| The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 1 | <?xml version="1.0" encoding="utf-8"?> |
| 2 | <!-- Copyright (C) 2008 The Android Open Source Project |
| 3 | |
| 4 | Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | you may not use this file except in compliance with the License. |
| 6 | You may obtain a copy of the License at |
| Chien-Yu Chen | 75cade0 | 2016-01-11 10:56:21 -0800 | [diff] [blame] | 7 | |
| The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 8 | http://www.apache.org/licenses/LICENSE-2.0 |
| Chien-Yu Chen | 75cade0 | 2016-01-11 10:56:21 -0800 | [diff] [blame] | 9 | |
| The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 10 | Unless required by applicable law or agreed to in writing, software |
| 11 | distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | See the License for the specific language governing permissions and |
| 14 | limitations under the License. |
| 15 | --> |
| 16 | |
| 17 | <!-- This file is used to define the mappings between lower-level system |
| 18 | user and group IDs and the higher-level permission names managed |
| 19 | by the platform. |
| 20 | |
| 21 | Be VERY careful when editing this file! Mistakes made here can open |
| 22 | big security holes. |
| 23 | --> |
| 24 | <permissions> |
| 25 | |
| 26 | <!-- ================================================================== --> |
| 27 | <!-- ================================================================== --> |
| 28 | <!-- ================================================================== --> |
| 29 | |
| 30 | <!-- The following tags are associating low-level group IDs with |
| 31 | permission names. By specifying such a mapping, you are saying |
| 32 | that any application process granted the given permission will |
| 33 | also be running with the given group ID attached to its process, |
| 34 | so it can perform any filesystem (read, write, execute) operations |
| 35 | allowed for that group. --> |
| 36 | |
| 37 | <permission name="android.permission.BLUETOOTH_ADMIN" > |
| 38 | <group gid="net_bt_admin" /> |
| 39 | </permission> |
| 40 | |
| 41 | <permission name="android.permission.BLUETOOTH" > |
| 42 | <group gid="net_bt" /> |
| 43 | </permission> |
| 44 | |
| Matthew Xie | fca9d63 | 2012-10-04 12:25:28 -0700 | [diff] [blame] | 45 | <permission name="android.permission.BLUETOOTH_STACK" > |
| Ajay Panicker | 35cb698 | 2016-09-20 11:18:14 -0700 | [diff] [blame] | 46 | <group gid="bluetooth" /> |
| Pavlin Radoslavov | 7016625 | 2015-11-23 17:13:25 -0800 | [diff] [blame] | 47 | <group gid="wakelock" /> |
| Siarhei Vishniakou | 9e08956 | 2017-05-08 15:42:14 -0700 | [diff] [blame] | 48 | <group gid="uhid" /> |
| Matthew Xie | fca9d63 | 2012-10-04 12:25:28 -0700 | [diff] [blame] | 49 | </permission> |
| 50 | |
| Christine Franks | 3dfad41 | 2021-03-22 11:59:54 -0700 | [diff] [blame] | 51 | <permission name="android.permission.VIRTUAL_INPUT_DEVICE" > |
| 52 | <group gid="uhid" /> |
| 53 | </permission> |
| 54 | |
| fredc | 0f42037 | 2012-04-12 00:02:00 -0700 | [diff] [blame] | 55 | <permission name="android.permission.NET_TUNNELING" > |
| 56 | <group gid="vpn" /> |
| 57 | </permission> |
| 58 | |
| The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 59 | <permission name="android.permission.INTERNET" > |
| 60 | <group gid="inet" /> |
| 61 | </permission> |
| 62 | |
