AndroidManifest.xml revision 51c61ee23a55ccc75e0ddb3582720fc626607e42
1<?xml version="1.0" encoding="utf-8"?> 2<!-- 3/* //device/apps/common/AndroidManifest.xml 4** 5** Copyright 2006, The Android Open Source Project 6** 7** Licensed under the Apache License, Version 2.0 (the "License"); 8** you may not use this file except in compliance with the License. 9** You may obtain a copy of the License at 10** 11** http://www.apache.org/licenses/LICENSE-2.0 12** 13** Unless required by applicable law or agreed to in writing, software 14** distributed under the License is distributed on an "AS IS" BASIS, 15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16** See the License for the specific language governing permissions and 17** limitations under the License. 18*/ 19--> 20<manifest xmlns:android="http://schemas.android.com/apk/res/android" 21 package="android" coreApp="true" android:sharedUserId="android.uid.system" 22 android:sharedUserLabel="@string/android_system_label"> 23 24 <!-- ================================================ --> 25 <!-- Special broadcasts that only the system can send --> 26 <!-- ================================================ --> 27 <eat-comment /> 28 29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" /> 30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" /> 31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" /> 32 <protected-broadcast android:name="android.intent.action.TIME_SET" /> 33 <protected-broadcast android:name="android.intent.action.TIME_TICK" /> 34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" /> 35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" /> 36 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" /> 37 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" /> 38 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" /> 39 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" /> 40 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" /> 41 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" /> 42 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" /> 43 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" /> 44 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" /> 45 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" /> 46 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" /> 47 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" /> 48 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" /> 49 <protected-broadcast android:name="android.intent.action.UID_REMOVED" /> 50 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" /> 51 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" /> 52 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" /> 53 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" /> 54 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" /> 55 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" /> 56 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" /> 57 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" /> 58 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" /> 59 <protected-broadcast android:name="android.intent.action.CHARGING" /> 60 <protected-broadcast android:name="android.intent.action.DISCHARGING" /> 61 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" /> 62 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" /> 63 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" /> 64 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" /> 65 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" /> 66 <protected-broadcast android:name="android.intent.action.REBOOT" /> 67 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" /> 68 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" /> 69 <protected-broadcast android:name="android.intent.action.USER_ADDED" /> 70 <protected-broadcast android:name="android.intent.action.USER_REMOVED" /> 71 <protected-broadcast android:name="android.intent.action.USER_STARTING" /> 72 <protected-broadcast android:name="android.intent.action.USER_STARTED" /> 73 <protected-broadcast android:name="android.intent.action.USER_STOPPING" /> 74 <protected-broadcast android:name="android.intent.action.USER_STOPPED" /> 75 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" /> 76 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" /> 77 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" /> 78 <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" /> 79 80 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" /> 81 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" /> 82 <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" /> 83 <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" /> 84 <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" /> 85 86 <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" /> 87 88 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" /> 89 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" /> 90 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" /> 91 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" /> 92 <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" /> 93 94 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" /> 95 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" /> 96 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" /> 97 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" /> 98 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" /> 99 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" /> 100 101 <protected-broadcast android:name="android.os.action.SETTING_RESTORED" /> 102 103 <protected-broadcast android:name="android.backup.intent.RUN" /> 104 <protected-broadcast android:name="android.backup.intent.CLEAR" /> 105 <protected-broadcast android:name="android.backup.intent.INIT" /> 106 107 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" /> 108 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" /> 109 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" /> 110 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" /> 111 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" /> 112 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" /> 113 <protected-broadcast android:name="android.bluetooth.device.action.UUID" /> 114 <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" /> 115 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" /> 116 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" /> 117 <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" /> 118 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" /> 119 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" /> 120 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" /> 121 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" /> 122 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" /> 123 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" /> 124 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" /> 125 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" /> 126 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" /> 127 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" /> 