auto import from //depot/cupcake/@135843
diff --git a/core/res/AndroidManifest.xml b/core/res/AndroidManifest.xml
new file mode 100644
index 0000000..e9db5f0
--- /dev/null
+++ b/core/res/AndroidManifest.xml
@@ -0,0 +1,1007 @@
+<?xml version="1.0" encoding="utf-8"?>
+<!--
+/* //device/apps/common/AndroidManifest.xml
+**
+** Copyright 2006, The Android Open Source Project
+**
+** Licensed under the Apache License, Version 2.0 (the "License");
+** you may not use this file except in compliance with the License.
+** You may obtain a copy of the License at
+**
+** http://www.apache.org/licenses/LICENSE-2.0
+**
+** Unless required by applicable law or agreed to in writing, software
+** distributed under the License is distributed on an "AS IS" BASIS,
+** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+** See the License for the specific language governing permissions and
+** limitations under the License.
+*/
+-->
+<manifest xmlns:android="http://schemas.android.com/apk/res/android"
+ package="android" android:sharedUserId="android.uid.system"
+ android:sharedUserLabel="@string/android_system_label">
+
+ <!-- ====================================== -->
+ <!-- Permissions for things that cost money -->
+ <!-- ====================================== -->
+ <eat-comment />
+
+ <!-- Used for permissions that can be used to make the user spend money
+ without their direct involvement. For example, this is the group
+ for permissions that allow you to directly place phone calls,
+ directly send SMS messages, etc. -->
+ <permission-group android:name="android.permission-group.COST_MONEY"
+ android:label="@string/permgrouplab_costMoney"
+ android:description="@string/permgroupdesc_costMoney" />
+
+ <!-- Allows an application to send SMS messages. -->
+ <permission android:name="android.permission.SEND_SMS"
+ android:permissionGroup="android.permission-group.COST_MONEY"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_sendSms"
+ android:description="@string/permdesc_sendSms" />
+
+ <!-- Allows an application to initiate a phone call without going through
+ the Dialer user interface for the user to confirm the call
+ being placed. -->
+ <permission android:name="android.permission.CALL_PHONE"
+ android:permissionGroup="android.permission-group.COST_MONEY"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_callPhone"
+ android:description="@string/permdesc_callPhone" />
+
+ <!-- ================================== -->
+ <!-- Permissions for accessing messages -->
+ <!-- ================================== -->
+ <eat-comment />
+
+ <!-- Used for permissions that allow an application to send messages
+ on behalf of the user or intercept messages being received by the
+ user. This is primarily intended for SMS/MMS messaging, such as
+ receiving or reading an MMS. -->
+ <permission-group android:name="android.permission-group.MESSAGES"
+ android:label="@string/permgrouplab_messages"
+ android:description="@string/permgroupdesc_messages" />
+
+ <!-- Allows an application to monitor incoming SMS messages, to record
+ or perform processing on them. -->
+ <permission android:name="android.permission.RECEIVE_SMS"
+ android:permissionGroup="android.permission-group.MESSAGES"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_receiveSms"
+ android:description="@string/permdesc_receiveSms" />
+
+ <!-- Allows an application to monitor incoming MMS messages, to record
+ or perform processing on them. -->
+ <permission android:name="android.permission.RECEIVE_MMS"
+ android:permissionGroup="android.permission-group.MESSAGES"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_receiveMms"
+ android:description="@string/permdesc_receiveMms" />
+
+ <!-- Allows an application to read SMS messages. -->
+ <permission android:name="android.permission.READ_SMS"
+ android:permissionGroup="android.permission-group.MESSAGES"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_readSms"
+ android:description="@string/permdesc_readSms" />
+
+ <!-- Allows an application to write SMS messages. -->
+ <permission android:name="android.permission.WRITE_SMS"
+ android:permissionGroup="android.permission-group.MESSAGES"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_writeSms"
+ android:description="@string/permdesc_writeSms" />
+
+ <!-- Allows an application to monitor incoming WAP push messages. -->
+ <permission android:name="android.permission.RECEIVE_WAP_PUSH"
+ android:permissionGroup="android.permission-group.MESSAGES"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_receiveWapPush"
+ android:description="@string/permdesc_receiveWapPush" />
+
+ <!-- =============================================================== -->
+ <!-- Permissions for accessing personal info (contacts and calendar) -->
+ <!-- =============================================================== -->
+ <eat-comment />
+
+ <!-- Used for permissions that provide access to the user's private data,
+ such as contacts, calendar events, e-mail messages, etc. This includes
+ both reading and writing of this data (which should generally be
+ expressed as two distinct permissions). -->
+ <permission-group android:name="android.permission-group.PERSONAL_INFO"
+ android:label="@string/permgrouplab_personalInfo"
+ android:description="@string/permgroupdesc_personalInfo" />
+
+ <!-- Allows an application to read the user's contacts data. -->
+ <permission android:name="android.permission.READ_CONTACTS"
+ android:permissionGroup="android.permission-group.PERSONAL_INFO"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_readContacts"
+ android:description="@string/permdesc_readContacts" />
+
+ <!-- Allows an application to write (but not read) the user's
+ contacts data. -->
+ <permission android:name="android.permission.WRITE_CONTACTS"
+ android:permissionGroup="android.permission-group.PERSONAL_INFO"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_writeContacts"
+ android:description="@string/permdesc_writeContacts" />
+
+ <!-- Allows an application to read the owner's data. -->