| The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 63 | <permission name="android.permission.READ_LOGS" > |
| 64 | <group gid="log" /> |
| 65 | </permission> |
| 66 | |
| Mike Lockwood | 10bc111 | 2011-01-10 08:24:08 -0500 | [diff] [blame] | 67 | <permission name="android.permission.ACCESS_MTP" > |
| 68 | <group gid="mtp" /> |
| 69 | </permission> |
| 70 | |
| Ramesh Sudini | 0e7b5a0 | 2011-03-28 09:18:31 -0500 | [diff] [blame] | 71 | <permission name="android.permission.NET_ADMIN" > |
| 72 | <group gid="net_admin" /> |
| 73 | </permission> |
| 74 | |
| Hungming Chen | 14858ac | 2020-02-05 15:10:42 +0800 | [diff] [blame] | 75 | <permission name="android.permission.MAINLINE_NETWORK_STACK" > |
| 76 | <group gid="net_admin" /> |
| 77 | <group gid="net_raw" /> |
| 78 | </permission> |
| 79 | |
| The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 80 | <!-- The group that /cache belongs to, linked to the permission |
| 81 | set on the applications that can access /cache --> |
| 82 | <permission name="android.permission.ACCESS_CACHE_FILESYSTEM" > |
| 83 | <group gid="cache" /> |
| 84 | </permission> |
| 85 | |
| 86 | <!-- RW permissions to any system resources owned by group 'diag'. |
| 87 | This is for carrier and manufacture diagnostics tools that must be |
| 88 | installable from the framework. Be careful. --> |
| 89 | <permission name="android.permission.DIAGNOSTIC" > |
| 90 | <group gid="input" /> |
| 91 | <group gid="diag" /> |
| 92 | </permission> |
| 93 | |
| Jeff Sharkey | 9e18fd1 | 2011-05-02 17:51:29 -0700 | [diff] [blame] | 94 | <!-- Group that can read detailed network usage statistics --> |
| 95 | <permission name="android.permission.READ_NETWORK_USAGE_HISTORY"> |
| 96 | <group gid="net_bw_stats" /> |
| 97 | </permission> |
| 98 | |
| 99 | <!-- Group that can modify how network statistics are accounted --> |
| Jeff Sharkey | 9f09e6a7 | 2017-06-26 11:24:47 -0600 | [diff] [blame] | 100 | <permission name="android.permission.UPDATE_DEVICE_STATS"> |
| Jeff Sharkey | 9e18fd1 | 2011-05-02 17:51:29 -0700 | [diff] [blame] | 101 | <group gid="net_bw_acct" /> |
| 102 | </permission> |
| 103 | |
| Doug Zongker | b616f0c | 2013-01-29 09:05:21 -0800 | [diff] [blame] | 104 | <permission name="android.permission.LOOP_RADIO" > |
| 105 | <group gid="loop_radio" /> |
| 106 | </permission> |
| 107 | |
| Jeff Sharkey | 270e1f4 | 2014-10-01 16:02:05 -0700 | [diff] [blame] | 108 | <!-- Hotword training apps sometimes need a GID to talk with low-level |
| 109 | hardware; give them audio for now until full HAL support is added. --> |
| 110 | <permission name="android.permission.MANAGE_VOICE_KEYPHRASES"> |
| 111 | <group gid="audio" /> |
| 112 | </permission> |
| 113 | |
| Tomasz Wasilczyk | df77643 | 2017-07-21 14:07:09 -0700 | [diff] [blame] | 114 | <permission name="android.permission.ACCESS_BROADCAST_RADIO" > |
| Andy Hung | ed0ea40 | 2015-10-30 14:11:46 -0700 | [diff] [blame] | 115 | <!-- /dev/fm is gid media, not audio --> |
| Benson Huang | 981258e | 2014-09-23 10:57:40 +0800 | [diff] [blame] | 116 | <group gid="media" /> |
| 117 | </permission> |
| 118 | |
| Jeff Sharkey | 4a53944 | 2018-01-05 17:09:52 -0700 | [diff] [blame] | 119 | <permission name="android.permission.USE_RESERVED_DISK"> |
| 120 | <group gid="reserved_disk" /> |
| 121 | </permission> |
| 122 | |
| Rubin Xu | e806776 | 2022-05-24 23:23:10 +0100 | [diff] [blame] | 123 | <permission name="android.permission.WRITE_SECURITY_LOG"> |
