AndroidManifest.xml revision b096bdceaf2a4becffd2d930a870ccb57bfbe99c
1<?xml version="1.0" encoding="utf-8"?>
2<!--
3/* //device/apps/common/AndroidManifest.xml
4**
5** Copyright 2006, The Android Open Source Project
6**
7** Licensed under the Apache License, Version 2.0 (the "License");
8** you may not use this file except in compliance with the License.
9** You may obtain a copy of the License at
10**
11**     http://www.apache.org/licenses/LICENSE-2.0
12**
13** Unless required by applicable law or agreed to in writing, software
14** distributed under the License is distributed on an "AS IS" BASIS,
15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16** See the License for the specific language governing permissions and
17** limitations under the License.
18*/
19-->
20<manifest xmlns:android="http://schemas.android.com/apk/res/android"
21    package="android" coreApp="true" android:sharedUserId="android.uid.system"
22    android:sharedUserLabel="@string/android_system_label">
23
24    <!-- ================================================ -->
25    <!-- Special broadcasts that only the system can send -->
26    <!-- ================================================ -->
27    <eat-comment />
28
29    <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
30    <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
31    <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
32    <protected-broadcast android:name="android.intent.action.TIME_SET" />
33    <protected-broadcast android:name="android.intent.action.TIME_TICK" />
34    <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
35    <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
36    <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
37    <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
38    <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
39    <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
40    <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
41    <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
42    <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
43    <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
44    <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
45    <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
46    <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
47    <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
48    <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
49    <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
50    <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
51    <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
52    <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
53    <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
54    <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
55    <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
56    <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
57    <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
58    <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
59    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
60    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
61    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
62    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
63    <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
64    <protected-broadcast android:name="android.intent.action.REBOOT" />
65    <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
66    <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
67    <protected-broadcast android:name="android.intent.action.USER_ADDED" />
68    <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
69    <protected-broadcast android:name="android.intent.action.USER_STARTING" />
70    <protected-broadcast android:name="android.intent.action.USER_STARTED" />
71    <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
72    <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
73    <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
74    <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
75    <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
76
77    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
78
79    <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
80    <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
81    <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
82    <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
83
84    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
85    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
86    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
87    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
88    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
89    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
90
91    <protected-broadcast android:name="android.backup.intent.RUN" />
92    <protected-broadcast android:name="android.backup.intent.CLEAR" />
93    <protected-broadcast android:name="android.backup.intent.INIT" />
94
95    <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
96    <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
97    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
98    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
99    <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
100    <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
101    <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
102    <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
103    <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
104    <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
105    <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
106    <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
107    <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
108    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
109    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
110    <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
111    <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
112    <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
113    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
114    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
115    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
116    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
117    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
118    <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
119    <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
120    <protected-broadcast
121        android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
122    <protected-broadcast
123        android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
124    <protected-broadcast
125        android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
126    <protected-broadcast
127        android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
128    <protected-broadcast
129        android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
130    <protected-broadcast
131        android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
132    <protected-broadcast
133        android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
134    <protected-broadcast
135        android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
136    <protected-broadcast
137        android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
138    <protected-broadcast
139        android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
140    <protected-broadcast
141        android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
142    <protected-broadcast
143        android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
144    <protected-broadcast
145        android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
146    <protected-broadcast
147        android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
148   <protected-broadcast
149        android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
150    <protected-broadcast
151        android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
152    <protected-broadcast
153        android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
154    <protected-broadcast
155        android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
156    <protected-broadcast
157        android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
158    <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" />
159    <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
160    <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
161    <protected-broadcast android:name="android.btopp.intent.action.LIST" />
162    <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
163    <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
164    <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
165    <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
166    <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
167    <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
168    <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
169    <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
170    <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
171    <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
172    <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
173
174    <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
175
176    <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
177    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
178    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
179    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
180    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
181
182    <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
183    <protected-broadcast android:name="android.intent.action.ANALOG_AUDIO_DOCK_PLUG" />
184    <protected-broadcast android:name="android.intent.action.DIGITAL_AUDIO_DOCK_PLUG" />
185    <protected-broadcast android:name="android.intent.action.HDMI_AUDIO_PLUG" />
186    <protected-broadcast android:name="android.intent.action.USB_AUDIO_ACCESSORY_PLUG" />
187    <protected-broadcast android:name="android.intent.action.USB_AUDIO_DEVICE_PLUG" />
188
189    <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
190    <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
191    <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
192    <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
193    <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
194    <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
195    <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
196    <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
197
198    <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
199    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
200    <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
201    <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
202    <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
203    <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
204    <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
205    <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
206    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
207    <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
208
209    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
210    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
211    <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
212    <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
213    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
214
215    <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
216
217    <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" />
218    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
219    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
220    <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
221
222    <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
223    <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
224    <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
225
226    <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
227
228    <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
229    <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
230    <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
231    <protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" />
232
233    <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
234    <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
235    <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
236    <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
237    <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
238    <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
239    <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
240    <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
241    <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
242    <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
243    <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
244    <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
245    <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
246    <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
247    <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
248    <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
249    <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
250    <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
251    <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
252    <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
253    <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
254    <protected-broadcast
255            android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
256    <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
257    <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
258    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
259    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
260    <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
261    <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
262    <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
263    <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" />
264
265    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
266    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
267
268    <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
269
270    <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
271
272    <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
273    <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
274    <protected-broadcast android:name="android.location.MODE_CHANGED" />
275    <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
276    <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
277
278    <protected-broadcast
279        android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
280
281    <!-- Defined in RestrictionsManager -->
282    <protected-broadcast
283        android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
284    <!-- Defined in RestrictionsManager -->
285
286    <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
287    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
288    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
289    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
290    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
291
292
293    <!-- ====================================== -->
294    <!-- Permissions for things that cost money -->
295    <!-- ====================================== -->
296    <eat-comment />
297
298    <!-- Used for permissions that can be used to make the user spend money
299         without their direct involvement. -->
300    <permission-group android:name="android.permission-group.COST_MONEY"
301        android:label="@string/permgrouplab_costMoney"
302        android:description="@string/permgroupdesc_costMoney" />
303
304    <!-- ================================== -->
305    <!-- Permissions for accessing messages -->
306    <!-- ================================== -->
307    <eat-comment />
308
309    <!-- Used for permissions that allow an application to send messages
310         on behalf of the user or intercept messages being received by the
311         user.  This is primarily intended for SMS/MMS messaging, such as
312         receiving or reading an MMS. -->
313    <permission-group android:name="android.permission-group.MESSAGES"
314        android:label="@string/permgrouplab_messages"
315        android:icon="@drawable/perm_group_messages"
316        android:description="@string/permgroupdesc_messages"
317        android:permissionGroupFlags="personalInfo"
318        android:priority="360"/>
319
320    <!-- Allows an application to send SMS messages. -->
321    <permission android:name="android.permission.SEND_SMS"
322        android:permissionGroup="android.permission-group.MESSAGES"
323        android:protectionLevel="dangerous"
324        android:permissionFlags="costsMoney"
325        android:label="@string/permlab_sendSms"
326        android:description="@string/permdesc_sendSms" />
327
328    <!-- @SystemApi Allows an application (Phone) to send a request to other applications
329         to handle the respond-via-message action during incoming calls.
330         <p>Not for use by third-party applications. -->
331    <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
332        android:permissionGroup="android.permission-group.MESSAGES"
333        android:protectionLevel="signature|system"
334        android:label="@string/permlab_sendRespondViaMessageRequest"
335        android:description="@string/permdesc_sendRespondViaMessageRequest" />
336
337    <!-- Allows an application to monitor incoming SMS messages, to record
338         or perform processing on them. -->
339    <permission android:name="android.permission.RECEIVE_SMS"
340        android:permissionGroup="android.permission-group.MESSAGES"
341        android:protectionLevel="dangerous"
342        android:label="@string/permlab_receiveSms"
343        android:description="@string/permdesc_receiveSms" />
344
345    <!-- Allows an application to monitor incoming MMS messages, to record
346         or perform processing on them. -->
347    <permission android:name="android.permission.RECEIVE_MMS"
348        android:permissionGroup="android.permission-group.MESSAGES"
349        android:protectionLevel="dangerous"
350        android:label="@string/permlab_receiveMms"
351        android:description="@string/permdesc_receiveMms" />
352
353    <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
354         to record or display them to the user.
355         <p>Not for use by third-party applications.
356         @hide Pending API council approval -->
357    <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
358        android:permissionGroup="android.permission-group.MESSAGES"
359        android:protectionLevel="signature|system"
360        android:label="@string/permlab_receiveEmergencyBroadcast"
361        android:description="@string/permdesc_receiveEmergencyBroadcast" />
362
363    <!-- Allows an application to read previously received cell broadcast
364         messages and to register a content observer to get notifications when
365         a cell broadcast has been received and added to the database. For
366         emergency alerts, the database is updated immediately after the
367         alert dialog and notification sound/vibration/speech are presented.
368         The "read" column is then updated after the user dismisses the alert.
369         This enables supplementary emergency assistance apps to start loading
370         additional emergency information (if Internet access is available)
371         when the alert is first received, and to delay presenting the info
372         to the user until after the initial alert dialog is dismissed.
373         @hide Pending API council approval -->
374    <permission android:name="android.permission.READ_CELL_BROADCASTS"
375        android:permissionGroup="android.permission-group.MESSAGES"
376        android:protectionLevel="dangerous"
377        android:label="@string/permlab_readCellBroadcasts"
378        android:description="@string/permdesc_readCellBroadcasts" />
379
380    <!-- Allows an application to read SMS messages. -->
381    <permission android:name="android.permission.READ_SMS"
382        android:permissionGroup="android.permission-group.MESSAGES"
383        android:protectionLevel="dangerous"
384        android:label="@string/permlab_readSms"
385        android:description="@string/permdesc_readSms" />
386
387    <!-- Allows an application to write SMS messages. -->
388    <permission android:name="android.permission.WRITE_SMS"
389        android:permissionGroup="android.permission-group.MESSAGES"
390        android:protectionLevel="dangerous"
391        android:label="@string/permlab_writeSms"
392        android:description="@string/permdesc_writeSms" />
393
394    <!-- Allows an application to monitor incoming WAP push messages. -->
395    <permission android:name="android.permission.RECEIVE_WAP_PUSH"
396        android:permissionGroup="android.permission-group.MESSAGES"
397        android:protectionLevel="dangerous"
398        android:label="@string/permlab_receiveWapPush"
399        android:description="@string/permdesc_receiveWapPush" />
400
401    <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
402         or perform processing on them. -->
403    <!-- @hide -->
404    <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
405        android:permissionGroup="android.permission-group.MESSAGES"
406        android:protectionLevel="dangerous"
407        android:label="@string/permlab_receiveBluetoothMap"
408        android:description="@string/permdesc_receiveBluetoothMap" />
409
410    <!-- =============================================================== -->
411    <!-- Permissions for accessing social info (contacts and social) -->
412    <!-- =============================================================== -->
413    <eat-comment />
414
415    <!-- Used for permissions that provide access to the user's social connections,
416         such as contacts, call logs, social stream, etc.  This includes
417         both reading and writing of this data (which should generally be
418         expressed as two distinct permissions). -->
419
420    <permission-group android:name="android.permission-group.SOCIAL_INFO"
421        android:label="@string/permgrouplab_socialInfo"
422        android:icon="@drawable/perm_group_social_info"
423        android:description="@string/permgroupdesc_socialInfo"
424        android:permissionGroupFlags="personalInfo"
425        android:priority="320" />
426
427    <!-- Allows an application to read the user's contacts data. -->
428    <permission android:name="android.permission.READ_CONTACTS"
429        android:permissionGroup="android.permission-group.SOCIAL_INFO"
430        android:protectionLevel="dangerous"
431        android:label="@string/permlab_readContacts"
432        android:description="@string/permdesc_readContacts" />
433
434    <!-- Allows an application to write (but not read) the user's
435         contacts data. -->
436    <permission android:name="android.permission.WRITE_CONTACTS"
437        android:permissionGroup="android.permission-group.SOCIAL_INFO"
438        android:protectionLevel="dangerous"
439        android:label="@string/permlab_writeContacts"
440        android:description="@string/permdesc_writeContacts" />
441
442    <!-- @SystemApi @hide Allows an application to execute contacts directory search.
443         This should only be used by ContactsProvider.
444         <p>Not for use by third-party applications. -->
445    <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
446        android:permissionGroup="android.permission-group.PERSONAL_INFO"
447        android:protectionLevel="signature|system" />
448
449    <!-- Allows an application to read the user's call log.
450         <p class="note"><strong>Note:</strong> If your app uses the
451         {@link #READ_CONTACTS} permission and <em>both</em> your <a
452         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
453         minSdkVersion}</a> and <a
454         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
455         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
456         grants your app this permission. If you don't need this permission, be sure your <a
457         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
458         targetSdkVersion}</a> is 16 or higher.</p> -->
459    <permission android:name="android.permission.READ_CALL_LOG"
460        android:permissionGroup="android.permission-group.SOCIAL_INFO"
461        android:protectionLevel="dangerous"
462        android:label="@string/permlab_readCallLog"
463        android:description="@string/permdesc_readCallLog" />
464
465    <!-- Allows an application to write (but not read) the user's
466         contacts data.