128 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" /> 129 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" /> 130 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" /> 131 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" /> 132 <protected-broadcast 133 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" /> 134 <protected-broadcast 135 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" /> 136 <protected-broadcast 137 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" /> 138 <protected-broadcast 139 android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" /> 140 <protected-broadcast 141 android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" /> 142 <protected-broadcast 143 android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" /> 144 <protected-broadcast 145 android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" /> 146 <protected-broadcast 147 android:name="android.bluetooth.headsetclient.profile.action.RESULT" /> 148 <protected-broadcast 149 android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" /> 150 <protected-broadcast 151 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" /> 152 <protected-broadcast 153 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" /> 154 <protected-broadcast 155 android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" /> 156 <protected-broadcast 157 android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" /> 158 <protected-broadcast 159 android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" /> 160 <protected-broadcast 161 android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" /> 162 <protected-broadcast 163 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" /> 164 <protected-broadcast 165 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" /> 166 <protected-broadcast 167 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" /> 168 <protected-broadcast 169 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" /> 170 <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" /> 171 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" /> 172 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" /> 173 <protected-broadcast android:name="android.btopp.intent.action.LIST" /> 174 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" /> 175 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" /> 176 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" /> 177 <protected-broadcast android:name="android.btopp.intent.action.HIDE" /> 178 <protected-broadcast android:name="android.btopp.intent.action.RETRY" /> 179 <protected-broadcast android:name="android.btopp.intent.action.OPEN" /> 180 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" /> 181 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" /> 182 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" /> 183 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" /> 184 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" /> 185 186 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" /> 187 188 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" /> 189 <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" /> 190 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 191 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 192 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" /> 193 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" /> 194 195 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" /> 196 <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" /> 197 198 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" /> 199 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" /> 200 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" /> 201 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" /> 202 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" /> 203 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" /> 204 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" /> 205 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" /> 206 207 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" /> 208 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" /> 209 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" /> 210 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" /> 211 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" /> 212 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" /> 213 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" /> 214 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" /> 215 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" /> 216 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" /> 217 218 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" /> 219 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" /> 220 <!-- @deprecated. Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. --> 221 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" /> 222 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" /> 223 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" /> 224 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" /> 225 226 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" /> 227 228 <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" /> 229 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" /> 230 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" /> 231 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" /> 232 233 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" /> 234 235 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" /> 236 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" /> 237 238 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" /> 239 240 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" /> 241 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" /> 242 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" /> 243 <protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" /> 244 245 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" /> 246 <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" /> 247 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" /> 248 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" /> 249 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" /> 250 <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" /> 251 <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" /> 252 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" /> 253 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" /> 254 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" /> 255 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" /> 256 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" /> 257 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" /> 258 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" /> 259 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" /> 260 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" /> 261 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" /> 262 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" /> 263 