mirror of
https://gitlab.com/fdroid/fdroidserver.git
synced 2024-11-09 00:40:11 +01:00
01ccc54b29
Taken from: https://android.googlesource.com/platform/frameworks/base/+/refs/heads/master/core/res/AndroidManifest.xml
2712 lines
142 KiB
XML
2712 lines
142 KiB
XML
<?xml version="1.0" encoding="utf-8"?>
|
|
<!--
|
|
/* //device/apps/common/AndroidManifest.xml
|
|
**
|
|
** Copyright 2006, The Android Open Source Project
|
|
**
|
|
** Licensed under the Apache License, Version 2.0 (the "License");
|
|
** you may not use this file except in compliance with the License.
|
|
** You may obtain a copy of the License at
|
|
**
|
|
** http://www.apache.org/licenses/LICENSE-2.0
|
|
**
|
|
** Unless required by applicable law or agreed to in writing, software
|
|
** distributed under the License is distributed on an "AS IS" BASIS,
|
|
** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
** See the License for the specific language governing permissions and
|
|
** limitations under the License.
|
|
*/
|
|
-->
|
|
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
|
|
package="android" coreApp="true" android:sharedUserId="android.uid.system"
|
|
android:sharedUserLabel="@string/android_system_label">
|
|
|
|
<!-- ================================================ -->
|
|
<!-- Special broadcasts that only the system can send -->
|
|
<!-- ================================================ -->
|
|
<eat-comment />
|
|
|
|
<protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
|
|
<protected-broadcast android:name="android.intent.action.SCREEN_ON" />
|
|
<protected-broadcast android:name="android.intent.action.USER_PRESENT" />
|
|
<protected-broadcast android:name="android.intent.action.TIME_SET" />
|
|
<protected-broadcast android:name="android.intent.action.TIME_TICK" />
|
|
<protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
|
|
<protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
|
|
<protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
|
|
<protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
|
|
<protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
|
|
<protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
|
|
<protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
|
|
<protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
|
|
<protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
|
|
<protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
|
|
<protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
|
|
<protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
|
|
<protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
|
|
<protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
|
|
<protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
|
|
<protected-broadcast android:name="android.intent.action.UID_REMOVED" />
|
|
<protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
|
|
<protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
|
|
<protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
|
|
<protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
|
|
<protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
|
|
<protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
|
|
<protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
|
|
<protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
|
|
<protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
|
|
<protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
|
|
<protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
|
|
<protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
|
|
<protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
|
|
<protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
|
|
<protected-broadcast android:name="android.intent.action.REBOOT" />
|
|
<protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
|
|
<protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
|
|
<protected-broadcast android:name="android.intent.action.USER_ADDED" />
|
|
<protected-broadcast android:name="android.intent.action.USER_REMOVED" />
|
|
<protected-broadcast android:name="android.intent.action.USER_STARTING" />
|
|
<protected-broadcast android:name="android.intent.action.USER_STARTED" />
|
|
<protected-broadcast android:name="android.intent.action.USER_STOPPING" />
|
|
<protected-broadcast android:name="android.intent.action.USER_STOPPED" />
|
|
<protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
|
|
<protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
|
|
<protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
|
|
|
|
<protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
|
|
<protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
|
|
<protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
|
|
<protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
|
|
|
|
<protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
|
|
<protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
|
|
<protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
|
|
<protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
|
|
|
|
<protected-broadcast android:name="android.backup.intent.RUN" />
|
|
<protected-broadcast android:name="android.backup.intent.CLEAR" />
|
|
<protected-broadcast android:name="android.backup.intent.INIT" />
|
|
|
|
<protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
|
|
<protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
|
|
<protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
|
|
<protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
|
|
<protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
|
|
<protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
|
|
<protected-broadcast android:name="android.bluetooth.device.action.UUID" />
|
|
<protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
|
|
<protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
|
|
<protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
|
|
<protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
|
|
<protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
|
|
<protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
|
|
<protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
|
|
<protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
|
|
<protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
|
|
<protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
|
|
<protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
|
|
<protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
|
|
<protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
|
|
<protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
|
|
<protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
|
|
<protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
|
|
<protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
|
|
<protected-broadcast
|
|
android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
|
|
<protected-broadcast
|
|
android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
|
|
<protected-broadcast
|
|
android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
|
|
<protected-broadcast
|
|
android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
|
|
<protected-broadcast
|
|
android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
|
|
<protected-broadcast
|
|
android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
|
|
<protected-broadcast
|
|
android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
|
|
<protected-broadcast
|
|
android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
|
|
<protected-broadcast
|
|
android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
|
|
<protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" />
|
|
<protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
|
|
<protected-broadcast android:name="android.btopp.intent.action.BT_OPP_HANDOVER_STARTED" />
|
|
<protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" />
|
|
<protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
|
|
<protected-broadcast android:name="android.btopp.intent.action.BT_OPP_TRANSFER_PROGRESS" />
|
|
<protected-broadcast android:name="android.btopp.intent.action.LIST" />
|
|
<protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
|
|
<protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
|
|
<protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
|
|
<protected-broadcast android:name="android.btopp.intent.action.HIDE" />
|
|
<protected-broadcast android:name="android.btopp.intent.action.BT_OPP_TRANSFER_DONE" />
|
|
<protected-broadcast android:name="android.btopp.intent.action.RETRY" />
|
|
<protected-broadcast android:name="android.btopp.intent.action.OPEN" />
|
|
<protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
|
|
<protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
|
|
<protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
|
|
<protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
|
|
<protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
|
|
|
|
<protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
|
|
|
|
<protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
|
|
<protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
|
|
<protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
|
|
<protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
|
|
<protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
|
|
|
|
<protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
|
|
<protected-broadcast android:name="android.intent.action.ANALOG_AUDIO_DOCK_PLUG" />
|
|
<protected-broadcast android:name="android.intent.action.DIGITAL_AUDIO_DOCK_PLUG" />
|
|
<protected-broadcast android:name="android.intent.action.HDMI_AUDIO_PLUG" />
|
|
<protected-broadcast android:name="android.intent.action.USB_AUDIO_ACCESSORY_PLUG" />
|
|
<protected-broadcast android:name="android.intent.action.USB_AUDIO_DEVICE_PLUG" />
|
|
|
|
<protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
|
|
<protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
|
|
<protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
|
|
<protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
|
|
<protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
|
|
<protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
|
|
<protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
|
|
<protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
|
|
|
|
<protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
|
|
<protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
|
|
<protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
|
|
<protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
|
|
<protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
|
|
<protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
|
|
<protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
|
|
<protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
|
|
<protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
|
|
<protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
|
|
|
|
<protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
|
|
<protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
|
|
<protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
|
|
<protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
|
|
<protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
|
|
|
|
<protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
|
|
|
|
<protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" />
|
|
<protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
|
|
<protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
|
|
<protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
|
|
|
|
<protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
|
|
<protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
|
|
<protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
|
|
|
|
<protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
|
|
|
|
<protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
|
|
<protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
|
|
<protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
|
|
<protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" />
|
|
|
|
<protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
|
|
<protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
|
|
<protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
|
|
<protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
|
|
<protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
|
|
<protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
|
|
<protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
|
|
<protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
|
|
<protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
|
|
<protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
|
|
<protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
|
|
<protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
|
|
<protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
|
|
<protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
|
|
<protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
|
|
<protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
|
|
<protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
|
|
<protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
|
|
<protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
|
|
<protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
|
|
<protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
|
|
<protected-broadcast
|
|
android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
|
|
<protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
|
|
<protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
|
|
<protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
|
|
<protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
|
|
<protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" />
|
|
|
|
<protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
|
|
<protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
|
|
|
|
<protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
|
|
|
|
<protected-broadcast android:name="android.intent.action.PHONE_STATE" />
|
|
|
|
<protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
|
|
<protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
|
|
<protected-broadcast android:name="android.location.MODE_CHANGED" />
|
|
<protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
|
|
<protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
|
|
|
|
<protected-broadcast
|
|
android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
|
|
|
|
<!-- ====================================== -->
|
|
<!-- Permissions for things that cost money -->
|
|
<!-- ====================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that can be used to make the user spend money
|
|
without their direct involvement. -->
|
|
<permission-group android:name="android.permission-group.COST_MONEY"
|
|
android:label="@string/permgrouplab_costMoney"
|
|
android:description="@string/permgroupdesc_costMoney" />
|
|
|
|
<!-- ================================== -->
|
|
<!-- Permissions for accessing messages -->
|
|
<!-- ================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that allow an application to send messages
|
|
on behalf of the user or intercept messages being received by the
|
|
user. This is primarily intended for SMS/MMS messaging, such as
|
|
receiving or reading an MMS. -->
|
|
<permission-group android:name="android.permission-group.MESSAGES"
|
|
android:label="@string/permgrouplab_messages"
|
|
android:icon="@drawable/perm_group_messages"
|
|
android:description="@string/permgroupdesc_messages"
|
|
android:permissionGroupFlags="personalInfo"
|
|
android:priority="360"/>
|
|
|
|
<!-- Allows an application to send SMS messages. -->
|
|
<permission android:name="android.permission.SEND_SMS"
|
|
android:permissionGroup="android.permission-group.MESSAGES"
|
|
android:protectionLevel="dangerous"
|
|
android:permissionFlags="costsMoney"
|
|
android:label="@string/permlab_sendSms"
|
|
android:description="@string/permdesc_sendSms" />
|
|
|
|
<!-- Allows an application (Phone) to send a request to other applications
|
|
to handle the respond-via-message action during incoming calls.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
|
|
android:permissionGroup="android.permission-group.MESSAGES"
|
|
android:protectionLevel="signature|system"
|
|
android:label="@string/permlab_sendRespondViaMessageRequest"
|
|
android:description="@string/permdesc_sendRespondViaMessageRequest" />
|
|
|
|
<!-- Allows an application to monitor incoming SMS messages, to record
|
|
or perform processing on them. -->
|
|
<permission android:name="android.permission.RECEIVE_SMS"
|
|
android:permissionGroup="android.permission-group.MESSAGES"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_receiveSms"
|
|
android:description="@string/permdesc_receiveSms" />
|
|
|
|
<!-- Allows an application to monitor incoming MMS messages, to record
|
|
or perform processing on them. -->
|
|
<permission android:name="android.permission.RECEIVE_MMS"
|
|
android:permissionGroup="android.permission-group.MESSAGES"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_receiveMms"
|
|
android:description="@string/permdesc_receiveMms" />
|
|
|
|
<!-- Allows an application to receive emergency cell broadcast messages,
|
|
to record or display them to the user.
|
|
<p>Not for use by third-party applications.
|
|
@hide Pending API council approval -->
|
|
<permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
|
|
android:permissionGroup="android.permission-group.MESSAGES"
|
|
android:protectionLevel="signature|system"
|
|
android:label="@string/permlab_receiveEmergencyBroadcast"
|
|
android:description="@string/permdesc_receiveEmergencyBroadcast" />
|
|
|
|
<!-- Allows an application to read previously received cell broadcast
|
|
messages and to register a content observer to get notifications when
|
|
a cell broadcast has been received and added to the database. For
|
|
emergency alerts, the database is updated immediately after the
|
|
alert dialog and notification sound/vibration/speech are presented.
|
|
The "read" column is then updated after the user dismisses the alert.
|
|
This enables supplementary emergency assistance apps to start loading
|
|
additional emergency information (if Internet access is available)
|
|
when the alert is first received, and to delay presenting the info
|
|
to the user until after the initial alert dialog is dismissed.
|
|
@hide Pending API council approval -->
|
|
<permission android:name="android.permission.READ_CELL_BROADCASTS"
|
|
android:permissionGroup="android.permission-group.MESSAGES"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_readCellBroadcasts"
|
|
android:description="@string/permdesc_readCellBroadcasts" />
|
|
|
|
<!-- Allows an application to read SMS messages. -->
|
|
<permission android:name="android.permission.READ_SMS"
|
|
android:permissionGroup="android.permission-group.MESSAGES"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_readSms"
|
|
android:description="@string/permdesc_readSms" />
|
|
|
|
<!-- Allows an application to write SMS messages. -->
|
|
<permission android:name="android.permission.WRITE_SMS"
|
|
android:permissionGroup="android.permission-group.MESSAGES"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_writeSms"
|
|
android:description="@string/permdesc_writeSms" />
|
|
|
|
<!-- Allows an application to monitor incoming WAP push messages. -->
|
|
<permission android:name="android.permission.RECEIVE_WAP_PUSH"
|
|
android:permissionGroup="android.permission-group.MESSAGES"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_receiveWapPush"
|
|
android:description="@string/permdesc_receiveWapPush" />
|
|
|
|
<!-- =============================================================== -->
|
|
<!-- Permissions for accessing social info (contacts and social) -->
|
|
<!-- =============================================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that provide access to the user's social connections,
|
|
such as contacts, call logs, social stream, etc. This includes
|
|
both reading and writing of this data (which should generally be
|
|
expressed as two distinct permissions). -->
|
|
|
|
<permission-group android:name="android.permission-group.SOCIAL_INFO"
|
|
android:label="@string/permgrouplab_socialInfo"
|
|
android:icon="@drawable/perm_group_social_info"
|
|
android:description="@string/permgroupdesc_socialInfo"
|
|
android:permissionGroupFlags="personalInfo"
|
|
android:priority="320" />
|
|
|
|
<!-- Allows an application to read the user's contacts data. -->
|
|
<permission android:name="android.permission.READ_CONTACTS"
|
|
android:permissionGroup="android.permission-group.SOCIAL_INFO"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_readContacts"
|
|
android:description="@string/permdesc_readContacts" />
|
|
|
|
<!-- Allows an application to write (but not read) the user's
|
|
contacts data. -->
|
|
<permission android:name="android.permission.WRITE_CONTACTS"
|
|
android:permissionGroup="android.permission-group.SOCIAL_INFO"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_writeContacts"
|
|
android:description="@string/permdesc_writeContacts" />
|
|
|
|
<!-- Allows an application to execute contacts directory search.