467         <p class="note"><strong>Note:</strong> If your app uses the
468         {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
469         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
470         minSdkVersion}</a> and <a
471         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
472         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
473         grants your app this permission. If you don't need this permission, be sure your <a
474         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
475         targetSdkVersion}</a> is 16 or higher.</p>  -->
476    <permission android:name="android.permission.WRITE_CALL_LOG"
477        android:permissionGroup="android.permission-group.SOCIAL_INFO"
478        android:protectionLevel="dangerous"
479        android:label="@string/permlab_writeCallLog"
480        android:description="@string/permdesc_writeCallLog" />
481
482  <!-- Allows an application to read from the user's social stream. -->
483    <permission android:name="android.permission.READ_SOCIAL_STREAM"
484        android:permissionGroup="android.permission-group.SOCIAL_INFO"
485        android:protectionLevel="dangerous"
486        android:label="@string/permlab_readSocialStream"
487        android:description="@string/permdesc_readSocialStream" />
488
489    <!-- Allows an application to write (but not read) the user's
490         social stream data. -->
491    <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
492        android:permissionGroup="android.permission-group.SOCIAL_INFO"
493        android:protectionLevel="dangerous"
494        android:label="@string/permlab_writeSocialStream"
495        android:description="@string/permdesc_writeSocialStream" />
496
497    <!-- =============================================================== -->
498    <!-- Permissions for accessing information about the device owner    -->
499    <!-- =============================================================== -->
500    <eat-comment />
501
502    <!-- Used for permissions that provide access to information about the device
503         user such as profile information.  This includes both reading and
504         writing of this data (which should generally be expressed as two
505         distinct permissions). -->
506    <permission-group android:name="android.permission-group.PERSONAL_INFO"
507        android:label="@string/permgrouplab_personalInfo"
508        android:icon="@drawable/perm_group_personal_info"
509        android:description="@string/permgroupdesc_personalInfo"
510        android:permissionGroupFlags="personalInfo"
511        android:priority="310" />
512
513    <!-- Allows an application to read the user's personal profile data. -->
514    <permission android:name="android.permission.READ_PROFILE"
515        android:permissionGroup="android.permission-group.PERSONAL_INFO"
516        android:protectionLevel="dangerous"
517        android:label="@string/permlab_readProfile"
518        android:description="@string/permdesc_readProfile" />
519
520    <!-- Allows an application to write (but not read) the user's
521         personal profile data. -->
522    <permission android:name="android.permission.WRITE_PROFILE"
523        android:permissionGroup="android.permission-group.PERSONAL_INFO"
524        android:protectionLevel="dangerous"
525        android:label="@string/permlab_writeProfile"
526        android:description="@string/permdesc_writeProfile" />
527
528    <!-- Allows an application to access data from sensors that the user uses to
529         measure what is happening inside his/her body, such as heart rate. -->
530    <permission android:name="android.permission.BODY_SENSORS"
531        android:permissionGroup="android.permission-group.PERSONAL_INFO"
532        android:label="@string/permlab_bodySensors"
533        android:description="@string/permdesc_bodySensors" />
534
535    <!-- =============================================================== -->
536    <!-- Permissions for accessing the device calendar                   -->
537    <!-- =============================================================== -->
538    <eat-comment />
539
540    <!-- Used for permissions that provide access to the device
541         calendar to create / view events.-->
542    <permission-group android:name="android.permission-group.CALENDAR"
543        android:label="@string/permgrouplab_calendar"
544        android:icon="@drawable/perm_group_calendar"
545        android:description="@string/permgroupdesc_calendar"
546        android:permissionGroupFlags="personalInfo"
547        android:priority="290" />
548
549    <!-- Allows an application to read the user's calendar data. -->
550    <permission android:name="android.permission.READ_CALENDAR"
551        android:permissionGroup="android.permission-group.PERSONAL_INFO"
552        android:protectionLevel="dangerous"
553        android:label="@string/permlab_readCalendar"
554        android:description="@string/permdesc_readCalendar" />
555
556    <!-- Allows an application to write (but not read) the user's
557         calendar data. -->
558    <permission android:name="android.permission.WRITE_CALENDAR"
559        android:permissionGroup="android.permission-group.PERSONAL_INFO"
560        android:protectionLevel="dangerous"
561        android:label="@string/permlab_writeCalendar"
562        android:description="@string/permdesc_writeCalendar" />
563
564    <!-- =============================================================== -->
565    <!-- Permissions for accessing the user dictionary-->
566    <!-- =============================================================== -->
567    <eat-comment />
568
569    <!-- Used for permissions that provide access to the user
570         calendar to create / view events.-->
571    <permission-group android:name="android.permission-group.USER_DICTIONARY"
572        android:label="@string/permgrouplab_dictionary"
573        android:icon="@drawable/perm_group_user_dictionary"
574        android:description="@string/permgroupdesc_dictionary"
575        android:permissionGroupFlags="personalInfo"
576        android:priority="170" />
577
578    <!-- Allows an application to read the user dictionary. This should
579         really only be required by an IME, or a dictionary editor like
580         the Settings app. -->
581    <permission android:name="android.permission.READ_USER_DICTIONARY"
582        android:permissionGroup="android.permission-group.USER_DICTIONARY"
583        android:protectionLevel="dangerous"
584        android:label="@string/permlab_readDictionary"
585        android:description="@string/permdesc_readDictionary" />
586
587    <!-- Used for permissions that provide access to the user
588         calendar to create / view events.-->
589    <permission-group android:name="android.permission-group.WRITE_USER_DICTIONARY"
590        android:label="@string/permgrouplab_writeDictionary"
591        android:icon="@drawable/perm_group_user_dictionary_write"
592        android:description="@string/permgroupdesc_writeDictionary"
593        android:priority="160" />
594
595    <!-- Allows an application to write to the user dictionary. -->
596    <permission android:name="android.permission.WRITE_USER_DICTIONARY"
597        android:permissionGroup="android.permission-group.WRITE_USER_DICTIONARY"
598        android:protectionLevel="normal"
599        android:label="@string/permlab_writeDictionary"
600        android:description="@string/permdesc_writeDictionary" />
601
602    <!-- =============================================================== -->
603    <!-- Permissions for accessing the user bookmarks                    -->
604    <!-- =============================================================== -->
605    <eat-comment />
606
607    <!-- Used for permissions that provide access to the user
608         bookmarks and browser history.-->
609    <permission-group android:name="android.permission-group.BOOKMARKS"
610        android:label="@string/permgrouplab_bookmarks"
611        android:icon="@drawable/perm_group_bookmarks"
612        android:description="@string/permgroupdesc_bookmarks"
613        android:permissionGroupFlags="personalInfo"
614        android:priority="300" />
615
616    <!-- Allows an application to read (but not write) the user's
617        browsing history and bookmarks. -->
618    <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
619        android:permissionGroup="android.permission-group.BOOKMARKS"
620        android:label="@string/permlab_readHistoryBookmarks"
621        android:description="@string/permdesc_readHistoryBookmarks"
622        android:protectionLevel="dangerous" />
623
624    <!-- Allows an application to write (but not read) the user's
625        browsing history and bookmarks. -->
626    <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
627        android:permissionGroup="android.permission-group.BOOKMARKS"
628        android:label="@string/permlab_writeHistoryBookmarks"
629        android:description="@string/permdesc_writeHistoryBookmarks"
630        android:protectionLevel="dangerous" />
631
632    <!-- =============================================================== -->
633    <!-- Permissions for setting the device alarm                        -->
634    <!-- =============================================================== -->
635    <eat-comment />
636
637    <!-- Used for permissions that provide access to device alarms. -->
638    <permission-group android:name="android.permission-group.DEVICE_ALARMS"
639        android:label="@string/permgrouplab_deviceAlarms"
640        android:icon="@drawable/perm_group_device_alarms"
641        android:description="@string/permgroupdesc_deviceAlarms"
642        android:permissionGroupFlags="personalInfo"
643        android:priority="210" />
644
645    <!-- Allows an application to broadcast an Intent to set an alarm for the
646         user. -->
647    <permission android:name="com.android.alarm.permission.SET_ALARM"
648        android:permissionGroup="android.permission-group.DEVICE_ALARMS"
649        android:label="@string/permlab_setAlarm"
650        android:description="@string/permdesc_setAlarm"
651        android:protectionLevel="normal" />
652
653    <!-- =============================================================== -->
654    <!-- Permissions for accessing the user voicemail                    -->
655    <!-- =============================================================== -->
656    <eat-comment />
657
658    <!-- Used for permissions that provide access to the user voicemail box. -->
659    <permission-group android:name="android.permission-group.VOICEMAIL"
660        android:label="@string/permgrouplab_voicemail"
661        android:icon="@drawable/perm_group_voicemail"
662        android:description="@string/permgroupdesc_voicemail"
663        android:permissionGroupFlags="personalInfo"
664        android:priority="280" />
665
666    <!-- Allows an application to add voicemails into the system. -->
667    <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
668        android:permissionGroup="android.permission-group.VOICEMAIL"
669        android:protectionLevel="dangerous"
670        android:label="@string/permlab_addVoicemail"
671        android:description="@string/permdesc_addVoicemail" />
672
673    <!-- Allows an application to remove any voicemails from the system. -->
674    <permission android:name="com.android.voicemail.permission.REMOVE_VOICEMAIL"
675        android:permissionGroup="android.permission-group.VOICEMAIL"
676        android:protectionLevel="dangerous"
677        android:label="@string/permlab_removeVoicemail"
678        android:description="@string/permdesc_removeVoicemail" />
679
680    <!-- Allows an application to read all the voicemails in the system. -->
681    <permission android:name="com.android.voicemail.permission.READ_ALL_VOICEMAIL"
682        android:permissionGroup="android.permission-group.VOICEMAIL"
683        android:protectionLevel="dangerous"
684        android:label="@string/permlab_readAllVoicemail"
685        android:description="@string/permdesc_readAllVoicemail" />
686
687    <!-- =============================================== -->
688    <!-- Permissions for enabling accessibility features -->
689    <!-- =============================================== -->
690    <eat-comment />
691
692    <!-- Used for permissions that allow requesting certain accessibility features. -->
693    <permission-group android:name="android.permission-group.ACCESSIBILITY_FEATURES"
694        android:label="@string/permgrouplab_accessibilityFeatures"
695        android:icon="@drawable/perm_group_accessibility_features"
696        android:description="@string/permgroupdesc_accessibilityFeatures"
697        android:priority="380" />
698
699    <!-- ======================================= -->
700    <!-- Permissions for accessing location info -->
701    <!-- ======================================= -->
702    <eat-comment />
703
704    <!-- Used for permissions that allow access to the user's current
705         location. -->
706    <permission-group android:name="android.permission-group.LOCATION"
707        android:label="@string/permgrouplab_location"
708        android:icon="@drawable/perm_group_location"
709        android:description="@string/permgroupdesc_location"
710        android:permissionGroupFlags="personalInfo"
711        android:priority="330" />
712
713    <!-- Allows an app to access precise location from location sources such
714         as GPS, cell towers, and Wi-Fi. -->
715    <permission android:name="android.permission.ACCESS_FINE_LOCATION"
716        android:permissionGroup="android.permission-group.LOCATION"
717        android:protectionLevel="dangerous"
718        android:label="@string/permlab_accessFineLocation"
719        android:description="@string/permdesc_accessFineLocation" />
720
721    <!-- Allows an app to access approximate location derived from network location
722         sources such as cell towers and Wi-Fi. -->
723    <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
724        android:permissionGroup="android.permission-group.LOCATION"
725        android:protectionLevel="dangerous"
726        android:label="@string/permlab_accessCoarseLocation"
727        android:description="@string/permdesc_accessCoarseLocation" />
728
729    <!-- Allows an application to create mock location providers for testing -->
730    <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
731        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
732        android:protectionLevel="dangerous"
733        android:label="@string/permlab_accessMockLocation"
734        android:description="@string/permdesc_accessMockLocation" />
735
736    <!-- Allows an application to access extra location provider commands -->
737    <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
738        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
739        android:protectionLevel="normal"
740        android:label="@string/permlab_accessLocationExtraCommands"
741        android:description="@string/permdesc_accessLocationExtraCommands" />
742
743    <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
744    <p>Not for use by third-party applications. -->
745    <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
746        android:protectionLevel="signature|system"
747        android:label="@string/permlab_installLocationProvider"
748        android:description="@string/permdesc_installLocationProvider" />
749
750    <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
751         This should only be used by HDMI-CEC service.
752    -->
753    <permission android:name="android.permission.HDMI_CEC"
754        android:protectionLevel="signatureOrSystem" />
755
756    <!-- @SystemApi Allows an application to use location features in hardware,
757         such as the geofencing api.
758         <p>Not for use by third-party applications. -->
759    <permission android:name="android.permission.LOCATION_HARDWARE"
760        android:permissionGroup="android.permission-group.LOCATION"
761        android:protectionLevel="signature|system" />
762    <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
763
764    <!-- ======================================= -->
765    <!-- Permissions for accessing networks -->
766    <!-- ======================================= -->
767    <eat-comment />
768
769    <!-- Used for permissions that provide access to networking services.  The
770         main permission here is internet access, but this is also an
771         appropriate group for accessing or modifying any network configuration
772         or other related network operations. -->
773    <permission-group android:name="android.permission-group.NETWORK"
774        android:label="@string/permgrouplab_network"
775        android:icon="@drawable/perm_group_network"
776        android:description="@string/permgroupdesc_network"
777        android:priority="270" />
778
779    <!-- Allows applications to open network sockets. -->
780    <permission android:name="android.permission.INTERNET"
781        android:permissionGroup="android.permission-group.NETWORK"
782        android:protectionLevel="dangerous"
783        android:description="@string/permdesc_createNetworkSockets"
784        android:label="@string/permlab_createNetworkSockets" />
785
786    <!-- Allows applications to access information about networks -->
787    <permission android:name="android.permission.ACCESS_NETWORK_STATE"
788        android:permissionGroup="android.permission-group.NETWORK"
789        android:protectionLevel="normal"
790        android:description="@string/permdesc_accessNetworkState"
791        android:label="@string/permlab_accessNetworkState" />
792
793    <!-- Allows applications to access information about Wi-Fi networks -->
794    <permission android:name="android.permission.ACCESS_WIFI_STATE"
795        android:permissionGroup="android.permission-group.NETWORK"
796        android:protectionLevel="normal"
797        android:description="@string/permdesc_accessWifiState"
798        android:label="@string/permlab_accessWifiState" />
799
800    <!-- Allows applications to change Wi-Fi connectivity state -->
801    <permission android:name="android.permission.CHANGE_WIFI_STATE"
802        android:permissionGroup="android.permission-group.NETWORK"
803        android:protectionLevel="dangerous"
804        android:description="@string/permdesc_changeWifiState"
805        android:label="@string/permlab_changeWifiState" />
806
807    <!-- @hide -->
808    <permission android:name="android.permission.ACCESS_WIMAX_STATE"
809        android:permissionGroup="android.permission-group.NETWORK"
810        android:protectionLevel="normal"
811        android:description="@string/permdesc_accessWimaxState"
812        android:label="@string/permlab_accessWimaxState" />
813
814    <!-- @hide -->
815    <permission android:name="android.permission.CHANGE_WIMAX_STATE"
816        android:permissionGroup="android.permission-group.NETWORK"
817        android:protectionLevel="dangerous"
818        android:description="@string/permdesc_changeWimaxState"
819        android:label="@string/permlab_changeWimaxState" />
820
821    <!-- Allows applications to act as network scorers. @hide -->
822    <permission android:name="android.permission.SCORE_NETWORKS"
823        android:permissionGroup="android.permission-group.NETWORK"
824        android:protectionLevel="normal"
825        android:description="@string/permdesc_scoreNetworks"
826        android:label="@string/permlab_scoreNetworks" />
827
828    <!-- ======================================= -->
829    <!-- Permissions for short range, peripheral networks -->
830    <!-- ======================================= -->
831    <eat-comment />
832
833    <!-- Used for permissions that provide access to other devices through Bluetooth.-->
834    <permission-group android:name="android.permission-group.BLUETOOTH_NETWORK"
835        android:label="@string/permgrouplab_bluetoothNetwork"
836        android:icon="@drawable/perm_group_bluetooth"
837        android:description="@string/permgroupdesc_bluetoothNetwork"
838        android:priority="260" />
839
840    <!-- Allows applications to connect to paired bluetooth devices -->
841    <permission android:name="android.permission.BLUETOOTH"
842        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
843        android:protectionLevel="dangerous"
844        android:description="@string/permdesc_bluetooth"
845        android:label="@string/permlab_bluetooth" />
846
847    <!-- Allows applications to discover and pair bluetooth devices -->
848    <permission android:name="android.permission.BLUETOOTH_ADMIN"
849        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
850        android:protectionLevel="dangerous"
851        android:description="@string/permdesc_bluetoothAdmin"
852        android:label="@string/permlab_bluetoothAdmin" />
853
854    <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction.
