AndroidManifest.xml revision bfa216ac261dd3c5035ad38795650ce5f4ce6fb7
1<?xml version="1.0" encoding="utf-8"?>
2<!--
3/* //device/apps/common/AndroidManifest.xml
4**
5** Copyright 2006, The Android Open Source Project
6**
7** Licensed under the Apache License, Version 2.0 (the "License");
8** you may not use this file except in compliance with the License.
9** You may obtain a copy of the License at
10**
11**     http://www.apache.org/licenses/LICENSE-2.0
12**
13** Unless required by applicable law or agreed to in writing, software
14** distributed under the License is distributed on an "AS IS" BASIS,
15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16** See the License for the specific language governing permissions and
17** limitations under the License.
18*/
19-->
20<manifest xmlns:android="http://schemas.android.com/apk/res/android"
21    package="android" coreApp="true" android:sharedUserId="android.uid.system"
22    android:sharedUserLabel="@string/android_system_label">
23
24    <!-- ================================================ -->
25    <!-- Special broadcasts that only the system can send -->
26    <!-- ================================================ -->
27    <eat-comment />
28
29    <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
30    <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
31    <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
32    <protected-broadcast android:name="android.intent.action.TIME_SET" />
33    <protected-broadcast android:name="android.intent.action.TIME_TICK" />
34    <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
35    <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
36    <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
37    <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
38    <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
39    <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
40    <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
41    <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
42    <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
43    <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
44    <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
45    <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
46    <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
47    <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
48    <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
49    <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
50    <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
51    <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
52    <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
53    <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
54    <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
55    <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
56    <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
57    <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
58    <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
59    <protected-broadcast android:name="android.intent.action.CHARGING" />
60    <protected-broadcast android:name="android.intent.action.DISCHARGING" />
61    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
62    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
63    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
64    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
65    <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
66    <protected-broadcast android:name="android.intent.action.REBOOT" />
67    <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
68    <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
69    <protected-broadcast android:name="android.intent.action.USER_ADDED" />
70    <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
71    <protected-broadcast android:name="android.intent.action.USER_STARTING" />
72    <protected-broadcast android:name="android.intent.action.USER_STARTED" />
73    <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
74    <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
75    <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
76    <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
77    <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
78    <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" />
79
80    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
81    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" />
82    <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" />
83    <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" />
84    <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" />
85
86    <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" />
87
88    <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
89    <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
90    <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
91    <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
92    <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" />
93    <protected-broadcast android:name="android.app.action.SEND_DEVICE_INITIALIZER_STATUS" />
94
95    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
96    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
97    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
98    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
99    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
100    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
101
102    <protected-broadcast android:name="android.os.action.SETTING_RESTORED" />
103
104    <protected-broadcast android:name="android.backup.intent.RUN" />
105    <protected-broadcast android:name="android.backup.intent.CLEAR" />
106    <protected-broadcast android:name="android.backup.intent.INIT" />
107
108    <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
109    <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
110    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
111    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
112    <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
113    <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
114    <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
115    <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
116    <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
117    <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
118    <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
119    <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
120    <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
121    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
122    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
123    <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
124    <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
125    <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
126    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
127    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
128    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
129    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
130    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
131    <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
132    <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
133    <protected-broadcast
134        android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
135    <protected-broadcast
136        android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
137    <protected-broadcast
138        android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
139    <protected-broadcast
140        android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
141    <protected-broadcast
142        android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
143    <protected-broadcast
144        android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
145    <protected-broadcast
146        android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
147    <protected-broadcast
148        android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
149    <protected-broadcast
150        android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
151    <protected-broadcast
152        android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
153    <protected-broadcast
154        android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
155    <protected-broadcast
156        android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
157    <protected-broadcast
158        android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
159    <protected-broadcast
160        android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
161   <protected-broadcast
162        android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
163    <protected-broadcast
164        android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
165    <protected-broadcast
166        android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
167    <protected-broadcast
168        android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
169    <protected-broadcast
170        android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
171    <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" />
172    <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
173    <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
174    <protected-broadcast android:name="android.btopp.intent.action.LIST" />
175    <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
176    <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
177    <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
178    <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
179    <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
180    <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
181    <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
182    <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
183    <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
184    <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
185    <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
186
187    <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
188
189    <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
190    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
191    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
192    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
193    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
194
195    <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
196    <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" />
197
198    <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
199    <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
200    <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
201    <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
202    <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
203    <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
204    <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
205    <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
206
207    <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
208    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
209    <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
210    <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
211    <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
212    <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
213    <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
214    <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
215    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
216    <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
217
218    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" />
219    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
220    <!-- @deprecated.  Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. -->
221    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
222    <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
223    <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
224    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
225
226    <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
227
228    <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" />
229    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
230    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
231    <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
232
233    <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
234
235    <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
236    <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
237
238    <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
239
240    <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
241    <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
242    <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
243    <protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" />
244
245    <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
246    <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
247    <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
248    <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
249    <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" />
250    <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
251    <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
252    <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
253    <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
254    <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
255    <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
256    <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
257    <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
258    <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
259    <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
260    <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
261    <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
262    <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
263    <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
264    <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
265    <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
266    <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
267    <protected-broadcast
268            android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
269    <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
270    <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
271    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
272    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
273    <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
274    <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
275    <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
276    <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" />
277
278    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
279    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
280
281    <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
282
283    <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
284
285    <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" />
286
287    <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
288    <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
289    <protected-broadcast android:name="android.location.MODE_CHANGED" />
290    <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
291    <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
292
293    <protected-broadcast
294        android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
295
296    <!-- Defined in RestrictionsManager -->
297    <protected-broadcast
298        android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
299    <!-- Defined in RestrictionsManager -->
300
301    <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
302    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
303    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
304    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
305    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
306
307    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SUBSCRIPTION_CHANGED" />
308    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED" />
309    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" />
310    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" />
311    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" />
312    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" />
313
314    <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" />
315    <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" />
316
317    <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" />
318    <protected-broadcast android:name="android.service.persistentdata.action.WIPE_IF_ALLOWED" />
319
320    <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" />
321    <!-- ====================================================================== -->
322    <!--                          RUNTIME PERMISSIONS                           -->
323    <!-- ====================================================================== -->
324    <eat-comment />
325
326    <!-- ====================================================================== -->
327    <!-- Permissions for accessing user's contacts including personal profile   -->
328    <!-- ====================================================================== -->
329    <eat-comment />
330
331    <!-- Used for runtime permissions related to user's contacts and profile. -->
332    <permission-group android:name="android.permission-group.CONTACTS"
333        android:icon="@drawable/perm_group_social_info"
334        android:label="@string/permgrouplab_contacts"
335        android:description="@string/permgroupdesc_contacts"
336        android:priority="100" />
337
338    <!-- Allows an application to read the user's contacts data. -->
339    <permission android:name="android.permission.READ_CONTACTS"
340        android:permissionGroup="android.permission-group.CONTACTS"
341        android:label="@string/permlab_readContacts"
342        android:description="@string/permdesc_readContacts"
343        android:protectionLevel="dangerous" />
344
345    <!-- Allows an application to write the user's contacts data. -->
346    <permission android:name="android.permission.WRITE_CONTACTS"
347        android:permissionGroup="android.permission-group.CONTACTS"
348        android:label="@string/permlab_writeContacts"
349        android:description="@string/permdesc_writeContacts"
350        android:protectionLevel="dangerous" />
351
352    <!-- @deprecated No longer enforced. This was last enforced in API version 22. -->
353    <permission android:name="android.permission.READ_PROFILE"
354        android:permissionGroup="android.permission-group.CONTACTS"
355        android:label="@string/permlab_readProfile"
356        android:description="@string/permdesc_readProfile"
357        android:protectionLevel="dangerous" />
358
359    <!-- @deprecated No longer enforced. This was last enforced in API version 22. -->
360    <permission android:name="android.permission.WRITE_PROFILE"
361        android:permissionGroup="android.permission-group.CONTACTS"
362        android:label="@string/permlab_writeProfile"
363        android:description="@string/permdesc_writeProfile"
364        android:protectionLevel="dangerous" />
365
366    <!-- ====================================================================== -->
367    <!-- Permissions for accessing user's calendar                              -->
368    <!-- ====================================================================== -->
369    <eat-comment />
370
371    <!-- Used for runtime permissions related to user's calendar. -->
372    <permission-group android:name="android.permission-group.CALENDAR"
373        android:icon="@drawable/perm_group_calendar"
374        android:label="@string/permgrouplab_calendar"
375        android:description="@string/permgroupdesc_calendar"
376        android:priority="200" />
377
378    <!-- Allows an application to read the user's calendar data. -->
379    <permission android:name="android.permission.READ_CALENDAR"
380        android:permissionGroup="android.permission-group.CALENDAR"
381        android:label="@string/permlab_readCalendar"
382        android:description="@string/permdesc_readCalendar"
383        android:protectionLevel="dangerous" />
384
385    <!-- Allows an application to write the user's calendar data. -->
386    <permission android:name="android.permission.WRITE_CALENDAR"
387        android:permissionGroup="android.permission-group.CALENDAR"
388        android:label="@string/permlab_writeCalendar"
389        android:description="@string/permdesc_writeCalendar"
390        android:protectionLevel="dangerous" />
391
392    <!-- ====================================================================== -->
393    <!-- Permissions for accessing and modifying user's SMS messages            -->
394    <!-- ====================================================================== -->
395    <eat-comment />
396
397    <!-- Used for runtime permissions related to user's SMS messages. -->
398    <permission-group android:name="android.permission-group.SMS"
399        android:icon="@drawable/perm_group_messages"
400        android:label="@string/permgrouplab_sms"
401        android:description="@string/permgroupdesc_sms"
402        android:priority="300" />
403
404    <!-- Allows an application to send SMS messages. -->
405    <permission android:name="android.permission.SEND_SMS"
406        android:permissionGroup="android.permission-group.SMS"
407        android:label="@string/permlab_sendSms"
408        android:description="@string/permdesc_sendSms"
409        android:permissionFlags="costsMoney"
410        android:protectionLevel="dangerous" />
411
412    <!-- Allows an application to receive SMS messages. -->
413    <permission android:name="android.permission.RECEIVE_SMS"
414        android:permissionGroup="android.permission-group.SMS"
415        android:label="@string/permlab_receiveSms"
416        android:description="@string/permdesc_receiveSms"
417        android:protectionLevel="dangerous"/>
418
419    <!-- Allows an application to read SMS messages. -->
420    <permission android:name="android.permission.READ_SMS"
421        android:permissionGroup="android.permission-group.SMS"
422        android:label="@string/permlab_readSms"
423        android:description="@string/permdesc_readSms"
424        android:protectionLevel="dangerous" />
425
426    <!-- Allows an application to receive WAP push messages. -->
427    <permission android:name="android.permission.RECEIVE_WAP_PUSH"
428        android:permissionGroup="android.permission-group.SMS"
429        android:label="@string/permlab_receiveWapPush"
430        android:description="@string/permdesc_receiveWapPush"
431        android:protectionLevel="dangerous" />
432
433    <!-- Allows an application to monitor incoming MMS messages. -->
434    <permission android:name="android.permission.RECEIVE_MMS"
435        android:permissionGroup="android.permission-group.SMS"
436        android:label="@string/permlab_receiveMms"
437        android:description="@string/permdesc_receiveMms"
438        android:protectionLevel="dangerous" />
439
440    <!-- Allows an application to read previously received cell broadcast
441         messages and to register a content observer to get notifications when
442         a cell broadcast has been received and added to the database. For
443         emergency alerts, the database is updated immediately after the
444         alert dialog and notification sound/vibration/speech are presented.
445         The "read" column is then updated after the user dismisses the alert.
446         This enables supplementary emergency assistance apps to start loading
447         additional emergency information (if Internet access is available)
448         when the alert is first received, and to delay presenting the info
449         to the user until after the initial alert dialog is dismissed.
450         @hide Pending API council approval -->
451    <permission android:name="android.permission.READ_CELL_BROADCASTS"
452        android:permissionGroup="android.permission-group.SMS"
453        android:label="@string/permlab_readCellBroadcasts"
454        android:description="@string/permdesc_readCellBroadcasts"
455        android:protectionLevel="dangerous" />
456
457    <!-- =============================================================== -->
458    <!-- Permissions for accessing social info                           -->
459    <!-- =============================================================== -->
460    <eat-comment />
461
462    <!-- Used for permissions that provide access to the user's social connections,
463         such as contacts, call logs, social stream, etc.  This includes
464         both reading and writing of this data (which should generally be
465         expressed as two distinct permissions). -->
466
467    <permission-group android:name="android.permission-group.SOCIAL_INFO"
468        android:label="@string/permgrouplab_socialInfo"
469        android:icon="@drawable/perm_group_social_info"
470        android:description="@string/permgroupdesc_socialInfo"
471        android:permissionGroupFlags="personalInfo"
472        android:priority="1200" />
473
474    <!-- Allows an application to read from the user's social stream.
