The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 1 | <?xml version="1.0" encoding="utf-8"?> |
| 2 | <!-- Copyright (C) 2008 The Android Open Source Project |
| 3 | |
| 4 | Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | you may not use this file except in compliance with the License. |
| 6 | You may obtain a copy of the License at |
Chien-Yu Chen | 75cade0 | 2016-01-11 10:56:21 -0800 | [diff] [blame] | 7 | |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 8 | http://www.apache.org/licenses/LICENSE-2.0 |
Chien-Yu Chen | 75cade0 | 2016-01-11 10:56:21 -0800 | [diff] [blame] | 9 | |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 10 | Unless required by applicable law or agreed to in writing, software |
| 11 | distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | See the License for the specific language governing permissions and |
| 14 | limitations under the License. |
| 15 | --> |
| 16 | |
| 17 | <!-- This file is used to define the mappings between lower-level system |
| 18 | user and group IDs and the higher-level permission names managed |
| 19 | by the platform. |
| 20 | |
| 21 | Be VERY careful when editing this file! Mistakes made here can open |
| 22 | big security holes. |
| 23 | --> |
| 24 | <permissions> |
| 25 | |
| 26 | <!-- ================================================================== --> |
| 27 | <!-- ================================================================== --> |
| 28 | <!-- ================================================================== --> |
| 29 | |
| 30 | <!-- The following tags are associating low-level group IDs with |
| 31 | permission names. By specifying such a mapping, you are saying |
| 32 | that any application process granted the given permission will |
| 33 | also be running with the given group ID attached to its process, |
| 34 | so it can perform any filesystem (read, write, execute) operations |
| 35 | allowed for that group. --> |
| 36 | |
| 37 | <permission name="android.permission.BLUETOOTH_ADMIN" > |
| 38 | <group gid="net_bt_admin" /> |
| 39 | </permission> |
| 40 | |
| 41 | <permission name="android.permission.BLUETOOTH" > |
| 42 | <group gid="net_bt" /> |
| 43 | </permission> |
| 44 | |
Matthew Xie | fca9d63 | 2012-10-04 12:25:28 -0700 | [diff] [blame] | 45 | <permission name="android.permission.BLUETOOTH_STACK" > |
Ajay Panicker | 35cb698 | 2016-09-20 11:18:14 -0700 | [diff] [blame] | 46 | <group gid="bluetooth" /> |
Pavlin Radoslavov | 7016625 | 2015-11-23 17:13:25 -0800 | [diff] [blame] | 47 | <group gid="wakelock" /> |
Siarhei Vishniakou | 9e08956 | 2017-05-08 15:42:14 -0700 | [diff] [blame] | 48 | <group gid="uhid" /> |
Matthew Xie | fca9d63 | 2012-10-04 12:25:28 -0700 | [diff] [blame] | 49 | </permission> |
| 50 | |
fredc | 0f42037 | 2012-04-12 00:02:00 -0700 | [diff] [blame] | 51 | <permission name="android.permission.NET_TUNNELING" > |
| 52 | <group gid="vpn" /> |
| 53 | </permission> |
| 54 | |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 55 | <permission name="android.permission.INTERNET" > |
| 56 | <group gid="inet" /> |
| 57 | </permission> |
| 58 | |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 59 | <permission name="android.permission.READ_LOGS" > |
| 60 | <group gid="log" /> |
| 61 | </permission> |
| 62 | |
Mike Lockwood | 1e23db4 | 2011-04-22 07:05:21 -0700 | [diff] [blame] | 63 | <permission name="android.permission.WRITE_MEDIA_STORAGE" > |
