AndroidManifest.xml revision 97e2f7d5afebb107a8c2c65a094ae4426bbe701b
1<?xml version="1.0" encoding="utf-8"?>
2<!--
3/* //device/apps/common/AndroidManifest.xml
4**
5** Copyright 2006, The Android Open Source Project
6**
7** Licensed under the Apache License, Version 2.0 (the "License");
8** you may not use this file except in compliance with the License.
9** You may obtain a copy of the License at
10**
11**     http://www.apache.org/licenses/LICENSE-2.0
12**
13** Unless required by applicable law or agreed to in writing, software
14** distributed under the License is distributed on an "AS IS" BASIS,
15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16** See the License for the specific language governing permissions and
17** limitations under the License.
18*/
19-->
20<manifest xmlns:android="http://schemas.android.com/apk/res/android"
21    package="android" coreApp="true" android:sharedUserId="android.uid.system"
22    android:sharedUserLabel="@string/android_system_label">
23
24    <!-- ================================================ -->
25    <!-- Special broadcasts that only the system can send -->
26    <!-- ================================================ -->
27    <eat-comment />
28
29    <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
30    <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
31    <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
32    <protected-broadcast android:name="android.intent.action.TIME_SET" />
33    <protected-broadcast android:name="android.intent.action.TIME_TICK" />
34    <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
35    <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
36    <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
37    <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
38    <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
39    <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
40    <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
41    <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
42    <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
43    <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
44    <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
45    <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
46    <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
47    <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
48    <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
49    <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
50    <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
51    <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
52    <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
53    <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
54    <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
55    <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
56    <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
57    <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
58    <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
59    <protected-broadcast android:name="android.intent.action.CHARGING" />
60    <protected-broadcast android:name="android.intent.action.DISCHARGING" />
61    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
62    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
63    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
64    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
65    <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
66    <protected-broadcast android:name="android.intent.action.REBOOT" />
67    <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
68    <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
69    <protected-broadcast android:name="android.intent.action.USER_ADDED" />
70    <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
71    <protected-broadcast android:name="android.intent.action.USER_STARTING" />
72    <protected-broadcast android:name="android.intent.action.USER_STARTED" />
73    <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
74    <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
75    <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
76    <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
77    <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
78    <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" />
79
80    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
81    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" />
82
83    <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" />
84
85    <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
86    <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
87    <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
88    <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
89    <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" />
90    <protected-broadcast android:name="android.app.action.SEND_DEVICE_INITIALIZER_STATUS" />
91
92    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
93    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
94    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
95    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
96    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
97    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
98
99    <protected-broadcast android:name="android.os.action.SETTING_RESTORED" />
100
101    <protected-broadcast android:name="android.backup.intent.RUN" />
102    <protected-broadcast android:name="android.backup.intent.CLEAR" />
103    <protected-broadcast android:name="android.backup.intent.INIT" />
104
105    <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
106    <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
107    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
108    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
109    <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
110    <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
111    <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
112    <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
113    <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
114    <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
115    <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
116    <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
117    <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
118    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
119    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
120    <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
121    <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
122    <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
123    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
124    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
125    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
126    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
127    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
128    <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
129    <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
130    <protected-broadcast
131        android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
132    <protected-broadcast
133        android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
134    <protected-broadcast
135        android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
136    <protected-broadcast
137        android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
138    <protected-broadcast
139        android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
140    <protected-broadcast
141        android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
142    <protected-broadcast
143        android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
144    <protected-broadcast
145        android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
146    <protected-broadcast
147        android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
148    <protected-broadcast
149        android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
150    <protected-broadcast
151        android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
152    <protected-broadcast
153        android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
154    <protected-broadcast
155        android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
156    <protected-broadcast
157        android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
158   <protected-broadcast
159        android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
160    <protected-broadcast
161        android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
162    <protected-broadcast
163        android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
164    <protected-broadcast
165        android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
166    <protected-broadcast
167        android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
168    <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" />
169    <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
170    <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
171    <protected-broadcast android:name="android.btopp.intent.action.LIST" />
172    <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
173    <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
174    <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
175    <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
176    <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
177    <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
178    <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
179    <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
180    <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
181    <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
182    <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
183
184    <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
185
186    <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
187    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
188    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
189    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
190    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
191
192    <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
193    <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" />
194
195    <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
196    <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
197    <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
198    <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
199    <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
200    <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
201    <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
202    <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
203
204    <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
205    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
206    <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
207    <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
208    <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
209    <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
210    <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
211    <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
212    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
213    <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
214
215    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
216    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
217    <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
218    <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
219    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
220
221    <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
222
223    <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" />
224    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
225    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
226    <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
227
228    <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
229    <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
230    <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
231
232    <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
233
234    <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
235    <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
236    <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
237    <protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" />
238
239    <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
240    <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
241    <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
242    <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
243    <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" />
244    <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
245    <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
246    <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
247    <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
248    <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
249    <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
250    <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
251    <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
252    <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
253    <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
254    <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
255    <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
256    <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
257    <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
258    <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
259    <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
260    <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
261    <protected-broadcast
262            android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
263    <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
264    <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
265    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
266    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
267    <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
268    <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
269    <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
270    <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" />
271
272    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
273    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
274
275    <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
276
277    <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
278
279    <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" />
280
281    <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
282    <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
283    <protected-broadcast android:name="android.location.MODE_CHANGED" />
284    <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
285    <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
286
287    <protected-broadcast
288        android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
289
290    <!-- Defined in RestrictionsManager -->
291    <protected-broadcast
292        android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
293    <!-- Defined in RestrictionsManager -->
294
295    <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
296    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
297    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
298    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
299    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
300
301    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SUBSCRIPTION_CHANGED" />
302    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED" />
303    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" />
304    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" />
305    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" />
306    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" />
307
308    <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" />
309    <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" />
310
311    <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" />
312    <protected-broadcast android:name="android.service.persistentdata.action.WIPE_IF_ALLOWED" />
313
314    <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" />
315    <!-- ====================================================================== -->
316    <!--                          RUNTIME PERMISSIONS                           -->
317    <!-- ====================================================================== -->
318    <eat-comment />
319
320    <!-- ====================================================================== -->
321    <!-- Permissions for accessing user's contacts including personal profile   -->
322    <!-- ====================================================================== -->
323    <eat-comment />
324
325    <!-- Used for runtime permissions related to user's contacts and profile. -->
326    <permission-group android:name="android.permission-group.CONTACTS"
327        android:icon="@drawable/perm_group_social_info"
328        android:label="@string/permgrouplab_contacts"
329        android:description="@string/permgroupdesc_contacts"
330        android:priority="100" />
331
332    <!-- Allows an application to read the user's contacts data. -->
333    <permission android:name="android.permission.READ_CONTACTS"
334        android:permissionGroup="android.permission-group.CONTACTS"
335        android:label="@string/permlab_readContacts"
336        android:description="@string/permdesc_readContacts"
337        android:protectionLevel="dangerous" />
338
339    <!-- Allows an application to write the user's contacts data. -->
340    <permission android:name="android.permission.WRITE_CONTACTS"
341        android:permissionGroup="android.permission-group.CONTACTS"
342        android:label="@string/permlab_writeContacts"
343        android:description="@string/permdesc_writeContacts"
344        android:protectionLevel="dangerous" />
345
346    <!-- Allows an application to read the user's personal profile data. -->
347    <permission android:name="android.permission.READ_PROFILE"
348        android:permissionGroup="android.permission-group.CONTACTS"
349        android:label="@string/permlab_readProfile"
350        android:description="@string/permdesc_readProfile"
351        android:protectionLevel="dangerous" />
352
353    <!-- Allows an application to write the user's personal profile data. -->
354    <permission android:name="android.permission.WRITE_PROFILE"
355        android:permissionGroup="android.permission-group.CONTACTS"
356        android:label="@string/permlab_writeProfile"
357        android:description="@string/permdesc_writeProfile"
358        android:protectionLevel="dangerous" />
359
360    <!-- ====================================================================== -->
361    <!-- Permissions for accessing user's calendar                              -->
362    <!-- ====================================================================== -->
363    <eat-comment />
364
365    <!-- Used for runtime permissions related to user's calendar. -->
366    <permission-group android:name="android.permission-group.CALENDAR"
367        android:icon="@drawable/perm_group_calendar"
368        android:label="@string/permgrouplab_calendar"
369        android:description="@string/permgroupdesc_calendar"
370        android:priority="200" />
371
372    <!-- Allows an application to read the user's calendar data. -->
373    <permission android:name="android.permission.READ_CALENDAR"
374        android:permissionGroup="android.permission-group.CALENDAR"
375        android:label="@string/permlab_readCalendar"
376        android:description="@string/permdesc_readCalendar"
377        android:protectionLevel="dangerous" />
378
379    <!-- Allows an application to write the user's calendar data. -->
380    <permission android:name="android.permission.WRITE_CALENDAR"
381        android:permissionGroup="android.permission-group.CALENDAR"
382        android:label="@string/permlab_writeCalendar"
383        android:description="@string/permdesc_writeCalendar"
384        android:protectionLevel="dangerous" />
385
386    <!-- ====================================================================== -->
387    <!-- Permissions for accessing and modifying user's SMS messages            -->
388    <!-- ====================================================================== -->
389    <eat-comment />
390
391    <!-- Used for runtime permissions related to user's SMS messages. -->
392    <permission-group android:name="android.permission-group.SMS"
393        android:icon="@drawable/perm_group_messages"
394        android:label="@string/permgrouplab_sms"
395        android:description="@string/permgroupdesc_sms"
396        android:priority="300" />
397
398    <!-- Allows an application to send SMS messages. -->
399    <permission android:name="android.permission.SEND_SMS"
400        android:permissionGroup="android.permission-group.SMS"
401        android:label="@string/permlab_sendSms"
402        android:description="@string/permdesc_sendSms"
403        android:permissionFlags="costsMoney"
404        android:protectionLevel="dangerous" />
405
406    <!-- Allows an application to receive SMS messages. -->
407    <permission android:name="android.permission.RECEIVE_SMS"
408        android:permissionGroup="android.permission-group.SMS"
409        android:label="@string/permlab_receiveSms"
410        android:description="@string/permdesc_receiveSms"
411        android:protectionLevel="dangerous"/>
412
413    <!-- Allows an application to read SMS messages. -->
414    <permission android:name="android.permission.READ_SMS"
415        android:permissionGroup="android.permission-group.SMS"
416        android:label="@string/permlab_readSms"
417        android:description="@string/permdesc_readSms"
418        android:protectionLevel="dangerous" />
419
420    <!-- Allows an application to receive WAP push messages. -->
421    <permission android:name="android.permission.RECEIVE_WAP_PUSH"
422        android:permissionGroup="android.permission-group.SMS"
423        android:label="@string/permlab_receiveWapPush"
424        android:description="@string/permdesc_receiveWapPush"
425        android:protectionLevel="dangerous" />
426
427    <!-- Allows an application to monitor incoming MMS messages. -->
428    <permission android:name="android.permission.RECEIVE_MMS"
429        android:permissionGroup="android.permission-group.SMS"
430        android:label="@string/permlab_receiveMms"
431        android:description="@string/permdesc_receiveMms"
432        android:protectionLevel="dangerous" />
433
434    <!-- Allows an application to read previously received cell broadcast
435         messages and to register a content observer to get notifications when
436         a cell broadcast has been received and added to the database. For
437         emergency alerts, the database is updated immediately after the
438         alert dialog and notification sound/vibration/speech are presented.
439         The "read" column is then updated after the user dismisses the alert.
440         This enables supplementary emergency assistance apps to start loading
441         additional emergency information (if Internet access is available)
442         when the alert is first received, and to delay presenting the info
443         to the user until after the initial alert dialog is dismissed.
444         @hide Pending API council approval -->
445    <permission android:name="android.permission.READ_CELL_BROADCASTS"
446        android:permissionGroup="android.permission-group.SMS"
447        android:label="@string/permlab_readCellBroadcasts"
448        android:description="@string/permdesc_readCellBroadcasts"
449        android:protectionLevel="dangerous" />
450
451    <!-- =============================================================== -->
452    <!-- Permissions for accessing social info                           -->
453    <!-- =============================================================== -->
454    <eat-comment />
455
456    <!-- Used for permissions that provide access to the user's social connections,
457         such as contacts, call logs, social stream, etc.  This includes
458         both reading and writing of this data (which should generally be
459         expressed as two distinct permissions). -->
460
461    <permission-group android:name="android.permission-group.SOCIAL_INFO"
462        android:label="@string/permgrouplab_socialInfo"
463        android:icon="@drawable/perm_group_social_info"
464        android:description="@string/permgroupdesc_socialInfo"
465        android:permissionGroupFlags="personalInfo"
466        android:priority="1200" />
467
468    <!-- Allows an application to read from the user's social stream.