475         @deprecated This functionality will be unsupported in the future; cursors returned
476         will be empty. Please do not use. -->
477    <permission android:name="android.permission.READ_SOCIAL_STREAM"
478        android:permissionGroup="android.permission-group.SOCIAL_INFO"
479        android:protectionLevel="dangerous"
480        android:label="@string/permlab_readSocialStream"
481        android:description="@string/permdesc_readSocialStream" />
482
483    <!-- Allows an application to write (but not read) the user's
484         social stream data.
485         @deprecated This functionality will be unsupported in the future; cursors returned
486         will be empty. Please do not use. -->
487    <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
488        android:permissionGroup="android.permission-group.SOCIAL_INFO"
489        android:protectionLevel="dangerous"
490        android:label="@string/permlab_writeSocialStream"
491        android:description="@string/permdesc_writeSocialStream" />
492
493    <!-- ====================================================================== -->
494    <!-- Permissions for accessing the device location                          -->
495    <!-- ====================================================================== -->
496    <eat-comment />
497
498    <!-- Used for permissions that allow accessing the device location. -->
499    <permission-group android:name="android.permission-group.LOCATION"
500        android:icon="@drawable/perm_group_location"
501        android:label="@string/permgrouplab_location"
502        android:description="@string/permgroupdesc_location"
503        android:priority="400" />
504
505    <!-- Allows an app to access precise location. -->
506    <permission android:name="android.permission.ACCESS_FINE_LOCATION"
507        android:permissionGroup="android.permission-group.LOCATION"
508        android:label="@string/permlab_accessFineLocation"
509        android:description="@string/permdesc_accessFineLocation"
510        android:protectionLevel="dangerous" />
511
512    <!-- Allows an app to access approximate location. -->
513    <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
514        android:permissionGroup="android.permission-group.LOCATION"
515        android:label="@string/permlab_accessCoarseLocation"
516        android:description="@string/permdesc_accessCoarseLocation"
517        android:protectionLevel="dangerous" />
518
519    <!-- ====================================================================== -->
520    <!-- Permissions for accessing the device telephony                         -->
521    <!-- ====================================================================== -->
522    <eat-comment />
523
524    <!-- Used for permissions that are associated telephony features. -->
525    <permission-group android:name="android.permission-group.PHONE"
526        android:icon="@drawable/perm_group_phone_calls"
527        android:label="@string/permgrouplab_phone"
528        android:description="@string/permgroupdesc_phone"
529        android:priority="500" />
530
531    <!-- Allows read only access to phone state.
532         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
533         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
534         minSdkVersion}</a> and <a
535         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
536         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
537         grants your app this permission. If you don't need this permission, be sure your <a
538         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
539         targetSdkVersion}</a> is 4 or higher. -->
540    <permission android:name="android.permission.READ_PHONE_STATE"
541        android:permissionGroup="android.permission-group.PHONE"
542        android:label="@string/permlab_readPhoneState"
543        android:description="@string/permdesc_readPhoneState"
544        android:protectionLevel="dangerous" />
545
546    <!-- Allows an application to initiate a phone call without going through
547        the Dialer user interface for the user to confirm the call. -->
548    <permission android:name="android.permission.CALL_PHONE"
549        android:permissionGroup="android.permission-group.PHONE"
550        android:permissionFlags="costsMoney"
551        android:label="@string/permlab_callPhone"
552        android:description="@string/permdesc_callPhone"
553        android:protectionLevel="dangerous" />
554
555    <!-- Allows an application to read the user's call log.
556         <p class="note"><strong>Note:</strong> If your app uses the
557         {@link #READ_CONTACTS} permission and <em>both</em> your <a
558         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
559         minSdkVersion}</a> and <a
560         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
561         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
562         grants your app this permission. If you don't need this permission, be sure your <a
563         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
564         targetSdkVersion}</a> is 16 or higher.</p> -->
565    <permission android:name="android.permission.READ_CALL_LOG"
566        android:permissionGroup="android.permission-group.PHONE"
567        android:label="@string/permlab_readCallLog"
568        android:description="@string/permdesc_readCallLog"
569        android:protectionLevel="dangerous" />
570
571    <!-- Allows an application to write (but not read) the user's
572         contacts data.
573         <p class="note"><strong>Note:</strong> If your app uses the
574         {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
575         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
576         minSdkVersion}</a> and <a
577         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
578         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
579         grants your app this permission. If you don't need this permission, be sure your <a
580         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
581         targetSdkVersion}</a> is 16 or higher.</p>  -->
582    <permission android:name="android.permission.WRITE_CALL_LOG"
583        android:permissionGroup="android.permission-group.PHONE"
584        android:label="@string/permlab_writeCallLog"
585        android:description="@string/permdesc_writeCallLog"
586        android:protectionLevel="dangerous" />
587
588    <!-- Allows an application to add voicemails into the system. -->
589    <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
590        android:permissionGroup="android.permission-group.PHONE"
591        android:label="@string/permlab_addVoicemail"
592        android:description="@string/permdesc_addVoicemail"
593        android:protectionLevel="dangerous" />
594
595    <!-- Allows an application to use SIP service. -->
596    <permission android:name="android.permission.USE_SIP"
597        android:permissionGroup="android.permission-group.PHONE"
598        android:description="@string/permdesc_use_sip"
599        android:label="@string/permlab_use_sip"
600        android:protectionLevel="dangerous"/>
601
602    <!-- Allows an application to see the number being dialed during an outgoing
603         call with the option to redirect the call to a different number or
604         abort the call altogether. -->
605    <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
606        android:permissionGroup="android.permission-group.PHONE"
607        android:label="@string/permlab_processOutgoingCalls"
608        android:description="@string/permdesc_processOutgoingCalls"
609        android:protectionLevel="dangerous" />
610
611    <!-- ====================================================================== -->
612    <!-- Permissions for accessing the device microphone                        -->
613    <!-- ====================================================================== -->
614    <eat-comment />
615
616    <!-- Used for permissions that are associated with accessing
617         microphone audio from the device. Note that phone calls also capture audio
618         but are in a separate (more visible) permission group. -->
619    <permission-group android:name="android.permission-group.MICROPHONE"
620        android:icon="@drawable/perm_group_microphone"
621        android:label="@string/permgrouplab_microphone"
622        android:description="@string/permgroupdesc_microphone"
623        android:priority="600" />
624
625    <!-- Allows an application to record audio. -->
626    <permission android:name="android.permission.RECORD_AUDIO"
627        android:permissionGroup="android.permission-group.MICROPHONE"
628        android:label="@string/permlab_recordAudio"
629        android:description="@string/permdesc_recordAudio"
630        android:protectionLevel="dangerous"/>
631
632    <!-- ====================================================================== -->
633    <!-- Permissions for accessing the device camera                            -->
634    <!-- ====================================================================== -->
635    <eat-comment />
636
637    <!-- Used for permissions that are associated with accessing
638     camera or capturing images/video from the device. -->
639    <permission-group android:name="android.permission-group.CAMERA"
640        android:icon="@drawable/perm_group_camera"
641        android:label="@string/permgrouplab_camera"
642        android:description="@string/permgroupdesc_camera"
643        android:priority="700" />
644
645    <!-- Required to be able to access the camera device.
646         <p>This will automatically enforce the <a
647         href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code
648         &lt;uses-feature&gt;}</a> manifest element for <em>all</em> camera features.
649         If you do not require all camera features or can properly operate if a camera
650         is not available, then you must modify your manifest as appropriate in order to
651         install on devices that don't support all camera features.</p> -->
652    <permission android:name="android.permission.CAMERA"
653        android:permissionGroup="android.permission-group.CAMERA"
654        android:label="@string/permlab_camera"
655        android:description="@string/permdesc_camera"
656        android:protectionLevel="dangerous" />
657
658
659    <!-- ====================================================================== -->
660    <!-- Permissions for accessing the device sensors                           -->
661    <!-- ====================================================================== -->
662    <eat-comment />
663
664    <!-- Used for permissions that are associated with accessing
665         camera or capturing images/video from the device. -->
666    <permission-group android:name="android.permission-group.SENSORS"
667        android:label="@string/permgrouplab_sensors"
668        android:description="@string/permgroupdesc_sensors"
669        android:priority="800" />
670
671    <!-- Allows an application to access data from sensors that the user uses to
672         measure what is happening inside his/her body, such as heart rate. -->
673    <permission android:name="android.permission.BODY_SENSORS"
674        android:permissionGroup="android.permission-group.SENSORS"
675        android:label="@string/permlab_bodySensors"
676        android:description="@string/permdesc_bodySensors"
677        android:protectionLevel="dangerous" />
678
679    <!-- Allows an app to use fingerprint hardware. -->
680    <permission android:name="android.permission.USE_FINGERPRINT"
681        android:permissionGroup="android.permission-group.SENSORS"
682        android:label="@string/permlab_useFingerprint"
683        android:description="@string/permdesc_useFingerprint"
684        android:protectionLevel="normal" />
685
686    <!-- ====================================================================== -->
687    <!-- INSTALLTIME PERMISSIONS                                                -->
688    <!-- ====================================================================== -->
689
690    <!-- ================================== -->
691    <!-- Permissions for accessing messages -->
692    <!-- ================================== -->
693    <eat-comment />
694
695    <!-- @SystemApi Allows an application (Phone) to send a request to other applications
696         to handle the respond-via-message action during incoming calls.
697         <p>Not for use by third-party applications. -->
698    <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
699        android:protectionLevel="signature|system" />
700
701    <!-- Allows an application to filter carrier specific sms.
702         @hide -->
703    <permission android:name="android.permission.CARRIER_FILTER_SMS"
704        android:protectionLevel="signature|system" />
705
706    <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
707         to record or display them to the user.
708         <p>Not for use by third-party applications.
709         @hide Pending API council approval -->
710    <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
711        android:protectionLevel="signature|system" />
712
713    <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
714         or perform processing on them. -->
715    <!-- @hide -->
716    <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
717        android:protectionLevel="signature|system" />
718
719    <!-- @SystemApi @hide Allows an application to execute contacts directory search.
720         This should only be used by ContactsProvider.
721         <p>Not for use by third-party applications. -->
722    <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
723        android:protectionLevel="signature|system" />
724
725    <!-- =============================================================== -->
726    <!-- Permissions for accessing the user dictionary-->
727    <!-- =============================================================== -->
728    <eat-comment />
729
730    <!-- Used for permissions that provide access to the user
731         calendar to create / view events.-->
732    <permission-group android:name="android.permission-group.USER_DICTIONARY"
733        android:label="@string/permgrouplab_dictionary"
734        android:icon="@drawable/perm_group_user_dictionary"
735        android:description="@string/permgroupdesc_dictionary"
736        android:permissionGroupFlags="personalInfo"
737        android:priority="1100" />
738
739    <!-- Allows an application to read the user dictionary. This should
740         really only be required by an IME, or a dictionary editor like
741         the Settings app. -->
742    <permission android:name="android.permission.READ_USER_DICTIONARY"
743        android:permissionGroup="android.permission-group.USER_DICTIONARY"
744        android:label="@string/permlab_readDictionary"
745        android:description="@string/permdesc_readDictionary"
746        android:protectionLevel="dangerous"/>
747
748    <!-- Allows an application to write to the user dictionary. -->
749    <permission android:name="android.permission.WRITE_USER_DICTIONARY"
750        android:permissionGroup="android.permission-group.USER_DICTIONARY"
751        android:label="@string/permlab_writeDictionary"
752        android:description="@string/permdesc_writeDictionary"
753        android:protectionLevel="normal"/>
754
755    <!-- =============================================================== -->
756    <!-- Permissions for setting the device alarm                        -->
757    <!-- =============================================================== -->
758    <eat-comment />
759
760    <!-- Allows an application to broadcast an Intent to set an alarm for the user. -->
761    <permission android:name="com.android.alarm.permission.SET_ALARM"
762        android:label="@string/permlab_setAlarm"
763        android:description="@string/permdesc_setAlarm"
764        android:protectionLevel="normal" />
765
766    <!-- =============================================================== -->
767    <!-- Permissions for accessing the user voicemail                    -->
768    <!-- =============================================================== -->
769    <eat-comment />
770
771    <!-- Allows an application to modify and remove existing voicemails in the system -->
772    <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
773        android:protectionLevel="system|signature" />
774
775    <!-- Allows an application to read voicemails in the system. -->
776    <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
777        android:protectionLevel="system|signature" />
778
779    <!-- ======================================= -->
780    <!-- Permissions for accessing location info -->
781    <!-- ======================================= -->
782    <eat-comment />
783
784    <!-- Allows an application to access extra location provider commands -->
785    <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
786        android:label="@string/permlab_accessLocationExtraCommands"
787        android:description="@string/permdesc_accessLocationExtraCommands"
788        android:protectionLevel="normal" />
789
790    <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
791    <p>Not for use by third-party applications. -->
792    <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
793        android:protectionLevel="signature|system" />
794
795    <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
796         This should only be used by HDMI-CEC service.
797    -->
798    <permission android:name="android.permission.HDMI_CEC"
799        android:protectionLevel="signatureOrSystem" />
800
801    <!-- @SystemApi Allows an application to use location features in hardware,
802         such as the geofencing api.