|
|
This should only be used by ContactsProvider.
|
|
<p>Not for use by third-party applications. -->
|
|
<!-- @hide -->
|
|
<permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
|
|
android:permissionGroup="android.permission-group.PERSONAL_INFO"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to read the user's call log.
|
|
<p class="note"><strong>Note:</strong> If your app uses the
|
|
{@link #READ_CONTACTS} permission and <em>both</em> your <a
|
|
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
|
|
minSdkVersion}</a> and <a
|
|
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
|
|
targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
|
|
grants your app this permission. If you don't need this permission, be sure your <a
|
|
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
|
|
targetSdkVersion}</a> is 16 or higher.</p> -->
|
|
<permission android:name="android.permission.READ_CALL_LOG"
|
|
android:permissionGroup="android.permission-group.SOCIAL_INFO"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_readCallLog"
|
|
android:description="@string/permdesc_readCallLog" />
|
|
|
|
<!-- Allows an application to write (but not read) the user's
|
|
contacts data.
|
|
<p class="note"><strong>Note:</strong> If your app uses the
|
|
{@link #WRITE_CONTACTS} permission and <em>both</em> your <a
|
|
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
|
|
minSdkVersion}</a> and <a
|
|
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
|
|
targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
|
|
grants your app this permission. If you don't need this permission, be sure your <a
|
|
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
|
|
targetSdkVersion}</a> is 16 or higher.</p> -->
|
|
<permission android:name="android.permission.WRITE_CALL_LOG"
|
|
android:permissionGroup="android.permission-group.SOCIAL_INFO"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_writeCallLog"
|
|
android:description="@string/permdesc_writeCallLog" />
|
|
|
|
<!-- Allows an application to read from the user's social stream. -->
|
|
<permission android:name="android.permission.READ_SOCIAL_STREAM"
|
|
android:permissionGroup="android.permission-group.SOCIAL_INFO"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_readSocialStream"
|
|
android:description="@string/permdesc_readSocialStream" />
|
|
|
|
<!-- Allows an application to write (but not read) the user's
|
|
social stream data. -->
|
|
<permission android:name="android.permission.WRITE_SOCIAL_STREAM"
|
|
android:permissionGroup="android.permission-group.SOCIAL_INFO"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_writeSocialStream"
|
|
android:description="@string/permdesc_writeSocialStream" />
|
|
|
|
<!-- =============================================================== -->
|
|
<!-- Permissions for accessing information about the device owner -->
|
|
<!-- =============================================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that provide access to information about the device
|
|
user such as profile information. This includes both reading and
|
|
writing of this data (which should generally be expressed as two
|
|
distinct permissions). -->
|
|
<permission-group android:name="android.permission-group.PERSONAL_INFO"
|
|
android:label="@string/permgrouplab_personalInfo"
|
|
android:icon="@drawable/perm_group_personal_info"
|
|
android:description="@string/permgroupdesc_personalInfo"
|
|
android:permissionGroupFlags="personalInfo"
|
|
android:priority="310" />
|
|
|
|
<!-- Allows an application to read the user's personal profile data. -->
|
|
<permission android:name="android.permission.READ_PROFILE"
|
|
android:permissionGroup="android.permission-group.PERSONAL_INFO"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_readProfile"
|
|
android:description="@string/permdesc_readProfile" />
|
|
|
|
<!-- Allows an application to write (but not read) the user's
|
|
personal profile data. -->
|
|
<permission android:name="android.permission.WRITE_PROFILE"
|
|
android:permissionGroup="android.permission-group.PERSONAL_INFO"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_writeProfile"
|
|
android:description="@string/permdesc_writeProfile" />
|
|
|
|
<!-- =============================================================== -->
|
|
<!-- Permissions for accessing the device calendar -->
|
|
<!-- =============================================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that provide access to the device
|
|
calendar to create / view events.-->
|
|
<permission-group android:name="android.permission-group.CALENDAR"
|
|
android:label="@string/permgrouplab_calendar"
|
|
android:icon="@drawable/perm_group_calendar"
|
|
android:description="@string/permgroupdesc_calendar"
|
|
android:permissionGroupFlags="personalInfo"
|
|
android:priority="290" />
|
|
|
|
<!-- Allows an application to read the user's calendar data. -->
|
|
<permission android:name="android.permission.READ_CALENDAR"
|
|
android:permissionGroup="android.permission-group.PERSONAL_INFO"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_readCalendar"
|
|
android:description="@string/permdesc_readCalendar" />
|
|
|
|
<!-- Allows an application to write (but not read) the user's
|
|
calendar data. -->
|
|
<permission android:name="android.permission.WRITE_CALENDAR"
|
|
android:permissionGroup="android.permission-group.PERSONAL_INFO"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_writeCalendar"
|
|
android:description="@string/permdesc_writeCalendar" />
|
|
|
|
<!-- =============================================================== -->
|
|
<!-- Permissions for accessing the user dictionary-->
|
|
<!-- =============================================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that provide access to the user
|
|
calendar to create / view events.-->
|
|
<permission-group android:name="android.permission-group.USER_DICTIONARY"
|
|
android:label="@string/permgrouplab_dictionary"
|
|
android:icon="@drawable/perm_group_user_dictionary"
|
|
android:description="@string/permgroupdesc_dictionary"
|
|
android:permissionGroupFlags="personalInfo"
|
|
android:priority="170" />
|
|
|
|
<!-- Allows an application to read the user dictionary. This should
|
|
really only be required by an IME, or a dictionary editor like
|
|
the Settings app. -->
|
|
<permission android:name="android.permission.READ_USER_DICTIONARY"
|
|
android:permissionGroup="android.permission-group.USER_DICTIONARY"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_readDictionary"
|
|
android:description="@string/permdesc_readDictionary" />
|
|
|
|
<!-- Used for permissions that provide access to the user
|
|
calendar to create / view events.-->
|
|
<permission-group android:name="android.permission-group.WRITE_USER_DICTIONARY"
|
|
android:label="@string/permgrouplab_writeDictionary"
|
|
android:icon="@drawable/perm_group_user_dictionary_write"
|
|
android:description="@string/permgroupdesc_writeDictionary"
|
|
android:priority="160" />
|
|
|
|
<!-- Allows an application to write to the user dictionary. -->
|
|
<permission android:name="android.permission.WRITE_USER_DICTIONARY"
|
|
android:permissionGroup="android.permission-group.WRITE_USER_DICTIONARY"
|
|
android:protectionLevel="normal"
|
|
android:label="@string/permlab_writeDictionary"
|
|
android:description="@string/permdesc_writeDictionary" />
|
|
|
|
<!-- =============================================================== -->
|
|
<!-- Permissions for accessing the user bookmarks -->
|
|
<!-- =============================================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that provide access to the user
|
|
bookmarks and browser history.-->
|
|
<permission-group android:name="android.permission-group.BOOKMARKS"
|
|
android:label="@string/permgrouplab_bookmarks"
|
|
android:icon="@drawable/perm_group_bookmarks"
|
|
android:description="@string/permgroupdesc_bookmarks"
|
|
android:permissionGroupFlags="personalInfo"
|
|
android:priority="300" />
|
|
|
|
<!-- Allows an application to read (but not write) the user's
|
|
browsing history and bookmarks. -->
|
|
<permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
|
|
android:permissionGroup="android.permission-group.BOOKMARKS"
|
|
android:label="@string/permlab_readHistoryBookmarks"
|
|
android:description="@string/permdesc_readHistoryBookmarks"
|
|
android:protectionLevel="dangerous" />
|
|
|
|
<!-- Allows an application to write (but not read) the user's
|
|
browsing history and bookmarks. -->
|
|
<permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
|
|
android:permissionGroup="android.permission-group.BOOKMARKS"
|
|
android:label="@string/permlab_writeHistoryBookmarks"
|
|
android:description="@string/permdesc_writeHistoryBookmarks"
|
|
android:protectionLevel="dangerous" />
|
|
|
|
<!-- =============================================================== -->
|
|
<!-- Permissions for setting the device alarm -->
|
|
<!-- =============================================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that provide access to the user voicemail box. -->
|
|
<permission-group android:name="android.permission-group.DEVICE_ALARMS"
|
|
android:label="@string/permgrouplab_deviceAlarms"
|
|
android:icon="@drawable/perm_group_device_alarms"
|
|
android:description="@string/permgroupdesc_deviceAlarms"
|
|
android:permissionGroupFlags="personalInfo"
|
|
android:priority="210" />
|
|
|
|
<!-- Allows an application to broadcast an Intent to set an alarm for the
|
|
user. -->
|
|
<permission android:name="com.android.alarm.permission.SET_ALARM"
|
|
android:permissionGroup="android.permission-group.DEVICE_ALARMS"
|
|
android:label="@string/permlab_setAlarm"
|
|
android:description="@string/permdesc_setAlarm"
|
|
android:protectionLevel="normal" />
|
|
|
|
<!-- =============================================================== -->
|
|
<!-- Permissions for accessing the user voicemail -->
|
|
<!-- =============================================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that provide access to the user voicemail box. -->
|
|
<permission-group android:name="android.permission-group.VOICEMAIL"
|
|
android:label="@string/permgrouplab_voicemail"
|
|
android:icon="@drawable/perm_group_voicemail"
|
|
android:description="@string/permgroupdesc_voicemail"
|
|
android:permissionGroupFlags="personalInfo"
|
|
android:priority="280" />
|
|
|
|
<!-- Allows an application to add voicemails into the system. -->
|
|
<permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
|
|
android:permissionGroup="android.permission-group.VOICEMAIL"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_addVoicemail"
|
|
android:description="@string/permdesc_addVoicemail" />
|
|
|
|
<!-- =============================================== -->
|
|
<!-- Permissions for enabling accessibility features -->
|
|
<!-- =============================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that allow requesting certain accessibility features. -->
|
|
<permission-group android:name="android.permission-group.ACCESSIBILITY_FEATURES"
|
|
android:label="@string/permgrouplab_accessibilityFeatures"
|
|
android:icon="@drawable/perm_group_accessibility_features"
|
|
android:description="@string/permgroupdesc_accessibilityFeatures"
|
|
android:priority="380" />
|
|
|
|
<!-- ======================================= -->
|
|
<!-- Permissions for accessing location info -->
|
|
<!-- ======================================= -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that allow access to the user's current
|
|
location. -->
|
|
<permission-group android:name="android.permission-group.LOCATION"
|
|
android:label="@string/permgrouplab_location"
|
|
android:icon="@drawable/perm_group_location"
|
|
android:description="@string/permgroupdesc_location"
|
|
android:permissionGroupFlags="personalInfo"
|
|
android:priority="330" />
|
|
|
|
<!-- Allows an app to access precise location from location sources such
|
|
as GPS, cell towers, and Wi-Fi. -->
|
|
<permission android:name="android.permission.ACCESS_FINE_LOCATION"
|
|
android:permissionGroup="android.permission-group.LOCATION"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_accessFineLocation"
|
|
android:description="@string/permdesc_accessFineLocation" />
|
|
|
|
<!-- Allows an app to access approximate location derived from network location
|
|
sources such as cell towers and Wi-Fi. -->
|
|
<permission android:name="android.permission.ACCESS_COARSE_LOCATION"
|
|
android:permissionGroup="android.permission-group.LOCATION"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_accessCoarseLocation"
|
|
android:description="@string/permdesc_accessCoarseLocation" />
|
|
|
|
<!-- Allows an application to create mock location providers for testing -->
|
|
<permission android:name="android.permission.ACCESS_MOCK_LOCATION"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_accessMockLocation"
|
|
android:description="@string/permdesc_accessMockLocation" />
|
|
|
|
<!-- Allows an application to access extra location provider commands -->
|
|
<permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="normal"
|
|
android:label="@string/permlab_accessLocationExtraCommands"
|
|
android:description="@string/permdesc_accessLocationExtraCommands" />
|
|
|
|
<!-- Allows an application to install a location provider into the Location Manager.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
|
|
android:protectionLevel="signature|system"
|
|