469         @deprecated This functionality will be unsupported in the future; cursors returned
470         will be empty. Please do not use. -->
471    <permission android:name="android.permission.READ_SOCIAL_STREAM"
472        android:permissionGroup="android.permission-group.SOCIAL_INFO"
473        android:protectionLevel="dangerous"
474        android:label="@string/permlab_readSocialStream"
475        android:description="@string/permdesc_readSocialStream" />
476
477    <!-- Allows an application to write (but not read) the user's
478         social stream data.
479         @deprecated This functionality will be unsupported in the future; cursors returned
480         will be empty. Please do not use. -->
481    <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
482        android:permissionGroup="android.permission-group.SOCIAL_INFO"
483        android:protectionLevel="dangerous"
484        android:label="@string/permlab_writeSocialStream"
485        android:description="@string/permdesc_writeSocialStream" />
486
487    <!-- ====================================================================== -->
488    <!-- Permissions for accessing the device location                          -->
489    <!-- ====================================================================== -->
490    <eat-comment />
491
492    <!-- Used for permissions that allow accessing the device location. -->
493    <permission-group android:name="android.permission-group.LOCATION"
494        android:icon="@drawable/perm_group_location"
495        android:label="@string/permgrouplab_location"
496        android:description="@string/permgroupdesc_location"
497        android:priority="400" />
498
499    <!-- Allows an app to access precise location. -->
500    <permission android:name="android.permission.ACCESS_FINE_LOCATION"
501        android:permissionGroup="android.permission-group.LOCATION"
502        android:label="@string/permlab_accessFineLocation"
503        android:description="@string/permdesc_accessFineLocation"
504        android:protectionLevel="dangerous" />
505
506    <!-- Allows an app to access approximate location. -->
507    <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
508        android:permissionGroup="android.permission-group.LOCATION"
509        android:label="@string/permlab_accessCoarseLocation"
510        android:description="@string/permdesc_accessCoarseLocation"
511        android:protectionLevel="dangerous" />
512
513    <!-- ====================================================================== -->
514    <!-- Permissions for accessing the device telephony                         -->
515    <!-- ====================================================================== -->
516    <eat-comment />
517
518    <!-- Used for permissions that are associated telephony features. -->
519    <permission-group android:name="android.permission-group.PHONE"
520        android:icon="@drawable/perm_group_phone_calls"
521        android:label="@string/permgrouplab_phone"
522        android:description="@string/permgroupdesc_phone"
523        android:priority="500" />
524
525    <!-- Allows read only access to phone state.
526         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
527         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
528         minSdkVersion}</a> and <a
529         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
530         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
531         grants your app this permission. If you don't need this permission, be sure your <a
532         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
533         targetSdkVersion}</a> is 4 or higher. -->
534    <permission android:name="android.permission.READ_PHONE_STATE"
535        android:permissionGroup="android.permission-group.PHONE"
536        android:label="@string/permlab_readPhoneState"
537        android:description="@string/permdesc_readPhoneState"
538        android:protectionLevel="dangerous" />
539
540    <!-- Allows an application to initiate a phone call without going through
541        the Dialer user interface for the user to confirm the call. -->
542    <permission android:name="android.permission.CALL_PHONE"
543        android:permissionGroup="android.permission-group.PHONE"
544        android:permissionFlags="costsMoney"
545        android:label="@string/permlab_callPhone"
546        android:description="@string/permdesc_callPhone"
547        android:protectionLevel="dangerous" />
548
549    <!-- Allows an application to read the user's call log.
550         <p class="note"><strong>Note:</strong> If your app uses the
551         {@link #READ_CONTACTS} permission and <em>both</em> your <a
552         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
553         minSdkVersion}</a> and <a
554         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
555         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
556         grants your app this permission. If you don't need this permission, be sure your <a
557         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
558         targetSdkVersion}</a> is 16 or higher.</p> -->
559    <permission android:name="android.permission.READ_CALL_LOG"
560        android:permissionGroup="android.permission-group.PHONE"
561        android:label="@string/permlab_readCallLog"
562        android:description="@string/permdesc_readCallLog"
563        android:protectionLevel="dangerous" />
564
565    <!-- Allows an application to write (but not read) the user's
566         contacts data.
567         <p class="note"><strong>Note:</strong> If your app uses the
568         {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
569         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
570         minSdkVersion}</a> and <a
571         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
572         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
573         grants your app this permission. If you don't need this permission, be sure your <a
574         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
575         targetSdkVersion}</a> is 16 or higher.</p>  -->
576    <permission android:name="android.permission.WRITE_CALL_LOG"
577        android:permissionGroup="android.permission-group.PHONE"
578        android:label="@string/permlab_writeCallLog"
579        android:description="@string/permdesc_writeCallLog"
580        android:protectionLevel="dangerous" />
581
582    <!-- Allows an application to add voicemails into the system. -->
583    <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
584        android:permissionGroup="android.permission-group.PHONE"
585        android:label="@string/permlab_addVoicemail"
586        android:description="@string/permdesc_addVoicemail"
587        android:protectionLevel="dangerous" />
588
589    <!-- Allows an application to use SIP service. -->
590    <permission android:name="android.permission.USE_SIP"
591        android:permissionGroup="android.permission-group.PHONE"
592        android:description="@string/permdesc_use_sip"
593        android:label="@string/permlab_use_sip"
594        android:protectionLevel="dangerous"/>
595
596    <!-- Allows an application to see the number being dialed during an outgoing
597         call with the option to redirect the call to a different number or
598         abort the call altogether. -->
599    <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
600        android:permissionGroup="android.permission-group.PHONE"
601        android:label="@string/permlab_processOutgoingCalls"
602        android:description="@string/permdesc_processOutgoingCalls"
603        android:protectionLevel="dangerous" />
604
605    <!-- ====================================================================== -->
606    <!-- Permissions for accessing the device microphone                        -->
607    <!-- ====================================================================== -->
608    <eat-comment />
609
610    <!-- Used for permissions that are associated with accessing
611         microphone audio from the device. Note that phone calls also capture audio
612         but are in a separate (more visible) permission group. -->
613    <permission-group android:name="android.permission-group.MICROPHONE"
614        android:icon="@drawable/perm_group_microphone"
615        android:label="@string/permgrouplab_microphone"
616        android:description="@string/permgroupdesc_microphone"
617        android:priority="600" />
618
619    <!-- Allows an application to record audio. -->
620    <permission android:name="android.permission.RECORD_AUDIO"
621        android:permissionGroup="android.permission-group.MICROPHONE"
622        android:label="@string/permlab_recordAudio"
623        android:description="@string/permdesc_recordAudio"
624        android:protectionLevel="dangerous"/>
625
626    <!-- ====================================================================== -->
627    <!-- Permissions for accessing the device camera                            -->
628    <!-- ====================================================================== -->
629    <eat-comment />
630
631    <!-- Used for permissions that are associated with accessing
632     camera or capturing images/video from the device. -->
633    <permission-group android:name="android.permission-group.CAMERA"
634        android:icon="@drawable/perm_group_camera"
635        android:label="@string/permgrouplab_camera"
636        android:description="@string/permgroupdesc_camera"
637        android:priority="700" />
638
639    <!-- Required to be able to access the camera device.
640         <p>This will automatically enforce the <a
641         href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code
642         &lt;uses-feature&gt;}</a> manifest element for <em>all</em> camera features.
643         If you do not require all camera features or can properly operate if a camera
644         is not available, then you must modify your manifest as appropriate in order to
645         install on devices that don't support all camera features.</p> -->
646    <permission android:name="android.permission.CAMERA"
647        android:permissionGroup="android.permission-group.CAMERA"
648        android:label="@string/permlab_camera"
649        android:description="@string/permdesc_camera"
650        android:protectionLevel="dangerous" />
651
652
653    <!-- ====================================================================== -->
654    <!-- Permissions for accessing the device sensors                           -->
655    <!-- ====================================================================== -->
656    <eat-comment />
657
658    <!-- Used for permissions that are associated with accessing
659         camera or capturing images/video from the device. -->
660    <permission-group android:name="android.permission-group.SENSORS"
661        android:label="@string/permgrouplab_sensors"
662        android:description="@string/permgroupdesc_sensors"
663        android:priority="800" />
664
665    <!-- Allows an application to access data from sensors that the user uses to
666         measure what is happening inside his/her body, such as heart rate. -->
667    <permission android:name="android.permission.BODY_SENSORS"
668        android:permissionGroup="android.permission-group.SENSORS"
669        android:label="@string/permlab_bodySensors"
670        android:description="@string/permdesc_bodySensors"
671        android:protectionLevel="dangerous" />
672
673    <!-- Allows an app to use fingerprint hardware. -->
674    <permission android:name="android.permission.USE_FINGERPRINT"
675        android:label="@string/permlab_useFingerprint"
676        android:description="@string/permdesc_useFingerprint"
677        android:protectionLevel="dangerous" />
678
679    <!-- ====================================================================== -->
680    <!-- INSTALLTIME PERMISSIONS                                                -->
681    <!-- ====================================================================== -->
682
683    <!-- ================================== -->
684    <!-- Permissions for accessing messages -->
685    <!-- ================================== -->
686    <eat-comment />
687
688    <!-- @SystemApi Allows an application (Phone) to send a request to other applications
689         to handle the respond-via-message action during incoming calls.
690         <p>Not for use by third-party applications. -->
691    <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
692        android:protectionLevel="signature|system" />
693
694    <!-- Allows an application to filter carrier specific sms.
695         @hide -->
696    <permission android:name="android.permission.CARRIER_FILTER_SMS"
697        android:protectionLevel="signature|system" />
698
699    <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
700         to record or display them to the user.
701         <p>Not for use by third-party applications.
702         @hide Pending API council approval -->
703    <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
704        android:protectionLevel="signature|system" />
705
706    <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
707         or perform processing on them. -->
708    <!-- @hide -->
709    <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
710        android:protectionLevel="signature|system" />
711
712    <!-- @SystemApi @hide Allows an application to execute contacts directory search.