803         <p>Not for use by third-party applications. -->
804    <permission android:name="android.permission.LOCATION_HARDWARE"
805        android:protectionLevel="signature|system" />
806    <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
807
808    <!-- Allows an application to create mock location providers for testing. -->
809    <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
810        android:protectionLevel="signature" />
811
812    <!-- ======================================= -->
813    <!-- Permissions for accessing networks -->
814    <!-- ======================================= -->
815    <eat-comment />
816
817    <!-- Allows applications to open network sockets. -->
818    <permission android:name="android.permission.INTERNET"
819        android:description="@string/permdesc_createNetworkSockets"
820        android:label="@string/permlab_createNetworkSockets"
821        android:protectionLevel="normal" />
822
823    <!-- Allows applications to access information about networks -->
824    <permission android:name="android.permission.ACCESS_NETWORK_STATE"
825        android:description="@string/permdesc_accessNetworkState"
826        android:label="@string/permlab_accessNetworkState"
827        android:protectionLevel="normal" />
828
829    <!-- Allows applications to access information about Wi-Fi networks -->
830    <permission android:name="android.permission.ACCESS_WIFI_STATE"
831        android:description="@string/permdesc_accessWifiState"
832        android:label="@string/permlab_accessWifiState"
833        android:protectionLevel="normal" />
834
835    <!-- Allows applications to change Wi-Fi connectivity state -->
836    <permission android:name="android.permission.CHANGE_WIFI_STATE"
837        android:description="@string/permdesc_changeWifiState"
838        android:label="@string/permlab_changeWifiState"
839        android:protectionLevel="dangerous" />
840
841    <!-- @SystemApi @hide Allows applications to read Wi-Fi credential.
842         <p>Not for use by third-party applications. -->
843    <permission android:name="android.permission.READ_WIFI_CREDENTIAL"
844        android:protectionLevel="signature|system" />
845
846    <!-- @SystemApi @hide Allow system apps to receive broadcast
847         when a wifi network credential is changed.
848         <p>Not for use by third-party applications. -->
849    <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE"
850        android:protectionLevel="signature|system" />
851
852    <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created
853     by another application. Once reconfigured the original creator cannot make any further
854     modifications.
855     <p>Not for use by third-party applications. -->
856    <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG"
857        android:protectionLevel="signature|system" />
858
859    <!-- @hide -->
860    <permission android:name="android.permission.ACCESS_WIMAX_STATE"
861        android:description="@string/permdesc_accessWimaxState"
862        android:label="@string/permlab_accessWimaxState"
863        android:protectionLevel="normal" />
864
865    <!-- @hide -->
866    <permission android:name="android.permission.CHANGE_WIMAX_STATE"
867        android:description="@string/permdesc_changeWimaxState"
868        android:label="@string/permlab_changeWimaxState"
869        android:protectionLevel="dangerous" />
870
871    <!--@SystemApi Allows applications to the the local WiFi and Bluetooth MAC address.
872        @hide
873    -->
874    <permission android:name="android.permission.SCORE_NETWORKS"
875        android:protectionLevel="signature|system" />
876
877    <!-- ======================================= -->
878    <!-- Permissions for short range, peripheral networks -->
879    <!-- ======================================= -->
880    <eat-comment />
881
882    <!-- Allows applications to connect to paired bluetooth devices -->
883    <permission android:name="android.permission.BLUETOOTH"
884        android:description="@string/permdesc_bluetooth"
885        android:label="@string/permlab_bluetooth"
886        android:protectionLevel="dangerous" />
887
888    <!-- Allows applications to discover and pair bluetooth devices -->
889    <permission android:name="android.permission.BLUETOOTH_ADMIN"
890        android:description="@string/permdesc_bluetoothAdmin"
891        android:label="@string/permlab_bluetoothAdmin"
892        android:protectionLevel="dangerous" />
893
894    <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to
895         allow or disallow phonebook access or message access.
896         This is not available to third party applications. -->
897    <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
898        android:protectionLevel="system|signature" />
899
900    <!-- Control access to email providers exclusively for Bluetooth
901         @hide
902    -->
903    <permission android:name="android.permission.BLUETOOTH_MAP"
904        android:protectionLevel="signature" />
905
906    <!-- Allows bluetooth stack to access files
907         @hide This should only be used by Bluetooth apk.
908    -->
909    <permission android:name="android.permission.BLUETOOTH_STACK"
910        android:protectionLevel="signature" />
911
912    <!-- Allows applications to perform I/O operations over NFC -->
913    <permission android:name="android.permission.NFC"
914        android:description="@string/permdesc_nfc"
915        android:label="@string/permlab_nfc"
916        android:protectionLevel="normal" />
917
918    <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
919         @hide -->
920    <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
921        android:protectionLevel="signature|system" />
922
923    <!-- @SystemApi
924         @hide -->
925    <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
926        android:protectionLevel="signature|system" />
927
928    <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
929         @hide -->
930    <permission android:name="android.permission.LOOP_RADIO"
931        android:protectionLevel="signature|system" />
932
933    <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
934         @hide -->
935    <permission android:name="android.permission.NFC_HANDOVER_STATUS"
936        android:protectionLevel="signature|system" />
937
938    <!-- ================================== -->
939    <!-- Permissions for accessing accounts -->
940    <!-- ================================== -->
941    <eat-comment />
942
943    <!-- Permissions for direct access to the accounts managed
944         by the Account Manager. -->
945    <permission-group android:name="android.permission-group.ACCOUNTS"
946        android:label="@string/permgrouplab_accounts"
947        android:icon="@drawable/perm_group_accounts"
948        android:description="@string/permgroupdesc_accounts"
949        android:permissionGroupFlags="personalInfo"
950        android:priority="1000" />
951
952    <!-- Allows access to the list of accounts in the Accounts Service -->
953    <permission android:name="android.permission.GET_ACCOUNTS"
954        android:permissionGroup="android.permission-group.ACCOUNTS"
955        android:protectionLevel="normal"
956        android:description="@string/permdesc_getAccounts"
957        android:label="@string/permlab_getAccounts" />
958
959    <!-- Allows an application to act as an AccountAuthenticator for
960         the AccountManager -->
961    <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
962        android:permissionGroup="android.permission-group.ACCOUNTS"
963        android:protectionLevel="dangerous"
964        android:label="@string/permlab_authenticateAccounts"
965        android:description="@string/permdesc_authenticateAccounts" />
966
967    <!-- Allows an application to request authtokens from the AccountManager -->
968    <permission android:name="android.permission.USE_CREDENTIALS"
969        android:permissionGroup="android.permission-group.ACCOUNTS"
970        android:protectionLevel="dangerous"
971        android:label="@string/permlab_useCredentials"
972        android:description="@string/permdesc_useCredentials" />
973
974    <!-- Allows an application to manage the list of accounts in the AccountManager -->
975    <permission android:name="android.permission.MANAGE_ACCOUNTS"
976        android:permissionGroup="android.permission-group.ACCOUNTS"
977        android:protectionLevel="dangerous"
978        android:label="@string/permlab_manageAccounts"
979        android:description="@string/permdesc_manageAccounts" />
980
981    <!-- @SystemApi Allows applications to call into AccountAuthenticators.
982    <p>Not for use by third-party applications. -->
983    <permission android:name="android.permission.ACCOUNT_MANAGER"
984        android:permissionGroup="android.permission-group.ACCOUNTS"
985        android:protectionLevel="signature" />
986
987    <!-- ================================== -->
988    <!-- Permissions for accessing hardware that may effect battery life-->
989    <!-- ================================== -->
990    <eat-comment />
991
992    <!-- Allows applications to enter Wi-Fi Multicast mode -->
993    <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
994        android:description="@string/permdesc_changeWifiMulticastState"
995        android:label="@string/permlab_changeWifiMulticastState"
996        android:protectionLevel="dangerous" />
997
998    <!-- Allows access to the vibrator -->
999    <permission android:name="android.permission.VIBRATE"
1000        android:label="@string/permlab_vibrate"
1001        android:description="@string/permdesc_vibrate"
1002        android:protectionLevel="normal" />
1003
1004    <!-- Allows access to the flashlight -->
1005    <permission android:name="android.permission.FLASHLIGHT"
1006        android:label="@string/permlab_flashlight"
1007        android:description="@string/permdesc_flashlight"
1008        android:protectionLevel="normal" />
1009
1010    <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
1011         from dimming -->
1012    <permission android:name="android.permission.WAKE_LOCK"
1013        android:label="@string/permlab_wakeLock"
1014        android:description="@string/permdesc_wakeLock"
1015        android:protectionLevel="normal" />
1016
1017    <!-- Allows using the device's IR transmitter, if available -->
1018    <permission android:name="android.permission.TRANSMIT_IR"
1019        android:label="@string/permlab_transmitIr"
1020        android:description="@string/permdesc_transmitIr"
1021        android:protectionLevel="normal" />
1022
1023    <!-- ==================================================== -->
1024    <!-- Permissions related to changing audio settings   -->
1025    <!-- ==================================================== -->
1026    <eat-comment />
1027
1028    <!-- Allows an application to modify global audio settings -->
1029    <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
1030        android:label="@string/permlab_modifyAudioSettings"
1031        android:description="@string/permdesc_modifyAudioSettings"
1032        android:protectionLevel="normal" />
1033
1034    <!-- ================================== -->
1035    <!-- Permissions for accessing hardware -->
1036    <!-- ================================== -->
1037    <eat-comment />
1038
1039    <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
1040         @hide -->
1041    <permission android:name="android.permission.MANAGE_USB"
1042        android:protectionLevel="signature|system" />
1043
1044    <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
1045         For use only by the device side MTP implementation.
1046         @hide -->
1047    <permission android:name="android.permission.ACCESS_MTP"
1048        android:protectionLevel="signature|system" />
1049
1050    <!-- Allows access to hardware peripherals.  Intended only for hardware testing.
1051    <p>Not for use by third-party applications. -->
1052    <permission android:name="android.permission.HARDWARE_TEST"
1053        android:protectionLevel="signature" />
1054
1055    <!-- @SystemApi Allows access to FM
1056         @hide This is not a third-party API (intended for system apps).-->
1057    <permission android:name="android.permission.ACCESS_FM_RADIO"
1058        android:protectionLevel="signature|system" />
1059
1060    <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
1061         @hide -->
1062    <permission android:name="android.permission.NET_ADMIN"
1063        android:protectionLevel="signature" />
1064
1065    <!-- Allows registration for remote audio playback. @hide -->
1066    <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
1067        android:protectionLevel="signature" />
1068
1069    <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
1070         built-in tuners and HDMI-in's.
1071         @hide This should only be used by OEM's TvInputService's.
1072    -->
1073    <permission android:name="android.permission.TV_INPUT_HARDWARE"
1074        android:protectionLevel="signatureOrSystem" />
1075
1076    <!-- @SystemApi Allows to capture a frame of TV input hardware such as
1077         built-in tuners and HDMI-in's.
1078         @hide <p>Not for use by third-party applications.
1079    -->
1080    <permission android:name="android.permission.CAPTURE_TV_INPUT"
1081        android:protectionLevel="signatureOrSystem" />
1082
1083    <!-- @hide Allows TvInputService to access DVB device.