android:label="@string/permlab_installLocationProvider"
|
|
android:description="@string/permdesc_installLocationProvider" />
|
|
|
|
<!-- Allows an application to use location features in hardware,
|
|
such as the geofencing api.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.LOCATION_HARDWARE"
|
|
android:permissionGroup="android.permission-group.LOCATION"
|
|
android:protectionLevel="signature|system" />
|
|
<uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
|
|
|
|
<!-- ======================================= -->
|
|
<!-- Permissions for accessing networks -->
|
|
<!-- ======================================= -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that provide access to networking services. The
|
|
main permission here is internet access, but this is also an
|
|
appropriate group for accessing or modifying any network configuration
|
|
or other related network operations. -->
|
|
<permission-group android:name="android.permission-group.NETWORK"
|
|
android:label="@string/permgrouplab_network"
|
|
android:icon="@drawable/perm_group_network"
|
|
android:description="@string/permgroupdesc_network"
|
|
android:priority="270" />
|
|
|
|
<!-- Allows applications to open network sockets. -->
|
|
<permission android:name="android.permission.INTERNET"
|
|
android:permissionGroup="android.permission-group.NETWORK"
|
|
android:protectionLevel="dangerous"
|
|
android:description="@string/permdesc_createNetworkSockets"
|
|
android:label="@string/permlab_createNetworkSockets" />
|
|
|
|
<!-- Allows applications to access information about networks -->
|
|
<permission android:name="android.permission.ACCESS_NETWORK_STATE"
|
|
android:permissionGroup="android.permission-group.NETWORK"
|
|
android:protectionLevel="normal"
|
|
android:description="@string/permdesc_accessNetworkState"
|
|
android:label="@string/permlab_accessNetworkState" />
|
|
|
|
<!-- Allows applications to access information about Wi-Fi networks -->
|
|
<permission android:name="android.permission.ACCESS_WIFI_STATE"
|
|
android:permissionGroup="android.permission-group.NETWORK"
|
|
android:protectionLevel="normal"
|
|
android:description="@string/permdesc_accessWifiState"
|
|
android:label="@string/permlab_accessWifiState" />
|
|
|
|
<!-- Allows applications to change Wi-Fi connectivity state -->
|
|
<permission android:name="android.permission.CHANGE_WIFI_STATE"
|
|
android:permissionGroup="android.permission-group.NETWORK"
|
|
android:protectionLevel="dangerous"
|
|
android:description="@string/permdesc_changeWifiState"
|
|
android:label="@string/permlab_changeWifiState" />
|
|
|
|
<!-- @hide -->
|
|
<permission android:name="android.permission.ACCESS_WIMAX_STATE"
|
|
android:permissionGroup="android.permission-group.NETWORK"
|
|
android:protectionLevel="normal"
|
|
android:description="@string/permdesc_accessWimaxState"
|
|
android:label="@string/permlab_accessWimaxState" />
|
|
|
|
<!-- @hide -->
|
|
<permission android:name="android.permission.CHANGE_WIMAX_STATE"
|
|
android:permissionGroup="android.permission-group.NETWORK"
|
|
android:protectionLevel="dangerous"
|
|
android:description="@string/permdesc_changeWimaxState"
|
|
android:label="@string/permlab_changeWimaxState" />
|
|
|
|
<!-- ======================================= -->
|
|
<!-- Permissions for short range, peripheral networks -->
|
|
<!-- ======================================= -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that provide access to other devices through Bluetooth.-->
|
|
<permission-group android:name="android.permission-group.BLUETOOTH_NETWORK"
|
|
android:label="@string/permgrouplab_bluetoothNetwork"
|
|
android:icon="@drawable/perm_group_bluetooth"
|
|
android:description="@string/permgroupdesc_bluetoothNetwork"
|
|
android:priority="260" />
|
|
|
|
<!-- Allows applications to connect to paired bluetooth devices -->
|
|
<permission android:name="android.permission.BLUETOOTH"
|
|
android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
|
|
android:protectionLevel="dangerous"
|
|
android:description="@string/permdesc_bluetooth"
|
|
android:label="@string/permlab_bluetooth" />
|
|
|
|
<!-- Allows applications to discover and pair bluetooth devices -->
|
|
<permission android:name="android.permission.BLUETOOTH_ADMIN"
|
|
android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
|
|
android:protectionLevel="dangerous"
|
|
android:description="@string/permdesc_bluetoothAdmin"
|
|
android:label="@string/permlab_bluetoothAdmin" />
|
|
|
|
<!-- Allows applications to pair bluetooth devices without user interaction.
|
|
This is not available to third party applications. -->
|
|
<permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
|
|
android:permissionGroup="android.permission-group.BLUETOOTH_NETWORK"
|
|
android:protectionLevel="system|signature"
|
|
android:description="@string/permdesc_bluetoothPriv"
|
|
android:label="@string/permlab_bluetoothPriv" />
|
|
|
|
<!-- Allows bluetooth stack to access files
|
|
@hide This should only be used by Bluetooth apk.
|
|
-->
|
|
<permission android:name="android.permission.BLUETOOTH_STACK"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows applications to perform I/O operations over NFC -->
|
|
<permission android:name="android.permission.NFC"
|
|
android:permissionGroup="android.permission-group.NETWORK"
|
|
android:protectionLevel="dangerous"
|
|
android:description="@string/permdesc_nfc"
|
|
android:label="@string/permlab_nfc" />
|
|
|
|
<!-- Allows an internal user to use privileged ConnectivityManager APIs.
|
|
@hide -->
|
|
<permission android:name="android.permission.CONNECTIVITY_INTERNAL"
|
|
android:permissionGroup="android.permission-group.NETWORK"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- @hide -->
|
|
<permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
|
|
android:permissionGroup="android.permission-group.NETWORK"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows access to the loop radio (Android@Home mesh network) device.
|
|
@hide -->
|
|
<permission android:name="android.permission.LOOP_RADIO"
|
|
android:permissionGroup="android.permission-group.NETWORK"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- ================================== -->
|
|
<!-- Permissions for accessing accounts -->
|
|
<!-- ================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Permissions for direct access to the accounts managed
|
|
by the Account Manager. -->
|
|
<permission-group android:name="android.permission-group.ACCOUNTS"
|
|
android:label="@string/permgrouplab_accounts"
|
|
android:icon="@drawable/perm_group_accounts"
|
|
android:description="@string/permgroupdesc_accounts"
|
|
android:permissionGroupFlags="personalInfo"
|
|
android:priority="200" />
|
|
|
|
<!-- Allows access to the list of accounts in the Accounts Service -->
|
|
<permission android:name="android.permission.GET_ACCOUNTS"
|
|
android:permissionGroup="android.permission-group.ACCOUNTS"
|
|
android:protectionLevel="normal"
|
|
android:description="@string/permdesc_getAccounts"
|
|
android:label="@string/permlab_getAccounts" />
|
|
|
|
<!-- Allows an application to act as an AccountAuthenticator for
|
|
the AccountManager -->
|
|
<permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
|
|
android:permissionGroup="android.permission-group.ACCOUNTS"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_authenticateAccounts"
|
|
android:description="@string/permdesc_authenticateAccounts" />
|
|
|
|
<!-- Allows an application to request authtokens from the AccountManager -->
|
|
<permission android:name="android.permission.USE_CREDENTIALS"
|
|
android:permissionGroup="android.permission-group.ACCOUNTS"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_useCredentials"
|
|
android:description="@string/permdesc_useCredentials" />
|
|
|
|
<!-- Allows an application to manage the list of accounts in the AccountManager -->
|
|
<permission android:name="android.permission.MANAGE_ACCOUNTS"
|
|
android:permissionGroup="android.permission-group.ACCOUNTS"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_manageAccounts"
|
|
android:description="@string/permdesc_manageAccounts" />
|
|
|
|
<!-- Allows applications to call into AccountAuthenticators.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.ACCOUNT_MANAGER"
|
|
android:permissionGroup="android.permission-group.ACCOUNTS"
|
|
android:protectionLevel="signature"
|
|
android:description="@string/permdesc_accountManagerService"
|
|
android:label="@string/permlab_accountManagerService" />
|
|
|
|
<!-- ================================== -->
|
|
<!-- Permissions for accessing hardware that may effect battery life-->
|
|
<!-- ================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that provide direct access to the hardware on
|
|
the device that has an effect on battery life. This includes vibrator,
|
|
flashlight, etc. -->
|
|
|
|
<permission-group android:name="android.permission-group.AFFECTS_BATTERY"
|
|
android:label="@string/permgrouplab_affectsBattery"
|
|
android:icon="@drawable/perm_group_affects_battery"
|
|
android:description="@string/permgroupdesc_affectsBattery"
|
|
android:priority="180" />
|
|
|
|
<!-- Allows applications to enter Wi-Fi Multicast mode -->
|
|
<permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
|
|
android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
|
|
android:protectionLevel="dangerous"
|
|
android:description="@string/permdesc_changeWifiMulticastState"
|
|
android:label="@string/permlab_changeWifiMulticastState" />
|
|
|
|
<!-- Allows access to the vibrator -->
|
|
<permission android:name="android.permission.VIBRATE"
|
|
android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
|
|
android:protectionLevel="normal"
|
|
android:label="@string/permlab_vibrate"
|
|
android:description="@string/permdesc_vibrate" />
|
|
|
|
<!-- Allows access to the flashlight -->
|
|
<permission android:name="android.permission.FLASHLIGHT"
|
|
android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
|
|
android:protectionLevel="normal"
|
|
android:label="@string/permlab_flashlight"
|
|
android:description="@string/permdesc_flashlight" />
|
|
|
|
<!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
|
|
from dimming -->
|
|
<permission android:name="android.permission.WAKE_LOCK"
|
|
android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
|
|
android:protectionLevel="normal"
|
|
android:label="@string/permlab_wakeLock"
|
|
android:description="@string/permdesc_wakeLock" />
|
|
|
|
<!-- Allows using the device's IR transmitter, if available -->
|
|
<permission android:name="android.permission.TRANSMIT_IR"
|
|
android:permissionGroup="android.permission-group.AFFECTS_BATTERY"
|
|
android:protectionLevel="normal"
|
|
android:label="@string/permlab_transmitIr"
|
|
android:description="@string/permdesc_transmitIr" />
|
|
|
|
<!-- ==================================================== -->
|
|
<!-- Permissions related to changing audio settings -->
|
|
<!-- ==================================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that provide direct access to speaker settings
|
|
the device. -->
|
|
<permission-group android:name="android.permission-group.AUDIO_SETTINGS"
|
|
android:label="@string/permgrouplab_audioSettings"
|
|
android:icon="@drawable/perm_group_audio_settings"
|
|
android:description="@string/permgroupdesc_audioSettings"
|
|
android:priority="130" />
|
|
|
|
<!-- Allows an application to modify global audio settings -->
|
|
<permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
|
|
android:permissionGroup="android.permission-group.AUDIO_SETTINGS"
|
|
android:protectionLevel="normal"
|
|
android:label="@string/permlab_modifyAudioSettings"
|
|
android:description="@string/permdesc_modifyAudioSettings" />
|
|
|
|
<!-- ================================== -->
|
|
<!-- Permissions for accessing hardware -->
|
|
<!-- ================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that provide direct access to the hardware on
|
|
the device. This includes audio, the camera, vibrator, etc. -->
|
|
<permission-group android:name="android.permission-group.HARDWARE_CONTROLS"
|
|
android:label="@string/permgrouplab_hardwareControls"
|
|
android:description="@string/permgroupdesc_hardwareControls"
|
|
android:priority="260"/>
|
|
|
|
<!-- Allows an application to manage preferences and permissions for USB devices
|
|
@hide -->
|
|
<permission android:name="android.permission.MANAGE_USB"
|
|
android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
|
|
android:protectionLevel="signature|system"
|
|
android:label="@string/permlab_manageUsb"
|
|
android:description="@string/permdesc_manageUsb" />
|
|
|
|
<!-- Allows an application to access the MTP USB kernel driver.
|
|
For use only by the device side MTP implementation.
|
|
@hide -->
|
|
<permission android:name="android.permission.ACCESS_MTP"
|
|
android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
|
|
android:protectionLevel="signature|system"
|
|
android:label="@string/permlab_accessMtp"
|
|
android:description="@string/permdesc_accessMtp" />
|
|
|
|
<!-- Allows access to hardware peripherals. Intended only for hardware testing.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.HARDWARE_TEST"
|
|
android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
|
|
android:protectionLevel="signature"
|
|
android:label="@string/permlab_hardware_test"
|
|
android:description="@string/permdesc_hardware_test" />
|
|
|
|
<!-- Allows access to configure network interfaces, configure/use IPSec, etc.