713         This should only be used by ContactsProvider.
714         <p>Not for use by third-party applications. -->
715    <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
716        android:protectionLevel="signature|system" />
717
718    <!-- =============================================================== -->
719    <!-- Permissions for accessing the user dictionary-->
720    <!-- =============================================================== -->
721    <eat-comment />
722
723    <!-- Used for permissions that provide access to the user
724         calendar to create / view events.-->
725    <permission-group android:name="android.permission-group.USER_DICTIONARY"
726        android:label="@string/permgrouplab_dictionary"
727        android:icon="@drawable/perm_group_user_dictionary"
728        android:description="@string/permgroupdesc_dictionary"
729        android:permissionGroupFlags="personalInfo"
730        android:priority="1100" />
731
732    <!-- Allows an application to read the user dictionary. This should
733         really only be required by an IME, or a dictionary editor like
734         the Settings app. -->
735    <permission android:name="android.permission.READ_USER_DICTIONARY"
736        android:permissionGroup="android.permission-group.USER_DICTIONARY"
737        android:label="@string/permlab_readDictionary"
738        android:description="@string/permdesc_readDictionary"
739        android:protectionLevel="dangerous"/>
740
741    <!-- Allows an application to write to the user dictionary. -->
742    <permission android:name="android.permission.WRITE_USER_DICTIONARY"
743        android:permissionGroup="android.permission-group.USER_DICTIONARY"
744        android:label="@string/permlab_writeDictionary"
745        android:description="@string/permdesc_writeDictionary"
746        android:protectionLevel="normal"/>
747
748    <!-- =============================================================== -->
749    <!-- Permissions for accessing the user bookmarks                    -->
750    <!-- =============================================================== -->
751    <eat-comment />
752
753    <!-- Used for permissions that provide access to the user
754         bookmarks and browser history.-->
755    <permission-group android:name="android.permission-group.BOOKMARKS"
756        android:label="@string/permgrouplab_bookmarks"
757        android:icon="@drawable/perm_group_bookmarks"
758        android:description="@string/permgroupdesc_bookmarks"
759        android:permissionGroupFlags="personalInfo"
760        android:priority="1200" />
761
762    <!-- Allows an application to read (but not write) the user's
763        browsing history and bookmarks. -->
764    <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
765        android:permissionGroup="android.permission-group.BOOKMARKS"
766        android:label="@string/permlab_readHistoryBookmarks"
767        android:description="@string/permdesc_readHistoryBookmarks"
768        android:protectionLevel="dangerous" />
769
770    <!-- Allows an application to write (but not read) the user's
771        browsing history and bookmarks. -->
772    <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
773        android:permissionGroup="android.permission-group.BOOKMARKS"
774        android:label="@string/permlab_writeHistoryBookmarks"
775        android:description="@string/permdesc_writeHistoryBookmarks"
776        android:protectionLevel="dangerous" />
777
778    <!-- =============================================================== -->
779    <!-- Permissions for setting the device alarm                        -->
780    <!-- =============================================================== -->
781    <eat-comment />
782
783    <!-- Allows an application to broadcast an Intent to set an alarm for the user. -->
784    <permission android:name="com.android.alarm.permission.SET_ALARM"
785        android:label="@string/permlab_setAlarm"
786        android:description="@string/permdesc_setAlarm"
787        android:protectionLevel="normal" />
788
789    <!-- =============================================================== -->
790    <!-- Permissions for accessing the user voicemail                    -->
791    <!-- =============================================================== -->
792    <eat-comment />
793
794    <!-- Allows an application to modify and remove existing voicemails in the system -->
795    <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
796        android:protectionLevel="system|signature" />
797
798    <!-- Allows an application to read voicemails in the system. -->
799    <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
800        android:protectionLevel="system|signature" />
801
802    <!-- ======================================= -->
803    <!-- Permissions for accessing location info -->
804    <!-- ======================================= -->
805    <eat-comment />
806
807    <!-- Allows an application to access extra location provider commands -->
808    <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
809        android:label="@string/permlab_accessLocationExtraCommands"
810        android:description="@string/permdesc_accessLocationExtraCommands"
811        android:protectionLevel="normal" />
812
813    <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
814    <p>Not for use by third-party applications. -->
815    <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
816        android:protectionLevel="signature|system" />
817
818    <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
819         This should only be used by HDMI-CEC service.
820    -->
821    <permission android:name="android.permission.HDMI_CEC"
822        android:protectionLevel="signatureOrSystem" />
823
824    <!-- @SystemApi Allows an application to use location features in hardware,
825         such as the geofencing api.
826         <p>Not for use by third-party applications. -->
827    <permission android:name="android.permission.LOCATION_HARDWARE"
828        android:protectionLevel="signature|system" />
829    <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
830
831    <!-- Allows an application to create mock location providers for testing. -->
832    <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
833        android:label="@string/permlab_accessMockLocation"
834        android:description="@string/permdesc_accessMockLocation"
835        android:protectionLevel="normal" />
836
837    <!-- ======================================= -->
838    <!-- Permissions for accessing networks -->
839    <!-- ======================================= -->
840    <eat-comment />
841
842    <!-- Allows applications to open network sockets. -->
843    <permission android:name="android.permission.INTERNET"
844        android:description="@string/permdesc_createNetworkSockets"
845        android:label="@string/permlab_createNetworkSockets"
846        android:protectionLevel="dangerous" />
847
848    <!-- Allows applications to access information about networks -->
849    <permission android:name="android.permission.ACCESS_NETWORK_STATE"
850        android:description="@string/permdesc_accessNetworkState"
851        android:label="@string/permlab_accessNetworkState"
852        android:protectionLevel="normal" />
853
854    <!-- Allows applications to access information about Wi-Fi networks -->
855    <permission android:name="android.permission.ACCESS_WIFI_STATE"
856        android:description="@string/permdesc_accessWifiState"
857        android:label="@string/permlab_accessWifiState"
858        android:protectionLevel="normal" />
859
860    <!-- Allows applications to change Wi-Fi connectivity state -->
861    <permission android:name="android.permission.CHANGE_WIFI_STATE"
862        android:description="@string/permdesc_changeWifiState"
863        android:label="@string/permlab_changeWifiState"
864        android:protectionLevel="dangerous" />
865
866    <!-- @SystemApi @hide Allows applications to read Wi-Fi credential.
867         <p>Not for use by third-party applications. -->
868    <permission android:name="android.permission.READ_WIFI_CREDENTIAL"
869        android:protectionLevel="signature|system" />
870
871    <!-- @SystemApi @hide Allow system apps to receive broadcast
872         when a wifi network credential is changed.
873         <p>Not for use by third-party applications. -->
874    <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE"
875        android:protectionLevel="signature|system" />
876
877    <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created
878     by another application. Once reconfigured the original creator cannot make any further
879     modifications.
880     <p>Not for use by third-party applications. -->
881    <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG"
882        android:protectionLevel="signature|system" />
883
884    <!-- @hide -->
885    <permission android:name="android.permission.ACCESS_WIMAX_STATE"
886        android:description="@string/permdesc_accessWimaxState"
887        android:label="@string/permlab_accessWimaxState"
888        android:protectionLevel="normal" />
889
890    <!-- @hide -->
891    <permission android:name="android.permission.CHANGE_WIMAX_STATE"
892        android:description="@string/permdesc_changeWimaxState"
893        android:label="@string/permlab_changeWimaxState"
894        android:protectionLevel="dangerous" />
895
896    <!-- Allows applications to act as network scorers. @hide @SystemApi-->
897    <permission android:name="android.permission.SCORE_NETWORKS"
898        android:protectionLevel="signature|system" />
899
900    <!-- ======================================= -->
901    <!-- Permissions for short range, peripheral networks -->
902    <!-- ======================================= -->
903    <eat-comment />
904
905    <!-- Allows applications to connect to paired bluetooth devices -->
906    <permission android:name="android.permission.BLUETOOTH"
907        android:description="@string/permdesc_bluetooth"
908        android:label="@string/permlab_bluetooth"
909        android:protectionLevel="dangerous" />
910
911    <!-- Allows applications to discover and pair bluetooth devices -->
912    <permission android:name="android.permission.BLUETOOTH_ADMIN"
913        android:description="@string/permdesc_bluetoothAdmin"
914        android:label="@string/permlab_bluetoothAdmin"
915        android:protectionLevel="dangerous" />
916
917    <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to
918         allow or disallow phonebook access or message access.
919         This is not available to third party applications. -->
920    <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
921        android:protectionLevel="system|signature" />
922
923    <!-- Control access to email providers exclusively for Bluetooth
924         @hide
925    -->
926    <permission android:name="android.permission.BLUETOOTH_MAP"
927        android:protectionLevel="signature" />
928
929    <!-- Allows bluetooth stack to access files
930         @hide This should only be used by Bluetooth apk.
931    -->
932    <permission android:name="android.permission.BLUETOOTH_STACK"
933        android:protectionLevel="signature" />
934
935    <!-- Allows applications to perform I/O operations over NFC -->
936    <permission android:name="android.permission.NFC"
937        android:description="@string/permdesc_nfc"
938        android:label="@string/permlab_nfc"
939        android:protectionLevel="dangerous" />
940
941    <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
942         @hide -->
943    <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
944        android:protectionLevel="signature|system" />
945
946    <!-- @SystemApi
947         @hide -->
948    <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
949        android:protectionLevel="signature|system" />
950
951    <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
952         @hide -->
953    <permission android:name="android.permission.LOOP_RADIO"
954        android:protectionLevel="signature|system" />
955
956    <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
957         @hide -->
958    <permission android:name="android.permission.NFC_HANDOVER_STATUS"
959        android:protectionLevel="signature|system" />
960
961    <!-- ================================== -->
962    <!-- Permissions for accessing accounts -->
963    <!-- ================================== -->
964    <eat-comment />
965
966    <!-- Permissions for direct access to the accounts managed
967         by the Account Manager. -->
968    <permission-group android:name="android.permission-group.ACCOUNTS"
969        android:label="@string/permgrouplab_accounts"
970        android:icon="@drawable/perm_group_accounts"
971        android:description="@string/permgroupdesc_accounts"
972        android:permissionGroupFlags="personalInfo"
973        android:priority="1000" />
974
975    <!-- Allows access to the list of accounts in the Accounts Service -->
976    <permission android:name="android.permission.GET_ACCOUNTS"
977        android:permissionGroup="android.permission-group.ACCOUNTS"
978        android:protectionLevel="normal"
979        android:description="@string/permdesc_getAccounts"
980        android:label="@string/permlab_getAccounts" />
981
982    <!-- Allows an application to act as an AccountAuthenticator for
983         the AccountManager -->
984    <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
985        android:permissionGroup="android.permission-group.ACCOUNTS"
986        android:protectionLevel="dangerous"
987        android:label="@string/permlab_authenticateAccounts"
988        android:description="@string/permdesc_authenticateAccounts" />
989
990    <!-- Allows an application to request authtokens from the AccountManager -->
991    <permission android:name="android.permission.USE_CREDENTIALS"
992        android:permissionGroup="android.permission-group.ACCOUNTS"
993        android:protectionLevel="dangerous"
994        android:label="@string/permlab_useCredentials"
995        android:description="@string/permdesc_useCredentials" />
996
997    <!-- Allows an application to manage the list of accounts in the AccountManager -->
998    <permission android:name="android.permission.MANAGE_ACCOUNTS"
999        android:permissionGroup="android.permission-group.ACCOUNTS"
1000        android:protectionLevel="dangerous"
1001        android:label="@string/permlab_manageAccounts"
1002        android:description="@string/permdesc_manageAccounts" />
1003
1004    <!-- @SystemApi Allows applications to call into AccountAuthenticators.
1005    <p>Not for use by third-party applications. -->
1006    <permission android:name="android.permission.ACCOUNT_MANAGER"
1007        android:permissionGroup="android.permission-group.ACCOUNTS"
1008        android:protectionLevel="signature" />
1009
1010    <!-- ================================== -->
1011    <!-- Permissions for accessing hardware that may effect battery life-->
1012    <!-- ================================== -->
1013    <eat-comment />
1014
1015    <!-- Allows applications to enter Wi-Fi Multicast mode -->
1016    <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
1017        android:description="@string/permdesc_changeWifiMulticastState"
1018        android:label="@string/permlab_changeWifiMulticastState"
1019        android:protectionLevel="dangerous" />
1020
1021    <!-- Allows access to the vibrator -->
1022    <permission android:name="android.permission.VIBRATE"
1023        android:label="@string/permlab_vibrate"
1024        android:description="@string/permdesc_vibrate"
1025        android:protectionLevel="normal" />
1026
1027    <!-- Allows access to the flashlight -->
1028    <permission android:name="android.permission.FLASHLIGHT"
1029        android:label="@string/permlab_flashlight"
1030        android:description="@string/permdesc_flashlight"
1031        android:protectionLevel="normal" />
1032
1033    <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
1034         from dimming -->
1035    <permission android:name="android.permission.WAKE_LOCK"
1036        android:label="@string/permlab_wakeLock"
1037        android:description="@string/permdesc_wakeLock"
1038        android:protectionLevel="normal" />
1039
1040    <!-- Allows using the device's IR transmitter, if available -->
1041    <permission android:name="android.permission.TRANSMIT_IR"
1042        android:label="@string/permlab_transmitIr"
1043        android:description="@string/permdesc_transmitIr"
1044        android:protectionLevel="normal" />
1045
1046    <!-- ==================================================== -->
1047    <!-- Permissions related to changing audio settings   -->
1048    <!-- ==================================================== -->
1049    <eat-comment />
1050
1051    <!-- Allows an application to modify global audio settings -->
1052    <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
1053        android:label="@string/permlab_modifyAudioSettings"
1054        android:description="@string/permdesc_modifyAudioSettings"
1055        android:protectionLevel="normal" />
1056
1057    <!-- ================================== -->
1058    <!-- Permissions for accessing hardware -->
1059    <!-- ================================== -->
1060    <eat-comment />
1061
1062    <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
1063         @hide -->
1064    <permission android:name="android.permission.MANAGE_USB"
1065        android:protectionLevel="signature|system" />
1066
1067    <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
1068         For use only by the device side MTP implementation.
1069         @hide -->
1070    <permission android:name="android.permission.ACCESS_MTP"
1071        android:protectionLevel="signature|system" />
1072
1073    <!-- Allows access to hardware peripherals.  Intended only for hardware testing.