| Rubin Xu | 4486314 | 2022-05-26 12:44:55 +0100 | [diff] [blame] | 124 | <group gid="security_log_writer" /> |
| Rubin Xu | e806776 | 2022-05-24 23:23:10 +0100 | [diff] [blame] | 125 | </permission> |
| 126 | |
| Svet Ganov | e5313a8 | 2016-04-11 09:59:56 -0700 | [diff] [blame] | 127 | <!-- These are permissions that were mapped to gids but we need |
| 128 | to keep them here until an upgrade from L to the current |
| 129 | version is to be supported. These permissions are built-in |
| 130 | and in L were not stored in packages.xml as a result if they |
| 131 | are not defined here while parsing packages.xml we would |
| 132 | ignore these permissions being granted to apps and not |
| 133 | propagate the granted state. From N we are storing the |
| 134 | built-in permissions in packages.xml as the saved storage |
| 135 | is negligible (one tag with the permission) compared to |
| 136 | the fragility as one can remove a built-in permission which |
| 137 | no longer needs to be mapped to gids and break grant propagation. --> |
| 138 | <permission name="android.permission.READ_EXTERNAL_STORAGE" /> |
| 139 | <permission name="android.permission.WRITE_EXTERNAL_STORAGE" /> |
| 140 | |
| The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 141 | <!-- ================================================================== --> |
| 142 | <!-- ================================================================== --> |
| 143 | <!-- ================================================================== --> |
| 144 | |
| 145 | <!-- The following tags are assigning high-level permissions to specific |
| 146 | user IDs. These are used to allow specific core system users to |
| 147 | perform the given operations with the higher-level framework. For |
| 148 | example, we give a wide variety of permissions to the shell user |
| 149 | since that is the user the adb shell runs under and developers and |
| 150 | others should have a fairly open environment in which to |
| 151 | interact with the system. --> |
| 152 | |
| The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 153 | <assign-permission name="android.permission.MODIFY_AUDIO_SETTINGS" uid="media" /> |
| The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 154 | <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="media" /> |
| Eric Laurent | 6dbdc40 | 2011-07-22 09:04:31 -0700 | [diff] [blame] | 155 | <assign-permission name="android.permission.WAKE_LOCK" uid="media" /> |
| Marco Nelissen | d983ba5 | 2013-10-03 08:49:36 -0700 | [diff] [blame] | 156 | <assign-permission name="android.permission.UPDATE_DEVICE_STATS" uid="media" /> |
| Eino-Ville Talvala | 788717c | 2013-02-15 18:30:15 -0800 | [diff] [blame] | 157 | <assign-permission name="android.permission.UPDATE_APP_OPS_STATS" uid="media" /> |
| Chong Zhang | 8e4f4b3 | 2015-12-02 12:18:52 -0800 | [diff] [blame] | 158 | <assign-permission name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE" uid="media" /> |
| Chong Zhang | 9248b26 | 2020-04-20 16:03:59 -0700 | [diff] [blame] | 159 | <assign-permission name="android.permission.PACKAGE_USAGE_STATS" uid="media" /> |
| Chong Zhang | 95ad2ce | 2020-09-25 11:53:03 -0700 | [diff] [blame] | 160 | <assign-permission name="android.permission.REGISTER_MEDIA_RESOURCE_OBSERVER" uid="media" /> |