+ <permission android:name="android.permission.READ_OWNER_DATA"
+ android:permissionGroup="android.permission-group.PERSONAL_INFO"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_readOwnerData"
+ android:description="@string/permdesc_readOwnerData" />
+
+ <!-- Allows an application to write (but not read) the owner's data. -->
+ <permission android:name="android.permission.WRITE_OWNER_DATA"
+ android:permissionGroup="android.permission-group.PERSONAL_INFO"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_writeOwnerData"
+ android:description="@string/permdesc_writeOwnerData" />
+
+ <!-- Allows an application to read the user's calendar data. -->
+ <permission android:name="android.permission.READ_CALENDAR"
+ android:permissionGroup="android.permission-group.PERSONAL_INFO"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_readCalendar"
+ android:description="@string/permdesc_readCalendar" />
+
+ <!-- Allows an application to write (but not read) the user's
+ calendar data. -->
+ <permission android:name="android.permission.WRITE_CALENDAR"
+ android:permissionGroup="android.permission-group.PERSONAL_INFO"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_writeCalendar"
+ android:description="@string/permdesc_writeCalendar" />
+
+ <!-- Allows an application to read the user dictionary. This should
+ really only be required by an IME, or a dictionary editor like
+ the Settings app.
+ @hide Pending API council approval -->
+ <permission android:name="android.permission.READ_USER_DICTIONARY"
+ android:permissionGroup="android.permission-group.PERSONAL_INFO"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_readDictionary"
+ android:description="@string/permdesc_readDictionary" />
+
+ <!-- Allows an application to write to the user dictionary.
+ @hide Pending API council approval -->
+ <permission android:name="android.permission.WRITE_USER_DICTIONARY"
+ android:permissionGroup="android.permission-group.PERSONAL_INFO"
+ android:protectionLevel="normal"
+ android:label="@string/permlab_writeDictionary"
+ android:description="@string/permdesc_writeDictionary" />
+
+ <!-- ======================================= -->
+ <!-- Permissions for accessing location info -->
+ <!-- ======================================= -->
+ <eat-comment />
+
+ <!-- Used for permissions that allow access to the user's current
+ location. -->
+ <permission-group android:name="android.permission-group.LOCATION"
+ android:label="@string/permgrouplab_location"
+ android:description="@string/permgroupdesc_location" />
+
+ <!-- Allows an application to access fine (e.g., GPS) location -->
+ <permission android:name="android.permission.ACCESS_FINE_LOCATION"
+ android:permissionGroup="android.permission-group.LOCATION"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_accessFineLocation"
+ android:description="@string/permdesc_accessFineLocation" />
+
+ <!-- Allows an application to access coarse (e.g., Cell-ID, WiFi) location -->
+ <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
+ android:permissionGroup="android.permission-group.LOCATION"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_accessCoarseLocation"
+ android:description="@string/permdesc_accessCoarseLocation" />
+
+ <!-- Allows an application to create mock location providers for testing -->
+ <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
+ android:permissionGroup="android.permission-group.LOCATION"
+ android:label="@string/permlab_accessMockLocation"
+ android:description="@string/permdesc_accessMockLocation" />
+
+ <!-- Allows an application to access extra location provider commands -->
+ <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
+ android:permissionGroup="android.permission-group.LOCATION"
+ android:label="@string/permlab_accessLocationExtraCommands"
+ android:description="@string/permdesc_accessLocationExtraCommands" />
+
+ <!-- ======================================= -->
+ <!-- Permissions for accessing networks -->
+ <!-- ======================================= -->
+ <eat-comment />
+
+ <!-- Used for permissions that provide access to networking services. The
+ main permission here is internet access, but this is also an
+ appropriate group for accessing or modifying any network configuration
+ or other related network operations. -->
+ <permission-group android:name="android.permission-group.NETWORK"
+ android:label="@string/permgrouplab_network"
+ android:description="@string/permgroupdesc_network" />
+
+ <!-- Allows applications to open network sockets. -->
+ <permission android:name="android.permission.INTERNET"
+ android:permissionGroup="android.permission-group.NETWORK"
+ android:protectionLevel="dangerous"
+ android:description="@string/permdesc_createNetworkSockets"
+ android:label="@string/permlab_createNetworkSockets" />
+
+ <!-- Allows applications to access information about networks -->
+ <permission android:name="android.permission.ACCESS_NETWORK_STATE"
+ android:permissionGroup="android.permission-group.NETWORK"
+ android:protectionLevel="normal"
+ android:description="@string/permdesc_accessNetworkState"
+ android:label="@string/permlab_accessNetworkState" />
+
+ <!-- Allows applications to access information about Wi-Fi networks -->
+ <permission android:name="android.permission.ACCESS_WIFI_STATE"
+ android:permissionGroup="android.permission-group.NETWORK"
+ android:protectionLevel="normal"
+ android:description="@string/permdesc_accessWifiState"
+ android:label="@string/permlab_accessWifiState" />
+
+ <!-- Allows applications to connect to paired bluetooth devices -->
+ <permission android:name="android.permission.BLUETOOTH"
+ android:permissionGroup="android.permission-group.NETWORK"
+ android:protectionLevel="dangerous"
+ android:description="@string/permdesc_bluetooth"
+ android:label="@string/permlab_bluetooth" />
+
+ <!-- ================================== -->
+ <!-- Permissions for accessing accounts -->
+ <!-- ================================== -->
+ <eat-comment />
+
+ <!-- Permissions for direct access to Google accounts.
