Home | History | Annotate | Download | only in res
      1 <?xml version="1.0" encoding="utf-8"?>
      2 <!--
      3 /* //device/apps/common/AndroidManifest.xml
      4 **
      5 ** Copyright 2006, The Android Open Source Project
      6 **
      7 ** Licensed under the Apache License, Version 2.0 (the "License");
      8 ** you may not use this file except in compliance with the License.
      9 ** You may obtain a copy of the License at
     10 **
     11 **     http://www.apache.org/licenses/LICENSE-2.0
     12 **
     13 ** Unless required by applicable law or agreed to in writing, software
     14 ** distributed under the License is distributed on an "AS IS" BASIS,
     15 ** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     16 ** See the License for the specific language governing permissions and
     17 ** limitations under the License.
     18 */
     19 -->
     20 <manifest xmlns:android="http://schemas.android.com/apk/res/android"
     21     package="android" coreApp="true" android:sharedUserId="android.uid.system"
     22     android:sharedUserLabel="@string/android_system_label">
     23 
     24     <!-- ================================================ -->
     25     <!-- Special broadcasts that only the system can send -->
     26     <!-- ================================================ -->
     27     <eat-comment />
     28 
     29     <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
     30     <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
     31     <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
     32     <protected-broadcast android:name="android.intent.action.TIME_SET" />
     33     <protected-broadcast android:name="android.intent.action.TIME_TICK" />
     34     <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
     35     <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
     36     <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
     37     <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
     38     <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
     39     <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
     40     <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
     41     <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
     42     <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
     43     <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
     44     <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
     45     <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
     46     <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
     47     <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
     48     <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
     49     <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
     50     <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
     51     <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
     52     <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
     53     <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
     54     <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
     55     <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
     56     <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
     57     <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
     58     <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
     59     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
     60     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
     61     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
     62     <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
     63     <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
     64     <protected-broadcast android:name="android.intent.action.REBOOT" />
     65     <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
     66     <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
     67     <protected-broadcast android:name="android.intent.action.USER_ADDED" />
     68     <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
     69     <protected-broadcast android:name="android.intent.action.USER_STARTING" />
     70     <protected-broadcast android:name="android.intent.action.USER_STARTED" />
     71     <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
     72     <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
     73     <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
     74     <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
     75     <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
     76 
     77     <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
     78     <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
     79     <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
     80     <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
     81 
     82     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
     83     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
     84     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
     85     <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
     86 
     87     <protected-broadcast android:name="android.backup.intent.RUN" />
     88     <protected-broadcast android:name="android.backup.intent.CLEAR" />
     89     <protected-broadcast android:name="android.backup.intent.INIT" />
     90 
     91     <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
     92     <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
     93     <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
     94     <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
     95     <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
     96     <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
     97     <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
     98     <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
     99     <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
    100     <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
    101     <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
    102     <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
    103     <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
    104     <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
    105     <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
    106     <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
    107     <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
    108     <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
    109     <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
    110     <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
    111     <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
    112     <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
    113     <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
    114     <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
    115     <protected-broadcast
    116         android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
    117     <protected-broadcast
    118         android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
    119     <protected-broadcast
    120         android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
    121     <protected-broadcast
    122         android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
    123     <protected-broadcast
    124         android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
    125     <protected-broadcast
    126         android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
    127     <protected-broadcast
    128         android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
    129     <protected-broadcast
    130         android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
    131     <protected-broadcast
    132         android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
    133     <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" />
    134     <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
    135     <protected-broadcast android:name="android.btopp.intent.action.BT_OPP_HANDOVER_STARTED" />
    136     <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" />
    137     <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
    138     <protected-broadcast android:name="android.btopp.intent.action.BT_OPP_TRANSFER_PROGRESS" />
    139     <protected-broadcast android:name="android.btopp.intent.action.LIST" />
    140     <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
    141     <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
    142     <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
    143     <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
    144     <protected-broadcast android:name="android.btopp.intent.action.BT_OPP_TRANSFER_DONE" />
    145     <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
    146     <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
    147     <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
    148     <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
    149     <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
    150     <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
    151     <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
    152 
    153     <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
    154 
    155     <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
    156     <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
    157     <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
    158     <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
    159     <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
    160 
    161     <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
    162     <protected-broadcast android:name="android.intent.action.ANALOG_AUDIO_DOCK_PLUG" />
    163     <protected-broadcast android:name="android.intent.action.DIGITAL_AUDIO_DOCK_PLUG" />
    164     <protected-broadcast android:name="android.intent.action.HDMI_AUDIO_PLUG" />
    165     <protected-broadcast android:name="android.intent.action.USB_AUDIO_ACCESSORY_PLUG" />
    166     <protected-broadcast android:name="android.intent.action.USB_AUDIO_DEVICE_PLUG" />
    167 
    168     <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
    169     <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
    170     <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
    171     <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
    172     <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
    173     <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
    174     <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
    175     <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
    176 
    177     <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
    178     <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
    179     <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
    180     <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
    181     <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
    182     <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
    183     <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
    184     <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
    185     <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
    186     <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
    187 
    188     <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
    189     <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
    190     <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
    191     <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
    192     <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
    193 
    194     <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
    195 
    196     <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" />
    197     <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
    198     <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
    199     <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
    200 
    201     <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
    202     <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
    203     <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
    204 
    205     <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
    206 
    207     <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
    208     <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
    209     <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
    210     <protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" />
    211 
    212     <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
    213     <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
    214     <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
    215     <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
    216     <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
    217     <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
    218     <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
    219     <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
    220     <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
    221     <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
    222     <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
    223     <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
    224     <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
    225     <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
    226     <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
    227     <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
    228     <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
    229     <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
    230     <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
    231     <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
    232     <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
    233     <protected-broadcast
    234             android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
    235     <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
    236     <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
    237     <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
    238     <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
    239     <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" />
    240 
    241     <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
    242     <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
    243 
    244     <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
    245 
    246     <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
    247 
    248     <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
    249     <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
    250     <protected-broadcast android:name="android.location.MODE_CHANGED" />
    251     <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
    252     <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
    253 
    254     <protected-broadcast
    255         android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
    256 
    257     <!-- ====================================== -->
    258     <!-- Permissions for things that cost money -->
    259     <!-- ====================================== -->
    260     <eat-comment />
    261 
    262     <!-- Used for permissions that can be used to make the user spend money
    263          without their direct involvement. -->
    264     <permission-group android:name="android.permission-group.COST_MONEY"
    265         android:label="@string/permgrouplab_costMoney"
    266         android:description="@string/permgroupdesc_costMoney" />
    267 
    268     <!-- ================================== -->
    269     <!-- Permissions for accessing messages -->
    270     <!-- ================================== -->
    271     <eat-comment />
    272 
    273     <!-- Used for permissions that allow an application to send messages
    274          on behalf of the user or intercept messages being received by the
    275          user.  This is primarily intended for SMS/MMS messaging, such as
    276          receiving or reading an MMS. -->
    277     <permission-group android:name="android.permission-group.MESSAGES"
    278         android:label="@string/permgrouplab_messages"
    279         android:icon="@drawable/perm_group_messages"
    280         android:description="@string/permgroupdesc_messages"
    281         android:permissionGroupFlags="personalInfo"
    282         android:priority="360"/>
    283 
    284     <!-- Allows an application to send SMS messages. -->
    285     <permission android:name="android.permission.SEND_SMS"
    286         android:permissionGroup="android.permission-group.MESSAGES"
    287         android:protectionLevel="dangerous"
    288         android:permissionFlags="costsMoney"
    289         android:label="@string/permlab_sendSms"
    290         android:description="@string/permdesc_sendSms" />
    291 
    292     <!-- Allows an application (Phone) to send a request to other applications
    293          to handle the respond-via-message action during incoming calls.
    294          <p>Not for use by third-party applications. -->
    295     <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
    296         android:permissionGroup="android.permission-group.MESSAGES"
    297         android:protectionLevel="signature|system"
    298         android:label="@string/permlab_sendRespondViaMessageRequest"
    299         android:description="@string/permdesc_sendRespondViaMessageRequest" />
    300 
    301     <!-- Allows an application to monitor incoming SMS messages, to record
    302          or perform processing on them. -->
    303     <permission android:name="android.permission.RECEIVE_SMS"
    304         android:permissionGroup="android.permission-group.MESSAGES"
    305         android:protectionLevel="dangerous"
    306         android:label="@string/permlab_receiveSms"
    307         android:description="@string/permdesc_receiveSms" />
    308 
    309     <!-- Allows an application to monitor incoming MMS messages, to record
    310          or perform processing on them. -->
    311     <permission android:name="android.permission.RECEIVE_MMS"
    312         android:permissionGroup="android.permission-group.MESSAGES"
    313         android:protectionLevel="dangerous"
    314         android:label="@string/permlab_receiveMms"
    315         android:description="@string/permdesc_receiveMms" />
    316 
    317     <!-- Allows an application to receive emergency cell broadcast messages,
    318          to record or display them to the user.
    319          <p>Not for use by third-party applications.
    320          @hide Pending API council approval -->
    321     <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
    322         android:permissionGroup="android.permission-group.MESSAGES"
    323         android:protectionLevel="signature|system"
    324         android:label="@string/permlab_receiveEmergencyBroadcast"
    325         android:description="@string/permdesc_receiveEmergencyBroadcast" />
    326 
    327     <!-- Allows an application to read previously received cell broadcast
    328          messages and to register a content observer to get notifications when
    329          a cell broadcast has been received and added to the database. For
    330          emergency alerts, the database is updated immediately after the
    331          alert dialog and notification sound/vibration/speech are presented.
    332          The "read" column is then updated after the user dismisses the alert.
    333          This enables supplementary emergency assistance apps to start loading
    334          additional emergency information (if Internet access is available)
    335          when the alert is first received, and to delay presenting the info
    336          to the user until after the initial alert dialog is dismissed.
    337          @hide Pending API council approval -->
    338     <permission android:name="android.permission.READ_CELL_BROADCASTS"
    339         android:permissionGroup="android.permission-group.MESSAGES"
    340         android:protectionLevel="dangerous"
    341         android:label="@string/permlab_readCellBroadcasts"
    342         android:description="@string/permdesc_readCellBroadcasts" />
    343 
    344     <!-- Allows an application to read SMS messages. -->
    345     <permission android:name="android.permission.READ_SMS"
    346         android:permissionGroup="android.permission-group.MESSAGES"
    347         android:protectionLevel="dangerous"
    348         android:label="@string/permlab_readSms"
    349         android:description="@string/permdesc_readSms" />
    350 
    351     <!-- Allows an application to write SMS messages. -->
    352     <permission android:name="android.permission.WRITE_SMS"
    353         android:permissionGroup="android.permission-group.MESSAGES"
    354         android:protectionLevel="dangerous"
    355         android:label="@string/permlab_writeSms"
    356         android:description="@string/permdesc_writeSms" />
    357 
    358     <!-- Allows an application to monitor incoming WAP push messages. -->
    359     <permission android:name="android.permission.RECEIVE_WAP_PUSH"
    360         android:permissionGroup="android.permission-group.MESSAGES"
    361         android:protectionLevel="dangerous"
    362         android:label="@string/permlab_receiveWapPush"
    363         android:description="@string/permdesc_receiveWapPush" />
    364 
    365     <!-- =============================================================== -->
    366     <!-- Permissions for accessing social info (contacts and social) -->
    367     <!-- =============================================================== -->
    368     <eat-comment />
    369 
    370     <!-- Used for permissions that provide access to the user's social connections,
    371          such as contacts, call logs, social stream, etc.  This includes
    372          both reading and writing of this data (which should generally be
    373          expressed as two distinct permissions). -->
    374 
    375     <permission-group android:name="android.permission-group.SOCIAL_INFO"
    376         android:label="@string/permgrouplab_socialInfo"
    377         android:icon="@drawable/perm_group_social_info"
    378         android:description="@string/permgroupdesc_socialInfo"
    379         android:permissionGroupFlags="personalInfo"
    380         android:priority="320" />
    381 
    382     <!-- Allows an application to read the user's contacts data. -->
    383     <permission android:name="android.permission.READ_CONTACTS"
    384         android:permissionGroup="android.permission-group.SOCIAL_INFO"
    385         android:protectionLevel="dangerous"
    386         android:label="@string/permlab_readContacts"
    387         android:description="@string/permdesc_readContacts" />
    388 
    389     <!-- Allows an application to write (but not read) the user's
    390          contacts data. -->
    391     <permission android:name="android.permission.WRITE_CONTACTS"
    392         android:permissionGroup="android.permission-group.SOCIAL_INFO"
    393         android:protectionLevel="dangerous"
    394         android:label="@string/permlab_writeContacts"
    395         android:description="@string/permdesc_writeContacts" />
    396 
    397     <!-- Allows an application to execute contacts directory search.
    398          This should only be used by ContactsProvider.
    399          <p>Not for use by third-party applications. -->
    400     <!-- @hide -->
    401     <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
    402         android:permissionGroup="android.permission-group.PERSONAL_INFO"
    403         android:protectionLevel="signature|system" />
    404 
    405     <!-- Allows an application to read the user's call log.
    406          <p class="note"><strong>Note:</strong> If your app uses the
    407          {@link #READ_CONTACTS} permission and <em>both</em> your <a
    408          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
    409          minSdkVersion}</a> and <a
    410          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    411          targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
    412          grants your app this permission. If you don't need this permission, be sure your <a
    413          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    414          targetSdkVersion}</a> is 16 or higher.</p> -->
    415     <permission android:name="android.permission.READ_CALL_LOG"
    416         android:permissionGroup="android.permission-group.SOCIAL_INFO"
    417         android:protectionLevel="dangerous"
    418         android:label="@string/permlab_readCallLog"
    419         android:description="@string/permdesc_readCallLog" />
    420 
    421     <!-- Allows an application to write (but not read) the user's
    422          contacts data.