855         This is not available to third party applications. -->
856    <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
857        android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
858        android:protectionLevel="system|signature"
859        android:description="@string/permdesc_bluetoothPriv"
860        android:label="@string/permlab_bluetoothPriv" />
861
862    <!-- Allows bluetooth stack to access files
863         @hide This should only be used by Bluetooth apk.
864    -->
865    <permission android:name="android.permission.BLUETOOTH_STACK"
866        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
867        android:protectionLevel="signature" />
868
869    <!-- Allows applications to perform I/O operations over NFC -->
870    <permission android:name="android.permission.NFC"
871        android:permissionGroup="android.permission-group.NETWORK"
872        android:protectionLevel="dangerous"
873        android:description="@string/permdesc_nfc"
874        android:label="@string/permlab_nfc" />
875
876    <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
877        @hide -->
878    <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
879        android:permissionGroup="android.permission-group.NETWORK"
880        android:protectionLevel="signature|system" />
881
882    <!-- @SystemApi @hide -->
883    <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
884        android:permissionGroup="android.permission-group.NETWORK"
885        android:protectionLevel="signature|system" />
886
887    <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
888	@hide -->
889    <permission android:name="android.permission.LOOP_RADIO"
890	android:permissionGroup="android.permission-group.NETWORK"
891	android:protectionLevel="signature|system" />
892
893    <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
894         @hide
895    -->
896    <permission android:name="android.permission.NFC_HANDOVER_STATUS"
897                android:label="@string/permlab_handoverStatus"
898                android:description="@string/permdesc_handoverStatus"
899                android:protectionLevel="signature|system" />
900
901    <!-- ================================== -->
902    <!-- Permissions for accessing accounts -->
903    <!-- ================================== -->
904    <eat-comment />
905
906    <!-- Permissions for direct access to the accounts managed
907         by the Account Manager. -->
908    <permission-group android:name="android.permission-group.ACCOUNTS"
909        android:label="@string/permgrouplab_accounts"
910        android:icon="@drawable/perm_group_accounts"
911        android:description="@string/permgroupdesc_accounts"
912        android:permissionGroupFlags="personalInfo"
913        android:priority="200" />
914
915    <!-- Allows access to the list of accounts in the Accounts Service -->
916    <permission android:name="android.permission.GET_ACCOUNTS"
917        android:permissionGroup="android.permission-group.ACCOUNTS"
918        android:protectionLevel="normal"
919        android:description="@string/permdesc_getAccounts"
920        android:label="@string/permlab_getAccounts" />
921
922    <!-- Allows an application to act as an AccountAuthenticator for
923         the AccountManager -->
924    <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
925        android:permissionGroup="android.permission-group.ACCOUNTS"
926        android:protectionLevel="dangerous"
927        android:label="@string/permlab_authenticateAccounts"
928        android:description="@string/permdesc_authenticateAccounts" />
929
930    <!-- Allows an application to request authtokens from the AccountManager -->
931    <permission android:name="android.permission.USE_CREDENTIALS"
932        android:permissionGroup="android.permission-group.ACCOUNTS"
933        android:protectionLevel="dangerous"
934        android:label="@string/permlab_useCredentials"
935        android:description="@string/permdesc_useCredentials" />
936
937    <!-- Allows an application to manage the list of accounts in the AccountManager -->
938    <permission android:name="android.permission.MANAGE_ACCOUNTS"
939        android:permissionGroup="android.permission-group.ACCOUNTS"
940        android:protectionLevel="dangerous"
941        android:label="@string/permlab_manageAccounts"
942        android:description="@string/permdesc_manageAccounts" />
943
944    <!-- @SystemApi Allows applications to call into AccountAuthenticators.
945    <p>Not for use by third-party applications. -->
946    <permission android:name="android.permission.ACCOUNT_MANAGER"
947        android:permissionGroup="android.permission-group.ACCOUNTS"
948        android:protectionLevel="signature"
949        android:description="@string/permdesc_accountManagerService"
950        android:label="@string/permlab_accountManagerService" />
951
952    <!-- ================================== -->
953    <!-- Permissions for accessing hardware that may effect battery life-->
954    <!-- ================================== -->
955    <eat-comment />
956
957    <!-- Used for permissions that provide direct access to the hardware on
958         the device that has an effect on battery life.  This includes vibrator,
959         flashlight,  etc. -->
960
961    <permission-group android:name="android.permission-group.AFFECTS_BATTERY"
962        android:label="@string/permgrouplab_affectsBattery"
963        android:icon="@drawable/perm_group_affects_battery"
964        android:description="@string/permgroupdesc_affectsBattery"
965        android:priority="180" />
966
967    <!-- Allows applications to enter Wi-Fi Multicast mode -->
968    <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
969        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
970        android:protectionLevel="dangerous"
971        android:description="@string/permdesc_changeWifiMulticastState"
972        android:label="@string/permlab_changeWifiMulticastState" />
973
974    <!-- Allows access to the vibrator -->
975    <permission android:name="android.permission.VIBRATE"
976        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
977        android:protectionLevel="normal"
978        android:label="@string/permlab_vibrate"
979        android:description="@string/permdesc_vibrate" />
980
981    <!-- Allows access to the flashlight -->
982    <permission android:name="android.permission.FLASHLIGHT"
983        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
984        android:protectionLevel="normal"
985        android:label="@string/permlab_flashlight"
986        android:description="@string/permdesc_flashlight" />
987
988    <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
989         from dimming -->
990    <permission android:name="android.permission.WAKE_LOCK"
991        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
992        android:protectionLevel="normal"
993        android:label="@string/permlab_wakeLock"
994        android:description="@string/permdesc_wakeLock" />
995
996    <!-- Allows using the device's IR transmitter, if available -->
997    <permission android:name="android.permission.TRANSMIT_IR"
998        android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
999        android:protectionLevel="normal"
1000        android:label="@string/permlab_transmitIr"
1001        android:description="@string/permdesc_transmitIr" />
1002
1003    <!-- ==================================================== -->
1004    <!-- Permissions related to changing audio settings   -->
1005    <!-- ==================================================== -->
1006    <eat-comment />
1007
1008    <!-- Used for permissions that provide direct access to speaker settings
1009         the device. -->
1010    <permission-group android:name="android.permission-group.AUDIO_SETTINGS"
1011        android:label="@string/permgrouplab_audioSettings"
1012        android:icon="@drawable/perm_group_audio_settings"
1013        android:description="@string/permgroupdesc_audioSettings"
1014        android:priority="130" />
1015
1016    <!-- Allows an application to modify global audio settings -->
1017    <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
1018        android:permissionGroup="android.permission-group.AUDIO_SETTINGS"
1019        android:protectionLevel="normal"
1020        android:label="@string/permlab_modifyAudioSettings"
1021        android:description="@string/permdesc_modifyAudioSettings" />
1022
1023    <!-- ================================== -->
1024    <!-- Permissions for accessing hardware -->
1025    <!-- ================================== -->
1026    <eat-comment />
1027
1028    <!-- Used for permissions that provide direct access to the hardware on
1029         the device.  This includes audio, the camera, vibrator, etc. -->
1030    <permission-group android:name="android.permission-group.HARDWARE_CONTROLS"
1031        android:label="@string/permgrouplab_hardwareControls"
1032        android:description="@string/permgroupdesc_hardwareControls"
1033        android:priority="260"/>
1034
1035    <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
1036         @hide -->
1037    <permission android:name="android.permission.MANAGE_USB"
1038        android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1039        android:protectionLevel="signature|system"
1040        android:label="@string/permlab_manageUsb"
1041        android:description="@string/permdesc_manageUsb" />
1042
1043    <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
1044         For use only by the device side MTP implementation.
1045         @hide -->
1046    <permission android:name="android.permission.ACCESS_MTP"
1047        android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1048        android:protectionLevel="signature|system"
1049        android:label="@string/permlab_accessMtp"
1050        android:description="@string/permdesc_accessMtp" />
1051
1052    <!-- Allows access to hardware peripherals.  Intended only for hardware testing.
1053    <p>Not for use by third-party applications. -->
1054    <permission android:name="android.permission.HARDWARE_TEST"
1055        android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
1056        android:protectionLevel="signature"
1057        android:label="@string/permlab_hardware_test"
1058        android:description="@string/permdesc_hardware_test" />
1059
1060    <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
1061         @hide -->
1062    <permission android:name="android.permission.NET_ADMIN"
1063        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1064        android:protectionLevel="signature" />
1065
1066    <!-- Allows registration for remote audio playback. @hide -->
1067    <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
1068        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1069        android:protectionLevel="signature" />
1070
1071    <!-- Allows an application to communicate with a SIM card using logical
1072         channels. -->
1073    <permission android:name="android.permission.SIM_COMMUNICATION"
1074        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1075        android:label="@string/permlab_sim_communication"
1076        android:description="@string/permdesc_sim_communication"
1077        android:protectionLevel="dangerous" />
1078
1079    <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
1080         built-in tuners and HDMI-in's.
1081         @hide This should only be used by OEM's TvInputService's.
1082    -->
1083    <permission android:name="android.permission.TV_INPUT_HARDWARE"
1084        android:protectionLevel="signatureOrSystem" />
1085
1086    <!-- =========================================== -->
1087    <!-- Permissions associated with audio capture -->
1088    <!-- =========================================== -->
1089    <eat-comment />
1090
1091    <!-- Used for permissions that are associated with accessing
1092         microphone audio from the device. Note that phone calls also capture audio
1093         but are in a separate (more visible) permission group. -->
1094    <permission-group android:name="android.permission-group.MICROPHONE"
1095        android:label="@string/permgrouplab_microphone"
1096        android:icon="@drawable/perm_group_microphone"
1097        android:description="@string/permgroupdesc_microphone"
1098        android:permissionGroupFlags="personalInfo"
1099        android:priority="340" />
1100
1101    <!-- Allows an application to record audio -->
1102    <permission android:name="android.permission.RECORD_AUDIO"
1103        android:permissionGroup="android.permission-group.MICROPHONE"
1104        android:protectionLevel="dangerous"
1105        android:label="@string/permlab_recordAudio"
1106        android:description="@string/permdesc_recordAudio" />
1107
1108
1109    <!-- =========================================== -->
1110    <!-- Permissions associated with camera and image capture -->
1111    <!-- =========================================== -->
1112    <eat-comment />
1113
1114    <!-- Used for permissions that are associated with accessing
1115         camera or capturing images/video from the device. -->
1116    <permission-group android:name="android.permission-group.CAMERA"
1117        android:label="@string/permgrouplab_camera"
1118        android:icon="@drawable/perm_group_camera"
1119        android:description="@string/permgroupdesc_camera"
1120        android:permissionGroupFlags="personalInfo"
1121        android:priority="350" />
1122
1123    <!-- Required to be able to access the camera device.
1124         <p>This will automatically enforce the <a
1125         href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code
1126         &lt;uses-feature&gt;}</a> manifest element for <em>all</em> camera features.
1127         If you do not require all camera features or can properly operate if a camera
1128         is not available, then you must modify your manifest as appropriate in order to
1129         install on devices that don't support all camera features.</p> -->
1130    <permission android:name="android.permission.CAMERA"
1131        android:permissionGroup="android.permission-group.CAMERA"
1132        android:protectionLevel="dangerous"
1133        android:label="@string/permlab_camera"
1134        android:description="@string/permdesc_camera" />
1135
1136    <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
1137         a camera is in use by an application.
1138         @hide -->
1139    <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
1140        android:permissionGroup="android.permission-group.CAMERA"
1141        android:protectionLevel="signature|system"
1142        android:label="@string/permlab_cameraDisableTransmitLed"
1143        android:description="@string/permdesc_cameraDisableTransmitLed" />
1144
1145    <!-- =========================================== -->
1146    <!-- Permissions associated with telephony state -->
1147    <!-- =========================================== -->
1148    <eat-comment />
1149
1150    <!-- Used for permissions that are associated with accessing and modifying
1151         telephony state: placing calls, intercepting outgoing calls, reading
1152         and modifying the phone state. -->
1153    <permission-group android:name="android.permission-group.PHONE_CALLS"
1154        android:label="@string/permgrouplab_phoneCalls"
1155        android:icon="@drawable/perm_group_phone_calls"
1156        android:description="@string/permgroupdesc_phoneCalls"
1157        android:permissionGroupFlags="personalInfo"
1158        android:priority="370" />
1159
1160    <!-- Allows an application to see the number being dialed during an outgoing
1161         call with the option to redirect the call to a different number or
1162         abort the call altogether. -->
1163    <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
1164        android:permissionGroup="android.permission-group.PHONE_CALLS"
1165        android:protectionLevel="dangerous"
1166        android:label="@string/permlab_processOutgoingCalls"
1167        android:description="@string/permdesc_processOutgoingCalls" />
1168
1169    <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
1170         Does not include placing calls.
1171         <p>Not for use by third-party applications. -->
1172    <permission android:name="android.permission.MODIFY_PHONE_STATE"
1173        android:permissionGroup="android.permission-group.PHONE_CALLS"
1174        android:protectionLevel="signature|system"
1175        android:label="@string/permlab_modifyPhoneState"
1176        android:description="@string/permdesc_modifyPhoneState" />
1177
1178    <!-- Allows read only access to phone state.
1179         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1180         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1181         minSdkVersion}</a> and <a
1182         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1183         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1184         grants your app this permission. If you don't need this permission, be sure your <a
1185         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1186         targetSdkVersion}</a> is 4 or higher. -->
1187    <permission android:name="android.permission.READ_PHONE_STATE"
1188        android:permissionGroup="android.permission-group.PHONE_CALLS"
1189        android:protectionLevel="dangerous"
1190        android:label="@string/permlab_readPhoneState"
1191        android:description="@string/permdesc_readPhoneState" />
1192
1193    <!-- Allows read only access to precise phone state.
1194         @hide Pending API council approval -->
1195    <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
1196        android:permissionGroup="android.permission-group.PHONE_CALLS"
1197        android:protectionLevel="dangerous"
1198        android:label="@string/permlab_readPrecisePhoneState"
1199        android:description="@string/permdesc_readPrecisePhoneState" />
1200
1201    <!-- @SystemApi Allows read access to privileged phone state.