|
|
@hide -->
|
|
<permission android:name="android.permission.NET_ADMIN"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows registration for remote audio playback. @hide -->
|
|
<permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- =========================================== -->
|
|
<!-- Permissions associated with audio capture -->
|
|
<!-- =========================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that are associated with accessing
|
|
microphone audio from the device. Note that phone calls also capture audio
|
|
but are in a separate (more visible) permission group. -->
|
|
<permission-group android:name="android.permission-group.MICROPHONE"
|
|
android:label="@string/permgrouplab_microphone"
|
|
android:icon="@drawable/perm_group_microphone"
|
|
android:description="@string/permgroupdesc_microphone"
|
|
android:permissionGroupFlags="personalInfo"
|
|
android:priority="340" />
|
|
|
|
<!-- Allows an application to record audio -->
|
|
<permission android:name="android.permission.RECORD_AUDIO"
|
|
android:permissionGroup="android.permission-group.MICROPHONE"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_recordAudio"
|
|
android:description="@string/permdesc_recordAudio" />
|
|
|
|
|
|
<!-- =========================================== -->
|
|
<!-- Permissions associated with camera and image capture -->
|
|
<!-- =========================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that are associated with accessing
|
|
camera or capturing images/video from the device. -->
|
|
<permission-group android:name="android.permission-group.CAMERA"
|
|
android:label="@string/permgrouplab_camera"
|
|
android:icon="@drawable/perm_group_camera"
|
|
android:description="@string/permgroupdesc_camera"
|
|
android:permissionGroupFlags="personalInfo"
|
|
android:priority="350" />
|
|
|
|
<!-- Required to be able to access the camera device.
|
|
<p>This will automatically enforce the <a
|
|
href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code
|
|
<uses-feature>}</a> manifest element for <em>all</em> camera features.
|
|
If you do not require all camera features or can properly operate if a camera
|
|
is not available, then you must modify your manifest as appropriate in order to
|
|
install on devices that don't support all camera features.</p> -->
|
|
<permission android:name="android.permission.CAMERA"
|
|
android:permissionGroup="android.permission-group.CAMERA"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_camera"
|
|
android:description="@string/permdesc_camera" />
|
|
|
|
<!-- Allows disabling the transmit-indicator LED that is normally on when
|
|
a camera is in use by an application.
|
|
@hide -->
|
|
<permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
|
|
android:permissionGroup="android.permission-group.CAMERA"
|
|
android:protectionLevel="signature|system"
|
|
android:label="@string/permlab_cameraDisableTransmitLed"
|
|
android:description="@string/permdesc_cameraDisableTransmitLed" />
|
|
|
|
<!-- =========================================== -->
|
|
<!-- Permissions associated with telephony state -->
|
|
<!-- =========================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that are associated with accessing and modifyign
|
|
telephony state: placing calls, intercepting outgoing calls, reading
|
|
and modifying the phone state. -->
|
|
<permission-group android:name="android.permission-group.PHONE_CALLS"
|
|
android:label="@string/permgrouplab_phoneCalls"
|
|
android:icon="@drawable/perm_group_phone_calls"
|
|
android:description="@string/permgroupdesc_phoneCalls"
|
|
android:permissionGroupFlags="personalInfo"
|
|
android:priority="370" />
|
|
|
|
<!-- Allows an application to monitor, modify, or abort outgoing
|
|
calls. -->
|
|
<permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
|
|
android:permissionGroup="android.permission-group.PHONE_CALLS"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_processOutgoingCalls"
|
|
android:description="@string/permdesc_processOutgoingCalls" />
|
|
|
|
<!-- Allows modification of the telephony state - power on, mmi, etc.
|
|
Does not include placing calls.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.MODIFY_PHONE_STATE"
|
|
android:permissionGroup="android.permission-group.PHONE_CALLS"
|
|
android:protectionLevel="signature|system"
|
|
android:label="@string/permlab_modifyPhoneState"
|
|
android:description="@string/permdesc_modifyPhoneState" />
|
|
|
|
<!-- Allows read only access to phone state.
|
|
<p class="note"><strong>Note:</strong> If <em>both</em> your <a
|
|
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
|
|
minSdkVersion}</a> and <a
|
|
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
|
|
targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
|
|
grants your app this permission. If you don't need this permission, be sure your <a
|
|
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
|
|
targetSdkVersion}</a> is 4 or higher. -->
|
|
<permission android:name="android.permission.READ_PHONE_STATE"
|
|
android:permissionGroup="android.permission-group.PHONE_CALLS"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_readPhoneState"
|
|
android:description="@string/permdesc_readPhoneState" />
|
|
|
|
<!-- Allows read only access to precise phone state.
|
|
@hide Pending API council approval -->
|
|
<permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
|
|
android:permissionGroup="android.permission-group.PHONE_CALLS"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_readPrecisePhoneState"
|
|
android:description="@string/permdesc_readPrecisePhoneState" />
|
|
|
|
<!-- Allows read access to privileged phone state.
|
|
@hide Used internally. -->
|
|
<permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
|
|
android:permissionGroup="android.permission-group.PHONE_CALLS"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to initiate a phone call without going through
|
|
the Dialer user interface for the user to confirm the call
|
|
being placed. -->
|
|
<permission android:name="android.permission.CALL_PHONE"
|
|
android:permissionGroup="android.permission-group.PHONE_CALLS"
|
|
android:protectionLevel="dangerous"
|
|
android:permissionFlags="costsMoney"
|
|
android:label="@string/permlab_callPhone"
|
|
android:description="@string/permdesc_callPhone" />
|
|
|
|
<!-- Allows an application to use SIP service -->
|
|
<permission android:name="android.permission.USE_SIP"
|
|
android:permissionGroup="android.permission-group.PHONE_CALLS"
|
|
android:protectionLevel="dangerous"
|
|
android:description="@string/permdesc_use_sip"
|
|
android:label="@string/permlab_use_sip" />
|
|
|
|
<!-- Allows an application to request CallHandlerService implementations.
|
|
@hide -->
|
|
<permission android:name="android.permission.BIND_CALL_SERVICE"
|
|
android:permissionGroup="android.permission-group.PHONE_CALLS"
|
|
android:protectionLevel="system|signature"
|
|
android:description="@string/permdesc_bind_call_service"
|
|
android:label="@string/permlab_bind_call_service" />
|
|
|
|
<!-- ================================== -->
|
|
<!-- Permissions for sdcard interaction -->
|
|
<!-- ================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Group of permissions that are related to SD card access. -->
|
|
<permission-group android:name="android.permission-group.STORAGE"
|
|
android:label="@string/permgrouplab_storage"
|
|
android:icon="@drawable/perm_group_storage"
|
|
android:description="@string/permgroupdesc_storage"
|
|
android:permissionGroupFlags="personalInfo"
|
|
android:priority="240" />
|
|
|
|
<!-- Allows an application to read from external storage.
|
|
<p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
|
|
granted this permission.</p>
|
|
<p>This permission is enforced starting in API level 19. Before API level 19, this
|
|
permission is not enforced and all apps still have access to read from external storage.
|
|
You can test your app with the permission enforced by enabling <em>Protect USB
|
|
storage</em> under Developer options in the Settings app on a device running Android 4.1 or
|
|
higher.</p>
|
|
<p>Also starting in API level 19, this permission is <em>not</em> required to
|
|
read/write files in your application-specific directories returned by
|
|
{@link android.content.Context#getExternalFilesDir} and
|
|
{@link android.content.Context#getExternalCacheDir}.
|
|
<p class="note"><strong>Note:</strong> If <em>both</em> your <a
|
|
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
|
|
minSdkVersion}</a> and <a
|
|
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
|
|
targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
|
|
grants your app this permission. If you don't need this permission, be sure your <a
|
|
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
|
|
targetSdkVersion}</a> is 4 or higher.-->
|
|
<permission android:name="android.permission.READ_EXTERNAL_STORAGE"
|
|
android:permissionGroup="android.permission-group.STORAGE"
|
|
android:label="@string/permlab_sdcardRead"
|
|
android:description="@string/permdesc_sdcardRead"
|
|
android:protectionLevel="normal" />
|
|
|
|
<!-- Allows an application to write to external storage.
|
|
<p class="note"><strong>Note:</strong> If <em>both</em> your <a
|
|
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
|
|
minSdkVersion}</a> and <a
|
|
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
|
|
targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
|
|
grants your app this permission. If you don't need this permission, be sure your <a
|
|
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
|
|
targetSdkVersion}</a> is 4 or higher.
|
|
<p>Starting in API level 19, this permission is <em>not</em> required to
|
|
read/write files in your application-specific directories returned by
|
|
{@link android.content.Context#getExternalFilesDir} and
|
|
{@link android.content.Context#getExternalCacheDir}. -->
|
|
<permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
|
|
android:permissionGroup="android.permission-group.STORAGE"
|
|
android:label="@string/permlab_sdcardWrite"
|
|
android:description="@string/permdesc_sdcardWrite"
|
|
android:protectionLevel="dangerous" />
|
|
|
|
<!-- Allows an application to write to internal media storage
|
|
@hide -->
|
|
<permission android:name="android.permission.WRITE_MEDIA_STORAGE"
|
|
android:permissionGroup="android.permission-group.STORAGE"
|
|
android:label="@string/permlab_mediaStorageWrite"
|
|
android:description="@string/permdesc_mediaStorageWrite"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to manage access to documents, usually as part
|
|
of a document picker. -->
|
|
<permission android:name="android.permission.MANAGE_DOCUMENTS"
|
|
android:permissionGroup="android.permission-group.STORAGE"
|
|
android:label="@string/permlab_manageDocs"
|
|
android:description="@string/permdesc_manageDocs"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- ================================== -->
|
|
<!-- Permissions for screenlock -->
|
|
<!-- ================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Group of permissions that are related to the screenlock. -->
|
|
<permission-group android:name="android.permission-group.SCREENLOCK"
|
|
android:label="@string/permgrouplab_screenlock"
|
|
android:icon="@drawable/perm_group_screenlock"
|
|
android:permissionGroupFlags="personalInfo"
|
|
android:description="@string/permgroupdesc_screenlock"
|
|
android:priority="230" />
|
|
|
|
<!-- Allows applications to disable the keyguard -->
|
|
<permission android:name="android.permission.DISABLE_KEYGUARD"
|
|
android:permissionGroup="android.permission-group.SCREENLOCK"
|
|
android:protectionLevel="dangerous"
|
|
android:description="@string/permdesc_disableKeyguard"
|
|
android:label="@string/permlab_disableKeyguard" />
|
|
|
|
<!-- ================================== -->
|
|
<!-- Permissions to access other installed applications -->
|
|
<!-- ================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Group of permissions that are related to the other applications
|
|
installed on the system. Examples include such as listing
|
|
running apps, or killing background processes. -->
|
|
<permission-group android:name="android.permission-group.APP_INFO"
|
|
android:label="@string/permgrouplab_appInfo"
|
|
android:icon="@drawable/perm_group_app_info"
|
|
android:description="@string/permgroupdesc_appInfo"
|
|
android:priority="220" />
|
|
|
|
<!-- Allows an application to get information about the currently
|
|
or recently running tasks. -->
|
|
<permission android:name="android.permission.GET_TASKS"
|
|
android:permissionGroup="android.permission-group.APP_INFO"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_getTasks"
|
|
android:description="@string/permdesc_getTasks" />
|
|
<!-- @hide Allows an application to call APIs that allow it to do interactions
|
|
across the users on the device, using singleton services and
|
|
user-targeted broadcasts. This permission is not available to
|
|
third party applications. -->
|
|
<permission android:name="android.permission.INTERACT_ACROSS_USERS"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature|system|development"
|
|
android:label="@string/permlab_interactAcrossUsers"
|
|
android:description="@string/permdesc_interactAcrossUsers" />
|
|
|
|
<!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
|
|
that removes restrictions on where broadcasts can be sent and allows other
|
|
types of interactions. -->
|
|
<permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature"
|
|
android:label="@string/permlab_interactAcrossUsersFull"
|
|
android:description="@string/permdesc_interactAcrossUsersFull" />
|
|
|
|
<!-- @hide Allows an application to call APIs that allow it to query and manage
|
|
users on the device. This permission is not available to
|
|
third party applications. -->
|
|
<permission android:name="android.permission.MANAGE_USERS"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature|system"
|
|
android:label="@string/permlab_manageUsers"
|
|
android:description="@string/permdesc_manageUsers" />
|
|
|
|
<!-- Allows an application to get full detailed information about
|
|
recently running tasks, with full fidelity to the real state.