+ Note that while right now this is only used for Google accounts,
+ we expect in the future to have a more general account management
+ facility so this is specified as a general platform permission
+ group for accessing accounts. -->
+ <permission-group android:name="android.permission-group.ACCOUNTS"
+ android:label="@string/permgrouplab_accounts"
+ android:description="@string/permgroupdesc_accounts" />
+
+ <!-- Allows access to the list of accounts in the Accounts Service -->
+ <permission android:name="android.permission.GET_ACCOUNTS"
+ android:permissionGroup="android.permission-group.ACCOUNTS"
+ android:protectionLevel="normal"
+ android:description="@string/permdesc_getAccounts"
+ android:label="@string/permlab_getAccounts" />
+
+ <!-- ================================== -->
+ <!-- Permissions for accessing hardware -->
+ <!-- ================================== -->
+ <eat-comment />
+
+ <!-- Used for permissions that provide direct access to the hardware on
+ the device. This includes audio, the camera, vibrator, etc. -->
+ <permission-group android:name="android.permission-group.HARDWARE_CONTROLS"
+ android:label="@string/permgrouplab_hardwareControls"
+ android:description="@string/permgroupdesc_hardwareControls" />
+
+ <!-- Allows an application to modify global audio settings -->
+ <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
+ android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_modifyAudioSettings"
+ android:description="@string/permdesc_modifyAudioSettings" />
+
+ <!-- Allows an application to record audio -->
+ <permission android:name="android.permission.RECORD_AUDIO"
+ android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_recordAudio"
+ android:description="@string/permdesc_recordAudio" />
+
+ <!-- Required to be able to access the camera device. -->
+ <permission android:name="android.permission.CAMERA"
+ android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_camera"
+ android:description="@string/permdesc_camera" />
+
+ <!-- Allows access to the vibrator -->
+ <permission android:name="android.permission.VIBRATE"
+ android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
+ android:protectionLevel="normal"
+ android:label="@string/permlab_vibrate"
+ android:description="@string/permdesc_vibrate" />
+
+ <!-- Allows access to the flashlight -->
+ <permission android:name="android.permission.FLASHLIGHT"
+ android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
+ android:protectionLevel="normal"
+ android:label="@string/permlab_flashlight"
+ android:description="@string/permdesc_flashlight" />
+
+ <!-- Allows access to hardware peripherals. Intended only for hardware testing -->
+ <permission android:name="android.permission.HARDWARE_TEST"
+ android:permissionGroup="android.permission-group.HARDWARE_CONTROLS"
+ android:protectionLevel="signature"
+ android:label="@string/permlab_hardware_test"
+ android:description="@string/permdesc_hardware_test" />
+
+ <!-- =========================================== -->
+ <!-- Permissions associated with telephony state -->
+ <!-- =========================================== -->
+ <eat-comment />
+
+ <!-- Used for permissions that are associated with accessing and modifyign
+ telephony state: intercepting outgoing calls, reading
+ and modifying the phone state. Note that
+ placing phone calls is not in this group, since that is in the
+ more important "takin' yer moneys" group. -->
+ <permission-group android:name="android.permission-group.PHONE_CALLS"
+ android:label="@string/permgrouplab_phoneCalls"
+ android:description="@string/permgroupdesc_phoneCalls" />
+
+ <!-- Allows an application to monitor, modify, or abort outgoing
+ calls. -->
+ <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
+ android:permissionGroup="android.permission-group.PHONE_CALLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_processOutgoingCalls"
+ android:description="@string/permdesc_processOutgoingCalls" />
+
+ <!-- Allows modification of the telephony state - power on, mmi, etc.