    423          <p class="note"><strong>Note:</strong> If your app uses the
    424          {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
    425          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
    426          minSdkVersion}</a> and <a
    427          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    428          targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
    429          grants your app this permission. If you don't need this permission, be sure your <a
    430          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
    431          targetSdkVersion}</a> is 16 or higher.</p>  -->
    432     <permission android:name="android.permission.WRITE_CALL_LOG"
    433         android:permissionGroup="android.permission-group.SOCIAL_INFO"
    434         android:protectionLevel="dangerous"
    435         android:label="@string/permlab_writeCallLog"
    436         android:description="@string/permdesc_writeCallLog" />
    437 
    438   <!-- Allows an application to read from the user's social stream. -->
    439     <permission android:name="android.permission.READ_SOCIAL_STREAM"
    440         android:permissionGroup="android.permission-group.SOCIAL_INFO"
    441         android:protectionLevel="dangerous"
    442         android:label="@string/permlab_readSocialStream"
    443         android:description="@string/permdesc_readSocialStream" />
    444 
    445     <!-- Allows an application to write (but not read) the user's
    446          social stream data. -->
    447     <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
    448         android:permissionGroup="android.permission-group.SOCIAL_INFO"
    449         android:protectionLevel="dangerous"
    450         android:label="@string/permlab_writeSocialStream"
    451         android:description="@string/permdesc_writeSocialStream" />
    452 
    453     <!-- =============================================================== -->
    454     <!-- Permissions for accessing information about the device owner    -->
    455     <!-- =============================================================== -->
    456     <eat-comment />
    457 
    458     <!-- Used for permissions that provide access to information about the device
    459          user such as profile information.  This includes both reading and
    460          writing of this data (which should generally be expressed as two
    461          distinct permissions). -->
    462     <permission-group android:name="android.permission-group.PERSONAL_INFO"
    463         android:label="@string/permgrouplab_personalInfo"
    464         android:icon="@drawable/perm_group_personal_info"
    465         android:description="@string/permgroupdesc_personalInfo"
    466         android:permissionGroupFlags="personalInfo"
    467         android:priority="310" />
    468 
    469     <!-- Allows an application to read the user's personal profile data. -->
    470     <permission android:name="android.permission.READ_PROFILE"
    471         android:permissionGroup="android.permission-group.PERSONAL_INFO"
    472         android:protectionLevel="dangerous"
    473         android:label="@string/permlab_readProfile"
    474         android:description="@string/permdesc_readProfile" />
    475 
    476     <!-- Allows an application to write (but not read) the user's
    477          personal profile data. -->
    478     <permission android:name="android.permission.WRITE_PROFILE"
    479         android:permissionGroup="android.permission-group.PERSONAL_INFO"
    480         android:protectionLevel="dangerous"
    481         android:label="@string/permlab_writeProfile"
    482         android:description="@string/permdesc_writeProfile" />
    483 
    484     <!-- =============================================================== -->
    485     <!-- Permissions for accessing the device calendar                   -->
    486     <!-- =============================================================== -->
    487     <eat-comment />
    488 
    489     <!-- Used for permissions that provide access to the device
    490          calendar to create / view events.-->
    491     <permission-group android:name="android.permission-group.CALENDAR"
    492         android:label="@string/permgrouplab_calendar"
    493         android:icon="@drawable/perm_group_calendar"
    494         android:description="@string/permgroupdesc_calendar"
    495         android:permissionGroupFlags="personalInfo"
    496         android:priority="290" />
    497 
    498     <!-- Allows an application to read the user's calendar data. -->
    499     <permission android:name="android.permission.READ_CALENDAR"
    500         android:permissionGroup="android.permission-group.PERSONAL_INFO"
    501         android:protectionLevel="dangerous"
    502         android:label="@string/permlab_readCalendar"
    503         android:description="@string/permdesc_readCalendar" />
    504 
    505     <!-- Allows an application to write (but not read) the user's
    506          calendar data. -->
    507     <permission android:name="android.permission.WRITE_CALENDAR"
    508         android:permissionGroup="android.permission-group.PERSONAL_INFO"
    509         android:protectionLevel="dangerous"
    510         android:label="@string/permlab_writeCalendar"
    511         android:description="@string/permdesc_writeCalendar" />
    512 
    513     <!-- =============================================================== -->
    514     <!-- Permissions for accessing the user dictionary-->
    515     <!-- =============================================================== -->
    516     <eat-comment />
    517 
    518     <!-- Used for permissions that provide access to the user
    519          calendar to create / view events.-->
    520     <permission-group android:name="android.permission-group.USER_DICTIONARY"
    521         android:label="@string/permgrouplab_dictionary"
    522         android:icon="@drawable/perm_group_user_dictionary"
    523         android:description="@string/permgroupdesc_dictionary"
    524         android:permissionGroupFlags="personalInfo"
    525         android:priority="170" />
    526 
    527     <!-- Allows an application to read the user dictionary. This should
    528          really only be required by an IME, or a dictionary editor like
    529          the Settings app. -->
    530     <permission android:name="android.permission.READ_USER_DICTIONARY"
    531         android:permissionGroup="android.permission-group.USER_DICTIONARY"
    532         android:protectionLevel="dangerous"
    533         android:label="@string/permlab_readDictionary"
    534         android:description="@string/permdesc_readDictionary" />
    535 
    536     <!-- Used for permissions that provide access to the user
    537          calendar to create / view events.-->
    538     <permission-group android:name="android.permission-group.WRITE_USER_DICTIONARY"
    539         android:label="@string/permgrouplab_writeDictionary"
    540         android:icon="@drawable/perm_group_user_dictionary_write"
    541         android:description="@string/permgroupdesc_writeDictionary"
    542         android:priority="160" />
    543 
    544     <!-- Allows an application to write to the user dictionary. -->
    545     <permission android:name="android.permission.WRITE_USER_DICTIONARY"
    546         android:permissionGroup="android.permission-group.WRITE_USER_DICTIONARY"
    547         android:protectionLevel="normal"
    548         android:label="@string/permlab_writeDictionary"
    549         android:description="@string/permdesc_writeDictionary" />
    550 
    551     <!-- =============================================================== -->
    552     <!-- Permissions for accessing the user bookmarks                    -->
    553     <!-- =============================================================== -->
    554     <eat-comment />
    555 
    556     <!-- Used for permissions that provide access to the user
    557          bookmarks and browser history.-->
    558     <permission-group android:name="android.permission-group.BOOKMARKS"
    559         android:label="@string/permgrouplab_bookmarks"
    560         android:icon="@drawable/perm_group_bookmarks"
    561         android:description="@string/permgroupdesc_bookmarks"
    562         android:permissionGroupFlags="personalInfo"
    563         android:priority="300" />
    564 
    565     <!-- Allows an application to read (but not write) the user's
    566         browsing history and bookmarks. -->
    567     <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
    568         android:permissionGroup="android.permission-group.BOOKMARKS"
    569         android:label="@string/permlab_readHistoryBookmarks"
    570         android:description="@string/permdesc_readHistoryBookmarks"
    571         android:protectionLevel="dangerous" />
    572 
    573     <!-- Allows an application to write (but not read) the user's
    574         browsing history and bookmarks. -->
    575     <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
    576         android:permissionGroup="android.permission-group.BOOKMARKS"
    577         android:label="@string/permlab_writeHistoryBookmarks"
    578         android:description="@string/permdesc_writeHistoryBookmarks"
    579         android:protectionLevel="dangerous" />
    580 
    581     <!-- =============================================================== -->
    582     <!-- Permissions for setting the device alarm                        -->
    583     <!-- =============================================================== -->
    584     <eat-comment />
    585 
    586     <!-- Used for permissions that provide access to the user voicemail box. -->
    587     <permission-group android:name="android.permission-group.DEVICE_ALARMS"
    588         android:label="@string/permgrouplab_deviceAlarms"
    589         android:icon="@drawable/perm_group_device_alarms"
    590         android:description="@string/permgroupdesc_deviceAlarms"
    591         android:permissionGroupFlags="personalInfo"
    592         android:priority="210" />
    593 
    594     <!-- Allows an application to broadcast an Intent to set an alarm for the
    595          user. -->
    596     <permission android:name="com.android.alarm.permission.SET_ALARM"
    597         android:permissionGroup="android.permission-group.DEVICE_ALARMS"
    598         android:label="@string/permlab_setAlarm"
    599         android:description="@string/permdesc_setAlarm"
    600         android:protectionLevel="normal" />
    601 
    602     <!-- =============================================================== -->
    603     <!-- Permissions for accessing the user voicemail                    -->
    604     <!-- =============================================================== -->
    605     <eat-comment />
    606 
    607     <!-- Used for permissions that provide access to the user voicemail box. -->
    608     <permission-group android:name="android.permission-group.VOICEMAIL"
    609         android:label="@string/permgrouplab_voicemail"
    610         android:icon="@drawable/perm_group_voicemail"
    611         android:description="@string/permgroupdesc_voicemail"
    612         android:permissionGroupFlags="personalInfo"
    613         android:priority="280" />
    614 
    615    <!-- Allows an application to add voicemails into the system. -->
    616     <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
    617         android:permissionGroup="android.permission-group.VOICEMAIL"
    618         android:protectionLevel="dangerous"
    619         android:label="@string/permlab_addVoicemail"
    620         android:description="@string/permdesc_addVoicemail" />
    621 
    622     <!-- =============================================== -->
    623     <!-- Permissions for enabling accessibility features -->
    624     <!-- =============================================== -->
    625     <eat-comment />
    626 
    627     <!-- Used for permissions that allow requesting certain accessibility features. -->
    628     <permission-group android:name="android.permission-group.ACCESSIBILITY_FEATURES"
    629         android:label="@string/permgrouplab_accessibilityFeatures"
    630         android:icon="@drawable/perm_group_accessibility_features"
    631         android:description="@string/permgroupdesc_accessibilityFeatures"
    632         android:priority="380" />
    633 
    634     <!-- ======================================= -->
    635     <!-- Permissions for accessing location info -->
    636     <!-- ======================================= -->
    637     <eat-comment />
    638 
    639     <!-- Used for permissions that allow access to the user's current
    640          location. -->
    641     <permission-group android:name="android.permission-group.LOCATION"
    642         android:label="@string/permgrouplab_location"
    643         android:icon="@drawable/perm_group_location"
    644         android:description="@string/permgroupdesc_location"
    645         android:permissionGroupFlags="personalInfo"
    646         android:priority="330" />
    647 
    648     <!-- Allows an app to access precise location from location sources such
    649          as GPS, cell towers, and Wi-Fi. -->
    650     <permission android:name="android.permission.ACCESS_FINE_LOCATION"
    651         android:permissionGroup="android.permission-group.LOCATION"
    652         android:protectionLevel="dangerous"
    653         android:label="@string/permlab_accessFineLocation"
    654         android:description="@string/permdesc_accessFineLocation" />
    655 
    656     <!-- Allows an app to access approximate location derived from network location
    657          sources such as cell towers and Wi-Fi. -->
    658     <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
    659         android:permissionGroup="android.permission-group.LOCATION"
    660         android:protectionLevel="dangerous"
    661         android:label="@string/permlab_accessCoarseLocation"
    662         android:description="@string/permdesc_accessCoarseLocation" />
    663 
    664     <!-- Allows an application to create mock location providers for testing -->
    665     <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
    666         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
    667         android:protectionLevel="dangerous"
    668         android:label="@string/permlab_accessMockLocation"
    669         android:description="@string/permdesc_accessMockLocation" />
    670 
    671     <!-- Allows an application to access extra location provider commands -->
    672     <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
    673         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
    674         android:protectionLevel="normal"
    675         android:label="@string/permlab_accessLocationExtraCommands"
    676         android:description="@string/permdesc_accessLocationExtraCommands" />
    677 
    678     <!-- Allows an application to install a location provider into the Location Manager.
    679     <p>Not for use by third-party applications. -->
    680     <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
    681         android:protectionLevel="signature|system"
    682         android:label="@string/permlab_installLocationProvider"
    683         android:description="@string/permdesc_installLocationProvider" />
    684 
    685     <!-- Allows an application to use location features in hardware,
    686          such as the geofencing api.
    687          <p>Not for use by third-party applications. -->
    688     <permission android:name="android.permission.LOCATION_HARDWARE"
    689         android:permissionGroup="android.permission-group.LOCATION"
    690         android:protectionLevel="signature|system" />
    691     <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
    692 
    693     <!-- ======================================= -->
    694     <!-- Permissions for accessing networks -->
    695     <!-- ======================================= -->
    696     <eat-comment />
    697 
    698     <!-- Used for permissions that provide access to networking services.  The
    699          main permission here is internet access, but this is also an
    700          appropriate group for accessing or modifying any network configuration
    701          or other related network operations. -->
    702     <permission-group android:name="android.permission-group.NETWORK"
    703         android:label="@string/permgrouplab_network"
    704         android:icon="@drawable/perm_group_network"
    705         android:description="@string/permgroupdesc_network"
    706         android:priority="270" />
    707 
    708     <!-- Allows applications to open network sockets. -->
    709     <permission android:name="android.permission.INTERNET"
    710         android:permissionGroup="android.permission-group.NETWORK"
    711         android:protectionLevel="dangerous"
    712         android:description="@string/permdesc_createNetworkSockets"
    713         android:label="@string/permlab_createNetworkSockets" />
    714 
    715     <!-- Allows applications to access information about networks -->
    716     <permission android:name="android.permission.ACCESS_NETWORK_STATE"
    717         android:permissionGroup="android.permission-group.NETWORK"
    718         android:protectionLevel="normal"
    719         android:description="@string/permdesc_accessNetworkState"
    720         android:label="@string/permlab_accessNetworkState" />
    721 
    722     <!-- Allows applications to access information about Wi-Fi networks -->
    723     <permission android:name="android.permission.ACCESS_WIFI_STATE"
    724         android:permissionGroup="android.permission-group.NETWORK"
    725         android:protectionLevel="normal"
    726         android:description="@string/permdesc_accessWifiState"
    727         android:label="@string/permlab_accessWifiState" />
    728 
    729     <!-- Allows applications to change Wi-Fi connectivity state -->
    730     <permission android:name="android.permission.CHANGE_WIFI_STATE"
    731         android:permissionGroup="android.permission-group.NETWORK"
    732         android:protectionLevel="dangerous"
    733         android:description="@string/permdesc_changeWifiState"
    734         android:label="@string/permlab_changeWifiState" />
    735 
    736     <!-- @hide -->
    737     <permission android:name="android.permission.ACCESS_WIMAX_STATE"
    738         android:permissionGroup="android.permission-group.NETWORK"
    739         android:protectionLevel="normal"
    740         android:description="@string/permdesc_accessWimaxState"
    741         android:label="@string/permlab_accessWimaxState" />
    742 
    743     <!-- @hide -->
    744     <permission android:name="android.permission.CHANGE_WIMAX_STATE"
    745         android:permissionGroup="android.permission-group.NETWORK"
    746         android:protectionLevel="dangerous"
    747         android:description="@string/permdesc_changeWimaxState"
    748         android:label="@string/permlab_changeWimaxState" />
    749 
    750     <!-- ======================================= -->
    751     <!-- Permissions for short range, peripheral networks -->
    752     <!-- ======================================= -->
    753     <eat-comment />
    754 
    755     <!-- Used for permissions that provide access to other devices through Bluetooth.-->
    756     <permission-group android:name="android.permission-group.BLUETOOTH_NETWORK"
    757         android:label="@string/permgrouplab_bluetoothNetwork"
    758         android:icon="@drawable/perm_group_bluetooth"
    759         android:description="@string/permgroupdesc_bluetoothNetwork"
    760         android:priority="260" />
    761 
    762     <!-- Allows applications to connect to paired bluetooth devices -->
    763     <permission android:name="android.permission.BLUETOOTH"
    764         android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
    765         android:protectionLevel="dangerous"
    766         android:description="@string/permdesc_bluetooth"
    767         android:label="@string/permlab_bluetooth" />
    768 
    769     <!-- Allows applications to discover and pair bluetooth devices -->
    770     <permission android:name="android.permission.BLUETOOTH_ADMIN"
    771         android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
    772         android:protectionLevel="dangerous"
    773         android:description="@string/permdesc_bluetoothAdmin"
    774         android:label="@string/permlab_bluetoothAdmin" />
    775 
    776     <!-- Allows applications to pair bluetooth devices without user interaction.