|
|
@hide -->
|
|
<permission android:name="android.permission.GET_DETAILED_TASKS"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature"
|
|
android:label="@string/permlab_getDetailedTasks"
|
|
android:description="@string/permdesc_getDetailedTasks" />
|
|
|
|
<!-- Allows an application to change the Z-order of tasks -->
|
|
<permission android:name="android.permission.REORDER_TASKS"
|
|
android:permissionGroup="android.permission-group.APP_INFO"
|
|
android:protectionLevel="normal"
|
|
android:label="@string/permlab_reorderTasks"
|
|
android:description="@string/permdesc_reorderTasks" />
|
|
|
|
<!-- @hide Allows an application to change to remove/kill tasks -->
|
|
<permission android:name="android.permission.REMOVE_TASKS"
|
|
android:permissionGroup="android.permission-group.APP_INFO"
|
|
android:protectionLevel="signature"
|
|
android:label="@string/permlab_removeTasks"
|
|
android:description="@string/permdesc_removeTasks" />
|
|
|
|
<!-- @hide Allows an application to create/manage/remove stacks -->
|
|
<permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
|
|
android:permissionGroup="android.permission-group.APP_INFO"
|
|
android:protectionLevel="signature"
|
|
android:label="@string/permlab_manageActivityStacks"
|
|
android:description="@string/permdesc_manageActivityStacks" />
|
|
|
|
<!-- Allows an application to start any activity, regardless of permission
|
|
protection or exported state. @hide -->
|
|
<permission android:name="android.permission.START_ANY_ACTIVITY"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature"
|
|
android:label="@string/permlab_startAnyActivity"
|
|
android:description="@string/permdesc_startAnyActivity" />
|
|
|
|
<!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
|
|
API is no longer supported. -->
|
|
<permission android:name="android.permission.RESTART_PACKAGES"
|
|
android:permissionGroup="android.permission-group.APP_INFO"
|
|
android:protectionLevel="normal"
|
|
android:label="@string/permlab_killBackgroundProcesses"
|
|
android:description="@string/permdesc_killBackgroundProcesses" />
|
|
|
|
<!-- Allows an application to call
|
|
{@link android.app.ActivityManager#killBackgroundProcesses}. -->
|
|
<permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
|
|
android:permissionGroup="android.permission-group.APP_INFO"
|
|
android:protectionLevel="normal"
|
|
android:label="@string/permlab_killBackgroundProcesses"
|
|
android:description="@string/permdesc_killBackgroundProcesses" />
|
|
|
|
<!-- ================================== -->
|
|
<!-- Permissions affecting the display of other applications -->
|
|
<!-- ================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Group of permissions that allow manipulation of how
|
|
another application displays UI to the user. -->
|
|
<permission-group android:name="android.permission-group.DISPLAY"
|
|
android:label="@string/permgrouplab_display"
|
|
android:icon="@drawable/perm_group_display"
|
|
android:description="@string/permgroupdesc_display"
|
|
android:priority="190"/>
|
|
|
|
<!-- Allows an application to open windows using the type
|
|
{@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT},
|
|
shown on top of all other applications. Very few applications
|
|
should use this permission; these windows are intended for
|
|
system-level interaction with the user. -->
|
|
<permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
|
|
android:permissionGroup="android.permission-group.DISPLAY"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_systemAlertWindow"
|
|
android:description="@string/permdesc_systemAlertWindow" />
|
|
|
|
<!-- ================================== -->
|
|
<!-- Permissions affecting the system wallpaper -->
|
|
<!-- ================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Group of permissions that allow manipulation of how
|
|
another application displays UI to the user. -->
|
|
<permission-group android:name="android.permission-group.WALLPAPER"
|
|
android:label="@string/permgrouplab_wallpaper"
|
|
android:icon="@drawable/perm_group_wallpaper"
|
|
android:description="@string/permgroupdesc_wallpaper"
|
|
android:priority="150" />
|
|
|
|
<!-- Allows applications to set the wallpaper -->
|
|
<permission android:name="android.permission.SET_WALLPAPER"
|
|
android:permissionGroup="android.permission-group.WALLPAPER"
|
|
android:protectionLevel="normal"
|
|
android:label="@string/permlab_setWallpaper"
|
|
android:description="@string/permdesc_setWallpaper" />
|
|
|
|
<!-- Allows applications to set the wallpaper hints -->
|
|
<permission android:name="android.permission.SET_WALLPAPER_HINTS"
|
|
android:permissionGroup="android.permission-group.WALLPAPER"
|
|
android:protectionLevel="normal"
|
|
android:label="@string/permlab_setWallpaperHints"
|
|
android:description="@string/permdesc_setWallpaperHints" />
|
|
|
|
<!-- ============================================ -->
|
|
<!-- Permissions for changing the system clock -->
|
|
<!-- ============================================ -->
|
|
<eat-comment />
|
|
|
|
<!-- Group of permissions that are related to system clock. -->
|
|
<permission-group android:name="android.permission-group.SYSTEM_CLOCK"
|
|
android:label="@string/permgrouplab_systemClock"
|
|
android:icon="@drawable/perm_group_system_clock"
|
|
android:description="@string/permgroupdesc_systemClock"
|
|
android:priority="140" />
|
|
|
|
<!-- Allows applications to set the system time.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.SET_TIME"
|
|
android:protectionLevel="signature|system"
|
|
android:label="@string/permlab_setTime"
|
|
android:description="@string/permdesc_setTime" />
|
|
|
|
<!-- Allows applications to set the system time zone -->
|
|
<permission android:name="android.permission.SET_TIME_ZONE"
|
|
android:permissionGroup="android.permission-group.SYSTEM_CLOCK"
|
|
android:protectionLevel="normal"
|
|
android:label="@string/permlab_setTimeZone"
|
|
android:description="@string/permdesc_setTimeZone" />
|
|
|
|
<!-- ==================================================== -->
|
|
<!-- Permissions related to changing status bar -->
|
|
<!-- ==================================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that change the status bar -->
|
|
<permission-group android:name="android.permission-group.STATUS_BAR"
|
|
android:label="@string/permgrouplab_statusBar"
|
|
android:icon="@drawable/perm_group_status_bar"
|
|
android:description="@string/permgroupdesc_statusBar"
|
|
android:priority="110" />
|
|
|
|
<!-- Allows an application to expand or collapse the status bar. -->
|
|
<permission android:name="android.permission.EXPAND_STATUS_BAR"
|
|
android:permissionGroup="android.permission-group.STATUS_BAR"
|
|
android:protectionLevel="normal"
|
|
android:label="@string/permlab_expandStatusBar"
|
|
android:description="@string/permdesc_expandStatusBar" />
|
|
|
|
<!-- ============================================================== -->
|
|
<!-- Permissions related to adding/removing shortcuts from Launcher -->
|
|
<!-- ============================================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Allows an application to install a shortcut in Launcher -->
|
|
<permission
|
|
android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_install_shortcut"
|
|
android:description="@string/permdesc_install_shortcut" />
|
|
|
|
<!-- Allows an application to uninstall a shortcut in Launcher -->
|
|
<permission
|
|
android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_uninstall_shortcut"
|
|
android:description="@string/permdesc_uninstall_shortcut"/>
|
|
|
|
<!-- ==================================================== -->
|
|
<!-- Permissions related to accessing sync settings -->
|
|
<!-- ==================================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Used for permissions that access the sync settings or sync
|
|
related information. -->
|
|
<permission-group android:name="android.permission-group.SYNC_SETTINGS"
|
|
android:label="@string/permgrouplab_syncSettings"
|
|
android:icon="@drawable/perm_group_sync_settings"
|
|
android:description="@string/permgroupdesc_syncSettings"
|
|
android:priority="120" />
|
|
|
|
<!-- Allows applications to read the sync settings -->
|
|
<permission android:name="android.permission.READ_SYNC_SETTINGS"
|
|
android:permissionGroup="android.permission-group.SYNC_SETTINGS"
|
|
android:protectionLevel="normal"
|
|
android:description="@string/permdesc_readSyncSettings"
|
|
android:label="@string/permlab_readSyncSettings" />
|
|
|
|
<!-- Allows applications to write the sync settings -->
|
|
<permission android:name="android.permission.WRITE_SYNC_SETTINGS"
|
|
android:permissionGroup="android.permission-group.SYNC_SETTINGS"
|
|
android:protectionLevel="normal"
|
|
android:description="@string/permdesc_writeSyncSettings"
|
|
android:label="@string/permlab_writeSyncSettings" />
|
|
|
|
<!-- Allows applications to read the sync stats -->
|
|
<permission android:name="android.permission.READ_SYNC_STATS"
|
|
android:permissionGroup="android.permission-group.SYNC_SETTINGS"
|
|
android:protectionLevel="normal"
|
|
android:description="@string/permdesc_readSyncStats"
|
|
android:label="@string/permlab_readSyncStats" />
|
|
|
|
|
|
<!-- ============================================ -->
|
|
<!-- Permissions for low-level system interaction -->
|
|
<!-- ============================================ -->
|
|
<eat-comment />
|
|
|
|
<!-- Group of permissions that are related to system APIs. Many
|
|
of these are not permissions the user will be expected to understand,
|
|
and such permissions should generally be marked as "normal" protection
|
|
level so they don't get displayed. This can also, however, be used
|
|
for miscellaneous features that provide access to the operating system,
|
|
such as writing the global system settings. -->
|
|
<permission-group android:name="android.permission-group.SYSTEM_TOOLS"
|
|
android:label="@string/permgrouplab_systemTools"
|
|
android:icon="@drawable/perm_group_system_tools"
|
|
android:description="@string/permgroupdesc_systemTools"
|
|
android:priority="100" />
|
|
|
|
<!-- @hide Change the screen compatibility mode of applications -->
|
|
<permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature"
|
|
android:label="@string/permlab_setScreenCompatibility"
|
|
android:description="@string/permdesc_setScreenCompatibility" />
|
|
|
|
<!-- Allows an application to access all multi-user external storage @hide -->
|
|
<permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE"
|
|
android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
|
|
android:label="@string/permlab_sdcardAccessAll"
|
|
android:description="@string/permdesc_sdcardAccessAll"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows an application to modify the current configuration, such
|
|
as locale. -->
|
|
<permission android:name="android.permission.CHANGE_CONFIGURATION"
|
|
android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
|
|
android:protectionLevel="signature|system|development"
|
|
android:label="@string/permlab_changeConfiguration"
|
|
android:description="@string/permdesc_changeConfiguration" />
|
|
|
|
<!-- Allows an application to read or write the system settings. -->
|
|
<permission android:name="android.permission.WRITE_SETTINGS"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="normal"
|
|
android:label="@string/permlab_writeSettings"
|
|
android:description="@string/permdesc_writeSettings" />
|
|
|
|
<!-- Allows an application to modify the Google service map.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.WRITE_GSERVICES"
|
|
android:protectionLevel="signature|system"
|
|
android:label="@string/permlab_writeGservices"
|
|
android:description="@string/permdesc_writeGservices" />
|
|
|
|
<!-- Allows an application to call
|
|
{@link android.app.ActivityManager#forceStopPackage}.
|
|
@hide -->
|
|
<permission android:name="android.permission.FORCE_STOP_PACKAGES"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature"
|
|
android:label="@string/permlab_forceStopPackages"
|
|
android:description="@string/permdesc_forceStopPackages" />
|
|
|
|
<!-- @hide Allows an application to retrieve the content of the active window
|
|
An active window is the window that has fired an accessibility event. -->
|
|
<permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
|
|
android:permissionGroup="android.permission-group.PERSONAL_INFO"
|
|
android:protectionLevel="signature|system"
|
|
android:label="@string/permlab_retrieve_window_content"
|
|
android:description="@string/permdesc_retrieve_window_content" />
|
|
|
|
<!-- Modify the global animation scaling factor.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.SET_ANIMATION_SCALE"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature|system|development"
|
|
android:label="@string/permlab_setAnimationScale"
|
|
android:description="@string/permdesc_setAnimationScale" />
|
|
|
|
<!-- @deprecated This functionality will be removed in the future; please do
|
|
not use. Allow an application to make its activities persistent. -->
|
|
<permission android:name="android.permission.PERSISTENT_ACTIVITY"
|
|
android:permissionGroup="android.permission-group.APP_INFO"
|
|
android:protectionLevel="normal"
|
|
android:label="@string/permlab_persistentActivity"
|
|
android:description="@string/permdesc_persistentActivity" />
|
|
|
|
<!-- Allows an application to find out the space used by any package. -->
|
|
<permission android:name="android.permission.GET_PACKAGE_SIZE"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="normal"
|
|
android:label="@string/permlab_getPackageSize"
|
|
android:description="@string/permdesc_getPackageSize" />
|
|
|
|
<!-- @deprecated No longer useful, see
|
|
{@link android.content.pm.PackageManager#addPackageToPreferred}
|
|
for details. -->
|
|
<permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature"
|
|
android:label="@string/permlab_setPreferredApplications"
|
|
android:description="@string/permdesc_setPreferredApplications" />
|
|
|
|
<!-- Allows an application to receive the
|
|
{@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
|
|
broadcast after the system finishes booting. If you don't
|
|
request this permission, you will not receive the broadcast at
|
|
that time. Though holding this permission does not have any
|
|
security implications, it can have a negative impact on the
|
|
user experience by increasing the amount of time it takes the
|
|
system to start and allowing applications to have themselves
|
|
running without the user being aware of them. As such, you must
|
|
explicitly declare your use of this facility to make that visible
|
|
to the user. -->
|
|
<permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
|
|
android:permissionGroup="android.permission-group.APP_INFO"
|
|
android:protectionLevel="normal"
|
|
android:label="@string/permlab_receiveBootCompleted"
|
|
android:description="@string/permdesc_receiveBootCompleted" />
|
|
|
|
<!-- Allows an application to broadcast sticky intents. These are
|
|
broadcasts whose data is held by the system after being finished,
|
|
so that clients can quickly retrieve that data without having
|
|
to wait for the next broadcast. -->
|
|
<permission android:name="android.permission.BROADCAST_STICKY"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="normal"
|
|
android:label="@string/permlab_broadcastSticky"
|
|
android:description="@string/permdesc_broadcastSticky" />
|
|
|
|
<!-- Allows mounting and unmounting file systems for removable storage.