+ Does not include placing calls. -->
+ <permission android:name="android.permission.MODIFY_PHONE_STATE"
+ android:permissionGroup="android.permission-group.PHONE_CALLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_modifyPhoneState"
+ android:description="@string/permdesc_modifyPhoneState" />
+
+ <!-- Allows read only access to phone state. -->
+ <permission android:name="android.permission.READ_PHONE_STATE"
+ android:permissionGroup="android.permission-group.PHONE_CALLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_readPhoneState"
+ android:description="@string/permdesc_readPhoneState" />
+
+ <!-- ============================================ -->
+ <!-- Permissions for low-level system interaction -->
+ <!-- ============================================ -->
+ <eat-comment />
+
+ <!-- Group of permissions that are related to system APIs. Many
+ of these are not permissions the user will be expected to understand,
+ and such permissions should generally be marked as "normal" protection
+ level so they don't get displayed. This can also, however, be used
+ for miscellaneous features that provide access to the operating system,
+ such as writing the global system settings. -->
+ <permission-group android:name="android.permission-group.SYSTEM_TOOLS"
+ android:label="@string/permgrouplab_systemTools"
+ android:description="@string/permgroupdesc_systemTools" />
+
+ <!-- Allows an application to read or write the system settings. -->
+ <permission android:name="android.permission.WRITE_SETTINGS"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_writeSettings"
+ android:description="@string/permdesc_writeSettings" />
+
+ <!-- Allows an application to read or write the secure system settings. -->
+ <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
+ android:protectionLevel="signatureOrSystem"
+ android:label="@string/permlab_writeSecureSettings"
+ android:description="@string/permdesc_writeSecureSettings" />
+
+ <!-- Allows an application to modify the Google service map. -->
+ <permission android:name="android.permission.WRITE_GSERVICES"
+ android:protectionLevel="signature"
+ android:label="@string/permlab_writeGservices"
+ android:description="@string/permdesc_writeGservices" />
+
+ <!-- Allows an application to expand or collapse the status bar. -->
+ <permission android:name="android.permission.EXPAND_STATUS_BAR"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="normal"
+ android:label="@string/permlab_expandStatusBar"
+ android:description="@string/permdesc_expandStatusBar" />
+
+ <!-- Allows an application to get information about the currently
+ or recently running tasks: a thumbnail representation of the tasks,
+ what activities are running in it, etc. -->
+ <permission android:name="android.permission.GET_TASKS"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_getTasks"
+ android:description="@string/permdesc_getTasks" />
+
+ <!-- Allows an application to change the Z-order of tasks -->
+ <permission android:name="android.permission.REORDER_TASKS"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_reorderTasks"
+ android:description="@string/permdesc_reorderTasks" />
+
+ <!-- Allows an application to modify the current configuration, such
+ as locale. -->
+ <permission android:name="android.permission.CHANGE_CONFIGURATION"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_changeConfiguration"
+ android:description="@string/permdesc_changeConfiguration" />
+
+ <!-- Allows an application to restart other applications. -->
+ <permission android:name="android.permission.RESTART_PACKAGES"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_restartPackages"
+ android:description="@string/permdesc_restartPackages" />
+
+ <!-- Allows an application to retrieve state dump information from system
+ services. -->
+ <permission android:name="android.permission.DUMP"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_dump"
+ android:description="@string/permdesc_dump" />
+
+ <!-- Allows an application to open windows using the type
+ {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT},
+ shown on top of all other applications. Very few applications
+ should use this permission; these windows are intended for
+ system-level interaction with the user. -->
+ <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_systemAlertWindow"
+ android:description="@string/permdesc_systemAlertWindow" />
+
+ <!-- Modify the global animation scaling factor. -->
+ <permission android:name="android.permission.SET_ANIMATION_SCALE"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_setAnimationScale"
+ android:description="@string/permdesc_setAnimationScale" />
+
+ <!-- Allow an application to make its activities persistent. -->
+ <permission android:name="android.permission.PERSISTENT_ACTIVITY"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_persistentActivity"
+ android:description="@string/permdesc_persistentActivity" />
+
+ <!-- Allows an application to find out the space used by any package. -->
+ <permission android:name="android.permission.GET_PACKAGE_SIZE"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="normal"
+ android:label="@string/permlab_getPackageSize"
+ android:description="@string/permdesc_getPackageSize" />
+
+ <!-- Allows an application to modify the list of preferred applications
+ with the {@link android.content.pm.PackageManager#addPackageToPreferred
+ PackageManager.addPackageToPreferred()} and
+ {@link android.content.pm.PackageManager#removePackageFromPreferred
+ PackageManager.removePackageFromPreferred()} methods. -->
+ <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_setPreferredApplications"
+ android:description="@string/permdesc_setPreferredApplications" />
+
+ <!-- Allows an application to receive the
+ {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