| Robert Shih | 7562087 | 2021-03-12 03:34:42 -0800 | [diff] [blame] | 161 | <assign-permission name="android.permission.REGISTER_STATS_PULL_ATOM" uid="media" /> |
| Oscar Azucena | 4537327 | 2021-03-11 12:17:52 -0800 | [diff] [blame] | 162 | <assign-permission name="android.permission.INTERACT_ACROSS_USERS" uid="media" /> |
| Kunal Malhotra | 5b5e573 | 2023-02-28 21:57:15 +0000 | [diff] [blame] | 163 | <assign-permission name="android.permission.LOG_FOREGROUND_RESOURCE_USE" uid="media" /> |
| Philip P. Moltmann | aba9967 | 2020-09-21 16:21:11 +0000 | [diff] [blame] | 164 | |
| Chenbo Feng | e5d6f0f | 2019-05-22 15:28:49 -0700 | [diff] [blame] | 165 | <assign-permission name="android.permission.INTERNET" uid="media" /> |
| 166 | |
| 167 | <assign-permission name="android.permission.INTERNET" uid="shell" /> |
| The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 168 | |
| Andy Hung | ed0ea40 | 2015-10-30 14:11:46 -0700 | [diff] [blame] | 169 | <assign-permission name="android.permission.MODIFY_AUDIO_SETTINGS" uid="audioserver" /> |
| 170 | <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="audioserver" /> |
| 171 | <assign-permission name="android.permission.WAKE_LOCK" uid="audioserver" /> |
| 172 | <assign-permission name="android.permission.UPDATE_DEVICE_STATS" uid="audioserver" /> |
| 173 | <assign-permission name="android.permission.UPDATE_APP_OPS_STATS" uid="audioserver" /> |
| Svet Ganov | 14ab967 | 2017-11-22 18:49:32 -0800 | [diff] [blame] | 174 | <assign-permission name="android.permission.PACKAGE_USAGE_STATS" uid="audioserver" /> |
| Kunal Malhotra | c69aa1b | 2022-07-12 22:28:45 +0000 | [diff] [blame] | 175 | <assign-permission name="android.permission.INTERACT_ACROSS_USERS_FULL" uid="audioserver" /> |
| Evan Severson | e47b4ea | 2021-03-02 19:45:07 -0800 | [diff] [blame] | 176 | <assign-permission name="android.permission.OBSERVE_SENSOR_PRIVACY" uid="audioserver" /> |
| Kunal Malhotra | 5b5e573 | 2023-02-28 21:57:15 +0000 | [diff] [blame] | 177 | <assign-permission name="android.permission.LOG_FOREGROUND_RESOURCE_USE" uid="audioserver" /> |
| Andy Hung | ed0ea40 | 2015-10-30 14:11:46 -0700 | [diff] [blame] | 178 | |
| Chien-Yu Chen | 75cade0 | 2016-01-11 10:56:21 -0800 | [diff] [blame] | 179 | <assign-permission name="android.permission.MODIFY_AUDIO_SETTINGS" uid="cameraserver" /> |
| Kunal Malhotra | c69aa1b | 2022-07-12 22:28:45 +0000 | [diff] [blame] | 180 | <assign-permission name="android.permission.INTERACT_ACROSS_USERS_FULL" uid="cameraserver" /> |
| Chien-Yu Chen | 75cade0 | 2016-01-11 10:56:21 -0800 | [diff] [blame] | 181 | <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="cameraserver" /> |
| 182 | <assign-permission name="android.permission.WAKE_LOCK" uid="cameraserver" /> |
| 183 | <assign-permission name="android.permission.UPDATE_DEVICE_STATS" uid="cameraserver" /> |
| 184 | <assign-permission name="android.permission.UPDATE_APP_OPS_STATS" uid="cameraserver" /> |
| Emilian Peev | bd88510 | 2017-02-01 16:07:31 +0000 | [diff] [blame] | 185 | <assign-permission name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE" uid="cameraserver" /> |
| Svet Ganov | 82f09bc | 2018-01-12 22:08:40 -0800 | [diff] [blame] | 186 | <assign-permission name="android.permission.PACKAGE_USAGE_STATS" uid="cameraserver" /> |
| Svetoslav Ganov | 2d20fb4 | 2018-02-08 15:52:10 -0800 | [diff] [blame] | 187 | <assign-permission name="android.permission.WATCH_APPOPS" uid="cameraserver" /> |