1084   <p>Not for use by third-party applications. -->
1085    <permission android:name="android.permission.DVB_DEVICE"
1086        android:protectionLevel="signatureOrSystem" />
1087
1088    <!-- @hide Allows enabling/disabling OEM unlock
1089   <p>Not for use by third-party applications. -->
1090    <permission android:name="android.permission.OEM_UNLOCK_STATE"
1091        android:protectionLevel="signature" />
1092
1093    <!-- @hide Allows querying state of PersistentDataBlock
1094   <p>Not for use by third-party applications. -->
1095    <permission android:name="android.permission.ACCESS_PDB_STATE"
1096        android:protectionLevel="signature" />
1097
1098    <!-- @hide Allows system update service to notify device owner about pending updates.
1099   <p>Not for use by third-party applications. -->
1100    <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE"
1101        android:protectionLevel="signatureOrSystem" />
1102
1103    <!-- =========================================== -->
1104    <!-- Permissions associated with camera and image capture -->
1105    <!-- =========================================== -->
1106    <eat-comment />
1107
1108    <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
1109         a camera is in use by an application.
1110         @hide -->
1111    <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
1112        android:protectionLevel="signature|system" />
1113
1114    <!-- Allows sending the camera service notifications about system-wide events.
1115        @hide -->
1116    <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS"
1117        android:protectionLevel="signature|system" />
1118
1119    <!-- =========================================== -->
1120    <!-- Permissions associated with telephony state -->
1121    <!-- =========================================== -->
1122    <eat-comment />
1123
1124    <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
1125         Does not include placing calls.
1126         <p>Not for use by third-party applications. -->
1127    <permission android:name="android.permission.MODIFY_PHONE_STATE"
1128        android:protectionLevel="signature|system" />
1129
1130    <!-- Allows read only access to precise phone state.
1131         @hide Pending API council approval -->
1132    <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
1133        android:protectionLevel="signature|system" />
1134
1135    <!-- @SystemApi Allows read access to privileged phone state.
1136         @hide Used internally. -->
1137    <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
1138        android:protectionLevel="signature|system" />
1139
1140    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1141         PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount
1142         corresponds to a device SIM.
1143         @hide -->
1144    <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION"
1145        android:protectionLevel="system|signature" />
1146
1147    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1148         PhoneAccount#CAPABILITY_CALL_PROVIDER.
1149         @hide -->
1150    <permission android:name="android.permission.REGISTER_CALL_PROVIDER"
1151        android:protectionLevel="system|signature" />
1152
1153    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1154         PhoneAccount#CAPABILITY_CONNECTION_MANAGER
1155         @hide -->
1156    <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER"
1157        android:protectionLevel="system|signature" />
1158
1159    <!-- Must be required by a {@link android.telecom.InCallService},
1160         to ensure that only the system can bind to it. -->
1161    <permission android:name="android.permission.BIND_INCALL_SERVICE"
1162        android:protectionLevel="system|signature" />
1163
1164    <!-- Must be required by a {@link android.telecom.ConnectionService},
1165         to ensure that only the system can bind to it.
1166         @deprecated {@link android.telecom.ConnectionService}s should require
1167                 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead.
1168         @SystemApi
1169         @hide -->
1170    <permission android:name="android.permission.BIND_CONNECTION_SERVICE"
1171        android:protectionLevel="system|signature" />
1172
1173    <!-- Must be required by a {@link android.telecom.ConnectionService},
1174         to ensure that only the system can bind to it. -->
1175    <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE"
1176        android:protectionLevel="system|signature" />
1177
1178
1179    <!-- @SystemApi Allows an application to control the in-call experience.
1180         @hide -->
1181    <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE"
1182        android:protectionLevel="system|signature" />
1183
1184    <!-- ================================== -->
1185    <!-- Permissions for sdcard interaction -->
1186    <!-- ================================== -->
1187    <eat-comment />
1188
1189    <!-- Allows an application to read from external storage.
1190         <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
1191         granted this permission.</p>
1192         <p>This permission is enforced starting in API level 19.  Before API level 19, this
1193         permission is not enforced and all apps still have access to read from external storage.
1194         You can test your app with the permission enforced by enabling <em>Protect USB
1195         storage</em> under Developer options in the Settings app on a device running Android 4.1 or
1196         higher.</p>
1197         <p>Also starting in API level 19, this permission is <em>not</em> required to
1198         read/write files in your application-specific directories returned by
1199         {@link android.content.Context#getExternalFilesDir} and
1200         {@link android.content.Context#getExternalCacheDir}.
1201         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1202         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1203         minSdkVersion}</a> and <a
1204         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1205         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1206         grants your app this permission. If you don't need this permission, be sure your <a
1207         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1208         targetSdkVersion}</a> is 4 or higher.-->
1209    <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
1210        android:label="@string/permlab_sdcardRead"
1211        android:description="@string/permdesc_sdcardRead"
1212        android:protectionLevel="normal" />
1213
1214    <!-- Allows an application to write to external storage.
1215         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
1216         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
1217         minSdkVersion}</a> and <a
1218         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1219         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
1220         grants your app this permission. If you don't need this permission, be sure your <a
1221         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
1222         targetSdkVersion}</a> is 4 or higher.
1223         <p>Starting in API level 19, this permission is <em>not</em> required to
1224         read/write files in your application-specific directories returned by
1225         {@link android.content.Context#getExternalFilesDir} and
1226         {@link android.content.Context#getExternalCacheDir}. -->
1227    <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
1228        android:label="@string/permlab_sdcardWrite"
1229        android:description="@string/permdesc_sdcardWrite"
1230        android:protectionLevel="normal" />
1231
1232    <!-- @SystemApi Allows an application to write to internal media storage
1233         @hide  -->
1234    <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
1235        android:protectionLevel="signature|system" />
1236
1237    <!-- Allows an application to manage access to documents, usually as part
1238         of a document picker. -->
1239    <permission android:name="android.permission.MANAGE_DOCUMENTS"
1240        android:protectionLevel="signature" />
1241
1242    <!-- ================================== -->
1243    <!-- Permissions for screenlock         -->
1244    <!-- ================================== -->
1245    <eat-comment />
1246
1247    <!-- Allows applications to disable the keyguard if it is not secure. -->
1248    <permission android:name="android.permission.DISABLE_KEYGUARD"
1249        android:description="@string/permdesc_disableKeyguard"
1250        android:label="@string/permlab_disableKeyguard"
1251        android:protectionLevel="normal" />
1252
1253    <!-- ================================== -->
1254    <!-- Permissions to access other installed applications  -->
1255    <!-- ================================== -->
1256    <eat-comment />
1257
1258    <!-- @deprecated No longer enforced. -->
1259    <permission android:name="android.permission.GET_TASKS"
1260        android:label="@string/permlab_getTasks"
1261        android:description="@string/permdesc_getTasks"
1262        android:protectionLevel="normal" />
1263
1264    <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really
1265         give access to task information.  We need this new one because there are
1266         many existing apps that use add libraries and such that have validation
1267         code to ensure the app has requested the GET_TASKS permission by seeing
1268         if it has been granted the permission...  if it hasn't, it kills the app
1269         with a message about being upset.  So we need to have it continue to look
1270         like the app is getting that permission, even though it will never be
1271         checked, and new privileged apps can now request this one for real access.
1272         @hide
1273         @SystemApi -->
1274    <permission android:name="android.permission.REAL_GET_TASKS"
1275        android:protectionLevel="signature|system" />
1276
1277    <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo.
1278         @hide -->
1279    <permission android:name="android.permission.START_TASKS_FROM_RECENTS"
1280        android:protectionLevel="signature|system" />
1281
1282    <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
1283         across the users on the device, using singleton services and
1284         user-targeted broadcasts.  This permission is not available to
1285         third party applications. -->
1286    <permission android:name="android.permission.INTERACT_ACROSS_USERS"
1287        android:protectionLevel="signature|system|development" />
1288
1289    <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
1290         that removes restrictions on where broadcasts can be sent and allows other
1291         types of interactions. -->
1292    <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
1293        android:protectionLevel="signature" />
1294
1295    <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
1296         users on the device. This permission is not available to
1297         third party applications. -->
1298    <permission android:name="android.permission.MANAGE_USERS"
1299        android:protectionLevel="signature|system" />
1300
1301    <!-- @hide Allows an application to set the profile owners and the device owner.
1302         This permission is not available to third party applications.-->
1303    <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS"
1304        android:protectionLevel="signature"
1305        android:label="@string/permlab_manageProfileAndDeviceOwners"
1306        android:description="@string/permdesc_manageProfileAndDeviceOwners" />
1307
1308    <!-- Allows an application to get full detailed information about
1309         recently running tasks, with full fidelity to the real state.
1310         @hide -->
1311    <permission android:name="android.permission.GET_DETAILED_TASKS"
1312        android:protectionLevel="signature" />
1313
1314    <!-- Allows an application to change the Z-order of tasks -->
1315    <permission android:name="android.permission.REORDER_TASKS"
1316        android:label="@string/permlab_reorderTasks"
1317        android:description="@string/permdesc_reorderTasks"
1318        android:protectionLevel="normal" />
1319
1320    <!-- @hide Allows an application to change to remove/kill tasks -->
1321    <permission android:name="android.permission.REMOVE_TASKS"
1322        android:protectionLevel="signature" />
1323
1324    <!-- @SystemApi @hide Allows an application to create/manage/remove stacks -->
1325    <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
1326        android:protectionLevel="signature|system" />
1327
1328    <!-- Allows an application to start any activity, regardless of permission
1329         protection or exported state.
1330         @hide -->
1331    <permission android:name="android.permission.START_ANY_ACTIVITY"
1332        android:protectionLevel="signature" />
1333
1334    <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
1335        API is no longer supported. -->
1336    <permission android:name="android.permission.RESTART_PACKAGES"
1337        android:label="@string/permlab_killBackgroundProcesses"
1338        android:description="@string/permdesc_killBackgroundProcesses"
1339        android:protectionLevel="normal" />
1340
1341    <!-- Allows an application to call
1342        {@link android.app.ActivityManager#killBackgroundProcesses}. -->
1343    <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
1344        android:label="@string/permlab_killBackgroundProcesses"
1345        android:description="@string/permdesc_killBackgroundProcesses"
1346        android:protectionLevel="normal" />
1347
1348    <!-- ================================== -->
1349    <!-- Permissions affecting the display of other applications  -->
1350    <!-- ================================== -->
1351    <eat-comment />
1352
1353    <!-- Allows an application to open windows using the type
1354         {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT},
1355         shown on top of all other applications.  Very few applications
1356         should use this permission; these windows are intended for
1357         system-level interaction with the user. -->
1358    <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
1359        android:label="@string/permlab_systemAlertWindow"
1360        android:description="@string/permdesc_systemAlertWindow"
1361        android:protectionLevel="dangerous" />
1362
1363    <!-- ================================== -->
1364    <!-- Permissions affecting the system wallpaper -->
1365    <!-- ================================== -->
1366    <eat-comment />
1367
1368    <!-- Allows applications to set the wallpaper -->
1369    <permission android:name="android.permission.SET_WALLPAPER"
1370        android:label="@string/permlab_setWallpaper"
1371        android:description="@string/permdesc_setWallpaper"
1372        android:protectionLevel="normal" />
1373
1374    <!-- Allows applications to set the wallpaper hints -->
1375    <permission android:name="android.permission.SET_WALLPAPER_HINTS"
1376        android:label="@string/permlab_setWallpaperHints"
1377        android:description="@string/permdesc_setWallpaperHints"
1378        android:protectionLevel="normal" />
1379
1380    <!-- ============================================ -->
1381    <!-- Permissions for changing the system clock -->
1382    <!-- ============================================ -->
1383    <eat-comment />
1384
1385    <!-- @SystemApi Allows applications to set the system time.