+ broadcast after the system finishes booting. If you don't
+ request this permission, you will not receive the broadcast at
+ that time. Though holding this permission does not have any
+ security implications, it can have a negative impact on the
+ user experience by increasing the amount of time it takes the
+ system to start and allowing applications to have themselves
+ running without the user being aware of them. As such, you must
+ explicitly declare your use of this facility to make that visible
+ to the user. -->
+ <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="normal"
+ android:label="@string/permlab_receiveBootCompleted"
+ android:description="@string/permdesc_receiveBootCompleted" />
+
+ <!-- Allows an application to broadcast sticky intents. These are
+ broadcasts whose data is held by the system after being finished,
+ so that clients can quickly retrieve that data without having
+ to wait for the next broadcast. -->
+ <permission android:name="android.permission.BROADCAST_STICKY"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="normal"
+ android:label="@string/permlab_broadcastSticky"
+ android:description="@string/permdesc_broadcastSticky" />
+
+ <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
+ from dimming -->
+ <permission android:name="android.permission.WAKE_LOCK"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_wakeLock"
+ android:description="@string/permdesc_wakeLock" />
+
+ <!-- Allows applications to set the wallpaper -->
+ <permission android:name="android.permission.SET_WALLPAPER"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="normal"
+ android:label="@string/permlab_setWallpaper"
+ android:description="@string/permdesc_setWallpaper" />
+
+ <!-- Allows applications to set the wallpaper hints -->
+ <permission android:name="android.permission.SET_WALLPAPER_HINTS"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="normal"
+ android:label="@string/permlab_setWallpaperHints"
+ android:description="@string/permdesc_setWallpaperHints" />
+
+ <!-- Allows applications to set the system time zone -->
+ <permission android:name="android.permission.SET_TIME_ZONE"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_setTimeZone"
+ android:description="@string/permdesc_setTimeZone" />
+
+ <!-- Allows mounting and unmounting file systems for removable storage. -->
+ <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_mount_unmount_filesystems"
+ android:description="@string/permdesc_mount_unmount_filesystems" />
+
+ <!-- Allows formatting file systems for removable storage. -->
+ <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_mount_format_filesystems"
+ android:description="@string/permdesc_mount_format_filesystems" />
+
+ <!-- Allows applications to disable the keyguard -->
+ <permission android:name="android.permission.DISABLE_KEYGUARD"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="normal"
+ android:description="@string/permdesc_disableKeyguard"
+ android:label="@string/permlab_disableKeyguard" />
+
+ <!-- Allows applications to read the sync settings -->
+ <permission android:name="android.permission.READ_SYNC_SETTINGS"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="normal"
+ android:description="@string/permdesc_readSyncSettings"
+ android:label="@string/permlab_readSyncSettings" />
+
+ <!-- Allows applications to write the sync settings -->
+ <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:description="@string/permdesc_writeSyncSettings"
+ android:label="@string/permlab_writeSyncSettings" />
+
+ <!-- Allows applications to read the sync stats -->
+ <permission android:name="android.permission.READ_SYNC_STATS"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="normal"
+ android:description="@string/permdesc_readSyncStats"
+ android:label="@string/permlab_readSyncStats" />
+
+ <!-- Allows applications to write the apn settings -->
+ <permission android:name="android.permission.WRITE_APN_SETTINGS"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:description="@string/permdesc_writeApnSettings"
+ android:label="@string/permlab_writeApnSettings" />
+
+ <!-- Allows an application to allow access the subscribed feeds
+ ContentProvider. -->
+ <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:label="@string/permlab_subscribedFeedsRead"
+ android:description="@string/permdesc_subscribedFeedsRead"
+ android:protectionLevel="normal" />
+ <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:label="@string/permlab_subscribedFeedsWrite"
+ android:description="@string/permdesc_subscribedFeedsWrite"
+ android:protectionLevel="dangerous" />
+
+ <!-- Allows applications to change network connectivity state -->
+ <permission android:name="android.permission.CHANGE_NETWORK_STATE"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:description="@string/permdesc_changeNetworkState"
+ android:label="@string/permlab_changeNetworkState" />
+
+ <!-- Allows applications to change Wi-Fi connectivity state -->
+ <permission android:name="android.permission.CHANGE_WIFI_STATE"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:description="@string/permdesc_changeWifiState"
+ android:label="@string/permlab_changeWifiState" />
+
+ <!-- Allows applications to discover and pair bluetooth devices -->
+ <permission android:name="android.permission.BLUETOOTH_ADMIN"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:description="@string/permdesc_bluetoothAdmin"
+ android:label="@string/permlab_bluetoothAdmin" />
+
+ <!-- Allows an application to clear the caches of all installed
+ applications on the device. -->
+ <permission android:name="android.permission.CLEAR_APP_CACHE"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_clearAppCache"
+ android:description="@string/permdesc_clearAppCache" />
+
+ <!-- Allows an application to read the low-level system log files.