1074    <p>Not for use by third-party applications. -->
1075    <permission android:name="android.permission.HARDWARE_TEST"
1076        android:protectionLevel="signature" />
1077
1078    <!-- @SystemApi Allows access to FM
1079         @hide This is not a third-party API (intended for system apps).-->
1080    <permission android:name="android.permission.ACCESS_FM_RADIO"
1081        android:protectionLevel="signature|system" />
1082
1083    <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
1084         @hide -->
1085    <permission android:name="android.permission.NET_ADMIN"
1086        android:protectionLevel="signature" />
1087
1088    <!-- Allows registration for remote audio playback. @hide -->
1089    <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
1090        android:protectionLevel="signature" />
1091
1092    <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
1093         built-in tuners and HDMI-in's.
1094         @hide This should only be used by OEM's TvInputService's.
1095    -->
1096    <permission android:name="android.permission.TV_INPUT_HARDWARE"
1097        android:protectionLevel="signatureOrSystem" />
1098
1099    <!-- @SystemApi Allows to capture a frame of TV input hardware such as
1100         built-in tuners and HDMI-in's.
1101         @hide <p>Not for use by third-party applications.
1102    -->
1103    <permission android:name="android.permission.CAPTURE_TV_INPUT"
1104        android:protectionLevel="signatureOrSystem" />
1105
1106    <!-- @hide Allows enabling/disabling OEM unlock
1107   <p>Not for use by third-party applications. -->
1108    <permission android:name="android.permission.OEM_UNLOCK_STATE"
1109        android:protectionLevel="signature" />
1110
1111    <!-- @hide Allows querying state of PersistentDataBlock
1112   <p>Not for use by third-party applications. -->
1113    <permission android:name="android.permission.ACCESS_PDB_STATE"
1114        android:protectionLevel="signature" />
1115
1116    <!-- =========================================== -->
1117    <!-- Permissions associated with camera and image capture -->
1118    <!-- =========================================== -->
1119    <eat-comment />
1120
1121    <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
1122         a camera is in use by an application.
1123         @hide -->
1124    <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
1125        android:protectionLevel="signature|system" />
1126
1127    <!-- Allows sending the camera service notifications about system-wide events.
1128        @hide -->
1129    <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS"
1130        android:protectionLevel="signature|system" />
1131
1132    <!-- =========================================== -->
1133    <!-- Permissions associated with telephony state -->
1134    <!-- =========================================== -->
1135    <eat-comment />
1136
1137    <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
1138         Does not include placing calls.
1139         <p>Not for use by third-party applications. -->
1140    <permission android:name="android.permission.MODIFY_PHONE_STATE"
1141        android:protectionLevel="signature|system" />
1142
1143    <!-- Allows read only access to precise phone state.
1144         @hide Pending API council approval -->
1145    <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
1146        android:protectionLevel="signature|system" />
1147
1148    <!-- @SystemApi Allows read access to privileged phone state.
1149         @hide Used internally. -->
1150    <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
1151        android:protectionLevel="signature|system" />
1152
1153    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1154         PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount
1155         corresponds to a device SIM.
1156         @hide -->
1157    <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION"
1158        android:protectionLevel="system|signature" />
1159
1160    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1161         PhoneAccount#CAPABILITY_CALL_PROVIDER.
1162         @hide -->
1163    <permission android:name="android.permission.REGISTER_CALL_PROVIDER"
1164        android:protectionLevel="system|signature" />
1165
1166    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1167         PhoneAccount#CAPABILITY_CONNECTION_MANAGER
1168         @hide -->
1169    <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER"
1170        android:protectionLevel="system|signature" />
1171
1172    <!-- @SystemApi Allows an application to bind to InCallService implementations.
1173         @hide -->
1174    <permission android:name="android.permission.BIND_INCALL_SERVICE"
1175        android:protectionLevel="system|signature" />
1176
1177    <!-- @SystemApi Allows an application to bind to ConnectionService implementations.
1178         @hide -->
1179    <permission android:name="android.permission.BIND_CONNECTION_SERVICE"
1180        android:protectionLevel="system|signature" />
1181
1182    <!-- @SystemApi Allows an application to control the in-call experience.
1183         @hide -->
1184    <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE"
1185        android:protectionLevel="system|signature" />
1186
1187    <!-- ================================== -->
1188    <!-- Permissions for sdcard interaction -->
1189    <!-- ================================== -->
1190    <eat-comment />
1191
1192    <!-- Allows an application to read from external storage.
1193         <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
1194         granted this permission.</p>
1195         <p>This permission is enforced starting in API level 19.  Before API level 19, this
1196         permission is not enforced and all apps still have access to read from external storage.
1197         You can test your app with the permission enforced by enabling <em>Protect USB
1198         storage</em> under Developer options in the Settings app on a device running Android 4.1 or
1199         higher.</p>
1200         <p>Also starting in API level 19, this permission is <em>not</em> required to
1201         read/write files in your application-specific directories returned by
1202         {@link android.content.Context#getExternalFilesDir} and
1203         {@link android.content.Context#getExternalCacheDir}.
1204         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1205         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1206         minSdkVersion}</a> and <a
1207         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1208         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1209         grants your app this permission. If you don't need this permission, be sure your <a
1210         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1211         targetSdkVersion}</a> is 4 or higher.-->
1212    <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
1213        android:label="@string/permlab_sdcardRead"
1214        android:description="@string/permdesc_sdcardRead"
1215        android:protectionLevel="normal" />
1216
1217    <!-- Allows an application to write to external storage.
1218         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1219         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1220         minSdkVersion}</a> and <a
1221         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1222         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1223         grants your app this permission. If you don't need this permission, be sure your <a
1224         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1225         targetSdkVersion}</a> is 4 or higher.
1226         <p>Starting in API level 19, this permission is <em>not</em> required to
1227         read/write files in your application-specific directories returned by
1228         {@link android.content.Context#getExternalFilesDir} and
1229         {@link android.content.Context#getExternalCacheDir}. -->
1230    <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
1231        android:label="@string/permlab_sdcardWrite"
1232        android:description="@string/permdesc_sdcardWrite"
1233        android:protectionLevel="normal" />
1234
1235    <!-- @SystemApi Allows an application to write to internal media storage
1236         @hide  -->
1237    <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
1238        android:protectionLevel="signature|system" />
1239
1240    <!-- Allows an application to manage access to documents, usually as part
1241         of a document picker. -->
1242    <permission android:name="android.permission.MANAGE_DOCUMENTS"
1243        android:protectionLevel="signature" />
1244
1245    <!-- ================================== -->
1246    <!-- Permissions for screenlock         -->
1247    <!-- ================================== -->
1248    <eat-comment />
1249
1250    <!-- Allows applications to disable the keyguard if it is not secure. -->
1251    <permission android:name="android.permission.DISABLE_KEYGUARD"
1252        android:description="@string/permdesc_disableKeyguard"
1253        android:label="@string/permlab_disableKeyguard"
1254        android:protectionLevel="dangerous" />
1255
1256    <!-- ================================== -->
1257    <!-- Permissions to access other installed applications  -->
1258    <!-- ================================== -->
1259    <eat-comment />
1260
1261    <!-- @deprecated No longer enforced. -->
1262    <permission android:name="android.permission.GET_TASKS"
1263        android:label="@string/permlab_getTasks"
1264        android:description="@string/permdesc_getTasks"
1265        android:protectionLevel="normal" />
1266
1267    <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really
1268         give access to task information.  We need this new one because there are
1269         many existing apps that use add libraries and such that have validation
1270         code to ensure the app has requested the GET_TASKS permission by seeing
1271         if it has been granted the permission...  if it hasn't, it kills the app
1272         with a message about being upset.  So we need to have it continue to look
1273         like the app is getting that permission, even though it will never be
1274         checked, and new privileged apps can now request this one for real access.
1275         @hide
1276         @SystemApi -->
1277    <permission android:name="android.permission.REAL_GET_TASKS"
1278        android:protectionLevel="signature|system" />
1279
1280    <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo.
1281         @hide -->
1282    <permission android:name="android.permission.START_TASKS_FROM_RECENTS"
1283        android:protectionLevel="signature|system" />
1284
1285    <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
1286         across the users on the device, using singleton services and
1287         user-targeted broadcasts.  This permission is not available to
1288         third party applications. -->
1289    <permission android:name="android.permission.INTERACT_ACROSS_USERS"
1290        android:protectionLevel="signature|system|development" />
1291
1292    <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
1293         that removes restrictions on where broadcasts can be sent and allows other
1294         types of interactions. -->
1295    <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
1296        android:protectionLevel="signature" />
1297
1298    <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
1299         users on the device. This permission is not available to
1300         third party applications. -->
1301    <permission android:name="android.permission.MANAGE_USERS"
1302        android:protectionLevel="signature|system" />
1303
1304    <!-- Allows an application to get full detailed information about
1305         recently running tasks, with full fidelity to the real state.
1306         @hide -->
1307    <permission android:name="android.permission.GET_DETAILED_TASKS"
1308        android:protectionLevel="signature" />
1309
1310    <!-- Allows an application to change the Z-order of tasks -->
1311    <permission android:name="android.permission.REORDER_TASKS"
1312        android:label="@string/permlab_reorderTasks"
1313        android:description="@string/permdesc_reorderTasks"
1314        android:protectionLevel="normal" />
1315
1316    <!-- @hide Allows an application to change to remove/kill tasks -->
1317    <permission android:name="android.permission.REMOVE_TASKS"
1318        android:protectionLevel="signature" />
1319
1320    <!-- @SystemApi @hide Allows an application to create/manage/remove stacks -->
1321    <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
1322        android:protectionLevel="signature|system" />
1323
1324    <!-- Allows an application to start any activity, regardless of permission
1325         protection or exported state.
1326         @hide -->
1327    <permission android:name="android.permission.START_ANY_ACTIVITY"
1328        android:protectionLevel="signature" />
1329
1330    <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
1331        API is no longer supported. -->
1332    <permission android:name="android.permission.RESTART_PACKAGES"
1333        android:label="@string/permlab_killBackgroundProcesses"
1334        android:description="@string/permdesc_killBackgroundProcesses"
1335        android:protectionLevel="normal" />
1336
1337    <!-- Allows an application to call
1338        {@link android.app.ActivityManager#killBackgroundProcesses}. -->
1339    <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
1340        android:label="@string/permlab_killBackgroundProcesses"
1341        android:description="@string/permdesc_killBackgroundProcesses"
1342        android:protectionLevel="normal" />
1343
1344    <!-- ================================== -->
1345    <!-- Permissions affecting the display of other applications  -->
1346    <!-- ================================== -->
1347    <eat-comment />
1348
1349    <!-- Allows an application to open windows using the type
1350         {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT},
1351         shown on top of all other applications.  Very few applications
1352         should use this permission; these windows are intended for
1353         system-level interaction with the user. -->
1354    <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
1355        android:label="@string/permlab_systemAlertWindow"
1356        android:description="@string/permdesc_systemAlertWindow"
1357        android:protectionLevel="dangerous" />
1358
1359    <!-- ================================== -->
1360    <!-- Permissions affecting the system wallpaper -->
1361    <!-- ================================== -->
1362    <eat-comment />
1363
1364    <!-- Allows applications to set the wallpaper -->
1365    <permission android:name="android.permission.SET_WALLPAPER"
1366        android:label="@string/permlab_setWallpaper"
1367        android:description="@string/permdesc_setWallpaper"
1368        android:protectionLevel="normal" />
1369
1370    <!-- Allows applications to set the wallpaper hints -->
1371    <permission android:name="android.permission.SET_WALLPAPER_HINTS"
1372        android:label="@string/permlab_setWallpaperHints"
1373        android:description="@string/permdesc_setWallpaperHints"
1374        android:protectionLevel="normal" />
1375
1376    <!-- ============================================ -->
1377    <!-- Permissions for changing the system clock -->
1378    <!-- ============================================ -->
1379    <eat-comment />
1380
1381    <!-- @SystemApi Allows applications to set the system time.