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" /> 264 <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" /> 265 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" /> 266 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" /> 267 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" /> 268 <protected-broadcast 269 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" /> 270 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" /> 271 <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" /> 272 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" /> 273 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" /> 274 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" /> 275 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" /> 276 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" /> 277 <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" /> 278 279 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" /> 280 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" /> 281 282 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" /> 283 284 <protected-broadcast android:name="android.intent.action.PHONE_STATE" /> 285 286 <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" /> 287 288 <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" /> 289 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" /> 290 <protected-broadcast android:name="android.location.MODE_CHANGED" /> 291 <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" /> 292 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" /> 293 294 <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" /> 295 296 <protected-broadcast 297 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" /> 298 299 <!-- Defined in RestrictionsManager --> 300 <protected-broadcast 301 android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" /> 302 <!-- Defined in RestrictionsManager --> 303 304 <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" /> 305 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" /> 306 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 307 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" /> 308 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 309 310 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SUBSCRIPTION_CHANGED" /> 311 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED" /> 312 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" /> 313 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" /> 314 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" /> 315 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" /> 316 317 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" /> 318 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" /> 319 320 <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" /> 321 <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" /> 322 <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" /> 323 <!-- ====================================================================== --> 324 <!-- RUNTIME PERMISSIONS --> 325 <!-- ====================================================================== --> 326 <eat-comment /> 327 328 <!-- ====================================================================== --> 329 <!-- Permissions for accessing user's contacts including personal profile --> 330 <!-- ====================================================================== --> 331 <eat-comment /> 332 333 <!-- Used for runtime permissions related to user's contacts and profile. --> 334 <permission-group android:name="android.permission-group.CONTACTS" 335 android:icon="@drawable/perm_group_contacts" 336 android:label="@string/permgrouplab_contacts" 337 android:description="@string/permgroupdesc_contacts" 338 android:priority="100" /> 339 340 <!-- Allows an application to read the user's contacts data. 341 <p>Protection level: dangerous 342 --> 343 <permission android:name="android.permission.READ_CONTACTS" 344 android:permissionGroup="android.permission-group.CONTACTS" 345 android:label="@string/permlab_readContacts" 346 android:description="@string/permdesc_readContacts" 347 android:protectionLevel="dangerous" /> 348 349 <!-- Allows an application to write the user's contacts data. 350 <p>Protection level: dangerous 351 --> 352 <permission android:name="android.permission.WRITE_CONTACTS" 353 android:permissionGroup="android.permission-group.CONTACTS" 354 android:label="@string/permlab_writeContacts" 355 android:description="@string/permdesc_writeContacts" 356 android:protectionLevel="dangerous" /> 357 358 <!-- ====================================================================== --> 359 <!-- Permissions for accessing user's calendar --> 360 <!-- ====================================================================== --> 361 <eat-comment /> 362 363 <!-- Used for runtime permissions related to user's calendar. --> 364 <permission-group android:name="android.permission-group.CALENDAR" 365 android:icon="@drawable/perm_group_calendar" 366 android:label="@string/permgrouplab_calendar" 367 android:description="@string/permgroupdesc_calendar" 368 android:priority="200" /> 369 370 <!-- Allows an application to read the user's calendar data. 371 <p>Protection level: dangerous 372 --> 373 <permission android:name="android.permission.READ_CALENDAR" 374 android:permissionGroup="android.permission-group.CALENDAR" 375 android:label="@string/permlab_readCalendar" 376 android:description="@string/permdesc_readCalendar" 377 android:protectionLevel="dangerous" /> 378 379 <!-- Allows an application to write the user's calendar data. 380 <p>Protection level: dangerous 381 --> 382 <permission android:name="android.permission.WRITE_CALENDAR" 383 android:permissionGroup="android.permission-group.CALENDAR" 384 android:label="@string/permlab_writeCalendar" 385 android:description="@string/permdesc_writeCalendar" 386 android:protectionLevel="dangerous" /> 387 388 <!-- ====================================================================== --> 389 <!-- Permissions for accessing and modifying user's SMS messages --> 390 <!-- ====================================================================== --> 391 <eat-comment /> 392 393 <!-- Used for runtime permissions related to user's SMS messages. --> 394 <permission-group android:name="android.permission-group.SMS" 395 android:icon="@drawable/perm_group_sms" 396 android:label="@string/permgrouplab_sms" 397 android:description="@string/permgroupdesc_sms" 398 android:priority="300" /> 399 400 <!-- Allows an application to send SMS messages. 401 <p>Protection level: dangerous 402 --> 403 <permission android:name="android.permission.SEND_SMS" 404 android:permissionGroup="android.permission-group.SMS" 405 android:label="@string/permlab_sendSms" 406 android:description="@string/permdesc_sendSms" 407 android:permissionFlags="costsMoney" 408 android:protectionLevel="dangerous" /> 409 410 <!-- Allows an application to receive SMS messages. 411 <p>Protection level: dangerous 412 --> 413 <permission android:name="android.permission.RECEIVE_SMS" 414 android:permissionGroup="android.permission-group.SMS" 415 android:label="@string/permlab_receiveSms" 416 android:description="@string/permdesc_receiveSms" 417 android:protectionLevel="dangerous"/> 418 419 <!