Home | History | Annotate | Download | only in res
      1 <?xml version="1.0" encoding="utf-8"?>
      2 <!--
      3 /* //device/apps/common/AndroidManifest.xml
      4 **
      5 ** Copyright 2006, The Android Open Source Project
      6 **
      7 ** Licensed under the Apache License, Version 2.0 (the "License");
      8 ** you may not use this file except in compliance with the License.
      9 ** You may obtain a copy of the License at
     10 **
     11 **     http://www.apache.org/licenses/LICENSE-2.0
     12 **
     13 ** Unless required by applicable law or agreed to in writing, software
     14 ** distributed under the License is distributed on an "AS IS" BASIS,
     15 ** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     16 ** See the License for the specific language governing permissions and
     17 ** limitations under the License.
     18 */
     19 -->
     20 <manifest xmlns:android="http://schemas.android.com/apk/res/android"
     21     package="android" coreApp="true" android:sharedUserId="android.uid.system"
     22     android:sharedUserLabel="@string/android_system_label">
     23 
     24     <!-- ================================================ -->
     25     <!-- Special broadcasts that only the system can send -->
     26     <!-- ================================================ -->
     27     <eat-comment />
     28 
     29     <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
     30     <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
     31     <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
     32     <protected-broadcast android:name="android.intent.action.TIME_TICK" />
     33     <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
     34     <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
     35     <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
     36     <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
     37     <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
     38     <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
     39     <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
     40     <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
     41     <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
     42     <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
     43     <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
     44     <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
     45     <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
     46     <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
     47     <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
     48     <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
     49     <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
     50     <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
     51     <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
     52     <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
     53     <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
     54     <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
     55     <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
     56     <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
     57     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
     58     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
     59     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
     60     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
     61     <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
     62     <protected-broadcast android:name="android.intent.action.REBOOT" />
     63     <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
     64     <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
     65     <protected-broadcast android:name="android.intent.action.USER_ADDED" />
     66     <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
     67     <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
     68     <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
     69     <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
     70     <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
     71 
     72     <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
     73     <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
     74     <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
     75     <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
     76 
     77     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
     78     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
     79     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
     80     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
     81 
     82     <protected-broadcast android:name="android.backup.intent.RUN" />
     83     <protected-broadcast android:name="android.backup.intent.CLEAR" />
     84     <protected-broadcast android:name="android.backup.intent.INIT" />
     85 
     86     <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
     87     <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
     88     <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
     89     <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
     90     <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
     91     <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
     92     <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
     93     <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
     94     <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
     95     <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
     96     <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
     97     <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
     98     <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
     99     <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
    100     <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
    101     <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
    102     <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
    103     <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
    104     <protected-broadcast
    105         android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
    106     <protected-broadcast
    107         android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
    108     <protected-broadcast
    109         android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
    110     <protected-broadcast
    111         android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
    112     <protected-broadcast
    113         android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
    114     <protected-broadcast
    115         android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
    116     <protected-broadcast
    117         android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
    118 
    119     <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
    120 
    121     <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
    122     <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
    123     <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
    124     <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
    125     <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
    126 
    127     <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
    128     <protected-broadcast android:name="android.intent.action.ANALOG_AUDIO_DOCK_PLUG" />
    129     <protected-broadcast android:name="android.intent.action.DIGITAL_AUDIO_DOCK_PLUG" />
    130     <protected-broadcast android:name="android.intent.action.HDMI_AUDIO_PLUG" />
    131     <protected-broadcast android:name="android.intent.action.USB_AUDIO_ACCESSORY_PLUG" />
    132     <protected-broadcast android:name="android.intent.action.USB_AUDIO_DEVICE_PLUG" />
    133 
    134     <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
    135     <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
    136     <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
    137     <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
    138     <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
    139 
    140     <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" />
    141     <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
    142     <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
    143     <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
    144 
    145     <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
    146     <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
    147     <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
    148 
    149     <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
    150 
    151     <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
    152     <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
    153     <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
    154 
    155     <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
    156     <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
    157     <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
    158     <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
    159     <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
    160     <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
    161     <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
    162     <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
    163     <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
    164     <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
    165     <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
    166     <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
    167     <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
    168     <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
    169     <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
    170     <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
    171     <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
    172     <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
    173     <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
    174     <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
    175     <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
    176     <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
    177     <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
    178     <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
    179     <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" />
    180 
    181     <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
    182     <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
    183 
    184     <!-- ====================================== -->
    185     <!-- Permissions for things that cost money -->
    186     <!-- ====================================== -->
    187     <eat-comment />
    188 
    189     <!-- Used for permissions that can be used to make the user spend money
    190          without their direct involvement. -->
    191     <permission-group android:name="android.permission-group.COST_MONEY"
    192         android:label="@string/permgrouplab_costMoney"
    193         android:description="@string/permgroupdesc_costMoney" />
    194 
    195     <!-- ================================== -->
    196     <!-- Permissions for accessing messages -->
    197     <!-- ================================== -->
    198     <eat-comment />
    199 
    200     <!-- Used for permissions that allow an application to send messages
    201          on behalf of the user or intercept messages being received by the
    202          user.  This is primarily intended for SMS/MMS messaging, such as
    203          receiving or reading an MMS. -->
    204     <permission-group android:name="android.permission-group.MESSAGES"
    205         android:label="@string/permgrouplab_messages"
    206         android:icon="@drawable/perm_group_messages"
    207         android:description="@string/permgroupdesc_messages"
    208         android:permissionGroupFlags="personalInfo"
    209         android:priority="360"/>
    210 
    211     <!-- Allows an application to send SMS messages. -->
    212     <permission android:name="android.permission.SEND_SMS"
    213         android:permissionGroup="android.permission-group.MESSAGES"
    214         android:protectionLevel="dangerous"
    215         android:permissionFlags="costsMoney"
    216         android:label="@string/permlab_sendSms"
    217         android:description="@string/permdesc_sendSms" />
    218 
    219     <!-- Allows an application (Phone) to send a request to other applications
    220          to handle the respond-via-message action during incoming calls.
    221          <p>Not for use by third-party applications. -->
    222     <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
    223         android:permissionGroup="android.permission-group.MESSAGES"
    224         android:protectionLevel="signature|system"
    225         android:label="@string/permlab_sendRespondViaMessageRequest"
    226         android:description="@string/permdesc_sendRespondViaMessageRequest" />
    227 
    228     <!-- Allows an application to monitor incoming SMS messages, to record
    229          or perform processing on them. -->
    230     <permission android:name="android.permission.RECEIVE_SMS"
    231         android:permissionGroup="android.permission-group.MESSAGES"
    232         android:protectionLevel="dangerous"
    233         android:label="@string/permlab_receiveSms"
    234         android:description="@string/permdesc_receiveSms" />
    235 
    236     <!-- Allows an application to monitor incoming MMS messages, to record
    237          or perform processing on them. -->
    238     <permission android:name="android.permission.RECEIVE_MMS"
    239         android:permissionGroup="android.permission-group.MESSAGES"
    240         android:protectionLevel="dangerous"
    241         android:label="@string/permlab_receiveMms"
    242         android:description="@string/permdesc_receiveMms" />
    243 
    244     <!-- Allows an application to receive emergency cell broadcast messages,
    245          to record or display them to the user.
    246          <p>Not for use by third-party applications.
    247          @hide Pending API council approval -->
    248     <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
    249         android:permissionGroup="android.permission-group.MESSAGES"
    250         android:protectionLevel="signature|system"
    251         android:label="@string/permlab_receiveEmergencyBroadcast"
    252         android:description="@string/permdesc_receiveEmergencyBroadcast" />
    253 
    254     <!-- Allows an application to read previously received cell broadcast
    255          messages and to register a content observer to get notifications when
    256          a cell broadcast has been received and added to the database. For
    257          emergency alerts, the database is updated immediately after the
    258          alert dialog and notification sound/vibration/speech are presented.
    259          The "read" column is then updated after the user dismisses the alert.
    260          This enables supplementary emergency assistance apps to start loading
    261          additional emergency information (if Internet access is available)
    262          when the alert is first received, and to delay presenting the info
    263          to the user until after the initial alert dialog is dismissed.
    264          @hide Pending API council approval -->
    265     <permission android:name="android.permission.READ_CELL_BROADCASTS"
    266         android:permissionGroup="android.permission-group.MESSAGES"
    267         android:protectionLevel="dangerous"
    268         android:label="@string/permlab_readCellBroadcasts"
    269         android:description="@string/permdesc_readCellBroadcasts" />
    270 
    271     <!-- Allows an application to read SMS messages. -->
    272     <permission android:name="android.permission.READ_SMS"
    273         android:permissionGroup="android.permission-group.MESSAGES"
    274         android:protectionLevel="dangerous"
    275         android:label="@string/permlab_readSms"
    276         android:description="@string/permdesc_readSms" />
    277 
    278     <!-- Allows an application to write SMS messages. -->
    279     <permission android:name="android.permission.WRITE_SMS"
    280         android:permissionGroup="android.permission-group.MESSAGES"
    281         android:protectionLevel="dangerous"
    282         android:label="@string/permlab_writeSms"
    283         android:description="@string/permdesc_writeSms" />
    284 
    285     <!-- Allows an application to monitor incoming WAP push messages. -->
    286     <permission android:name="android.permission.RECEIVE_WAP_PUSH"
    287         android:permissionGroup="android.permission-group.MESSAGES"
    288         android:protectionLevel="dangerous"
    289         android:label="@string/permlab_receiveWapPush"
    290         android:description="@string/permdesc_receiveWapPush" />
    291 
    292     <!-- =============================================================== -->
    293     <!-- Permissions for accessing social info (contacts and social) -->
    294     <!-- =============================================================== -->
    295     <eat-comment />
    296 
    297     <!-- Used for permissions that provide access to the user's social connections,
    298          such as contacts, call logs, social stream, etc.  This includes
    299          both reading and writing of this data (which should generally be
    300          expressed as two distinct permissions). -->
    301 
    302     <permission-group android:name="android.permission-group.SOCIAL_INFO"
    303         android:label="@string/permgrouplab_socialInfo"
    304         android:icon="@drawable/perm_group_social_info"
    305         android:description="@string/permgroupdesc_socialInfo"
    306         android:permissionGroupFlags="personalInfo"
    307         android:priority="320" />
    308 
    309     <!-- Allows an application to read the user's contacts data. -->
    310     <permission android:name="android.permission.READ_CONTACTS"
    311         android:permissionGroup="android.permission-group.SOCIAL_INFO"
    312         android:protectionLevel="dangerous"
    313         android:label="@string/permlab_readContacts"
    314         android:description="@string/permdesc_readContacts" />
    315 
    316     <!-- Allows an application to write (but not read) the user's
    317          contacts data. -->
    318     <permission android:name="android.permission.WRITE_CONTACTS"
    319         android:permissionGroup="android.permission-group.SOCIAL_INFO"
    320         android:protectionLevel="dangerous"
    321         android:label="@string/permlab_writeContacts"
    322         android:description="@string/permdesc_writeContacts" />
    323 
    324     <!-- Allows an application to execute contacts directory search.
    325          This should only be used by ContactsProvider.
    326          <p>Not for use by third-party applications. -->
    327     <!-- @hide -->
    328     <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
    329         android:permissionGroup="android.permission-group.PERSONAL_INFO"
    330         android:protectionLevel="signature|system" />
    331 
    332     <!-- Allows an application to read the user's call log.
    333          <p class="note"><strong>Note:</strong> If your app uses the
    334          {@link #READ_CONTACTS} permission and <em>both</em> your <a
    335          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
    336          minSdkVersion}</a> and <a
    337          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    338          targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
    339          grants your app this permission. If you don't need this permission, be sure your <a
    340          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    341          targetSdkVersion}</a> is 16 or higher.</p> -->
    342     <permission android:name="android.permission.READ_CALL_LOG"
    343         android:permissionGroup="android.permission-group.SOCIAL_INFO"
    344         android:protectionLevel="dangerous"
    345         android:label="@string/permlab_readCallLog"
    346         android:description="@string/permdesc_readCallLog" />
    347 
    348     <!-- Allows an application to write (but not read) the user's
    349          contacts data.