1386    <p>Not for use by third-party applications. -->
1387    <permission android:name="android.permission.SET_TIME"
1388        android:protectionLevel="signature|system" />
1389
1390    <!-- Allows applications to set the system time zone -->
1391    <permission android:name="android.permission.SET_TIME_ZONE"
1392        android:label="@string/permlab_setTimeZone"
1393        android:description="@string/permdesc_setTimeZone"
1394        android:protectionLevel="normal" />
1395
1396    <!-- ==================================================== -->
1397    <!-- Permissions related to changing status bar   -->
1398    <!-- ==================================================== -->
1399    <eat-comment />
1400
1401    <!-- Allows an application to expand or collapse the status bar. -->
1402    <permission android:name="android.permission.EXPAND_STATUS_BAR"
1403        android:label="@string/permlab_expandStatusBar"
1404        android:description="@string/permdesc_expandStatusBar"
1405        android:protectionLevel="normal" />
1406
1407    <!-- ============================================================== -->
1408    <!-- Permissions related to adding/removing shortcuts from Launcher -->
1409    <!-- ============================================================== -->
1410    <eat-comment />
1411
1412    <!-- Allows an application to install a shortcut in Launcher -->
1413    <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
1414        android:label="@string/permlab_install_shortcut"
1415        android:description="@string/permdesc_install_shortcut"
1416        android:protectionLevel="dangerous"/>
1417
1418    <!-- Allows an application to uninstall a shortcut in Launcher -->
1419    <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
1420        android:label="@string/permlab_uninstall_shortcut"
1421        android:description="@string/permdesc_uninstall_shortcut"
1422        android:protectionLevel="dangerous"/>
1423
1424    <!-- ==================================================== -->
1425    <!-- Permissions related to accessing sync settings   -->
1426    <!-- ==================================================== -->
1427    <eat-comment />
1428
1429    <!-- Allows applications to read the sync settings -->
1430    <permission android:name="android.permission.READ_SYNC_SETTINGS"
1431        android:description="@string/permdesc_readSyncSettings"
1432        android:label="@string/permlab_readSyncSettings"
1433        android:protectionLevel="normal" />
1434
1435    <!-- Allows applications to write the sync settings -->
1436    <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
1437        android:description="@string/permdesc_writeSyncSettings"
1438        android:label="@string/permlab_writeSyncSettings"
1439        android:protectionLevel="normal" />
1440
1441    <!-- Allows applications to read the sync stats -->
1442    <permission android:name="android.permission.READ_SYNC_STATS"
1443        android:description="@string/permdesc_readSyncStats"
1444        android:label="@string/permlab_readSyncStats"
1445        android:protectionLevel="normal" />
1446
1447    <!-- ============================================ -->
1448    <!-- Permissions for low-level system interaction -->
1449    <!-- ============================================ -->
1450    <eat-comment />
1451
1452    <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
1453    <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
1454        android:protectionLevel="signature" />
1455
1456    <!-- Allows an application to access all multi-user external storage @hide -->
1457    <permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE"
1458        android:protectionLevel="signature" />
1459
1460    <!-- @SystemApi Allows an application to modify the current configuration, such
1461         as locale. -->
1462    <permission android:name="android.permission.CHANGE_CONFIGURATION"
1463        android:protectionLevel="signature|system|development" />
1464
1465    <!-- Allows an application to read or write the system settings. -->
1466    <permission android:name="android.permission.WRITE_SETTINGS"
1467        android:label="@string/permlab_writeSettings"
1468        android:description="@string/permdesc_writeSettings"
1469        android:protectionLevel="normal" />
1470
1471    <!-- @SystemApi Allows an application to modify the Google service map.
1472    <p>Not for use by third-party applications. -->
1473    <permission android:name="android.permission.WRITE_GSERVICES"
1474        android:protectionLevel="signature|system" />
1475
1476    <!-- @SystemApi Allows an application to call
1477        {@link android.app.ActivityManager#forceStopPackage}.
1478        @hide -->
1479    <permission android:name="android.permission.FORCE_STOP_PACKAGES"
1480        android:protectionLevel="signature|system" />
1481
1482    <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
1483         An active window is the window that has fired an accessibility event. -->
1484    <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
1485        android:protectionLevel="signature|system" />
1486
1487    <!-- @SystemApi Modify the global animation scaling factor.
1488    <p>Not for use by third-party applications. -->
1489    <permission android:name="android.permission.SET_ANIMATION_SCALE"
1490        android:protectionLevel="signature|system|development" />
1491
1492    <!-- @deprecated This functionality will be removed in the future; please do
1493         not use. Allow an application to make its activities persistent. -->
1494    <permission android:name="android.permission.PERSISTENT_ACTIVITY"
1495        android:label="@string/permlab_persistentActivity"
1496        android:description="@string/permdesc_persistentActivity"
1497        android:protectionLevel="normal" />
1498
1499    <!-- Allows an application to find out the space used by any package. -->
1500    <permission android:name="android.permission.GET_PACKAGE_SIZE"
1501        android:label="@string/permlab_getPackageSize"
1502        android:description="@string/permdesc_getPackageSize"
1503        android:protectionLevel="normal" />
1504
1505    <!-- @deprecated No longer useful, see
1506         {@link android.content.pm.PackageManager#addPackageToPreferred}
1507         for details. -->
1508    <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
1509        android:protectionLevel="signature" />
1510
1511    <!-- Allows an application to receive the
1512         {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
1513         broadcast after the system finishes booting.  If you don't
1514         request this permission, you will not receive the broadcast at
1515         that time.  Though holding this permission does not have any
1516         security implications, it can have a negative impact on the
1517         user experience by increasing the amount of time it takes the
1518         system to start and allowing applications to have themselves
1519         running without the user being aware of them.  As such, you must
1520         explicitly declare your use of this facility to make that visible
1521         to the user. -->
1522    <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
1523        android:label="@string/permlab_receiveBootCompleted"
1524        android:description="@string/permdesc_receiveBootCompleted"
1525        android:protectionLevel="normal" />
1526
1527    <!-- Allows an application to broadcast sticky intents.  These are
1528         broadcasts whose data is held by the system after being finished,
1529         so that clients can quickly retrieve that data without having
1530         to wait for the next broadcast. -->
1531    <permission android:name="android.permission.BROADCAST_STICKY"
1532        android:label="@string/permlab_broadcastSticky"
1533        android:description="@string/permdesc_broadcastSticky"
1534        android:protectionLevel="normal" />
1535
1536    <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
1537    <p>Not for use by third-party applications.-->
1538    <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
1539        android:protectionLevel="system|signature" />
1540
1541    <!-- @SystemApi Allows formatting file systems for removable storage.
1542    <p>Not for use by third-party applications. -->
1543    <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
1544        android:protectionLevel="system|signature" />
1545
1546    <!-- Allows access to ASEC non-destructive API calls
1547         @hide  -->
1548    <permission android:name="android.permission.ASEC_ACCESS"
1549        android:protectionLevel="signature" />
1550
1551    <!-- Allows creation of ASEC volumes
1552         @hide  -->
1553    <permission android:name="android.permission.ASEC_CREATE"
1554        android:protectionLevel="signature" />
1555
1556    <!-- Allows destruction of ASEC volumes
1557         @hide  -->
1558    <permission android:name="android.permission.ASEC_DESTROY"
1559        android:protectionLevel="signature" />
1560
1561    <!-- Allows mount / unmount of ASEC volumes
1562         @hide  -->
1563    <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
1564        android:protectionLevel="signature" />
1565
1566    <!-- Allows rename of ASEC volumes
1567         @hide  -->
1568    <permission android:name="android.permission.ASEC_RENAME"
1569        android:protectionLevel="signature" />
1570
1571    <!-- @SystemApi Allows applications to write the apn settings.
1572    <p>Not for use by third-party applications. -->
1573    <permission android:name="android.permission.WRITE_APN_SETTINGS"
1574        android:protectionLevel="signature|system" />
1575
1576    <!-- Allows an application to allow access the subscribed feeds ContentProvider.
1577         @hide
1578         @removed
1579     -->
1580    <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
1581        android:label="@string/permlab_subscribedFeedsRead"
1582        android:description="@string/permdesc_subscribedFeedsRead"
1583        android:protectionLevel="normal" />
1584
1585    <!--
1586        @hide
1587        @removed
1588    -->
1589    <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
1590        android:label="@string/permlab_subscribedFeedsWrite"
1591        android:description="@string/permdesc_subscribedFeedsWrite"
1592        android:protectionLevel="dangerous" />
1593
1594    <!-- Allows applications to change network connectivity state -->
1595    <permission android:name="android.permission.CHANGE_NETWORK_STATE"
1596        android:description="@string/permdesc_changeNetworkState"
1597        android:label="@string/permlab_changeNetworkState"
1598        android:protectionLevel="normal" />
1599
1600    <!-- Allows an application to clear the caches of all installed
1601         applications on the device.  -->
1602    <permission android:name="android.permission.CLEAR_APP_CACHE"
1603        android:protectionLevel="dangerous" />
1604
1605    <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
1606         @hide -->
1607    <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
1608        android:protectionLevel="signature|system" />
1609
1610    <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
1611         behalf of the user.
1612         @hide -->
1613    <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
1614        android:protectionLevel="signature|system" />
1615
1616    <!-- @SystemApi Allows an application to do certain operations needed for
1617         interacting with the recovery (system update) system.
1618         @hide -->
1619    <permission android:name="android.permission.RECOVERY"
1620        android:protectionLevel="signature|system" />
1621
1622    <!-- Allows the system to bind to an application's task services
1623         @hide -->
1624    <permission android:name="android.permission.BIND_JOB_SERVICE"
1625        android:protectionLevel="signature" />
1626    <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
1627
1628    <!-- Allows an application to initiate configuration updates
1629         <p>An application requesting this permission is responsible for
1630         verifying the source and integrity of any update before passing
1631         it off to the various individual installer components
1632         @hide -->
1633    <permission android:name="android.permission.UPDATE_CONFIG"
1634        android:protectionLevel="signature|system" />
1635
1636    <!-- ========================================= -->
1637    <!-- Permissions for special development tools -->
1638    <!-- ========================================= -->
1639    <eat-comment />
1640
1641    <!-- @SystemApi Allows an application to read or write the secure system settings.
1642    <p>Not for use by third-party applications. -->
1643    <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
1644        android:protectionLevel="signature|system|development" />
1645
1646    <!-- @SystemApi Allows an application to retrieve state dump information from system services.
1647    <p>Not for use by third-party applications. -->
1648    <permission android:name="android.permission.DUMP"
1649        android:protectionLevel="signature|system|development" />
1650
1651    <!-- @SystemApi Allows an application to read the low-level system log files.
1652    <p>Not for use by third-party applications, because
1653    Log entries can contain the user's private information. -->
1654    <permission android:name="android.permission.READ_LOGS"
1655        android:protectionLevel="signature|system|development" />
1656
1657    <!-- @SystemApi Configure an application for debugging.
1658    <p>Not for use by third-party applications. -->
1659    <permission android:name="android.permission.SET_DEBUG_APP"
1660        android:protectionLevel="signature|system|development" />
1661
1662    <!-- @SystemApi Allows an application to set the maximum number of (not needed)
1663         application processes that can be running.
1664         <p>Not for use by third-party applications. -->
1665    <permission android:name="android.permission.SET_PROCESS_LIMIT"
1666        android:protectionLevel="signature|system|development" />
1667
1668    <!-- @SystemApi Allows an application to control whether activities are immediately
1669         finished when put in the background.
1670         <p>Not for use by third-party applications. -->
1671    <permission android:name="android.permission.SET_ALWAYS_FINISH"
1672        android:protectionLevel="signature|system|development" />
1673
1674    <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
1675    <p>Not for use by third-party applications. -->
1676    <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
1677        android:protectionLevel="signature|system|development" />
1678
1679    <!-- ==================================== -->
1680    <!-- Private permissions                  -->
1681    <!-- ==================================== -->
1682    <eat-comment />
1683
1684    <!-- @SystemApi Allows applications to RW to diagnostic resources.
1685    <p>Not for use by third-party applications. -->
1686    <permission android:name="android.permission.DIAGNOSTIC"
1687        android:protectionLevel="signature" />
1688
1689    <!-- @SystemApi Allows an application to open, close, or disable the status bar
1690         and its icons.
1691         <p>Not for use by third-party applications. -->
1692    <permission android:name="android.permission.STATUS_BAR"
1693        android:protectionLevel="signature|system" />
1694
1695    <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
1696    @hide -->
1697    <permission android:name="android.permission.STATUS_BAR_SERVICE"
1698        android:protectionLevel="signature" />
1699
1700    <!-- Allows an application to force a BACK operation on whatever is the
1701         top activity.
1702         <p>Not for use by third-party applications. -->
1703    <permission android:name="android.permission.FORCE_BACK"
1704        android:protectionLevel="signature" />
1705
1706    <!-- @SystemApi Allows an application to update device statistics.
1707    <p>Not for use by third-party applications. -->
1708    <permission android:name="android.permission.UPDATE_DEVICE_STATS"
1709        android:protectionLevel="signature|system" />
1710
1711    <!-- @SystemApi @hide Allows an application to collect battery statistics -->
1712    <permission android:name="android.permission.GET_APP_OPS_STATS"
1713        android:protectionLevel="signature|system|development" />
1714
1715    <!-- @SystemApi Allows an application to update application operation statistics. Not for
1716         use by third party apps. @hide -->
1717    <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
1718        android:protectionLevel="signature|system" />
1719
1720    <!-- Allows an application to open windows that are for use by parts
1721         of the system user interface.