-- Allows an application to read SMS messages. 420 <p>Protection level: dangerous 421 --> 422 <permission android:name="android.permission.READ_SMS" 423 android:permissionGroup="android.permission-group.SMS" 424 android:label="@string/permlab_readSms" 425 android:description="@string/permdesc_readSms" 426 android:protectionLevel="dangerous" /> 427 428 <!-- Allows an application to receive WAP push messages. 429 <p>Protection level: dangerous 430 --> 431 <permission android:name="android.permission.RECEIVE_WAP_PUSH" 432 android:permissionGroup="android.permission-group.SMS" 433 android:label="@string/permlab_receiveWapPush" 434 android:description="@string/permdesc_receiveWapPush" 435 android:protectionLevel="dangerous" /> 436 437 <!-- Allows an application to monitor incoming MMS messages. 438 <p>Protection level: dangerous 439 --> 440 <permission android:name="android.permission.RECEIVE_MMS" 441 android:permissionGroup="android.permission-group.SMS" 442 android:label="@string/permlab_receiveMms" 443 android:description="@string/permdesc_receiveMms" 444 android:protectionLevel="dangerous" /> 445 446 <!-- Allows an application to read previously received cell broadcast 447 messages and to register a content observer to get notifications when 448 a cell broadcast has been received and added to the database. For 449 emergency alerts, the database is updated immediately after the 450 alert dialog and notification sound/vibration/speech are presented. 451 The "read" column is then updated after the user dismisses the alert. 452 This enables supplementary emergency assistance apps to start loading 453 additional emergency information (if Internet access is available) 454 when the alert is first received, and to delay presenting the info 455 to the user until after the initial alert dialog is dismissed. 456 <p>Protection level: dangerous 457 @hide Pending API council approval --> 458 <permission android:name="android.permission.READ_CELL_BROADCASTS" 459 android:permissionGroup="android.permission-group.SMS" 460 android:label="@string/permlab_readCellBroadcasts" 461 android:description="@string/permdesc_readCellBroadcasts" 462 android:protectionLevel="dangerous" /> 463 464 <!-- ====================================================================== --> 465 <!-- Permissions for accessing external storage --> 466 <!-- ====================================================================== --> 467 <eat-comment /> 468 469 <!-- Used for runtime permissions related to the shared external storage. --> 470 <permission-group android:name="android.permission-group.STORAGE" 471 android:icon="@drawable/perm_group_storage" 472 android:label="@string/permgrouplab_storage" 473 android:description="@string/permgroupdesc_storage" 474 android:priority="900" /> 475 476 <!-- Allows an application to read from external storage. 477 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly 478 granted this permission.</p> 479 <p>This permission is enforced starting in API level 19. Before API level 19, this 480 permission is not enforced and all apps still have access to read from external storage. 481 You can test your app with the permission enforced by enabling <em>Protect USB 482 storage</em> under Developer options in the Settings app on a device running Android 4.1 or 483 higher.</p> 484 <p>Also starting in API level 19, this permission is <em>not</em> required to 485 read/write files in your application-specific directories returned by 486 {@link android.content.Context#getExternalFilesDir} and 487 {@link android.content.Context#getExternalCacheDir}. 488 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 489 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 490 minSdkVersion}</a> and <a 491 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 492 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 493 grants your app this permission. If you don't need this permission, be sure your <a 494 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 495 targetSdkVersion}</a> is 4 or higher. 496 <p>Protection level: dangerous 497 --> 498 <permission android:name="android.permission.READ_EXTERNAL_STORAGE" 499 android:permissionGroup="android.permission-group.STORAGE" 500 android:label="@string/permlab_sdcardRead" 501 android:description="@string/permdesc_sdcardRead" 502 android:protectionLevel="dangerous" /> 503 504 <!-- Allows an application to write to external storage. 505 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 506 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 507 minSdkVersion}</a> and <a 508 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 509 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 510 grants your app this permission. If you don't need this permission, be sure your <a 511 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 512 targetSdkVersion}</a> is 4 or higher. 513 <p>Starting in API level 19, this permission is <em>not</em> required to 514 read/write files in your application-specific directories returned by 515 {@link android.content.Context#getExternalFilesDir} and 516 {@link android.content.Context#getExternalCacheDir}. 517 <p>Protection level: dangerous 518 --> 519 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" 520 android:permissionGroup="android.permission-group.STORAGE" 521 android:label="@string/permlab_sdcardWrite" 522 android:description="@string/permdesc_sdcardWrite" 523 android:protectionLevel="dangerous" /> 524 525 <!-- ====================================================================== --> 526 <!-- Permissions for accessing the device location --> 527 <!-- ====================================================================== --> 528 <eat-comment /> 529 530 <!-- Used for permissions that allow accessing the device location. --> 531 <permission-group android:name="android.permission-group.LOCATION" 532 android:icon="@drawable/perm_group_location" 533 android:label="@string/permgrouplab_location" 534 android:description="@string/permgroupdesc_location" 535 android:priority="400" /> 536 537 <!-- Allows an app to access precise location. 538 <p>Protection level: dangerous 539 --> 540 <permission android:name="android.permission.ACCESS_FINE_LOCATION" 541 android:permissionGroup="android.permission-group.LOCATION" 542 android:label="@string/permlab_accessFineLocation" 543 android:description="@string/permdesc_accessFineLocation" 544 android:protectionLevel="dangerous" /> 545 546 <!-- Allows an app to access approximate location. 547 <p>Protection level: dangerous 548 --> 549 <permission android:name="android.permission.ACCESS_COARSE_LOCATION" 550 android:permissionGroup="android.permission-group.LOCATION" 551 android:label="@string/permlab_accessCoarseLocation" 552 android:description="@string/permdesc_accessCoarseLocation" 553 android:protectionLevel="dangerous" /> 554 555 <!-- ====================================================================== --> 556 <!