    777          This is not available to third party applications. -->
    778     <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
    779         android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
    780         android:protectionLevel="system|signature"
    781         android:description="@string/permdesc_bluetoothPriv"
    782         android:label="@string/permlab_bluetoothPriv" />
    783 
    784     <!-- Allows bluetooth stack to access files
    785          @hide This should only be used by Bluetooth apk.
    786     -->
    787     <permission android:name="android.permission.BLUETOOTH_STACK"
    788         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
    789         android:protectionLevel="signature" />
    790 
    791     <!-- Allows applications to perform I/O operations over NFC -->
    792     <permission android:name="android.permission.NFC"
    793         android:permissionGroup="android.permission-group.NETWORK"
    794         android:protectionLevel="dangerous"
    795         android:description="@string/permdesc_nfc"
    796         android:label="@string/permlab_nfc" />
    797 
    798     <!-- Allows an internal user to use privileged ConnectivityManager APIs.
    799         @hide -->
    800     <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
    801         android:permissionGroup="android.permission-group.NETWORK"
    802         android:protectionLevel="signature|system" />
    803 
    804     <!-- @hide -->
    805     <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
    806         android:permissionGroup="android.permission-group.NETWORK"
    807         android:protectionLevel="signature|system" />
    808 
    809     <!-- Allows access to the loop radio (Android@Home mesh network) device.
    810 	@hide -->
    811     <permission android:name="android.permission.LOOP_RADIO"
    812 	android:permissionGroup="android.permission-group.NETWORK"
    813 	android:protectionLevel="signature|system" />
    814 
    815     <!-- ================================== -->
    816     <!-- Permissions for accessing accounts -->
    817     <!-- ================================== -->
    818     <eat-comment />
    819 
    820     <!-- Permissions for direct access to the accounts managed
    821          by the Account Manager. -->
    822     <permission-group android:name="android.permission-group.ACCOUNTS"
    823         android:label="@string/permgrouplab_accounts"
    824         android:icon="@drawable/perm_group_accounts"
    825         android:description="@string/permgroupdesc_accounts"
    826         android:permissionGroupFlags="personalInfo"
    827         android:priority="200" />
    828 
    829     <!-- Allows access to the list of accounts in the Accounts Service -->
    830     <permission android:name="android.permission.GET_ACCOUNTS"
    831         android:permissionGroup="android.permission-group.ACCOUNTS"
    832         android:protectionLevel="normal"
    833         android:description="@string/permdesc_getAccounts"
    834         android:label="@string/permlab_getAccounts" />
    835 
    836     <!-- Allows an application to act as an AccountAuthenticator for
    837          the AccountManager -->
    838     <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
    839         android:permissionGroup="android.permission-group.ACCOUNTS"
    840         android:protectionLevel="dangerous"
    841         android:label="@string/permlab_authenticateAccounts"
    842         android:description="@string/permdesc_authenticateAccounts" />
    843 
    844     <!-- Allows an application to request authtokens from the AccountManager -->
    845     <permission android:name="android.permission.USE_CREDENTIALS"
    846         android:permissionGroup="android.permission-group.ACCOUNTS"
    847         android:protectionLevel="dangerous"
    848         android:label="@string/permlab_useCredentials"
    849         android:description="@string/permdesc_useCredentials" />
    850 
    851     <!-- Allows an application to manage the list of accounts in the AccountManager -->
    852     <permission android:name="android.permission.MANAGE_ACCOUNTS"
    853         android:permissionGroup="android.permission-group.ACCOUNTS"
    854         android:protectionLevel="dangerous"
    855         android:label="@string/permlab_manageAccounts"
    856         android:description="@string/permdesc_manageAccounts" />
    857 
    858     <!-- Allows applications to call into AccountAuthenticators.
    859     <p>Not for use by third-party applications. -->
    860     <permission android:name="android.permission.ACCOUNT_MANAGER"
    861         android:permissionGroup="android.permission-group.ACCOUNTS"
    862         android:protectionLevel="signature"
    863         android:description="@string/permdesc_accountManagerService"
    864         android:label="@string/permlab_accountManagerService" />
    865 
    866     <!-- ================================== -->
    867     <!-- Permissions for accessing hardware that may effect battery life-->
    868     <!-- ================================== -->
    869     <eat-comment />
    870 
    871     <!-- Used for permissions that provide direct access to the hardware on
    872          the device that has an effect on battery life.  This includes vibrator,
    873          flashlight,  etc. -->
    874 
    875     <permission-group android:name="android.permission-group.AFFECTS_BATTERY"
    876         android:label="@string/permgrouplab_affectsBattery"
    877         android:icon="@drawable/perm_group_affects_battery"
    878         android:description="@string/permgroupdesc_affectsBattery"
    879         android:priority="180" />
    880 
    881     <!-- Allows applications to enter Wi-Fi Multicast mode -->
    882     <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
    883         android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
    884         android:protectionLevel="dangerous"
    885         android:description="@string/permdesc_changeWifiMulticastState"
    886         android:label="@string/permlab_changeWifiMulticastState" />
    887 
    888     <!-- Allows access to the vibrator -->
    889     <permission android:name="android.permission.VIBRATE"
    890         android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
    891         android:protectionLevel="normal"
    892         android:label="@string/permlab_vibrate"
    893         android:description="@string/permdesc_vibrate" />
    894 
    895     <!-- Allows access to the flashlight -->
    896     <permission android:name="android.permission.FLASHLIGHT"
    897         android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
    898         android:protectionLevel="normal"
    899         android:label="@string/permlab_flashlight"
    900         android:description="@string/permdesc_flashlight" />
    901 
    902     <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
    903          from dimming -->
    904     <permission android:name="android.permission.WAKE_LOCK"
    905         android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
    906         android:protectionLevel="normal"
    907         android:label="@string/permlab_wakeLock"
    908         android:description="@string/permdesc_wakeLock" />
    909 
    910     <!-- Allows using the device's IR transmitter, if available -->
    911     <permission android:name="android.permission.TRANSMIT_IR"
    912         android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
    913         android:protectionLevel="normal"
    914         android:label="@string/permlab_transmitIr"
    915         android:description="@string/permdesc_transmitIr" />
    916 
    917     <!-- ==================================================== -->
    918     <!-- Permissions related to changing audio settings   -->
    919     <!-- ==================================================== -->
    920     <eat-comment />
    921 
    922     <!-- Used for permissions that provide direct access to speaker settings
    923          the device. -->
    924     <permission-group android:name="android.permission-group.AUDIO_SETTINGS"
    925         android:label="@string/permgrouplab_audioSettings"
    926         android:icon="@drawable/perm_group_audio_settings"
    927         android:description="@string/permgroupdesc_audioSettings"
    928         android:priority="130" />
    929 
    930     <!-- Allows an application to modify global audio settings -->
    931     <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
    932         android:permissionGroup="android.permission-group.AUDIO_SETTINGS"
    933         android:protectionLevel="normal"
    934         android:label="@string/permlab_modifyAudioSettings"
    935         android:description="@string/permdesc_modifyAudioSettings" />
    936 
    937     <!-- ================================== -->
    938     <!-- Permissions for accessing hardware -->
    939     <!-- ================================== -->
    940     <eat-comment />
    941 
    942     <!-- Used for permissions that provide direct access to the hardware on
    943          the device.  This includes audio, the camera, vibrator, etc. -->
    944     <permission-group android:name="android.permission-group.HARDWARE_CONTROLS"
    945         android:label="@string/permgrouplab_hardwareControls"
    946         android:description="@string/permgroupdesc_hardwareControls"
    947         android:priority="260"/>
    948 
    949     <!-- Allows an application to manage preferences and permissions for USB devices
    950          @hide -->
    951     <permission android:name="android.permission.MANAGE_USB"
    952         android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
    953         android:protectionLevel="signature|system"
    954         android:label="@string/permlab_manageUsb"
    955         android:description="@string/permdesc_manageUsb" />
    956 
    957     <!-- Allows an application to access the MTP USB kernel driver.
    958          For use only by the device side MTP implementation.
    959          @hide -->
    960     <permission android:name="android.permission.ACCESS_MTP"
    961         android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
    962         android:protectionLevel="signature|system"
    963         android:label="@string/permlab_accessMtp"
    964         android:description="@string/permdesc_accessMtp" />
    965 
    966     <!-- Allows access to hardware peripherals.  Intended only for hardware testing.
    967     <p>Not for use by third-party applications. -->
    968     <permission android:name="android.permission.HARDWARE_TEST"
    969         android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
    970         android:protectionLevel="signature"
    971         android:label="@string/permlab_hardware_test"
    972         android:description="@string/permdesc_hardware_test" />
    973 
    974     <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
    975          @hide -->
    976     <permission android:name="android.permission.NET_ADMIN"
    977         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
    978         android:protectionLevel="signature" />
    979 
    980     <!-- Allows registration for remote audio playback. @hide -->
    981     <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
    982         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
    983         android:protectionLevel="signature" />
    984 
    985     <!-- =========================================== -->
    986     <!-- Permissions associated with audio capture -->
    987     <!-- =========================================== -->
    988     <eat-comment />
    989 
    990     <!-- Used for permissions that are associated with accessing
    991          microphone audio from the device. Note that phone calls also capture audio
    992          but are in a separate (more visible) permission group. -->
    993     <permission-group android:name="android.permission-group.MICROPHONE"
    994         android:label="@string/permgrouplab_microphone"
    995         android:icon="@drawable/perm_group_microphone"
    996         android:description="@string/permgroupdesc_microphone"
    997         android:permissionGroupFlags="personalInfo"
    998         android:priority="340" />
    999 
   1000     <!-- Allows an application to record audio -->
   1001     <permission android:name="android.permission.RECORD_AUDIO"
   1002         android:permissionGroup="android.permission-group.MICROPHONE"
   1003         android:protectionLevel="dangerous"
   1004         android:label="@string/permlab_recordAudio"
   1005         android:description="@string/permdesc_recordAudio" />
   1006 
   1007 
   1008     <!-- =========================================== -->
   1009     <!-- Permissions associated with camera and image capture -->
   1010     <!-- =========================================== -->
   1011     <eat-comment />
   1012 
   1013     <!-- Used for permissions that are associated with accessing
   1014          camera or capturing images/video from the device. -->
   1015     <permission-group android:name="android.permission-group.CAMERA"
   1016         android:label="@string/permgrouplab_camera"
   1017         android:icon="@drawable/perm_group_camera"
   1018         android:description="@string/permgroupdesc_camera"
   1019         android:permissionGroupFlags="personalInfo"
   1020         android:priority="350" />
   1021 
   1022     <!-- Required to be able to access the camera device.
   1023          <p>This will automatically enforce the <a
   1024          href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code
   1025          &lt;uses-feature&gt;}</a> manifest element for <em>all</em> camera features.
   1026          If you do not require all camera features or can properly operate if a camera
   1027          is not available, then you must modify your manifest as appropriate in order to
   1028          install on devices that don't support all camera features.</p> -->
   1029     <permission android:name="android.permission.CAMERA"
   1030         android:permissionGroup="android.permission-group.CAMERA"
   1031         android:protectionLevel="dangerous"
   1032         android:label="@string/permlab_camera"
   1033         android:description="@string/permdesc_camera" />
   1034 
   1035     <!-- Allows disabling the transmit-indicator LED that is normally on when
   1036          a camera is in use by an application.
   1037          @hide -->
   1038     <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
   1039         android:permissionGroup="android.permission-group.CAMERA"
   1040         android:protectionLevel="signature|system"
   1041         android:label="@string/permlab_cameraDisableTransmitLed"
   1042         android:description="@string/permdesc_cameraDisableTransmitLed" />
   1043 
   1044     <!-- =========================================== -->
   1045     <!-- Permissions associated with telephony state -->
   1046     <!-- =========================================== -->
   1047     <eat-comment />
   1048 
   1049     <!-- Used for permissions that are associated with accessing and modifyign
   1050          telephony state: placing calls, intercepting outgoing calls, reading
   1051          and modifying the phone state. -->
   1052     <permission-group android:name="android.permission-group.PHONE_CALLS"
   1053         android:label="@string/permgrouplab_phoneCalls"
   1054         android:icon="@drawable/perm_group_phone_calls"
   1055         android:description="@string/permgroupdesc_phoneCalls"
   1056         android:permissionGroupFlags="personalInfo"
   1057         android:priority="370" />
   1058 
   1059     <!-- Allows an application to see the number being dialed during an outgoing
   1060          call with the option to redirect the call to a different number or
   1061          abort the call altogether. -->
   1062     <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
   1063         android:permissionGroup="android.permission-group.PHONE_CALLS"
   1064         android:protectionLevel="dangerous"
   1065         android:label="@string/permlab_processOutgoingCalls"
   1066         android:description="@string/permdesc_processOutgoingCalls" />
   1067 
   1068     <!-- Allows modification of the telephony state - power on, mmi, etc.
   1069          Does not include placing calls.
   1070          <p>Not for use by third-party applications. -->
   1071     <permission android:name="android.permission.MODIFY_PHONE_STATE"
   1072         android:permissionGroup="android.permission-group.PHONE_CALLS"
   1073         android:protectionLevel="signature|system"
   1074         android:label="@string/permlab_modifyPhoneState"
   1075         android:description="@string/permdesc_modifyPhoneState" />
   1076 
   1077     <!-- Allows read only access to phone state.
   1078          <p class="note"><strong>Note:</strong> If <em>both</em> your <a
   1079          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
   1080          minSdkVersion}</a> and <a
   1081          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
   1082          targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
   1083          grants your app this permission. If you don't need this permission, be sure your <a
   1084          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
   1085          targetSdkVersion}</a> is 4 or higher. -->
   1086     <permission android:name="android.permission.READ_PHONE_STATE"
   1087         android:permissionGroup="android.permission-group.PHONE_CALLS"
   1088         android:protectionLevel="dangerous"
   1089         android:label="@string/permlab_readPhoneState"
   1090         android:description="@string/permdesc_readPhoneState" />
   1091 
   1092     <!-- Allows read access to privileged phone state.