1722         <p>Not for use by third-party applications. -->
1723    <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
1724        android:protectionLevel="signature" />
1725
1726    <!-- Allows an application to manage (create, destroy,
1727         Z-order) application tokens in the window manager.
1728         <p>Not for use by third-party applications. -->
1729    <permission android:name="android.permission.MANAGE_APP_TOKENS"
1730        android:protectionLevel="signature" />
1731
1732    <!-- @hide Allows the application to temporarily freeze the screen for a
1733         full-screen transition. -->
1734    <permission android:name="android.permission.FREEZE_SCREEN"
1735        android:protectionLevel="signature" />
1736
1737    <!-- Allows an application to inject user events (keys, touch, trackball)
1738         into the event stream and deliver them to ANY window.  Without this
1739         permission, you can only deliver events to windows in your own process.
1740         <p>Not for use by third-party applications. -->
1741    <permission android:name="android.permission.INJECT_EVENTS"
1742        android:protectionLevel="signature" />
1743
1744    <!-- @hide Allows an application to register an input filter which filters the stream
1745         of user events (keys, touch, trackball) before they are dispatched to any window. -->
1746    <permission android:name="android.permission.FILTER_EVENTS"
1747        android:protectionLevel="signature" />
1748
1749    <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
1750    <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
1751        android:protectionLevel="signature" />
1752
1753    <!-- @hide Allows an application to collect frame statistics -->
1754    <permission android:name="android.permission.FRAME_STATS"
1755         android:protectionLevel="signature" />
1756
1757    <!-- @hide Allows an application to temporary enable accessibility on the device. -->
1758    <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
1759        android:protectionLevel="signature" />
1760
1761    <!-- Allows an application to watch and control how activities are
1762         started globally in the system.  Only for is in debugging
1763         (usually the monkey command).
1764         <p>Not for use by third-party applications. -->
1765    <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
1766        android:protectionLevel="signature" />
1767
1768    <!-- @SystemApi Allows an application to call the activity manager shutdown() API
1769         to put the higher-level system there into a shutdown state.
1770         @hide -->
1771    <permission android:name="android.permission.SHUTDOWN"
1772        android:protectionLevel="signature|system" />
1773
1774    <!-- @SystemApi Allows an application to tell the activity manager to temporarily
1775         stop application switches, putting it into a special mode that
1776         prevents applications from immediately switching away from some
1777         critical UI such as the home screen.
1778         @hide -->
1779    <permission android:name="android.permission.STOP_APP_SWITCHES"
1780        android:protectionLevel="signature|system" />
1781
1782    <!-- Allows an application to retrieve private information about
1783         the current top activity, such as any assist context it can provide.
1784         <p>Not for use by third-party applications. -->
1785    <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
1786        android:protectionLevel="signature" />
1787
1788    <!-- Allows an application to retrieve the current state of keys and
1789         switches.
1790         <p>Not for use by third-party applications.
1791         @deprecated The API that used this permission has been removed. -->
1792    <permission android:name="android.permission.READ_INPUT_STATE"
1793        android:protectionLevel="signature" />
1794
1795    <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
1796         to ensure that only the system can bind to it. -->
1797    <permission android:name="android.permission.BIND_INPUT_METHOD"
1798        android:protectionLevel="signature" />
1799
1800    <!-- Must be required by an {@link android.media.midi.MidiDeviceService},
1801         to ensure that only the system can bind to it. -->
1802    <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE"
1803        android:protectionLevel="signature" />
1804
1805    <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
1806         to ensure that only the system can bind to it. -->
1807    <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
1808        android:protectionLevel="signature" />
1809
1810    <!-- Must be required by a {@link android.printservice.PrintService},
1811         to ensure that only the system can bind to it. -->
1812    <permission android:name="android.permission.BIND_PRINT_SERVICE"
1813        android:protectionLevel="signature" />
1814
1815    <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
1816         or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
1817         the system can bind to it. -->
1818    <permission android:name="android.permission.BIND_NFC_SERVICE"
1819        android:protectionLevel="signature" />
1820
1821    <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
1822         @hide -->
1823    <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
1824        android:protectionLevel="signature" />
1825
1826    <!-- Must be required by a TextService (e.g. SpellCheckerService)
1827         to ensure that only the system can bind to it. -->
1828    <permission android:name="android.permission.BIND_TEXT_SERVICE"
1829        android:protectionLevel="signature" />
1830
1831    <!-- Must be required by a {@link android.net.VpnService},
1832         to ensure that only the system can bind to it. -->
1833    <permission android:name="android.permission.BIND_VPN_SERVICE"
1834        android:protectionLevel="signature" />
1835
1836    <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
1837         to ensure that only the system can bind to it. -->
1838    <permission android:name="android.permission.BIND_WALLPAPER"
1839        android:protectionLevel="signature|system" />
1840
1841    <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
1842         to ensure that only the system can bind to it. -->
1843    <permission android:name="android.permission.BIND_VOICE_INTERACTION"
1844        android:protectionLevel="signature" />
1845
1846    <!-- Must be required by hotword enrollment application,
1847         to ensure that only the system can interact with it.
1848         @hide <p>Not for use by third-party applications.</p> -->
1849    <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
1850        android:protectionLevel="signature|system" />
1851
1852    <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
1853         to ensure that only the system can bind to it.
1854         @hide -->
1855    <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
1856        android:protectionLevel="signature" />
1857
1858    <!-- Must be required by a {@link android.media.tv.TvInputService}
1859         to ensure that only the system can bind to it. -->
1860    <permission android:name="android.permission.BIND_TV_INPUT"
1861        android:protectionLevel="signature|system" />
1862
1863    <!-- @SystemApi Allows an application to modify parental controls
1864         <p>Not for use by third-party applications.
1865         @hide -->
1866    <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS"
1867        android:protectionLevel="signature|system" />
1868
1869    <!-- Must be required by a {@link android.media.routing.MediaRouteService}
1870         to ensure that only the system can interact with it.
1871         @hide -->
1872    <permission android:name="android.permission.BIND_ROUTE_PROVIDER"
1873        android:protectionLevel="signature" />
1874
1875    <!-- Must be required by device administration receiver, to ensure that only the
1876         system can interact with it. -->
1877    <permission android:name="android.permission.BIND_DEVICE_ADMIN"
1878        android:protectionLevel="signature" />
1879
1880    <!-- @SystemApi Required to add or remove another application as a device admin.
1881         <p>Not for use by third-party applications.
1882         @hide -->
1883    <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
1884        android:protectionLevel="signature|system" />
1885
1886    <!-- Allows low-level access to setting the orientation (actually
1887         rotation) of the screen.
1888         <p>Not for use by third-party applications. -->
1889    <permission android:name="android.permission.SET_ORIENTATION"
1890        android:protectionLevel="signature" />
1891
1892    <!-- Allows low-level access to setting the pointer speed.
1893         <p>Not for use by third-party applications. -->
1894    <permission android:name="android.permission.SET_POINTER_SPEED"
1895        android:protectionLevel="signature" />
1896
1897    <!-- Allows low-level access to setting input device calibration.
1898         <p>Not for use by normal applications.
1899         @hide -->
1900    <permission android:name="android.permission.SET_INPUT_CALIBRATION"
1901        android:protectionLevel="signature" />
1902
1903    <!-- Allows low-level access to setting the keyboard layout.
1904         <p>Not for use by third-party applications.
1905         @hide -->
1906    <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
1907        android:protectionLevel="signature" />
1908
1909    <!-- Allows an application to request installing packages. Apps
1910         targeting APIs greater than 22 must hold this permission in
1911         order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}.-->
1912    <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES"
1913        android:label="@string/permlab_requestInstallPackages"
1914        android:description="@string/permdesc_requestInstallPackages"
1915        android:protectionLevel="normal" />
1916
1917    <!-- @SystemApi Allows an application to install packages.
1918    <p>Not for use by third-party applications. -->
1919    <permission android:name="android.permission.INSTALL_PACKAGES"
1920        android:protectionLevel="signature|system" />
1921
1922    <!-- Allows an application to clear user data.
1923    <p>Not for use by third-party applications. -->
1924    <permission android:name="android.permission.CLEAR_APP_USER_DATA"
1925        android:protectionLevel="signature" />
1926
1927    <!-- @SystemApi Allows an application to delete cache files.
1928    <p>Not for use by third-party applications. -->
1929    <permission android:name="android.permission.DELETE_CACHE_FILES"
1930        android:protectionLevel="signature|system" />
1931
1932    <!-- @SystemApi Allows an application to delete packages.
1933    <p>Not for use by third-party applications. -->
1934    <permission android:name="android.permission.DELETE_PACKAGES"
1935        android:protectionLevel="signature|system" />
1936
1937    <!-- @SystemApi Allows an application to move location of installed package.
1938         @hide -->
1939    <permission android:name="android.permission.MOVE_PACKAGE"
1940        android:protectionLevel="signature|system" />
1941
1942    <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
1943         enabled or not.
1944         <p>Not for use by third-party applications. -->
1945    <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
1946        android:protectionLevel="signature|system" />
1947
1948    <!-- @hide Allows an application to grant or revoke specific permissions. -->
1949    <permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS"
1950        android:protectionLevel="signature" />
1951
1952    <!-- @hide Allows an application to observe permission changes. -->
1953    <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS"
1954        android:protectionLevel="signatureOrSystem" />
1955
1956    <!-- Allows an application to use SurfaceFlinger's low level features.
1957    <p>Not for use by third-party applications. -->
1958    <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
1959        android:protectionLevel="signature" />
1960
1961    <!-- @SystemApi Allows an application to take screen shots and more generally
1962         get access to the frame buffer data.
1963         <p>Not for use by third-party applications. -->
1964    <permission android:name="android.permission.READ_FRAME_BUFFER"
1965        android:protectionLevel="signature|system" />
1966
1967    <!-- Allows an application to use InputFlinger's low level features.
1968         @hide -->
1969    <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
1970        android:protectionLevel="signature" />
1971
1972    <!-- Allows an application to configure and connect to Wifi displays
1973         @hide -->
1974    <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
1975        android:protectionLevel="signature" />
1976
1977    <!-- Allows an application to control low-level features of Wifi displays
1978         such as opening an RTSP socket.  This permission should only be used
1979         by the display manager.
1980         @hide -->
1981    <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
1982        android:protectionLevel="signature" />
1983
1984    <!-- @SystemApi Allows an application to control VPN.
1985         <p>Not for use by third-party applications.</p>
1986         @hide -->
1987    <permission android:name="android.permission.CONTROL_VPN"
1988        android:protectionLevel="signature|system" />
1989    <uses-permission android:name="android.permission.CONTROL_VPN" />
1990
1991    <!-- @SystemApi Allows an application to capture audio output.
1992         <p>Not for use by third-party applications.</p> -->
1993    <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
1994        android:protectionLevel="signature|system" />
1995
1996    <!-- @SystemApi Allows an application to capture audio for hotword detection.
1997         <p>Not for use by third-party applications.</p>
1998         @hide -->
1999    <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
2000        android:protectionLevel="signature|system" />
2001
2002    <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
2003         <p>Not for use by third-party applications.</p>
2004         @hide -->
2005    <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
2006        android:protectionLevel="signature|system" />
2007
2008    <!-- @SystemApi Allows an application to capture video output.
2009         <p>Not for use by third-party applications.</p> -->
2010    <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
2011        android:protectionLevel="signature|system" />
2012
2013    <!-- @SystemApi Allows an application to capture secure video output.
2014         <p>Not for use by third-party applications.</p> -->
2015    <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
2016        android:protectionLevel="signature|system" />
2017
2018    <!-- @SystemApi Allows an application to know what content is playing and control its playback.
2019         <p>Not for use by third-party applications due to privacy of media consumption</p>  -->
2020    <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
2021        android:protectionLevel="signature|system" />
2022
2023    <!-- Required to be able to disable the device (very dangerous!).
2024    <p>Not for use by third-party applications.. -->
2025    <permission android:name="android.permission.BRICK"
2026        android:protectionLevel="signature" />
2027
2028    <!-- @SystemApi Required to be able to reboot the device.
2029    <p>Not for use by third-party applications. -->
2030    <permission android:name="android.permission.REBOOT"
2031        android:protectionLevel="signature|system" />
2032
2033   <!-- Allows low-level access to power management.
2034   <p>Not for use by third-party applications. -->
2035    <permission android:name="android.permission.DEVICE_POWER"
2036        android:protectionLevel="signature" />
2037
2038   <!-- Allows access to the PowerManager.userActivity function.