-- Permissions for accessing the device telephony --> 557 <!-- ====================================================================== --> 558 <eat-comment /> 559 560 <!-- Used for permissions that are associated telephony features. --> 561 <permission-group android:name="android.permission-group.PHONE" 562 android:icon="@drawable/perm_group_phone_calls" 563 android:label="@string/permgrouplab_phone" 564 android:description="@string/permgroupdesc_phone" 565 android:priority="500" /> 566 567 <!-- Allows read only access to phone state. 568 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 569 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 570 minSdkVersion}</a> and <a 571 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 572 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 573 grants your app this permission. If you don't need this permission, be sure your <a 574 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 575 targetSdkVersion}</a> is 4 or higher. 576 <p>Protection level: dangerous 577 --> 578 <permission android:name="android.permission.READ_PHONE_STATE" 579 android:permissionGroup="android.permission-group.PHONE" 580 android:label="@string/permlab_readPhoneState" 581 android:description="@string/permdesc_readPhoneState" 582 android:protectionLevel="dangerous" /> 583 584 <!-- Allows an application to initiate a phone call without going through 585 the Dialer user interface for the user to confirm the call. 586 <p>Protection level: dangerous 587 --> 588 <permission android:name="android.permission.CALL_PHONE" 589 android:permissionGroup="android.permission-group.PHONE" 590 android:permissionFlags="costsMoney" 591 android:label="@string/permlab_callPhone" 592 android:description="@string/permdesc_callPhone" 593 android:protectionLevel="dangerous" /> 594 595 <!-- Allows an application to access the IMS call service: making and 596 modifying a call 597 <p>Protection level: signature|system 598 @hide 599 --> 600 <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE" 601 android:permissionGroup="android.permission-group.PHONE" 602 android:label="@string/permlab_accessImsCallService" 603 android:description="@string/permdesc_accessImsCallService" 604 android:protectionLevel="signature|system" /> 605 606 <!-- Allows an application to read the user's call log. 607 <p class="note"><strong>Note:</strong> If your app uses the 608 {@link #READ_CONTACTS} permission and <em>both</em> your <a 609 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 610 minSdkVersion}</a> and <a 611 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 612 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 613 grants your app this permission. If you don't need this permission, be sure your <a 614 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 615 targetSdkVersion}</a> is 16 or higher.</p> 616 <p>Protection level: dangerous 617 --> 618 <permission android:name="android.permission.READ_CALL_LOG" 619 android:permissionGroup="android.permission-group.PHONE" 620 android:label="@string/permlab_readCallLog" 621 android:description="@string/permdesc_readCallLog" 622 android:protectionLevel="dangerous" /> 623 624 <!-- Allows an application to write (but not read) the user's 625 contacts data. 626 <p class="note"><strong>Note:</strong> If your app uses the 627 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a 628 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 629 minSdkVersion}</a> and <a 630 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 631 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 632 grants your app this permission. If you don't need this permission, be sure your <a 633 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 634 targetSdkVersion}</a> is 16 or higher.</p> 635 <p>Protection level: dangerous 636 --> 637 <permission android:name="android.permission.WRITE_CALL_LOG" 638 android:permissionGroup="android.permission-group.PHONE" 639 android:label="@string/permlab_writeCallLog" 640 android:description="@string/permdesc_writeCallLog" 641 android:protectionLevel="dangerous" /> 642 643 <!-- Allows an application to add voicemails into the system. 644 <p>Protection level: dangerous 645 --> 646 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL" 647 android:permissionGroup="android.permission-group.PHONE" 648 android:label="@string/permlab_addVoicemail" 649 android:description="@string/permdesc_addVoicemail" 650 android:protectionLevel="dangerous" /> 651 652 <!-- Allows an application to use SIP service. 653 <p>Protection level: dangerous 654 --> 655 <permission android:name="android.permission.USE_SIP" 656 android:permissionGroup="android.permission-group.PHONE" 657 android:description="@string/permdesc_use_sip" 658 android:label="@string/permlab_use_sip" 659 android:protectionLevel="dangerous"/> 660 661 <!-- Allows an application to see the number being dialed during an outgoing 662 call with the option to redirect the call to a different number or 663 abort the call altogether. 664 <p>Protection level: dangerous 665 --> 666 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS" 667 android:permissionGroup="android.permission-group.PHONE" 668 android:label="@string/permlab_processOutgoingCalls" 669 android:description="@string/permdesc_processOutgoingCalls" 670 android:protectionLevel="dangerous" /> 671 672 <!-- ====================================================================== --> 673 <!-- Permissions for accessing the device microphone --> 674 <!-- ====================================================================== --> 675 <eat-comment /> 676 677 <!-- Used for permissions that are associated with accessing 678 microphone audio from the device. Note that phone calls also capture audio 679 but are in a separate (more visible) permission group. --> 680 <permission-group android:name="android.permission-group.MICROPHONE" 681 android:icon="@drawable/perm_group_microphone" 682 android:label="@string/permgrouplab_microphone" 683 android:description="@string/permgroupdesc_microphone" 684 android:priority="600" /> 685 686 <!-- Allows an application to record audio. 687 <p>Protection level: dangerous 688 --> 689 <permission android:name="android.permission.RECORD_AUDIO" 690 android:permissionGroup="android.permission-group.MICROPHONE" 691 android:label="@string/permlab_recordAudio" 692 android:description="@string/permdesc_recordAudio" 693 android:protectionLevel="dangerous"/> 694 695 <!-- ====================================================================== --> 696 <!-- Permissions for accessing the device camera --> 697 <!-- ====================================================================== --> 698 <eat-comment /> 699 700 <!-- Used for permissions that are associated with accessing 701 camera or capturing images/video from the device. --> 702 <permission-group android:name="android.permission-group.CAMERA" 703 android:icon="@drawable/perm_group_camera" 704 android:label="@string/permgrouplab_camera" 705 android:description="@string/permgroupdesc_camera" 706 android:priority="700" /> 707 708 <!-- Required to be able to access the camera device. 