|
|
<p>Not for use by third-party applications.-->
|
|
<permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="system|signature"
|
|
android:label="@string/permlab_mount_unmount_filesystems"
|
|
android:description="@string/permdesc_mount_unmount_filesystems" />
|
|
|
|
<!-- Allows formatting file systems for removable storage.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="system|signature"
|
|
android:label="@string/permlab_mount_format_filesystems"
|
|
android:description="@string/permdesc_mount_format_filesystems" />
|
|
|
|
<!-- Allows access to ASEC non-destructive API calls
|
|
@hide -->
|
|
<permission android:name="android.permission.ASEC_ACCESS"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature"
|
|
android:label="@string/permlab_asec_access"
|
|
android:description="@string/permdesc_asec_access" />
|
|
|
|
<!-- Allows creation of ASEC volumes
|
|
@hide -->
|
|
<permission android:name="android.permission.ASEC_CREATE"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature"
|
|
android:label="@string/permlab_asec_create"
|
|
android:description="@string/permdesc_asec_create" />
|
|
|
|
<!-- Allows destruction of ASEC volumes
|
|
@hide -->
|
|
<permission android:name="android.permission.ASEC_DESTROY"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature"
|
|
android:label="@string/permlab_asec_destroy"
|
|
android:description="@string/permdesc_asec_destroy" />
|
|
|
|
<!-- Allows mount / unmount of ASEC volumes
|
|
@hide -->
|
|
<permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature"
|
|
android:label="@string/permlab_asec_mount_unmount"
|
|
android:description="@string/permdesc_asec_mount_unmount" />
|
|
|
|
<!-- Allows rename of ASEC volumes
|
|
@hide -->
|
|
<permission android:name="android.permission.ASEC_RENAME"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature"
|
|
android:label="@string/permlab_asec_rename"
|
|
android:description="@string/permdesc_asec_rename" />
|
|
|
|
<!-- Allows applications to write the apn settings.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.WRITE_APN_SETTINGS"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature|system"
|
|
android:description="@string/permdesc_writeApnSettings"
|
|
android:label="@string/permlab_writeApnSettings" />
|
|
|
|
<!-- Allows an application to allow access the subscribed feeds
|
|
ContentProvider. -->
|
|
<permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:label="@string/permlab_subscribedFeedsRead"
|
|
android:description="@string/permdesc_subscribedFeedsRead"
|
|
android:protectionLevel="normal" />
|
|
<permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:label="@string/permlab_subscribedFeedsWrite"
|
|
android:description="@string/permdesc_subscribedFeedsWrite"
|
|
android:protectionLevel="dangerous" />
|
|
|
|
<!-- Allows applications to change network connectivity state -->
|
|
<permission android:name="android.permission.CHANGE_NETWORK_STATE"
|
|
android:permissionGroup="android.permission-group.NETWORK"
|
|
android:protectionLevel="normal"
|
|
android:description="@string/permdesc_changeNetworkState"
|
|
android:label="@string/permlab_changeNetworkState" />
|
|
|
|
<!-- Allows an application to clear the caches of all installed
|
|
applications on the device. -->
|
|
<permission android:name="android.permission.CLEAR_APP_CACHE"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="dangerous"
|
|
android:label="@string/permlab_clearAppCache"
|
|
android:description="@string/permdesc_clearAppCache" />
|
|
|
|
<!-- Allows an application to use any media decoder when decoding for playback
|
|
@hide -->
|
|
<permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
|
|
android:protectionLevel="signature|system"
|
|
android:label="@string/permlab_anyCodecForPlayback"
|
|
android:description="@string/permdesc_anyCodecForPlayback" />
|
|
|
|
<!-- Allows an application to install and/or uninstall CA certificates on
|
|
behalf of the user.
|
|
@hide -->
|
|
<permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
|
|
android:protectionLevel="signature|system"
|
|
android:label="@string/permlab_manageCaCertificates"
|
|
android:description="@string/permdesc_manageCaCertificates" />
|
|
|
|
<!-- ========================================= -->
|
|
<!-- Permissions for special development tools -->
|
|
<!-- ========================================= -->
|
|
<eat-comment />
|
|
|
|
<!-- Group of permissions that are related to development features. These
|
|
are not permissions that should appear in third-party applications; they
|
|
protect APIs that are intended only to be used for development
|
|
purposes. -->
|
|
<permission-group android:name="android.permission-group.DEVELOPMENT_TOOLS"
|
|
android:label="@string/permgrouplab_developmentTools"
|
|
android:description="@string/permgroupdesc_developmentTools"
|
|
android:priority="310" />
|
|
|
|
<!-- Allows an application to read or write the secure system settings.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.WRITE_SECURE_SETTINGS"
|
|
android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
|
|
android:protectionLevel="signature|system|development"
|
|
android:label="@string/permlab_writeSecureSettings"
|
|
android:description="@string/permdesc_writeSecureSettings" />
|
|
|
|
<!-- Allows an application to retrieve state dump information from system services.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.DUMP"
|
|
android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
|
|
android:protectionLevel="signature|system|development"
|
|
android:label="@string/permlab_dump"
|
|
android:description="@string/permdesc_dump" />
|
|
|
|
<!-- Allows an application to read the low-level system log files.
|
|
<p>Not for use by third-party applications, because
|
|
Log entries can contain the user's private information. -->
|
|
<permission android:name="android.permission.READ_LOGS"
|
|
android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
|
|
android:protectionLevel="signature|system|development"
|
|
android:label="@string/permlab_readLogs"
|
|
android:description="@string/permdesc_readLogs" />
|
|
|
|
<!-- Configure an application for debugging.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.SET_DEBUG_APP"
|
|
android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
|
|
android:protectionLevel="signature|system|development"
|
|
android:label="@string/permlab_setDebugApp"
|
|
android:description="@string/permdesc_setDebugApp" />
|
|
|
|
<!-- Allows an application to set the maximum number of (not needed)
|
|
application processes that can be running.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.SET_PROCESS_LIMIT"
|
|
android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
|
|
android:protectionLevel="signature|system|development"
|
|
android:label="@string/permlab_setProcessLimit"
|
|
android:description="@string/permdesc_setProcessLimit" />
|
|
|
|
<!-- Allows an application to control whether activities are immediately
|
|
finished when put in the background.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.SET_ALWAYS_FINISH"
|
|
android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
|
|
android:protectionLevel="signature|system|development"
|
|
android:label="@string/permlab_setAlwaysFinish"
|
|
android:description="@string/permdesc_setAlwaysFinish" />
|
|
|
|
<!-- Allow an application to request that a signal be sent to all persistent processes.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
|
|
android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
|
|
android:protectionLevel="signature|system|development"
|
|
android:label="@string/permlab_signalPersistentProcesses"
|
|
android:description="@string/permdesc_signalPersistentProcesses" />
|
|
|
|
<!-- ==================================== -->
|
|
<!-- Private (signature-only) permissions -->
|
|
<!-- ==================================== -->
|
|
<eat-comment />
|
|
|
|
<!-- Allows applications to RW to diagnostic resources.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.DIAGNOSTIC"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature"
|
|
android:description="@string/permdesc_diagnostic"
|
|
android:label="@string/permlab_diagnostic" />
|
|
|
|
<!-- Allows an application to open, close, or disable the status bar
|
|
and its icons.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.STATUS_BAR"
|
|
android:label="@string/permlab_statusBar"
|
|
android:description="@string/permdesc_statusBar"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to be the status bar. Currently used only by SystemUI.apk
|
|
@hide -->
|
|
<permission android:name="android.permission.STATUS_BAR_SERVICE"
|
|
android:label="@string/permlab_statusBarService"
|
|
android:description="@string/permdesc_statusBarService"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows an application to force a BACK operation on whatever is the
|
|
top activity.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.FORCE_BACK"
|
|
android:label="@string/permlab_forceBack"
|
|
android:description="@string/permdesc_forceBack"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows an application to update device statistics.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.UPDATE_DEVICE_STATS"
|
|
android:label="@string/permlab_updateBatteryStats"
|
|
android:description="@string/permdesc_updateBatteryStats"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- @hide Allows an application to collect battery statistics -->
|
|
<permission android:name="android.permission.GET_APP_OPS_STATS"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:label="@string/permlab_getAppOpsStats"
|
|
android:description="@string/permdesc_getAppOpsStats"
|
|
android:protectionLevel="signature|system|development" />
|
|
|
|
<!-- Allows an application to update application operation statistics. Not for
|
|
use by third party apps. @hide -->
|
|
<permission android:name="android.permission.UPDATE_APP_OPS_STATS"
|
|
android:label="@string/permlab_updateAppOpsStats"
|
|
android:description="@string/permdesc_updateAppOpsStats"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to open windows that are for use by parts
|
|
of the system user interface.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
|
|
android:label="@string/permlab_internalSystemWindow"
|
|
android:description="@string/permdesc_internalSystemWindow"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows an application to manage (create, destroy,
|
|
Z-order) application tokens in the window manager.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.MANAGE_APP_TOKENS"
|
|
android:label="@string/permlab_manageAppTokens"
|
|
android:description="@string/permdesc_manageAppTokens"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- @hide Allows the application to temporarily freeze the screen for a
|
|
full-screen transition. -->
|
|
<permission android:name="android.permission.FREEZE_SCREEN"
|
|
android:label="@string/permlab_freezeScreen"
|
|
android:description="@string/permdesc_freezeScreen"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows an application to inject user events (keys, touch, trackball)
|
|
into the event stream and deliver them to ANY window. Without this
|
|
permission, you can only deliver events to windows in your own process.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.INJECT_EVENTS"
|
|
android:label="@string/permlab_injectEvents"
|
|
android:description="@string/permdesc_injectEvents"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- @hide Allows an application to register an input filter which filters the stream
|
|
of user events (keys, touch, trackball) before they are dispatched to any window. -->
|
|
<permission android:name="android.permission.FILTER_EVENTS"
|
|
android:label="@string/permlab_filter_events"
|
|
android:description="@string/permdesc_filter_events"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- @hide Allows an application to retrieve info for a window from the window manager. -->
|
|
<permission android:name="android.permission.RETRIEVE_WINDOW_INFO"
|
|
android:label="@string/permlab_retrieve_window_info"
|
|
android:description="@string/permdesc_retrieve_window_info"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- @hide Allows an application to temporary enable accessibility on the device. -->
|
|
<permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
|
|
android:label="@string/permlab_temporary_enable_accessibility"
|
|
android:description="@string/permdesc_temporary_enable_accessibility"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- @hide Allows an application to magnify the content of a display. -->
|
|
<permission android:name="android.permission.MAGNIFY_DISPLAY"
|
|
android:label="@string/permlab_magnify_display"
|
|
android:description="@string/permdesc_magnify_display"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows an application to watch and control how activities are
|
|
started globally in the system. Only for is in debugging
|
|
(usually the monkey command).
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.SET_ACTIVITY_WATCHER"
|
|
android:label="@string/permlab_runSetActivityWatcher"
|
|
android:description="@string/permdesc_runSetActivityWatcher"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows an application to call the activity manager shutdown() API
|
|
to put the higher-level system there into a shutdown state.
|
|
@hide -->
|
|
<permission android:name="android.permission.SHUTDOWN"
|
|
android:label="@string/permlab_shutdown"
|
|
android:description="@string/permdesc_shutdown"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to tell the activity manager to temporarily
|
|
stop application switches, putting it into a special mode that
|
|
prevents applications from immediately switching away from some
|
|
critical UI such as the home screen.
|
|
@hide -->
|
|
<permission android:name="android.permission.STOP_APP_SWITCHES"
|
|
android:label="@string/permlab_stopAppSwitches"
|
|
android:description="@string/permdesc_stopAppSwitches"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to retrieve private information about
|
|
the current top activity, such as any assist context it can provide.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
|
|
android:label="@string/permlab_getTopActivityInfo"
|
|
android:description="@string/permdesc_getTopActivityInfo"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows an application to retrieve the current state of keys and
|
|
switches.
|
|
<p>Not for use by third-party applications.