+ These can contain slightly private information about what is
+ happening on the device, but should never contain the user's
+ private information. -->
+ <permission android:name="android.permission.READ_LOGS"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_readLogs"
+ android:description="@string/permdesc_readLogs" />
+
+ <!-- ========================================= -->
+ <!-- Permissions for special development tools -->
+ <!-- ========================================= -->
+ <eat-comment />
+
+ <!-- Group of permissions that are related to development features. These
+ are not permissions that should appear in normal applications; they
+ protect APIs that are intended only to be used for development
+ purposes. -->
+ <permission-group android:name="android.permission-group.DEVELOPMENT_TOOLS"
+ android:label="@string/permgrouplab_developmentTools"
+ android:description="@string/permgroupdesc_developmentTools" />
+
+ <!-- Configure an application for debugging. -->
+ <permission android:name="android.permission.SET_DEBUG_APP"
+ android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_setDebugApp"
+ android:description="@string/permdesc_setDebugApp" />
+
+ <!-- Allows an application to set the maximum number of (not needed)
+ application processes that can be running. -->
+ <permission android:name="android.permission.SET_PROCESS_LIMIT"
+ android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_setProcessLimit"
+ android:description="@string/permdesc_setProcessLimit" />
+
+ <!-- Allows an application to control whether activities are immediately
+ finished when put in the background. -->
+ <permission android:name="android.permission.SET_ALWAYS_FINISH"
+ android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_setAlwaysFinish"
+ android:description="@string/permdesc_setAlwaysFinish" />
+
+ <!-- Allow an application to request that a signal be sent to all persistent processes -->
+ <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
+ android:permissionGroup="android.permission-group.DEVELOPMENT_TOOLS"
+ android:protectionLevel="dangerous"
+ android:label="@string/permlab_signalPersistentProcesses"
+ android:description="@string/permdesc_signalPersistentProcesses" />
+
+ <!-- ==================================== -->
+ <!-- Private (signature-only) permissions -->
+ <!-- ==================================== -->
+ <eat-comment />
+
+ <!-- Allows applications to RW to diagnostic resources. -->
+ <permission android:name="android.permission.DIAGNOSTIC"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="signature"
+ android:description="@string/permdesc_diagnostic"
+ android:label="@string/permlab_diagnostic" />
+
+ <!-- Allows an application to open, close, or disable the status bar
+ and its icons. -->
+ <permission android:name="android.permission.STATUS_BAR"
+ android:label="@string/permlab_statusBar"
+ android:description="@string/permdesc_statusBar"
+ android:protectionLevel="signatureOrSystem" />
+
+ <!-- Allows an application to force any currently running process to be
+ in the foreground. -->
+ <permission android:name="android.permission.SET_PROCESS_FOREGROUND"
+ android:label="@string/permlab_setProcessForeground"
+ android:description="@string/permdesc_setProcessForeground"
+ android:protectionLevel="signature" />
+
+ <!-- Allows an application to force a BACK operation on whatever is the
+ top activity. -->
+ <permission android:name="android.permission.FORCE_BACK"
+ android:label="@string/permlab_forceBack"
+ android:description="@string/permdesc_forceBack"
+ android:protectionLevel="signature" />
+
+ <!-- Allows an application to publish system-level services. Such services
+ can only be published from processes that never go away, so this is
+ not something that any normal application can do. -->
+ <permission android:name="android.permission.ADD_SYSTEM_SERVICE"
+ android:label="@string/permlab_addSystemService"
+ android:description="@string/permdesc_addSystemService"
+ android:protectionLevel="signature" />
+
+ <permission android:name="android.permission.FOTA_UPDATE"
+ android:label="@string/permlab_fotaUpdate"
+ android:description="@string/permdesc_fotaUpdate"
+ android:protectionLevel="signature" />
+
+ <!-- Allows an application to update device statistics. Not for
+ use by third party apps. -->
+ <permission android:name="android.permission.UPDATE_DEVICE_STATS"
+ android:label="@string/permlab_batteryStats"
+ android:description="@string/permdesc_batteryStats"
+ android:protectionLevel="signature" />
+
+ <!-- Allows an application to open windows that are for use by parts
+ of the system user interface. Not for use by third party apps. -->
+ <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
+ android:label="@string/permlab_internalSystemWindow"
+ android:description="@string/permdesc_internalSystemWindow"
+ android:protectionLevel="signature" />
+
+ <!-- Allows an application to manage (create, destroy,
+ Z-order) application tokens in the window manager. This is only
+ for use by the system. -->
+ <permission android:name="android.permission.MANAGE_APP_TOKENS"
+ android:label="@string/permlab_manageAppTokens"
+ android:description="@string/permdesc_manageAppTokens"
+ android:protectionLevel="signature" />
+
+ <!-- Allows an application to inject user events (keys, touch, trackball)
+ into the event stream and deliver them to ANY window. Without this
+ permission, you can only deliver events to windows in your own process.