   1093          @hide Used internally. -->
   1094     <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
   1095         android:permissionGroup="android.permission-group.PHONE_CALLS"
   1096         android:protectionLevel="signature|system" />
   1097 
   1098      <!-- Allows an application to initiate a phone call without going through
   1099          the Dialer user interface for the user to confirm the call
   1100          being placed. -->
   1101     <permission android:name="android.permission.CALL_PHONE"
   1102         android:permissionGroup="android.permission-group.PHONE_CALLS"
   1103         android:protectionLevel="dangerous"
   1104         android:permissionFlags="costsMoney"
   1105         android:label="@string/permlab_callPhone"
   1106         android:description="@string/permdesc_callPhone" />
   1107 
   1108     <!-- Allows an application to use SIP service -->
   1109     <permission android:name="android.permission.USE_SIP"
   1110         android:permissionGroup="android.permission-group.PHONE_CALLS"
   1111         android:protectionLevel="dangerous"
   1112         android:description="@string/permdesc_use_sip"
   1113         android:label="@string/permlab_use_sip" />
   1114 
   1115     <!-- Allows an application to request CallHandlerService implementations.
   1116          @hide -->
   1117     <permission android:name="android.permission.BIND_CALL_SERVICE"
   1118         android:permissionGroup="android.permission-group.PHONE_CALLS"
   1119         android:protectionLevel="system|signature"
   1120         android:description="@string/permdesc_bind_call_service"
   1121         android:label="@string/permlab_bind_call_service" />
   1122 
   1123     <!-- ================================== -->
   1124     <!-- Permissions for sdcard interaction -->
   1125     <!-- ================================== -->
   1126     <eat-comment />
   1127 
   1128     <!-- Group of permissions that are related to SD card access. -->
   1129     <permission-group android:name="android.permission-group.STORAGE"
   1130         android:label="@string/permgrouplab_storage"
   1131         android:icon="@drawable/perm_group_storage"
   1132         android:description="@string/permgroupdesc_storage"
   1133         android:permissionGroupFlags="personalInfo"
   1134         android:priority="240" />
   1135 
   1136     <!-- Allows an application to read from external storage.
   1137          <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
   1138          granted this permission.</p>
   1139          <p>This permission is enforced starting in API level 19.  Before API level 19, this
   1140          permission is not enforced and all apps still have access to read from external storage.
   1141          You can test your app with the permission enforced by enabling <em>Protect USB
   1142          storage</em> under Developer options in the Settings app on a device running Android 4.1 or
   1143          higher.</p>
   1144          <p>Also starting in API level 19, this permission is <em>not</em> required to
   1145          read/write files in your application-specific directories returned by
   1146          {@link android.content.Context#getExternalFilesDir} and
   1147          {@link android.content.Context#getExternalCacheDir}.
   1148          <p class="note"><strong>Note:</strong> If <em>both</em> your <a
   1149          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
   1150          minSdkVersion}</a> and <a
   1151          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
   1152          targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
   1153          grants your app this permission. If you don't need this permission, be sure your <a
   1154          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
   1155          targetSdkVersion}</a> is 4 or higher.-->
   1156     <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
   1157         android:permissionGroup="android.permission-group.STORAGE"
   1158         android:label="@string/permlab_sdcardRead"
   1159         android:description="@string/permdesc_sdcardRead"
   1160         android:protectionLevel="normal" />
   1161 
   1162     <!-- Allows an application to write to external storage.
   1163          <p class="note"><strong>Note:</strong> If <em>both</em> your <a
   1164          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
   1165          minSdkVersion}</a> and <a
   1166          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
   1167          targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
   1168          grants your app this permission. If you don't need this permission, be sure your <a
   1169          href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
   1170          targetSdkVersion}</a> is 4 or higher.
   1171          <p>Starting in API level 19, this permission is <em>not</em> required to
   1172          read/write files in your application-specific directories returned by
   1173          {@link android.content.Context#getExternalFilesDir} and
   1174          {@link android.content.Context#getExternalCacheDir}. -->
   1175     <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
   1176         android:permissionGroup="android.permission-group.STORAGE"
   1177         android:label="@string/permlab_sdcardWrite"
   1178         android:description="@string/permdesc_sdcardWrite"
   1179         android:protectionLevel="dangerous" />
   1180 
   1181     <!-- Allows an application to write to internal media storage
   1182          @hide  -->
   1183     <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
   1184         android:permissionGroup="android.permission-group.STORAGE"
   1185         android:label="@string/permlab_mediaStorageWrite"
   1186         android:description="@string/permdesc_mediaStorageWrite"
   1187         android:protectionLevel="signature|system" />
   1188 
   1189     <!-- Allows an application to manage access to documents, usually as part
   1190          of a document picker. -->
   1191     <permission android:name="android.permission.MANAGE_DOCUMENTS"
   1192         android:permissionGroup="android.permission-group.STORAGE"
   1193         android:label="@string/permlab_manageDocs"
   1194         android:description="@string/permdesc_manageDocs"
   1195         android:protectionLevel="signature" />
   1196 
   1197     <!-- ================================== -->
   1198     <!-- Permissions for screenlock         -->
   1199     <!-- ================================== -->
   1200     <eat-comment />
   1201 
   1202     <!-- Group of permissions that are related to the screenlock. -->
   1203     <permission-group android:name="android.permission-group.SCREENLOCK"
   1204         android:label="@string/permgrouplab_screenlock"
   1205         android:icon="@drawable/perm_group_screenlock"
   1206         android:permissionGroupFlags="personalInfo"
   1207         android:description="@string/permgroupdesc_screenlock"
   1208         android:priority="230" />
   1209 
   1210     <!-- Allows applications to disable the keyguard -->
   1211     <permission android:name="android.permission.DISABLE_KEYGUARD"
   1212         android:permissionGroup="android.permission-group.SCREENLOCK"
   1213         android:protectionLevel="dangerous"
   1214         android:description="@string/permdesc_disableKeyguard"
   1215         android:label="@string/permlab_disableKeyguard" />
   1216 
   1217     <!-- ================================== -->
   1218     <!-- Permissions to access other installed applications  -->
   1219     <!-- ================================== -->
   1220     <eat-comment />
   1221 
   1222     <!-- Group of permissions that are related to the other applications
   1223          installed on the system.  Examples include such as listing
   1224          running apps, or killing background processes. -->
   1225     <permission-group android:name="android.permission-group.APP_INFO"
   1226         android:label="@string/permgrouplab_appInfo"
   1227         android:icon="@drawable/perm_group_app_info"
   1228         android:description="@string/permgroupdesc_appInfo"
   1229         android:priority="220" />
   1230 
   1231     <!-- Allows an application to get information about the currently
   1232          or recently running tasks. -->
   1233     <permission android:name="android.permission.GET_TASKS"
   1234         android:permissionGroup="android.permission-group.APP_INFO"
   1235         android:protectionLevel="dangerous"
   1236         android:label="@string/permlab_getTasks"
   1237         android:description="@string/permdesc_getTasks" />
   1238     <!-- @hide Allows an application to call APIs that allow it to do interactions
   1239          across the users on the device, using singleton services and
   1240          user-targeted broadcasts.  This permission is not available to
   1241          third party applications. -->
   1242     <permission android:name="android.permission.INTERACT_ACROSS_USERS"
   1243         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1244         android:protectionLevel="signature|system|development"
   1245         android:label="@string/permlab_interactAcrossUsers"
   1246         android:description="@string/permdesc_interactAcrossUsers" />
   1247 
   1248     <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
   1249          that removes restrictions on where broadcasts can be sent and allows other
   1250          types of interactions. -->
   1251     <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
   1252         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1253         android:protectionLevel="signature"
   1254         android:label="@string/permlab_interactAcrossUsersFull"
   1255         android:description="@string/permdesc_interactAcrossUsersFull" />
   1256 
   1257     <!-- @hide Allows an application to call APIs that allow it to query and manage
   1258          users on the device. This permission is not available to
   1259          third party applications. -->
   1260     <permission android:name="android.permission.MANAGE_USERS"
   1261         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1262         android:protectionLevel="signature|system"
   1263         android:label="@string/permlab_manageUsers"
   1264         android:description="@string/permdesc_manageUsers" />
   1265 
   1266     <!-- Allows an application to get full detailed information about
   1267          recently running tasks, with full fidelity to the real state.
   1268          @hide -->
   1269     <permission android:name="android.permission.GET_DETAILED_TASKS"
   1270         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1271         android:protectionLevel="signature"
   1272         android:label="@string/permlab_getDetailedTasks"
   1273         android:description="@string/permdesc_getDetailedTasks" />
   1274 
   1275     <!-- Allows an application to change the Z-order of tasks -->
   1276     <permission android:name="android.permission.REORDER_TASKS"
   1277         android:permissionGroup="android.permission-group.APP_INFO"
   1278         android:protectionLevel="normal"
   1279         android:label="@string/permlab_reorderTasks"
   1280         android:description="@string/permdesc_reorderTasks" />
   1281 
   1282     <!-- @hide Allows an application to change to remove/kill tasks -->
   1283     <permission android:name="android.permission.REMOVE_TASKS"
   1284         android:permissionGroup="android.permission-group.APP_INFO"
   1285         android:protectionLevel="signature"
   1286         android:label="@string/permlab_removeTasks"
   1287         android:description="@string/permdesc_removeTasks" />
   1288 
   1289     <!-- @hide Allows an application to create/manage/remove stacks -->
   1290     <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
   1291         android:permissionGroup="android.permission-group.APP_INFO"
   1292         android:protectionLevel="signature"
   1293         android:label="@string/permlab_manageActivityStacks"
   1294         android:description="@string/permdesc_manageActivityStacks" />
   1295 
   1296     <!-- Allows an application to start any activity, regardless of permission
   1297          protection or exported state. @hide -->
   1298     <permission android:name="android.permission.START_ANY_ACTIVITY"
   1299         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1300         android:protectionLevel="signature"
   1301         android:label="@string/permlab_startAnyActivity"
   1302         android:description="@string/permdesc_startAnyActivity" />
   1303 
   1304     <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
   1305         API is no longer supported. -->
   1306     <permission android:name="android.permission.RESTART_PACKAGES"
   1307         android:permissionGroup="android.permission-group.APP_INFO"
   1308         android:protectionLevel="normal"
   1309         android:label="@string/permlab_killBackgroundProcesses"
   1310         android:description="@string/permdesc_killBackgroundProcesses" />
   1311 
   1312     <!-- Allows an application to call
   1313         {@link android.app.ActivityManager#killBackgroundProcesses}. -->
   1314     <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
   1315         android:permissionGroup="android.permission-group.APP_INFO"
   1316         android:protectionLevel="normal"
   1317         android:label="@string/permlab_killBackgroundProcesses"
   1318         android:description="@string/permdesc_killBackgroundProcesses" />
   1319 
   1320     <!-- ================================== -->
   1321     <!-- Permissions affecting the display of other applications  -->
   1322     <!-- ================================== -->
   1323     <eat-comment />
   1324 
   1325     <!-- Group of permissions that allow manipulation of how
   1326          another application displays UI to the user. -->
   1327     <permission-group android:name="android.permission-group.DISPLAY"
   1328         android:label="@string/permgrouplab_display"
   1329         android:icon="@drawable/perm_group_display"
   1330         android:description="@string/permgroupdesc_display"
   1331         android:priority="190"/>
   1332 
   1333     <!-- Allows an application to open windows using the type
   1334          {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT},
   1335          shown on top of all other applications.  Very few applications
   1336          should use this permission; these windows are intended for
   1337          system-level interaction with the user. -->
   1338     <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
   1339         android:permissionGroup="android.permission-group.DISPLAY"
   1340         android:protectionLevel="dangerous"
   1341         android:label="@string/permlab_systemAlertWindow"
   1342         android:description="@string/permdesc_systemAlertWindow" />
   1343 
   1344     <!-- ================================== -->
   1345     <!-- Permissions affecting the system wallpaper -->
   1346     <!-- ================================== -->
   1347     <eat-comment />
   1348 
   1349     <!-- Group of permissions that allow manipulation of how
   1350          another application displays UI to the user. -->
   1351     <permission-group android:name="android.permission-group.WALLPAPER"
   1352         android:label="@string/permgrouplab_wallpaper"
   1353         android:icon="@drawable/perm_group_wallpaper"
   1354         android:description="@string/permgroupdesc_wallpaper"
   1355         android:priority="150" />
   1356 
   1357     <!-- Allows applications to set the wallpaper -->
   1358     <permission android:name="android.permission.SET_WALLPAPER"
   1359         android:permissionGroup="android.permission-group.WALLPAPER"
   1360         android:protectionLevel="normal"
   1361         android:label="@string/permlab_setWallpaper"
   1362         android:description="@string/permdesc_setWallpaper" />
   1363 
   1364     <!-- Allows applications to set the wallpaper hints -->
   1365     <permission android:name="android.permission.SET_WALLPAPER_HINTS"
   1366         android:permissionGroup="android.permission-group.WALLPAPER"
   1367         android:protectionLevel="normal"
   1368         android:label="@string/permlab_setWallpaperHints"
   1369         android:description="@string/permdesc_setWallpaperHints" />
   1370 
   1371     <!-- ============================================ -->
   1372     <!-- Permissions for changing the system clock -->
   1373     <!-- ============================================ -->
   1374     <eat-comment />
   1375 
   1376     <!-- Group of permissions that are related to system clock. -->
   1377     <permission-group android:name="android.permission-group.SYSTEM_CLOCK"
   1378         android:label="@string/permgrouplab_systemClock"
   1379         android:icon="@drawable/perm_group_system_clock"
   1380         android:description="@string/permgroupdesc_systemClock"
   1381         android:priority="140" />
   1382 
   1383     <!-- Allows applications to set the system time.