1382    <p>Not for use by third-party applications. -->
1383    <permission android:name="android.permission.SET_TIME"
1384        android:protectionLevel="signature|system" />
1385
1386    <!-- Allows applications to set the system time zone -->
1387    <permission android:name="android.permission.SET_TIME_ZONE"
1388        android:label="@string/permlab_setTimeZone"
1389        android:description="@string/permdesc_setTimeZone"
1390        android:protectionLevel="normal" />
1391
1392    <!-- ==================================================== -->
1393    <!-- Permissions related to changing status bar   -->
1394    <!-- ==================================================== -->
1395    <eat-comment />
1396
1397    <!-- Allows an application to expand or collapse the status bar. -->
1398    <permission android:name="android.permission.EXPAND_STATUS_BAR"
1399        android:label="@string/permlab_expandStatusBar"
1400        android:description="@string/permdesc_expandStatusBar"
1401        android:protectionLevel="normal" />
1402
1403    <!-- ============================================================== -->
1404    <!-- Permissions related to adding/removing shortcuts from Launcher -->
1405    <!-- ============================================================== -->
1406    <eat-comment />
1407
1408    <!-- Allows an application to install a shortcut in Launcher -->
1409    <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
1410        android:label="@string/permlab_install_shortcut"
1411        android:description="@string/permdesc_install_shortcut"
1412        android:protectionLevel="dangerous"/>
1413
1414    <!-- Allows an application to uninstall a shortcut in Launcher -->
1415    <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
1416        android:label="@string/permlab_uninstall_shortcut"
1417        android:description="@string/permdesc_uninstall_shortcut"
1418        android:protectionLevel="dangerous"/>
1419
1420    <!-- ==================================================== -->
1421    <!-- Permissions related to accessing sync settings   -->
1422    <!-- ==================================================== -->
1423    <eat-comment />
1424
1425    <!-- Allows applications to read the sync settings -->
1426    <permission android:name="android.permission.READ_SYNC_SETTINGS"
1427        android:description="@string/permdesc_readSyncSettings"
1428        android:label="@string/permlab_readSyncSettings"
1429        android:protectionLevel="normal" />
1430
1431    <!-- Allows applications to write the sync settings -->
1432    <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
1433        android:description="@string/permdesc_writeSyncSettings"
1434        android:label="@string/permlab_writeSyncSettings"
1435        android:protectionLevel="normal" />
1436
1437    <!-- Allows applications to read the sync stats -->
1438    <permission android:name="android.permission.READ_SYNC_STATS"
1439        android:description="@string/permdesc_readSyncStats"
1440        android:label="@string/permlab_readSyncStats"
1441        android:protectionLevel="normal" />
1442
1443
1444    <!-- ============================================ -->
1445    <!-- Permissions for low-level system interaction -->
1446    <!-- ============================================ -->
1447    <eat-comment />
1448
1449    <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
1450    <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
1451        android:protectionLevel="signature" />
1452
1453    <!-- Allows an application to access all multi-user external storage @hide -->
1454    <permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE"
1455        android:protectionLevel="signature" />
1456
1457    <!-- @SystemApi Allows an application to modify the current configuration, such
1458         as locale. -->
1459    <permission android:name="android.permission.CHANGE_CONFIGURATION"
1460        android:protectionLevel="signature|system|development" />
1461
1462    <!-- Allows an application to read or write the system settings. -->
1463    <permission android:name="android.permission.WRITE_SETTINGS"
1464        android:label="@string/permlab_writeSettings"
1465        android:description="@string/permdesc_writeSettings"
1466        android:protectionLevel="normal" />
1467
1468    <!-- @SystemApi Allows an application to modify the Google service map.
1469    <p>Not for use by third-party applications. -->
1470    <permission android:name="android.permission.WRITE_GSERVICES"
1471        android:protectionLevel="signature|system" />
1472
1473    <!-- @SystemApi Allows an application to call
1474        {@link android.app.ActivityManager#forceStopPackage}.
1475        @hide -->
1476    <permission android:name="android.permission.FORCE_STOP_PACKAGES"
1477        android:protectionLevel="signature|system" />
1478
1479    <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
1480         An active window is the window that has fired an accessibility event. -->
1481    <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
1482        android:protectionLevel="signature|system" />
1483
1484    <!-- @SystemApi Modify the global animation scaling factor.
1485    <p>Not for use by third-party applications. -->
1486    <permission android:name="android.permission.SET_ANIMATION_SCALE"
1487        android:protectionLevel="signature|system|development" />
1488
1489    <!-- @deprecated This functionality will be removed in the future; please do
1490         not use. Allow an application to make its activities persistent. -->
1491    <permission android:name="android.permission.PERSISTENT_ACTIVITY"
1492        android:label="@string/permlab_persistentActivity"
1493        android:description="@string/permdesc_persistentActivity"
1494        android:protectionLevel="normal" />
1495
1496    <!-- Allows an application to find out the space used by any package. -->
1497    <permission android:name="android.permission.GET_PACKAGE_SIZE"
1498        android:label="@string/permlab_getPackageSize"
1499        android:description="@string/permdesc_getPackageSize"
1500        android:protectionLevel="normal" />
1501
1502    <!-- @deprecated No longer useful, see
1503         {@link android.content.pm.PackageManager#addPackageToPreferred}
1504         for details. -->
1505    <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
1506        android:protectionLevel="signature" />
1507
1508    <!-- Allows an application to receive the
1509         {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
1510         broadcast after the system finishes booting.  If you don't
1511         request this permission, you will not receive the broadcast at
1512         that time.  Though holding this permission does not have any
1513         security implications, it can have a negative impact on the
1514         user experience by increasing the amount of time it takes the
1515         system to start and allowing applications to have themselves
1516         running without the user being aware of them.  As such, you must
1517         explicitly declare your use of this facility to make that visible
1518         to the user. -->
1519    <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
1520        android:label="@string/permlab_receiveBootCompleted"
1521        android:description="@string/permdesc_receiveBootCompleted"
1522        android:protectionLevel="normal" />
1523
1524    <!-- Allows an application to broadcast sticky intents.  These are
1525         broadcasts whose data is held by the system after being finished,
1526         so that clients can quickly retrieve that data without having
1527         to wait for the next broadcast. -->
1528    <permission android:name="android.permission.BROADCAST_STICKY"
1529        android:label="@string/permlab_broadcastSticky"
1530        android:description="@string/permdesc_broadcastSticky"
1531        android:protectionLevel="normal" />
1532
1533    <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
1534    <p>Not for use by third-party applications.-->
1535    <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
1536        android:protectionLevel="system|signature" />
1537
1538    <!-- @SystemApi Allows formatting file systems for removable storage.
1539    <p>Not for use by third-party applications. -->
1540    <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
1541        android:protectionLevel="system|signature" />
1542
1543    <!-- Allows access to ASEC non-destructive API calls
1544         @hide  -->
1545    <permission android:name="android.permission.ASEC_ACCESS"
1546        android:protectionLevel="signature" />
1547
1548    <!-- Allows creation of ASEC volumes
1549         @hide  -->
1550    <permission android:name="android.permission.ASEC_CREATE"
1551        android:protectionLevel="signature" />
1552
1553    <!-- Allows destruction of ASEC volumes
1554         @hide  -->
1555    <permission android:name="android.permission.ASEC_DESTROY"
1556        android:protectionLevel="signature" />
1557
1558    <!-- Allows mount / unmount of ASEC volumes
1559         @hide  -->
1560    <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
1561        android:protectionLevel="signature" />
1562
1563    <!-- Allows rename of ASEC volumes
1564         @hide  -->
1565    <permission android:name="android.permission.ASEC_RENAME"
1566        android:protectionLevel="signature" />
1567
1568    <!-- @SystemApi Allows applications to write the apn settings.
1569    <p>Not for use by third-party applications. -->
1570    <permission android:name="android.permission.WRITE_APN_SETTINGS"
1571        android:protectionLevel="signature|system" />
1572
1573    <!-- Allows an application to allow access the subscribed feeds ContentProvider.
1574         @hide
1575         @removed
1576     -->
1577    <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
1578        android:label="@string/permlab_subscribedFeedsRead"
1579        android:description="@string/permdesc_subscribedFeedsRead"
1580        android:protectionLevel="normal" />
1581
1582    <!--
1583        @hide
1584        @removed
1585    -->
1586    <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
1587        android:label="@string/permlab_subscribedFeedsWrite"
1588        android:description="@string/permdesc_subscribedFeedsWrite"
1589        android:protectionLevel="dangerous" />
1590
1591    <!-- Allows applications to change network connectivity state -->
1592    <permission android:name="android.permission.CHANGE_NETWORK_STATE"
1593        android:description="@string/permdesc_changeNetworkState"
1594        android:label="@string/permlab_changeNetworkState"
1595        android:protectionLevel="normal" />
1596
1597    <!-- Allows an application to clear the caches of all installed
1598         applications on the device.  -->
1599    <permission android:name="android.permission.CLEAR_APP_CACHE"
1600        android:protectionLevel="dangerous" />
1601
1602    <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
1603         @hide -->
1604    <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
1605        android:protectionLevel="signature|system" />
1606
1607    <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
1608         behalf of the user.
1609         @hide -->
1610    <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
1611        android:protectionLevel="signature|system" />
1612
1613    <!-- @SystemApi Allows an application to do certain operations needed for
1614         interacting with the recovery (system update) system.
1615         @hide -->
1616    <permission android:name="android.permission.RECOVERY"
1617        android:protectionLevel="signature|system" />
1618
1619    <!-- Allows the system to bind to an application's task services
1620         @hide -->
1621    <permission android:name="android.permission.BIND_JOB_SERVICE"
1622        android:protectionLevel="signature" />
1623    <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
1624
1625    <!-- Allows an application to initiate configuration updates
1626         <p>An application requesting this permission is responsible for
1627         verifying the source and integrity of any update before passing
1628         it off to the various individual installer components
1629         @hide -->
1630    <permission android:name="android.permission.UPDATE_CONFIG"
1631        android:protectionLevel="signature|system" />
1632
1633    <!-- ========================================= -->
1634    <!-- Permissions for special development tools -->
1635    <!-- ========================================= -->
1636    <eat-comment />
1637
1638    <!-- @SystemApi Allows an application to read or write the secure system settings.
1639    <p>Not for use by third-party applications. -->
1640    <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
1641        android:protectionLevel="signature|system|development" />
1642
1643    <!-- @SystemApi Allows an application to retrieve state dump information from system services.
1644    <p>Not for use by third-party applications. -->
1645    <permission android:name="android.permission.DUMP"
1646        android:protectionLevel="signature|system|development" />
1647
1648    <!-- @SystemApi Allows an application to read the low-level system log files.
1649    <p>Not for use by third-party applications, because
1650    Log entries can contain the user's private information. -->
1651    <permission android:name="android.permission.READ_LOGS"
1652        android:protectionLevel="signature|system|development" />
1653
1654    <!-- @SystemApi Configure an application for debugging.
1655    <p>Not for use by third-party applications. -->
1656    <permission android:name="android.permission.SET_DEBUG_APP"
1657        android:protectionLevel="signature|system|development" />
1658
1659    <!-- @SystemApi Allows an application to set the maximum number of (not needed)
1660         application processes that can be running.
1661         <p>Not for use by third-party applications. -->
1662    <permission android:name="android.permission.SET_PROCESS_LIMIT"
1663        android:protectionLevel="signature|system|development" />
1664
1665    <!-- @SystemApi Allows an application to control whether activities are immediately
1666         finished when put in the background.
1667         <p>Not for use by third-party applications. -->
1668    <permission android:name="android.permission.SET_ALWAYS_FINISH"
1669        android:protectionLevel="signature|system|development" />
1670
1671    <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
1672    <p>Not for use by third-party applications. -->
1673    <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
1674        android:protectionLevel="signature|system|development" />
1675
1676    <!-- ==================================== -->
1677    <!-- Private permissions                  -->
1678    <!-- ==================================== -->
1679    <eat-comment />
1680
1681    <!-- @SystemApi Allows applications to RW to diagnostic resources.
1682    <p>Not for use by third-party applications. -->
1683    <permission android:name="android.permission.DIAGNOSTIC"
1684        android:protectionLevel="signature" />
1685
1686    <!-- @SystemApi Allows an application to open, close, or disable the status bar
1687         and its icons.
1688         <p>Not for use by third-party applications. -->
1689    <permission android:name="android.permission.STATUS_BAR"
1690        android:protectionLevel="signature|system" />
1691
1692    <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
1693    @hide -->
1694    <permission android:name="android.permission.STATUS_BAR_SERVICE"
1695        android:protectionLevel="signature" />
1696
1697    <!-- Allows an application to force a BACK operation on whatever is the
1698         top activity.
1699         <p>Not for use by third-party applications. -->
1700    <permission android:name="android.permission.FORCE_BACK"
1701        android:protectionLevel="signature" />
1702
1703    <!-- @SystemApi Allows an application to update device statistics.