    350          <p class="note"><strong>Note:</strong> If your app uses the
    351          {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
    352          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
    353          minSdkVersion}</a> and <a
    354          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    355          targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
    356          grants your app this permission. If you don't need this permission, be sure your <a
    357          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    358          targetSdkVersion}</a> is 16 or higher.</p>  -->
    359     <permission android:name="android.permission.WRITE_CALL_LOG"
    360         android:permissionGroup="android.permission-group.SOCIAL_INFO"
    361         android:protectionLevel="dangerous"
    362         android:label="@string/permlab_writeCallLog"
    363         android:description="@string/permdesc_writeCallLog" />
    364 
    365   <!-- Allows an application to read from the user's social stream. -->
    366     <permission android:name="android.permission.READ_SOCIAL_STREAM"
    367         android:permissionGroup="android.permission-group.SOCIAL_INFO"
    368         android:protectionLevel="dangerous"
    369         android:label="@string/permlab_readSocialStream"
    370         android:description="@string/permdesc_readSocialStream" />
    371 
    372     <!-- Allows an application to write (but not read) the user's
    373          social stream data. -->
    374     <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
    375         android:permissionGroup="android.permission-group.SOCIAL_INFO"
    376         android:protectionLevel="dangerous"
    377         android:label="@string/permlab_writeSocialStream"
    378         android:description="@string/permdesc_writeSocialStream" />
    379 
    380     <!-- =============================================================== -->
    381     <!-- Permissions for accessing information about the device owner    -->
    382     <!-- =============================================================== -->
    383     <eat-comment />
    384 
    385     <!-- Used for permissions that provide access to information about the device
    386          user such as profile information.  This includes both reading and
    387          writing of this data (which should generally be expressed as two
    388          distinct permissions). -->
    389     <permission-group android:name="android.permission-group.PERSONAL_INFO"
    390         android:label="@string/permgrouplab_personalInfo"
    391         android:icon="@drawable/perm_group_personal_info"
    392         android:description="@string/permgroupdesc_personalInfo"
    393         android:permissionGroupFlags="personalInfo"
    394         android:priority="310" />
    395 
    396     <!-- Allows an application to read the user's personal profile data. -->
    397     <permission android:name="android.permission.READ_PROFILE"
    398         android:permissionGroup="android.permission-group.PERSONAL_INFO"
    399         android:protectionLevel="dangerous"
    400         android:label="@string/permlab_readProfile"
    401         android:description="@string/permdesc_readProfile" />
    402 
    403     <!-- Allows an application to write (but not read) the user's
    404          personal profile data. -->
    405     <permission android:name="android.permission.WRITE_PROFILE"
    406         android:permissionGroup="android.permission-group.PERSONAL_INFO"
    407         android:protectionLevel="dangerous"
    408         android:label="@string/permlab_writeProfile"
    409         android:description="@string/permdesc_writeProfile" />
    410 
    411     <!-- =============================================================== -->
    412     <!-- Permissions for accessing the device calendar                   -->
    413     <!-- =============================================================== -->
    414     <eat-comment />
    415 
    416     <!-- Used for permissions that provide access to the device
    417          calendar to create / view events.-->
    418     <permission-group android:name="android.permission-group.CALENDAR"
    419         android:label="@string/permgrouplab_calendar"
    420         android:icon="@drawable/perm_group_calendar"
    421         android:description="@string/permgroupdesc_calendar"
    422         android:permissionGroupFlags="personalInfo"
    423         android:priority="290" />
    424 
    425     <!-- Allows an application to read the user's calendar data. -->
    426     <permission android:name="android.permission.READ_CALENDAR"
    427         android:permissionGroup="android.permission-group.PERSONAL_INFO"
    428         android:protectionLevel="dangerous"
    429         android:label="@string/permlab_readCalendar"
    430         android:description="@string/permdesc_readCalendar" />
    431 
    432     <!-- Allows an application to write (but not read) the user's
    433          calendar data. -->
    434     <permission android:name="android.permission.WRITE_CALENDAR"
    435         android:permissionGroup="android.permission-group.PERSONAL_INFO"
    436         android:protectionLevel="dangerous"
    437         android:label="@string/permlab_writeCalendar"
    438         android:description="@string/permdesc_writeCalendar" />
    439 
    440     <!-- =============================================================== -->
    441     <!-- Permissions for accessing the user dictionary-->
    442     <!-- =============================================================== -->
    443     <eat-comment />
    444 
    445     <!-- Used for permissions that provide access to the user
    446          calendar to create / view events.-->
    447     <permission-group android:name="android.permission-group.USER_DICTIONARY"
    448         android:label="@string/permgrouplab_dictionary"
    449         android:icon="@drawable/perm_group_user_dictionary"
    450         android:description="@string/permgroupdesc_dictionary"
    451         android:permissionGroupFlags="personalInfo"
    452         android:priority="170" />
    453 
    454     <!-- Allows an application to read the user dictionary. This should
    455          really only be required by an IME, or a dictionary editor like
    456          the Settings app. -->
    457     <permission android:name="android.permission.READ_USER_DICTIONARY"
    458         android:permissionGroup="android.permission-group.USER_DICTIONARY"
    459         android:protectionLevel="dangerous"
    460         android:label="@string/permlab_readDictionary"
    461         android:description="@string/permdesc_readDictionary" />
    462 
    463     <!-- Used for permissions that provide access to the user
    464          calendar to create / view events.-->
    465     <permission-group android:name="android.permission-group.WRITE_USER_DICTIONARY"
    466         android:label="@string/permgrouplab_writeDictionary"
    467         android:icon="@drawable/perm_group_user_dictionary_write"
    468         android:description="@string/permgroupdesc_writeDictionary"
    469         android:priority="160" />
    470 
    471     <!-- Allows an application to write to the user dictionary. -->
    472     <permission android:name="android.permission.WRITE_USER_DICTIONARY"
    473         android:permissionGroup="android.permission-group.WRITE_USER_DICTIONARY"
    474         android:protectionLevel="normal"
    475         android:label="@string/permlab_writeDictionary"
    476         android:description="@string/permdesc_writeDictionary" />
    477 
    478     <!-- =============================================================== -->
    479     <!-- Permissions for accessing the user bookmarks                    -->
    480     <!-- =============================================================== -->
    481     <eat-comment />
    482 
    483     <!-- Used for permissions that provide access to the user
    484          bookmarks and browser history.-->
    485     <permission-group android:name="android.permission-group.BOOKMARKS"
    486         android:label="@string/permgrouplab_bookmarks"
    487         android:icon="@drawable/perm_group_bookmarks"
    488         android:description="@string/permgroupdesc_bookmarks"
    489         android:permissionGroupFlags="personalInfo"
    490         android:priority="300" />
    491 
    492     <!-- Allows an application to read (but not write) the user's
    493         browsing history and bookmarks. -->
    494     <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
    495         android:permissionGroup="android.permission-group.BOOKMARKS"
    496         android:label="@string/permlab_readHistoryBookmarks"
    497         android:description="@string/permdesc_readHistoryBookmarks"
    498         android:protectionLevel="dangerous" />
    499 
    500     <!-- Allows an application to write (but not read) the user's
    501         browsing history and bookmarks. -->
    502     <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
    503         android:permissionGroup="android.permission-group.BOOKMARKS"
    504         android:label="@string/permlab_writeHistoryBookmarks"
    505         android:description="@string/permdesc_writeHistoryBookmarks"
    506         android:protectionLevel="dangerous" />
    507 
    508     <!-- =============================================================== -->
    509     <!-- Permissions for setting the device alarm                        -->
    510     <!-- =============================================================== -->
    511     <eat-comment />
    512 
    513     <!-- Used for permissions that provide access to the user voicemail box. -->
    514     <permission-group android:name="android.permission-group.DEVICE_ALARMS"
    515         android:label="@string/permgrouplab_deviceAlarms"
    516         android:icon="@drawable/perm_group_device_alarms"
    517         android:description="@string/permgroupdesc_deviceAlarms"
    518         android:permissionGroupFlags="personalInfo"
    519         android:priority="210" />
    520 
    521     <!-- Allows an application to broadcast an Intent to set an alarm for the
    522          user. -->
    523     <permission android:name="com.android.alarm.permission.SET_ALARM"
    524         android:permissionGroup="android.permission-group.DEVICE_ALARMS"
    525         android:label="@string/permlab_setAlarm"
    526         android:description="@string/permdesc_setAlarm"
    527         android:protectionLevel="normal" />
    528 
    529     <!-- =============================================================== -->
    530     <!-- Permissions for accessing the user voicemail                    -->
    531     <!-- =============================================================== -->
    532     <eat-comment />
    533 
    534     <!-- Used for permissions that provide access to the user voicemail box. -->
    535     <permission-group android:name="android.permission-group.VOICEMAIL"
    536         android:label="@string/permgrouplab_voicemail"
    537         android:icon="@drawable/perm_group_voicemail"
    538         android:description="@string/permgroupdesc_voicemail"
    539         android:permissionGroupFlags="personalInfo"
    540         android:priority="280" />
    541 
    542    <!-- Allows an application to add voicemails into the system. -->
    543     <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
    544         android:permissionGroup="android.permission-group.VOICEMAIL"
    545         android:protectionLevel="dangerous"
    546         android:label="@string/permlab_addVoicemail"
    547         android:description="@string/permdesc_addVoicemail" />
    548 
    549     <!-- =============================================== -->
    550     <!-- Permissions for enabling accessibility features -->
    551     <!-- =============================================== -->
    552     <eat-comment />
    553 
    554     <!-- Used for permissions that allow requesting certain accessibility features. -->
    555     <permission-group android:name="android.permission-group.ACCESSIBILITY_FEATURES"
    556         android:label="@string/permgrouplab_accessibilityFeatures"
    557         android:icon="@drawable/perm_group_accessibility_features"
    558         android:description="@string/permgroupdesc_accessibilityFeatures"
    559         android:priority="380" />
    560 
    561     <!-- ======================================= -->
    562     <!-- Permissions for accessing location info -->
    563     <!-- ======================================= -->
    564     <eat-comment />
    565 
    566     <!-- Used for permissions that allow access to the user's current
    567          location. -->
    568     <permission-group android:name="android.permission-group.LOCATION"
    569         android:label="@string/permgrouplab_location"
    570         android:icon="@drawable/perm_group_location"
    571         android:description="@string/permgroupdesc_location"
    572         android:permissionGroupFlags="personalInfo"
    573         android:priority="330" />
    574 
    575     <!-- Allows an app to access precise location from location sources such
    576          as GPS, cell towers, and Wi-Fi. -->
    577     <permission android:name="android.permission.ACCESS_FINE_LOCATION"
    578         android:permissionGroup="android.permission-group.LOCATION"
    579         android:protectionLevel="dangerous"
    580         android:label="@string/permlab_accessFineLocation"
    581         android:description="@string/permdesc_accessFineLocation" />
    582 
    583     <!-- Allows an app to access approximate location derived from network location
    584          sources such as cell towers and Wi-Fi. -->
    585     <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
    586         android:permissionGroup="android.permission-group.LOCATION"
    587         android:protectionLevel="dangerous"
    588         android:label="@string/permlab_accessCoarseLocation"
    589         android:description="@string/permdesc_accessCoarseLocation" />
    590 
    591     <!-- Allows an application to create mock location providers for testing -->
    592     <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
    593         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
    594         android:protectionLevel="dangerous"
    595         android:label="@string/permlab_accessMockLocation"
    596         android:description="@string/permdesc_accessMockLocation" />
    597 
    598     <!-- Allows an application to access extra location provider commands -->
    599     <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
    600         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
    601         android:protectionLevel="normal"
    602         android:label="@string/permlab_accessLocationExtraCommands"
    603         android:description="@string/permdesc_accessLocationExtraCommands" />
    604 
    605     <!-- Allows an application to install a location provider into the Location Manager.
    606     <p>Not for use by third-party applications. -->
    607     <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
    608         android:protectionLevel="signature|system"
    609         android:label="@string/permlab_installLocationProvider"
    610         android:description="@string/permdesc_installLocationProvider" />
    611 
    612     <!-- Allows an application to use location features in hardware,
    613          such as the geofencing api.
    614          <p>Not for use by third-party applications. -->
    615     <permission android:name="android.permission.LOCATION_HARDWARE"
    616         android:permissionGroup="android.permission-group.LOCATION"
    617         android:protectionLevel="signature|system" />
    618     <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
    619 
    620     <!-- ======================================= -->
    621     <!-- Permissions for accessing networks -->
    622     <!-- ======================================= -->
    623     <eat-comment />
    624 
    625     <!-- Used for permissions that provide access to networking services.  The
    626          main permission here is internet access, but this is also an
    627          appropriate group for accessing or modifying any network configuration
    628          or other related network operations. -->
    629     <permission-group android:name="android.permission-group.NETWORK"
    630         android:label="@string/permgrouplab_network"
    631         android:icon="@drawable/perm_group_network"
    632         android:description="@string/permgroupdesc_network"
    633         android:priority="270" />
    634 
    635     <!-- Allows applications to open network sockets. -->
    636     <permission android:name="android.permission.INTERNET"
    637         android:permissionGroup="android.permission-group.NETWORK"
    638         android:protectionLevel="dangerous"
    639         android:description="@string/permdesc_createNetworkSockets"
    640         android:label="@string/permlab_createNetworkSockets" />
    641 
    642     <!-- Allows applications to access information about networks -->
    643     <permission android:name="android.permission.ACCESS_NETWORK_STATE"
    644         android:permissionGroup="android.permission-group.NETWORK"
    645         android:protectionLevel="normal"
    646         android:description="@string/permdesc_accessNetworkState"
    647         android:label="@string/permlab_accessNetworkState" />
    648 
    649     <!-- Allows applications to access information about Wi-Fi networks -->
    650     <permission android:name="android.permission.ACCESS_WIFI_STATE"
    651         android:permissionGroup="android.permission-group.NETWORK"
    652         android:protectionLevel="normal"
    653         android:description="@string/permdesc_accessWifiState"
    654         android:label="@string/permlab_accessWifiState" />
    655 
    656     <!-- Allows applications to change Wi-Fi connectivity state -->
    657     <permission android:name="android.permission.CHANGE_WIFI_STATE"
    658         android:permissionGroup="android.permission-group.NETWORK"
    659         android:protectionLevel="dangerous"
    660         android:description="@string/permdesc_changeWifiState"
    661         android:label="@string/permlab_changeWifiState" />
    662 
    663     <!-- @hide -->
    664     <permission android:name="android.permission.ACCESS_WIMAX_STATE"
    665         android:permissionGroup="android.permission-group.NETWORK"
    666         android:protectionLevel="normal"
    667         android:description="@string/permdesc_accessWimaxState"
    668         android:label="@string/permlab_accessWimaxState" />
    669 
    670     <!-- @hide -->
    671     <permission android:name="android.permission.CHANGE_WIMAX_STATE"
    672         android:permissionGroup="android.permission-group.NETWORK"
    673         android:protectionLevel="dangerous"
    674         android:description="@string/permdesc_changeWimaxState"
    675         android:label="@string/permlab_changeWimaxState" />
    676 
    677     <!-- ======================================= -->
    678     <!-- Permissions for short range, peripheral networks -->
    679     <!-- ======================================= -->
    680     <eat-comment />
    681 
    682     <!-- Used for permissions that provide access to other devices through Bluetooth.-->
    683     <permission-group android:name="android.permission-group.BLUETOOTH_NETWORK"
    684         android:label="@string/permgrouplab_bluetoothNetwork"
    685         android:icon="@drawable/perm_group_bluetooth"
    686         android:description="@string/permgroupdesc_bluetoothNetwork"
    687         android:priority="260" />
    688 
    689     <!-- Allows applications to connect to paired bluetooth devices -->
    690     <permission android:name="android.permission.BLUETOOTH"
    691         android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
    692         android:protectionLevel="dangerous"
    693         android:description="@string/permdesc_bluetooth"
    694         android:label="@string/permlab_bluetooth" />
    695 
    696     <!-- Allows applications to discover and pair bluetooth devices -->
    697     <permission android:name="android.permission.BLUETOOTH_ADMIN"
    698         android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
    699         android:protectionLevel="dangerous"
    700         android:description="@string/permdesc_bluetoothAdmin"
    701         android:label="@string/permlab_bluetoothAdmin" />
    702 
    703     <!-- Allows bluetooth stack to access files
    704          @hide This should only be used by Bluetooth apk.