1202         @hide Used internally. -->
1203    <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
1204        android:permissionGroup="android.permission-group.PHONE_CALLS"
1205        android:protectionLevel="signature|system" />
1206
1207     <!-- Allows an application to initiate a phone call without going through
1208         the Dialer user interface for the user to confirm the call
1209         being placed. -->
1210    <permission android:name="android.permission.CALL_PHONE"
1211        android:permissionGroup="android.permission-group.PHONE_CALLS"
1212        android:protectionLevel="dangerous"
1213        android:permissionFlags="costsMoney"
1214        android:label="@string/permlab_callPhone"
1215        android:description="@string/permdesc_callPhone" />
1216
1217    <!-- Allows an application to use SIP service -->
1218    <permission android:name="android.permission.USE_SIP"
1219        android:permissionGroup="android.permission-group.PHONE_CALLS"
1220        android:protectionLevel="dangerous"
1221        android:description="@string/permdesc_use_sip"
1222        android:label="@string/permlab_use_sip" />
1223
1224    <!-- @SystemApi Allows an application to request CallHandlerService implementations.
1225         @hide -->
1226    <permission android:name="android.permission.BIND_CALL_SERVICE"
1227        android:permissionGroup="android.permission-group.PHONE_CALLS"
1228        android:protectionLevel="system|signature"
1229        android:description="@string/permdesc_bind_call_service"
1230        android:label="@string/permlab_bind_call_service" />
1231
1232    <!-- ================================== -->
1233    <!-- Permissions for sdcard interaction -->
1234    <!-- ================================== -->
1235    <eat-comment />
1236
1237    <!-- Group of permissions that are related to SD card access. -->
1238    <permission-group android:name="android.permission-group.STORAGE"
1239        android:label="@string/permgrouplab_storage"
1240        android:icon="@drawable/perm_group_storage"
1241        android:description="@string/permgroupdesc_storage"
1242        android:permissionGroupFlags="personalInfo"
1243        android:priority="240" />
1244
1245    <!-- Allows an application to read from external storage.
1246         <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
1247         granted this permission.</p>
1248         <p>This permission is enforced starting in API level 19.  Before API level 19, this
1249         permission is not enforced and all apps still have access to read from external storage.
1250         You can test your app with the permission enforced by enabling <em>Protect USB
1251         storage</em> under Developer options in the Settings app on a device running Android 4.1 or
1252         higher.</p>
1253         <p>Also starting in API level 19, this permission is <em>not</em> required to
1254         read/write files in your application-specific directories returned by
1255         {@link android.content.Context#getExternalFilesDir} and
1256         {@link android.content.Context#getExternalCacheDir}.
1257         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1258         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1259         minSdkVersion}</a> and <a
1260         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1261         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1262         grants your app this permission. If you don't need this permission, be sure your <a
1263         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1264         targetSdkVersion}</a> is 4 or higher.-->
1265    <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
1266        android:permissionGroup="android.permission-group.STORAGE"
1267        android:label="@string/permlab_sdcardRead"
1268        android:description="@string/permdesc_sdcardRead"
1269        android:protectionLevel="normal" />
1270
1271    <!-- Allows an application to write to external storage.
1272         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1273         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1274         minSdkVersion}</a> and <a
1275         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1276         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1277         grants your app this permission. If you don't need this permission, be sure your <a
1278         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1279         targetSdkVersion}</a> is 4 or higher.
1280         <p>Starting in API level 19, this permission is <em>not</em> required to
1281         read/write files in your application-specific directories returned by
1282         {@link android.content.Context#getExternalFilesDir} and
1283         {@link android.content.Context#getExternalCacheDir}. -->
1284    <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
1285        android:permissionGroup="android.permission-group.STORAGE"
1286        android:label="@string/permlab_sdcardWrite"
1287        android:description="@string/permdesc_sdcardWrite"
1288        android:protectionLevel="dangerous" />
1289
1290    <!-- @SystemApi Allows an application to write to internal media storage
1291         @hide  -->
1292    <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
1293        android:permissionGroup="android.permission-group.STORAGE"
1294        android:label="@string/permlab_mediaStorageWrite"
1295        android:description="@string/permdesc_mediaStorageWrite"
1296        android:protectionLevel="signature|system" />
1297
1298    <!-- Allows an application to manage access to documents, usually as part
1299         of a document picker. -->
1300    <permission android:name="android.permission.MANAGE_DOCUMENTS"
1301        android:permissionGroup="android.permission-group.STORAGE"
1302        android:label="@string/permlab_manageDocs"
1303        android:description="@string/permdesc_manageDocs"
1304        android:protectionLevel="signature" />
1305
1306    <!-- ================================== -->
1307    <!-- Permissions for screenlock         -->
1308    <!-- ================================== -->
1309    <eat-comment />
1310
1311    <!-- Group of permissions that are related to the screenlock. -->
1312    <permission-group android:name="android.permission-group.SCREENLOCK"
1313        android:label="@string/permgrouplab_screenlock"
1314        android:icon="@drawable/perm_group_screenlock"
1315        android:permissionGroupFlags="personalInfo"
1316        android:description="@string/permgroupdesc_screenlock"
1317        android:priority="230" />
1318
1319    <!-- Allows applications to disable the keyguard -->
1320    <permission android:name="android.permission.DISABLE_KEYGUARD"
1321        android:permissionGroup="android.permission-group.SCREENLOCK"
1322        android:protectionLevel="dangerous"
1323        android:description="@string/permdesc_disableKeyguard"
1324        android:label="@string/permlab_disableKeyguard" />
1325
1326    <!-- ================================== -->
1327    <!-- Permissions to access other installed applications  -->
1328    <!-- ================================== -->
1329    <eat-comment />
1330
1331    <!-- Group of permissions that are related to the other applications
1332         installed on the system.  Examples include such as listing
1333         running apps, or killing background processes. -->
1334    <permission-group android:name="android.permission-group.APP_INFO"
1335        android:label="@string/permgrouplab_appInfo"
1336        android:icon="@drawable/perm_group_app_info"
1337        android:description="@string/permgroupdesc_appInfo"
1338        android:priority="220" />
1339
1340    <!-- @SystemApi Allows an application to get information about the currently
1341         or recently running tasks. -->
1342    <permission android:name="android.permission.GET_TASKS"
1343        android:permissionGroup="android.permission-group.APP_INFO"
1344        android:protectionLevel="signature|system"
1345        android:label="@string/permlab_getTasks"
1346        android:description="@string/permdesc_getTasks" />
1347
1348    <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
1349         across the users on the device, using singleton services and
1350         user-targeted broadcasts.  This permission is not available to
1351         third party applications. -->
1352    <permission android:name="android.permission.INTERACT_ACROSS_USERS"
1353        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1354        android:protectionLevel="signature|system|development"
1355        android:label="@string/permlab_interactAcrossUsers"
1356        android:description="@string/permdesc_interactAcrossUsers" />
1357
1358    <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
1359         that removes restrictions on where broadcasts can be sent and allows other
1360         types of interactions. -->
1361    <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
1362        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1363        android:protectionLevel="signature"
1364        android:label="@string/permlab_interactAcrossUsersFull"
1365        android:description="@string/permdesc_interactAcrossUsersFull" />
1366
1367    <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
1368         users on the device. This permission is not available to
1369         third party applications. -->
1370    <permission android:name="android.permission.MANAGE_USERS"
1371        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1372        android:protectionLevel="signature|system"
1373        android:label="@string/permlab_manageUsers"
1374        android:description="@string/permdesc_manageUsers" />
1375
1376    <!-- Allows an application to get full detailed information about
1377         recently running tasks, with full fidelity to the real state.
1378         @hide -->
1379    <permission android:name="android.permission.GET_DETAILED_TASKS"
1380        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1381        android:protectionLevel="signature"
1382        android:label="@string/permlab_getDetailedTasks"
1383        android:description="@string/permdesc_getDetailedTasks" />
1384
1385    <!-- Allows an application to change the Z-order of tasks -->
1386    <permission android:name="android.permission.REORDER_TASKS"
1387        android:permissionGroup="android.permission-group.APP_INFO"
1388        android:protectionLevel="normal"
1389        android:label="@string/permlab_reorderTasks"
1390        android:description="@string/permdesc_reorderTasks" />
1391
1392    <!-- @hide Allows an application to change to remove/kill tasks -->
1393    <permission android:name="android.permission.REMOVE_TASKS"
1394        android:permissionGroup="android.permission-group.APP_INFO"
1395        android:protectionLevel="signature"
1396        android:label="@string/permlab_removeTasks"
1397        android:description="@string/permdesc_removeTasks" />
1398
1399    <!-- @SystemApi @hide Allows an application to create/manage/remove stacks -->
1400    <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
1401        android:permissionGroup="android.permission-group.APP_INFO"
1402        android:protectionLevel="signature|system"
1403        android:label="@string/permlab_manageActivityStacks"
1404        android:description="@string/permdesc_manageActivityStacks" />
1405
1406    <!-- Allows an application to start any activity, regardless of permission
1407         protection or exported state. @hide -->
1408    <permission android:name="android.permission.START_ANY_ACTIVITY"
1409        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1410        android:protectionLevel="signature"
1411        android:label="@string/permlab_startAnyActivity"
1412        android:description="@string/permdesc_startAnyActivity" />
1413
1414    <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
1415        API is no longer supported. -->
1416    <permission android:name="android.permission.RESTART_PACKAGES"
1417        android:permissionGroup="android.permission-group.APP_INFO"
1418        android:protectionLevel="normal"
1419        android:label="@string/permlab_killBackgroundProcesses"
1420        android:description="@string/permdesc_killBackgroundProcesses" />
1421
1422    <!-- Allows an application to call
1423        {@link android.app.ActivityManager#killBackgroundProcesses}. -->
1424    <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
1425        android:permissionGroup="android.permission-group.APP_INFO"
1426        android:protectionLevel="normal"
1427        android:label="@string/permlab_killBackgroundProcesses"
1428        android:description="@string/permdesc_killBackgroundProcesses" />
1429
1430    <!-- ================================== -->
1431    <!-- Permissions affecting the display of other applications  -->
1432    <!-- ================================== -->
1433    <eat-comment />
1434
1435    <!-- Group of permissions that allow manipulation of how
1436         another application displays UI to the user. -->
1437    <permission-group android:name="android.permission-group.DISPLAY"
1438        android:label="@string/permgrouplab_display"
1439        android:icon="@drawable/perm_group_display"
1440        android:description="@string/permgroupdesc_display"
1441        android:priority="190"/>
1442
1443    <!-- Allows an application to open windows using the type
1444         {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT},
1445         shown on top of all other applications.  Very few applications
1446         should use this permission; these windows are intended for
1447         system-level interaction with the user. -->
1448    <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
1449        android:permissionGroup="android.permission-group.DISPLAY"
1450        android:protectionLevel="dangerous"
1451        android:label="@string/permlab_systemAlertWindow"
1452        android:description="@string/permdesc_systemAlertWindow" />
1453
1454    <!-- ================================== -->
1455    <!-- Permissions affecting the system wallpaper -->
1456    <!-- ================================== -->
1457    <eat-comment />
1458
1459    <!-- Group of permissions that allow manipulation of how
1460         another application displays UI to the user. -->
1461    <permission-group android:name="android.permission-group.WALLPAPER"
1462        android:label="@string/permgrouplab_wallpaper"
1463        android:icon="@drawable/perm_group_wallpaper"
1464        android:description="@string/permgroupdesc_wallpaper"
1465        android:priority="150" />
1466
1467    <!-- Allows applications to set the wallpaper -->
1468    <permission android:name="android.permission.SET_WALLPAPER"
1469        android:permissionGroup="android.permission-group.WALLPAPER"
1470        android:protectionLevel="normal"
1471        android:label="@string/permlab_setWallpaper"
1472        android:description="@string/permdesc_setWallpaper" />
1473
1474    <!-- Allows applications to set the wallpaper hints -->
1475    <permission android:name="android.permission.SET_WALLPAPER_HINTS"
1476        android:permissionGroup="android.permission-group.WALLPAPER"
1477        android:protectionLevel="normal"
1478        android:label="@string/permlab_setWallpaperHints"
1479        android:description="@string/permdesc_setWallpaperHints" />
1480
1481    <!-- ============================================ -->
1482    <!-- Permissions for changing the system clock -->
1483    <!-- ============================================ -->
1484    <eat-comment />
1485
1486    <!-- Group of permissions that are related to system clock. -->
1487    <permission-group android:name="android.permission-group.SYSTEM_CLOCK"
1488        android:label="@string/permgrouplab_systemClock"
1489        android:icon="@drawable/perm_group_system_clock"
1490        android:description="@string/permgroupdesc_systemClock"
1491        android:priority="140" />
1492
1493    <!-- @SystemApi Allows applications to set the system time.