|
|
@deprecated The API that used this permission has been removed. -->
|
|
<permission android:name="android.permission.READ_INPUT_STATE"
|
|
android:label="@string/permlab_readInputState"
|
|
android:description="@string/permdesc_readInputState"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
|
|
to ensure that only the system can bind to it. -->
|
|
<permission android:name="android.permission.BIND_INPUT_METHOD"
|
|
android:label="@string/permlab_bindInputMethod"
|
|
android:description="@string/permdesc_bindInputMethod"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
|
|
to ensure that only the system can bind to it. -->
|
|
<permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
|
|
android:label="@string/permlab_bindAccessibilityService"
|
|
android:description="@string/permdesc_bindAccessibilityService"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Must be required by a {@link android.printservice.PrintService},
|
|
to ensure that only the system can bind to it. -->
|
|
<permission android:name="android.permission.BIND_PRINT_SERVICE"
|
|
android:label="@string/permlab_bindPrintService"
|
|
android:description="@string/permdesc_bindPrintService"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
|
|
or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
|
|
the system can bind to it. -->
|
|
<permission android:name="android.permission.BIND_NFC_SERVICE"
|
|
android:label="@string/permlab_bindNfcService"
|
|
android:description="@string/permdesc_bindNfcService"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
|
|
@hide -->
|
|
<permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
|
|
android:label="@string/permlab_bindPrintSpoolerService"
|
|
android:description="@string/permdesc_bindPrintSpoolerService"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Must be required by a TextService (e.g. SpellCheckerService)
|
|
to ensure that only the system can bind to it. -->
|
|
<permission android:name="android.permission.BIND_TEXT_SERVICE"
|
|
android:label="@string/permlab_bindTextService"
|
|
android:description="@string/permdesc_bindTextService"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Must be required by a {@link android.net.VpnService},
|
|
to ensure that only the system can bind to it. -->
|
|
<permission android:name="android.permission.BIND_VPN_SERVICE"
|
|
android:label="@string/permlab_bindVpnService"
|
|
android:description="@string/permdesc_bindVpnService"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
|
|
to ensure that only the system can bind to it. -->
|
|
<permission android:name="android.permission.BIND_WALLPAPER"
|
|
android:label="@string/permlab_bindWallpaper"
|
|
android:description="@string/permdesc_bindWallpaper"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
|
|
to ensure that only the system can bind to it.
|
|
@hide -->
|
|
<permission android:name="android.permission.BIND_REMOTE_DISPLAY"
|
|
android:label="@string/permlab_bindRemoteDisplay"
|
|
android:description="@string/permdesc_bindRemoteDisplay"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Must be required by device administration receiver, to ensure that only the
|
|
system can interact with it. -->
|
|
<permission android:name="android.permission.BIND_DEVICE_ADMIN"
|
|
android:label="@string/permlab_bindDeviceAdmin"
|
|
android:description="@string/permdesc_bindDeviceAdmin"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Required to add or remove another application as a device admin.
|
|
<p>Not for use by third-party applications.
|
|
@hide -->
|
|
<permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
|
|
android:label="@string/permlab_manageDeviceAdmins"
|
|
android:description="@string/permdesc_manageDeviceAdmins"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows low-level access to setting the orientation (actually
|
|
rotation) of the screen.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.SET_ORIENTATION"
|
|
android:label="@string/permlab_setOrientation"
|
|
android:description="@string/permdesc_setOrientation"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows low-level access to setting the pointer speed.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.SET_POINTER_SPEED"
|
|
android:label="@string/permlab_setPointerSpeed"
|
|
android:description="@string/permdesc_setPointerSpeed"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows low-level access to setting the keyboard layout.
|
|
<p>Not for use by third-party applications.
|
|
@hide -->
|
|
<permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
|
|
android:label="@string/permlab_setKeyboardLayout"
|
|
android:description="@string/permdesc_setKeyboardLayout"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows an application to install packages.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.INSTALL_PACKAGES"
|
|
android:label="@string/permlab_installPackages"
|
|
android:description="@string/permdesc_installPackages"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to clear user data.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.CLEAR_APP_USER_DATA"
|
|
android:label="@string/permlab_clearAppUserData"
|
|
android:description="@string/permdesc_clearAppUserData"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows an application to delete cache files.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.DELETE_CACHE_FILES"
|
|
android:label="@string/permlab_deleteCacheFiles"
|
|
android:description="@string/permdesc_deleteCacheFiles"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to delete packages.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.DELETE_PACKAGES"
|
|
android:label="@string/permlab_deletePackages"
|
|
android:description="@string/permdesc_deletePackages"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to move location of installed package.
|
|
@hide -->
|
|
<permission android:name="android.permission.MOVE_PACKAGE"
|
|
android:label="@string/permlab_movePackage"
|
|
android:description="@string/permdesc_movePackage"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to change whether an application component (other than its own) is
|
|
enabled or not.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
|
|
android:label="@string/permlab_changeComponentState"
|
|
android:description="@string/permdesc_changeComponentState"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- @hide Allows an application to grant or revoke specific permissions. -->
|
|
<permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS"
|
|
android:label="@string/permlab_grantRevokePermissions"
|
|
android:description="@string/permdesc_grantRevokePermissions"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows an application to use SurfaceFlinger's low level features.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
|
|
android:label="@string/permlab_accessSurfaceFlinger"
|
|
android:description="@string/permdesc_accessSurfaceFlinger"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows an application to take screen shots and more generally
|
|
get access to the frame buffer data.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.READ_FRAME_BUFFER"
|
|
android:label="@string/permlab_readFrameBuffer"
|
|
android:description="@string/permdesc_readFrameBuffer"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to configure and connect to Wifi displays
|
|
@hide -->
|
|
<permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
|
|
android:label="@string/permlab_configureWifiDisplay"
|
|
android:description="@string/permdesc_configureWifiDisplay"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows an application to control low-level features of Wifi displays
|
|
such as opening an RTSP socket. This permission should only be used
|
|
by the display manager.
|
|
@hide -->
|
|
<permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
|
|
android:label="@string/permlab_controlWifiDisplay"
|
|
android:description="@string/permdesc_controlWifiDisplay"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows an application to capture audio output.
|
|
<p>Not for use by third-party applications.</p> -->
|
|
<permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
|
|
android:label="@string/permlab_captureAudioOutput"
|
|
android:description="@string/permdesc_captureAudioOutput"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to capture audio for hotword detection.
|
|
<p>Not for use by third-party applications.</p>
|
|
@hide -->
|
|
<permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
|
|
android:label="@string/permlab_captureAudioHotword"
|
|
android:description="@string/permdesc_captureAudioHotword"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to capture video output.
|
|
<p>Not for use by third-party applications.</p> -->
|
|
<permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
|
|
android:label="@string/permlab_captureVideoOutput"
|
|
android:description="@string/permdesc_captureVideoOutput"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to capture secure video output.
|
|
<p>Not for use by third-party applications.</p> -->
|
|
<permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
|
|
android:label="@string/permlab_captureSecureVideoOutput"
|
|
android:description="@string/permdesc_captureSecureVideoOutput"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to know what content is playing and control its playback.
|
|
<p>Not for use by third-party applications due to privacy of media consumption</p> -->
|
|
<permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
|
|
android:label="@string/permlab_mediaContentControl"
|
|
android:description="@string/permdesc_mediaContentControl"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Required to be able to disable the device (very dangerous!).
|
|
<p>Not for use by third-party applications.. -->
|
|
<permission android:name="android.permission.BRICK"
|
|
android:label="@string/permlab_brick"
|
|
android:description="@string/permdesc_brick"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Required to be able to reboot the device.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.REBOOT"
|
|
android:label="@string/permlab_reboot"
|
|
android:description="@string/permdesc_reboot"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows low-level access to power management.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.DEVICE_POWER"
|
|
android:label="@string/permlab_devicePower"
|
|
android:description="@string/permdesc_devicePower"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- @hide Allows low-level access to tun tap driver -->
|
|
<permission android:name="android.permission.NET_TUNNELING"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Run as a manufacturer test application, running as the root user.
|
|
Only available when the device is running in manufacturer test mode.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.FACTORY_TEST"
|
|
android:label="@string/permlab_factoryTest"
|
|
android:description="@string/permdesc_factoryTest"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows an application to broadcast a notification that an application
|
|
package has been removed.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:label="@string/permlab_broadcastPackageRemoved"
|
|
android:description="@string/permdesc_broadcastPackageRemoved"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows an application to broadcast an SMS receipt notification.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.BROADCAST_SMS"
|
|
android:permissionGroup="android.permission-group.MESSAGES"
|
|
android:label="@string/permlab_broadcastSmsReceived"
|
|
android:description="@string/permdesc_broadcastSmsReceived"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows an application to broadcast a WAP PUSH receipt notification.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.BROADCAST_WAP_PUSH"
|
|
android:permissionGroup="android.permission-group.MESSAGES"
|
|
android:label="@string/permlab_broadcastWapPush"
|
|
android:description="@string/permdesc_broadcastWapPush"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.MASTER_CLEAR"
|
|
android:label="@string/permlab_masterClear"
|
|
android:description="@string/permdesc_masterClear"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to call any phone number, including emergency
|
|
numbers, without going through the Dialer user interface for the user
|
|
to confirm the call being placed.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.CALL_PRIVILEGED"
|
|
android:label="@string/permlab_callPrivileged"
|
|
android:description="@string/permdesc_callPrivileged"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to perform CDMA OTA provisioning @hide -->
|
|
<permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
|
|
android:label="@string/permlab_performCdmaProvisioning"
|
|
android:description="@string/permdesc_performCdmaProvisioning"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows enabling/disabling location update notifications from
|
|
the radio.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
|
|
android:label="@string/permlab_locationUpdates"
|
|
android:description="@string/permdesc_locationUpdates"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows read/write access to the "properties" table in the checkin
|
|
database, to change values that get uploaded.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
|
|
android:label="@string/permlab_checkinProperties"
|
|
android:description="@string/permdesc_checkinProperties"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to collect component usage
|
|
statistics @hide -->
|
|
<permission android:name="android.permission.PACKAGE_USAGE_STATS"
|
|
android:label="@string/permlab_pkgUsageStats"
|
|
android:description="@string/permdesc_pkgUsageStats"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to collect battery statistics -->
|
|
<permission android:name="android.permission.BATTERY_STATS"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:label="@string/permlab_batteryStats"
|
|
android:description="@string/permdesc_batteryStats"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to control the backup and restore process.
|
|
<p>Not for use by third-party applications.
|
|
@hide pending API council -->
|
|
<permission android:name="android.permission.BACKUP"
|
|
android:label="@string/permlab_backup"
|
|
android:description="@string/permdesc_backup"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows a package to launch the secure full-backup confirmation UI.
|
|
ONLY the system process may hold this permission.
|
|
@hide -->
|
|
<permission android:name="android.permission.CONFIRM_FULL_BACKUP"
|
|
android:label="@string/permlab_confirm_full_backup"
|
|
android:description="@string/permdesc_confirm_full_backup"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Must be required by a {@link android.widget.RemoteViewsService},
|
|
to ensure that only the system can bind to it. -->
|
|
<permission android:name="android.permission.BIND_REMOTEVIEWS"
|
|
android:label="@string/permlab_bindRemoteViews"
|
|
android:description="@string/permdesc_bindRemoteViews"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to tell the AppWidget service which application
|
|
can access AppWidget's data. The normal user flow is that a user
|
|
picks an AppWidget to go into a particular host, thereby giving that
|
|
host application access to the private data from the AppWidget app.
|
|
An application that has this permission should honor that contract.
|
|
<p>Not for use by third-party applications. -->
|
|
<permission android:name="android.permission.BIND_APPWIDGET"
|
|
android:permissionGroup="android.permission-group.PERSONAL_INFO"
|
|
android:label="@string/permlab_bindGadget"
|
|
android:description="@string/permdesc_bindGadget"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Private permission, to restrict who can bring up a dialog to add a new
|
|
keyguard widget
|
|
@hide -->
|
|
<permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
|
|
android:permissionGroup="android.permission-group.PERSONAL_INFO"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Internal permission allowing an application to query/set which
|
|
applications can bind AppWidgets.
|
|
@hide -->
|
|
<permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows applications to change the background data setting.
|
|
<p>Not for use by third-party applications.
|
|
@hide pending API council -->
|
|
<permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature"
|
|
android:description="@string/permdesc_changeBackgroundDataSetting"
|
|
android:label="@string/permlab_changeBackgroundDataSetting" />
|
|
|
|
<!-- This permission can be used on content providers to allow the global
|
|
search system to access their data. Typically it used when the
|
|
provider has some permissions protecting it (which global search
|
|
would not be expected to hold), and added as a read-only permission
|
|
to the path in the provider where global search queries are
|
|
performed. This permission can not be held by regular applications;
|
|
it is used by applications to protect themselves from everyone else
|
|
besides global search. -->
|
|
<permission android:name="android.permission.GLOBAL_SEARCH"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Internal permission protecting access to the global search
|
|
system: ensures that only the system can access the provider
|
|
to perform queries (since this otherwise provides unrestricted
|
|
access to a variety of content providers), and to write the
|
|
search statistics (to keep applications from gaming the source
|
|
ranking).
|
|
@hide -->
|
|
<permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows applications to set a live wallpaper.
|
|
@hide XXX Change to signature once the picker is moved to its
|
|
own apk as Ghod Intended. -->
|
|
<permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows applications to read dream settings and dream state.
|
|
@hide -->
|
|
<permission android:name="android.permission.READ_DREAM_STATE"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows applications to write dream settings, and start or stop dreaming.
|
|
@hide -->
|
|
<permission android:name="android.permission.WRITE_DREAM_STATE"
|
|
android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allow an application to read and write the cache partition.
|
|
@hide -->
|
|
<permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
|
|
android:label="@string/permlab_cache_filesystem"
|
|
android:description="@string/permdesc_cache_filesystem"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Must be required by default container service so that only
|
|
the system can bind to it and use it to copy
|
|
protected data to secure containers or files
|
|
accessible to the system.