| Yin-Chia Yeh | 51d8516 | 2019-08-06 15:31:39 -0700 | [diff] [blame] | 188 | <assign-permission name="android.permission.MANAGE_APP_OPS_MODES" uid="cameraserver" /> |
| Evan Severson | e47b4ea | 2021-03-02 19:45:07 -0800 | [diff] [blame] | 189 | <assign-permission name="android.permission.OBSERVE_SENSOR_PRIVACY" uid="cameraserver" /> |
| Emilian Peev | baeaad6 | 2021-11-23 13:08:14 -0800 | [diff] [blame] | 190 | <assign-permission name="android.permission.REAL_GET_TASKS" uid="cameraserver" /> |
| Kunal Malhotra | 5b5e573 | 2023-02-28 21:57:15 +0000 | [diff] [blame] | 191 | <assign-permission name="android.permission.LOG_FOREGROUND_RESOURCE_USE" uid="cameraserver" /> |
| Chien-Yu Chen | 75cade0 | 2016-01-11 10:56:21 -0800 | [diff] [blame] | 192 | |
| Mathias Agopian | 627e7b5 | 2009-05-21 19:21:59 -0700 | [diff] [blame] | 193 | <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="graphics" /> |
| 194 | |
| Yi Jin | 4bab3a1 | 2018-01-10 16:50:59 -0800 | [diff] [blame] | 195 | <assign-permission name="android.permission.DUMP" uid="incidentd" /> |
| 196 | <assign-permission name="android.permission.PACKAGE_USAGE_STATS" uid="incidentd" /> |
| Yi Jin | fae1773 | 2018-06-06 18:08:01 -0700 | [diff] [blame] | 197 | <assign-permission name="android.permission.INTERACT_ACROSS_USERS" uid="incidentd" /> |
| Joe Onorato | e21ab7e | 2018-12-18 15:00:25 -0800 | [diff] [blame] | 198 | <assign-permission name="android.permission.REQUEST_INCIDENT_REPORT_APPROVAL" uid="incidentd" /> |
| Joe Onorato | 8e566f3 | 2019-10-23 17:35:08 -0700 | [diff] [blame] | 199 | <assign-permission name="android.permission.PEEK_DROPBOX_DATA" uid="incidentd" /> |
| Yi Jin | 4bab3a1 | 2018-01-10 16:50:59 -0800 | [diff] [blame] | 200 | |
| Robert Quattlebaum | df41b3e | 2017-08-14 18:34:03 -0700 | [diff] [blame] | 201 | <assign-permission name="android.permission.ACCESS_LOWPAN_STATE" uid="lowpan" /> |
| 202 | <assign-permission name="android.permission.MANAGE_LOWPAN_INTERFACES" uid="lowpan" /> |
| 203 | |
| Yi Jin | 974e56f | 2018-01-22 10:48:04 -0800 | [diff] [blame] | 204 | <assign-permission name="android.permission.DUMP" uid="statsd" /> |
| 205 | <assign-permission name="android.permission.PACKAGE_USAGE_STATS" uid="statsd" /> |
| Yao Chen | 0f21710 | 2018-01-09 10:33:15 -0800 | [diff] [blame] | 206 | <assign-permission name="android.permission.STATSCOMPANION" uid="statsd" /> |
| Jeff Sharkey | 6b64925 | 2018-04-16 09:50:22 -0600 | [diff] [blame] | 207 | <assign-permission name="android.permission.UPDATE_APP_OPS_STATS" uid="statsd" /> |
| Yao Chen | 0f21710 | 2018-01-09 10:33:15 -0800 | [diff] [blame] | 208 | |
| Tej Singh | 10458ec | 2020-03-17 11:04:02 -0700 | [diff] [blame] | 209 | <assign-permission name="android.permission.REGISTER_STATS_PULL_ATOM" uid="gpu_service" /> |
| Seth Moore | 226b326 | 2021-04-21 21:10:21 +0000 | [diff] [blame] | 210 | <assign-permission name="android.permission.REGISTER_STATS_PULL_ATOM" uid="keystore" /> |
| Tej Singh | 10458ec | 2020-03-17 11:04:02 -0700 | [diff] [blame] | 211 | |
| Philip P. Moltmann | 3d6c31a | 2019-04-16 14:42:42 -0700 | [diff] [blame] | 212 | <split-permission name="android.permission.ACCESS_FINE_LOCATION"> |
| 213 | <new-permission name="android.permission.ACCESS_COARSE_LOCATION" /> |
| 214 | </split-permission> |
| Zimuzo | cc2932f | 2018-10-29 16:04:41 +0000 | [diff] [blame] | 215 | <split-permission name="android.permission.WRITE_EXTERNAL_STORAGE"> |