   1384     <p>Not for use by third-party applications. -->
   1385     <permission android:name="android.permission.SET_TIME"
   1386         android:protectionLevel="signature|system"
   1387         android:label="@string/permlab_setTime"
   1388         android:description="@string/permdesc_setTime" />
   1389 
   1390     <!-- Allows applications to set the system time zone -->
   1391     <permission android:name="android.permission.SET_TIME_ZONE"
   1392         android:permissionGroup="android.permission-group.SYSTEM_CLOCK"
   1393         android:protectionLevel="normal"
   1394         android:label="@string/permlab_setTimeZone"
   1395         android:description="@string/permdesc_setTimeZone" />
   1396 
   1397     <!-- ==================================================== -->
   1398     <!-- Permissions related to changing status bar   -->
   1399     <!-- ==================================================== -->
   1400     <eat-comment />
   1401 
   1402     <!-- Used for permissions that change the status bar -->
   1403     <permission-group android:name="android.permission-group.STATUS_BAR"
   1404         android:label="@string/permgrouplab_statusBar"
   1405         android:icon="@drawable/perm_group_status_bar"
   1406         android:description="@string/permgroupdesc_statusBar"
   1407         android:priority="110" />
   1408 
   1409     <!-- Allows an application to expand or collapse the status bar. -->
   1410     <permission android:name="android.permission.EXPAND_STATUS_BAR"
   1411         android:permissionGroup="android.permission-group.STATUS_BAR"
   1412         android:protectionLevel="normal"
   1413         android:label="@string/permlab_expandStatusBar"
   1414         android:description="@string/permdesc_expandStatusBar" />
   1415 
   1416     <!-- ============================================================== -->
   1417     <!-- Permissions related to adding/removing shortcuts from Launcher -->
   1418     <!-- ============================================================== -->
   1419     <eat-comment />
   1420 
   1421     <!-- Allows an application to install a shortcut in Launcher -->
   1422     <permission
   1423         android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
   1424         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1425         android:protectionLevel="dangerous"
   1426         android:label="@string/permlab_install_shortcut"
   1427         android:description="@string/permdesc_install_shortcut" />
   1428 
   1429         <!-- Allows an application to uninstall a shortcut in Launcher -->
   1430     <permission
   1431         android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
   1432         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1433         android:protectionLevel="dangerous"
   1434         android:label="@string/permlab_uninstall_shortcut"
   1435         android:description="@string/permdesc_uninstall_shortcut"/>
   1436 
   1437     <!-- ==================================================== -->
   1438     <!-- Permissions related to accessing sync settings   -->
   1439     <!-- ==================================================== -->
   1440     <eat-comment />
   1441 
   1442     <!-- Used for permissions that access the sync settings or sync
   1443          related information. -->
   1444     <permission-group android:name="android.permission-group.SYNC_SETTINGS"
   1445         android:label="@string/permgrouplab_syncSettings"
   1446         android:icon="@drawable/perm_group_sync_settings"
   1447         android:description="@string/permgroupdesc_syncSettings"
   1448         android:priority="120" />
   1449 
   1450     <!-- Allows applications to read the sync settings -->
   1451     <permission android:name="android.permission.READ_SYNC_SETTINGS"
   1452         android:permissionGroup="android.permission-group.SYNC_SETTINGS"
   1453         android:protectionLevel="normal"
   1454         android:description="@string/permdesc_readSyncSettings"
   1455         android:label="@string/permlab_readSyncSettings" />
   1456 
   1457     <!-- Allows applications to write the sync settings -->
   1458     <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
   1459         android:permissionGroup="android.permission-group.SYNC_SETTINGS"
   1460         android:protectionLevel="normal"
   1461         android:description="@string/permdesc_writeSyncSettings"
   1462         android:label="@string/permlab_writeSyncSettings" />
   1463 
   1464     <!-- Allows applications to read the sync stats -->
   1465     <permission android:name="android.permission.READ_SYNC_STATS"
   1466         android:permissionGroup="android.permission-group.SYNC_SETTINGS"
   1467         android:protectionLevel="normal"
   1468         android:description="@string/permdesc_readSyncStats"
   1469         android:label="@string/permlab_readSyncStats" />
   1470 
   1471 
   1472     <!-- ============================================ -->
   1473     <!-- Permissions for low-level system interaction -->
   1474     <!-- ============================================ -->
   1475     <eat-comment />
   1476 
   1477     <!-- Group of permissions that are related to system APIs.  Many
   1478          of these are not permissions the user will be expected to understand,
   1479          and such permissions should generally be marked as "normal" protection
   1480          level so they don't get displayed.  This can also, however, be used
   1481          for miscellaneous features that provide access to the operating system,
   1482          such as writing the global system settings. -->
   1483     <permission-group android:name="android.permission-group.SYSTEM_TOOLS"
   1484         android:label="@string/permgrouplab_systemTools"
   1485         android:icon="@drawable/perm_group_system_tools"
   1486         android:description="@string/permgroupdesc_systemTools"
   1487         android:priority="100" />
   1488 
   1489     <!-- @hide Change the screen compatibility mode of applications -->
   1490     <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
   1491         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1492         android:protectionLevel="signature"
   1493         android:label="@string/permlab_setScreenCompatibility"
   1494         android:description="@string/permdesc_setScreenCompatibility" />
   1495 
   1496     <!-- Allows an application to access all multi-user external storage @hide -->
   1497     <permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE"
   1498         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
   1499         android:label="@string/permlab_sdcardAccessAll"
   1500         android:description="@string/permdesc_sdcardAccessAll"
   1501         android:protectionLevel="signature" />
   1502 
   1503     <!-- Allows an application to modify the current configuration, such
   1504          as locale. -->
   1505     <permission android:name="android.permission.CHANGE_CONFIGURATION"
   1506         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
   1507         android:protectionLevel="signature|system|development"
   1508         android:label="@string/permlab_changeConfiguration"
   1509         android:description="@string/permdesc_changeConfiguration" />
   1510 
   1511     <!-- Allows an application to read or write the system settings. -->
   1512     <permission android:name="android.permission.WRITE_SETTINGS"
   1513         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1514         android:protectionLevel="normal"
   1515         android:label="@string/permlab_writeSettings"
   1516         android:description="@string/permdesc_writeSettings" />
   1517 
   1518     <!-- Allows an application to modify the Google service map.
   1519     <p>Not for use by third-party applications. -->
   1520     <permission android:name="android.permission.WRITE_GSERVICES"
   1521         android:protectionLevel="signature|system"
   1522         android:label="@string/permlab_writeGservices"
   1523         android:description="@string/permdesc_writeGservices" />
   1524 
   1525     <!-- Allows an application to call
   1526         {@link android.app.ActivityManager#forceStopPackage}.
   1527         @hide -->
   1528     <permission android:name="android.permission.FORCE_STOP_PACKAGES"
   1529         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1530         android:protectionLevel="signature|system"
   1531         android:label="@string/permlab_forceStopPackages"
   1532         android:description="@string/permdesc_forceStopPackages" />
   1533 
   1534     <!-- @hide Allows an application to retrieve the content of the active window
   1535          An active window is the window that has fired an accessibility event. -->
   1536     <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
   1537         android:permissionGroup="android.permission-group.PERSONAL_INFO"
   1538         android:protectionLevel="signature|system"
   1539         android:label="@string/permlab_retrieve_window_content"
   1540         android:description="@string/permdesc_retrieve_window_content" />
   1541 
   1542     <!-- Modify the global animation scaling factor.
   1543     <p>Not for use by third-party applications. -->
   1544     <permission android:name="android.permission.SET_ANIMATION_SCALE"
   1545         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1546         android:protectionLevel="signature|system|development"
   1547         android:label="@string/permlab_setAnimationScale"
   1548         android:description="@string/permdesc_setAnimationScale" />
   1549 
   1550     <!-- @deprecated This functionality will be removed in the future; please do
   1551          not use. Allow an application to make its activities persistent. -->
   1552     <permission android:name="android.permission.PERSISTENT_ACTIVITY"
   1553         android:permissionGroup="android.permission-group.APP_INFO"
   1554         android:protectionLevel="normal"
   1555         android:label="@string/permlab_persistentActivity"
   1556         android:description="@string/permdesc_persistentActivity" />
   1557 
   1558     <!-- Allows an application to find out the space used by any package. -->
   1559     <permission android:name="android.permission.GET_PACKAGE_SIZE"
   1560         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1561         android:protectionLevel="normal"
   1562         android:label="@string/permlab_getPackageSize"
   1563         android:description="@string/permdesc_getPackageSize" />
   1564 
   1565     <!-- @deprecated No longer useful, see
   1566          {@link android.content.pm.PackageManager#addPackageToPreferred}
   1567          for details. -->
   1568     <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
   1569         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1570         android:protectionLevel="signature"
   1571         android:label="@string/permlab_setPreferredApplications"
   1572         android:description="@string/permdesc_setPreferredApplications" />
   1573 
   1574     <!-- Allows an application to receive the
   1575          {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
   1576          broadcast after the system finishes booting.  If you don't
   1577          request this permission, you will not receive the broadcast at
   1578          that time.  Though holding this permission does not have any
   1579          security implications, it can have a negative impact on the
   1580          user experience by increasing the amount of time it takes the
   1581          system to start and allowing applications to have themselves
   1582          running without the user being aware of them.  As such, you must
   1583          explicitly declare your use of this facility to make that visible
   1584          to the user. -->
   1585     <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
   1586         android:permissionGroup="android.permission-group.APP_INFO"
   1587         android:protectionLevel="normal"
   1588         android:label="@string/permlab_receiveBootCompleted"
   1589         android:description="@string/permdesc_receiveBootCompleted" />
   1590 
   1591     <!-- Allows an application to broadcast sticky intents.  These are
   1592          broadcasts whose data is held by the system after being finished,
   1593          so that clients can quickly retrieve that data without having
   1594          to wait for the next broadcast. -->
   1595     <permission android:name="android.permission.BROADCAST_STICKY"
   1596         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1597         android:protectionLevel="normal"
   1598         android:label="@string/permlab_broadcastSticky"
   1599         android:description="@string/permdesc_broadcastSticky" />
   1600 
   1601     <!-- Allows mounting and unmounting file systems for removable storage.
   1602     <p>Not for use by third-party applications.-->
   1603     <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
   1604         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1605         android:protectionLevel="system|signature"
   1606         android:label="@string/permlab_mount_unmount_filesystems"
   1607         android:description="@string/permdesc_mount_unmount_filesystems" />
   1608 
   1609     <!-- Allows formatting file systems for removable storage.
   1610     <p>Not for use by third-party applications. -->
   1611     <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
   1612         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1613         android:protectionLevel="system|signature"
   1614         android:label="@string/permlab_mount_format_filesystems"
   1615         android:description="@string/permdesc_mount_format_filesystems" />
   1616 
   1617     <!-- Allows access to ASEC non-destructive API calls
   1618          @hide  -->
   1619     <permission android:name="android.permission.ASEC_ACCESS"
   1620         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1621         android:protectionLevel="signature"
   1622         android:label="@string/permlab_asec_access"
   1623         android:description="@string/permdesc_asec_access" />
   1624 
   1625     <!-- Allows creation of ASEC volumes
   1626          @hide  -->
   1627     <permission android:name="android.permission.ASEC_CREATE"
   1628         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1629         android:protectionLevel="signature"
   1630         android:label="@string/permlab_asec_create"
   1631         android:description="@string/permdesc_asec_create" />
   1632 
   1633     <!-- Allows destruction of ASEC volumes
   1634          @hide  -->
   1635     <permission android:name="android.permission.ASEC_DESTROY"
   1636         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1637         android:protectionLevel="signature"
   1638         android:label="@string/permlab_asec_destroy"
   1639         android:description="@string/permdesc_asec_destroy" />
   1640 
   1641     <!-- Allows mount / unmount of ASEC volumes
   1642          @hide  -->
   1643     <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
   1644         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1645         android:protectionLevel="signature"
   1646         android:label="@string/permlab_asec_mount_unmount"
   1647         android:description="@string/permdesc_asec_mount_unmount" />
   1648 
   1649     <!-- Allows rename of ASEC volumes
   1650          @hide  -->
   1651     <permission android:name="android.permission.ASEC_RENAME"
   1652         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1653         android:protectionLevel="signature"
   1654         android:label="@string/permlab_asec_rename"
   1655         android:description="@string/permdesc_asec_rename" />
   1656 
   1657     <!-- Allows applications to write the apn settings.
   1658     <p>Not for use by third-party applications. -->
   1659     <permission android:name="android.permission.WRITE_APN_SETTINGS"
   1660                 android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1661                 android:protectionLevel="signature|system"
   1662                 android:description="@string/permdesc_writeApnSettings"
   1663                 android:label="@string/permlab_writeApnSettings" />
   1664 
   1665     <!-- Allows an application to allow access the subscribed feeds
   1666          ContentProvider. -->
   1667     <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
   1668         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1669         android:label="@string/permlab_subscribedFeedsRead"
   1670         android:description="@string/permdesc_subscribedFeedsRead"
   1671         android:protectionLevel="normal" />
   1672     <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
   1673         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1674         android:label="@string/permlab_subscribedFeedsWrite"
   1675         android:description="@string/permdesc_subscribedFeedsWrite"
   1676         android:protectionLevel="dangerous" />
   1677 
   1678     <!-- Allows applications to change network connectivity state -->
   1679     <permission android:name="android.permission.CHANGE_NETWORK_STATE"
   1680         android:permissionGroup="android.permission-group.NETWORK"
   1681         android:protectionLevel="normal"
   1682         android:description="@string/permdesc_changeNetworkState"
   1683         android:label="@string/permlab_changeNetworkState" />
   1684 
   1685     <!-- Allows an application to clear the caches of all installed
   1686          applications on the device.  -->
   1687     <permission android:name="android.permission.CLEAR_APP_CACHE"
   1688         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1689         android:protectionLevel="dangerous"
   1690         android:label="@string/permlab_clearAppCache"
   1691         android:description="@string/permdesc_clearAppCache" />
   1692 
   1693     <!-- Allows an application to use any media decoder when decoding for playback
   1694          @hide -->
   1695     <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
   1696         android:protectionLevel="signature|system"
   1697         android:label="@string/permlab_anyCodecForPlayback"
   1698         android:description="@string/permdesc_anyCodecForPlayback" />
   1699 
   1700     <!-- Allows an application to install and/or uninstall CA certificates on
   1701          behalf of the user.
   1702          @hide -->
   1703     <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
   1704         android:protectionLevel="signature|system"
   1705         android:label="@string/permlab_manageCaCertificates"
   1706         android:description="@string/permdesc_manageCaCertificates" />
   1707 
   1708     <!-- ========================================= -->
   1709     <!-- Permissions for special development tools -->
   1710     <!-- ========================================= -->
   1711     <eat-comment />
   1712 
   1713     <!-- Group of permissions that are related to development features.  These
   1714          are not permissions that should appear in third-party applications; they
   1715          protect APIs that are intended only to be used for development
   1716          purposes. -->
   1717     <permission-group android:name="android.permission-group.DEVELOPMENT_TOOLS"
   1718         android:label="@string/permgrouplab_developmentTools"
   1719         android:description="@string/permgroupdesc_developmentTools"
   1720         android:priority="310" />
   1721 
   1722     <!-- Allows an application to read or write the secure system settings.