Jeff Sharkey | 5517b73 | 2017-03-07 14:20:03 -0700 | [diff] [blame] | 64 | <group gid="media_rw" /> |
Mike Lockwood | 1e23db4 | 2011-04-22 07:05:21 -0700 | [diff] [blame] | 65 | </permission> |
| 66 | |
Mike Lockwood | 10bc111 | 2011-01-10 08:24:08 -0500 | [diff] [blame] | 67 | <permission name="android.permission.ACCESS_MTP" > |
| 68 | <group gid="mtp" /> |
| 69 | </permission> |
| 70 | |
Ramesh Sudini | 0e7b5a0 | 2011-03-28 09:18:31 -0500 | [diff] [blame] | 71 | <permission name="android.permission.NET_ADMIN" > |
| 72 | <group gid="net_admin" /> |
| 73 | </permission> |
| 74 | |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 75 | <!-- The group that /cache belongs to, linked to the permission |
| 76 | set on the applications that can access /cache --> |
| 77 | <permission name="android.permission.ACCESS_CACHE_FILESYSTEM" > |
| 78 | <group gid="cache" /> |
| 79 | </permission> |
| 80 | |
| 81 | <!-- RW permissions to any system resources owned by group 'diag'. |
| 82 | This is for carrier and manufacture diagnostics tools that must be |
| 83 | installable from the framework. Be careful. --> |
| 84 | <permission name="android.permission.DIAGNOSTIC" > |
| 85 | <group gid="input" /> |
| 86 | <group gid="diag" /> |
| 87 | </permission> |
| 88 | |
Jeff Sharkey | 9e18fd1 | 2011-05-02 17:51:29 -0700 | [diff] [blame] | 89 | <!-- Group that can read detailed network usage statistics --> |
| 90 | <permission name="android.permission.READ_NETWORK_USAGE_HISTORY"> |
| 91 | <group gid="net_bw_stats" /> |
| 92 | </permission> |
| 93 | |
| 94 | <!-- Group that can modify how network statistics are accounted --> |
Jeff Sharkey | 9f09e6a7 | 2017-06-26 11:24:47 -0600 | [diff] [blame] | 95 | <permission name="android.permission.UPDATE_DEVICE_STATS"> |
Jeff Sharkey | 9e18fd1 | 2011-05-02 17:51:29 -0700 | [diff] [blame] | 96 | <group gid="net_bw_acct" /> |
| 97 | </permission> |
| 98 | |
Doug Zongker | b616f0c | 2013-01-29 09:05:21 -0800 | [diff] [blame] | 99 | <permission name="android.permission.LOOP_RADIO" > |
| 100 | <group gid="loop_radio" /> |
| 101 | </permission> |
| 102 | |
Jeff Sharkey | 270e1f4 | 2014-10-01 16:02:05 -0700 | [diff] [blame] | 103 | <!-- Hotword training apps sometimes need a GID to talk with low-level |
| 104 | hardware; give them audio for now until full HAL support is added. --> |
| 105 | <permission name="android.permission.MANAGE_VOICE_KEYPHRASES"> |
| 106 | <group gid="audio" /> |
| 107 | </permission> |
| 108 | |
Tomasz Wasilczyk | df77643 | 2017-07-21 14:07:09 -0700 | [diff] [blame] | 109 | <permission name="android.permission.ACCESS_BROADCAST_RADIO" > |
Andy Hung | ed0ea40 | 2015-10-30 14:11:46 -0700 | [diff] [blame] | 110 | <!-- /dev/fm is gid media, not audio --> |
Benson Huang | 981258e | 2014-09-23 10:57:40 +0800 | [diff] [blame] | 111 | <group gid="media" /> |
| 112 | </permission> |
| 113 | |
Jeff Sharkey | 4a53944 | 2018-01-05 17:09:52 -0700 | [diff] [blame] | 114 | <permission name="android.permission.USE_RESERVED_DISK"> |
| 115 | <group gid="reserved_disk" /> |
| 116 | </permission> |
| 117 | |
Svet Ganov | e5313a8 | 2016-04-11 09:59:56 -0700 | [diff] [blame] | 118 | <!-- These are permissions that were mapped to gids but we need |
| 119 | to keep them here until an upgrade from L to the current |
| 120 | version is to be supported. These permissions are built-in |