1494    <p>Not for use by third-party applications. -->
1495    <permission android:name="android.permission.SET_TIME"
1496        android:protectionLevel="signature|system"
1497        android:label="@string/permlab_setTime"
1498        android:description="@string/permdesc_setTime" />
1499
1500    <!-- Allows applications to set the system time zone -->
1501    <permission android:name="android.permission.SET_TIME_ZONE"
1502        android:permissionGroup="android.permission-group.SYSTEM_CLOCK"
1503        android:protectionLevel="normal"
1504        android:label="@string/permlab_setTimeZone"
1505        android:description="@string/permdesc_setTimeZone" />
1506
1507    <!-- ==================================================== -->
1508    <!-- Permissions related to changing status bar   -->
1509    <!-- ==================================================== -->
1510    <eat-comment />
1511
1512    <!-- Used for permissions that change the status bar -->
1513    <permission-group android:name="android.permission-group.STATUS_BAR"
1514        android:label="@string/permgrouplab_statusBar"
1515        android:icon="@drawable/perm_group_status_bar"
1516        android:description="@string/permgroupdesc_statusBar"
1517        android:priority="110" />
1518
1519    <!-- Allows an application to expand or collapse the status bar. -->
1520    <permission android:name="android.permission.EXPAND_STATUS_BAR"
1521        android:permissionGroup="android.permission-group.STATUS_BAR"
1522        android:protectionLevel="normal"
1523        android:label="@string/permlab_expandStatusBar"
1524        android:description="@string/permdesc_expandStatusBar" />
1525
1526    <!-- ============================================================== -->
1527    <!-- Permissions related to adding/removing shortcuts from Launcher -->
1528    <!-- ============================================================== -->
1529    <eat-comment />
1530
1531    <!-- Allows an application to install a shortcut in Launcher -->
1532    <permission
1533        android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
1534        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1535        android:protectionLevel="dangerous"
1536        android:label="@string/permlab_install_shortcut"
1537        android:description="@string/permdesc_install_shortcut" />
1538
1539        <!-- Allows an application to uninstall a shortcut in Launcher -->
1540    <permission
1541        android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
1542        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1543        android:protectionLevel="dangerous"
1544        android:label="@string/permlab_uninstall_shortcut"
1545        android:description="@string/permdesc_uninstall_shortcut"/>
1546
1547    <!-- ==================================================== -->
1548    <!-- Permissions related to accessing sync settings   -->
1549    <!-- ==================================================== -->
1550    <eat-comment />
1551
1552    <!-- Used for permissions that access the sync settings or sync
1553         related information. -->
1554    <permission-group android:name="android.permission-group.SYNC_SETTINGS"
1555        android:label="@string/permgrouplab_syncSettings"
1556        android:icon="@drawable/perm_group_sync_settings"
1557        android:description="@string/permgroupdesc_syncSettings"
1558        android:priority="120" />
1559
1560    <!-- Allows applications to read the sync settings -->
1561    <permission android:name="android.permission.READ_SYNC_SETTINGS"
1562        android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1563        android:protectionLevel="normal"
1564        android:description="@string/permdesc_readSyncSettings"
1565        android:label="@string/permlab_readSyncSettings" />
1566
1567    <!-- Allows applications to write the sync settings -->
1568    <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
1569        android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1570        android:protectionLevel="normal"
1571        android:description="@string/permdesc_writeSyncSettings"
1572        android:label="@string/permlab_writeSyncSettings" />
1573
1574    <!-- Allows applications to read the sync stats -->
1575    <permission android:name="android.permission.READ_SYNC_STATS"
1576        android:permissionGroup="android.permission-group.SYNC_SETTINGS"
1577        android:protectionLevel="normal"
1578        android:description="@string/permdesc_readSyncStats"
1579        android:label="@string/permlab_readSyncStats" />
1580
1581
1582    <!-- ============================================ -->
1583    <!-- Permissions for low-level system interaction -->
1584    <!-- ============================================ -->
1585    <eat-comment />
1586
1587    <!-- Group of permissions that are related to system APIs.  Many
1588         of these are not permissions the user will be expected to understand,
1589         and such permissions should generally be marked as "normal" protection
1590         level so they don't get displayed.  This can also, however, be used
1591         for miscellaneous features that provide access to the operating system,
1592         such as writing the global system settings. -->
1593    <permission-group android:name="android.permission-group.SYSTEM_TOOLS"
1594        android:label="@string/permgrouplab_systemTools"
1595        android:icon="@drawable/perm_group_system_tools"
1596        android:description="@string/permgroupdesc_systemTools"
1597        android:priority="100" />
1598
1599    <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
1600    <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
1601        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1602        android:protectionLevel="signature"
1603        android:label="@string/permlab_setScreenCompatibility"
1604        android:description="@string/permdesc_setScreenCompatibility" />
1605
1606    <!-- Allows an application to access all multi-user external storage @hide -->
1607    <permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE"
1608        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1609        android:label="@string/permlab_sdcardAccessAll"
1610        android:description="@string/permdesc_sdcardAccessAll"
1611        android:protectionLevel="signature" />
1612
1613    <!-- @SystemApi Allows an application to modify the current configuration, such
1614         as locale. -->
1615    <permission android:name="android.permission.CHANGE_CONFIGURATION"
1616        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1617        android:protectionLevel="signature|system|development"
1618        android:label="@string/permlab_changeConfiguration"
1619        android:description="@string/permdesc_changeConfiguration" />
1620
1621    <!-- Allows an application to read or write the system settings. -->
1622    <permission android:name="android.permission.WRITE_SETTINGS"
1623        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1624        android:protectionLevel="normal"
1625        android:label="@string/permlab_writeSettings"
1626        android:description="@string/permdesc_writeSettings" />
1627
1628    <!-- @SystemApi Allows an application to modify the Google service map.
1629    <p>Not for use by third-party applications. -->
1630    <permission android:name="android.permission.WRITE_GSERVICES"
1631        android:protectionLevel="signature|system"
1632        android:label="@string/permlab_writeGservices"
1633        android:description="@string/permdesc_writeGservices" />
1634
1635    <!-- @SystemApi Allows an application to call
1636        {@link android.app.ActivityManager#forceStopPackage}.
1637        @hide -->
1638    <permission android:name="android.permission.FORCE_STOP_PACKAGES"
1639        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1640        android:protectionLevel="signature|system"
1641        android:label="@string/permlab_forceStopPackages"
1642        android:description="@string/permdesc_forceStopPackages" />
1643
1644    <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
1645         An active window is the window that has fired an accessibility event. -->
1646    <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
1647        android:permissionGroup="android.permission-group.PERSONAL_INFO"
1648        android:protectionLevel="signature|system"
1649        android:label="@string/permlab_retrieve_window_content"
1650        android:description="@string/permdesc_retrieve_window_content" />
1651
1652    <!-- @SystemApi Modify the global animation scaling factor.
1653    <p>Not for use by third-party applications. -->
1654    <permission android:name="android.permission.SET_ANIMATION_SCALE"
1655        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1656        android:protectionLevel="signature|system|development"
1657        android:label="@string/permlab_setAnimationScale"
1658        android:description="@string/permdesc_setAnimationScale" />
1659
1660    <!-- @deprecated This functionality will be removed in the future; please do
1661         not use. Allow an application to make its activities persistent. -->
1662    <permission android:name="android.permission.PERSISTENT_ACTIVITY"
1663        android:permissionGroup="android.permission-group.APP_INFO"
1664        android:protectionLevel="normal"
1665        android:label="@string/permlab_persistentActivity"
1666        android:description="@string/permdesc_persistentActivity" />
1667
1668    <!-- Allows an application to find out the space used by any package. -->
1669    <permission android:name="android.permission.GET_PACKAGE_SIZE"
1670        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1671        android:protectionLevel="normal"
1672        android:label="@string/permlab_getPackageSize"
1673        android:description="@string/permdesc_getPackageSize" />
1674
1675    <!-- @deprecated No longer useful, see
1676         {@link android.content.pm.PackageManager#addPackageToPreferred}
1677         for details. -->
1678    <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
1679        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1680        android:protectionLevel="signature"
1681        android:label="@string/permlab_setPreferredApplications"
1682        android:description="@string/permdesc_setPreferredApplications" />
1683
1684    <!-- Allows an application to receive the
1685         {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
1686         broadcast after the system finishes booting.  If you don't
1687         request this permission, you will not receive the broadcast at
1688         that time.  Though holding this permission does not have any
1689         security implications, it can have a negative impact on the
1690         user experience by increasing the amount of time it takes the
1691         system to start and allowing applications to have themselves
1692         running without the user being aware of them.  As such, you must
1693         explicitly declare your use of this facility to make that visible
1694         to the user. -->
1695    <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
1696        android:permissionGroup="android.permission-group.APP_INFO"
1697        android:protectionLevel="normal"
1698        android:label="@string/permlab_receiveBootCompleted"
1699        android:description="@string/permdesc_receiveBootCompleted" />
1700
1701    <!-- Allows an application to broadcast sticky intents.  These are
1702         broadcasts whose data is held by the system after being finished,
1703         so that clients can quickly retrieve that data without having
1704         to wait for the next broadcast. -->
1705    <permission android:name="android.permission.BROADCAST_STICKY"
1706        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1707        android:protectionLevel="normal"
1708        android:label="@string/permlab_broadcastSticky"
1709        android:description="@string/permdesc_broadcastSticky" />
1710
1711    <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
1712    <p>Not for use by third-party applications.-->
1713    <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
1714        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1715        android:protectionLevel="system|signature"
1716        android:label="@string/permlab_mount_unmount_filesystems"
1717        android:description="@string/permdesc_mount_unmount_filesystems" />
1718
1719    <!-- @SystemApi Allows formatting file systems for removable storage.
1720    <p>Not for use by third-party applications. -->
1721    <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
1722        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1723        android:protectionLevel="system|signature"
1724        android:label="@string/permlab_mount_format_filesystems"
1725        android:description="@string/permdesc_mount_format_filesystems" />
1726
1727    <!-- Allows access to ASEC non-destructive API calls
1728         @hide  -->
1729    <permission android:name="android.permission.ASEC_ACCESS"
1730        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1731        android:protectionLevel="signature"
1732        android:label="@string/permlab_asec_access"
1733        android:description="@string/permdesc_asec_access" />
1734
1735    <!-- Allows creation of ASEC volumes
1736         @hide  -->
1737    <permission android:name="android.permission.ASEC_CREATE"
1738        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1739        android:protectionLevel="signature"
1740        android:label="@string/permlab_asec_create"
1741        android:description="@string/permdesc_asec_create" />
1742
1743    <!-- Allows destruction of ASEC volumes
1744         @hide  -->
1745    <permission android:name="android.permission.ASEC_DESTROY"
1746        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1747        android:protectionLevel="signature"
1748        android:label="@string/permlab_asec_destroy"
1749        android:description="@string/permdesc_asec_destroy" />
1750
1751    <!-- Allows mount / unmount of ASEC volumes
1752         @hide  -->
1753    <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
1754        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1755        android:protectionLevel="signature"
1756        android:label="@string/permlab_asec_mount_unmount"
1757        android:description="@string/permdesc_asec_mount_unmount" />
1758
1759    <!-- Allows rename of ASEC volumes
1760         @hide  -->
1761    <permission android:name="android.permission.ASEC_RENAME"
1762        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1763        android:protectionLevel="signature"
1764        android:label="@string/permlab_asec_rename"
1765        android:description="@string/permdesc_asec_rename" />
1766
1767    <!-- @SystemApi Allows applications to write the apn settings.
1768    <p>Not for use by third-party applications. -->
1769    <permission android:name="android.permission.WRITE_APN_SETTINGS"
1770                android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1771                android:protectionLevel="signature|system"
1772                android:description="@string/permdesc_writeApnSettings"
1773                android:label="@string/permlab_writeApnSettings" />
1774
1775    <!-- Allows an application to allow access the subscribed feeds
1776         ContentProvider. -->
1777    <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
1778        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1779        android:label="@string/permlab_subscribedFeedsRead"
1780        android:description="@string/permdesc_subscribedFeedsRead"
1781        android:protectionLevel="normal" />
1782    <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
1783        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1784        android:label="@string/permlab_subscribedFeedsWrite"
1785        android:description="@string/permdesc_subscribedFeedsWrite"
1786        android:protectionLevel="dangerous" />
1787
1788    <!-- Allows applications to change network connectivity state -->
1789    <permission android:name="android.permission.CHANGE_NETWORK_STATE"
1790        android:permissionGroup="android.permission-group.NETWORK"
1791        android:protectionLevel="normal"
1792        android:description="@string/permdesc_changeNetworkState"
1793        android:label="@string/permlab_changeNetworkState" />
1794
1795    <!-- Allows an application to clear the caches of all installed
1796         applications on the device.  -->
1797    <permission android:name="android.permission.CLEAR_APP_CACHE"
1798        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1799        android:protectionLevel="dangerous"
1800        android:label="@string/permlab_clearAppCache"
1801        android:description="@string/permdesc_clearAppCache" />
1802
1803    <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
1804         @hide -->
1805    <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
1806        android:protectionLevel="signature|system"
1807        android:label="@string/permlab_anyCodecForPlayback"
1808        android:description="@string/permdesc_anyCodecForPlayback" />
1809
1810    <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
1811         behalf of the user.
1812         @hide -->
1813    <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
1814        android:protectionLevel="signature|system"
1815        android:label="@string/permlab_manageCaCertificates"
1816        android:description="@string/permdesc_manageCaCertificates" />
1817
1818    <!-- @SystemApi Allows an application to do certain operations needed for
1819         interacting with the recovery (system update) system. -->
1820    <permission android:name="android.permission.RECOVERY"
1821        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1822        android:protectionLevel="signature|system"
1823        android:label="@string/permlab_recovery"
1824        android:description="@string/permdesc_recovery" />
1825
1826    <!-- Allows the system to bind to an application's task services
1827         @hide -->
1828    <permission android:name="android.permission.BIND_JOB_SERVICE"
1829        android:protectionLevel="signature"
1830        android:label="@string/permlab_bindJobService"
1831        android:description="@string/permdesc_bindJobService" />
1832    <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
1833
1834    <!-- ========================================= -->
1835    <!-- Permissions for special development tools -->
1836    <!-- ========================================= -->
1837    <eat-comment />
1838
1839    <!-- Group of permissions that are related to development features.  These
1840         are not permissions that should appear in third-party applications; they
1841         protect APIs that are intended only to be used for development
1842         purposes. -->
1843    <permission-group android:name="android.permission-group.DEVELOPMENT_TOOLS"
1844        android:label="@string/permgrouplab_developmentTools"
1845        android:description="@string/permgroupdesc_developmentTools"
1846        android:priority="310" />
1847
1848    <!-- @SystemApi Allows an application to read or write the secure system settings.
1849    <p>Not for use by third-party applications. -->
1850    <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
1851        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1852        android:protectionLevel="signature|system|development"
1853        android:label="@string/permlab_writeSecureSettings"
1854        android:description="@string/permdesc_writeSecureSettings" />
1855
1856    <!-- @SystemApi Allows an application to retrieve state dump information from system services.
1857    <p>Not for use by third-party applications. -->
1858    <permission android:name="android.permission.DUMP"
1859        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1860        android:protectionLevel="signature|system|development"
1861        android:label="@string/permlab_dump"
1862        android:description="@string/permdesc_dump" />
1863
1864    <!-- @SystemApi Allows an application to read the low-level system log files.
1865    <p>Not for use by third-party applications, because
1866    Log entries can contain the user's private information. -->
1867    <permission android:name="android.permission.READ_LOGS"
1868        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1869        android:protectionLevel="signature|system|development"
1870        android:label="@string/permlab_readLogs"
1871        android:description="@string/permdesc_readLogs" />
1872
1873    <!-- @SystemApi Configure an application for debugging.
1874    <p>Not for use by third-party applications. -->
1875    <permission android:name="android.permission.SET_DEBUG_APP"
1876        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1877        android:protectionLevel="signature|system|development"
1878        android:label="@string/permlab_setDebugApp"
1879        android:description="@string/permdesc_setDebugApp" />
1880
1881    <!-- @SystemApi Allows an application to set the maximum number of (not needed)
1882         application processes that can be running.
1883         <p>Not for use by third-party applications. -->
1884    <permission android:name="android.permission.SET_PROCESS_LIMIT"
1885        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1886        android:protectionLevel="signature|system|development"
1887        android:label="@string/permlab_setProcessLimit"
1888        android:description="@string/permdesc_setProcessLimit" />
1889
1890    <!-- @SystemApi Allows an application to control whether activities are immediately
1891         finished when put in the background.
1892         <p>Not for use by third-party applications. -->
1893    <permission android:name="android.permission.SET_ALWAYS_FINISH"
1894        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1895        android:protectionLevel="signature|system|development"
1896        android:label="@string/permlab_setAlwaysFinish"
1897        android:description="@string/permdesc_setAlwaysFinish" />
1898
1899    <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
1900    <p>Not for use by third-party applications. -->
1901    <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
1902        android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
1903        android:protectionLevel="signature|system|development"
1904        android:label="@string/permlab_signalPersistentProcesses"
1905        android:description="@string/permdesc_signalPersistentProcesses" />
1906
1907    <!-- ==================================== -->
1908    <!-- Private (signature-only) permissions -->
1909    <!-- ==================================== -->
1910    <eat-comment />
1911
1912    <!-- @SystemApi Allows applications to RW to diagnostic resources.