    705     -->
    706     <permission android:name="android.permission.BLUETOOTH_STACK"
    707         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
    708         android:protectionLevel="signature" />
    709 
    710     <!-- Allows applications to perform I/O operations over NFC -->
    711     <permission android:name="android.permission.NFC"
    712         android:permissionGroup="android.permission-group.NETWORK"
    713         android:protectionLevel="dangerous"
    714         android:description="@string/permdesc_nfc"
    715         android:label="@string/permlab_nfc" />
    716 
    717     <!-- Allows an internal user to use privileged ConnectivityManager APIs.
    718         @hide -->
    719     <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
    720         android:permissionGroup="android.permission-group.NETWORK"
    721         android:protectionLevel="signature|system" />
    722 
    723     <!-- @hide -->
    724     <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
    725         android:permissionGroup="android.permission-group.NETWORK"
    726         android:protectionLevel="signature|system" />
    727 
    728     <!-- Allows access to the loop radio (Android@Home mesh network) device.
    729 	@hide -->
    730     <permission android:name="android.permission.LOOP_RADIO"
    731 	android:permissionGroup="android.permission-group.NETWORK"
    732 	android:protectionLevel="signature|system" />
    733 
    734     <!-- ================================== -->
    735     <!-- Permissions for accessing accounts -->
    736     <!-- ================================== -->
    737     <eat-comment />
    738 
    739     <!-- Permissions for direct access to the accounts managed
    740          by the Account Manager. -->
    741     <permission-group android:name="android.permission-group.ACCOUNTS"
    742         android:label="@string/permgrouplab_accounts"
    743         android:icon="@drawable/perm_group_accounts"
    744         android:description="@string/permgroupdesc_accounts"
    745         android:permissionGroupFlags="personalInfo"
    746         android:priority="200" />
    747 
    748     <!-- Allows access to the list of accounts in the Accounts Service -->
    749     <permission android:name="android.permission.GET_ACCOUNTS"
    750         android:permissionGroup="android.permission-group.ACCOUNTS"
    751         android:protectionLevel="normal"
    752         android:description="@string/permdesc_getAccounts"
    753         android:label="@string/permlab_getAccounts" />
    754 
    755     <!-- Allows an application to act as an AccountAuthenticator for
    756          the AccountManager -->
    757     <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
    758         android:permissionGroup="android.permission-group.ACCOUNTS"
    759         android:protectionLevel="dangerous"
    760         android:label="@string/permlab_authenticateAccounts"
    761         android:description="@string/permdesc_authenticateAccounts" />
    762 
    763     <!-- Allows an application to request authtokens from the AccountManager -->
    764     <permission android:name="android.permission.USE_CREDENTIALS"
    765         android:permissionGroup="android.permission-group.ACCOUNTS"
    766         android:protectionLevel="dangerous"
    767         android:label="@string/permlab_useCredentials"
    768         android:description="@string/permdesc_useCredentials" />
    769 
    770     <!-- Allows an application to manage the list of accounts in the AccountManager -->
    771     <permission android:name="android.permission.MANAGE_ACCOUNTS"
    772         android:permissionGroup="android.permission-group.ACCOUNTS"
    773         android:protectionLevel="dangerous"
    774         android:label="@string/permlab_manageAccounts"
    775         android:description="@string/permdesc_manageAccounts" />
    776 
    777     <!-- Allows applications to call into AccountAuthenticators.
    778     <p>Not for use by third-party applications. -->
    779     <permission android:name="android.permission.ACCOUNT_MANAGER"
    780         android:permissionGroup="android.permission-group.ACCOUNTS"
    781         android:protectionLevel="signature"
    782         android:description="@string/permdesc_accountManagerService"
    783         android:label="@string/permlab_accountManagerService" />
    784 
    785     <!-- ================================== -->
    786     <!-- Permissions for accessing hardware that may effect battery life-->
    787     <!-- ================================== -->
    788     <eat-comment />
    789 
    790     <!-- Used for permissions that provide direct access to the hardware on
    791          the device that has an effect on battery life.  This includes vibrator,
    792          flashlight,  etc. -->
    793 
    794     <permission-group android:name="android.permission-group.AFFECTS_BATTERY"
    795         android:label="@string/permgrouplab_affectsBattery"
    796         android:icon="@drawable/perm_group_affects_battery"
    797         android:description="@string/permgroupdesc_affectsBattery"
    798         android:priority="180" />
    799 
    800     <!-- Allows applications to enter Wi-Fi Multicast mode -->
    801     <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
    802         android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
    803         android:protectionLevel="dangerous"
    804         android:description="@string/permdesc_changeWifiMulticastState"
    805         android:label="@string/permlab_changeWifiMulticastState" />
    806 
    807     <!-- Allows access to the vibrator -->
    808     <permission android:name="android.permission.VIBRATE"
    809         android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
    810         android:protectionLevel="normal"
    811         android:label="@string/permlab_vibrate"
    812         android:description="@string/permdesc_vibrate" />
    813 
    814     <!-- Allows access to the flashlight -->
    815     <permission android:name="android.permission.FLASHLIGHT"
    816         android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
    817         android:protectionLevel="normal"
    818         android:label="@string/permlab_flashlight"
    819         android:description="@string/permdesc_flashlight" />
    820 
    821     <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
    822          from dimming -->
    823     <permission android:name="android.permission.WAKE_LOCK"
    824         android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
    825         android:protectionLevel="normal"
    826         android:label="@string/permlab_wakeLock"
    827         android:description="@string/permdesc_wakeLock" />
    828 
    829     <!-- ==================================================== -->
    830     <!-- Permissions related to changing audio settings   -->
    831     <!-- ==================================================== -->
    832     <eat-comment />
    833 
    834     <!-- Used for permissions that provide direct access to speaker settings
    835          the device. -->
    836     <permission-group android:name="android.permission-group.AUDIO_SETTINGS"
    837         android:label="@string/permgrouplab_audioSettings"
    838         android:icon="@drawable/perm_group_audio_settings"
    839         android:description="@string/permgroupdesc_audioSettings"
    840         android:priority="130" />
    841 
    842     <!-- Allows an application to modify global audio settings -->
    843     <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
    844         android:permissionGroup="android.permission-group.AUDIO_SETTINGS"
    845         android:protectionLevel="normal"
    846         android:label="@string/permlab_modifyAudioSettings"
    847         android:description="@string/permdesc_modifyAudioSettings" />
    848 
    849     <!-- ================================== -->
    850     <!-- Permissions for accessing hardware -->
    851     <!-- ================================== -->
    852     <eat-comment />
    853 
    854     <!-- Used for permissions that provide direct access to the hardware on
    855          the device.  This includes audio, the camera, vibrator, etc. -->
    856     <permission-group android:name="android.permission-group.HARDWARE_CONTROLS"
    857         android:label="@string/permgrouplab_hardwareControls"
    858         android:description="@string/permgroupdesc_hardwareControls"
    859         android:priority="260"/>
    860 
    861     <!-- Allows an application to manage preferences and permissions for USB devices
    862          @hide -->
    863     <permission android:name="android.permission.MANAGE_USB"
    864         android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
    865         android:protectionLevel="signature|system"
    866         android:label="@string/permlab_manageUsb"
    867         android:description="@string/permdesc_manageUsb" />
    868 
    869     <!-- Allows an application to access the MTP USB kernel driver.
    870          For use only by the device side MTP implementation.
    871          @hide -->
    872     <permission android:name="android.permission.ACCESS_MTP"
    873         android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
    874         android:protectionLevel="signature|system"
    875         android:label="@string/permlab_accessMtp"
    876         android:description="@string/permdesc_accessMtp" />
    877 
    878     <!-- Allows access to hardware peripherals.  Intended only for hardware testing.
    879     <p>Not for use by third-party applications. -->
    880     <permission android:name="android.permission.HARDWARE_TEST"
    881         android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
    882         android:protectionLevel="signature"
    883         android:label="@string/permlab_hardware_test"
    884         android:description="@string/permdesc_hardware_test" />
    885 
    886     <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
    887          @hide -->
    888     <permission android:name="android.permission.NET_ADMIN"
    889         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
    890         android:protectionLevel="signature" />
    891 
    892     <!-- Allows registration for remote audio playback. @hide -->
    893     <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
    894         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
    895         android:protectionLevel="signature" />
    896 
    897     <!-- =========================================== -->
    898     <!-- Permissions associated with audio capture -->
    899     <!-- =========================================== -->
    900     <eat-comment />
    901 
    902     <!-- Used for permissions that are associated with accessing
    903          microphone audio from the device. Note that phone calls also capture audio
    904          but are in a separate (more visible) permission group. -->
    905     <permission-group android:name="android.permission-group.MICROPHONE"
    906         android:label="@string/permgrouplab_microphone"
    907         android:icon="@drawable/perm_group_microphone"
    908         android:description="@string/permgroupdesc_microphone"
    909         android:permissionGroupFlags="personalInfo"
    910         android:priority="340" />
    911 
    912     <!-- Allows an application to record audio -->
    913     <permission android:name="android.permission.RECORD_AUDIO"
    914         android:permissionGroup="android.permission-group.MICROPHONE"
    915         android:protectionLevel="dangerous"
    916         android:label="@string/permlab_recordAudio"
    917         android:description="@string/permdesc_recordAudio" />
    918 
    919 
    920     <!-- =========================================== -->
    921     <!-- Permissions associated with camera and image capture -->
    922     <!-- =========================================== -->
    923     <eat-comment />
    924 
    925     <!-- Used for permissions that are associated with accessing
    926          camera or capturing images/video from the device. -->
    927     <permission-group android:name="android.permission-group.CAMERA"
    928         android:label="@string/permgrouplab_camera"
    929         android:icon="@drawable/perm_group_camera"
    930         android:description="@string/permgroupdesc_camera"
    931         android:permissionGroupFlags="personalInfo"
    932         android:priority="350" />
    933 
    934     <!-- Required to be able to access the camera device.
    935          <p>This will automatically enforce the <a
    936          href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code
    937          &lt;uses-feature&gt;}</a> manifest element for <em>all</em> camera features.
    938          If you do not require all camera features or can properly operate if a camera
    939          is not available, then you must modify your manifest as appropriate in order to
    940          install on devices that don't support all camera features.</p> -->
    941     <permission android:name="android.permission.CAMERA"
    942         android:permissionGroup="android.permission-group.CAMERA"
    943         android:protectionLevel="dangerous"
    944         android:label="@string/permlab_camera"
    945         android:description="@string/permdesc_camera" />
    946 
    947     <!-- Allows disabling the transmit-indicator LED that is normally on when
    948          a camera is in use by an application.
    949          @hide -->
    950     <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
    951         android:permissionGroup="android.permission-group.CAMERA"
    952         android:protectionLevel="signature|system"
    953         android:label="@string/permlab_cameraDisableTransmitLed"
    954         android:description="@string/permdesc_cameraDisableTransmitLed" />
    955 
    956     <!-- =========================================== -->
    957     <!-- Permissions associated with telephony state -->
    958     <!-- =========================================== -->
    959     <eat-comment />
    960 
    961     <!-- Used for permissions that are associated with accessing and modifyign
    962          telephony state: placing calls, intercepting outgoing calls, reading
    963          and modifying the phone state. -->
    964     <permission-group android:name="android.permission-group.PHONE_CALLS"
    965         android:label="@string/permgrouplab_phoneCalls"
    966         android:icon="@drawable/perm_group_phone_calls"
    967         android:description="@string/permgroupdesc_phoneCalls"
    968         android:permissionGroupFlags="personalInfo"
    969         android:priority="370" />
    970 
    971     <!-- Allows an application to monitor, modify, or abort outgoing
    972          calls. -->
    973     <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
    974         android:permissionGroup="android.permission-group.PHONE_CALLS"
    975         android:protectionLevel="dangerous"
    976         android:label="@string/permlab_processOutgoingCalls"
    977         android:description="@string/permdesc_processOutgoingCalls" />
    978 
    979     <!-- Allows modification of the telephony state - power on, mmi, etc.