| 121 | and in L were not stored in packages.xml as a result if they |
| 122 | are not defined here while parsing packages.xml we would |
| 123 | ignore these permissions being granted to apps and not |
| 124 | propagate the granted state. From N we are storing the |
| 125 | built-in permissions in packages.xml as the saved storage |
| 126 | is negligible (one tag with the permission) compared to |
| 127 | the fragility as one can remove a built-in permission which |
| 128 | no longer needs to be mapped to gids and break grant propagation. --> |
| 129 | <permission name="android.permission.READ_EXTERNAL_STORAGE" /> |
| 130 | <permission name="android.permission.WRITE_EXTERNAL_STORAGE" /> |
| 131 | |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 132 | <!-- ================================================================== --> |
| 133 | <!-- ================================================================== --> |
| 134 | <!-- ================================================================== --> |
| 135 | |
| 136 | <!-- The following tags are assigning high-level permissions to specific |
| 137 | user IDs. These are used to allow specific core system users to |
| 138 | perform the given operations with the higher-level framework. For |
| 139 | example, we give a wide variety of permissions to the shell user |
| 140 | since that is the user the adb shell runs under and developers and |
| 141 | others should have a fairly open environment in which to |
| 142 | interact with the system. --> |
| 143 | |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 144 | <assign-permission name="android.permission.MODIFY_AUDIO_SETTINGS" uid="media" /> |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 145 | <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="media" /> |
Eric Laurent | 6dbdc40 | 2011-07-22 09:04:31 -0700 | [diff] [blame] | 146 | <assign-permission name="android.permission.WAKE_LOCK" uid="media" /> |
Marco Nelissen | d983ba5 | 2013-10-03 08:49:36 -0700 | [diff] [blame] | 147 | <assign-permission name="android.permission.UPDATE_DEVICE_STATS" uid="media" /> |
Eino-Ville Talvala | 788717c | 2013-02-15 18:30:15 -0800 | [diff] [blame] | 148 | <assign-permission name="android.permission.UPDATE_APP_OPS_STATS" uid="media" /> |
Chong Zhang | 8e4f4b3 | 2015-12-02 12:18:52 -0800 | [diff] [blame] | 149 | <assign-permission name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE" uid="media" /> |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 150 | |
Andy Hung | ed0ea40 | 2015-10-30 14:11:46 -0700 | [diff] [blame] | 151 | <assign-permission name="android.permission.MODIFY_AUDIO_SETTINGS" uid="audioserver" /> |
| 152 | <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="audioserver" /> |
| 153 | <assign-permission name="android.permission.WAKE_LOCK" uid="audioserver" /> |
| 154 | <assign-permission name="android.permission.UPDATE_DEVICE_STATS" uid="audioserver" /> |
| 155 | <assign-permission name="android.permission.UPDATE_APP_OPS_STATS" uid="audioserver" /> |
Svet Ganov | 14ab967 | 2017-11-22 18:49:32 -0800 | [diff] [blame] | 156 | <assign-permission name="android.permission.PACKAGE_USAGE_STATS" uid="audioserver" /> |
Andy Hung | ed0ea40 | 2015-10-30 14:11:46 -0700 | [diff] [blame] | 157 | |
