The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 1 | <?xml version="1.0" encoding="utf-8"?> |
| 2 | <!-- Copyright (C) 2008 The Android Open Source Project |
| 3 | |
| 4 | Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | you may not use this file except in compliance with the License. |
| 6 | You may obtain a copy of the License at |
| 7 | |
| 8 | http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | |
| 10 | Unless required by applicable law or agreed to in writing, software |
| 11 | distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | See the License for the specific language governing permissions and |
| 14 | limitations under the License. |
| 15 | --> |
| 16 | |
| 17 | <!-- This file is used to define the mappings between lower-level system |
| 18 | user and group IDs and the higher-level permission names managed |
| 19 | by the platform. |
| 20 | |
| 21 | Be VERY careful when editing this file! Mistakes made here can open |
| 22 | big security holes. |
| 23 | --> |
| 24 | <permissions> |
| 25 | |
| 26 | <!-- ================================================================== --> |
| 27 | <!-- ================================================================== --> |
| 28 | <!-- ================================================================== --> |
| 29 | |
| 30 | <!-- The following tags are associating low-level group IDs with |
| 31 | permission names. By specifying such a mapping, you are saying |
| 32 | that any application process granted the given permission will |
| 33 | also be running with the given group ID attached to its process, |
| 34 | so it can perform any filesystem (read, write, execute) operations |
| 35 | allowed for that group. --> |
| 36 | |
| 37 | <permission name="android.permission.BLUETOOTH_ADMIN" > |
| 38 | <group gid="net_bt_admin" /> |
| 39 | </permission> |
| 40 | |
| 41 | <permission name="android.permission.BLUETOOTH" > |
| 42 | <group gid="net_bt" /> |
| 43 | </permission> |
| 44 | |
Matthew Xie | fca9d63 | 2012-10-04 12:25:28 -0700 | [diff] [blame] | 45 | <permission name="android.permission.BLUETOOTH_STACK" > |
| 46 | <group gid="net_bt_stack" /> |
| 47 | </permission> |
| 48 | |
fredc | 0f42037 | 2012-04-12 00:02:00 -0700 | [diff] [blame] | 49 | <permission name="android.permission.NET_TUNNELING" > |
| 50 | <group gid="vpn" /> |
| 51 | </permission> |
| 52 | |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 53 | <permission name="android.permission.INTERNET" > |
| 54 | <group gid="inet" /> |
| 55 | </permission> |
| 56 | |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 57 | <permission name="android.permission.READ_LOGS" > |
| 58 | <group gid="log" /> |
| 59 | </permission> |
| 60 | |
Mike Lockwood | 1e23db4 | 2011-04-22 07:05:21 -0700 | [diff] [blame] | 61 | <permission name="android.permission.WRITE_MEDIA_STORAGE" > |
| 62 | <group gid="media_rw" /> |
Jeff Sharkey | 32e80d7 | 2015-07-06 09:45:55 -0700 | [diff] [blame] | 63 | <group gid="sdcard_rw" /> |
Mike Lockwood | 1e23db4 | 2011-04-22 07:05:21 -0700 | [diff] [blame] | 64 | </permission> |
| 65 | |
Mike Lockwood | 10bc111 | 2011-01-10 08:24:08 -0500 | [diff] [blame] | 66 | <permission name="android.permission.ACCESS_MTP" > |
| 67 | <group gid="mtp" /> |
| 68 | </permission> |
| 69 | |
Ramesh Sudini | 0e7b5a0 | 2011-03-28 09:18:31 -0500 | [diff] [blame] | 70 | <permission name="android.permission.NET_ADMIN" > |
| 71 | <group gid="net_admin" /> |
| 72 | </permission> |
| 73 | |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 74 | <!-- The group that /cache belongs to, linked to the permission |
| 75 | set on the applications that can access /cache --> |
| 76 | <permission name="android.permission.ACCESS_CACHE_FILESYSTEM" > |
| 77 | <group gid="cache" /> |
| 78 | </permission> |
| 79 | |
| 80 | <!-- RW permissions to any system resources owned by group 'diag'. |
| 81 | This is for carrier and manufacture diagnostics tools that must be |
| 82 | installable from the framework. Be careful. --> |
| 83 | <permission name="android.permission.DIAGNOSTIC" > |
| 84 | <group gid="input" /> |
| 85 | <group gid="diag" /> |
| 86 | </permission> |
| 87 | |
Jeff Sharkey | 9e18fd1 | 2011-05-02 17:51:29 -0700 | [diff] [blame] | 88 | <!-- Group that can read detailed network usage statistics --> |
| 89 | <permission name="android.permission.READ_NETWORK_USAGE_HISTORY"> |