1704    <p>Not for use by third-party applications. -->
1705    <permission android:name="android.permission.UPDATE_DEVICE_STATS"
1706        android:protectionLevel="signature|system" />
1707
1708    <!-- @SystemApi @hide Allows an application to collect battery statistics -->
1709    <permission android:name="android.permission.GET_APP_OPS_STATS"
1710        android:protectionLevel="signature|system|development" />
1711
1712    <!-- @SystemApi Allows an application to update application operation statistics. Not for
1713         use by third party apps. @hide -->
1714    <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
1715        android:protectionLevel="signature|system" />
1716
1717    <!-- Allows an application to open windows that are for use by parts
1718         of the system user interface.
1719         <p>Not for use by third-party applications. -->
1720    <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
1721        android:protectionLevel="signature" />
1722
1723    <!-- Allows an application to manage (create, destroy,
1724         Z-order) application tokens in the window manager.
1725         <p>Not for use by third-party applications. -->
1726    <permission android:name="android.permission.MANAGE_APP_TOKENS"
1727        android:protectionLevel="signature" />
1728
1729    <!-- @hide Allows the application to temporarily freeze the screen for a
1730         full-screen transition. -->
1731    <permission android:name="android.permission.FREEZE_SCREEN"
1732        android:protectionLevel="signature" />
1733
1734    <!-- Allows an application to inject user events (keys, touch, trackball)
1735         into the event stream and deliver them to ANY window.  Without this
1736         permission, you can only deliver events to windows in your own process.
1737         <p>Not for use by third-party applications. -->
1738    <permission android:name="android.permission.INJECT_EVENTS"
1739        android:protectionLevel="signature" />
1740
1741    <!-- @hide Allows an application to register an input filter which filters the stream
1742         of user events (keys, touch, trackball) before they are dispatched to any window. -->
1743    <permission android:name="android.permission.FILTER_EVENTS"
1744        android:protectionLevel="signature" />
1745
1746    <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
1747    <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
1748        android:protectionLevel="signature" />
1749
1750    <!-- @hide Allows an application to collect frame statistics -->
1751    <permission android:name="android.permission.FRAME_STATS"
1752         android:protectionLevel="signature" />
1753
1754    <!-- @hide Allows an application to temporary enable accessibility on the device. -->
1755    <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
1756        android:protectionLevel="signature" />
1757
1758    <!-- Allows an application to watch and control how activities are
1759         started globally in the system.  Only for is in debugging
1760         (usually the monkey command).
1761         <p>Not for use by third-party applications. -->
1762    <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
1763        android:protectionLevel="signature" />
1764
1765    <!-- @SystemApi Allows an application to call the activity manager shutdown() API
1766         to put the higher-level system there into a shutdown state.
1767         @hide -->
1768    <permission android:name="android.permission.SHUTDOWN"
1769        android:protectionLevel="signature|system" />
1770
1771    <!-- @SystemApi Allows an application to tell the activity manager to temporarily
1772         stop application switches, putting it into a special mode that
1773         prevents applications from immediately switching away from some
1774         critical UI such as the home screen.
1775         @hide -->
1776    <permission android:name="android.permission.STOP_APP_SWITCHES"
1777        android:protectionLevel="signature|system" />
1778
1779    <!-- Allows an application to retrieve private information about
1780         the current top activity, such as any assist context it can provide.
1781         <p>Not for use by third-party applications. -->
1782    <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
1783        android:protectionLevel="signature" />
1784
1785    <!-- Allows an application to retrieve the current state of keys and
1786         switches.
1787         <p>Not for use by third-party applications.
1788         @deprecated The API that used this permission has been removed. -->
1789    <permission android:name="android.permission.READ_INPUT_STATE"
1790        android:protectionLevel="signature" />
1791
1792    <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
1793         to ensure that only the system can bind to it. -->
1794    <permission android:name="android.permission.BIND_INPUT_METHOD"
1795        android:protectionLevel="signature" />
1796
1797    <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
1798         to ensure that only the system can bind to it. -->
1799    <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
1800        android:protectionLevel="signature" />
1801
1802    <!-- Must be required by a {@link android.printservice.PrintService},
1803         to ensure that only the system can bind to it. -->
1804    <permission android:name="android.permission.BIND_PRINT_SERVICE"
1805        android:protectionLevel="signature" />
1806
1807    <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
1808         or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
1809         the system can bind to it. -->
1810    <permission android:name="android.permission.BIND_NFC_SERVICE"
1811        android:protectionLevel="signature" />
1812
1813    <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
1814         @hide -->
1815    <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
1816        android:protectionLevel="signature" />
1817
1818    <!-- Must be required by a TextService (e.g. SpellCheckerService)
1819         to ensure that only the system can bind to it. -->
1820    <permission android:name="android.permission.BIND_TEXT_SERVICE"
1821        android:protectionLevel="signature" />
1822
1823    <!-- Must be required by a {@link android.net.VpnService},
1824         to ensure that only the system can bind to it. -->
1825    <permission android:name="android.permission.BIND_VPN_SERVICE"
1826        android:protectionLevel="signature" />
1827
1828    <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
1829         to ensure that only the system can bind to it. -->
1830    <permission android:name="android.permission.BIND_WALLPAPER"
1831        android:protectionLevel="signature|system" />
1832
1833    <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
1834         to ensure that only the system can bind to it. -->
1835    <permission android:name="android.permission.BIND_VOICE_INTERACTION"
1836        android:protectionLevel="signature" />
1837
1838    <!-- Must be required by hotword enrollment application,
1839         to ensure that only the system can interact with it.
1840         @hide <p>Not for use by third-party applications.</p> -->
1841    <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
1842        android:protectionLevel="signature|system" />
1843
1844    <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
1845         to ensure that only the system can bind to it.
1846         @hide -->
1847    <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
1848        android:protectionLevel="signature" />
1849
1850    <!-- Must be required by a {@link android.media.tv.TvInputService}
1851         to ensure that only the system can bind to it. -->
1852    <permission android:name="android.permission.BIND_TV_INPUT"
1853        android:protectionLevel="signature|system" />
1854
1855    <!-- @SystemApi Allows an application to modify parental controls
1856         <p>Not for use by third-party applications.
1857         @hide -->
1858    <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS"
1859        android:protectionLevel="signature|system" />
1860
1861    <!-- Must be required by a {@link android.media.routing.MediaRouteService}
1862         to ensure that only the system can interact with it.
1863         @hide -->
1864    <permission android:name="android.permission.BIND_ROUTE_PROVIDER"
1865        android:protectionLevel="signature" />
1866
1867    <!-- Must be required by device administration receiver, to ensure that only the
1868         system can interact with it. -->
1869    <permission android:name="android.permission.BIND_DEVICE_ADMIN"
1870        android:protectionLevel="signature" />
1871
1872    <!-- @SystemApi Required to add or remove another application as a device admin.
1873         <p>Not for use by third-party applications.
1874         @hide -->
1875    <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
1876        android:protectionLevel="signature|system" />
1877
1878    <!-- Allows low-level access to setting the orientation (actually
1879         rotation) of the screen.
1880         <p>Not for use by third-party applications. -->
1881    <permission android:name="android.permission.SET_ORIENTATION"
1882        android:protectionLevel="signature" />
1883
1884    <!-- Allows low-level access to setting the pointer speed.
1885         <p>Not for use by third-party applications. -->
1886    <permission android:name="android.permission.SET_POINTER_SPEED"
1887        android:protectionLevel="signature" />
1888
1889    <!-- Allows low-level access to setting input device calibration.
1890         <p>Not for use by normal applications.
1891         @hide -->
1892    <permission android:name="android.permission.SET_INPUT_CALIBRATION"
1893        android:protectionLevel="signature" />
1894
1895    <!-- Allows low-level access to setting the keyboard layout.
1896         <p>Not for use by third-party applications.
1897         @hide -->
1898    <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
1899        android:protectionLevel="signature" />
1900
1901    <!-- @SystemApi Allows an application to install packages.
1902    <p>Not for use by third-party applications. -->
1903    <permission android:name="android.permission.INSTALL_PACKAGES"
1904        android:protectionLevel="signature|system" />
1905
1906    <!-- Allows an application to clear user data.
1907    <p>Not for use by third-party applications. -->
1908    <permission android:name="android.permission.CLEAR_APP_USER_DATA"
1909        android:protectionLevel="signature" />
1910
1911    <!-- @SystemApi Allows an application to delete cache files.
1912    <p>Not for use by third-party applications. -->
1913    <permission android:name="android.permission.DELETE_CACHE_FILES"
1914        android:protectionLevel="signature|system" />
1915
1916    <!-- @SystemApi Allows an application to delete packages.
1917    <p>Not for use by third-party applications. -->
1918    <permission android:name="android.permission.DELETE_PACKAGES"
1919        android:protectionLevel="signature|system" />
1920
1921    <!-- @SystemApi Allows an application to move location of installed package.
1922         @hide -->
1923    <permission android:name="android.permission.MOVE_PACKAGE"
1924        android:protectionLevel="signature|system" />
1925
1926    <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
1927         enabled or not.
1928         <p>Not for use by third-party applications. -->
1929    <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
1930        android:protectionLevel="signature|system" />
1931
1932    <!-- @hide Allows an application to grant or revoke specific permissions. -->
1933    <permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS"
1934        android:protectionLevel="signature" />
1935
1936    <!-- Allows an application to use SurfaceFlinger's low level features.
1937    <p>Not for use by third-party applications. -->
1938    <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
1939        android:protectionLevel="signature" />
1940
1941    <!-- @SystemApi Allows an application to take screen shots and more generally
1942         get access to the frame buffer data.
1943         <p>Not for use by third-party applications. -->
1944    <permission android:name="android.permission.READ_FRAME_BUFFER"
1945        android:protectionLevel="signature|system" />
1946
1947    <!-- Allows an application to use InputFlinger's low level features.
1948         @hide -->
1949    <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
1950        android:protectionLevel="signature" />
1951
1952    <!-- Allows an application to configure and connect to Wifi displays
1953         @hide -->
1954    <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
1955        android:protectionLevel="signature" />
1956
1957    <!-- Allows an application to control low-level features of Wifi displays
1958         such as opening an RTSP socket.  This permission should only be used
1959         by the display manager.
1960         @hide -->
1961    <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
1962        android:protectionLevel="signature" />
1963
1964    <!-- @SystemApi Allows an application to control VPN.
1965         <p>Not for use by third-party applications.</p>
1966         @hide -->
1967    <permission android:name="android.permission.CONTROL_VPN"
1968        android:protectionLevel="signature|system" />
1969    <uses-permission android:name="android.permission.CONTROL_VPN" />
1970
1971    <!-- @SystemApi Allows an application to capture audio output.
1972         <p>Not for use by third-party applications.</p> -->
1973    <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
1974        android:protectionLevel="signature|system" />
1975
1976    <!-- @SystemApi Allows an application to capture audio for hotword detection.
1977         <p>Not for use by third-party applications.</p>
1978         @hide -->
1979    <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
1980        android:protectionLevel="signature|system" />
1981
1982    <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
1983         <p>Not for use by third-party applications.</p>
1984         @hide -->
1985    <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
1986        android:protectionLevel="signature|system" />
1987
1988    <!-- @SystemApi Allows an application to capture video output.
1989         <p>Not for use by third-party applications.</p> -->
1990    <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
1991        android:protectionLevel="signature|system" />
1992
1993    <!-- @SystemApi Allows an application to capture secure video output.
1994         <p>Not for use by third-party applications.</p> -->
1995    <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
1996        android:protectionLevel="signature|system" />
1997
1998    <!-- @SystemApi Allows an application to know what content is playing and control its playback.
1999         <p>Not for use by third-party applications due to privacy of media consumption</p>  -->
2000    <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
2001        android:protectionLevel="signature|system" />
2002
2003    <!-- Required to be able to disable the device (very dangerous!).
2004    <p>Not for use by third-party applications.. -->
2005    <permission android:name="android.permission.BRICK"
2006        android:protectionLevel="signature" />
2007
2008    <!-- @SystemApi Required to be able to reboot the device.
2009    <p>Not for use by third-party applications. -->
2010    <permission android:name="android.permission.REBOOT"
2011        android:protectionLevel="signature|system" />
2012
2013   <!-- Allows low-level access to power management.