Chien-Yu Chen | 75cade0 | 2016-01-11 10:56:21 -0800 | [diff] [blame] | 158 | <assign-permission name="android.permission.MODIFY_AUDIO_SETTINGS" uid="cameraserver" /> |
| 159 | <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="cameraserver" /> |
| 160 | <assign-permission name="android.permission.WAKE_LOCK" uid="cameraserver" /> |
| 161 | <assign-permission name="android.permission.UPDATE_DEVICE_STATS" uid="cameraserver" /> |
| 162 | <assign-permission name="android.permission.UPDATE_APP_OPS_STATS" uid="cameraserver" /> |
Emilian Peev | bd88510 | 2017-02-01 16:07:31 +0000 | [diff] [blame] | 163 | <assign-permission name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE" uid="cameraserver" /> |
Svet Ganov | 82f09bc | 2018-01-12 22:08:40 -0800 | [diff] [blame] | 164 | <assign-permission name="android.permission.PACKAGE_USAGE_STATS" uid="cameraserver" /> |
Svetoslav Ganov | 2d20fb4 | 2018-02-08 15:52:10 -0800 | [diff] [blame] | 165 | <assign-permission name="android.permission.WATCH_APPOPS" uid="cameraserver" /> |
Chien-Yu Chen | 75cade0 | 2016-01-11 10:56:21 -0800 | [diff] [blame] | 166 | |
Mathias Agopian | 627e7b5 | 2009-05-21 19:21:59 -0700 | [diff] [blame] | 167 | <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="graphics" /> |
| 168 | |
Yi Jin | 4bab3a1 | 2018-01-10 16:50:59 -0800 | [diff] [blame] | 169 | <assign-permission name="android.permission.DUMP" uid="incidentd" /> |
| 170 | <assign-permission name="android.permission.PACKAGE_USAGE_STATS" uid="incidentd" /> |
Yi Jin | fae1773 | 2018-06-06 18:08:01 -0700 | [diff] [blame] | 171 | <assign-permission name="android.permission.INTERACT_ACROSS_USERS" uid="incidentd" /> |
Joe Onorato | e21ab7e | 2018-12-18 15:00:25 -0800 | [diff] [blame] | 172 | <assign-permission name="android.permission.REQUEST_INCIDENT_REPORT_APPROVAL" uid="incidentd" /> |
Yi Jin | 4bab3a1 | 2018-01-10 16:50:59 -0800 | [diff] [blame] | 173 | |
Robert Quattlebaum | df41b3e | 2017-08-14 18:34:03 -0700 | [diff] [blame] | 174 | <assign-permission name="android.permission.ACCESS_LOWPAN_STATE" uid="lowpan" /> |
| 175 | <assign-permission name="android.permission.MANAGE_LOWPAN_INTERFACES" uid="lowpan" /> |
| 176 | |
Bookatz | 75ee604 | 2018-11-09 12:27:37 -0800 | [diff] [blame] | 177 | <assign-permission name="android.permission.BATTERY_STATS" uid="statsd" /> |
Yi Jin | 974e56f | 2018-01-22 10:48:04 -0800 | [diff] [blame] | 178 | <assign-permission name="android.permission.DUMP" uid="statsd" /> |
| 179 | <assign-permission name="android.permission.PACKAGE_USAGE_STATS" uid="statsd" /> |
Yao Chen | 0f21710 | 2018-01-09 10:33:15 -0800 | [diff] [blame] | 180 | <assign-permission name="android.permission.STATSCOMPANION" uid="statsd" /> |
Jeff Sharkey | 6b64925 | 2018-04-16 09:50:22 -0600 | [diff] [blame] | 181 | <assign-permission name="android.permission.UPDATE_APP_OPS_STATS" uid="statsd" /> |
Yao Chen | 0f21710 | 2018-01-09 10:33:15 -0800 | [diff] [blame] | 182 | |
Zimuzo | cc2932f | 2018-10-29 16:04:41 +0000 | [diff] [blame] | 183 | <split-permission name="android.permission.WRITE_EXTERNAL_STORAGE"> |
| 184 | <new-permission name="android.permission.READ_EXTERNAL_STORAGE" /> |
| 185 | </split-permission> |
| 186 | <split-permission name="android.permission.READ_CONTACTS" |
| 187 | targetSdk="16"> |
| 188 | <new-permission name="android.permission.READ_CALL_LOG" /> |
| 189 | </split-permission> |
| 190 | <split-permission name="android.permission.WRITE_CONTACTS" |