1913    <p>Not for use by third-party applications. -->
1914    <permission android:name="android.permission.DIAGNOSTIC"
1915        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1916        android:protectionLevel="signature"
1917        android:description="@string/permdesc_diagnostic"
1918        android:label="@string/permlab_diagnostic" />
1919
1920    <!-- @SystemApi Allows an application to open, close, or disable the status bar
1921         and its icons.
1922         <p>Not for use by third-party applications. -->
1923    <permission android:name="android.permission.STATUS_BAR"
1924        android:label="@string/permlab_statusBar"
1925        android:description="@string/permdesc_statusBar"
1926        android:protectionLevel="signature|system" />
1927
1928    <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
1929    @hide -->
1930    <permission android:name="android.permission.STATUS_BAR_SERVICE"
1931        android:label="@string/permlab_statusBarService"
1932        android:description="@string/permdesc_statusBarService"
1933        android:protectionLevel="signature" />
1934
1935    <!-- Allows an application to force a BACK operation on whatever is the
1936         top activity.
1937         <p>Not for use by third-party applications. -->
1938    <permission android:name="android.permission.FORCE_BACK"
1939        android:label="@string/permlab_forceBack"
1940        android:description="@string/permdesc_forceBack"
1941        android:protectionLevel="signature" />
1942
1943    <!-- @SystemApi Allows an application to update device statistics.
1944    <p>Not for use by third-party applications. -->
1945    <permission android:name="android.permission.UPDATE_DEVICE_STATS"
1946        android:label="@string/permlab_updateBatteryStats"
1947        android:description="@string/permdesc_updateBatteryStats"
1948        android:protectionLevel="signature|system" />
1949
1950    <!-- @SystemApi @hide Allows an application to collect battery statistics -->
1951    <permission android:name="android.permission.GET_APP_OPS_STATS"
1952        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
1953        android:label="@string/permlab_getAppOpsStats"
1954        android:description="@string/permdesc_getAppOpsStats"
1955        android:protectionLevel="signature|system|development" />
1956
1957    <!-- @SystemApi Allows an application to update application operation statistics. Not for
1958         use by third party apps. @hide -->
1959    <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
1960        android:label="@string/permlab_updateAppOpsStats"
1961        android:description="@string/permdesc_updateAppOpsStats"
1962        android:protectionLevel="signature|system" />
1963
1964    <!-- Allows an application to open windows that are for use by parts
1965         of the system user interface.
1966         <p>Not for use by third-party applications. -->
1967    <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
1968        android:label="@string/permlab_internalSystemWindow"
1969        android:description="@string/permdesc_internalSystemWindow"
1970        android:protectionLevel="signature" />
1971
1972    <!-- Allows an application to manage (create, destroy,
1973         Z-order) application tokens in the window manager.
1974         <p>Not for use by third-party applications. -->
1975    <permission android:name="android.permission.MANAGE_APP_TOKENS"
1976        android:label="@string/permlab_manageAppTokens"
1977        android:description="@string/permdesc_manageAppTokens"
1978        android:protectionLevel="signature" />
1979
1980    <!-- @hide Allows the application to temporarily freeze the screen for a
1981         full-screen transition. -->
1982    <permission android:name="android.permission.FREEZE_SCREEN"
1983        android:label="@string/permlab_freezeScreen"
1984        android:description="@string/permdesc_freezeScreen"
1985        android:protectionLevel="signature" />
1986
1987    <!-- Allows an application to inject user events (keys, touch, trackball)
1988         into the event stream and deliver them to ANY window.  Without this
1989         permission, you can only deliver events to windows in your own process.
1990         <p>Not for use by third-party applications. -->
1991    <permission android:name="android.permission.INJECT_EVENTS"
1992        android:label="@string/permlab_injectEvents"
1993        android:description="@string/permdesc_injectEvents"
1994        android:protectionLevel="signature" />
1995
1996    <!-- @hide Allows an application to register an input filter which filters the stream
1997         of user events (keys, touch, trackball) before they are dispatched to any window. -->
1998    <permission android:name="android.permission.FILTER_EVENTS"
1999        android:label="@string/permlab_filter_events"
2000        android:description="@string/permdesc_filter_events"
2001        android:protectionLevel="signature" />
2002
2003    <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
2004    <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
2005        android:label="@string/permlab_retrieveWindowToken"
2006        android:description="@string/permdesc_retrieveWindowToken"
2007        android:protectionLevel="signature" />
2008
2009    <!-- @hide Allows an application to collect frame statistics -->
2010    <permission android:name="android.permission.FRAME_STATS"
2011         android:label="@string/permlab_frameStats"
2012         android:description="@string/permdesc_frameStats"
2013         android:protectionLevel="signature" />
2014
2015    <!-- @hide Allows an application to temporary enable accessibility on the device. -->
2016    <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
2017        android:label="@string/permlab_temporary_enable_accessibility"
2018        android:description="@string/permdesc_temporary_enable_accessibility"
2019        android:protectionLevel="signature" />
2020
2021    <!-- Allows an application to watch and control how activities are
2022         started globally in the system.  Only for is in debugging
2023         (usually the monkey command).
2024         <p>Not for use by third-party applications. -->
2025    <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
2026        android:label="@string/permlab_runSetActivityWatcher"
2027        android:description="@string/permdesc_runSetActivityWatcher"
2028        android:protectionLevel="signature" />
2029
2030    <!-- @SystemApi Allows an application to call the activity manager shutdown() API
2031         to put the higher-level system there into a shutdown state.
2032         @hide -->
2033    <permission android:name="android.permission.SHUTDOWN"
2034        android:label="@string/permlab_shutdown"
2035        android:description="@string/permdesc_shutdown"
2036        android:protectionLevel="signature|system" />
2037
2038    <!-- @SystemApi Allows an application to tell the activity manager to temporarily
2039         stop application switches, putting it into a special mode that
2040         prevents applications from immediately switching away from some
2041         critical UI such as the home screen.
2042         @hide -->
2043    <permission android:name="android.permission.STOP_APP_SWITCHES"
2044        android:label="@string/permlab_stopAppSwitches"
2045        android:description="@string/permdesc_stopAppSwitches"
2046        android:protectionLevel="signature|system" />
2047
2048    <!-- Allows an application to retrieve private information about
2049         the current top activity, such as any assist context it can provide.
2050         <p>Not for use by third-party applications. -->
2051    <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
2052        android:label="@string/permlab_getTopActivityInfo"
2053        android:description="@string/permdesc_getTopActivityInfo"
2054        android:protectionLevel="signature" />
2055
2056    <!-- Allows an application to retrieve the current state of keys and
2057         switches.
2058         <p>Not for use by third-party applications.
2059         @deprecated The API that used this permission has been removed. -->
2060    <permission android:name="android.permission.READ_INPUT_STATE"
2061        android:label="@string/permlab_readInputState"
2062        android:description="@string/permdesc_readInputState"
2063        android:protectionLevel="signature" />
2064
2065    <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
2066         to ensure that only the system can bind to it. -->
2067    <permission android:name="android.permission.BIND_INPUT_METHOD"
2068        android:label="@string/permlab_bindInputMethod"
2069        android:description="@string/permdesc_bindInputMethod"
2070        android:protectionLevel="signature" />
2071
2072    <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
2073         to ensure that only the system can bind to it. -->
2074    <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
2075        android:label="@string/permlab_bindAccessibilityService"
2076        android:description="@string/permdesc_bindAccessibilityService"
2077        android:protectionLevel="signature" />
2078
2079    <!-- Must be required by a {@link android.printservice.PrintService},
2080         to ensure that only the system can bind to it. -->
2081    <permission android:name="android.permission.BIND_PRINT_SERVICE"
2082        android:label="@string/permlab_bindPrintService"
2083        android:description="@string/permdesc_bindPrintService"
2084        android:protectionLevel="signature" />
2085
2086    <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
2087         or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
2088         the system can bind to it. -->
2089    <permission android:name="android.permission.BIND_NFC_SERVICE"
2090        android:label="@string/permlab_bindNfcService"
2091        android:description="@string/permdesc_bindNfcService"
2092        android:protectionLevel="signature" />
2093
2094    <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
2095         @hide -->
2096    <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
2097        android:label="@string/permlab_bindPrintSpoolerService"
2098        android:description="@string/permdesc_bindPrintSpoolerService"
2099        android:protectionLevel="signature" />
2100
2101    <!-- Must be required by a TextService (e.g. SpellCheckerService)
2102         to ensure that only the system can bind to it. -->
2103    <permission android:name="android.permission.BIND_TEXT_SERVICE"
2104        android:label="@string/permlab_bindTextService"
2105        android:description="@string/permdesc_bindTextService"
2106        android:protectionLevel="signature" />
2107
2108    <!-- Must be required by a {@link android.net.VpnService},
2109         to ensure that only the system can bind to it. -->
2110    <permission android:name="android.permission.BIND_VPN_SERVICE"
2111        android:label="@string/permlab_bindVpnService"
2112        android:description="@string/permdesc_bindVpnService"
2113        android:protectionLevel="signature" />
2114
2115    <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
2116         to ensure that only the system can bind to it. -->
2117    <permission android:name="android.permission.BIND_WALLPAPER"
2118        android:label="@string/permlab_bindWallpaper"
2119        android:description="@string/permdesc_bindWallpaper"
2120        android:protectionLevel="signature|system" />
2121
2122    <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
2123         to ensure that only the system can bind to it. -->
2124    <permission android:name="android.permission.BIND_VOICE_INTERACTION"
2125        android:label="@string/permlab_bindVoiceInteraction"
2126        android:description="@string/permdesc_bindVoiceInteraction"
2127        android:protectionLevel="signature" />
2128
2129    <!-- Must be required by hotword enrollment application,
2130         to ensure that only the system can interact with it.
2131         @hide <p>Not for use by third-party applications.</p> -->
2132    <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
2133        android:label="@string/permlab_manageVoiceKeyphrases"
2134        android:description="@string/permdesc_manageVoiceKeyphrases"
2135        android:protectionLevel="signature|system" />
2136
2137    <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
2138         to ensure that only the system can bind to it.
2139         @hide -->
2140    <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
2141        android:label="@string/permlab_bindRemoteDisplay"
2142        android:description="@string/permdesc_bindRemoteDisplay"
2143        android:protectionLevel="signature" />
2144
2145    <!-- Must be required by a {@link android.media.tv.TvInputService}
2146         to ensure that only the system can bind to it. -->
2147    <permission android:name="android.permission.BIND_TV_INPUT"
2148        android:label="@string/permlab_bindTvInput"
2149        android:description="@string/permdesc_bindTvInput"
2150        android:protectionLevel="signature|system" />
2151
2152    <!-- Must be required by a {@link android.media.routeprovider.RouteProviderService}
2153         to ensure that only the system can interact with it.
2154         @hide -->
2155    <permission android:name="android.permission.BIND_ROUTE_PROVIDER"
2156        android:label="@string/permlab_bindRouteProvider"
2157        android:description="@string/permdesc_bindRouteProvider"
2158        android:protectionLevel="signature" />
2159
2160    <!-- Must be required by device administration receiver, to ensure that only the
2161         system can interact with it. -->
2162    <permission android:name="android.permission.BIND_DEVICE_ADMIN"
2163        android:label="@string/permlab_bindDeviceAdmin"
2164        android:description="@string/permdesc_bindDeviceAdmin"
2165        android:protectionLevel="signature" />
2166
2167    <!-- @SystemApi Required to add or remove another application as a device admin.
2168         <p>Not for use by third-party applications.
2169         @hide -->
2170    <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
2171        android:label="@string/permlab_manageDeviceAdmins"
2172        android:description="@string/permdesc_manageDeviceAdmins"
2173        android:protectionLevel="signature|system" />
2174
2175    <!-- Allows low-level access to setting the orientation (actually
2176         rotation) of the screen.
2177         <p>Not for use by third-party applications. -->
2178    <permission android:name="android.permission.SET_ORIENTATION"
2179        android:label="@string/permlab_setOrientation"
2180        android:description="@string/permdesc_setOrientation"
2181        android:protectionLevel="signature" />
2182
2183    <!-- Allows low-level access to setting the pointer speed.
2184         <p>Not for use by third-party applications. -->
2185    <permission android:name="android.permission.SET_POINTER_SPEED"
2186        android:label="@string/permlab_setPointerSpeed"
2187        android:description="@string/permdesc_setPointerSpeed"
2188        android:protectionLevel="signature" />
2189
2190    <!-- Allows low-level access to setting input device calibration.
2191         <p>Not for use by normal applications.
2192         @hide -->
2193    <permission android:name="android.permission.SET_INPUT_CALIBRATION"
2194        android:label="@string/permlab_setInputCalibration"
2195        android:description="@string/permdesc_setInputCalibration"
2196        android:protectionLevel="signature" />
2197
2198    <!-- Allows low-level access to setting the keyboard layout.
2199         <p>Not for use by third-party applications.
2200         @hide -->
2201    <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
2202        android:label="@string/permlab_setKeyboardLayout"
2203        android:description="@string/permdesc_setKeyboardLayout"
2204        android:protectionLevel="signature" />
2205
2206    <!-- @SystemApi Allows an application to install packages.
2207    <p>Not for use by third-party applications. -->
2208    <permission android:name="android.permission.INSTALL_PACKAGES"
2209        android:label="@string/permlab_installPackages"
2210        android:description="@string/permdesc_installPackages"
2211        android:protectionLevel="signature|system" />
2212
2213    <!-- Allows an application to clear user data.
2214    <p>Not for use by third-party applications. -->
2215    <permission android:name="android.permission.CLEAR_APP_USER_DATA"
2216        android:label="@string/permlab_clearAppUserData"
2217        android:description="@string/permdesc_clearAppUserData"
2218        android:protectionLevel="signature" />
2219
2220    <!-- @SystemApi Allows an application to delete cache files.
2221    <p>Not for use by third-party applications. -->
2222    <permission android:name="android.permission.DELETE_CACHE_FILES"
2223        android:label="@string/permlab_deleteCacheFiles"
2224        android:description="@string/permdesc_deleteCacheFiles"
2225        android:protectionLevel="signature|system" />
2226
2227    <!-- @SystemApi Allows an application to delete packages.
2228    <p>Not for use by third-party applications. -->
2229    <permission android:name="android.permission.DELETE_PACKAGES"
2230        android:label="@string/permlab_deletePackages"
2231        android:description="@string/permdesc_deletePackages"
2232        android:protectionLevel="signature|system" />
2233
2234    <!-- @SystemApi Allows an application to move location of installed package.
2235         @hide -->
2236    <permission android:name="android.permission.MOVE_PACKAGE"
2237        android:label="@string/permlab_movePackage"
2238        android:description="@string/permdesc_movePackage"
2239        android:protectionLevel="signature|system" />
2240
2241    <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
2242         enabled or not.