    980          Does not include placing calls.
    981          <p>Not for use by third-party applications. -->
    982     <permission android:name="android.permission.MODIFY_PHONE_STATE"
    983         android:permissionGroup="android.permission-group.PHONE_CALLS"
    984         android:protectionLevel="signature|system"
    985         android:label="@string/permlab_modifyPhoneState"
    986         android:description="@string/permdesc_modifyPhoneState" />
    987 
    988     <!-- Allows read only access to phone state.
    989          <p class="note"><strong>Note:</strong> If <em>both</em> your <a
    990          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
    991          minSdkVersion}</a> and <a
    992          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    993          targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
    994          grants your app this permission. If you don't need this permission, be sure your <a
    995          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    996          targetSdkVersion}</a> is 4 or higher. -->
    997     <permission android:name="android.permission.READ_PHONE_STATE"
    998         android:permissionGroup="android.permission-group.PHONE_CALLS"
    999         android:protectionLevel="dangerous"
   1000         android:label="@string/permlab_readPhoneState"
   1001         android:description="@string/permdesc_readPhoneState" />
   1002 
   1003     <!-- Allows read access to privileged phone state.
   1004          @hide Used internally. -->
   1005     <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
   1006         android:permissionGroup="android.permission-group.PHONE_CALLS"
   1007         android:protectionLevel="signature|system" />
   1008 
   1009      <!-- Allows an application to initiate a phone call without going through
   1010          the Dialer user interface for the user to confirm the call
   1011          being placed. -->
   1012     <permission android:name="android.permission.CALL_PHONE"
   1013         android:permissionGroup="android.permission-group.PHONE_CALLS"
   1014         android:protectionLevel="dangerous"
   1015         android:permissionFlags="costsMoney"
   1016         android:label="@string/permlab_callPhone"
   1017         android:description="@string/permdesc_callPhone" />
   1018 
   1019     <!-- Allows an application to use SIP service -->
   1020     <permission android:name="android.permission.USE_SIP"
   1021         android:permissionGroup="android.permission-group.PHONE_CALLS"
   1022         android:protectionLevel="dangerous"
   1023         android:description="@string/permdesc_use_sip"
   1024         android:label="@string/permlab_use_sip" />
   1025 
   1026     <!-- ================================== -->
   1027     <!-- Permissions for sdcard interaction -->
   1028     <!-- ================================== -->
   1029     <eat-comment />
   1030 
   1031     <!-- Group of permissions that are related to SD card access. -->
   1032     <permission-group android:name="android.permission-group.STORAGE"
   1033         android:label="@string/permgrouplab_storage"
   1034         android:icon="@drawable/perm_group_storage"
   1035         android:description="@string/permgroupdesc_storage"
   1036         android:permissionGroupFlags="personalInfo"
   1037         android:priority="240" />
   1038 
   1039     <!-- Allows an application to read from external storage.
   1040          <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
   1041          granted this permission.</p>
   1042          <p>Currently, this permission is not enforced and all apps still have access to read from
   1043          external storage without this permission. That will change in a future release and apps
   1044          will require this permission to read from external storage. So if your
   1045          app reads from the external storage, you should add this permission to your app now
   1046          to ensure that it continues to work on future versions of Android.</p>
   1047          <p>You can test your app with the permission enforced by either running your app on the
   1048          Android Emulator when running Android 4.1 or higher, or enabling <em>Protect USB
   1049          storage</em> under Developer options in the Settings app on a device running Android 4.1 or
   1050          higher.</p>
   1051          <p class="note"><strong>Note:</strong> If <em>both</em> your <a
   1052          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
   1053          minSdkVersion}</a> and <a
   1054          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
   1055          targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
   1056          grants your app this permission. If you don't need this permission, be sure your <a
   1057          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
   1058          targetSdkVersion}</a> is 4 or higher.-->
   1059     <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
   1060         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1061         android:label="@string/permlab_sdcardRead"
   1062         android:description="@string/permdesc_sdcardRead"
   1063         android:protectionLevel="normal" />
   1064 
   1065     <!-- Allows an application to write to external storage.
   1066          <p class="note"><strong>Note:</strong> If <em>both</em> your <a
   1067          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
   1068          minSdkVersion}</a> and <a
   1069          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
   1070          targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
   1071          grants your app this permission. If you don't need this permission, be sure your <a
   1072          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
   1073          targetSdkVersion}</a> is 4 or higher. -->
   1074     <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
   1075         android:permissionGroup="android.permission-group.STORAGE"
   1076         android:label="@string/permlab_sdcardWrite"
   1077         android:description="@string/permdesc_sdcardWrite"
   1078         android:protectionLevel="dangerous" />
   1079 
   1080     <!-- Allows an application to write to internal media storage
   1081          @hide  -->
   1082     <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
   1083         android:permissionGroup="android.permission-group.STORAGE"
   1084         android:label="@string/permlab_mediaStorageWrite"
   1085         android:description="@string/permdesc_mediaStorageWrite"
   1086         android:protectionLevel="signature|system" />
   1087 
   1088     <!-- ================================== -->
   1089     <!-- Permissions for screenlock         -->
   1090     <!-- ================================== -->
   1091     <eat-comment />
   1092 
   1093     <!-- Group of permissions that are related to the screenlock. -->
   1094     <permission-group android:name="android.permission-group.SCREENLOCK"
   1095         android:label="@string/permgrouplab_screenlock"
   1096         android:icon="@drawable/perm_group_screenlock"
   1097         android:permissionGroupFlags="personalInfo"
   1098         android:description="@string/permgroupdesc_screenlock"
   1099         android:priority="230" />
   1100 
   1101     <!-- Allows applications to disable the keyguard -->
   1102     <permission android:name="android.permission.DISABLE_KEYGUARD"
   1103         android:permissionGroup="android.permission-group.SCREENLOCK"
   1104         android:protectionLevel="dangerous"
   1105         android:description="@string/permdesc_disableKeyguard"
   1106         android:label="@string/permlab_disableKeyguard" />
   1107 
   1108     <!-- ================================== -->
   1109     <!-- Permissions to access other installed applications  -->
   1110     <!-- ================================== -->
   1111     <eat-comment />
   1112 
   1113     <!-- Group of permissions that are related to the other applications
   1114          installed on the system.  Examples include such as listing
   1115          running apps, or killing background processes. -->
   1116     <permission-group android:name="android.permission-group.APP_INFO"
   1117         android:label="@string/permgrouplab_appInfo"
   1118         android:icon="@drawable/perm_group_app_info"
   1119         android:description="@string/permgroupdesc_appInfo"
   1120         android:priority="220" />
   1121 
   1122     <!-- Allows an application to get information about the currently
   1123          or recently running tasks. -->
   1124     <permission android:name="android.permission.GET_TASKS"
   1125         android:permissionGroup="android.permission-group.APP_INFO"
   1126         android:protectionLevel="dangerous"
   1127         android:label="@string/permlab_getTasks"
   1128         android:description="@string/permdesc_getTasks" />
   1129     <!-- @hide Allows an application to call APIs that allow it to do interactions
   1130          across the users on the device, using singleton services and
   1131          user-targeted broadcasts.  This permission is not available to
   1132          third party applications. -->
   1133     <permission android:name="android.permission.INTERACT_ACROSS_USERS"
   1134         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1135         android:protectionLevel="signature|system|development"
   1136         android:label="@string/permlab_interactAcrossUsers"
   1137         android:description="@string/permdesc_interactAcrossUsers" />
   1138 
   1139     <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
   1140          that removes restrictions on where broadcasts can be sent and allows other
   1141          types of interactions. -->
   1142     <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
   1143         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1144         android:protectionLevel="signature"
   1145         android:label="@string/permlab_interactAcrossUsersFull"
   1146         android:description="@string/permdesc_interactAcrossUsersFull" />
   1147 
   1148     <!-- @hide Allows an application to call APIs that allow it to query and manage
   1149          users on the device. This permission is not available to
   1150          third party applications. -->
   1151     <permission android:name="android.permission.MANAGE_USERS"
   1152         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1153         android:protectionLevel="signature|system"
   1154         android:label="@string/permlab_manageUsers"
   1155         android:description="@string/permdesc_manageUsers" />
   1156 
   1157     <!-- Allows an application to get full detailed information about
   1158          recently running tasks, with full fidelity to the real state.
   1159          @hide -->
   1160     <permission android:name="android.permission.GET_DETAILED_TASKS"
   1161         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1162         android:protectionLevel="signature"
   1163         android:label="@string/permlab_getDetailedTasks"
   1164         android:description="@string/permdesc_getDetailedTasks" />
   1165 
   1166     <!-- Allows an application to change the Z-order of tasks -->
   1167     <permission android:name="android.permission.REORDER_TASKS"
   1168         android:permissionGroup="android.permission-group.APP_INFO"
   1169         android:protectionLevel="normal"
   1170         android:label="@string/permlab_reorderTasks"
   1171         android:description="@string/permdesc_reorderTasks" />
   1172 
   1173     <!-- @hide Allows an application to change to remove/kill tasks -->
   1174     <permission android:name="android.permission.REMOVE_TASKS"
   1175         android:permissionGroup="android.permission-group.APP_INFO"
   1176         android:protectionLevel="signature"
   1177         android:label="@string/permlab_removeTasks"
   1178         android:description="@string/permdesc_removeTasks" />
   1179 
   1180     <!-- Allows an application to start any activity, regardless of permission
   1181          protection or exported state. @hide -->
   1182     <permission android:name="android.permission.START_ANY_ACTIVITY"
   1183         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1184         android:protectionLevel="signature"
   1185         android:label="@string/permlab_startAnyActivity"
   1186         android:description="@string/permdesc_startAnyActivity" />
   1187 
   1188     <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
   1189         API is no longer supported. -->
   1190     <permission android:name="android.permission.RESTART_PACKAGES"
   1191         android:permissionGroup="android.permission-group.APP_INFO"
   1192         android:protectionLevel="normal"
   1193         android:label="@string/permlab_killBackgroundProcesses"
   1194         android:description="@string/permdesc_killBackgroundProcesses" />
   1195 
   1196     <!-- Allows an application to call
   1197         {@link android.app.ActivityManager#killBackgroundProcesses}. -->
   1198     <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
   1199         android:permissionGroup="android.permission-group.APP_INFO"
   1200         android:protectionLevel="normal"
   1201         android:label="@string/permlab_killBackgroundProcesses"
   1202         android:description="@string/permdesc_killBackgroundProcesses" />
   1203 
   1204     <!-- ================================== -->
   1205     <!-- Permissions affecting the display of other applications  -->
   1206     <!-- ================================== -->
   1207     <eat-comment />
   1208 
   1209     <!-- Group of permissions that allow manipulation of how
   1210          another application displays UI to the user. -->
   1211     <permission-group android:name="android.permission-group.DISPLAY"
   1212         android:label="@string/permgrouplab_display"
   1213         android:icon="@drawable/perm_group_display"
   1214         android:description="@string/permgroupdesc_display"
   1215         android:priority="190"/>
   1216 
   1217     <!-- Allows an application to open windows using the type
   1218          {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT},
   1219          shown on top of all other applications.  Very few applications
   1220          should use this permission; these windows are intended for
   1221          system-level interaction with the user. -->
   1222     <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
   1223         android:permissionGroup="android.permission-group.DISPLAY"
   1224         android:protectionLevel="dangerous"
   1225         android:label="@string/permlab_systemAlertWindow"
   1226         android:description="@string/permdesc_systemAlertWindow" />
   1227 
   1228     <!-- ================================== -->
   1229     <!-- Permissions affecting the system wallpaper -->
   1230     <!-- ================================== -->
   1231     <eat-comment />
   1232 
   1233     <!-- Group of permissions that allow manipulation of how
   1234          another application displays UI to the user. -->
   1235     <permission-group android:name="android.permission-group.WALLPAPER"
   1236         android:label="@string/permgrouplab_wallpaper"
   1237         android:icon="@drawable/perm_group_wallpaper"
   1238         android:description="@string/permgroupdesc_wallpaper"
   1239         android:priority="150" />
   1240 
   1241     <!-- Allows applications to set the wallpaper -->
   1242     <permission android:name="android.permission.SET_WALLPAPER"
   1243         android:permissionGroup="android.permission-group.WALLPAPER"
   1244         android:protectionLevel="normal"
   1245         android:label="@string/permlab_setWallpaper"
   1246         android:description="@string/permdesc_setWallpaper" />
   1247 
   1248     <!-- Allows applications to set the wallpaper hints -->
   1249     <permission android:name="android.permission.SET_WALLPAPER_HINTS"
   1250         android:permissionGroup="android.permission-group.WALLPAPER"
   1251         android:protectionLevel="normal"
   1252         android:label="@string/permlab_setWallpaperHints"
   1253         android:description="@string/permdesc_setWallpaperHints" />
   1254 
   1255     <!-- ============================================ -->
   1256     <!-- Permissions for changing the system clock -->
   1257     <!-- ============================================ -->
   1258     <eat-comment />
   1259 
   1260     <!-- Group of permissions that are related to system clock. -->
   1261     <permission-group android:name="android.permission-group.SYSTEM_CLOCK"
   1262         android:label="@string/permgrouplab_systemClock"
   1263         android:icon="@drawable/perm_group_system_clock"
   1264         android:description="@string/permgroupdesc_systemClock"
   1265         android:priority="140" />
   1266 
   1267     <!-- Allows applications to set the system time.