| 90 | <group gid="net_bw_stats" /> |
| 91 | </permission> |
| 92 | |
| 93 | <!-- Group that can modify how network statistics are accounted --> |
| 94 | <permission name="android.permission.MODIFY_NETWORK_ACCOUNTING"> |
| 95 | <group gid="net_bw_acct" /> |
| 96 | </permission> |
| 97 | |
Doug Zongker | b616f0c | 2013-01-29 09:05:21 -0800 | [diff] [blame] | 98 | <permission name="android.permission.LOOP_RADIO" > |
| 99 | <group gid="loop_radio" /> |
| 100 | </permission> |
| 101 | |
Jeff Sharkey | 270e1f4 | 2014-10-01 16:02:05 -0700 | [diff] [blame] | 102 | <!-- Hotword training apps sometimes need a GID to talk with low-level |
| 103 | hardware; give them audio for now until full HAL support is added. --> |
| 104 | <permission name="android.permission.MANAGE_VOICE_KEYPHRASES"> |
| 105 | <group gid="audio" /> |
| 106 | </permission> |
| 107 | |
Benson Huang | 981258e | 2014-09-23 10:57:40 +0800 | [diff] [blame] | 108 | <permission name="android.permission.ACCESS_FM_RADIO" > |
| 109 | <group gid="media" /> |
| 110 | </permission> |
| 111 | |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 112 | <!-- ================================================================== --> |
| 113 | <!-- ================================================================== --> |
| 114 | <!-- ================================================================== --> |
| 115 | |
| 116 | <!-- The following tags are assigning high-level permissions to specific |
| 117 | user IDs. These are used to allow specific core system users to |
| 118 | perform the given operations with the higher-level framework. For |
| 119 | example, we give a wide variety of permissions to the shell user |
| 120 | since that is the user the adb shell runs under and developers and |
| 121 | others should have a fairly open environment in which to |
| 122 | interact with the system. --> |
| 123 | |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 124 | <assign-permission name="android.permission.MODIFY_AUDIO_SETTINGS" uid="media" /> |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 125 | <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="media" /> |
Eric Laurent | 6dbdc40 | 2011-07-22 09:04:31 -0700 | [diff] [blame] | 126 | <assign-permission name="android.permission.WAKE_LOCK" uid="media" /> |
Marco Nelissen | d983ba5 | 2013-10-03 08:49:36 -0700 | [diff] [blame] | 127 | <assign-permission name="android.permission.UPDATE_DEVICE_STATS" uid="media" /> |
Eino-Ville Talvala | 788717c | 2013-02-15 18:30:15 -0800 | [diff] [blame] | 128 | <assign-permission name="android.permission.UPDATE_APP_OPS_STATS" uid="media" /> |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 129 | |
Mathias Agopian | 627e7b5 | 2009-05-21 19:21:59 -0700 | [diff] [blame] | 130 | <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="graphics" /> |
| 131 | |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 132 | <!-- This is a list of all the libraries available for application |
| 133 | code to link against. --> |
| 134 | |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 135 | <library name="android.test.runner" |
| 136 | file="/system/framework/android.test.runner.jar" /> |
Tao Liejun | 05ff98bb | 2009-07-13 15:57:11 -0700 | [diff] [blame] | 137 | <library name="javax.obex" |
Narayan Kamath | 1ed78fb | 2015-01-20 13:44:23 +0000 | [diff] [blame] | 138 | file="/system/framework/javax.obex.jar" /> |
| 139 | <library name="org.apache.http.legacy" |
| 140 | file="/system/framework/org.apache.http.legacy.jar" /> |
| 141 | |
Dianne Hackborn | be7c50e | 2014-06-30 14:43:28 -0700 | [diff] [blame] | 142 | <!-- These are the standard packages that are white-listed to always have internet |
| 143 | access while in power save mode, even if they aren't in the foreground. --> |
Dianne Hackborn | 4a503b1 | 2015-08-06 22:19:06 -0700 | [diff] [blame] | 144 | <allow-in-power-save-except-idle package="com.android.providers.downloads" /> |
Dianne Hackborn | be7c50e | 2014-06-30 14:43:28 -0700 | [diff] [blame] | 145 | |
Fyodor Kupolov | 7db5af1 | 2015-07-31 16:50:27 -0700 | [diff] [blame] | 146 | <!-- These are the packages that shouldn't run as system user --> |
| 147 | <system-user-blacklisted-app package="com.android.wallpaper.livepicker" /> |
| 148 | <system-user-blacklisted-app package="com.android.settings" /> |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 149 | </permissions> |