+ Very few applications should need to use this permission. -->
+ <permission android:name="android.permission.INJECT_EVENTS"
+ android:label="@string/permlab_injectEvents"
+ android:description="@string/permdesc_injectEvents"
+ android:protectionLevel="signature" />
+
+ <!-- Allows an application to watch and control how activities are
+ started globally in the system. Only for is in debugging
+ (usually the monkey command). -->
+ <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
+ android:label="@string/permlab_runSetActivityWatcher"
+ android:description="@string/permdesc_runSetActivityWatcher"
+ android:protectionLevel="signature" />
+
+ <!-- Allows an application to retrieve the current state of keys and
+ switches. This is only for use by the system.-->
+ <permission android:name="android.permission.READ_INPUT_STATE"
+ android:label="@string/permlab_readInputState"
+ android:description="@string/permdesc_readInputState"
+ android:protectionLevel="signature" />
+
+ <!-- Must be required by input method services, to ensure that only the
+ system can bind to them. -->
+ <permission android:name="android.permission.BIND_INPUT_METHOD"
+ android:label="@string/permlab_bindInputMethod"
+ android:description="@string/permdesc_bindInputMethod"
+ android:protectionLevel="signature" />
+
+ <!-- Allows low-level access to setting the orientation (actually
+ rotation) of the screen. Not for use by normal applications. -->
+ <permission android:name="android.permission.SET_ORIENTATION"
+ android:label="@string/permlab_setOrientation"
+ android:description="@string/permdesc_setOrientation"
+ android:protectionLevel="signature" />
+
+ <!-- Allows an application to install packages. -->
+ <permission android:name="android.permission.INSTALL_PACKAGES"
+ android:label="@string/permlab_installPackages"
+ android:description="@string/permdesc_installPackages"
+ android:protectionLevel="signature" />
+
+ <!-- Allows an application to clear user data -->
+ <permission android:name="android.permission.CLEAR_APP_USER_DATA"
+ android:label="@string/permlab_clearAppUserData"
+ android:description="@string/permdesc_clearAppUserData"
+ android:protectionLevel="signature" />
+
+ <!-- Allows an application to delete cache files. -->
+ <permission android:name="android.permission.DELETE_CACHE_FILES"
+ android:label="@string/permlab_deleteCacheFiles"
+ android:description="@string/permdesc_deleteCacheFiles"
+ android:protectionLevel="signature" />
+
+ <!-- Allows an application to delete packages. -->
+ <permission android:name="android.permission.DELETE_PACKAGES"
+ android:label="@string/permlab_deletePackages"
+ android:description="@string/permdesc_deletePackages"
+ android:protectionLevel="signature" />
+
+ <!-- Allows an application to change whether an application component (other than its own) is
+ enabled or not. -->
+ <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
+ android:label="@string/permlab_changeComponentState"
+ android:description="@string/permdesc_changeComponentState"
+ android:protectionLevel="signature" />
+
+ <!-- Allows an application to use SurfaceFlinger's low level features -->
+ <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
+ android:label="@string/permlab_accessSurfaceFlinger"
+ android:description="@string/permdesc_accessSurfaceFlinger"
+ android:protectionLevel="signature" />
+
+ <!-- Allows an application to take screen shots and more generally
+ get access to the frame buffer data -->
+ <permission android:name="android.permission.READ_FRAME_BUFFER"
+ android:label="@string/permlab_readFrameBuffer"
+ android:description="@string/permdesc_readFrameBuffer"
+ android:protectionLevel="signature" />
+
+ <!-- Required to be able to disable the device (very dangerous!). -->
+ <permission android:name="android.permission.BRICK"
+ android:label="@string/permlab_brick"
+ android:description="@string/permdesc_brick"
+ android:protectionLevel="signature" />
+
+ <!-- Required to be able to reboot the device. -->
+ <permission android:name="android.permission.REBOOT"
+ android:label="@string/permlab_reboot"
+ android:description="@string/permdesc_reboot"
+ android:protectionLevel="signature" />
+
+ <!-- Allows low-level access to power management -->
+ <permission android:name="android.permission.DEVICE_POWER"
+ android:label="@string/permlab_devicePower"
+ android:description="@string/permdesc_devicePower"
+ android:protectionLevel="signature" />
+
+ <!-- Run as a manufacturer test application, running as the root user.