   1268     <p>Not for use by third-party applications. -->
   1269     <permission android:name="android.permission.SET_TIME"
   1270         android:protectionLevel="signature|system"
   1271         android:label="@string/permlab_setTime"
   1272         android:description="@string/permdesc_setTime" />
   1273 
   1274     <!-- Allows applications to set the system time zone -->
   1275     <permission android:name="android.permission.SET_TIME_ZONE"
   1276         android:permissionGroup="android.permission-group.SYSTEM_CLOCK"
   1277         android:protectionLevel="normal"
   1278         android:label="@string/permlab_setTimeZone"
   1279         android:description="@string/permdesc_setTimeZone" />
   1280 
   1281     <!-- ==================================================== -->
   1282     <!-- Permissions related to changing status bar   -->
   1283     <!-- ==================================================== -->
   1284     <eat-comment />
   1285 
   1286     <!-- Used for permissions that change the status bar -->
   1287     <permission-group android:name="android.permission-group.STATUS_BAR"
   1288         android:label="@string/permgrouplab_statusBar"
   1289         android:icon="@drawable/perm_group_status_bar"
   1290         android:description="@string/permgroupdesc_statusBar"
   1291         android:priority="110" />
   1292 
   1293     <!-- Allows an application to expand or collapse the status bar. -->
   1294     <permission android:name="android.permission.EXPAND_STATUS_BAR"
   1295         android:permissionGroup="android.permission-group.STATUS_BAR"
   1296         android:protectionLevel="normal"
   1297         android:label="@string/permlab_expandStatusBar"
   1298         android:description="@string/permdesc_expandStatusBar" />
   1299 
   1300     <!-- ==================================================== -->
   1301     <!-- Permissions related to accessing sync settings   -->
   1302     <!-- ==================================================== -->
   1303     <eat-comment />
   1304 
   1305     <!-- Used for permissions that access the sync settings or sync
   1306          related information. -->
   1307     <permission-group android:name="android.permission-group.SYNC_SETTINGS"
   1308         android:label="@string/permgrouplab_syncSettings"
   1309         android:icon="@drawable/perm_group_sync_settings"
   1310         android:description="@string/permgroupdesc_syncSettings"
   1311         android:priority="120" />
   1312 
   1313     <!-- Allows applications to read the sync settings -->
   1314     <permission android:name="android.permission.READ_SYNC_SETTINGS"
   1315         android:permissionGroup="android.permission-group.SYNC_SETTINGS"
   1316         android:protectionLevel="normal"
   1317         android:description="@string/permdesc_readSyncSettings"
   1318         android:label="@string/permlab_readSyncSettings" />
   1319 
   1320     <!-- Allows applications to write the sync settings -->
   1321     <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
   1322         android:permissionGroup="android.permission-group.SYNC_SETTINGS"
   1323         android:protectionLevel="normal"
   1324         android:description="@string/permdesc_writeSyncSettings"
   1325         android:label="@string/permlab_writeSyncSettings" />
   1326 
   1327     <!-- Allows applications to read the sync stats -->
   1328     <permission android:name="android.permission.READ_SYNC_STATS"
   1329         android:permissionGroup="android.permission-group.SYNC_SETTINGS"
   1330         android:protectionLevel="normal"
   1331         android:description="@string/permdesc_readSyncStats"
   1332         android:label="@string/permlab_readSyncStats" />
   1333 
   1334 
   1335     <!-- ============================================ -->
   1336     <!-- Permissions for low-level system interaction -->
   1337     <!-- ============================================ -->
   1338     <eat-comment />
   1339 
   1340     <!-- Group of permissions that are related to system APIs.  Many
   1341          of these are not permissions the user will be expected to understand,
   1342          and such permissions should generally be marked as "normal" protection
   1343          level so they don't get displayed.  This can also, however, be used
   1344          for miscellaneous features that provide access to the operating system,
   1345          such as writing the global system settings. -->
   1346     <permission-group android:name="android.permission-group.SYSTEM_TOOLS"
   1347         android:label="@string/permgrouplab_systemTools"
   1348         android:icon="@drawable/perm_group_system_tools"
   1349         android:description="@string/permgroupdesc_systemTools"
   1350         android:priority="100" />
   1351 
   1352     <!-- @hide Change the screen compatibility mode of applications -->
   1353     <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
   1354         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1355         android:protectionLevel="signature"
   1356         android:label="@string/permlab_setScreenCompatibility"
   1357         android:description="@string/permdesc_setScreenCompatibility" />
   1358 
   1359     <!-- Allows an application to access all multi-user external storage @hide -->
   1360     <permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE"
   1361         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
   1362         android:label="@string/permlab_sdcardAccessAll"
   1363         android:description="@string/permdesc_sdcardAccessAll"
   1364         android:protectionLevel="signature" />
   1365 
   1366     <!-- Allows an application to modify the current configuration, such
   1367          as locale. -->
   1368     <permission android:name="android.permission.CHANGE_CONFIGURATION"
   1369         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
   1370         android:protectionLevel="signature|system|development"
   1371         android:label="@string/permlab_changeConfiguration"
   1372         android:description="@string/permdesc_changeConfiguration" />
   1373 
   1374     <!-- Allows an application to read or write the system settings. -->
   1375     <permission android:name="android.permission.WRITE_SETTINGS"
   1376         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1377         android:protectionLevel="normal"
   1378         android:label="@string/permlab_writeSettings"
   1379         android:description="@string/permdesc_writeSettings" />
   1380 
   1381     <!-- Allows an application to modify the Google service map.
   1382     <p>Not for use by third-party applications. -->
   1383     <permission android:name="android.permission.WRITE_GSERVICES"
   1384         android:protectionLevel="signature|system"
   1385         android:label="@string/permlab_writeGservices"
   1386         android:description="@string/permdesc_writeGservices" />
   1387 
   1388     <!-- Allows an application to call
   1389         {@link android.app.ActivityManager#forceStopPackage}.
   1390         @hide -->
   1391     <permission android:name="android.permission.FORCE_STOP_PACKAGES"
   1392         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1393         android:protectionLevel="signature"
   1394         android:label="@string/permlab_forceStopPackages"
   1395         android:description="@string/permdesc_forceStopPackages" />
   1396 
   1397     <!-- @hide Allows an application to retrieve the content of the active window
   1398          An active window is the window that has fired an accessibility event. -->
   1399     <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
   1400         android:permissionGroup="android.permission-group.PERSONAL_INFO"
   1401         android:protectionLevel="signature|system"
   1402         android:label="@string/permlab_retrieve_window_content"
   1403         android:description="@string/permdesc_retrieve_window_content" />
   1404 
   1405     <!-- Modify the global animation scaling factor.
   1406     <p>Not for use by third-party applications. -->
   1407     <permission android:name="android.permission.SET_ANIMATION_SCALE"
   1408         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1409         android:protectionLevel="signature|system|development"
   1410         android:label="@string/permlab_setAnimationScale"
   1411         android:description="@string/permdesc_setAnimationScale" />
   1412 
   1413     <!-- @deprecated This functionality will be removed in the future; please do
   1414          not use. Allow an application to make its activities persistent. -->
   1415     <permission android:name="android.permission.PERSISTENT_ACTIVITY"
   1416         android:permissionGroup="android.permission-group.APP_INFO"
   1417         android:protectionLevel="normal"
   1418         android:label="@string/permlab_persistentActivity"
   1419         android:description="@string/permdesc_persistentActivity" />
   1420 
   1421     <!-- Allows an application to find out the space used by any package. -->
   1422     <permission android:name="android.permission.GET_PACKAGE_SIZE"
   1423         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1424         android:protectionLevel="normal"
   1425         android:label="@string/permlab_getPackageSize"
   1426         android:description="@string/permdesc_getPackageSize" />
   1427 
   1428     <!-- @deprecated No longer useful, see
   1429          {@link android.content.pm.PackageManager#addPackageToPreferred}
   1430          for details. -->
   1431     <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
   1432         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1433         android:protectionLevel="signature"
   1434         android:label="@string/permlab_setPreferredApplications"
   1435         android:description="@string/permdesc_setPreferredApplications" />
   1436 
   1437     <!-- Allows an application to receive the
   1438          {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
   1439          broadcast after the system finishes booting.  If you don't
   1440          request this permission, you will not receive the broadcast at
   1441          that time.  Though holding this permission does not have any
   1442          security implications, it can have a negative impact on the
   1443          user experience by increasing the amount of time it takes the
   1444          system to start and allowing applications to have themselves
   1445          running without the user being aware of them.  As such, you must
   1446          explicitly declare your use of this facility to make that visible
   1447          to the user. -->
   1448     <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
   1449         android:permissionGroup="android.permission-group.APP_INFO"
   1450         android:protectionLevel="normal"
   1451         android:label="@string/permlab_receiveBootCompleted"
   1452         android:description="@string/permdesc_receiveBootCompleted" />
   1453 
   1454     <!-- Allows an application to broadcast sticky intents.  These are
   1455          broadcasts whose data is held by the system after being finished,
   1456          so that clients can quickly retrieve that data without having
   1457          to wait for the next broadcast. -->
   1458     <permission android:name="android.permission.BROADCAST_STICKY"
   1459         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1460         android:protectionLevel="normal"
   1461         android:label="@string/permlab_broadcastSticky"
   1462         android:description="@string/permdesc_broadcastSticky" />
   1463 
   1464     <!-- Allows mounting and unmounting file systems for removable storage.
   1465     <p>Not for use by third-party applications.-->
   1466     <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
   1467         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1468         android:protectionLevel="system|signature"
   1469         android:label="@string/permlab_mount_unmount_filesystems"
   1470         android:description="@string/permdesc_mount_unmount_filesystems" />
   1471 
   1472     <!-- Allows formatting file systems for removable storage.
   1473     <p>Not for use by third-party applications. -->
   1474     <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
   1475         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1476         android:protectionLevel="system|signature"
   1477         android:label="@string/permlab_mount_format_filesystems"
   1478         android:description="@string/permdesc_mount_format_filesystems" />
   1479 
   1480     <!-- Allows access to ASEC non-destructive API calls
   1481          @hide  -->
   1482     <permission android:name="android.permission.ASEC_ACCESS"
   1483         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1484         android:protectionLevel="signature"
   1485         android:label="@string/permlab_asec_access"
   1486         android:description="@string/permdesc_asec_access" />
   1487 
   1488     <!-- Allows creation of ASEC volumes
   1489          @hide  -->
   1490     <permission android:name="android.permission.ASEC_CREATE"
   1491         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1492         android:protectionLevel="signature"
   1493         android:label="@string/permlab_asec_create"
   1494         android:description="@string/permdesc_asec_create" />
   1495 
   1496     <!-- Allows destruction of ASEC volumes
   1497          @hide  -->
   1498     <permission android:name="android.permission.ASEC_DESTROY"
   1499         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1500         android:protectionLevel="signature"
   1501         android:label="@string/permlab_asec_destroy"
   1502         android:description="@string/permdesc_asec_destroy" />
   1503 
   1504     <!-- Allows mount / unmount of ASEC volumes
   1505          @hide  -->
   1506     <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
   1507         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1508         android:protectionLevel="signature"
   1509         android:label="@string/permlab_asec_mount_unmount"
   1510         android:description="@string/permdesc_asec_mount_unmount" />
   1511 
   1512     <!-- Allows rename of ASEC volumes
   1513          @hide  -->
   1514     <permission android:name="android.permission.ASEC_RENAME"
   1515         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1516         android:protectionLevel="signature"
   1517         android:label="@string/permlab_asec_rename"
   1518         android:description="@string/permdesc_asec_rename" />
   1519 
   1520     <!-- Allows applications to write the apn settings.