| 191 | targetSdk="16"> |
| 192 | <new-permission name="android.permission.WRITE_CALL_LOG" /> |
| 193 | </split-permission> |
Zimuzo | 2efeecc | 2018-11-02 17:47:13 +0000 | [diff] [blame] | 194 | <!-- STOPSHIP(b/118882117): change targetSdk to Q when SDK version finalised --> |
Zimuzo | cc2932f | 2018-10-29 16:04:41 +0000 | [diff] [blame] | 195 | <split-permission name="android.permission.ACCESS_FINE_LOCATION" |
Zimuzo | 2efeecc | 2018-11-02 17:47:13 +0000 | [diff] [blame] | 196 | targetSdk="10000"> |
Zimuzo | cc2932f | 2018-10-29 16:04:41 +0000 | [diff] [blame] | 197 | <new-permission name="android.permission.ACCESS_BACKGROUND_LOCATION" /> |
| 198 | </split-permission> |
Zimuzo | 2efeecc | 2018-11-02 17:47:13 +0000 | [diff] [blame] | 199 | <!-- STOPSHIP(b/118882117): change targetSdk to Q when SDK version finalised --> |
Zimuzo | cc2932f | 2018-10-29 16:04:41 +0000 | [diff] [blame] | 200 | <split-permission name="android.permission.ACCESS_COARSE_LOCATION" |
Zimuzo | 2efeecc | 2018-11-02 17:47:13 +0000 | [diff] [blame] | 201 | targetSdk="10000"> |
Zimuzo | cc2932f | 2018-10-29 16:04:41 +0000 | [diff] [blame] | 202 | <new-permission name="android.permission.ACCESS_BACKGROUND_LOCATION" /> |
| 203 | </split-permission> |
| 204 | |
Jeff Sharkey | 9787a945 | 2018-11-18 17:53:02 -0700 | [diff] [blame] | 205 | <!-- Apps holding either the legacy READ or WRITE permissions will inherit |
| 206 | the ability to <em>read</em> new typed permissions in the Q release; they |
| 207 | won't gain the ability to <em>write</em> that content. --> |
| 208 | <!-- STOPSHIP(b/112545973): change targetSdk to Q when SDK version finalised --> |
| 209 | <split-permission name="android.permission.READ_EXTERNAL_STORAGE" |
| 210 | targetSdk="10000"> |
| 211 | <new-permission name="android.permission.READ_MEDIA_AUDIO" /> |
| 212 | <new-permission name="android.permission.READ_MEDIA_VIDEO" /> |
| 213 | <new-permission name="android.permission.READ_MEDIA_IMAGES" /> |
| 214 | </split-permission> |
| 215 | <!-- STOPSHIP(b/112545973): change targetSdk to Q when SDK version finalised --> |
| 216 | <split-permission name="android.permission.WRITE_EXTERNAL_STORAGE" |
| 217 | targetSdk="10000"> |
| 218 | <new-permission name="android.permission.READ_MEDIA_AUDIO" /> |
| 219 | <new-permission name="android.permission.READ_MEDIA_VIDEO" /> |
| 220 | <new-permission name="android.permission.READ_MEDIA_IMAGES" /> |
| 221 | </split-permission> |
| 222 | |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 223 | <!-- This is a list of all the libraries available for application |
| 224 | code to link against. --> |
| 225 | |
Paul Duffin | a3b6921 | 2018-01-25 09:58:32 +0000 | [diff] [blame] | 226 | <library name="android.test.base" |
Sundong Ahn | b7540bf | 2018-11-08 19:06:45 +0900 | [diff] [blame] | 227 | file="/system/framework/android.test.base.jar" /> |
Paul Duffin | 6ed0455 | 2017-07-07 12:12:06 +0100 | [diff] [blame] | 228 | <library name="android.test.mock" |
Sundong Ahn | b7540bf | 2018-11-08 19:06:45 +0900 | [diff] [blame] | 229 | file="/system/framework/android.test.mock.jar" |
Ben Lin | 71c16d7 | 2018-12-06 18:34:51 -0800 | [diff] [blame] | 230 | dependency="android.test.base" /> |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 231 | <library name="android.test.runner" |
Sundong Ahn | b7540bf | 2018-11-08 19:06:45 +0900 | [diff] [blame] | 232 | file="/system/framework/android.test.runner.jar" |