| 216 | <new-permission name="android.permission.READ_EXTERNAL_STORAGE" /> |
| 217 | </split-permission> |
| 218 | <split-permission name="android.permission.READ_CONTACTS" |
| 219 | targetSdk="16"> |
| 220 | <new-permission name="android.permission.READ_CALL_LOG" /> |
| 221 | </split-permission> |
| 222 | <split-permission name="android.permission.WRITE_CONTACTS" |
| 223 | targetSdk="16"> |
| 224 | <new-permission name="android.permission.WRITE_CALL_LOG" /> |
| 225 | </split-permission> |
| 226 | <split-permission name="android.permission.ACCESS_FINE_LOCATION" |
| Philip P. Moltmann | 41b3120 | 2019-05-16 12:16:48 -0700 | [diff] [blame] | 227 | targetSdk="29"> |
| Zimuzo | cc2932f | 2018-10-29 16:04:41 +0000 | [diff] [blame] | 228 | <new-permission name="android.permission.ACCESS_BACKGROUND_LOCATION" /> |
| 229 | </split-permission> |
| 230 | <split-permission name="android.permission.ACCESS_COARSE_LOCATION" |
| Philip P. Moltmann | 41b3120 | 2019-05-16 12:16:48 -0700 | [diff] [blame] | 231 | targetSdk="29"> |
| Zimuzo | cc2932f | 2018-10-29 16:04:41 +0000 | [diff] [blame] | 232 | <new-permission name="android.permission.ACCESS_BACKGROUND_LOCATION" /> |
| 233 | </split-permission> |
| Jay Thomas Sullivan | 5b9f6a5 | 2022-03-29 10:45:07 -0700 | [diff] [blame] | 234 | <split-permission name="android.permission.READ_EXTERNAL_STORAGE" |
| 235 | targetSdk="29"> |
| 236 | <new-permission name="android.permission.ACCESS_MEDIA_LOCATION" /> |
| 237 | </split-permission> |
| 238 | <split-permission name="android.permission.WRITE_EXTERNAL_STORAGE" |
| 239 | targetSdk="29"> |
| 240 | <new-permission name="android.permission.ACCESS_MEDIA_LOCATION" /> |
| 241 | </split-permission> |
| 242 | <split-permission name="android.permission.BLUETOOTH" |
| 243 | targetSdk="31"> |
| 244 | <new-permission name="android.permission.BLUETOOTH_SCAN" /> |
| 245 | </split-permission> |
| 246 | <split-permission name="android.permission.BLUETOOTH" |
| 247 | targetSdk="31"> |
| 248 | <new-permission name="android.permission.BLUETOOTH_CONNECT" /> |
| 249 | </split-permission> |
| 250 | <split-permission name="android.permission.BLUETOOTH" |
| 251 | targetSdk="31"> |
| 252 | <new-permission name="android.permission.BLUETOOTH_ADVERTISE" /> |
| 253 | </split-permission> |
| 254 | <split-permission name="android.permission.BLUETOOTH_ADMIN" |
| 255 | targetSdk="31"> |
| 256 | <new-permission name="android.permission.BLUETOOTH_SCAN" /> |
| 257 | </split-permission> |
| 258 | <split-permission name="android.permission.BLUETOOTH_ADMIN" |
| 259 | targetSdk="31"> |
| 260 | <new-permission name="android.permission.BLUETOOTH_CONNECT" /> |
| 261 | </split-permission> |
| 262 | <split-permission name="android.permission.BLUETOOTH_ADMIN" |
| 263 | targetSdk="31"> |
| 264 | <new-permission name="android.permission.BLUETOOTH_ADVERTISE" /> |
| 265 | </split-permission> |
| varun | 4379a4c | 2021-11-29 05:07:08 +0000 | [diff] [blame] | 266 | <split-permission name="android.permission.BODY_SENSORS" |
| 267 | targetSdk="33"> |
| 268 | <new-permission name="android.permission.BODY_SENSORS_BACKGROUND" /> |
| 269 | </split-permission> |
| Philip P. Moltmann | 89b044f | 2019-09-13 15:12:34 -0700 | [diff] [blame] | 270 | <split-permission name="android.permission.READ_EXTERNAL_STORAGE" |