   1521     <p>Not for use by third-party applications. -->
   1522     <permission android:name="android.permission.WRITE_APN_SETTINGS"
   1523                 android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1524                 android:protectionLevel="signature|system"
   1525                 android:description="@string/permdesc_writeApnSettings"
   1526                 android:label="@string/permlab_writeApnSettings" />
   1527 
   1528     <!-- Allows an application to allow access the subscribed feeds
   1529          ContentProvider. -->
   1530     <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
   1531         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1532         android:label="@string/permlab_subscribedFeedsRead"
   1533         android:description="@string/permdesc_subscribedFeedsRead"
   1534         android:protectionLevel="normal" />
   1535     <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
   1536         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1537         android:label="@string/permlab_subscribedFeedsWrite"
   1538         android:description="@string/permdesc_subscribedFeedsWrite"
   1539         android:protectionLevel="dangerous" />
   1540 
   1541     <!-- Allows applications to change network connectivity state -->
   1542     <permission android:name="android.permission.CHANGE_NETWORK_STATE"
   1543         android:permissionGroup="android.permission-group.NETWORK"
   1544         android:protectionLevel="normal"
   1545         android:description="@string/permdesc_changeNetworkState"
   1546         android:label="@string/permlab_changeNetworkState" />
   1547 
   1548     <!-- Allows an application to clear the caches of all installed
   1549          applications on the device.  -->
   1550     <permission android:name="android.permission.CLEAR_APP_CACHE"
   1551         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1552         android:protectionLevel="dangerous"
   1553         android:label="@string/permlab_clearAppCache"
   1554         android:description="@string/permdesc_clearAppCache" />
   1555 
   1556     <!-- Allows an application to use any media decoder when decoding for playback
   1557          @hide -->
   1558     <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
   1559         android:protectionLevel="signature|system"
   1560         android:label="@string/permlab_anyCodecForPlayback"
   1561         android:description="@string/permdesc_anyCodecForPlayback" />
   1562 
   1563     <!-- ========================================= -->
   1564     <!-- Permissions for special development tools -->
   1565     <!-- ========================================= -->
   1566     <eat-comment />
   1567 
   1568     <!-- Group of permissions that are related to development features.  These
   1569          are not permissions that should appear in third-party applications; they
   1570          protect APIs that are intended only to be used for development
   1571          purposes. -->
   1572     <permission-group android:name="android.permission-group.DEVELOPMENT_TOOLS"
   1573         android:label="@string/permgrouplab_developmentTools"
   1574         android:description="@string/permgroupdesc_developmentTools"
   1575         android:priority="310" />
   1576 
   1577     <!-- Allows an application to read or write the secure system settings.
   1578     <p>Not for use by third-party applications. -->
   1579     <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
   1580         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
   1581         android:protectionLevel="signature|system|development"
   1582         android:label="@string/permlab_writeSecureSettings"
   1583         android:description="@string/permdesc_writeSecureSettings" />
   1584 
   1585     <!-- Allows an application to retrieve state dump information from system services.
   1586     <p>Not for use by third-party applications. -->
   1587     <permission android:name="android.permission.DUMP"
   1588         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
   1589         android:protectionLevel="signature|system|development"
   1590         android:label="@string/permlab_dump"
   1591         android:description="@string/permdesc_dump" />
   1592 
   1593     <!-- Allows an application to read the low-level system log files.
   1594     <p>Not for use by third-party applications, because
   1595     Log entries can contain the user's private information. -->
   1596     <permission android:name="android.permission.READ_LOGS"
   1597         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
   1598         android:protectionLevel="signature|system|development"
   1599         android:label="@string/permlab_readLogs"
   1600         android:description="@string/permdesc_readLogs" />
   1601 
   1602     <!-- Configure an application for debugging.
   1603     <p>Not for use by third-party applications. -->
   1604     <permission android:name="android.permission.SET_DEBUG_APP"
   1605         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
   1606         android:protectionLevel="signature|system|development"
   1607         android:label="@string/permlab_setDebugApp"
   1608         android:description="@string/permdesc_setDebugApp" />
   1609 
   1610     <!-- Allows an application to set the maximum number of (not needed)
   1611          application processes that can be running.
   1612          <p>Not for use by third-party applications. -->
   1613     <permission android:name="android.permission.SET_PROCESS_LIMIT"
   1614         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
   1615         android:protectionLevel="signature|system|development"
   1616         android:label="@string/permlab_setProcessLimit"
   1617         android:description="@string/permdesc_setProcessLimit" />
   1618 
   1619     <!-- Allows an application to control whether activities are immediately
   1620          finished when put in the background.
   1621          <p>Not for use by third-party applications. -->
   1622     <permission android:name="android.permission.SET_ALWAYS_FINISH"
   1623         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
   1624         android:protectionLevel="signature|system|development"
   1625         android:label="@string/permlab_setAlwaysFinish"
   1626         android:description="@string/permdesc_setAlwaysFinish" />
   1627 
   1628     <!-- Allow an application to request that a signal be sent to all persistent processes.
   1629     <p>Not for use by third-party applications. -->
   1630     <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
   1631         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
   1632         android:protectionLevel="signature|system|development"
   1633         android:label="@string/permlab_signalPersistentProcesses"
   1634         android:description="@string/permdesc_signalPersistentProcesses" />
   1635 
   1636     <!-- ==================================== -->
   1637     <!-- Private (signature-only) permissions -->
   1638     <!-- ==================================== -->
   1639     <eat-comment />
   1640 
   1641     <!-- Allows applications to RW to diagnostic resources.
   1642     <p>Not for use by third-party applications. -->
   1643     <permission android:name="android.permission.DIAGNOSTIC"
   1644         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1645         android:protectionLevel="signature"
   1646         android:description="@string/permdesc_diagnostic"
   1647         android:label="@string/permlab_diagnostic" />
   1648 
   1649     <!-- Allows an application to open, close, or disable the status bar
   1650          and its icons.
   1651          <p>Not for use by third-party applications. -->
   1652     <permission android:name="android.permission.STATUS_BAR"
   1653         android:label="@string/permlab_statusBar"
   1654         android:description="@string/permdesc_statusBar"
   1655         android:protectionLevel="signature|system" />
   1656 
   1657     <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
   1658     @hide -->
   1659     <permission android:name="android.permission.STATUS_BAR_SERVICE"
   1660         android:label="@string/permlab_statusBarService"
   1661         android:description="@string/permdesc_statusBarService"
   1662         android:protectionLevel="signature" />
   1663 
   1664     <!-- Allows an application to force a BACK operation on whatever is the
   1665          top activity.
   1666          <p>Not for use by third-party applications. -->
   1667     <permission android:name="android.permission.FORCE_BACK"
   1668         android:label="@string/permlab_forceBack"
   1669         android:description="@string/permdesc_forceBack"
   1670         android:protectionLevel="signature" />
   1671 
   1672     <!-- Allows an application to update device statistics.
   1673     <p>Not for use by third-party applications. -->
   1674     <permission android:name="android.permission.UPDATE_DEVICE_STATS"
   1675         android:label="@string/permlab_updateBatteryStats"
   1676         android:description="@string/permdesc_updateBatteryStats"
   1677         android:protectionLevel="signature|system" />
   1678 
   1679     <!-- @hide Allows an application to collect battery statistics -->
   1680     <permission android:name="android.permission.GET_APP_OPS_STATS"
   1681         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1682         android:label="@string/permlab_getAppOpsStats"
   1683         android:description="@string/permdesc_getAppOpsStats"
   1684         android:protectionLevel="signature|system|development" />
   1685 
   1686     <!-- Allows an application to update application operation statistics. Not for
   1687          use by third party apps. @hide -->
   1688     <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
   1689         android:label="@string/permlab_updateAppOpsStats"
   1690         android:description="@string/permdesc_updateAppOpsStats"
   1691         android:protectionLevel="signature|system" />
   1692 
   1693     <!-- Allows an application to open windows that are for use by parts
   1694          of the system user interface.
   1695          <p>Not for use by third-party applications. -->
   1696     <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
   1697         android:label="@string/permlab_internalSystemWindow"
   1698         android:description="@string/permdesc_internalSystemWindow"
   1699         android:protectionLevel="signature" />
   1700 
   1701     <!-- Allows an application to manage (create, destroy,
   1702          Z-order) application tokens in the window manager.
   1703          <p>Not for use by third-party applications. -->
   1704     <permission android:name="android.permission.MANAGE_APP_TOKENS"
   1705         android:label="@string/permlab_manageAppTokens"
   1706         android:description="@string/permdesc_manageAppTokens"
   1707         android:protectionLevel="signature" />
   1708 
   1709     <!-- @hide Allows the application to temporarily freeze the screen for a
   1710          full-screen transition. -->
   1711     <permission android:name="android.permission.FREEZE_SCREEN"
   1712         android:label="@string/permlab_freezeScreen"
   1713         android:description="@string/permdesc_freezeScreen"
   1714         android:protectionLevel="signature" />
   1715 
   1716     <!-- Allows an application to inject user events (keys, touch, trackball)
   1717          into the event stream and deliver them to ANY window.  Without this
   1718          permission, you can only deliver events to windows in your own process.
   1719          <p>Not for use by third-party applications. -->
   1720     <permission android:name="android.permission.INJECT_EVENTS"
   1721         android:label="@string/permlab_injectEvents"
   1722         android:description="@string/permdesc_injectEvents"
   1723         android:protectionLevel="signature" />
   1724 
   1725     <!-- @hide Allows an application to register an input filter which filters the stream
   1726          of user events (keys, touch, trackball) before they are dispatched to any window. -->
   1727     <permission android:name="android.permission.FILTER_EVENTS"
   1728         android:label="@string/permlab_filter_events"
   1729         android:description="@string/permdesc_filter_events"
   1730         android:protectionLevel="signature" />
   1731 
   1732     <!-- @hide Allows an application to retrieve info for a window from the window manager. -->
   1733     <permission android:name="android.permission.RETRIEVE_WINDOW_INFO"
   1734         android:label="@string/permlab_retrieve_window_info"
   1735         android:description="@string/permdesc_retrieve_window_info"
   1736         android:protectionLevel="signature" />
   1737 
   1738     <!-- @hide Allows an application to temporary enable accessibility on the device. -->
   1739     <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
   1740         android:label="@string/permlab_temporary_enable_accessibility"
   1741         android:description="@string/permdesc_temporary_enable_accessibility"
   1742         android:protectionLevel="signature" />
   1743 
   1744     <!-- @hide Allows an application to magnify the content of a display. -->
   1745     <permission android:name="android.permission.MAGNIFY_DISPLAY"
   1746         android:label="@string/permlab_magnify_display"
   1747         android:description="@string/permdesc_magnify_display"
   1748         android:protectionLevel="signature" />
   1749 
   1750     <!-- Allows an application to watch and control how activities are
   1751          started globally in the system.  Only for is in debugging
   1752          (usually the monkey command).
   1753          <p>Not for use by third-party applications. -->
   1754     <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
   1755         android:label="@string/permlab_runSetActivityWatcher"
   1756         android:description="@string/permdesc_runSetActivityWatcher"
   1757         android:protectionLevel="signature" />
   1758 
   1759     <!-- Allows an application to call the activity manager shutdown() API
   1760          to put the higher-level system there into a shutdown state.
   1761          @hide -->
   1762     <permission android:name="android.permission.SHUTDOWN"
   1763         android:label="@string/permlab_shutdown"
   1764         android:description="@string/permdesc_shutdown"
   1765         android:protectionLevel="signature|system" />
   1766 
   1767     <!-- Allows an application to tell the activity manager to temporarily
   1768          stop application switches, putting it into a special mode that
   1769          prevents applications from immediately switching away from some
   1770          critical UI such as the home screen.
   1771          @hide -->
   1772     <permission android:name="android.permission.STOP_APP_SWITCHES"
   1773         android:label="@string/permlab_stopAppSwitches"
   1774         android:description="@string/permdesc_stopAppSwitches"
   1775         android:protectionLevel="signature|system" />
   1776 
   1777     <!-- Allows an application to retrieve private information about
   1778          the current top activity, such as any assist context it can provide.
   1779          <p>Not for use by third-party applications. -->
   1780     <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
   1781         android:label="@string/permlab_getTopActivityInfo"
   1782         android:description="@string/permdesc_getTopActivityInfo"
   1783         android:protectionLevel="signature" />
   1784 
   1785     <!-- Allows an application to retrieve the current state of keys and
   1786          switches.
   1787          <p>Not for use by third-party applications.
   1788          @deprecated The API that used this permission has been removed. -->
   1789     <permission android:name="android.permission.READ_INPUT_STATE"
   1790         android:label="@string/permlab_readInputState"
   1791         android:description="@string/permdesc_readInputState"
   1792         android:protectionLevel="signature" />
   1793 
   1794     <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
   1795          to ensure that only the system can bind to it. -->
   1796     <permission android:name="android.permission.BIND_INPUT_METHOD"
   1797         android:label="@string/permlab_bindInputMethod"
   1798         android:description="@string/permdesc_bindInputMethod"
   1799         android:protectionLevel="signature" />
   1800 
   1801     <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
   1802          to ensure that only the system can bind to it. -->
   1803     <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
   1804         android:label="@string/permlab_bindAccessibilityService"
   1805         android:description="@string/permdesc_bindAccessibilityService"
   1806         android:protectionLevel="signature" />
   1807 
   1808     <!-- Must be required by a TextService (e.g. SpellCheckerService)
   1809          to ensure that only the system can bind to it. -->
   1810     <permission android:name="android.permission.BIND_TEXT_SERVICE"
   1811         android:label="@string/permlab_bindTextService"
   1812         android:description="@string/permdesc_bindTextService"
   1813         android:protectionLevel="signature" />
   1814 
   1815     <!-- Must be required by an {@link android.net.VpnService},
   1816          to ensure that only the system can bind to it. -->
   1817     <permission android:name="android.permission.BIND_VPN_SERVICE"
   1818         android:label="@string/permlab_bindVpnService"
   1819         android:description="@string/permdesc_bindVpnService"
   1820         android:protectionLevel="signature" />
   1821 
   1822     <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
   1823          to ensure that only the system can bind to it. -->
   1824     <permission android:name="android.permission.BIND_WALLPAPER"
   1825         android:label="@string/permlab_bindWallpaper"
   1826         android:description="@string/permdesc_bindWallpaper"
   1827         android:protectionLevel="signature|system" />
   1828 
   1829     <!-- Must be required by device administration receiver, to ensure that only the
   1830          system can interact with it. -->
   1831     <permission android:name="android.permission.BIND_DEVICE_ADMIN"
   1832         android:label="@string/permlab_bindDeviceAdmin"
   1833         android:description="@string/permdesc_bindDeviceAdmin"
   1834         android:protectionLevel="signature" />
   1835 
   1836     <!-- Allows low-level access to setting the orientation (actually
   1837          rotation) of the screen.