   1723     <p>Not for use by third-party applications. -->
   1724     <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
   1725         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
   1726         android:protectionLevel="signature|system|development"
   1727         android:label="@string/permlab_writeSecureSettings"
   1728         android:description="@string/permdesc_writeSecureSettings" />
   1729 
   1730     <!-- Allows an application to retrieve state dump information from system services.
   1731     <p>Not for use by third-party applications. -->
   1732     <permission android:name="android.permission.DUMP"
   1733         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
   1734         android:protectionLevel="signature|system|development"
   1735         android:label="@string/permlab_dump"
   1736         android:description="@string/permdesc_dump" />
   1737 
   1738     <!-- Allows an application to read the low-level system log files.
   1739     <p>Not for use by third-party applications, because
   1740     Log entries can contain the user's private information. -->
   1741     <permission android:name="android.permission.READ_LOGS"
   1742         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
   1743         android:protectionLevel="signature|system|development"
   1744         android:label="@string/permlab_readLogs"
   1745         android:description="@string/permdesc_readLogs" />
   1746 
   1747     <!-- Configure an application for debugging.
   1748     <p>Not for use by third-party applications. -->
   1749     <permission android:name="android.permission.SET_DEBUG_APP"
   1750         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
   1751         android:protectionLevel="signature|system|development"
   1752         android:label="@string/permlab_setDebugApp"
   1753         android:description="@string/permdesc_setDebugApp" />
   1754 
   1755     <!-- Allows an application to set the maximum number of (not needed)
   1756          application processes that can be running.
   1757          <p>Not for use by third-party applications. -->
   1758     <permission android:name="android.permission.SET_PROCESS_LIMIT"
   1759         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
   1760         android:protectionLevel="signature|system|development"
   1761         android:label="@string/permlab_setProcessLimit"
   1762         android:description="@string/permdesc_setProcessLimit" />
   1763 
   1764     <!-- Allows an application to control whether activities are immediately
   1765          finished when put in the background.
   1766          <p>Not for use by third-party applications. -->
   1767     <permission android:name="android.permission.SET_ALWAYS_FINISH"
   1768         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
   1769         android:protectionLevel="signature|system|development"
   1770         android:label="@string/permlab_setAlwaysFinish"
   1771         android:description="@string/permdesc_setAlwaysFinish" />
   1772 
   1773     <!-- Allow an application to request that a signal be sent to all persistent processes.
   1774     <p>Not for use by third-party applications. -->
   1775     <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
   1776         android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
   1777         android:protectionLevel="signature|system|development"
   1778         android:label="@string/permlab_signalPersistentProcesses"
   1779         android:description="@string/permdesc_signalPersistentProcesses" />
   1780 
   1781     <!-- ==================================== -->
   1782     <!-- Private (signature-only) permissions -->
   1783     <!-- ==================================== -->
   1784     <eat-comment />
   1785 
   1786     <!-- Allows applications to RW to diagnostic resources.
   1787     <p>Not for use by third-party applications. -->
   1788     <permission android:name="android.permission.DIAGNOSTIC"
   1789         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1790         android:protectionLevel="signature"
   1791         android:description="@string/permdesc_diagnostic"
   1792         android:label="@string/permlab_diagnostic" />
   1793 
   1794     <!-- Allows an application to open, close, or disable the status bar
   1795          and its icons.
   1796          <p>Not for use by third-party applications. -->
   1797     <permission android:name="android.permission.STATUS_BAR"
   1798         android:label="@string/permlab_statusBar"
   1799         android:description="@string/permdesc_statusBar"
   1800         android:protectionLevel="signature|system" />
   1801 
   1802     <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
   1803     @hide -->
   1804     <permission android:name="android.permission.STATUS_BAR_SERVICE"
   1805         android:label="@string/permlab_statusBarService"
   1806         android:description="@string/permdesc_statusBarService"
   1807         android:protectionLevel="signature" />
   1808 
   1809     <!-- Allows an application to force a BACK operation on whatever is the
   1810          top activity.
   1811          <p>Not for use by third-party applications. -->
   1812     <permission android:name="android.permission.FORCE_BACK"
   1813         android:label="@string/permlab_forceBack"
   1814         android:description="@string/permdesc_forceBack"
   1815         android:protectionLevel="signature" />
   1816 
   1817     <!-- Allows an application to update device statistics.
   1818     <p>Not for use by third-party applications. -->
   1819     <permission android:name="android.permission.UPDATE_DEVICE_STATS"
   1820         android:label="@string/permlab_updateBatteryStats"
   1821         android:description="@string/permdesc_updateBatteryStats"
   1822         android:protectionLevel="signature|system" />
   1823 
   1824     <!-- @hide Allows an application to collect battery statistics -->
   1825     <permission android:name="android.permission.GET_APP_OPS_STATS"
   1826         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   1827         android:label="@string/permlab_getAppOpsStats"
   1828         android:description="@string/permdesc_getAppOpsStats"
   1829         android:protectionLevel="signature|system|development" />
   1830 
   1831     <!-- Allows an application to update application operation statistics. Not for
   1832          use by third party apps. @hide -->
   1833     <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
   1834         android:label="@string/permlab_updateAppOpsStats"
   1835         android:description="@string/permdesc_updateAppOpsStats"
   1836         android:protectionLevel="signature|system" />
   1837 
   1838     <!-- Allows an application to open windows that are for use by parts
   1839          of the system user interface.
   1840          <p>Not for use by third-party applications. -->
   1841     <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
   1842         android:label="@string/permlab_internalSystemWindow"
   1843         android:description="@string/permdesc_internalSystemWindow"
   1844         android:protectionLevel="signature" />
   1845 
   1846     <!-- Allows an application to manage (create, destroy,
   1847          Z-order) application tokens in the window manager.
   1848          <p>Not for use by third-party applications. -->
   1849     <permission android:name="android.permission.MANAGE_APP_TOKENS"
   1850         android:label="@string/permlab_manageAppTokens"
   1851         android:description="@string/permdesc_manageAppTokens"
   1852         android:protectionLevel="signature" />
   1853 
   1854     <!-- @hide Allows the application to temporarily freeze the screen for a
   1855          full-screen transition. -->
   1856     <permission android:name="android.permission.FREEZE_SCREEN"
   1857         android:label="@string/permlab_freezeScreen"
   1858         android:description="@string/permdesc_freezeScreen"
   1859         android:protectionLevel="signature" />
   1860 
   1861     <!-- Allows an application to inject user events (keys, touch, trackball)
   1862          into the event stream and deliver them to ANY window.  Without this
   1863          permission, you can only deliver events to windows in your own process.
   1864          <p>Not for use by third-party applications. -->
   1865     <permission android:name="android.permission.INJECT_EVENTS"
   1866         android:label="@string/permlab_injectEvents"
   1867         android:description="@string/permdesc_injectEvents"
   1868         android:protectionLevel="signature" />
   1869 
   1870     <!-- @hide Allows an application to register an input filter which filters the stream
   1871          of user events (keys, touch, trackball) before they are dispatched to any window. -->
   1872     <permission android:name="android.permission.FILTER_EVENTS"
   1873         android:label="@string/permlab_filter_events"
   1874         android:description="@string/permdesc_filter_events"
   1875         android:protectionLevel="signature" />
   1876 
   1877     <!-- @hide Allows an application to retrieve info for a window from the window manager. -->
   1878     <permission android:name="android.permission.RETRIEVE_WINDOW_INFO"
   1879         android:label="@string/permlab_retrieve_window_info"
   1880         android:description="@string/permdesc_retrieve_window_info"
   1881         android:protectionLevel="signature" />
   1882 
   1883     <!-- @hide Allows an application to temporary enable accessibility on the device. -->
   1884     <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
   1885         android:label="@string/permlab_temporary_enable_accessibility"
   1886         android:description="@string/permdesc_temporary_enable_accessibility"
   1887         android:protectionLevel="signature" />
   1888 
   1889     <!-- @hide Allows an application to magnify the content of a display. -->
   1890     <permission android:name="android.permission.MAGNIFY_DISPLAY"
   1891         android:label="@string/permlab_magnify_display"
   1892         android:description="@string/permdesc_magnify_display"
   1893         android:protectionLevel="signature" />
   1894 
   1895     <!-- Allows an application to watch and control how activities are
   1896          started globally in the system.  Only for is in debugging
   1897          (usually the monkey command).
   1898          <p>Not for use by third-party applications. -->
   1899     <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
   1900         android:label="@string/permlab_runSetActivityWatcher"
   1901         android:description="@string/permdesc_runSetActivityWatcher"
   1902         android:protectionLevel="signature" />
   1903 
   1904     <!-- Allows an application to call the activity manager shutdown() API
   1905          to put the higher-level system there into a shutdown state.
   1906          @hide -->
   1907     <permission android:name="android.permission.SHUTDOWN"
   1908         android:label="@string/permlab_shutdown"
   1909         android:description="@string/permdesc_shutdown"
   1910         android:protectionLevel="signature|system" />
   1911 
   1912     <!-- Allows an application to tell the activity manager to temporarily
   1913          stop application switches, putting it into a special mode that
   1914          prevents applications from immediately switching away from some
   1915          critical UI such as the home screen.
   1916          @hide -->
   1917     <permission android:name="android.permission.STOP_APP_SWITCHES"
   1918         android:label="@string/permlab_stopAppSwitches"
   1919         android:description="@string/permdesc_stopAppSwitches"
   1920         android:protectionLevel="signature|system" />
   1921 
   1922     <!-- Allows an application to retrieve private information about
   1923          the current top activity, such as any assist context it can provide.
   1924          <p>Not for use by third-party applications. -->
   1925     <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
   1926         android:label="@string/permlab_getTopActivityInfo"
   1927         android:description="@string/permdesc_getTopActivityInfo"
   1928         android:protectionLevel="signature" />
   1929 
   1930     <!-- Allows an application to retrieve the current state of keys and
   1931          switches.
   1932          <p>Not for use by third-party applications.
   1933          @deprecated The API that used this permission has been removed. -->
   1934     <permission android:name="android.permission.READ_INPUT_STATE"
   1935         android:label="@string/permlab_readInputState"
   1936         android:description="@string/permdesc_readInputState"
   1937         android:protectionLevel="signature" />
   1938 
   1939     <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
   1940          to ensure that only the system can bind to it. -->
   1941     <permission android:name="android.permission.BIND_INPUT_METHOD"
   1942         android:label="@string/permlab_bindInputMethod"
   1943         android:description="@string/permdesc_bindInputMethod"
   1944         android:protectionLevel="signature" />
   1945 
   1946     <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
   1947          to ensure that only the system can bind to it. -->
   1948     <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
   1949         android:label="@string/permlab_bindAccessibilityService"
   1950         android:description="@string/permdesc_bindAccessibilityService"
   1951         android:protectionLevel="signature" />
   1952 
   1953     <!-- Must be required by a {@link android.printservice.PrintService},
   1954          to ensure that only the system can bind to it. -->
   1955     <permission android:name="android.permission.BIND_PRINT_SERVICE"
   1956         android:label="@string/permlab_bindPrintService"
   1957         android:description="@string/permdesc_bindPrintService"
   1958         android:protectionLevel="signature" />
   1959 
   1960     <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
   1961          or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
   1962          the system can bind to it. -->
   1963     <permission android:name="android.permission.BIND_NFC_SERVICE"
   1964         android:label="@string/permlab_bindNfcService"
   1965         android:description="@string/permdesc_bindNfcService"
   1966         android:protectionLevel="signature" />
   1967 
   1968     <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
   1969          @hide -->
   1970     <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
   1971         android:label="@string/permlab_bindPrintSpoolerService"
   1972         android:description="@string/permdesc_bindPrintSpoolerService"
   1973         android:protectionLevel="signature" />
   1974 
   1975     <!-- Must be required by a TextService (e.g. SpellCheckerService)
   1976          to ensure that only the system can bind to it. -->
   1977     <permission android:name="android.permission.BIND_TEXT_SERVICE"
   1978         android:label="@string/permlab_bindTextService"
   1979         android:description="@string/permdesc_bindTextService"
   1980         android:protectionLevel="signature" />
   1981 
   1982     <!-- Must be required by a {@link android.net.VpnService},
   1983          to ensure that only the system can bind to it. -->
   1984     <permission android:name="android.permission.BIND_VPN_SERVICE"
   1985         android:label="@string/permlab_bindVpnService"
   1986         android:description="@string/permdesc_bindVpnService"
   1987         android:protectionLevel="signature" />
   1988 
   1989     <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
   1990          to ensure that only the system can bind to it. -->
   1991     <permission android:name="android.permission.BIND_WALLPAPER"
   1992         android:label="@string/permlab_bindWallpaper"
   1993         android:description="@string/permdesc_bindWallpaper"
   1994         android:protectionLevel="signature|system" />
   1995 
   1996     <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
   1997          to ensure that only the system can bind to it.
   1998          @hide -->
   1999     <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
   2000         android:label="@string/permlab_bindRemoteDisplay"
   2001         android:description="@string/permdesc_bindRemoteDisplay"
   2002         android:protectionLevel="signature" />
   2003 
   2004     <!-- Must be required by device administration receiver, to ensure that only the
   2005          system can interact with it. -->
   2006     <permission android:name="android.permission.BIND_DEVICE_ADMIN"
   2007         android:label="@string/permlab_bindDeviceAdmin"
   2008         android:description="@string/permdesc_bindDeviceAdmin"
   2009         android:protectionLevel="signature" />
   2010 
   2011     <!-- Required to add or remove another application as a device admin.
   2012          <p>Not for use by third-party applications.
   2013          @hide -->
   2014     <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
   2015         android:label="@string/permlab_manageDeviceAdmins"
   2016         android:description="@string/permdesc_manageDeviceAdmins"
   2017         android:protectionLevel="signature|system" />
   2018 
   2019     <!-- Allows low-level access to setting the orientation (actually
   2020          rotation) of the screen.
   2021          <p>Not for use by third-party applications. -->
   2022     <permission android:name="android.permission.SET_ORIENTATION"
   2023         android:label="@string/permlab_setOrientation"
   2024         android:description="@string/permdesc_setOrientation"
   2025         android:protectionLevel="signature" />
   2026 
   2027     <!-- Allows low-level access to setting the pointer speed.
   2028          <p>Not for use by third-party applications. -->
   2029     <permission android:name="android.permission.SET_POINTER_SPEED"
   2030         android:label="@string/permlab_setPointerSpeed"
   2031         android:description="@string/permdesc_setPointerSpeed"
   2032         android:protectionLevel="signature" />
   2033 
   2034     <!-- Allows low-level access to setting the keyboard layout.
   2035          <p>Not for use by third-party applications.