2243         <p>Not for use by third-party applications. -->
2244    <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
2245        android:label="@string/permlab_changeComponentState"
2246        android:description="@string/permdesc_changeComponentState"
2247        android:protectionLevel="signature|system" />
2248
2249    <!-- @hide Allows an application to grant or revoke specific permissions. -->
2250    <permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS"
2251        android:label="@string/permlab_grantRevokePermissions"
2252        android:description="@string/permdesc_grantRevokePermissions"
2253        android:protectionLevel="signature" />
2254
2255    <!-- Allows an application to use SurfaceFlinger's low level features.
2256    <p>Not for use by third-party applications. -->
2257    <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
2258        android:label="@string/permlab_accessSurfaceFlinger"
2259        android:description="@string/permdesc_accessSurfaceFlinger"
2260        android:protectionLevel="signature" />
2261
2262    <!-- @SystemApi Allows an application to take screen shots and more generally
2263         get access to the frame buffer data.
2264         <p>Not for use by third-party applications. -->
2265    <permission android:name="android.permission.READ_FRAME_BUFFER"
2266        android:label="@string/permlab_readFrameBuffer"
2267        android:description="@string/permdesc_readFrameBuffer"
2268        android:protectionLevel="signature|system" />
2269
2270    <!-- Allows an application to use InputFlinger's low level features.
2271         @hide -->
2272    <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
2273        android:label="@string/permlab_accessInputFlinger"
2274        android:description="@string/permdesc_accessInputFlinger"
2275        android:protectionLevel="signature" />
2276
2277    <!-- Allows an application to configure and connect to Wifi displays
2278         @hide -->
2279    <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
2280        android:label="@string/permlab_configureWifiDisplay"
2281        android:description="@string/permdesc_configureWifiDisplay"
2282        android:protectionLevel="signature" />
2283
2284    <!-- Allows an application to control low-level features of Wifi displays
2285         such as opening an RTSP socket.  This permission should only be used
2286         by the display manager.
2287         @hide -->
2288    <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
2289        android:label="@string/permlab_controlWifiDisplay"
2290        android:description="@string/permdesc_controlWifiDisplay"
2291        android:protectionLevel="signature" />
2292
2293    <!-- @SystemApi Allows an application to capture audio output.
2294         <p>Not for use by third-party applications.</p> -->
2295    <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
2296        android:label="@string/permlab_captureAudioOutput"
2297        android:description="@string/permdesc_captureAudioOutput"
2298        android:protectionLevel="signature|system" />
2299
2300    <!-- @SystemApi Allows an application to capture audio for hotword detection.
2301         <p>Not for use by third-party applications.</p>
2302         @hide -->
2303    <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
2304        android:label="@string/permlab_captureAudioHotword"
2305        android:description="@string/permdesc_captureAudioHotword"
2306        android:protectionLevel="signature|system" />
2307
2308    <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
2309         <p>Not for use by third-party applications.</p>
2310         @hide -->
2311    <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
2312        android:label="@string/permlab_modifyAudioRouting"
2313        android:description="@string/permdesc_modifyAudioRouting"
2314        android:protectionLevel="signature|system" />
2315
2316    <!-- @SystemApi Allows an application to capture video output.
2317         <p>Not for use by third-party applications.</p> -->
2318    <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
2319        android:label="@string/permlab_captureVideoOutput"
2320        android:description="@string/permdesc_captureVideoOutput"
2321        android:protectionLevel="signature|system" />
2322
2323    <!-- @SystemApi Allows an application to capture secure video output.
2324         <p>Not for use by third-party applications.</p> -->
2325    <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
2326        android:label="@string/permlab_captureSecureVideoOutput"
2327        android:description="@string/permdesc_captureSecureVideoOutput"
2328        android:protectionLevel="signature|system" />
2329
2330    <!-- @SystemApi Allows an application to know what content is playing and control its playback.
2331         <p>Not for use by third-party applications due to privacy of media consumption</p>  -->
2332    <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
2333        android:label="@string/permlab_mediaContentControl"
2334        android:description="@string/permdesc_mediaContentControl"
2335        android:protectionLevel="signature|system" />
2336
2337    <!-- Required to be able to disable the device (very dangerous!).
2338    <p>Not for use by third-party applications.. -->
2339    <permission android:name="android.permission.BRICK"
2340        android:label="@string/permlab_brick"
2341        android:description="@string/permdesc_brick"
2342        android:protectionLevel="signature" />
2343
2344    <!-- @SystemApi Required to be able to reboot the device.
2345    <p>Not for use by third-party applications. -->
2346    <permission android:name="android.permission.REBOOT"
2347        android:label="@string/permlab_reboot"
2348        android:description="@string/permdesc_reboot"
2349        android:protectionLevel="signature|system" />
2350
2351   <!-- Allows low-level access to power management.
2352   <p>Not for use by third-party applications. -->
2353    <permission android:name="android.permission.DEVICE_POWER"
2354        android:label="@string/permlab_devicePower"
2355        android:description="@string/permdesc_devicePower"
2356        android:protectionLevel="signature" />
2357
2358   <!-- @hide Allows low-level access to tun tap driver -->
2359    <permission android:name="android.permission.NET_TUNNELING"
2360        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2361        android:protectionLevel="signature" />
2362
2363    <!-- Run as a manufacturer test application, running as the root user.
2364         Only available when the device is running in manufacturer test mode.
2365         <p>Not for use by third-party applications. -->
2366    <permission android:name="android.permission.FACTORY_TEST"
2367        android:label="@string/permlab_factoryTest"
2368        android:description="@string/permdesc_factoryTest"
2369        android:protectionLevel="signature" />
2370
2371    <!-- Allows an application to broadcast a notification that an application
2372         package has been removed.
2373         <p>Not for use by third-party applications. -->
2374    <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
2375        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2376        android:label="@string/permlab_broadcastPackageRemoved"
2377        android:description="@string/permdesc_broadcastPackageRemoved"
2378        android:protectionLevel="signature" />
2379
2380    <!-- Allows an application to broadcast an SMS receipt notification.
2381    <p>Not for use by third-party applications. -->
2382    <permission android:name="android.permission.BROADCAST_SMS"
2383        android:permissionGroup="android.permission-group.MESSAGES"
2384        android:label="@string/permlab_broadcastSmsReceived"
2385        android:description="@string/permdesc_broadcastSmsReceived"
2386        android:protectionLevel="signature" />
2387
2388    <!-- Allows an application to broadcast a WAP PUSH receipt notification.
2389    <p>Not for use by third-party applications. -->
2390    <permission android:name="android.permission.BROADCAST_WAP_PUSH"
2391        android:permissionGroup="android.permission-group.MESSAGES"
2392        android:label="@string/permlab_broadcastWapPush"
2393        android:description="@string/permdesc_broadcastWapPush"
2394        android:protectionLevel="signature" />
2395
2396    <!-- @SystemApi Allows an application to broadcast a SCORE_NETWORKS request.
2397         <p>Not for use by third-party applications. @hide -->
2398    <permission android:name="android.permission.BROADCAST_SCORE_NETWORKS"
2399        android:label="@string/permlab_broadcastScoreNetworks"
2400        android:description="@string/permdesc_broadcastScoreNetworks"
2401        android:protectionLevel="signature|system" />
2402
2403    <!-- @SystemApi Not for use by third-party applications. -->
2404    <permission android:name="android.permission.MASTER_CLEAR"
2405        android:label="@string/permlab_masterClear"
2406        android:description="@string/permdesc_masterClear"
2407        android:protectionLevel="signature|system" />
2408
2409    <!-- @SystemApi Allows an application to call any phone number, including emergency
2410         numbers, without going through the Dialer user interface for the user
2411         to confirm the call being placed.
2412         <p>Not for use by third-party applications. -->
2413    <permission android:name="android.permission.CALL_PRIVILEGED"
2414        android:label="@string/permlab_callPrivileged"
2415        android:description="@string/permdesc_callPrivileged"
2416        android:protectionLevel="signature|system" />
2417
2418    <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
2419    <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
2420        android:label="@string/permlab_performCdmaProvisioning"
2421        android:description="@string/permdesc_performCdmaProvisioning"
2422        android:protectionLevel="signature|system" />
2423
2424    <!-- @SystemApi Allows enabling/disabling location update notifications from
2425         the radio.
2426         <p>Not for use by third-party applications. -->
2427    <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
2428        android:label="@string/permlab_locationUpdates"
2429        android:description="@string/permdesc_locationUpdates"
2430        android:protectionLevel="signature|system" />
2431
2432    <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
2433         database, to change values that get uploaded.
2434         <p>Not for use by third-party applications. -->
2435    <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
2436        android:label="@string/permlab_checkinProperties"
2437        android:description="@string/permdesc_checkinProperties"
2438        android:protectionLevel="signature|system" />
2439
2440    <!-- @SystemApi Allows an application to collect component usage
2441         statistics @hide -->
2442    <permission android:name="android.permission.PACKAGE_USAGE_STATS"
2443        android:label="@string/permlab_pkgUsageStats"
2444        android:description="@string/permdesc_pkgUsageStats"
2445        android:protectionLevel="signature|system" />
2446
2447    <!-- @SystemApi Allows an application to collect battery statistics -->
2448    <permission android:name="android.permission.BATTERY_STATS"
2449        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2450        android:label="@string/permlab_batteryStats"
2451        android:description="@string/permdesc_batteryStats"
2452        android:protectionLevel="signature|system" />
2453
2454    <!-- @SystemApi Allows an application to control the backup and restore process.
2455    <p>Not for use by third-party applications.
2456         @hide pending API council -->
2457    <permission android:name="android.permission.BACKUP"
2458        android:label="@string/permlab_backup"
2459        android:description="@string/permdesc_backup"
2460        android:protectionLevel="signature|system" />
2461
2462    <!-- Allows a package to launch the secure full-backup confirmation UI.
2463         ONLY the system process may hold this permission.
2464         @hide -->
2465    <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
2466        android:label="@string/permlab_confirm_full_backup"
2467        android:description="@string/permdesc_confirm_full_backup"
2468        android:protectionLevel="signature" />
2469
2470    <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
2471         to ensure that only the system can bind to it. -->
2472    <permission android:name="android.permission.BIND_REMOTEVIEWS"
2473        android:label="@string/permlab_bindRemoteViews"
2474        android:description="@string/permdesc_bindRemoteViews"
2475        android:protectionLevel="signature|system" />
2476
2477    <!-- @SystemApi Allows an application to tell the AppWidget service which application
2478         can access AppWidget's data.  The normal user flow is that a user
2479         picks an AppWidget to go into a particular host, thereby giving that
2480         host application access to the private data from the AppWidget app.
2481         An application that has this permission should honor that contract.
2482         <p>Not for use by third-party applications. -->
2483    <permission android:name="android.permission.BIND_APPWIDGET"
2484        android:permissionGroup="android.permission-group.PERSONAL_INFO"
2485        android:label="@string/permlab_bindGadget"
2486        android:description="@string/permdesc_bindGadget"
2487        android:protectionLevel="signature|system" />
2488
2489    <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
2490         keyguard widget
2491         @hide -->
2492    <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
2493        android:permissionGroup="android.permission-group.PERSONAL_INFO"
2494        android:protectionLevel="signature|system" />
2495
2496    <!-- @SystemApi Internal permission allowing an application to query/set which
2497         applications can bind AppWidgets.
2498         @hide -->
2499    <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
2500        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2501        android:protectionLevel="signature|system" />
2502
2503    <!-- Allows applications to change the background data setting.
2504    <p>Not for use by third-party applications.
2505         @hide pending API council -->
2506    <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
2507        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2508        android:protectionLevel="signature"
2509        android:description="@string/permdesc_changeBackgroundDataSetting"
2510        android:label="@string/permlab_changeBackgroundDataSetting" />
2511
2512    <!-- @SystemApi This permission can be used on content providers to allow the global
2513         search system to access their data.  Typically it used when the
2514         provider has some permissions protecting it (which global search
2515         would not be expected to hold), and added as a read-only permission
2516         to the path in the provider where global search queries are
2517         performed.  This permission can not be held by regular applications;
2518         it is used by applications to protect themselves from everyone else
2519         besides global search. -->
2520    <permission android:name="android.permission.GLOBAL_SEARCH"
2521        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2522        android:protectionLevel="signature|system" />
2523
2524    <!-- Internal permission protecting access to the global search
2525         system: ensures that only the system can access the provider
2526         to perform queries (since this otherwise provides unrestricted
2527         access to a variety of content providers), and to write the
2528         search statistics (to keep applications from gaming the source
2529         ranking).
2530         @hide -->
2531    <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
2532        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2533        android:protectionLevel="signature" />
2534
2535    <!-- @SystemApi Internal permission to allows an application to read indexable data.
2536        @hide -->
2537    <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
2538        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2539        android:protectionLevel="signature|system" />
2540
2541    <!-- @SystemApi Allows applications to set a live wallpaper.
2542         @hide XXX Change to signature once the picker is moved to its
2543         own apk as Ghod Intended. -->
2544    <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
2545        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2546        android:protectionLevel="signature|system" />
2547
2548    <!-- @SystemApi Allows applications to read dream settings and dream state.
2549         @hide -->
2550    <permission android:name="android.permission.READ_DREAM_STATE"
2551        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2552        android:protectionLevel="signature|system" />
2553
2554    <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
2555         @hide -->
2556    <permission android:name="android.permission.WRITE_DREAM_STATE"
2557        android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2558        android:protectionLevel="signature|system" />
2559
2560    <!-- @SystemApi Allow an application to read and write the cache partition.
2561         @hide -->
2562    <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
2563        android:label="@string/permlab_cache_filesystem"
2564        android:description="@string/permdesc_cache_filesystem"
2565        android:protectionLevel="signature|system" />
2566
2567    <!-- Must be required by default container service so that only
2568         the system can bind to it and use it to copy
2569         protected data to secure containers or files
2570         accessible to the system.
2571         @hide -->
2572    <permission android:name="android.permission.COPY_PROTECTED_DATA"
2573        android:label="@string/permlab_copyProtectedData"
2574        android:description="@string/permlab_copyProtectedData"
2575        android:protectionLevel="signature" />
2576
2577    <!-- @SystemApi Internal permission protecting access to the encryption methods
2578        @hide
2579    -->
2580    <permission android:name="android.permission.CRYPT_KEEPER"
2581        android:protectionLevel="signature|system" />
2582
2583    <!-- @SystemApi Allows an application to read historical network usage for
2584         specific networks and applications. @hide -->
2585    <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
2586        android:label="@string/permlab_readNetworkUsageHistory"
2587        android:description="@string/permdesc_readNetworkUsageHistory"
2588        android:protectionLevel="signature|system" />
2589
2590    <!-- Allows an application to manage network policies (such as warning and disable
2591         limits) and to define application-specific rules. @hide -->
2592    <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
2593        android:label="@string/permlab_manageNetworkPolicy"
2594        android:description="@string/permdesc_manageNetworkPolicy"
2595        android:protectionLevel="signature" />
2596
2597    <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used
2598         by system services like download manager and media server. Not for use by
2599         third party apps. @hide -->
2600    <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
2601        android:label="@string/permlab_modifyNetworkAccounting"
2602        android:description="@string/permdesc_modifyNetworkAccounting"
2603        android:protectionLevel="signature|system" />
2604
2605    <!-- @SystemApi Allows an application to mark traffic as from another user for per user routing.