2039   <p>Not for use by third-party applications. @hide @SystemApi -->
2040    <permission android:name="android.permission.USER_ACTIVITY"
2041        android:protectionLevel="signature|system" />
2042
2043   <!-- @hide Allows low-level access to tun tap driver -->
2044    <permission android:name="android.permission.NET_TUNNELING"
2045        android:protectionLevel="signature" />
2046
2047    <!-- Run as a manufacturer test application, running as the root user.
2048         Only available when the device is running in manufacturer test mode.
2049         <p>Not for use by third-party applications. -->
2050    <permission android:name="android.permission.FACTORY_TEST"
2051        android:protectionLevel="signature" />
2052
2053    <!-- Allows an application to broadcast a notification that an application
2054         package has been removed.
2055         <p>Not for use by third-party applications. -->
2056    <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
2057        android:protectionLevel="signature" />
2058
2059    <!-- Allows an application to broadcast an SMS receipt notification.
2060    <p>Not for use by third-party applications. -->
2061    <permission android:name="android.permission.BROADCAST_SMS"
2062        android:protectionLevel="signature" />
2063
2064    <!-- Allows an application to broadcast a WAP PUSH receipt notification.
2065    <p>Not for use by third-party applications. -->
2066    <permission android:name="android.permission.BROADCAST_WAP_PUSH"
2067        android:protectionLevel="signature" />
2068
2069    <!-- @SystemApi Allows an application to broadcast privileged networking requests.
2070         <p>Not for use by third-party applications. @hide -->
2071    <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED"
2072        android:protectionLevel="signature|system" />
2073
2074    <!-- @SystemApi Not for use by third-party applications. -->
2075    <permission android:name="android.permission.MASTER_CLEAR"
2076        android:protectionLevel="signature|system" />
2077
2078    <!-- @SystemApi Allows an application to call any phone number, including emergency
2079         numbers, without going through the Dialer user interface for the user
2080         to confirm the call being placed.
2081         <p>Not for use by third-party applications. -->
2082    <permission android:name="android.permission.CALL_PRIVILEGED"
2083        android:protectionLevel="signature|system" />
2084
2085    <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
2086    <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
2087        android:protectionLevel="signature|system" />
2088
2089    <!-- @SystemApi Allows an application to perform SIM Activation @hide -->
2090    <permission android:name="android.permission.PERFORM_SIM_ACTIVATION"
2091        android:protectionLevel="signature|system" />
2092
2093    <!-- @SystemApi Allows enabling/disabling location update notifications from
2094         the radio.
2095         <p>Not for use by third-party applications. -->
2096    <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
2097        android:protectionLevel="signature|system" />
2098
2099    <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
2100         database, to change values that get uploaded.
2101         <p>Not for use by third-party applications. -->
2102    <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
2103        android:protectionLevel="signature|system" />
2104
2105    <!-- @SystemApi Allows an application to collect component usage
2106         statistics
2107         <p>Declaring the permission implies intention to use the API and the user of the
2108         device can grant permission through the Settings application. -->
2109    <permission android:name="android.permission.PACKAGE_USAGE_STATS"
2110        android:protectionLevel="signature|development|appop" />
2111    <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" />
2112
2113    <!-- @hide Allows an application to change the app idle state of an app.
2114         <p>Not for use by third-party applications. -->
2115    <permission android:name="android.permission.CHANGE_APP_IDLE_STATE"
2116        android:protectionLevel="signature" />
2117
2118    <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to
2119         access the network and acquire wakelocks.
2120         <p>Not for use by third-party applications. -->
2121    <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST"
2122        android:protectionLevel="system|signature" />
2123
2124    <!-- @SystemApi Allows an application to collect battery statistics -->
2125    <permission android:name="android.permission.BATTERY_STATS"
2126        android:protectionLevel="signature|system|development" />
2127
2128    <!-- @SystemApi Allows an application to control the backup and restore process.
2129    <p>Not for use by third-party applications.
2130         @hide pending API council -->
2131    <permission android:name="android.permission.BACKUP"
2132        android:protectionLevel="signature|system" />
2133
2134    <!-- Allows a package to launch the secure full-backup confirmation UI.
2135         ONLY the system process may hold this permission.
2136         @hide -->
2137    <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
2138        android:protectionLevel="signature" />
2139
2140    <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
2141         to ensure that only the system can bind to it. -->
2142    <permission android:name="android.permission.BIND_REMOTEVIEWS"
2143        android:protectionLevel="signature|system" />
2144
2145    <!-- @SystemApi Allows an application to tell the AppWidget service which application
2146         can access AppWidget's data.  The normal user flow is that a user
2147         picks an AppWidget to go into a particular host, thereby giving that
2148         host application access to the private data from the AppWidget app.
2149         An application that has this permission should honor that contract.
2150         <p>Not for use by third-party applications. -->
2151    <permission android:name="android.permission.BIND_APPWIDGET"
2152        android:protectionLevel="signature|system" />
2153
2154    <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
2155         keyguard widget
2156         @hide -->
2157    <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
2158        android:protectionLevel="signature|system" />
2159
2160    <!-- @SystemApi Internal permission allowing an application to query/set which
2161         applications can bind AppWidgets.
2162         @hide -->
2163    <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
2164        android:protectionLevel="signature|system" />
2165
2166    <!-- Allows applications to change the background data setting.
2167    <p>Not for use by third-party applications.
2168         @hide pending API council -->
2169    <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
2170        android:protectionLevel="signature" />
2171
2172    <!-- @SystemApi This permission can be used on content providers to allow the global
2173         search system to access their data.  Typically it used when the
2174         provider has some permissions protecting it (which global search
2175         would not be expected to hold), and added as a read-only permission
2176         to the path in the provider where global search queries are
2177         performed.  This permission can not be held by regular applications;
2178         it is used by applications to protect themselves from everyone else
2179         besides global search. -->
2180    <permission android:name="android.permission.GLOBAL_SEARCH"
2181        android:protectionLevel="signature|system" />
2182
2183    <!-- Internal permission protecting access to the global search
2184         system: ensures that only the system can access the provider
2185         to perform queries (since this otherwise provides unrestricted
2186         access to a variety of content providers), and to write the
2187         search statistics (to keep applications from gaming the source
2188         ranking).
2189         @hide -->
2190    <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
2191        android:protectionLevel="signature" />
2192
2193    <!-- @SystemApi Internal permission to allows an application to read indexable data.
2194        @hide -->
2195    <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
2196        android:protectionLevel="signature|system" />
2197
2198    <!-- @SystemApi Allows applications to set a live wallpaper.
2199         @hide XXX Change to signature once the picker is moved to its
2200         own apk as Ghod Intended. -->
2201    <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
2202        android:protectionLevel="signature|system" />
2203
2204    <!-- @SystemApi Allows applications to read dream settings and dream state.
2205         @hide -->
2206    <permission android:name="android.permission.READ_DREAM_STATE"
2207        android:protectionLevel="signature|system" />
2208
2209    <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
2210         @hide -->
2211    <permission android:name="android.permission.WRITE_DREAM_STATE"
2212        android:protectionLevel="signature|system" />
2213
2214    <!-- @SystemApi Allow an application to read and write the cache partition.
2215         @hide -->
2216    <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
2217        android:protectionLevel="signature|system" />
2218
2219    <!-- Must be required by default container service so that only
2220         the system can bind to it and use it to copy
2221         protected data to secure containers or files
2222         accessible to the system.
2223         @hide -->
2224    <permission android:name="android.permission.COPY_PROTECTED_DATA"
2225        android:protectionLevel="signature" />
2226
2227    <!-- @SystemApi Internal permission protecting access to the encryption methods
2228        @hide
2229    -->
2230    <permission android:name="android.permission.CRYPT_KEEPER"
2231        android:protectionLevel="signature|system" />
2232
2233    <!-- @SystemApi Allows an application to read historical network usage for
2234         specific networks and applications. @hide -->
2235    <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
2236        android:protectionLevel="signature|system" />
2237
2238    <!-- Allows an application to manage network policies (such as warning and disable
2239         limits) and to define application-specific rules. @hide -->
2240    <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
2241        android:protectionLevel="signature" />
2242
2243    <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used
2244         by system services like download manager and media server. Not for use by
2245         third party apps. @hide -->
2246    <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
2247        android:protectionLevel="signature|system" />
2248
2249    <!-- C2DM permission.
2250         @hide Used internally.
2251     -->
2252    <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
2253          android:protectionLevel="signature" />
2254    <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
2255
2256    <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
2257         trust it to verify packages.
2258    -->
2259    <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
2260        android:protectionLevel="signature|system" />
2261
2262    <!-- Must be required by package verifier receiver, to ensure that only the
2263         system can interact with it.
2264         @hide
2265    -->
2266    <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
2267        android:protectionLevel="signature" />
2268
2269    <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the
2270         PackageManager will trust it to verify intent filters.
2271    -->
2272    <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT"
2273        android:protectionLevel="signature|system" />
2274
2275    <!-- Must be required by intent filter verifier receiver, to ensure that only the
2276         system can interact with it.
2277         @hide
2278    -->
2279    <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER"
2280        android:protectionLevel="signature" />
2281
2282    <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
2283         @hide -->
2284    <permission android:name="android.permission.SERIAL_PORT"
2285        android:protectionLevel="signature|system" />
2286
2287    <!-- Allows the holder to access content providers from outside an ApplicationThread.
2288         This permission is enforced by the ActivityManagerService on the corresponding APIs,
2289         in particular ActivityManagerService#getContentProviderExternal(String) and
2290         ActivityManagerService#removeContentProviderExternal(String).
2291         @hide
2292    -->
2293    <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
2294        android:protectionLevel="signature" />
2295
2296    <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
2297         OTA reboot *not* occur while the lock is held.
2298         @hide -->
2299    <permission android:name="android.permission.UPDATE_LOCK"
2300        android:protectionLevel="signatureOrSystem" />
2301
2302    <!-- @SystemApi Allows an application to read the current set of notifications, including
2303         any metadata and intents attached.
2304         @hide -->
2305    <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
2306        android:protectionLevel="signature|system" />
2307
2308    <!-- Marker permission for applications that wish to access notification policy. -->
2309    <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY"
2310        android:description="@string/permdesc_access_notification_policy"
2311        android:label="@string/permlab_access_notification_policy"
2312        android:protectionLevel="normal" />
2313
2314    <!-- Allows access to keyguard secure storage.  Only allowed for system processes.
2315        @hide -->
2316    <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
2317        android:protectionLevel="signature" />
2318
2319    <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide -->
2320    <permission android:name="android.permission.MANAGE_FINGERPRINT"
2321        android:protectionLevel="signature" />
2322
2323    <!-- Allows an application to control keyguard.  Only allowed for system processes.
2324        @hide -->
2325    <permission android:name="android.permission.CONTROL_KEYGUARD"
2326        android:protectionLevel="signature" />
2327
2328    <!-- Allows an application to listen to trust changes.  Only allowed for system processes.
2329        @hide -->
2330    <permission android:name="android.permission.TRUST_LISTENER"
2331        android:protectionLevel="signature" />
2332
2333    <!-- @SystemApi Allows an application to provide a trust agent.
2334         @hide For security reasons, this is a platform-only permission. -->
2335    <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
2336        android:protectionLevel="signatureOrSystem" />
2337
2338    <!-- Allows an application to launch the trust agent settings activity.
2339        @hide -->
2340    <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
2341        android:protectionLevel="signatureOrSystem" />
2342
2343    <!-- @SystemApi Must be required by an {@link
2344        android.service.trust.TrustAgentService},
2345        to ensure that only the system can bind to it.
2346        @hide -->
2347    <permission android:name="android.permission.BIND_TRUST_AGENT"
2348        android:protectionLevel="signature" />
2349
2350    <!-- Must be required by an {@link
2351         android.service.notification.NotificationListenerService},
2352         to ensure that only the system can bind to it. -->
2353    <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
2354        android:protectionLevel="signature" />
2355
2356    <!-- Must be required by a {@link
2357         android.service.chooser.ChooserTargetService}, to ensure that
2358         only the system can bind to it. -->
2359    <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE"
2360        android:protectionLevel="signature" />
2361
2362    <!-- @SystemApi Must be required by a {@link
2363         android.service.notification.ConditionProviderService},
2364         to ensure that only the system can bind to it.
2365         @hide -->
2366    <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
2367        android:protectionLevel="signature" />
2368
2369    <!-- Must be required by an {@link android.service.dreams.DreamService},
2370         to ensure that only the system can bind to it. -->
2371    <permission android:name="android.permission.BIND_DREAM_SERVICE"
2372        android:protectionLevel="signature" />
2373
2374    <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
2375         carrier setup application to enforce that this permission is required
2376         @hide This is not a third-party API (intended for OEMs and system apps). -->
2377    <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
2378        android:protectionLevel="signature|system" />
2379
2380    <!-- @SystemApi Allows an application to listen for network condition observations.