   2036          @hide -->
   2037     <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
   2038         android:label="@string/permlab_setKeyboardLayout"
   2039         android:description="@string/permdesc_setKeyboardLayout"
   2040         android:protectionLevel="signature" />
   2041 
   2042     <!-- Allows an application to install packages.
   2043     <p>Not for use by third-party applications. -->
   2044     <permission android:name="android.permission.INSTALL_PACKAGES"
   2045         android:label="@string/permlab_installPackages"
   2046         android:description="@string/permdesc_installPackages"
   2047         android:protectionLevel="signature|system" />
   2048 
   2049     <!-- Allows an application to clear user data.
   2050     <p>Not for use by third-party applications. -->
   2051     <permission android:name="android.permission.CLEAR_APP_USER_DATA"
   2052         android:label="@string/permlab_clearAppUserData"
   2053         android:description="@string/permdesc_clearAppUserData"
   2054         android:protectionLevel="signature" />
   2055 
   2056     <!-- Allows an application to delete cache files.
   2057     <p>Not for use by third-party applications. -->
   2058     <permission android:name="android.permission.DELETE_CACHE_FILES"
   2059         android:label="@string/permlab_deleteCacheFiles"
   2060         android:description="@string/permdesc_deleteCacheFiles"
   2061         android:protectionLevel="signature|system" />
   2062 
   2063     <!-- Allows an application to delete packages.
   2064     <p>Not for use by third-party applications. -->
   2065     <permission android:name="android.permission.DELETE_PACKAGES"
   2066         android:label="@string/permlab_deletePackages"
   2067         android:description="@string/permdesc_deletePackages"
   2068         android:protectionLevel="signature|system" />
   2069 
   2070     <!-- Allows an application to move location of installed package.
   2071          @hide -->
   2072     <permission android:name="android.permission.MOVE_PACKAGE"
   2073         android:label="@string/permlab_movePackage"
   2074         android:description="@string/permdesc_movePackage"
   2075         android:protectionLevel="signature|system" />
   2076 
   2077     <!-- Allows an application to change whether an application component (other than its own) is
   2078          enabled or not.
   2079          <p>Not for use by third-party applications. -->
   2080     <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
   2081         android:label="@string/permlab_changeComponentState"
   2082         android:description="@string/permdesc_changeComponentState"
   2083         android:protectionLevel="signature|system" />
   2084 
   2085     <!-- @hide Allows an application to grant or revoke specific permissions. -->
   2086     <permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS"
   2087         android:label="@string/permlab_grantRevokePermissions"
   2088         android:description="@string/permdesc_grantRevokePermissions"
   2089         android:protectionLevel="signature" />
   2090 
   2091     <!-- Allows an application to use SurfaceFlinger's low level features.
   2092     <p>Not for use by third-party applications. -->
   2093     <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
   2094         android:label="@string/permlab_accessSurfaceFlinger"
   2095         android:description="@string/permdesc_accessSurfaceFlinger"
   2096         android:protectionLevel="signature" />
   2097 
   2098     <!-- Allows an application to take screen shots and more generally
   2099          get access to the frame buffer data.
   2100          <p>Not for use by third-party applications. -->
   2101     <permission android:name="android.permission.READ_FRAME_BUFFER"
   2102         android:label="@string/permlab_readFrameBuffer"
   2103         android:description="@string/permdesc_readFrameBuffer"
   2104         android:protectionLevel="signature|system" />
   2105 
   2106     <!-- Allows an application to configure and connect to Wifi displays
   2107          @hide -->
   2108     <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
   2109         android:label="@string/permlab_configureWifiDisplay"
   2110         android:description="@string/permdesc_configureWifiDisplay"
   2111         android:protectionLevel="signature" />
   2112 
   2113     <!-- Allows an application to control low-level features of Wifi displays
   2114          such as opening an RTSP socket.  This permission should only be used
   2115          by the display manager.
   2116          @hide -->
   2117     <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
   2118         android:label="@string/permlab_controlWifiDisplay"
   2119         android:description="@string/permdesc_controlWifiDisplay"
   2120         android:protectionLevel="signature" />
   2121 
   2122     <!-- Allows an application to capture audio output.
   2123          <p>Not for use by third-party applications.</p> -->
   2124     <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
   2125         android:label="@string/permlab_captureAudioOutput"
   2126         android:description="@string/permdesc_captureAudioOutput"
   2127         android:protectionLevel="signature|system" />
   2128 
   2129     <!-- Allows an application to capture audio for hotword detection.
   2130          <p>Not for use by third-party applications.</p>
   2131          @hide -->
   2132     <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
   2133         android:label="@string/permlab_captureAudioHotword"
   2134         android:description="@string/permdesc_captureAudioHotword"
   2135         android:protectionLevel="signature|system" />
   2136 
   2137     <!-- Allows an application to capture video output.
   2138          <p>Not for use by third-party applications.</p> -->
   2139     <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
   2140         android:label="@string/permlab_captureVideoOutput"
   2141         android:description="@string/permdesc_captureVideoOutput"
   2142         android:protectionLevel="signature|system" />
   2143 
   2144     <!-- Allows an application to capture secure video output.
   2145          <p>Not for use by third-party applications.</p> -->
   2146     <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
   2147         android:label="@string/permlab_captureSecureVideoOutput"
   2148         android:description="@string/permdesc_captureSecureVideoOutput"
   2149         android:protectionLevel="signature|system" />
   2150 
   2151     <!-- Allows an application to know what content is playing and control its playback.
   2152          <p>Not for use by third-party applications due to privacy of media consumption</p>  -->
   2153     <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
   2154         android:label="@string/permlab_mediaContentControl"
   2155         android:description="@string/permdesc_mediaContentControl"
   2156         android:protectionLevel="signature|system" />
   2157 
   2158     <!-- Required to be able to disable the device (very dangerous!).
   2159     <p>Not for use by third-party applications.. -->
   2160     <permission android:name="android.permission.BRICK"
   2161         android:label="@string/permlab_brick"
   2162         android:description="@string/permdesc_brick"
   2163         android:protectionLevel="signature" />
   2164 
   2165     <!-- Required to be able to reboot the device.
   2166     <p>Not for use by third-party applications. -->
   2167     <permission android:name="android.permission.REBOOT"
   2168         android:label="@string/permlab_reboot"
   2169         android:description="@string/permdesc_reboot"
   2170         android:protectionLevel="signature|system" />
   2171 
   2172    <!-- Allows low-level access to power management.
   2173    <p>Not for use by third-party applications. -->
   2174     <permission android:name="android.permission.DEVICE_POWER"
   2175         android:label="@string/permlab_devicePower"
   2176         android:description="@string/permdesc_devicePower"
   2177         android:protectionLevel="signature" />
   2178 
   2179    <!-- @hide Allows low-level access to tun tap driver -->
   2180     <permission android:name="android.permission.NET_TUNNELING"
   2181         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   2182         android:protectionLevel="signature" />
   2183 
   2184     <!-- Run as a manufacturer test application, running as the root user.
   2185          Only available when the device is running in manufacturer test mode.
   2186          <p>Not for use by third-party applications. -->
   2187     <permission android:name="android.permission.FACTORY_TEST"
   2188         android:label="@string/permlab_factoryTest"
   2189         android:description="@string/permdesc_factoryTest"
   2190         android:protectionLevel="signature" />
   2191 
   2192     <!-- Allows an application to broadcast a notification that an application
   2193          package has been removed.
   2194          <p>Not for use by third-party applications. -->
   2195     <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
   2196         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   2197         android:label="@string/permlab_broadcastPackageRemoved"
   2198         android:description="@string/permdesc_broadcastPackageRemoved"
   2199         android:protectionLevel="signature" />
   2200 
   2201     <!-- Allows an application to broadcast an SMS receipt notification.
   2202     <p>Not for use by third-party applications. -->
   2203     <permission android:name="android.permission.BROADCAST_SMS"
   2204         android:permissionGroup="android.permission-group.MESSAGES"
   2205         android:label="@string/permlab_broadcastSmsReceived"
   2206         android:description="@string/permdesc_broadcastSmsReceived"
   2207         android:protectionLevel="signature" />
   2208 
   2209     <!-- Allows an application to broadcast a WAP PUSH receipt notification.
   2210     <p>Not for use by third-party applications. -->
   2211     <permission android:name="android.permission.BROADCAST_WAP_PUSH"
   2212         android:permissionGroup="android.permission-group.MESSAGES"
   2213         android:label="@string/permlab_broadcastWapPush"
   2214         android:description="@string/permdesc_broadcastWapPush"
   2215         android:protectionLevel="signature" />
   2216 
   2217     <!-- Not for use by third-party applications. -->
   2218     <permission android:name="android.permission.MASTER_CLEAR"
   2219         android:label="@string/permlab_masterClear"
   2220         android:description="@string/permdesc_masterClear"
   2221         android:protectionLevel="signature|system" />
   2222 
   2223     <!-- Allows an application to call any phone number, including emergency
   2224          numbers, without going through the Dialer user interface for the user
   2225          to confirm the call being placed.
   2226          <p>Not for use by third-party applications. -->
   2227     <permission android:name="android.permission.CALL_PRIVILEGED"
   2228         android:label="@string/permlab_callPrivileged"
   2229         android:description="@string/permdesc_callPrivileged"
   2230         android:protectionLevel="signature|system" />
   2231 
   2232     <!-- Allows an application to perform CDMA OTA provisioning @hide -->
   2233     <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
   2234         android:label="@string/permlab_performCdmaProvisioning"
   2235         android:description="@string/permdesc_performCdmaProvisioning"
   2236         android:protectionLevel="signature|system" />
   2237 
   2238     <!-- Allows enabling/disabling location update notifications from
   2239          the radio.
   2240          <p>Not for use by third-party applications. -->
   2241     <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
   2242         android:label="@string/permlab_locationUpdates"
   2243         android:description="@string/permdesc_locationUpdates"
   2244         android:protectionLevel="signature|system" />
   2245 
   2246     <!-- Allows read/write access to the "properties" table in the checkin
   2247          database, to change values that get uploaded.
   2248          <p>Not for use by third-party applications. -->
   2249     <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
   2250         android:label="@string/permlab_checkinProperties"
   2251         android:description="@string/permdesc_checkinProperties"
   2252         android:protectionLevel="signature|system" />
   2253 
   2254     <!-- Allows an application to collect component usage
   2255          statistics @hide -->
   2256     <permission android:name="android.permission.PACKAGE_USAGE_STATS"
   2257         android:label="@string/permlab_pkgUsageStats"
   2258         android:description="@string/permdesc_pkgUsageStats"
   2259         android:protectionLevel="signature|system" />
   2260 
   2261     <!-- Allows an application to collect battery statistics -->
   2262     <permission android:name="android.permission.BATTERY_STATS"
   2263         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   2264         android:label="@string/permlab_batteryStats"
   2265         android:description="@string/permdesc_batteryStats"
   2266         android:protectionLevel="signature|system" />
   2267 
   2268     <!-- Allows an application to control the backup and restore process.
   2269     <p>Not for use by third-party applications.
   2270          @hide pending API council -->
   2271     <permission android:name="android.permission.BACKUP"
   2272         android:label="@string/permlab_backup"
   2273         android:description="@string/permdesc_backup"
   2274         android:protectionLevel="signature|system" />
   2275 
   2276     <!-- Allows a package to launch the secure full-backup confirmation UI.
   2277          ONLY the system process may hold this permission.
   2278          @hide -->
   2279     <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
   2280         android:label="@string/permlab_confirm_full_backup"
   2281         android:description="@string/permdesc_confirm_full_backup"
   2282         android:protectionLevel="signature" />
   2283 
   2284     <!-- Must be required by a {@link android.widget.RemoteViewsService},
   2285          to ensure that only the system can bind to it. -->
   2286     <permission android:name="android.permission.BIND_REMOTEVIEWS"
   2287         android:label="@string/permlab_bindRemoteViews"
   2288         android:description="@string/permdesc_bindRemoteViews"
   2289         android:protectionLevel="signature|system" />
   2290 
   2291     <!-- Allows an application to tell the AppWidget service which application
   2292          can access AppWidget's data.  The normal user flow is that a user
   2293          picks an AppWidget to go into a particular host, thereby giving that
   2294          host application access to the private data from the AppWidget app.
   2295          An application that has this permission should honor that contract.
   2296          <p>Not for use by third-party applications. -->
   2297     <permission android:name="android.permission.BIND_APPWIDGET"
   2298         android:permissionGroup="android.permission-group.PERSONAL_INFO"
   2299         android:label="@string/permlab_bindGadget"
   2300         android:description="@string/permdesc_bindGadget"
   2301         android:protectionLevel="signature|system" />
   2302 
   2303     <!-- Private permission, to restrict who can bring up a dialog to add a new
   2304          keyguard widget
   2305          @hide -->
   2306     <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
   2307         android:permissionGroup="android.permission-group.PERSONAL_INFO"
   2308         android:protectionLevel="signature|system" />
   2309 
   2310     <!-- Internal permission allowing an application to query/set which
   2311          applications can bind AppWidgets.
   2312          @hide -->
   2313     <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
   2314         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   2315         android:protectionLevel="signature|system" />
   2316 
   2317     <!-- Allows applications to change the background data setting.
   2318     <p>Not for use by third-party applications.
   2319          @hide pending API council -->
   2320     <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
   2321         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   2322         android:protectionLevel="signature"
   2323         android:description="@string/permdesc_changeBackgroundDataSetting"
   2324         android:label="@string/permlab_changeBackgroundDataSetting" />
   2325 
   2326     <!-- This permission can be used on content providers to allow the global
   2327          search system to access their data.  Typically it used when the
   2328          provider has some permissions protecting it (which global search
   2329          would not be expected to hold), and added as a read-only permission
   2330          to the path in the provider where global search queries are
   2331          performed.  This permission can not be held by regular applications;
   2332          it is used by applications to protect themselves from everyone else
   2333          besides global search. -->
   2334     <permission android:name="android.permission.GLOBAL_SEARCH"
   2335         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   2336         android:protectionLevel="signature|system" />
   2337 
   2338     <!-- Internal permission protecting access to the global search
   2339          system: ensures that only the system can access the provider
   2340          to perform queries (since this otherwise provides unrestricted
   2341          access to a variety of content providers), and to write the
   2342          search statistics (to keep applications from gaming the source
   2343          ranking).
   2344          @hide -->
   2345     <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
   2346         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   2347         android:protectionLevel="signature" />
   2348 
   2349     <!-- Allows applications to set a live wallpaper.
   2350          @hide XXX Change to signature once the picker is moved to its
   2351          own apk as Ghod Intended. -->
   2352     <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
   2353         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   2354         android:protectionLevel="signature|system" />
   2355 
   2356     <!-- Allows applications to read dream settings and dream state.