+ Only available when the device is running in manufacturer test mode. -->
+ <permission android:name="android.permission.FACTORY_TEST"
+ android:label="@string/permlab_factoryTest"
+ android:description="@string/permdesc_factoryTest"
+ android:protectionLevel="signature" />
+
+ <!-- Allows an application to broadcast a notification that an application
+ package has been removed. -->
+ <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:label="@string/permlab_broadcastPackageRemoved"
+ android:description="@string/permdesc_broadcastPackageRemoved"
+ android:protectionLevel="signature" />
+
+ <!-- Allows an application to broadcast an SMS receipt notification -->
+ <permission android:name="android.permission.BROADCAST_SMS"
+ android:permissionGroup="android.permission-group.MESSAGES"
+ android:label="@string/permlab_broadcastSmsReceived"
+ android:description="@string/permdesc_broadcastSmsReceived"
+ android:protectionLevel="signature" />
+
+ <!-- Allows an application to broadcast a WAP PUSH receipt notification -->
+ <permission android:name="android.permission.BROADCAST_WAP_PUSH"
+ android:permissionGroup="android.permission-group.MESSAGES"
+ android:label="@string/permlab_broadcastWapPush"
+ android:description="@string/permdesc_broadcastWapPush"
+ android:protectionLevel="signature" />
+
+ <permission android:name="android.permission.MASTER_CLEAR"
+ android:label="@string/permlab_masterClear"
+ android:description="@string/permdesc_masterClear"
+ android:protectionLevel="signatureOrSystem" />
+
+ <!-- Allows an application to call any phone number, including emergency
+ numbers, without going through the Dialer user interface for the user
+ to confirm the call being placed. -->
+ <permission android:name="android.permission.CALL_PRIVILEGED"
+ android:label="@string/permlab_callPrivileged"
+ android:description="@string/permdesc_callPrivileged"
+ android:protectionLevel="signatureOrSystem" />
+
+ <!-- Allows enabling/disabling location update notifications from
+ the radio. Not for use by normal applications. -->
+ <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
+ android:label="@string/permlab_locationUpdates"
+ android:description="@string/permdesc_locationUpdates"
+ android:protectionLevel="signature" />
+
+ <!-- Allows read/write access to the "properties" table in the checkin
+ database, to change values that get uploaded. -->
+ <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
+ android:label="@string/permlab_checkinProperties"
+ android:description="@string/permdesc_checkinProperties"
+ android:protectionLevel="signature" />
+
+ <!-- Allows an application to collect component usage
+ statistics -->
+ <permission android:name="android.permission.PACKAGE_USAGE_STATS"
+ android:label="@string/permlab_pkgUsageStats"
+ android:description="@string/permdesc_pkgUsageStats"
+ android:protectionLevel="normal" />
+
+ <!-- Allows an application to collect battery statistics -->
+ <permission android:name="android.permission.BATTERY_STATS"
+ android:label="@string/permlab_batteryStats"
+ android:description="@string/permdesc_batteryStats"
+ android:protectionLevel="normal" />
+
+ <!-- Allows an application to tell the gadget service which application
+ can access gadget's data. The normal user flow is that a user
+ picks a gadget to go into a particular host, thereby giving that
+ host application access to the private data from the gadget app.
+ An application that has this permission should honor that contract.
+ Very few applications should need to use this permission. -->
+ <permission android:name="android.permission.BIND_GADGET"
+ android:permissionGroup="android.permission-group.PERSONAL_INFO"
+ android:label="@string/permlab_bindGadget"
+ android:description="@string/permdesc_bindGadget"
+ android:protectionLevel="signature" />
+
+ <!-- Allows applications to change the background data setting
+ @hide pending API council -->
+ <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
+ android:permissionGroup="android.permission-group.SYSTEM_TOOLS"
+ android:protectionLevel="signature"
+ android:description="@string/permdesc_changeBackgroundDataSetting"
+ android:label="@string/permlab_changeBackgroundDataSetting" />
+
+ <application android:process="system"
+ android:persistent="true"
+ android:hasCode="false"
+ android:label="@string/android_system_label"
+ android:allowClearUserData="false"
+ android:icon="@drawable/ic_launcher_android">
+ <activity android:name="com.android.internal.app.ChooserActivity"
+ android:theme="@style/Theme.Dialog.Alert"
+ android:excludeFromRecents="true"
+ android:multiprocess="true">
+ <intent-filter>
+ <action android:name="android.intent.action.CHOOSER" />
+ <category android:name="android.intent.category.DEFAULT" />
+ </intent-filter>
+ </activity>
+ <activity android:name="com.android.internal.app.RingtonePickerActivity"
+ android:theme="@style/Theme.Dialog.Alert"
+ android:excludeFromRecents="true"
+ android:multiprocess="true">
+ <intent-filter>
+ <action android:name="android.intent.action.RINGTONE_PICKER" />
+ <category android:name="android.intent.category.DEFAULT" />
+ </intent-filter>
+ </activity>
+ <activity android:name="com.android.internal.app.UsbStorageActivity"
+ android:theme="@style/Theme.Dialog.Alert"
+ android:excludeFromRecents="true">
+ </activity>
+ <activity android:name="com.android.internal.app.UsbStorageStopActivity"
+ android:theme="@style/Theme.Dialog.Alert"
+ android:excludeFromRecents="true">
+ </activity>
+ <activity android:name="com.android.internal.app.ExternalMediaFormatActivity"
+ android:theme="@style/Theme.Dialog.Alert"
+ android:excludeFromRecents="true">
+ </activity>
+
+ <provider android:name=".content.SyncProvider"
+ android:authorities="sync" android:multiprocess="false" />
+
+ <service android:name="com.android.server.LoadAverageService"
+ android:exported="true" />
+
+ <receiver android:name="com.android.server.BootReceiver" >
+ <intent-filter>
+ <action android:name="android.intent.action.BOOT_COMPLETED" />
+ </intent-filter>
+ </receiver>
+
+ <receiver android:name="com.android.server.MasterClearReceiver"
+ android:permission="android.permission.MASTER_CLEAR" >
+ <intent-filter>
+ <action android:name="android.intent.action.GTALK_DATA_MESSAGE_RECEIVED" />
+ <category android:name="android.intent.category.MASTER_CLEAR" />
+ </intent-filter>
+ </receiver>
+ </application>
+
+</manifest>
+
+