2014   <p>Not for use by third-party applications. -->
2015    <permission android:name="android.permission.DEVICE_POWER"
2016        android:protectionLevel="signature" />
2017
2018   <!-- Allows access to the PowerManager.userActivity function.
2019   <p>Not for use by third-party applications. @hide @SystemApi -->
2020    <permission android:name="android.permission.USER_ACTIVITY"
2021        android:protectionLevel="signature|system" />
2022
2023   <!-- @hide Allows low-level access to tun tap driver -->
2024    <permission android:name="android.permission.NET_TUNNELING"
2025        android:protectionLevel="signature" />
2026
2027    <!-- Run as a manufacturer test application, running as the root user.
2028         Only available when the device is running in manufacturer test mode.
2029         <p>Not for use by third-party applications. -->
2030    <permission android:name="android.permission.FACTORY_TEST"
2031        android:protectionLevel="signature" />
2032
2033    <!-- Allows an application to broadcast a notification that an application
2034         package has been removed.
2035         <p>Not for use by third-party applications. -->
2036    <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
2037        android:protectionLevel="signature" />
2038
2039    <!-- Allows an application to broadcast an SMS receipt notification.
2040    <p>Not for use by third-party applications. -->
2041    <permission android:name="android.permission.BROADCAST_SMS"
2042        android:protectionLevel="signature" />
2043
2044    <!-- Allows an application to broadcast a WAP PUSH receipt notification.
2045    <p>Not for use by third-party applications. -->
2046    <permission android:name="android.permission.BROADCAST_WAP_PUSH"
2047        android:protectionLevel="signature" />
2048
2049    <!-- @SystemApi Allows an application to broadcast privileged networking requests.
2050         <p>Not for use by third-party applications. @hide -->
2051    <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED"
2052        android:protectionLevel="signature|system" />
2053
2054    <!-- @SystemApi Not for use by third-party applications. -->
2055    <permission android:name="android.permission.MASTER_CLEAR"
2056        android:protectionLevel="signature|system" />
2057
2058    <!-- @SystemApi Allows an application to call any phone number, including emergency
2059         numbers, without going through the Dialer user interface for the user
2060         to confirm the call being placed.
2061         <p>Not for use by third-party applications. -->
2062    <permission android:name="android.permission.CALL_PRIVILEGED"
2063        android:protectionLevel="signature|system" />
2064
2065    <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
2066    <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
2067        android:protectionLevel="signature|system" />
2068
2069    <!-- @SystemApi Allows an application to perform SIM Activation @hide -->
2070    <permission android:name="android.permission.PERFORM_SIM_ACTIVATION"
2071        android:protectionLevel="signature|system" />
2072
2073    <!-- @SystemApi Allows enabling/disabling location update notifications from
2074         the radio.
2075         <p>Not for use by third-party applications. -->
2076    <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
2077        android:protectionLevel="signature|system" />
2078
2079    <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
2080         database, to change values that get uploaded.
2081         <p>Not for use by third-party applications. -->
2082    <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
2083        android:protectionLevel="signature|system" />
2084
2085    <!-- @SystemApi Allows an application to collect component usage
2086         statistics
2087         <p>Not for use by third-party applications. -->
2088    <permission android:name="android.permission.PACKAGE_USAGE_STATS"
2089        android:protectionLevel="signature|development|appop" />
2090    <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" />
2091
2092    <!-- @SystemApi Allows an application to collect battery statistics -->
2093    <permission android:name="android.permission.BATTERY_STATS"
2094        android:protectionLevel="signature|system|development" />
2095
2096    <!-- @SystemApi Allows an application to control the backup and restore process.
2097    <p>Not for use by third-party applications.
2098         @hide pending API council -->
2099    <permission android:name="android.permission.BACKUP"
2100        android:protectionLevel="signature|system" />
2101
2102    <!-- Allows a package to launch the secure full-backup confirmation UI.
2103         ONLY the system process may hold this permission.
2104         @hide -->
2105    <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
2106        android:protectionLevel="signature" />
2107
2108    <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
2109         to ensure that only the system can bind to it. -->
2110    <permission android:name="android.permission.BIND_REMOTEVIEWS"
2111        android:protectionLevel="signature|system" />
2112
2113    <!-- @SystemApi Allows an application to tell the AppWidget service which application
2114         can access AppWidget's data.  The normal user flow is that a user
2115         picks an AppWidget to go into a particular host, thereby giving that
2116         host application access to the private data from the AppWidget app.
2117         An application that has this permission should honor that contract.
2118         <p>Not for use by third-party applications. -->
2119    <permission android:name="android.permission.BIND_APPWIDGET"
2120        android:protectionLevel="signature|system" />
2121
2122    <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
2123         keyguard widget
2124         @hide -->
2125    <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
2126        android:protectionLevel="signature|system" />
2127
2128    <!-- @SystemApi Internal permission allowing an application to query/set which
2129         applications can bind AppWidgets.
2130         @hide -->
2131    <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
2132        android:protectionLevel="signature|system" />
2133
2134    <!-- Allows applications to change the background data setting.
2135    <p>Not for use by third-party applications.
2136         @hide pending API council -->
2137    <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
2138        android:protectionLevel="signature" />
2139
2140    <!-- @SystemApi This permission can be used on content providers to allow the global
2141         search system to access their data.  Typically it used when the
2142         provider has some permissions protecting it (which global search
2143         would not be expected to hold), and added as a read-only permission
2144         to the path in the provider where global search queries are
2145         performed.  This permission can not be held by regular applications;
2146         it is used by applications to protect themselves from everyone else
2147         besides global search. -->
2148    <permission android:name="android.permission.GLOBAL_SEARCH"
2149        android:protectionLevel="signature|system" />
2150
2151    <!-- Internal permission protecting access to the global search
2152         system: ensures that only the system can access the provider
2153         to perform queries (since this otherwise provides unrestricted
2154         access to a variety of content providers), and to write the
2155         search statistics (to keep applications from gaming the source
2156         ranking).
2157         @hide -->
2158    <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
2159        android:protectionLevel="signature" />
2160
2161    <!-- @SystemApi Internal permission to allows an application to read indexable data.
2162        @hide -->
2163    <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
2164        android:protectionLevel="signature|system" />
2165
2166    <!-- @SystemApi Allows applications to set a live wallpaper.
2167         @hide XXX Change to signature once the picker is moved to its
2168         own apk as Ghod Intended. -->
2169    <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
2170        android:protectionLevel="signature|system" />
2171
2172    <!-- @SystemApi Allows applications to read dream settings and dream state.
2173         @hide -->
2174    <permission android:name="android.permission.READ_DREAM_STATE"
2175        android:protectionLevel="signature|system" />
2176
2177    <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
2178         @hide -->
2179    <permission android:name="android.permission.WRITE_DREAM_STATE"
2180        android:protectionLevel="signature|system" />
2181
2182    <!-- @SystemApi Allow an application to read and write the cache partition.
2183         @hide -->
2184    <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
2185        android:protectionLevel="signature|system" />
2186
2187    <!-- Must be required by default container service so that only
2188         the system can bind to it and use it to copy
2189         protected data to secure containers or files
2190         accessible to the system.
2191         @hide -->
2192    <permission android:name="android.permission.COPY_PROTECTED_DATA"
2193        android:protectionLevel="signature" />
2194
2195    <!-- @SystemApi Internal permission protecting access to the encryption methods
2196        @hide
2197    -->
2198    <permission android:name="android.permission.CRYPT_KEEPER"
2199        android:protectionLevel="signature|system" />
2200
2201    <!-- @SystemApi Allows an application to read historical network usage for
2202         specific networks and applications. @hide -->
2203    <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
2204        android:protectionLevel="signature|system" />
2205
2206    <!-- Allows an application to manage network policies (such as warning and disable
2207         limits) and to define application-specific rules. @hide -->
2208    <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
2209        android:protectionLevel="signature" />
2210
2211    <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used
2212         by system services like download manager and media server. Not for use by
2213         third party apps. @hide -->
2214    <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
2215        android:protectionLevel="signature|system" />
2216
2217    <!-- C2DM permission.
2218         @hide Used internally.
2219     -->
2220    <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
2221          android:protectionLevel="signature" />
2222    <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
2223
2224    <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
2225         trust it to verify packages.
2226    -->
2227    <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
2228        android:protectionLevel="signature|system" />
2229
2230    <!-- Must be required by package verifier receiver, to ensure that only the
2231         system can interact with it.
2232         @hide
2233    -->
2234    <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
2235        android:protectionLevel="signature" />
2236
2237    <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the
2238         PackageManager will trust it to verify intent filters.
2239    -->
2240    <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT"
2241        android:protectionLevel="signature|system" />
2242
2243    <!-- Must be required by intent filter verifier receiver, to ensure that only the
2244         system can interact with it.
2245         @hide
2246    -->
2247    <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER"
2248        android:protectionLevel="signature" />
2249
2250    <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
2251         @hide -->
2252    <permission android:name="android.permission.SERIAL_PORT"
2253        android:protectionLevel="signature|system" />
2254
2255    <!-- Allows the holder to access content providers from outside an ApplicationThread.
2256         This permission is enforced by the ActivityManagerService on the corresponding APIs,
2257         in particular ActivityManagerService#getContentProviderExternal(String) and
2258         ActivityManagerService#removeContentProviderExternal(String).
2259         @hide
2260    -->
2261    <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
2262        android:protectionLevel="signature" />
2263
2264    <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
2265         OTA reboot *not* occur while the lock is held.
2266         @hide -->
2267    <permission android:name="android.permission.UPDATE_LOCK"
2268        android:protectionLevel="signatureOrSystem" />
2269
2270    <!-- @SystemApi Allows an application to read the current set of notifications, including
2271         any metadata and intents attached.
2272         @hide -->
2273    <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
2274        android:protectionLevel="signature|system" />
2275
2276    <!-- Allows access to keyguard secure storage.  Only allowed for system processes.
2277        @hide -->
2278    <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
2279        android:protectionLevel="signature" />
2280
2281    <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide -->
2282    <permission android:name="android.permission.MANAGE_FINGERPRINT"
2283        android:protectionLevel="signature" />
2284
2285    <!-- Allows an application to control keyguard.  Only allowed for system processes.
2286        @hide -->
2287    <permission android:name="android.permission.CONTROL_KEYGUARD"
2288        android:protectionLevel="signature" />
2289
2290    <!-- Allows an application to listen to trust changes.  Only allowed for system processes.
2291        @hide -->
2292    <permission android:name="android.permission.TRUST_LISTENER"
2293        android:protectionLevel="signature" />
2294
2295    <!-- @SystemApi Allows an application to provide a trust agent.
2296         @hide For security reasons, this is a platform-only permission. -->
2297    <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
2298        android:protectionLevel="signatureOrSystem" />
2299
2300    <!-- Allows an application to launch the trust agent settings activity.
2301        @hide -->
2302    <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
2303        android:protectionLevel="signatureOrSystem" />
2304
2305    <!-- @SystemApi Must be required by an {@link
2306        android.service.trust.TrustAgentService},
2307        to ensure that only the system can bind to it.
2308        @hide -->
2309    <permission android:name="android.permission.BIND_TRUST_AGENT"
2310        android:protectionLevel="signature" />
2311
2312    <!-- Must be required by an {@link
2313         android.service.notification.NotificationListenerService},
2314         to ensure that only the system can bind to it. -->
2315    <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
2316        android:protectionLevel="signature" />
2317
2318    <!-- Must be required by a {@link
2319         android.service.chooser.ChooserTargetService}, to ensure that
2320         only the system can bind to it. -->
2321    <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE"
2322        android:protectionLevel="signature" />
2323
2324    <!-- @SystemApi Must be required by a {@link
2325         android.service.notification.ConditionProviderService},
2326         to ensure that only the system can bind to it.
2327         @hide -->
2328    <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
2329        android:protectionLevel="signature" />
2330
2331    <!-- Must be required by a {@link android.media.routing.MediaRouteService},
2332         to ensure that only the system can bind to it. -->
2333    <permission android:name="android.permission.BIND_MEDIA_ROUTE_SERVICE"
2334        android:protectionLevel="signature" />
2335
2336    <!-- Must be required by an {@link android.service.dreams.DreamService},
2337         to ensure that only the system can bind to it. -->
2338    <permission android:name="android.permission.BIND_DREAM_SERVICE"
2339        android:protectionLevel="signature" />
2340
2341    <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
2342         carrier setup application to enforce that this permission is required
2343         @hide This is not a third-party API (intended for OEMs and system apps). -->
2344    <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
2345        android:protectionLevel="signature|system" />
2346
2347    <!-- @SystemApi Allows an application to listen for network condition observations.