   1838          <p>Not for use by third-party applications. -->
   1839     <permission android:name="android.permission.SET_ORIENTATION"
   1840         android:label="@string/permlab_setOrientation"
   1841         android:description="@string/permdesc_setOrientation"
   1842         android:protectionLevel="signature" />
   1843 
   1844     <!-- Allows low-level access to setting the pointer speed.
   1845          <p>Not for use by third-party applications. -->
   1846     <permission android:name="android.permission.SET_POINTER_SPEED"
   1847         android:label="@string/permlab_setPointerSpeed"
   1848         android:description="@string/permdesc_setPointerSpeed"
   1849         android:protectionLevel="signature" />
   1850 
   1851     <!-- Allows low-level access to setting the keyboard layout.
   1852          <p>Not for use by third-party applications.
   1853          @hide -->
   1854     <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
   1855         android:label="@string/permlab_setKeyboardLayout"
   1856         android:description="@string/permdesc_setKeyboardLayout"
   1857         android:protectionLevel="signature" />
   1858 
   1859     <!-- Allows an application to install packages.
   1860     <p>Not for use by third-party applications. -->
   1861     <permission android:name="android.permission.INSTALL_PACKAGES"
   1862         android:label="@string/permlab_installPackages"
   1863         android:description="@string/permdesc_installPackages"
   1864         android:protectionLevel="signature|system" />
   1865 
   1866     <!-- Allows an application to clear user data.
   1867     <p>Not for use by third-party applications. -->
   1868     <permission android:name="android.permission.CLEAR_APP_USER_DATA"
   1869         android:label="@string/permlab_clearAppUserData"
   1870         android:description="@string/permdesc_clearAppUserData"
   1871         android:protectionLevel="signature" />
   1872 
   1873     <!-- Allows an application to delete cache files.
   1874     <p>Not for use by third-party applications. -->
   1875     <permission android:name="android.permission.DELETE_CACHE_FILES"
   1876         android:label="@string/permlab_deleteCacheFiles"
   1877         android:description="@string/permdesc_deleteCacheFiles"
   1878         android:protectionLevel="signature|system" />
   1879 
   1880     <!-- Allows an application to delete packages.
   1881     <p>Not for use by third-party applications. -->
   1882     <permission android:name="android.permission.DELETE_PACKAGES"
   1883         android:label="@string/permlab_deletePackages"
   1884         android:description="@string/permdesc_deletePackages"
   1885         android:protectionLevel="signature|system" />
   1886 
   1887     <!-- Allows an application to move location of installed package.
   1888          @hide -->
   1889     <permission android:name="android.permission.MOVE_PACKAGE"
   1890         android:label="@string/permlab_movePackage"
   1891         android:description="@string/permdesc_movePackage"
   1892         android:protectionLevel="signature|system" />
   1893 
   1894     <!-- Allows an application to change whether an application component (other than its own) is
   1895          enabled or not.
   1896          <p>Not for use by third-party applications. -->
   1897     <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
   1898         android:label="@string/permlab_changeComponentState"
   1899         android:description="@string/permdesc_changeComponentState"
   1900         android:protectionLevel="signature|system" />
   1901 
   1902     <!-- @hide Allows an application to grant or revoke specific permissions. -->
   1903     <permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS"
   1904         android:label="@string/permlab_grantRevokePermissions"
   1905         android:description="@string/permdesc_grantRevokePermissions"
   1906         android:protectionLevel="signature" />
   1907 
   1908     <!-- Allows an application to use SurfaceFlinger's low level features.
   1909     <p>Not for use by third-party applications. -->
   1910     <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
   1911         android:label="@string/permlab_accessSurfaceFlinger"
   1912         android:description="@string/permdesc_accessSurfaceFlinger"
   1913         android:protectionLevel="signature" />
   1914 
   1915     <!-- Allows an application to take screen shots and more generally
   1916          get access to the frame buffer data.
   1917          <p>Not for use by third-party applications. -->
   1918     <permission android:name="android.permission.READ_FRAME_BUFFER"
   1919         android:label="@string/permlab_readFrameBuffer"
   1920         android:description="@string/permdesc_readFrameBuffer"
   1921         android:protectionLevel="signature|system" />
   1922 
   1923     <!-- Allows an application to configure and connect to Wifi displays
   1924          @hide -->
   1925     <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
   1926         android:label="@string/permlab_configureWifiDisplay"
   1927         android:description="@string/permdesc_configureWifiDisplay"
   1928         android:protectionLevel="signature" />
   1929 
   1930     <!-- Allows an application to control low-level features of Wifi displays
   1931          such as opening an RTSP socket.  This permission should only be used
   1932          by the display manager.
   1933          @hide -->
   1934     <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
   1935         android:label="@string/permlab_controlWifiDisplay"
   1936         android:description="@string/permdesc_controlWifiDisplay"
   1937         android:protectionLevel="signature" />
   1938 
   1939     <!-- Required to be able to disable the device (very dangerous!).
   1940     <p>Not for use by third-party applications.. -->
   1941     <permission android:name="android.permission.BRICK"
   1942         android:label="@string/permlab_brick"
   1943         android:description="@string/permdesc_brick"
   1944         android:protectionLevel="signature" />
   1945 
   1946     <!-- Required to be able to reboot the device.
   1947     <p>Not for use by third-party applications. -->
   1948     <permission android:name="android.permission.REBOOT"
   1949         android:label="@string/permlab_reboot"
   1950         android:description="@string/permdesc_reboot"
   1951         android:protectionLevel="signature|system" />
   1952 
   1953    <!-- Allows low-level access to power management.
   1954    <p>Not for use by third-party applications. -->
   1955     <permission android:name="android.permission.DEVICE_POWER"
   1956         android:label="@string/permlab_devicePower"
   1957         android:description="@string/permdesc_devicePower"
   1958         android:protectionLevel="signature" />
   1959 
   1960    <!-- @hide Allows low-level access to tun tap driver -->
   1961     <permission android:name="android.permission.NET_TUNNELING"
   1962         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1963         android:protectionLevel="signature" />
   1964 
   1965     <!-- Run as a manufacturer test application, running as the root user.
   1966          Only available when the device is running in manufacturer test mode.
   1967          <p>Not for use by third-party applications. -->
   1968     <permission android:name="android.permission.FACTORY_TEST"
   1969         android:label="@string/permlab_factoryTest"
   1970         android:description="@string/permdesc_factoryTest"
   1971         android:protectionLevel="signature" />
   1972 
   1973     <!-- Allows an application to broadcast a notification that an application
   1974          package has been removed.
   1975          <p>Not for use by third-party applications. -->
   1976     <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
   1977         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1978         android:label="@string/permlab_broadcastPackageRemoved"
   1979         android:description="@string/permdesc_broadcastPackageRemoved"
   1980         android:protectionLevel="signature" />
   1981 
   1982     <!-- Allows an application to broadcast an SMS receipt notification.
   1983     <p>Not for use by third-party applications. -->
   1984     <permission android:name="android.permission.BROADCAST_SMS"
   1985         android:permissionGroup="android.permission-group.MESSAGES"
   1986         android:label="@string/permlab_broadcastSmsReceived"
   1987         android:description="@string/permdesc_broadcastSmsReceived"
   1988         android:protectionLevel="signature" />
   1989 
   1990     <!-- Allows an application to broadcast a WAP PUSH receipt notification.
   1991     <p>Not for use by third-party applications. -->
   1992     <permission android:name="android.permission.BROADCAST_WAP_PUSH"
   1993         android:permissionGroup="android.permission-group.MESSAGES"
   1994         android:label="@string/permlab_broadcastWapPush"
   1995         android:description="@string/permdesc_broadcastWapPush"
   1996         android:protectionLevel="signature" />
   1997 
   1998     <!-- Not for use by third-party applications. -->
   1999     <permission android:name="android.permission.MASTER_CLEAR"
   2000         android:label="@string/permlab_masterClear"
   2001         android:description="@string/permdesc_masterClear"
   2002         android:protectionLevel="signature|system" />
   2003 
   2004     <!-- Allows an application to call any phone number, including emergency
   2005          numbers, without going through the Dialer user interface for the user
   2006          to confirm the call being placed.
   2007          <p>Not for use by third-party applications. -->
   2008     <permission android:name="android.permission.CALL_PRIVILEGED"
   2009         android:label="@string/permlab_callPrivileged"
   2010         android:description="@string/permdesc_callPrivileged"
   2011         android:protectionLevel="signature|system" />
   2012 
   2013     <!-- Allows an application to perform CDMA OTA provisioning @hide -->
   2014     <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
   2015         android:label="@string/permlab_performCdmaProvisioning"
   2016         android:description="@string/permdesc_performCdmaProvisioning"
   2017         android:protectionLevel="signature|system" />
   2018 
   2019     <!-- Allows enabling/disabling location update notifications from
   2020          the radio.
   2021          <p>Not for use by third-party applications. -->
   2022     <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
   2023         android:label="@string/permlab_locationUpdates"
   2024         android:description="@string/permdesc_locationUpdates"
   2025         android:protectionLevel="signature|system" />
   2026 
   2027     <!-- Allows read/write access to the "properties" table in the checkin
   2028          database, to change values that get uploaded.
   2029          <p>Not for use by third-party applications. -->
   2030     <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
   2031         android:label="@string/permlab_checkinProperties"
   2032         android:description="@string/permdesc_checkinProperties"
   2033         android:protectionLevel="signature|system" />
   2034 
   2035     <!-- Allows an application to collect component usage
   2036          statistics @hide -->
   2037     <permission android:name="android.permission.PACKAGE_USAGE_STATS"
   2038         android:label="@string/permlab_pkgUsageStats"
   2039         android:description="@string/permdesc_pkgUsageStats"
   2040         android:protectionLevel="signature|system" />
   2041 
   2042     <!-- Allows an application to collect battery statistics -->
   2043     <permission android:name="android.permission.BATTERY_STATS"
   2044         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   2045         android:label="@string/permlab_batteryStats"
   2046         android:description="@string/permdesc_batteryStats"
   2047         android:protectionLevel="dangerous" />
   2048 
   2049     <!-- Allows an application to control the backup and restore process.
   2050     <p>Not for use by third-party applications.
   2051          @hide pending API council -->
   2052     <permission android:name="android.permission.BACKUP"
   2053         android:label="@string/permlab_backup"
   2054         android:description="@string/permdesc_backup"
   2055         android:protectionLevel="signature|system" />
   2056 
   2057     <!-- Allows a package to launch the secure full-backup confirmation UI.
   2058          ONLY the system process may hold this permission.
   2059          @hide -->
   2060     <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
   2061         android:label="@string/permlab_confirm_full_backup"
   2062         android:description="@string/permdesc_confirm_full_backup"
   2063         android:protectionLevel="signature" />
   2064 
   2065     <!-- Must be required by a {@link android.widget.RemoteViewsService},
   2066          to ensure that only the system can bind to it. -->
   2067     <permission android:name="android.permission.BIND_REMOTEVIEWS"
   2068         android:label="@string/permlab_bindRemoteViews"
   2069         android:description="@string/permdesc_bindRemoteViews"
   2070         android:protectionLevel="signature|system" />
   2071 
   2072     <!-- Allows an application to tell the AppWidget service which application
   2073          can access AppWidget's data.  The normal user flow is that a user
   2074          picks an AppWidget to go into a particular host, thereby giving that
   2075          host application access to the private data from the AppWidget app.
   2076          An application that has this permission should honor that contract.
   2077          <p>Not for use by third-party applications. -->
   2078     <permission android:name="android.permission.BIND_APPWIDGET"
   2079         android:permissionGroup="android.permission-group.PERSONAL_INFO"
   2080         android:label="@string/permlab_bindGadget"
   2081         android:description="@string/permdesc_bindGadget"
   2082         android:protectionLevel="signature|system" />
   2083 
   2084     <!-- Private permission, to restrict who can bring up a dialog to add a new
   2085          keyguard widget
   2086          @hide -->
   2087     <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
   2088         android:permissionGroup="android.permission-group.PERSONAL_INFO"
   2089         android:protectionLevel="signature|system" />
   2090 
   2091     <!-- Internal permission allowing an application to query/set which
   2092          applications can bind AppWidgets.
   2093          @hide -->
   2094     <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
   2095         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   2096         android:protectionLevel="signature|system" />
   2097 
   2098     <!-- Allows applications to change the background data setting.
   2099     <p>Not for use by third-party applications.