|
|
@hide -->
|
|
<permission android:name="android.permission.COPY_PROTECTED_DATA"
|
|
android:label="@string/permlab_copyProtectedData"
|
|
android:description="@string/permlab_copyProtectedData"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Internal permission protecting access to the encryption methods
|
|
@hide
|
|
-->
|
|
<permission android:name="android.permission.CRYPT_KEEPER"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to read historical network usage for
|
|
specific networks and applications. @hide -->
|
|
<permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
|
|
android:label="@string/permlab_readNetworkUsageHistory"
|
|
android:description="@string/permdesc_readNetworkUsageHistory"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to manage network policies (such as warning and disable
|
|
limits) and to define application-specific rules. @hide -->
|
|
<permission android:name="android.permission.MANAGE_NETWORK_POLICY"
|
|
android:label="@string/permlab_manageNetworkPolicy"
|
|
android:description="@string/permdesc_manageNetworkPolicy"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows an application to account its network traffic against other UIDs. Used
|
|
by system services like download manager and media server. Not for use by
|
|
third party apps. @hide -->
|
|
<permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
|
|
android:label="@string/permlab_modifyNetworkAccounting"
|
|
android:description="@string/permdesc_modifyNetworkAccounting"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to mark traffic as from another user for per user routing.
|
|
Used by system wide services like media server that execute delegated network connections
|
|
for users.
|
|
@hide
|
|
-->
|
|
<permission android:name="android.permission.MARK_NETWORK_SOCKET"
|
|
android:label="@string/permlab_markNetworkSocket"
|
|
android:description="@string/permdesc_markNetworkSocket"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- C2DM permission.
|
|
@hide Used internally.
|
|
-->
|
|
<permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
|
|
android:protectionLevel="signature" />
|
|
<uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
|
|
|
|
<!-- @hide Package verifier needs to have this permission before the PackageManager will
|
|
trust it to verify packages.
|
|
-->
|
|
<permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
|
|
android:label="@string/permlab_packageVerificationAgent"
|
|
android:description="@string/permdesc_packageVerificationAgent"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Must be required by package verifier receiver, to ensure that only the
|
|
system can interact with it.
|
|
@hide
|
|
-->
|
|
<permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
|
|
android:label="@string/permlab_bindPackageVerifier"
|
|
android:description="@string/permdesc_bindPackageVerifier"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows applications to access serial ports via the SerialManager.
|
|
@hide -->
|
|
<permission android:name="android.permission.SERIAL_PORT"
|
|
android:label="@string/permlab_serialPort"
|
|
android:description="@string/permdesc_serialPort"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows the holder to access content providers from outside an ApplicationThread.
|
|
This permission is enforced by the ActivityManagerService on the corresponding APIs,
|
|
in particular ActivityManagerService#getContentProviderExternal(String) and
|
|
ActivityManagerService#removeContentProviderExternal(String).
|
|
@hide
|
|
-->
|
|
<permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
|
|
android:label="@string/permlab_accessContentProvidersExternally"
|
|
android:description="@string/permdesc_accessContentProvidersExternally"
|
|
android:protectionLevel="signature" />
|
|
<!-- Allows an application to hold an UpdateLock, recommending that a headless
|
|
OTA reboot *not* occur while the lock is held.
|
|
@hide -->
|
|
<permission android:name="android.permission.UPDATE_LOCK"
|
|
android:label="@string/permlab_updateLock"
|
|
android:description="@string/permdesc_updateLock"
|
|
android:protectionLevel="signatureOrSystem" />
|
|
|
|
<!-- Allows an application to read the current set of notifications, including
|
|
any metadata and intents attached.
|
|
@hide -->
|
|
<permission android:name="android.permission.ACCESS_NOTIFICATIONS"
|
|
android:label="@string/permlab_accessNotifications"
|
|
android:description="@string/permdesc_accessNotifications"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows access to keyguard secure storage. Only allowed for system processes.
|
|
@hide -->
|
|
<permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
|
|
android:protectionLevel="signature"
|
|
android:label="@string/permlab_access_keyguard_secure_storage"
|
|
android:description="@string/permdesc_access_keyguard_secure_storage" />
|
|
|
|
<!-- Allows an application to control keyguard. Only allowed for system processes.
|
|
@hide -->
|
|
<permission android:name="android.permission.CONTROL_KEYGUARD"
|
|
android:protectionLevel="signature"
|
|
android:label="@string/permlab_control_keyguard"
|
|
android:description="@string/permdesc_control_keyguard" />
|
|
|
|
<!-- Must be required by an {@link
|
|
android.service.notification.NotificationListenerService},
|
|
to ensure that only the system can bind to it. -->
|
|
<permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
|
|
android:label="@string/permlab_bindNotificationListenerService"
|
|
android:description="@string/permdesc_bindNotificationListenerService"
|
|
android:protectionLevel="signature" />
|
|
|
|
<!-- Allows an application to call into a carrier setup flow. It is up to the
|
|
carrier setup application to enforce that this permission is required
|
|
@hide This is not a third-party API (intended for OEMs and system apps). -->
|
|
<permission android:name="android.permission.INVOKE_CARRIER_SETUP"
|
|
android:label="@string/permlab_invokeCarrierSetup"
|
|
android:description="@string/permdesc_invokeCarrierSetup"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- Allows an application to listen for network condition observations.
|
|
@hide This is not a third-party API (intended for system apps). -->
|
|
<permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
|
|
android:label="@string/permlab_accessNetworkConditions"
|
|
android:description="@string/permdesc_accessNetworkConditions"
|
|
android:protectionLevel="signature|system" />
|
|
|
|
<!-- The system process is explicitly the only one allowed to launch the
|
|
confirmation UI for full backup/restore -->
|
|
<uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
|
|
|
|
<application android:process="system"
|
|
android:persistent="true"
|
|
android:hasCode="false"
|
|
android:label="@string/android_system_label"
|
|
android:allowClearUserData="false"
|
|
android:backupAgent="com.android.server.SystemBackupAgent"
|
|
android:killAfterRestore="false"
|
|
android:icon="@drawable/ic_launcher_android"
|
|
android:supportsRtl="true">
|
|
<activity android:name="com.android.internal.app.ChooserActivity"
|
|
android:theme="@style/Theme.Holo.Dialog.Alert"
|
|
android:finishOnCloseSystemDialogs="true"
|
|
android:excludeFromRecents="true"
|
|
android:multiprocess="true">
|
|
<intent-filter>
|
|
<action android:name="android.intent.action.CHOOSER" />
|
|
<category android:name="android.intent.category.DEFAULT" />
|
|
</intent-filter>
|
|
</activity>
|
|
<activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
|
|
android:theme="@style/Theme.Holo.Dialog"
|
|
android:label="@string/heavy_weight_switcher_title"
|
|
android:finishOnCloseSystemDialogs="true"
|
|
android:excludeFromRecents="true"
|
|
android:process=":ui">
|
|
</activity>
|
|
<activity android:name="com.android.internal.app.PlatLogoActivity"
|
|
android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
|
|
android:process=":ui">
|
|
</activity>
|
|
<activity android:name="com.android.internal.app.DisableCarModeActivity"
|
|
android:theme="@style/Theme.NoDisplay"
|
|
android:excludeFromRecents="true"
|
|
android:process=":ui">
|
|
</activity>
|
|
|
|
<activity android:name="android.accounts.ChooseAccountActivity"
|
|
android:excludeFromRecents="true"
|
|
android:exported="true"
|
|
android:theme="@android:style/Theme.Holo.Dialog"
|
|
android:label="@string/choose_account_label"
|
|
android:process=":ui">
|
|
</activity>
|
|
|
|
<activity android:name="android.accounts.ChooseTypeAndAccountActivity"
|
|
android:excludeFromRecents="true"
|
|
android:exported="true"
|
|
android:theme="@android:style/Theme.Holo.Dialog"
|
|
android:label="@string/choose_account_label"
|
|
android:process=":ui">
|
|
</activity>
|
|
|
|
<activity android:name="android.accounts.ChooseAccountTypeActivity"
|
|
android:excludeFromRecents="true"
|
|
android:theme="@android:style/Theme.Holo.Dialog"
|
|
android:label="@string/choose_account_label"
|
|
android:process=":ui">
|
|
</activity>
|
|
|
|
<activity android:name="android.accounts.CantAddAccountActivity"
|
|
android:excludeFromRecents="true"
|
|
android:exported="true"
|
|
android:theme="@android:style/Theme.Holo.Dialog.NoActionBar"
|
|
android:process=":ui">
|
|
</activity>
|
|
|
|
<activity android:name="android.accounts.GrantCredentialsPermissionActivity"
|
|
android:excludeFromRecents="true"
|
|
android:exported="true"
|
|
android:theme="@android:style/Theme.Holo.DialogWhenLarge"
|
|
android:process=":ui">
|
|
</activity>
|
|
|
|
<activity android:name="android.content.SyncActivityTooManyDeletes"
|
|
android:theme="@android:style/Theme.Holo.Dialog"
|
|
android:label="@string/sync_too_many_deletes"
|
|
android:process=":ui">
|
|
</activity>
|
|
|
|
<activity android:name="com.android.server.ShutdownActivity"
|
|
android:permission="android.permission.SHUTDOWN"
|
|
android:excludeFromRecents="true">
|
|
<intent-filter>
|
|
<action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" />
|
|
<category android:name="android.intent.category.DEFAULT" />
|
|
</intent-filter>
|
|
<intent-filter>
|
|
<action android:name="android.intent.action.REBOOT" />
|
|
<category android:name="android.intent.category.DEFAULT" />
|
|
</intent-filter>
|
|
</activity>
|
|
|
|
<activity android:name="com.android.internal.app.NetInitiatedActivity"
|
|
android:theme="@style/Theme.Holo.Dialog.Alert"
|
|
android:excludeFromRecents="true"
|
|
android:process=":ui">
|
|
</activity>
|
|
|
|
<activity android:name="com.android.internal.app.RestrictionsPinActivity"
|
|
android:theme="@style/Theme.Holo.Dialog.Alert"
|
|
android:excludeFromRecents="true"
|
|
android:windowSoftInputMode="adjustPan"
|
|
android:process=":ui">
|
|
<intent-filter android:priority="100">
|
|
<action android:name="android.intent.action.RESTRICTIONS_CHALLENGE" />
|
|
<category android:name="android.intent.category.DEFAULT" />
|
|
</intent-filter>
|
|
</activity>
|
|
|
|
<receiver android:name="com.android.server.BootReceiver"
|
|
android:primaryUserOnly="true">
|
|
<intent-filter>
|
|
<action android:name="android.intent.action.BOOT_COMPLETED" />
|
|
</intent-filter>
|
|
</receiver>
|
|
|
|
<receiver android:name="com.android.server.updates.CertPinInstallReceiver" >
|
|
<intent-filter>
|
|
<action android:name="android.intent.action.UPDATE_PINS" />
|
|
</intent-filter>
|
|
</receiver>
|
|
|
|
<receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" >
|
|
<intent-filter>
|
|
<action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
|
|
</intent-filter>
|
|
</receiver>
|
|
|
|
<receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" >
|
|
<intent-filter>
|
|
<action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
|
|
</intent-filter>
|
|
</receiver>
|
|
|
|
<receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" >
|
|
<intent-filter>
|
|
<action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
|
|
</intent-filter>
|
|
</receiver>
|
|
|
|
<receiver android:name="com.android.server.updates.TZInfoInstallReceiver" >
|
|
<intent-filter>
|
|
<action android:name="android.intent.action.UPDATE_TZINFO" />
|
|
</intent-filter>
|
|
</receiver>
|
|
|
|
<receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" >
|
|
<intent-filter>
|
|
<action android:name="android.intent.action.UPDATE_SEPOLICY" />
|
|
</intent-filter>
|
|
</receiver>
|
|
|
|
<receiver android:name="com.android.server.MasterClearReceiver"
|
|
android:permission="android.permission.MASTER_CLEAR">
|
|
<intent-filter
|
|
android:priority="100" >
|
|
<!-- For Checkin, Settings, etc.: action=MASTER_CLEAR -->
|
|
<action android:name="android.intent.action.MASTER_CLEAR" />
|
|
|
|
<!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
|
|
<action android:name="com.google.android.c2dm.intent.RECEIVE" />
|
|
<category android:name="android.intent.category.MASTER_CLEAR" />
|
|
</intent-filter>
|
|
</receiver>
|
|
|
|
<service android:name="com.android.internal.os.storage.ExternalStorageFormatter"
|
|
android:permission="android.permission.MASTER_CLEAR"
|
|
android:exported="true" />
|
|
|
|
<service android:name="android.hardware.location.GeofenceHardwareService"
|
|
android:permission="android.permission.LOCATION_HARDWARE"
|
|
android:exported="false" />
|
|
|
|
<service android:name="com.android.internal.backup.LocalTransportService"
|
|
android:permission="android.permission.CONFIRM_FULL_BACKUP"
|
|
android:exported="false">
|
|
<intent-filter>
|
|
<action android:name="android.backup.TRANSPORT_HOST" />
|
|
</intent-filter>
|
|
</service>
|
|
|
|
</application>
|
|
|
|
</manifest>
|