   2357          @hide -->
   2358     <permission android:name="android.permission.READ_DREAM_STATE"
   2359         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   2360         android:protectionLevel="signature" />
   2361 
   2362     <!-- Allows applications to write dream settings, and start or stop dreaming.
   2363          @hide -->
   2364     <permission android:name="android.permission.WRITE_DREAM_STATE"
   2365         android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
   2366         android:protectionLevel="signature" />
   2367 
   2368     <!-- Allow an application to read and write the cache partition.
   2369          @hide -->
   2370     <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
   2371         android:label="@string/permlab_cache_filesystem"
   2372         android:description="@string/permdesc_cache_filesystem"
   2373         android:protectionLevel="signature|system" />
   2374 
   2375     <!-- Must be required by default container service so that only
   2376          the system can bind to it and use it to copy
   2377          protected data to secure containers or files
   2378          accessible to the system.
   2379          @hide -->
   2380     <permission android:name="android.permission.COPY_PROTECTED_DATA"
   2381         android:label="@string/permlab_copyProtectedData"
   2382         android:description="@string/permlab_copyProtectedData"
   2383         android:protectionLevel="signature" />
   2384 
   2385     <!-- Internal permission protecting access to the encryption methods
   2386         @hide
   2387     -->
   2388     <permission android:name="android.permission.CRYPT_KEEPER"
   2389         android:protectionLevel="signature|system" />
   2390 
   2391     <!-- Allows an application to read historical network usage for
   2392          specific networks and applications. @hide -->
   2393     <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
   2394         android:label="@string/permlab_readNetworkUsageHistory"
   2395         android:description="@string/permdesc_readNetworkUsageHistory"
   2396         android:protectionLevel="signature|system" />
   2397 
   2398     <!-- Allows an application to manage network policies (such as warning and disable
   2399          limits) and to define application-specific rules. @hide -->
   2400     <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
   2401         android:label="@string/permlab_manageNetworkPolicy"
   2402         android:description="@string/permdesc_manageNetworkPolicy"
   2403         android:protectionLevel="signature" />
   2404 
   2405     <!-- Allows an application to account its network traffic against other UIDs. Used
   2406          by system services like download manager and media server. Not for use by
   2407          third party apps. @hide -->
   2408     <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
   2409         android:label="@string/permlab_modifyNetworkAccounting"
   2410         android:description="@string/permdesc_modifyNetworkAccounting"
   2411         android:protectionLevel="signature|system" />
   2412 
   2413     <!-- Allows an application to mark traffic as from another user for per user routing.
   2414          Used by system wide services like media server that execute delegated network connections
   2415          for users.
   2416          @hide
   2417     -->
   2418     <permission android:name="android.permission.MARK_NETWORK_SOCKET"
   2419         android:label="@string/permlab_markNetworkSocket"
   2420         android:description="@string/permdesc_markNetworkSocket"
   2421         android:protectionLevel="signature|system" />
   2422 
   2423     <!-- C2DM permission.
   2424          @hide Used internally.
   2425      -->
   2426     <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
   2427           android:protectionLevel="signature" />
   2428     <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
   2429 
   2430     <!-- @hide Package verifier needs to have this permission before the PackageManager will
   2431          trust it to verify packages.
   2432     -->
   2433     <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
   2434         android:label="@string/permlab_packageVerificationAgent"
   2435         android:description="@string/permdesc_packageVerificationAgent"
   2436         android:protectionLevel="signature|system" />
   2437 
   2438     <!-- Must be required by package verifier receiver, to ensure that only the
   2439          system can interact with it.
   2440          @hide
   2441     -->
   2442     <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
   2443         android:label="@string/permlab_bindPackageVerifier"
   2444         android:description="@string/permdesc_bindPackageVerifier"
   2445         android:protectionLevel="signature" />
   2446 
   2447     <!-- Allows applications to access serial ports via the SerialManager.
   2448          @hide -->
   2449     <permission android:name="android.permission.SERIAL_PORT"
   2450         android:label="@string/permlab_serialPort"
   2451         android:description="@string/permdesc_serialPort"
   2452         android:protectionLevel="signature|system" />
   2453 
   2454     <!-- Allows the holder to access content providers from outside an ApplicationThread.
   2455          This permission is enforced by the ActivityManagerService on the corresponding APIs,
   2456          in particular ActivityManagerService#getContentProviderExternal(String) and
   2457          ActivityManagerService#removeContentProviderExternal(String).
   2458          @hide
   2459     -->
   2460     <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
   2461         android:label="@string/permlab_accessContentProvidersExternally"
   2462         android:description="@string/permdesc_accessContentProvidersExternally"
   2463         android:protectionLevel="signature" />
   2464     <!-- Allows an application to hold an UpdateLock, recommending that a headless
   2465          OTA reboot *not* occur while the lock is held.
   2466          @hide -->
   2467     <permission android:name="android.permission.UPDATE_LOCK"
   2468         android:label="@string/permlab_updateLock"
   2469         android:description="@string/permdesc_updateLock"
   2470         android:protectionLevel="signatureOrSystem" />
   2471 
   2472     <!-- Allows an application to read the current set of notifications, including
   2473          any metadata and intents attached.
   2474          @hide -->
   2475     <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
   2476         android:label="@string/permlab_accessNotifications"
   2477         android:description="@string/permdesc_accessNotifications"
   2478         android:protectionLevel="signature|system" />
   2479 
   2480     <!-- Allows access to keyguard secure storage.  Only allowed for system processes.
   2481         @hide -->
   2482     <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
   2483         android:protectionLevel="signature"
   2484         android:label="@string/permlab_access_keyguard_secure_storage"
   2485         android:description="@string/permdesc_access_keyguard_secure_storage" />
   2486 
   2487     <!-- Allows an application to control keyguard.  Only allowed for system processes.
   2488         @hide -->
   2489     <permission android:name="android.permission.CONTROL_KEYGUARD"
   2490         android:protectionLevel="signature"
   2491         android:label="@string/permlab_control_keyguard"
   2492         android:description="@string/permdesc_control_keyguard" />
   2493 
   2494     <!-- Must be required by an {@link
   2495          android.service.notification.NotificationListenerService},
   2496          to ensure that only the system can bind to it. -->
   2497     <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
   2498         android:label="@string/permlab_bindNotificationListenerService"
   2499         android:description="@string/permdesc_bindNotificationListenerService"
   2500         android:protectionLevel="signature" />
   2501 
   2502     <!-- Allows an application to call into a carrier setup flow. It is up to the
   2503          carrier setup application to enforce that this permission is required
   2504          @hide This is not a third-party API (intended for OEMs and system apps). -->
   2505     <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
   2506         android:label="@string/permlab_invokeCarrierSetup"
   2507         android:description="@string/permdesc_invokeCarrierSetup"
   2508         android:protectionLevel="signature|system" />
   2509 
   2510     <!-- Allows an application to listen for network condition observations.
   2511          @hide This is not a third-party API (intended for system apps). -->
   2512     <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
   2513         android:label="@string/permlab_accessNetworkConditions"
   2514         android:description="@string/permdesc_accessNetworkConditions"
   2515         android:protectionLevel="signature|system" />
   2516 
   2517     <!-- The system process is explicitly the only one allowed to launch the
   2518          confirmation UI for full backup/restore -->
   2519     <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
   2520 
   2521     <application android:process="system"
   2522                  android:persistent="true"
   2523                  android:hasCode="false"
   2524                  android:label="@string/android_system_label"
   2525                  android:allowClearUserData="false"
   2526                  android:backupAgent="com.android.server.SystemBackupAgent"
   2527                  android:killAfterRestore="false"
   2528                  android:icon="@drawable/ic_launcher_android"
   2529                  android:supportsRtl="true">
   2530         <activity android:name="com.android.internal.app.ChooserActivity"
   2531                 android:theme="@style/Theme.Holo.Dialog.Alert"
   2532                 android:finishOnCloseSystemDialogs="true"
   2533                 android:excludeFromRecents="true"
   2534                 android:multiprocess="true">
   2535             <intent-filter>
   2536                 <action android:name="android.intent.action.CHOOSER" />
   2537                 <category android:name="android.intent.category.DEFAULT" />
   2538             </intent-filter>
   2539         </activity>
   2540         <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
   2541                 android:theme="@style/Theme.Holo.Dialog"
   2542                 android:label="@string/heavy_weight_switcher_title"
   2543                 android:finishOnCloseSystemDialogs="true"
   2544                 android:excludeFromRecents="true"
   2545                 android:process=":ui">
   2546         </activity>
   2547         <activity android:name="com.android.internal.app.PlatLogoActivity"
   2548                 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
   2549                 android:process=":ui">
   2550         </activity>
   2551         <activity android:name="com.android.internal.app.DisableCarModeActivity"
   2552                 android:theme="@style/Theme.NoDisplay"
   2553                 android:excludeFromRecents="true"
   2554                 android:process=":ui">
   2555         </activity>
   2556 
   2557         <activity android:name="android.accounts.ChooseAccountActivity"
   2558                 android:excludeFromRecents="true"
   2559                 android:exported="true"
   2560                 android:theme="@android:style/Theme.Holo.Dialog"
   2561                 android:label="@string/choose_account_label"
   2562                 android:process=":ui">
   2563         </activity>
   2564 
   2565         <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
   2566                 android:excludeFromRecents="true"
   2567                 android:exported="true"
   2568                 android:theme="@android:style/Theme.Holo.Dialog"
   2569                 android:label="@string/choose_account_label"
   2570                 android:process=":ui">
   2571         </activity>
   2572 
   2573         <activity android:name="android.accounts.ChooseAccountTypeActivity"
   2574                 android:excludeFromRecents="true"
   2575                 android:theme="@android:style/Theme.Holo.Dialog"
   2576                 android:label="@string/choose_account_label"
   2577                 android:process=":ui">
   2578         </activity>
   2579 
   2580         <activity android:name="android.accounts.CantAddAccountActivity"
   2581                 android:excludeFromRecents="true"
   2582                 android:exported="true"
   2583                 android:theme="@android:style/Theme.Holo.Dialog.NoActionBar"
   2584                 android:process=":ui">
   2585         </activity>
   2586 
   2587         <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
   2588                 android:excludeFromRecents="true"
   2589                 android:exported="true"
   2590                 android:theme="@android:style/Theme.Holo.DialogWhenLarge"
   2591                 android:process=":ui">
   2592         </activity>
   2593 
   2594         <activity android:name="android.content.SyncActivityTooManyDeletes"
   2595                android:theme="@android:style/Theme.Holo.Dialog"
   2596                android:label="@string/sync_too_many_deletes"
   2597                android:process=":ui">
   2598         </activity>
   2599 
   2600         <activity android:name="com.android.server.ShutdownActivity"
   2601             android:permission="android.permission.SHUTDOWN"
   2602             android:excludeFromRecents="true">
   2603             <intent-filter>
   2604                 <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" />
   2605                 <category android:name="android.intent.category.DEFAULT" />
   2606             </intent-filter>
   2607             <intent-filter>
   2608                 <action android:name="android.intent.action.REBOOT" />
   2609                 <category android:name="android.intent.category.DEFAULT" />
   2610             </intent-filter>
   2611         </activity>
   2612 
   2613         <activity android:name="com.android.internal.app.NetInitiatedActivity"
   2614                 android:theme="@style/Theme.Holo.Dialog.Alert"
   2615                 android:excludeFromRecents="true"
   2616                 android:process=":ui">
   2617         </activity>
   2618 
   2619         <activity android:name="com.android.internal.app.RestrictionsPinActivity"
   2620                 android:theme="@style/Theme.Holo.Dialog.Alert"
   2621                 android:excludeFromRecents="true"
   2622                 android:windowSoftInputMode="adjustPan"
   2623                 android:process=":ui">
   2624             <intent-filter android:priority="100">
   2625                 <action android:name="android.intent.action.RESTRICTIONS_CHALLENGE" />
   2626                 <category android:name="android.intent.category.DEFAULT" />
   2627             </intent-filter>
   2628         </activity>
   2629 
   2630         <receiver android:name="com.android.server.BootReceiver"
   2631                 android:primaryUserOnly="true">
   2632             <intent-filter>
   2633                 <action android:name="android.intent.action.BOOT_COMPLETED" />
   2634             </intent-filter>
   2635         </receiver>
   2636 
   2637         <receiver android:name="com.android.server.updates.CertPinInstallReceiver" >
   2638             <intent-filter>
   2639                 <action android:name="android.intent.action.UPDATE_PINS" />
   2640             </intent-filter>
   2641         </receiver>
   2642 
   2643         <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" >
   2644             <intent-filter>
   2645                 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
   2646             </intent-filter>
   2647         </receiver>
   2648 
   2649         <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" >
   2650             <intent-filter>
   2651                 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
   2652             </intent-filter>
   2653         </receiver>
   2654 
   2655         <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" >
   2656             <intent-filter>
   2657                 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
   2658             </intent-filter>
   2659         </receiver>
   2660 
   2661         <receiver android:name="com.android.server.updates.TZInfoInstallReceiver" >
   2662             <intent-filter>
   2663                 <action android:name="android.intent.action.UPDATE_TZINFO" />
   2664             </intent-filter>
   2665         </receiver>
   2666 
   2667         <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" >
   2668             <intent-filter>
   2669                 <action android:name="android.intent.action.UPDATE_SEPOLICY" />
   2670             </intent-filter>
   2671         </receiver>
   2672 
   2673         <receiver android:name="com.android.server.MasterClearReceiver"
   2674             android:permission="android.permission.MASTER_CLEAR">
   2675             <intent-filter
   2676                     android:priority="100" >
   2677                 <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR -->
   2678                 <action android:name="android.intent.action.MASTER_CLEAR" />
   2679 
   2680                 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
   2681                 <action android:name="com.google.android.c2dm.intent.RECEIVE" />
   2682                 <category android:name="android.intent.category.MASTER_CLEAR" />
   2683             </intent-filter>
   2684         </receiver>
   2685 
   2686         <service android:name="com.android.internal.os.storage.ExternalStorageFormatter"
   2687             android:permission="android.permission.MASTER_CLEAR"
   2688             android:exported="true" />
   2689 
   2690         <service android:name="android.hardware.location.GeofenceHardwareService"
   2691             android:permission="android.permission.LOCATION_HARDWARE"
   2692             android:exported="false" />
   2693 
   2694         <service android:name="com.android.internal.backup.LocalTransportService"
   2695                 android:permission="android.permission.CONFIRM_FULL_BACKUP"
   2696                 android:exported="false">
   2697             <intent-filter>
   2698                 <action android:name="android.backup.TRANSPORT_HOST" />
   2699             </intent-filter>
   2700         </service>
   2701 
   2702     </application>
   2703 
   2704 </manifest>
   2705