709 <p>This will automatically enforce the <a 710 href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code 711 <uses-feature>}</a> manifest element for <em>all</em> camera features. 712 If you do not require all camera features or can properly operate if a camera 713 is not available, then you must modify your manifest as appropriate in order to 714 install on devices that don't support all camera features.</p> 715 <p>Protection level: dangerous 716 --> 717 <permission android:name="android.permission.CAMERA" 718 android:permissionGroup="android.permission-group.CAMERA" 719 android:label="@string/permlab_camera" 720 android:description="@string/permdesc_camera" 721 android:protectionLevel="dangerous" /> 722 723 724 <!-- ====================================================================== --> 725 <!-- Permissions for accessing the device sensors --> 726 <!-- ====================================================================== --> 727 <eat-comment /> 728 729 <!-- Used for permissions that are associated with accessing 730 camera or capturing images/video from the device. --> 731 <permission-group android:name="android.permission-group.SENSORS" 732 android:icon="@drawable/perm_group_sensors" 733 android:label="@string/permgrouplab_sensors" 734 android:description="@string/permgroupdesc_sensors" 735 android:priority="800" /> 736 737 <!-- Allows an application to access data from sensors that the user uses to 738 measure what is happening inside his/her body, such as heart rate. 739 <p>Protection level: dangerous --> 740 <permission android:name="android.permission.BODY_SENSORS" 741 android:permissionGroup="android.permission-group.SENSORS" 742 android:label="@string/permlab_bodySensors" 743 android:description="@string/permdesc_bodySensors" 744 android:protectionLevel="dangerous" /> 745 746 <!-- Allows an app to use fingerprint hardware. 747 <p>Protection level: normal 748 --> 749 <permission android:name="android.permission.USE_FINGERPRINT" 750 android:permissionGroup="android.permission-group.SENSORS" 751 android:label="@string/permlab_useFingerprint" 752 android:description="@string/permdesc_useFingerprint" 753 android:protectionLevel="normal" /> 754 755 <!-- ====================================================================== --> 756 <!-- REMOVED PERMISSIONS --> 757 <!-- ====================================================================== --> 758 759 <!-- @hide We need to keep this around for backwards compatibility --> 760 <permission android:name="android.permission.READ_PROFILE" 761 android:protectionLevel="normal" 762 android:permissionFlags="hidden"/> 763 764 <!-- @hide We need to keep this around for backwards compatibility --> 765 <permission android:name="android.permission.WRITE_PROFILE" 766 android:protectionLevel="normal" 767 android:permissionFlags="hidden"/> 768 769 <!-- @hide We need to keep this around for backwards compatibility --> 770 <permission android:name="android.permission.READ_SOCIAL_STREAM" 771 android:protectionLevel="normal" 772 android:permissionFlags="hidden"/> 773 774 <!-- @hide We need to keep this around for backwards compatibility --> 775 <permission android:name="android.permission.WRITE_SOCIAL_STREAM" 776 android:protectionLevel="normal" 777 android:permissionFlags="hidden"/> 778 779 <!-- @hide We need to keep this around for backwards compatibility --> 780 <permission android:name="android.permission.READ_USER_DICTIONARY" 781 android:protectionLevel="normal" 782 android:permissionFlags="hidden"/> 783 784 <!-- @hide We need to keep this around for backwards compatibility --> 785 <permission android:name="android.permission.WRITE_USER_DICTIONARY" 786 android:protectionLevel="normal" 787 android:permissionFlags="hidden"/> 788 789 <!-- @hide We need to keep this around for backwards compatibility --> 790 <permission android:name="android.permission.WRITE_SMS" 791 android:protectionLevel="normal" 792 android:permissionFlags="hidden"/> 793 794 <!-- @hide We need to keep this around for backwards compatibility --> 795 <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS" 796 android:protectionLevel="normal" 797 android:permissionFlags="hidden"/> 798 799 <!-- @hide We need to keep this around for backwards compatibility --> 800 <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS" 801 android:protectionLevel="normal" 802 android:permissionFlags="hidden"/> 803 804 <!-- @hide We need to keep this around for backwards compatibility --> 805 <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS" 806 android:protectionLevel="normal" 807 android:permissionFlags="hidden"/> 808 809 <!-- @hide We need to keep this around for backwards compatibility --> 810 <permission android:name="android.permission.MANAGE_ACCOUNTS" 811 android:protectionLevel="normal" 812 android:permissionFlags="hidden"/> 813 814 <!-- @hide We need to keep this around for backwards compatibility --> 815 <permission android:name="android.permission.USE_CREDENTIALS" 816 android:protectionLevel="normal" 817 android:permissionFlags="hidden"/> 818 819 <!-- @hide We need to keep this around for backwards compatibility --> 820 <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ" 821 android:protectionLevel="normal" 822 android:permissionFlags="hidden"/> 823 824 <!-- @hide We need to keep this around for backwards compatibility --> 825 <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE" 826 android:protectionLevel="normal" 827 android:permissionFlags="hidden"/> 828 829 <!-- ====================================================================== --> 830 <!-- INSTALL PERMISSIONS --> 831 <!-- ====================================================================== --> 832 833` <!-- =========================================== --> 834 <!-- Permissions for accessing contact metadata --> 835 <!-- =========================================== --> 836 <eat-comment /> 837 838 <!-- @SystemApi Allows an application to read/write contact metadata. 839 <p>Not for use by third-party applications. --> 840 <permission android:name="android.permission.READ_WRITE_CONTACT_METADATA" 841 android:protectionLevel="signature|system" /> 842 843 <!-- ================================== --> 844 <!-- Permissions for accessing messages --> 845 <!-- ================================== --> 846 <eat-comment /> 847 848 <!-- @SystemApi Allows an application (Phone) to send a request to other applications 849 to handle the respond-via-message action during incoming calls. 850 <p>Not for use by third-party applications. --> 851 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE" 852 android:protectionLevel="signature|privileged" /> 853 854 <!-- Allows an application to filter carrier specific sms. 855 @hide --> 856 <permission android:name="android.permission.CARRIER_FILTER_SMS" 857 android:protectionLevel="signature|privileged" /> 858 859 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages, 860 to record or display them to the user. 861 <p>Not for use by third-party applications. 