| Jay Thomas Sullivan | 7fd9adf | 2022-01-31 18:38:46 -0800 | [diff] [blame] | 271 | targetSdk="33"> |
| 272 | <new-permission name="android.permission.READ_MEDIA_AUDIO" /> |
| 273 | </split-permission> |
| 274 | <split-permission name="android.permission.READ_EXTERNAL_STORAGE" |
| 275 | targetSdk="33"> |
| 276 | <new-permission name="android.permission.READ_MEDIA_VIDEO" /> |
| 277 | </split-permission> |
| 278 | <split-permission name="android.permission.READ_EXTERNAL_STORAGE" |
| 279 | targetSdk="33"> |
| Jay Thomas Sullivan | 90f8bc6 | 2022-03-09 22:26:19 -0800 | [diff] [blame] | 280 | <new-permission name="android.permission.READ_MEDIA_IMAGES" /> |
| Jay Thomas Sullivan | 7fd9adf | 2022-01-31 18:38:46 -0800 | [diff] [blame] | 281 | </split-permission> |
| Jay Thomas Sullivan | 9b78af4 | 2022-03-25 15:59:33 -0700 | [diff] [blame] | 282 | <split-permission name="android.permission.WRITE_EXTERNAL_STORAGE" |
| 283 | targetSdk="33"> |
| 284 | <new-permission name="android.permission.READ_MEDIA_AUDIO" /> |
| 285 | </split-permission> |
| 286 | <split-permission name="android.permission.WRITE_EXTERNAL_STORAGE" |
| 287 | targetSdk="33"> |
| 288 | <new-permission name="android.permission.READ_MEDIA_VIDEO" /> |
| 289 | </split-permission> |
| 290 | <split-permission name="android.permission.WRITE_EXTERNAL_STORAGE" |
| 291 | targetSdk="33"> |
| 292 | <new-permission name="android.permission.READ_MEDIA_IMAGES" /> |
| 293 | </split-permission> |
| Nate Myren | 5660b69 | 2022-11-02 14:15:38 -0700 | [diff] [blame] | 294 | <split-permission name="android.permission.READ_MEDIA_IMAGES"> |
| 295 | <new-permission name="android.permission.READ_MEDIA_VISUAL_USER_SELECTED" /> |
| 296 | </split-permission> |
| 297 | <split-permission name="android.permission.READ_MEDIA_VIDEO"> |
| 298 | <new-permission name="android.permission.READ_MEDIA_VISUAL_USER_SELECTED" /> |
| 299 | </split-permission> |
| 300 | <split-permission name="android.permission.ACCESS_MEDIA_LOCATION"> |
| 301 | <new-permission name="android.permission.READ_MEDIA_VISUAL_USER_SELECTED" /> |
| 302 | </split-permission> |
| Zimuzo | cc2932f | 2018-10-29 16:04:41 +0000 | [diff] [blame] | 303 | |
| The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 304 | <!-- This is a list of all the libraries available for application |
| 305 | code to link against. --> |
| 306 | |
| Paul Duffin | a3b6921 | 2018-01-25 09:58:32 +0000 | [diff] [blame] | 307 | <library name="android.test.base" |
| Sundong Ahn | b7540bf | 2018-11-08 19:06:45 +0900 | [diff] [blame] | 308 | file="/system/framework/android.test.base.jar" /> |
| Paul Duffin | 6ed0455 | 2017-07-07 12:12:06 +0100 | [diff] [blame] | 309 | <library name="android.test.mock" |
| Ulya Trafimovich | c578ab0 | 2020-09-22 18:09:09 +0100 | [diff] [blame] | 310 | file="/system/framework/android.test.mock.jar" /> |
| The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 311 | <library name="android.test.runner" |
| Sundong Ahn | b7540bf | 2018-11-08 19:06:45 +0900 | [diff] [blame] | 312 | file="/system/framework/android.test.runner.jar" |
| Ben Lin | 71c16d7 | 2018-12-06 18:34:51 -0800 | [diff] [blame] | 313 | dependency="android.test.base:android.test.mock" /> |
| Narayan Kamath | 1ed78fb | 2015-01-20 13:44:23 +0000 | [diff] [blame] | 314 | |
| Steven Moreland | f36ad62 | 2018-09-04 13:20:22 -0700 | [diff] [blame] | 315 | <!-- In BOOT_JARS historically, and now added to legacy applications. --> |