2381         @hide This is not a third-party API (intended for system apps). -->
2382    <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
2383        android:protectionLevel="signature|system" />
2384
2385    <!-- @SystemApi Allows an application to provision and access DRM certificates
2386         @hide This is not a third-party API (intended for system apps). -->
2387    <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
2388        android:protectionLevel="signature|system" />
2389
2390    <!-- Api Allows an application to manage media projection sessions.
2391         @hide This is not a third-party API (intended for system apps). -->
2392    <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION"
2393        android:protectionLevel="signature" />
2394
2395    <!-- @SystemApi Allows an application to read install sessions
2396         @hide This is not a third-party API (intended for system apps). -->
2397    <permission android:name="android.permission.READ_INSTALL_SESSIONS"
2398        android:label="@string/permlab_readInstallSessions"
2399        android:description="@string/permdesc_readInstallSessions"
2400        android:protectionLevel="normal"/>
2401
2402    <!-- @SystemApi Allows an application to remove DRM certificates
2403         @hide This is not a third-party API (intended for system apps). -->
2404    <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES"
2405        android:protectionLevel="signature|system" />
2406
2407    <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead -->
2408    <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE"
2409        android:protectionLevel="signature|system" />
2410
2411    <!-- Allows an application to interact with the currently active
2412         {@link android.service.voice.VoiceInteractionService}.
2413         @hide -->
2414    <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE"
2415        android:protectionLevel="signature" />
2416
2417    <!-- Allows an app that has this permission and a permissions to install packages
2418         to request all runtime permissions to be granted at installation.
2419     @hide -->
2420    <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS"
2421        android:protectionLevel="signature" />
2422
2423    <!-- Allows receiving status updates from a device initializer.
2424         @hide Not for use by third-party applications. -->
2425    <permission android:name="android.permission.RECEIVE_DEVICE_INITIALIZER_STATUS"
2426        android:protectionLevel="signature" />
2427
2428    <!-- The system process that is allowed to bind to services in carrier apps will
2429         have this permission. Carrier apps should use this permission to protect
2430         their services that only the system is allowed to bind to. -->
2431    <permission android:name="android.permission.BIND_CARRIER_SERVICES"
2432        android:label="@string/permlab_bindCarrierServices"
2433        android:description="@string/permdesc_bindCarrierServices"
2434        android:protectionLevel="signature|system" />
2435
2436    <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT
2437         flag is set.
2438         @hide -->
2439    <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT"
2440                android:protectionLevel="signature" />
2441
2442    <!-- @SystemApi Allows applications to kill UIDs.
2443        <p>Not for use by third-party applications.
2444         @hide -->
2445    <permission android:name="android.permission.KILL_UID"
2446                android:protectionLevel="signature" />
2447
2448    <!-- Allows applications to act as network scorers. @hide @SystemApi-->
2449    <permission android:name="android.permission.LOCAL_MAC_ADDRESS"
2450                android:protectionLevel="signatureOrSystem" />
2451
2452    <!-- The system process is explicitly the only one allowed to launch the
2453         confirmation UI for full backup/restore -->
2454    <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
2455
2456    <application android:process="system"
2457                 android:persistent="true"
2458                 android:hasCode="false"
2459                 android:label="@string/android_system_label"
2460                 android:allowClearUserData="false"
2461                 android:backupAgent="com.android.server.backup.SystemBackupAgent"
2462                 android:killAfterRestore="false"
2463                 android:icon="@drawable/ic_launcher_android"
2464                 android:supportsRtl="true"
2465                 android:theme="@style/Theme.Material.DayNight.DarkActionBar">
2466        <activity android:name="com.android.internal.app.ChooserActivity"
2467                android:theme="@style/Theme.DeviceDefault.Resolver"
2468                android:finishOnCloseSystemDialogs="true"
2469                android:excludeFromRecents="true"
2470                android:documentLaunchMode="never"
2471                android:relinquishTaskIdentity="true"
2472                android:process=":ui">
2473            <intent-filter>
2474                <action android:name="android.intent.action.CHOOSER" />
2475                <category android:name="android.intent.category.DEFAULT" />
2476            </intent-filter>
2477        </activity>
2478        <activity android:name="com.android.internal.app.IntentForwarderActivity"
2479                android:finishOnCloseSystemDialogs="true"
2480                android:theme="@style/Theme.NoDisplay"
2481                android:excludeFromRecents="true"
2482                android:label="@string/user_owner_label"
2483                android:exported="true"
2484                >
2485        </activity>
2486        <activity-alias android:name="com.android.internal.app.ForwardIntentToUserOwner"
2487                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2488                android:exported="true"
2489                android:label="@string/user_owner_label">
2490        </activity-alias>
2491        <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
2492                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
2493                android:icon="@drawable/ic_corp_icon"
2494                android:exported="true"
2495                android:label="@string/managed_profile_label">
2496        </activity-alias>
2497        <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
2498                android:theme="@style/Theme.Material.DayNight.Dialog"
2499                android:label="@string/heavy_weight_switcher_title"
2500                android:finishOnCloseSystemDialogs="true"
2501                android:excludeFromRecents="true"
2502                android:process=":ui">
2503        </activity>
2504        <activity android:name="com.android.internal.app.PlatLogoActivity"
2505                android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
2506                android:configChanges="orientation|keyboardHidden"
2507                android:process=":ui">
2508        </activity>
2509        <activity android:name="com.android.internal.app.DisableCarModeActivity"
2510                android:theme="@style/Theme.NoDisplay"
2511                android:excludeFromRecents="true"
2512                android:process=":ui">
2513        </activity>
2514        <activity android:name="com.android.internal.app.DumpHeapActivity"
2515                android:theme="@style/Theme.Translucent.NoTitleBar"
2516                android:label="@string/dump_heap_title"
2517                android:finishOnCloseSystemDialogs="true"
2518                android:noHistory="true"
2519                android:excludeFromRecents="true"
2520                android:process=":ui">
2521        </activity>
2522        <provider android:name="com.android.server.am.DumpHeapProvider"
2523                android:authorities="com.android.server.heapdump"
2524                android:grantUriPermissions="true"
2525                android:multiprocess="false"
2526                android:singleUser="true" />
2527
2528        <activity android:name="android.accounts.ChooseAccountActivity"
2529                android:excludeFromRecents="true"
2530                android:exported="true"
2531                android:theme="@style/Theme.Material.DayNight.Dialog"
2532                android:label="@string/choose_account_label"
2533                android:process=":ui">
2534        </activity>
2535
2536        <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
2537                android:excludeFromRecents="true"
2538                android:exported="true"
2539                android:theme="@style/Theme.Material.DayNight.Dialog"
2540                android:label="@string/choose_account_label"
2541                android:process=":ui">
2542        </activity>
2543
2544        <activity android:name="android.accounts.ChooseAccountTypeActivity"
2545                android:excludeFromRecents="true"
2546                android:theme="@style/Theme.Material.DayNight.Dialog"
2547                android:label="@string/choose_account_label"
2548                android:process=":ui">
2549        </activity>
2550
2551        <activity android:name="android.accounts.CantAddAccountActivity"
2552                android:excludeFromRecents="true"
2553                android:exported="true"
2554                android:theme="@style/Theme.Material.DayNight.Dialog.NoActionBar"
2555                android:process=":ui">
2556        </activity>
2557
2558        <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
2559                android:excludeFromRecents="true"
2560                android:exported="true"
2561                android:theme="@style/Theme.Material.DayNight.DialogWhenLarge"
2562                android:process=":ui">
2563        </activity>
2564
2565        <activity android:name="android.content.SyncActivityTooManyDeletes"
2566               android:theme="@style/Theme.Material.DayNight.Dialog"
2567               android:label="@string/sync_too_many_deletes"
2568               android:process=":ui">
2569        </activity>
2570
2571        <activity android:name="com.android.internal.app.ShutdownActivity"
2572            android:permission="android.permission.SHUTDOWN"
2573            android:theme="@style/Theme.NoDisplay"
2574            android:excludeFromRecents="true">
2575            <intent-filter>
2576                <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" />
2577                <category android:name="android.intent.category.DEFAULT" />
2578            </intent-filter>
2579            <intent-filter>
2580                <action android:name="android.intent.action.REBOOT" />
2581                <category android:name="android.intent.category.DEFAULT" />
2582            </intent-filter>
2583        </activity>
2584
2585        <activity android:name="com.android.internal.app.NetInitiatedActivity"
2586                android:theme="@style/Theme.Material.DayNight.Dialog.Alert"
2587                android:excludeFromRecents="true"
2588                android:process=":ui">
2589        </activity>
2590
2591        <receiver android:name="com.android.server.BootReceiver"
2592                android:primaryUserOnly="true">
2593            <intent-filter android:priority="1000">
2594                <action android:name="android.intent.action.BOOT_COMPLETED" />
2595            </intent-filter>
2596        </receiver>
2597
2598        <receiver android:name="com.android.server.updates.CertPinInstallReceiver"
2599                android:permission="android.permission.UPDATE_CONFIG">
2600            <intent-filter>
2601                <action android:name="android.intent.action.UPDATE_PINS" />
2602                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2603            </intent-filter>
2604        </receiver>
2605
2606        <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver"
2607                android:permission="android.permission.UPDATE_CONFIG">
2608            <intent-filter>
2609                <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
2610                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2611            </intent-filter>
2612        </receiver>
2613
2614        <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver"
2615                android:permission="android.permission.UPDATE_CONFIG">
2616            <intent-filter>
2617                <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
2618                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2619            </intent-filter>
2620        </receiver>
2621
2622        <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver"
2623                android:permission="android.permission.UPDATE_CONFIG">
2624            <intent-filter>
2625                <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
2626                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2627            </intent-filter>
2628        </receiver>
2629
2630        <receiver android:name="com.android.server.updates.TzDataInstallReceiver"
2631                android:permission="android.permission.UPDATE_CONFIG">
2632            <intent-filter>
2633                <action android:name="android.intent.action.UPDATE_TZDATA" />
2634                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2635            </intent-filter>
2636        </receiver>
2637
2638        <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver"
2639                android:permission="android.permission.UPDATE_CONFIG">
2640            <intent-filter>
2641                <action android:name="android.intent.action.UPDATE_SEPOLICY" />
2642                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
2643            </intent-filter>
2644        </receiver>
2645
2646        <receiver android:name="com.android.server.MasterClearReceiver"
2647            android:permission="android.permission.MASTER_CLEAR">
2648            <intent-filter
2649                    android:priority="100" >
2650                <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR -->
2651                <action android:name="android.intent.action.MASTER_CLEAR" />
2652
2653                <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
2654                <action android:name="com.google.android.c2dm.intent.RECEIVE" />
2655                <category android:name="android.intent.category.MASTER_CLEAR" />
2656            </intent-filter>
2657        </receiver>
2658
2659        <service android:name="com.android.internal.os.storage.ExternalStorageFormatter"
2660            android:permission="android.permission.MASTER_CLEAR"
2661            android:exported="true" />
2662
2663        <service android:name="android.hardware.location.GeofenceHardwareService"
2664            android:permission="android.permission.LOCATION_HARDWARE"
2665            android:exported="false" />
2666
2667        <service android:name="com.android.internal.backup.LocalTransportService"
2668                android:permission="android.permission.CONFIRM_FULL_BACKUP"
2669                android:exported="false">
2670            <intent-filter>
2671                <action android:name="android.backup.TRANSPORT_HOST" />
2672            </intent-filter>
2673        </service>
2674
2675        <service android:name="com.android.server.MountServiceIdler"
2676                 android:exported="true"
2677                 android:permission="android.permission.BIND_JOB_SERVICE" >
2678        </service>
2679
2680        <service android:name="com.android.server.backup.FullBackupJob"
2681                 android:exported="true"
2682                 android:permission="android.permission.BIND_JOB_SERVICE" >
2683        </service>
2684
2685        <service android:name="com.android.server.backup.KeyValueBackupJob"
2686                 android:permission="android.permission.BIND_JOB_SERVICE" >
2687        </service>
2688
2689        <service
2690            android:name="com.android.server.pm.BackgroundDexOptService"
2691            android:exported="true"
2692            android:permission="android.permission.BIND_JOB_SERVICE">
2693        </service>
2694
2695    </application>
2696
2697</manifest>
2698