB_SERVICE">
2976        </service>
2977
2978    </application>
2979
2980</manifest>
2981