2348         @hide This is not a third-party API (intended for system apps). -->
2349    <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
2350        android:protectionLevel="signature|system" />
2351
2352    <!-- @SystemApi Allows an application to provision and access DRM certificates
2353         @hide This is not a third-party API (intended for system apps). -->
2354    <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
2355        android:protectionLevel="signature|system" />
2356
2357    <!-- Api Allows an application to manage media projection sessions.
2358         @hide This is not a third-party API (intended for system apps). -->
2359    <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION"
2360        android:protectionLevel="signature" />
2361
2362    <!-- @SystemApi Allows an application to read install sessions
2363         @hide This is not a third-party API (intended for system apps). -->
2364    <permission android:name="android.permission.READ_INSTALL_SESSIONS"
2365        android:label="@string/permlab_readInstallSessions"
2366        android:description="@string/permdesc_readInstallSessions"
2367        android:protectionLevel="normal"/>
2368
2369    <!-- @SystemApi Allows an application to remove DRM certificates
2370         @hide This is not a third-party API (intended for system apps). -->
2371    <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES"
2372        android:protectionLevel="signature|system" />
2373
2374    <!-- Must be required by a {@link android.service.carrier.CarrierMessagingService}.
2375         Any service that filters for this intent must be a carrier privileged app. -->
2376    <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE"
2377        android:protectionLevel="signature|system" />
2378
2379    <!-- Allows an application to interact with the currently active
2380         {@link android.service.voice.VoiceInteractionService}.
2381         @hide -->
2382    <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE"
2383        android:protectionLevel="signature" />
2384
2385    <!-- Allows an app that has this permission and a permissions to install packages
2386         to request all runtime permissions to be granted at installation.
2387     @hide -->
2388    <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS"
2389        android:protectionLevel="signature" />
2390
2391    <!-- Allows receiving status updates from a device initializer.
2392         @hide Not for use by third-party applications. -->
2393    <permission android:name="android.permission.RECEIVE_DEVICE_INITIALIZER_STATUS"
2394                android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
2395                android:protectionLevel="signature" />
2396
2397    <!-- The system process that pulls carrier configuration from carrier apps will
2398         have this permission. Carrier apps that provide
2399         {@link android.service.carrier.CarrierConfigService} should require this
2400         permission for clients binding to their service. -->
2401    <permission android:name="android.permission.BIND_CARRIER_CONFIG_SERVICE"
2402        android:label="@string/permlab_bindCarrierConfigService"
2403        android:description="@string/permdesc_bindCarrierConfigService"
2404        android:protectionLevel="signature|system" />
2405
2406    <!-- The system process is explicitly the only one allowed to launch the
2407         confirmation UI for full backup/restore -->
2408    <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
2409
2410    <application android:process="system"
2411                 android:persistent="true"
2412                 android:hasCode="false"
2413                 android:label="@string/android_system_label"
2414                 android:allowClearUserData="false"
2415                 android:backupAgent="com.android.server.backup.SystemBackupAgent"
2416                 android:killAfterRestore="false"
2417                 android:icon="@drawable/ic_launcher_android"
2418                 android:supportsRtl="true">
2419        <activity android:name="com.android.internal.app.ChooserActivity"
2420                android:theme="@style/Theme.DeviceDefault.Resolver"
2421                android:finishOnCloseSystemDialogs="true"
2422                android:excludeFromRecents="true"
2423                android:documentLaunchMode="never"
2424                android:relinquishTaskIdentity="true"
2425                android:process=":ui">
2426            <intent-filter>
2427                <action android:name="android.intent.action.CHOOSER" />
2428                <category android:name="android.intent.category.DEFAULT" />
2429            </intent-filter>
2430        </activity>
2431        <activity android:name="com.android.internal.app.IntentForwarderActivity"
2432                android:finishOnCloseSystemDialogs="true"
2433                android:theme="@style/Theme.NoDisplay"
2434                android:excludeFromRecents="true"
2435                android:label="@string/user_owner_label"
2436                android:exported="true"
2437                >
2438        </activity>
2439        <activity-alias android:name="com.android.internal.app.ForwardIntentToUserOwner"
2440                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2441                android:exported="true"
2442                android:label="@string/user_owner_label">
2443        </activity-alias>
2444        <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
2445                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2446                android:icon="@drawable/ic_corp_icon"
2447                android:exported="true"
2448                android:label="@string/managed_profile_label">
2449        </activity-alias>
2450        <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
2451                android:theme="@style/Theme.Material.Light.Dialog"
2452                android:label="@string/heavy_weight_switcher_title"
2453                android:finishOnCloseSystemDialogs="true"
2454                android:excludeFromRecents="true"
2455                android:process=":ui">
2456        </activity>
2457        <activity android:name="com.android.internal.app.PlatLogoActivity"
2458                android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
2459                android:configChanges="orientation|keyboardHidden"
2460                android:process=":ui">
2461        </activity>
2462        <activity android:name="com.android.internal.app.DisableCarModeActivity"
2463                android:theme="@style/Theme.NoDisplay"
2464                android:excludeFromRecents="true"
2465                android:process=":ui">
2466        </activity>
2467        <activity android:name="com.android.internal.app.DumpHeapActivity"
2468                android:theme="@style/Theme.Translucent.NoTitleBar"
2469                android:label="@string/dump_heap_title"
2470                android:finishOnCloseSystemDialogs="true"
2471                android:noHistory="true"
2472                android:excludeFromRecents="true"
2473                android:process=":ui">
2474        </activity>
2475        <provider android:name="com.android.server.am.DumpHeapProvider"
2476                android:authorities="com.android.server.heapdump"
2477                android:grantUriPermissions="true"
2478                android:multiprocess="false"
2479                android:singleUser="true" />
2480
2481        <activity android:name="android.accounts.ChooseAccountActivity"
2482                android:excludeFromRecents="true"
2483                android:exported="true"
2484                android:theme="@style/Theme.Material.Light.Dialog"
2485                android:label="@string/choose_account_label"
2486                android:process=":ui">
2487        </activity>
2488
2489        <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
2490                android:excludeFromRecents="true"
2491                android:exported="true"
2492                android:theme="@style/Theme.Material.Light.Dialog"
2493                android:label="@string/choose_account_label"
2494                android:process=":ui">
2495        </activity>
2496
2497        <activity android:name="android.accounts.ChooseAccountTypeActivity"
2498                android:excludeFromRecents="true"
2499                android:theme="@style/Theme.Material.Light.Dialog"
2500                android:label="@string/choose_account_label"
2501                android:process=":ui">
2502        </activity>
2503
2504        <activity android:name="android.accounts.CantAddAccountActivity"
2505                android:excludeFromRecents="true"
2506                android:exported="true"
2507                android:theme="@style/Theme.Material.Light.Dialog.NoActionBar"
2508                android:process=":ui">
2509        </activity>
2510
2511        <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
2512                android:excludeFromRecents="true"
2513                android:exported="true"
2514                android:theme="@style/Theme.Material.Light.DialogWhenLarge"
2515                android:process=":ui">
2516        </activity>
2517
2518        <activity android:name="android.content.SyncActivityTooManyDeletes"
2519               android:theme="@style/Theme.Material.Light.Dialog"
2520               android:label="@string/sync_too_many_deletes"
2521               android:process=":ui">
2522        </activity>
2523
2524        <activity android:name="com.android.internal.app.ShutdownActivity"
2525            android:permission="android.permission.SHUTDOWN"
2526            android:theme="@style/Theme.NoDisplay"
2527            android:excludeFromRecents="true">
2528            <intent-filter>
2529                <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" />
2530                <category android:name="android.intent.category.DEFAULT" />
2531            </intent-filter>
2532            <intent-filter>
2533                <action android:name="android.intent.action.REBOOT" />
2534                <category android:name="android.intent.category.DEFAULT" />
2535            </intent-filter>
2536        </activity>
2537
2538        <activity android:name="com.android.internal.app.NetInitiatedActivity"
2539                android:theme="@style/Theme.Material.Light.Dialog.Alert"
2540                android:excludeFromRecents="true"
2541                android:process=":ui">
2542        </activity>
2543
2544        <activity android:name="com.android.internal.app.RestrictionsPinActivity"
2545                android:theme="@style/Theme.Material.Light.Dialog.Alert"
2546                android:excludeFromRecents="true"
2547                android:windowSoftInputMode="adjustPan"
2548                android:process=":ui">
2549            <intent-filter android:priority="100">
2550                <action android:name="android.intent.action.RESTRICTIONS_CHALLENGE" />
2551                <category android:name="android.intent.category.DEFAULT" />
2552            </intent-filter>
2553        </activity>
2554
2555        <receiver android:name="com.android.server.BootReceiver"
2556                android:primaryUserOnly="true">
2557            <intent-filter android:priority="1000">
2558                <action android:name="android.intent.action.BOOT_COMPLETED" />
2559            </intent-filter>
2560        </receiver>
2561
2562        <receiver android:name="com.android.server.updates.CertPinInstallReceiver"
2563                android:permission="android.permission.UPDATE_CONFIG">
2564            <intent-filter>
2565                <action android:name="android.intent.action.UPDATE_PINS" />
2566                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2567            </intent-filter>
2568        </receiver>
2569
2570        <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver"
2571                android:permission="android.permission.UPDATE_CONFIG">
2572            <intent-filter>
2573                <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
2574                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2575            </intent-filter>
2576        </receiver>
2577
2578        <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver"
2579                android:permission="android.permission.UPDATE_CONFIG">
2580            <intent-filter>
2581                <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
2582                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2583            </intent-filter>
2584        </receiver>
2585
2586        <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver"
2587                android:permission="android.permission.UPDATE_CONFIG">
2588            <intent-filter>
2589                <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
2590                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2591            </intent-filter>
2592        </receiver>
2593
2594        <receiver android:name="com.android.server.updates.TzDataInstallReceiver"
2595                android:permission="android.permission.UPDATE_CONFIG">
2596            <intent-filter>
2597                <action android:name="android.intent.action.UPDATE_TZDATA" />
2598                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2599            </intent-filter>
2600        </receiver>
2601
2602        <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver"
2603                android:permission="android.permission.UPDATE_CONFIG">
2604            <intent-filter>
2605                <action android:name="android.intent.action.UPDATE_SEPOLICY" />
2606                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2607            </intent-filter>
2608        </receiver>
2609
2610        <receiver android:name="com.android.server.MasterClearReceiver"
2611            android:permission="android.permission.MASTER_CLEAR">
2612            <intent-filter
2613                    android:priority="100" >
2614                <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR -->
2615                <action android:name="android.intent.action.MASTER_CLEAR" />
2616
2617                <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
2618                <action android:name="com.google.android.c2dm.intent.RECEIVE" />
2619                <category android:name="android.intent.category.MASTER_CLEAR" />
2620            </intent-filter>
2621        </receiver>
2622
2623        <service android:name="com.android.internal.os.storage.ExternalStorageFormatter"
2624            android:permission="android.permission.MASTER_CLEAR"
2625            android:exported="true" />
2626
2627        <service android:name="android.hardware.location.GeofenceHardwareService"
2628            android:permission="android.permission.LOCATION_HARDWARE"
2629            android:exported="false" />
2630
2631        <service android:name="com.android.internal.backup.LocalTransportService"
2632                android:permission="android.permission.CONFIRM_FULL_BACKUP"
2633                android:exported="false">
2634            <intent-filter>
2635                <action android:name="android.backup.TRANSPORT_HOST" />
2636            </intent-filter>
2637        </service>
2638
2639        <service android:name="com.android.server.MountServiceIdler"
2640                 android:exported="true"
2641                 android:permission="android.permission.BIND_JOB_SERVICE" >
2642        </service>
2643
2644        <service android:name="com.android.server.backup.FullBackupJob"
2645                 android:exported="true"
2646                 android:permission="android.permission.BIND_JOB_SERVICE" >
2647        </service>
2648
2649        <service android:name="com.android.server.backup.KeyValueBackupJob"
2650                 android:permission="android.permission.BIND_JOB_SERVICE" >
2651        </service>
2652
2653        <service
2654            android:name="com.android.server.pm.BackgroundDexOptService"
2655            android:exported="true"
2656            android:permission="android.permission.BIND_JOB_SERVICE">
2657        </service>
2658
2659    </application>
2660
2661</manifest>
2662