   2100          @hide pending API council -->
   2101     <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
   2102         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   2103         android:protectionLevel="signature"
   2104         android:description="@string/permdesc_changeBackgroundDataSetting"
   2105         android:label="@string/permlab_changeBackgroundDataSetting" />
   2106 
   2107     <!-- This permission can be used on content providers to allow the global
   2108          search system to access their data.  Typically it used when the
   2109          provider has some permissions protecting it (which global search
   2110          would not be expected to hold), and added as a read-only permission
   2111          to the path in the provider where global search queries are
   2112          performed.  This permission can not be held by regular applications;
   2113          it is used by applications to protect themselves from everyone else
   2114          besides global search. -->
   2115     <permission android:name="android.permission.GLOBAL_SEARCH"
   2116         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   2117         android:protectionLevel="signature|system" />
   2118 
   2119     <!-- Internal permission protecting access to the global search
   2120          system: ensures that only the system can access the provider
   2121          to perform queries (since this otherwise provides unrestricted
   2122          access to a variety of content providers), and to write the
   2123          search statistics (to keep applications from gaming the source
   2124          ranking).
   2125          @hide -->
   2126     <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
   2127         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   2128         android:protectionLevel="signature" />
   2129 
   2130     <!-- Allows applications to set a live wallpaper.
   2131          @hide XXX Change to signature once the picker is moved to its
   2132          own apk as Ghod Intended. -->
   2133     <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
   2134         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   2135         android:protectionLevel="signature|system" />
   2136 
   2137     <!-- Allows applications to read dream settings and dream state.
   2138          @hide -->
   2139     <permission android:name="android.permission.READ_DREAM_STATE"
   2140         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   2141         android:protectionLevel="signature" />
   2142 
   2143     <!-- Allows applications to write dream settings, and start or stop dreaming.
   2144          @hide -->
   2145     <permission android:name="android.permission.WRITE_DREAM_STATE"
   2146         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   2147         android:protectionLevel="signature" />
   2148 
   2149     <!-- Allow an application to read and write the cache partition.
   2150          @hide -->
   2151     <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
   2152         android:label="@string/permlab_cache_filesystem"
   2153         android:description="@string/permdesc_cache_filesystem"
   2154         android:protectionLevel="signature|system" />
   2155 
   2156     <!-- Must be required by default container service so that only
   2157          the system can bind to it and use it to copy
   2158          protected data to secure containers or files
   2159          accessible to the system.
   2160          @hide -->
   2161     <permission android:name="android.permission.COPY_PROTECTED_DATA"
   2162         android:label="@string/permlab_copyProtectedData"
   2163         android:description="@string/permlab_copyProtectedData"
   2164         android:protectionLevel="signature" />
   2165 
   2166     <!-- Internal permission protecting access to the encryption methods
   2167         @hide
   2168     -->
   2169     <permission android:name="android.permission.CRYPT_KEEPER"
   2170         android:protectionLevel="signature|system" />
   2171 
   2172     <!-- Allows an application to read historical network usage for
   2173          specific networks and applications. @hide -->
   2174     <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
   2175         android:label="@string/permlab_readNetworkUsageHistory"
   2176         android:description="@string/permdesc_readNetworkUsageHistory"
   2177         android:protectionLevel="signature|system" />
   2178 
   2179     <!-- Allows an application to manage network policies (such as warning and disable
   2180          limits) and to define application-specific rules. @hide -->
   2181     <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
   2182         android:label="@string/permlab_manageNetworkPolicy"
   2183         android:description="@string/permdesc_manageNetworkPolicy"
   2184         android:protectionLevel="signature" />
   2185 
   2186     <!-- Allows an application to account its network traffic against other UIDs. Used
   2187          by system services like download manager and media server. Not for use by
   2188          third party apps. @hide -->
   2189     <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
   2190         android:label="@string/permlab_modifyNetworkAccounting"
   2191         android:description="@string/permdesc_modifyNetworkAccounting"
   2192         android:protectionLevel="signature|system" />
   2193 
   2194     <!-- C2DM permission.
   2195          @hide Used internally.
   2196      -->
   2197     <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
   2198           android:protectionLevel="signature" />
   2199     <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
   2200 
   2201     <!-- @hide Package verifier needs to have this permission before the PackageManager will
   2202          trust it to verify packages.
   2203     -->
   2204     <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
   2205         android:label="@string/permlab_packageVerificationAgent"
   2206         android:description="@string/permdesc_packageVerificationAgent"
   2207         android:protectionLevel="signature|system" />
   2208 
   2209     <!-- Must be required by package verifier receiver, to ensure that only the
   2210          system can interact with it.
   2211          @hide
   2212     -->
   2213     <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
   2214         android:label="@string/permlab_bindPackageVerifier"
   2215         android:description="@string/permdesc_bindPackageVerifier"
   2216         android:protectionLevel="signature" />
   2217 
   2218     <!-- Allows applications to access serial ports via the SerialManager.
   2219          @hide -->
   2220     <permission android:name="android.permission.SERIAL_PORT"
   2221         android:label="@string/permlab_serialPort"
   2222         android:description="@string/permdesc_serialPort"
   2223         android:protectionLevel="signature|system" />
   2224 
   2225     <!-- Allows the holder to access content providers from outside an ApplicationThread.
   2226          This permission is enforced by the ActivityManagerService on the corresponding APIs,
   2227          in particular ActivityManagerService#getContentProviderExternal(String) and
   2228          ActivityManagerService#removeContentProviderExternal(String).
   2229          @hide
   2230     -->
   2231     <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
   2232         android:label="@string/permlab_accessContentProvidersExternally"
   2233         android:description="@string/permdesc_accessContentProvidersExternally"
   2234         android:protectionLevel="signature" />
   2235     <!-- Allows an application to hold an UpdateLock, recommending that a headless
   2236          OTA reboot *not* occur while the lock is held.
   2237          @hide -->
   2238     <permission android:name="android.permission.UPDATE_LOCK"
   2239         android:label="@string/permlab_updateLock"
   2240         android:description="@string/permdesc_updateLock"
   2241         android:protectionLevel="signatureOrSystem" />
   2242 
   2243     <!-- Allows an application to read the current set of notifications, including
   2244          any metadata and intents attached.
   2245          @hide -->
   2246     <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
   2247         android:label="@string/permlab_accessNotifications"
   2248         android:description="@string/permdesc_accessNotifications"
   2249         android:protectionLevel="signature|system" />
   2250 
   2251     <!-- Must be required by an {@link
   2252          android.service.notification.NotificationListenerService},
   2253          to ensure that only the system can bind to it. -->
   2254     <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
   2255         android:label="@string/permlab_bindNotificationListenerService"
   2256         android:description="@string/permdesc_bindNotificationListenerService"
   2257         android:protectionLevel="signature" />
   2258 
   2259     <!-- The system process is explicitly the only one allowed to launch the
   2260          confirmation UI for full backup/restore -->
   2261     <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
   2262 
   2263     <application android:process="system"
   2264                  android:persistent="true"
   2265                  android:hasCode="false"
   2266                  android:label="@string/android_system_label"
   2267                  android:allowClearUserData="false"
   2268                  android:backupAgent="com.android.server.SystemBackupAgent"
   2269                  android:killAfterRestore="false"
   2270                  android:icon="@drawable/ic_launcher_android"
   2271                  android:supportsRtl="true">
   2272         <activity android:name="com.android.internal.app.ChooserActivity"
   2273                 android:theme="@style/Theme.Holo.Dialog.Alert"
   2274                 android:finishOnCloseSystemDialogs="true"
   2275                 android:excludeFromRecents="true"
   2276                 android:multiprocess="true">
   2277             <intent-filter>
   2278                 <action android:name="android.intent.action.CHOOSER" />
   2279                 <category android:name="android.intent.category.DEFAULT" />
   2280             </intent-filter>
   2281         </activity>
   2282         <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
   2283                 android:theme="@style/Theme.Holo.Dialog"
   2284                 android:label="@string/heavy_weight_switcher_title"
   2285                 android:finishOnCloseSystemDialogs="true"
   2286                 android:excludeFromRecents="true"
   2287                 android:process=":ui">
   2288         </activity>
   2289         <activity android:name="com.android.internal.app.PlatLogoActivity"
   2290                 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
   2291                 android:process=":ui">
   2292         </activity>
   2293         <activity android:name="com.android.internal.app.DisableCarModeActivity"
   2294                 android:theme="@style/Theme.NoDisplay"
   2295                 android:excludeFromRecents="true"
   2296                 android:process=":ui">
   2297         </activity>
   2298 
   2299         <activity android:name="android.accounts.ChooseAccountActivity"
   2300                 android:excludeFromRecents="true"
   2301                 android:exported="true"
   2302                 android:theme="@android:style/Theme.Holo.Dialog"
   2303                 android:label="@string/choose_account_label"
   2304                 android:process=":ui">
   2305         </activity>
   2306 
   2307         <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
   2308                 android:excludeFromRecents="true"
   2309                 android:exported="true"
   2310                 android:theme="@android:style/Theme.Holo.Dialog"
   2311                 android:label="@string/choose_account_label"
   2312                 android:process=":ui">
   2313         </activity>
   2314 
   2315         <activity android:name="android.accounts.ChooseAccountTypeActivity"
   2316                 android:excludeFromRecents="true"
   2317                 android:theme="@android:style/Theme.Holo.Dialog"
   2318                 android:label="@string/choose_account_label"
   2319                 android:process=":ui">
   2320         </activity>
   2321 
   2322         <activity android:name="android.accounts.CantAddAccountActivity"
   2323                 android:excludeFromRecents="true"
   2324                 android:exported="true"
   2325                 android:theme="@android:style/Theme.Holo.Dialog"
   2326                 android:label="@string/error_message_title"
   2327                 android:process=":ui">
   2328         </activity>
   2329 
   2330         <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
   2331                 android:excludeFromRecents="true"
   2332                 android:exported="true"
   2333                 android:theme="@android:style/Theme.Holo.DialogWhenLarge"
   2334                 android:process=":ui">
   2335         </activity>
   2336 
   2337         <activity android:name="android.content.SyncActivityTooManyDeletes"
   2338                android:theme="@android:style/Theme.Holo.Dialog"
   2339                android:label="@string/sync_too_many_deletes"
   2340                android:process=":ui">
   2341         </activity>
   2342 
   2343         <activity android:name="com.android.server.ShutdownActivity"
   2344             android:permission="android.permission.SHUTDOWN"
   2345             android:excludeFromRecents="true">
   2346             <intent-filter>
   2347                 <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" />
   2348                 <category android:name="android.intent.category.DEFAULT" />
   2349             </intent-filter>
   2350             <intent-filter>
   2351                 <action android:name="android.intent.action.REBOOT" />
   2352                 <category android:name="android.intent.category.DEFAULT" />
   2353             </intent-filter>
   2354         </activity>
   2355 
   2356         <activity android:name="com.android.internal.app.NetInitiatedActivity"
   2357                 android:theme="@style/Theme.Holo.Dialog.Alert"
   2358                 android:excludeFromRecents="true"
   2359                 android:process=":ui">
   2360         </activity>
   2361 
   2362         <receiver android:name="com.android.server.BootReceiver"
   2363                 android:primaryUserOnly="true">
   2364             <intent-filter>
   2365                 <action android:name="android.intent.action.BOOT_COMPLETED" />
   2366             </intent-filter>
   2367         </receiver>
   2368 
   2369         <receiver android:name="com.android.server.updates.CertPinInstallReceiver" >
   2370             <intent-filter>
   2371                 <action android:name="android.intent.action.UPDATE_PINS" />
   2372             </intent-filter>
   2373         </receiver>
   2374 
   2375         <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" >
   2376             <intent-filter>
   2377                 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
   2378             </intent-filter>
   2379         </receiver>
   2380 
   2381         <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" >
   2382             <intent-filter>
   2383                 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
   2384             </intent-filter>
   2385         </receiver>
   2386 
   2387         <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" >
   2388             <intent-filter>
   2389                 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
   2390             </intent-filter>
   2391         </receiver>
   2392 
   2393         <receiver android:name="com.android.server.updates.TZInfoInstallReceiver" >
   2394             <intent-filter>
   2395                 <action android:name="android.intent.action.UPDATE_TZINFO" />
   2396             </intent-filter>
   2397         </receiver>
   2398 
   2399         <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" >
   2400             <intent-filter>
   2401                 <action android:name="android.intent.action.UPDATE_SEPOLICY" />
   2402             </intent-filter>
   2403         </receiver>
   2404 
   2405         <receiver android:name="com.android.server.MasterClearReceiver"
   2406             android:permission="android.permission.MASTER_CLEAR"
   2407             android:priority="100" >
   2408             <intent-filter>
   2409                 <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR -->
   2410                 <action android:name="android.intent.action.MASTER_CLEAR" />
   2411 
   2412                 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
   2413                 <action android:name="com.google.android.c2dm.intent.RECEIVE" />
   2414                 <category android:name="android.intent.category.MASTER_CLEAR" />
   2415             </intent-filter>
   2416         </receiver>
   2417 
   2418         <service android:name="com.android.internal.os.storage.ExternalStorageFormatter"
   2419             android:permission="android.permission.MASTER_CLEAR"
   2420             android:exported="true" />
   2421 
   2422         <service android:name="android.hardware.location.GeofenceHardwareService"
   2423             android:permission="android.permission.LOCATION_HARDWARE"
   2424             android:exported="false" />
   2425     </application>
   2426 
   2427 </manifest>
   2428