862 @hide Pending API council approval --> 863 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" 864 android:protectionLevel="signature|privileged" /> 865 866 <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record 867 or perform processing on them. --> 868 <!-- @hide --> 869 <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP" 870 android:protectionLevel="signature|privileged" /> 871 872 <!-- @SystemApi @hide Allows an application to execute contacts directory search. 873 This should only be used by ContactsProvider. 874 <p>Not for use by third-party applications. --> 875 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH" 876 android:protectionLevel="signature|privileged" /> 877 878 <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider. 879 <p>Not for use by third-party applications. --> 880 <permission android:name="android.permission.MODIFY_CELL_BROADCASTS" 881 android:protectionLevel="signature|system" /> 882 883 <!-- =============================================================== --> 884 <!-- Permissions for setting the device alarm --> 885 <!-- =============================================================== --> 886 <eat-comment /> 887 888 <!-- Allows an application to broadcast an Intent to set an alarm for the user. 889 <p>Protection level: normal 890 --> 891 <permission android:name="com.android.alarm.permission.SET_ALARM" 892 android:label="@string/permlab_setAlarm" 893 android:description="@string/permdesc_setAlarm" 894 android:protectionLevel="normal" /> 895 896 <!-- =============================================================== --> 897 <!-- Permissions for accessing the user voicemail --> 898 <!-- =============================================================== --> 899 <eat-comment /> 900 901 <!-- Allows an application to modify and remove existing voicemails in the system 902 <p>Protection level: system|signature 903 --> 904 <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL" 905 android:protectionLevel="system|signature" /> 906 907 <!-- Allows an application to read voicemails in the system. 908 <p>Protection level: system|signature 909 --> 910 <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL" 911 android:protectionLevel="system|signature" /> 912 913 <!-- ======================================= --> 914 <!-- Permissions for accessing location info --> 915 <!-- ======================================= --> 916 <eat-comment /> 917 918 <!-- Allows an application to access extra location provider commands 919 <p>Protection level: normal 920 --> 921 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" 922 android:label="@string/permlab_accessLocationExtraCommands" 923 android:description="@string/permdesc_accessLocationExtraCommands" 924 android:protectionLevel="normal" /> 925 926 <!-- @SystemApi Allows an application to install a location provider into the Location Manager. 927 <p>Not for use by third-party applications. --> 928 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER" 929 android:protectionLevel="signature|privileged" /> 930 931 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files. 932 This should only be used by HDMI-CEC service. 933 --> 934 <permission android:name="android.permission.HDMI_CEC" 935 android:protectionLevel="signature|privileged" /> 936 937 <!-- @SystemApi Allows an application to use location features in hardware, 938 such as the geofencing api. 939 <p>Not for use by third-party applications. --> 940 <permission android:name="android.permission.LOCATION_HARDWARE" 941 android:protectionLevel="signature|privileged" /> 942 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/> 943 944 <!-- @SystemApi Allows an application to create mock location providers for testing. 945 <p>Protection level: signature 946 @hide 947 --> 948 <permission android:name="android.permission.ACCESS_MOCK_LOCATION" 949 android:protectionLevel="signature" /> 950 951 <!-- ======================================= --> 952 <!-- Permissions for accessing networks --> 953 <!-- ======================================= --> 954 <eat-comment /> 955 956 <!-- Allows applications to open network sockets. 957 <p>Protection level: normal 958 --> 959 <permission android:name="android.permission.INTERNET" 960 android:description="@string/permdesc_createNetworkSockets" 961 android:label="@string/permlab_createNetworkSockets" 962 android:protectionLevel="normal" /> 963 964 <!-- Allows applications to access information about networks 965 <p>Protection level: normal 966 --> 967 <permission android:name="android.permission.ACCESS_NETWORK_STATE" 968 android:description="@string/permdesc_accessNetworkState" 969 android:label="@string/permlab_accessNetworkState" 970 android:protectionLevel="normal" /> 971 972 <!-- Allows applications to access information about Wi-Fi networks. 973 <p>Protection level: normal 974 --> 975 <permission android:name="android.permission.ACCESS_WIFI_STATE" 976 android:description="@string/permdesc_accessWifiState" 977 android:label="@string/permlab_accessWifiState" 978 android:protectionLevel="normal" /> 979 980 <!-- Allows applications to change Wi-Fi connectivity state. 981 <p>Protection level: normal 982 --> 983 <permission android:name="android.permission.CHANGE_WIFI_STATE" 984 android:description="@string/permdesc_changeWifiState" 985 android:label="@string/permlab_changeWifiState" 986 android:protectionLevel="normal" /> 987 988 <!-- @SystemApi @hide Allows applications to read Wi-Fi credential. 989 <p>Not for use by third-party applications. --> 990 <permission android:name="android.permission.READ_WIFI_CREDENTIAL" 991 android:protectionLevel="signature|privileged" /> 992 993 <!-- @SystemApi @hide Allow system apps to receive broadcast 994 when a wifi network credential is changed. 995 <p>Not for use by third-party applications. --> 996 <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE" 997 android:protectionLevel="signature|privileged" /> 998 999 <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created 1000 by another application. Once reconfigured the original creator cannot make any further 1001 modifications. 1002 <p>Not for use by third-party applications. --> 1003 <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG" 1004 android:protectionLevel="signature|privileged" /> 1005 1006 <!-- @hide --> 1007 <permission android:name="android.permission.ACCESS_WIMAX_STATE" 1008 android:description="@string/permdesc_accessWimaxState" 1009 android:label="@string/permlab_accessWimaxState" 1010 android:protectionLevel="normal" /> 1011 1012 <!-- @hide --> 1013 <permission android:name="android.permission.CHANGE_WIMAX_STATE" 1014 android:description="@string/permdesc_changeWimaxState" 1015 android:label="@string/permlab_changeWimaxState" 1016 android:protectionLevel="normal" /> 1017 1018 <!-- Allows applications to act as network scorers. @hide @SystemApi--> 1019 <permission android:name="android.permission.SCORE_NETWORKS" 1020 android:protectionLevel="signature|privileged" /> 1021 1022 <!-- ======================================= --> 1023 <!-- Permissions for short range, peripheral networks --> 1024 <!-- ======================================= --> 1025 <eat-comment /> 1026 1027 <!