| 316 | <library name="android.hidl.base-V1.0-java" |
| 317 | file="/system/framework/android.hidl.base-V1.0-java.jar" /> |
| 318 | <library name="android.hidl.manager-V1.0-java" |
| Steven Moreland | fb52599 | 2020-10-21 00:46:56 +0000 | [diff] [blame] | 319 | file="/system/framework/android.hidl.manager-V1.0-java.jar" /> |
| Steven Moreland | f36ad62 | 2018-09-04 13:20:22 -0700 | [diff] [blame] | 320 | |
| Dianne Hackborn | be7c50e | 2014-06-30 14:43:28 -0700 | [diff] [blame] | 321 | <!-- These are the standard packages that are white-listed to always have internet |
| 322 | access while in power save mode, even if they aren't in the foreground. --> |
| Felipe Leme | 05515ae | 2016-05-31 17:50:39 -0700 | [diff] [blame] | 323 | <allow-in-power-save package="com.android.providers.downloads" /> |
| Dianne Hackborn | be7c50e | 2014-06-30 14:43:28 -0700 | [diff] [blame] | 324 | |
| Felipe Leme | 1d0fbed | 2016-04-27 17:11:37 -0700 | [diff] [blame] | 325 | <!-- These are the standard packages that are white-listed to always have internet |
| 326 | access while in data mode, even if they aren't in the foreground. --> |
| 327 | <allow-in-data-usage-save package="com.android.providers.downloads" /> |
| 328 | |
| Dianne Hackborn | 3f13c54 | 2017-02-09 11:05:11 -0800 | [diff] [blame] | 329 | <!-- This is a core platform component that needs to freely run in the background --> |
| Chen Xu | bb4b28e | 2020-05-14 10:52:21 -0700 | [diff] [blame] | 330 | <allow-in-power-save package="com.android.cellbroadcastreceiver.module" /> |
| Dianne Hackborn | 3f13c54 | 2017-02-09 11:05:11 -0800 | [diff] [blame] | 331 | <allow-in-power-save package="com.android.cellbroadcastreceiver" /> |
| Christopher Tate | 3283079 | 2017-02-10 11:23:43 -0800 | [diff] [blame] | 332 | <allow-in-power-save package="com.android.shell" /> |
| Dianne Hackborn | 3f13c54 | 2017-02-09 11:05:11 -0800 | [diff] [blame] | 333 | |
| Suprabh Shukla | a1812e9 | 2021-06-01 23:54:41 -0700 | [diff] [blame] | 334 | <!-- Emergency app needs to run in the background to reliably provide safety features --> |
| 335 | <allow-in-power-save package="com.android.emergency" /> |
| 336 | |
| Makoto Onuki | fb26332 | 2018-01-17 13:23:50 -0800 | [diff] [blame] | 337 | <!-- Whitelist system providers --> |
| Suprabh Shukla | cd83b1f | 2021-04-09 14:52:41 -0700 | [diff] [blame] | 338 | <!-- Calendar provider needs alarms while in idle --> |
| 339 | <allow-in-power-save package="com.android.providers.calendar" /> |
| Makoto Onuki | fb26332 | 2018-01-17 13:23:50 -0800 | [diff] [blame] | 340 | <allow-in-power-save-except-idle package="com.android.providers.contacts" /> |
| 341 | |
| Luis Hector Chavez | d2f1ca8 | 2018-08-15 07:17:03 -0700 | [diff] [blame] | 342 | <!-- The PAC proxy process must have network access, otherwise no app will |
| 343 | be able to connect to the internet when such a proxy is in use, since |
| 344 | all outgoing connections originate from this app. --> |
| 345 | <allow-in-power-save-except-idle package="com.android.proxyhandler" /> |
| samalin | cc01a8a | 2021-05-29 18:16:22 +0800 | [diff] [blame] | 346 | |
| 347 | <!-- Allow IMS service entitlement app to schedule jobs to run when app in background. --> |
| 348 | <allow-in-power-save-except-idle package="com.android.imsserviceentitlement" /> |
| The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 349 | </permissions> |