2606         Used by system wide services like media server that execute delegated network connections
2607         for users.
2608         @hide
2609    -->
2610    <permission android:name="android.permission.MARK_NETWORK_SOCKET"
2611        android:label="@string/permlab_markNetworkSocket"
2612        android:description="@string/permdesc_markNetworkSocket"
2613        android:protectionLevel="signature|system" />
2614
2615    <!-- C2DM permission.
2616         @hide Used internally.
2617     -->
2618    <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
2619          android:protectionLevel="signature" />
2620    <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
2621
2622    <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
2623         trust it to verify packages.
2624    -->
2625    <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
2626        android:label="@string/permlab_packageVerificationAgent"
2627        android:description="@string/permdesc_packageVerificationAgent"
2628        android:protectionLevel="signature|system" />
2629
2630    <!-- Must be required by package verifier receiver, to ensure that only the
2631         system can interact with it.
2632         @hide
2633    -->
2634    <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
2635        android:label="@string/permlab_bindPackageVerifier"
2636        android:description="@string/permdesc_bindPackageVerifier"
2637        android:protectionLevel="signature" />
2638
2639    <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
2640         @hide -->
2641    <permission android:name="android.permission.SERIAL_PORT"
2642        android:label="@string/permlab_serialPort"
2643        android:description="@string/permdesc_serialPort"
2644        android:protectionLevel="signature|system" />
2645
2646    <!-- Allows the holder to access content providers from outside an ApplicationThread.
2647         This permission is enforced by the ActivityManagerService on the corresponding APIs,
2648         in particular ActivityManagerService#getContentProviderExternal(String) and
2649         ActivityManagerService#removeContentProviderExternal(String).
2650         @hide
2651    -->
2652    <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
2653        android:label="@string/permlab_accessContentProvidersExternally"
2654        android:description="@string/permdesc_accessContentProvidersExternally"
2655        android:protectionLevel="signature" />
2656
2657    <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
2658         OTA reboot *not* occur while the lock is held.
2659         @hide -->
2660    <permission android:name="android.permission.UPDATE_LOCK"
2661        android:label="@string/permlab_updateLock"
2662        android:description="@string/permdesc_updateLock"
2663        android:protectionLevel="signatureOrSystem" />
2664
2665    <!-- @SystemApi Allows an application to read the current set of notifications, including
2666         any metadata and intents attached.
2667         @hide -->
2668    <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
2669        android:label="@string/permlab_accessNotifications"
2670        android:description="@string/permdesc_accessNotifications"
2671        android:protectionLevel="signature|system" />
2672
2673    <!-- Allows access to keyguard secure storage.  Only allowed for system processes.
2674        @hide -->
2675    <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
2676        android:protectionLevel="signature"
2677        android:label="@string/permlab_access_keyguard_secure_storage"
2678        android:description="@string/permdesc_access_keyguard_secure_storage" />
2679
2680    <!-- Allows an application to control keyguard.  Only allowed for system processes.
2681        @hide -->
2682    <permission android:name="android.permission.CONTROL_KEYGUARD"
2683        android:protectionLevel="signature"
2684        android:label="@string/permlab_control_keyguard"
2685        android:description="@string/permdesc_control_keyguard" />
2686
2687    <!-- Allows an application to listen to trust changes.  Only allowed for system processes.
2688        @hide -->
2689    <permission android:name="android.permission.TRUST_LISTENER"
2690                android:protectionLevel="signature"
2691                android:label="@string/permlab_trust_listener"
2692                android:description="@string/permdesc_trust_listener" />
2693
2694    <!-- @SystemApi Allows an application to provide a trust agent.
2695         @hide For security reasons, this is a platform-only permission. -->
2696    <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
2697                android:protectionLevel="signatureOrSystem"
2698                android:label="@string/permlab_provide_trust_agent"
2699                android:description="@string/permdesc_provide_trust_agent" />
2700
2701    <!-- Allows an application to launch the trust agent settings activity.
2702        @hide -->
2703    <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
2704        android:protectionLevel="signatureOrSystem"
2705        android:label="@string/permlab_launch_trust_agent_settings"
2706        android:description="@string/permdesc_launch_trust_agent_settings" />
2707
2708    <!-- Must be required by an {@link
2709         android.service.trust.TrustAgentService},
2710         to ensure that only the system can bind to it. -->
2711    <permission android:name="android.permission.BIND_TRUST_AGENT"
2712                android:protectionLevel="signature"
2713                android:label="@string/permlab_bind_trust_agent_service"
2714                android:description="@string/permdesc_bind_trust_agent_service" />
2715
2716    <!-- Must be required by an {@link
2717         android.service.notification.NotificationListenerService},
2718         to ensure that only the system can bind to it. -->
2719    <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
2720        android:label="@string/permlab_bindNotificationListenerService"
2721        android:description="@string/permdesc_bindNotificationListenerService"
2722        android:protectionLevel="signature" />
2723
2724    <!-- Must be required by an {@link
2725         android.service.notification.ConditionProviderService},
2726         to ensure that only the system can bind to it.
2727         @hide -->
2728    <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
2729        android:label="@string/permlab_bindConditionProviderService"
2730        android:description="@string/permdesc_bindConditionProviderService"
2731        android:protectionLevel="signature" />
2732
2733    <!-- Must be required by an {@link android.service.dreams.DreamService},
2734         to ensure that only the system can bind to it. -->
2735    <permission android:name="android.permission.BIND_DREAM_SERVICE"
2736        android:label="@string/permlab_bindDreamService"
2737        android:description="@string/permdesc_bindDreamService"
2738        android:protectionLevel="signature" />
2739
2740    <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
2741         carrier setup application to enforce that this permission is required
2742         @hide This is not a third-party API (intended for OEMs and system apps). -->
2743    <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
2744        android:label="@string/permlab_invokeCarrierSetup"
2745        android:description="@string/permdesc_invokeCarrierSetup"
2746        android:protectionLevel="signature|system" />
2747
2748    <!-- @SystemApi Allows an application to listen for network condition observations.
2749         @hide This is not a third-party API (intended for system apps). -->
2750    <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
2751        android:label="@string/permlab_accessNetworkConditions"
2752        android:description="@string/permdesc_accessNetworkConditions"
2753        android:protectionLevel="signature|system" />
2754
2755    <!-- @SystemApi Allows an application to provision and access DRM certificates
2756         @hide This is not a third-party API (intended for system apps). -->
2757    <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
2758        android:label="@string/permlab_accessDrmCertificates"
2759        android:description="@string/permdesc_accessDrmCertificates"
2760        android:protectionLevel="signature|system" />
2761
2762    <!-- The system process is explicitly the only one allowed to launch the
2763         confirmation UI for full backup/restore -->
2764    <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
2765
2766    <application android:process="system"
2767                 android:persistent="true"
2768                 android:hasCode="false"
2769                 android:label="@string/android_system_label"
2770                 android:allowClearUserData="false"
2771                 android:backupAgent="com.android.server.backup.SystemBackupAgent"
2772                 android:killAfterRestore="false"
2773                 android:icon="@drawable/ic_launcher_android"
2774                 android:supportsRtl="true">
2775        <activity android:name="com.android.internal.app.ChooserActivity"
2776                android:theme="@style/Theme.Holo.Dialog.Alert"
2777                android:finishOnCloseSystemDialogs="true"
2778                android:excludeFromRecents="true"
2779                android:multiprocess="true"
2780                android:documentLaunchMode="never"
2781                android:relinquishTaskIdentity="true">
2782            <intent-filter>
2783                <action android:name="android.intent.action.CHOOSER" />
2784                <category android:name="android.intent.category.DEFAULT" />
2785            </intent-filter>
2786        </activity>
2787        <activity android:name="com.android.internal.app.IntentForwarderActivity"
2788                android:finishOnCloseSystemDialogs="true"
2789                android:theme="@style/Theme.NoDisplay"
2790                android:excludeFromRecents="true"
2791                android:label="@string/user_owner_label"
2792                android:exported="true"
2793                >
2794        </activity>
2795        <activity-alias android:name="com.android.internal.app.ForwardIntentToUserOwner"
2796                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2797                android:icon="@drawable/personal_icon"
2798                android:exported="true"
2799                android:label="@string/user_owner_label">
2800        </activity-alias>
2801        <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
2802                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2803                android:icon="@drawable/ic_afw_icon"
2804                android:exported="true"
2805                android:label="@string/managed_profile_label">
2806        </activity-alias>
2807        <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
2808                android:theme="@style/Theme.Holo.Dialog"
2809                android:label="@string/heavy_weight_switcher_title"
2810                android:finishOnCloseSystemDialogs="true"
2811                android:excludeFromRecents="true"
2812                android:process=":ui">
2813        </activity>
2814        <activity android:name="com.android.internal.app.PlatLogoActivity"
2815                android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
2816                android:process=":ui">
2817        </activity>
2818        <activity android:name="com.android.internal.app.DisableCarModeActivity"
2819                android:theme="@style/Theme.NoDisplay"
2820                android:excludeFromRecents="true"
2821                android:process=":ui">
2822        </activity>
2823
2824        <activity android:name="android.accounts.ChooseAccountActivity"
2825                android:excludeFromRecents="true"
2826                android:exported="true"
2827                android:theme="@android:style/Theme.Holo.Dialog"
2828                android:label="@string/choose_account_label"
2829                android:process=":ui">
2830        </activity>
2831
2832        <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
2833                android:excludeFromRecents="true"
2834                android:exported="true"
2835                android:theme="@android:style/Theme.Holo.Dialog"
2836                android:label="@string/choose_account_label"
2837                android:process=":ui">
2838        </activity>
2839
2840        <activity android:name="android.accounts.ChooseAccountTypeActivity"
2841                android:excludeFromRecents="true"
2842                android:theme="@android:style/Theme.Holo.Dialog"
2843                android:label="@string/choose_account_label"
2844                android:process=":ui">
2845        </activity>
2846
2847        <activity android:name="android.accounts.CantAddAccountActivity"
2848                android:excludeFromRecents="true"
2849                android:exported="true"
2850                android:theme="@android:style/Theme.Holo.Dialog.NoActionBar"
2851                android:process=":ui">
2852        </activity>
2853
2854        <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
2855                android:excludeFromRecents="true"
2856                android:exported="true"
2857                android:theme="@android:style/Theme.Holo.DialogWhenLarge"
2858                android:process=":ui">
2859        </activity>
2860
2861        <activity android:name="android.content.SyncActivityTooManyDeletes"
2862               android:theme="@android:style/Theme.Holo.Dialog"
2863               android:label="@string/sync_too_many_deletes"
2864               android:process=":ui">
2865        </activity>
2866
2867        <activity android:name="com.android.server.ShutdownActivity"
2868            android:permission="android.permission.SHUTDOWN"
2869            android:excludeFromRecents="true">
2870            <intent-filter>
2871                <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" />
2872                <category android:name="android.intent.category.DEFAULT" />
2873            </intent-filter>
2874            <intent-filter>
2875                <action android:name="android.intent.action.REBOOT" />
2876                <category android:name="android.intent.category.DEFAULT" />
2877            </intent-filter>
2878        </activity>
2879
2880        <activity android:name="com.android.internal.app.NetInitiatedActivity"
2881                android:theme="@style/Theme.Holo.Dialog.Alert"
2882                android:excludeFromRecents="true"
2883                android:process=":ui">
2884        </activity>
2885
2886        <activity android:name="com.android.internal.app.RestrictionsPinActivity"
2887                android:theme="@style/Theme.Material.Light.Dialog.Alert"
2888                android:excludeFromRecents="true"
2889                android:windowSoftInputMode="adjustPan"
2890                android:process=":ui">
2891            <intent-filter android:priority="100">
2892                <action android:name="android.intent.action.RESTRICTIONS_CHALLENGE" />
2893                <category android:name="android.intent.category.DEFAULT" />
2894            </intent-filter>
2895        </activity>
2896
2897        <receiver android:name="com.android.server.BootReceiver"
2898                android:primaryUserOnly="true">
2899            <intent-filter android:priority="1000">
2900                <action android:name="android.intent.action.BOOT_COMPLETED" />
2901            </intent-filter>
2902        </receiver>
2903
2904        <receiver android:name="com.android.server.updates.CertPinInstallReceiver" >
2905            <intent-filter>
2906                <action android:name="android.intent.action.UPDATE_PINS" />
2907            </intent-filter>
2908        </receiver>
2909
2910        <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" >
2911            <intent-filter>
2912                <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
2913            </intent-filter>
2914        </receiver>
2915
2916        <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" >
2917            <intent-filter>
2918                <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
2919            </intent-filter>
2920        </receiver>
2921
2922        <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" >
2923            <intent-filter>
2924                <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
2925            </intent-filter>
2926        </receiver>
2927
2928        <receiver android:name="com.android.server.updates.TZInfoInstallReceiver" >
2929            <intent-filter>
2930                <action android:name="android.intent.action.UPDATE_TZINFO" />
2931            </intent-filter>
2932        </receiver>
2933
2934        <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" >
2935            <intent-filter>
2936                <action android:name="android.intent.action.UPDATE_SEPOLICY" />
2937            </intent-filter>
2938        </receiver>
2939
2940        <receiver android:name="com.android.server.MasterClearReceiver"
2941            android:permission="android.permission.MASTER_CLEAR">
2942            <intent-filter
2943                    android:priority="100" >
2944                <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR -->
2945                <action android:name="android.intent.action.MASTER_CLEAR" />
2946
2947                <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
2948                <action android:name="com.google.android.c2dm.intent.RECEIVE" />
2949                <category android:name="android.intent.category.MASTER_CLEAR" />
2950            </intent-filter>
2951        </receiver>
2952
2953        <service android:name="com.android.internal.os.storage.ExternalStorageFormatter"
2954            android:permission="android.permission.MASTER_CLEAR"
2955            android:exported="true" />
2956
2957        <service android:name="android.hardware.location.GeofenceHardwareService"
2958            android:permission="android.permission.LOCATION_HARDWARE"
2959            android:exported="false" />
2960
2961        <service android:name="com.android.internal.backup.LocalTransportService"
2962                android:permission="android.permission.CONFIRM_FULL_BACKUP"
2963                android:exported="false">
2964            <intent-filter>
2965                <action android:name="android.backup.TRANSPORT_HOST" />
2966            </intent-filter>
2967        </service>
2968
2969        <service android:name="com.android.server.MountServiceIdler"
2970                 android:exported="true"
2971                 android:permission="android.permission.BIND_JOB_SERVICE" >
2972        </service>
2973
2974        <service
2975            android:name="com.android.server.pm.BackgroundDexOptService"
2976            android:exported="true"
2977            android:permission="android.permission.BIND_JOB_SERVICE">
2978        </service>
2979
2980    </application>
2981
2982</manifest>
2983