Ben Lin | 71c16d7 | 2018-12-06 18:34:51 -0800 | [diff] [blame] | 233 | dependency="android.test.base:android.test.mock" /> |
Narayan Kamath | 1ed78fb | 2015-01-20 13:44:23 +0000 | [diff] [blame] | 234 | |
Steven Moreland | f36ad62 | 2018-09-04 13:20:22 -0700 | [diff] [blame] | 235 | <!-- In BOOT_JARS historically, and now added to legacy applications. --> |
| 236 | <library name="android.hidl.base-V1.0-java" |
| 237 | file="/system/framework/android.hidl.base-V1.0-java.jar" /> |
| 238 | <library name="android.hidl.manager-V1.0-java" |
Ben Lin | 71c16d7 | 2018-12-06 18:34:51 -0800 | [diff] [blame] | 239 | file="/system/framework/android.hidl.manager-V1.0-java.jar" |
| 240 | dependency="android.hidl.base-V1.0-java" /> |
Steven Moreland | f36ad62 | 2018-09-04 13:20:22 -0700 | [diff] [blame] | 241 | |
Dianne Hackborn | be7c50e | 2014-06-30 14:43:28 -0700 | [diff] [blame] | 242 | <!-- These are the standard packages that are white-listed to always have internet |
| 243 | access while in power save mode, even if they aren't in the foreground. --> |
Felipe Leme | 05515ae | 2016-05-31 17:50:39 -0700 | [diff] [blame] | 244 | <allow-in-power-save package="com.android.providers.downloads" /> |
Dianne Hackborn | be7c50e | 2014-06-30 14:43:28 -0700 | [diff] [blame] | 245 | |
Felipe Leme | 1d0fbed | 2016-04-27 17:11:37 -0700 | [diff] [blame] | 246 | <!-- These are the standard packages that are white-listed to always have internet |
| 247 | access while in data mode, even if they aren't in the foreground. --> |
| 248 | <allow-in-data-usage-save package="com.android.providers.downloads" /> |
| 249 | |
Dianne Hackborn | 3f13c54 | 2017-02-09 11:05:11 -0800 | [diff] [blame] | 250 | <!-- This is a core platform component that needs to freely run in the background --> |
| 251 | <allow-in-power-save package="com.android.cellbroadcastreceiver" /> |
Christopher Tate | 3283079 | 2017-02-10 11:23:43 -0800 | [diff] [blame] | 252 | <allow-in-power-save package="com.android.shell" /> |
Dianne Hackborn | 3f13c54 | 2017-02-09 11:05:11 -0800 | [diff] [blame] | 253 | |
Makoto Onuki | fb26332 | 2018-01-17 13:23:50 -0800 | [diff] [blame] | 254 | <!-- Whitelist system providers --> |
| 255 | <allow-in-power-save-except-idle package="com.android.providers.calendar" /> |
| 256 | <allow-in-power-save-except-idle package="com.android.providers.contacts" /> |
| 257 | |
Luis Hector Chavez | d2f1ca8 | 2018-08-15 07:17:03 -0700 | [diff] [blame] | 258 | <!-- The PAC proxy process must have network access, otherwise no app will |
| 259 | be able to connect to the internet when such a proxy is in use, since |
| 260 | all outgoing connections originate from this app. --> |
| 261 | <allow-in-power-save-except-idle package="com.android.proxyhandler" /> |
| 262 | |
Xiaohui Chen | 9c990c1 | 2015-11-23 12:03:08 -0800 | [diff] [blame] | 263 | <!-- These are the packages that are white-listed to be able to run as system user --> |
| 264 | <system-user-whitelisted-app package="com.android.settings" /> |
| 265 | |
Fyodor Kupolov | 7db5af1 | 2015-07-31 16:50:27 -0700 | [diff] [blame] | 266 | <!-- These are the packages that shouldn't run as system user --> |
| 267 | <system-user-blacklisted-app package="com.android.wallpaper.livepicker" /> |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 268 | </permissions> |