-- Allows applications to connect to paired bluetooth devices. 1028 <p>Protection level: normal 1029 --> 1030 <permission android:name="android.permission.BLUETOOTH" 1031 android:description="@string/permdesc_bluetooth" 1032 android:label="@string/permlab_bluetooth" 1033 android:protectionLevel="normal" /> 1034 1035 <!-- Allows applications to discover and pair bluetooth devices. 1036 <p>Protection level: normal 1037 --> 1038 <permission android:name="android.permission.BLUETOOTH_ADMIN" 1039 android:description="@string/permdesc_bluetoothAdmin" 1040 android:label="@string/permlab_bluetoothAdmin" 1041 android:protectionLevel="normal" /> 1042 1043 <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to 1044 allow or disallow phonebook access or message access. 1045 This is not available to third party applications. --> 1046 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED" 1047 android:protectionLevel="system|signature" /> 1048 1049 <!-- Control access to email providers exclusively for Bluetooth 1050 @hide 1051 --> 1052 <permission android:name="android.permission.BLUETOOTH_MAP" 1053 android:protectionLevel="signature" /> 1054 1055 <!-- Allows bluetooth stack to access files 1056 @hide This should only be used by Bluetooth apk. 1057 --> 1058 <permission android:name="android.permission.BLUETOOTH_STACK" 1059 android:protectionLevel="signature" /> 1060 1061 <!-- Allows applications to perform I/O operations over NFC. 1062 <p>Protection level: normal 1063 --> 1064 <permission android:name="android.permission.NFC" 1065 android:description="@string/permdesc_nfc" 1066 android:label="@string/permlab_nfc" 1067 android:protectionLevel="normal" /> 1068 1069 <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs. 1070 @hide --> 1071 <permission android:name="android.permission.CONNECTIVITY_INTERNAL" 1072 android:protectionLevel="signature|privileged" /> 1073 1074 <!-- Allows a system application to access hardware packet offload capabilities. 1075 @hide --> 1076 <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD" 1077 android:protectionLevel="signature|privileged" /> 1078 1079 <!-- @SystemApi 1080 @hide --> 1081 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE" 1082 android:protectionLevel="signature|privileged" /> 1083 1084 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device. 1085 @hide --> 1086 <permission android:name="android.permission.LOOP_RADIO" 1087 android:protectionLevel="signature|privileged" /> 1088 1089 <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth 1090 @hide --> 1091 <permission android:name="android.permission.NFC_HANDOVER_STATUS" 1092 android:protectionLevel="signature|privileged" /> 1093 1094 <!-- ================================== --> 1095 <!-- Permissions for accessing accounts --> 1096 <!-- ================================== --> 1097 <eat-comment /> 1098 1099 <!-- Allows access to the list of accounts in the Accounts Service. 1100 <p>Protection level: normal 1101 --> 1102 <permission android:name="android.permission.GET_ACCOUNTS" 1103 android:permissionGroup="android.permission-group.CONTACTS" 1104 android:protectionLevel="dangerous" 1105 android:description="@string/permdesc_getAccounts" 1106 android:label="@string/permlab_getAccounts" /> 1107 1108 <!-- @SystemApi Allows applications to call into AccountAuthenticators. 1109 <p>Not for use by third-party applications. --> 1110 <permission android:name="android.permission.ACCOUNT_MANAGER" 1111 android:protectionLevel="signature" /> 1112 1113 <!-- ================================== --> 1114 <!-- Permissions for accessing hardware that may effect battery life--> 1115 <!-- ================================== --> 1116 <eat-comment /> 1117 1118 <!-- Allows applications to enter Wi-Fi Multicast mode. 1119 <p>Protection level: normal 1120 --> 1121 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE" 1122 android:description="@string/permdesc_changeWifiMulticastState" 1123 android:label="@string/permlab_changeWifiMulticastState" 1124 android:protectionLevel="normal" /> 1125 1126 <!-- Allows access to the vibrator. 1127 <p>Protection level: normal 1128 --> 1129 <permission android:name="android.permission.VIBRATE" 1130 android:label="@string/permlab_vibrate" 1131 android:description="@string/permdesc_vibrate" 1132 android:protectionLevel="normal" /> 1133 1134 <!-- Allows access to the flashlight. 1135 <p>Protection level: normal 1136 --> 1137 <permission android:name="android.permission.FLASHLIGHT" 1138 android:label="@string/permlab_flashlight" 1139 android:description="@string/permdesc_flashlight" 1140 android:protectionLevel="normal" /> 1141 1142 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen 1143 from dimming. 1144 <p>Protection level: normal 1145 --> 1146 <permission android:name="android.permission.WAKE_LOCK" 1147 android:label="@string/permlab_wakeLock" 1148 android:description="@string/permdesc_wakeLock" 1149 android:protectionLevel="normal" /> 1150 1151 <!-- Allows using the device's IR transmitter, if available. 1152 <p>Protection level: normal 1153 --> 1154 <permission android:name="android.permission.TRANSMIT_IR" 1155 android:label="@string/permlab_transmitIr" 1156 android:description="@string/permdesc_transmitIr" 1157 android:protectionLevel="normal" /> 1158 1159 <!-- ==================================================== --> 1160 <!-- Permissions related to changing audio settings --> 1161 <!-- ==================================================== --> 1162 <eat-comment /> 1163 1164 <!-- Allows an application to modify global audio settings. 1165 <p>Protection level: normal 1166 --> 1167 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" 1168 android:label="@string/permlab_modifyAudioSettings" 1169 android:description="@string/permdesc_modifyAudioSettings" 1170 android:protectionLevel="normal" /> 1171 1172 <!-- ================================== --> 1173 <!-- Permissions for accessing hardware --> 1174 <!-- ================================== --> 1175 <eat-comment /> 1176 1177 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices 1178 @hide --> 1179 <permission android:name="android.permission.MANAGE_USB" 1180 android:protectionLevel="signature|privileged" /> 1181 1182 <!-- @SystemApi Allows an application to access the MTP USB kernel driver. 1183 For use only by the device side MTP implementation. 1184 @hide --> 1185 <permission android:name="android.permission.ACCESS_MTP" 1186 android:protectionLevel="signature|privileged" /> 1187 1188 <!-- @SystemApi Allows access to hardware peripherals. Intended only for hardware testing. 1189 <p>Not for use by third-party applications. 1190 @hide 1191 --> 1192 <permission android:name="android.permission.HARDWARE_TEST" 1193 android:protectionLevel="signature" /> 1194 1195 <!-- @SystemApi Allows access to FM 1196 @hide This is not a third-party API (intended for system apps).--> 1197 <permission android:name="android.permission.ACCESS_FM_RADIO" 1198 android:protectionLevel="signature|privileged" /> 1199 1200 <!-- Allows access to configure network interfaces, configure/use IPSec, etc. 1201 @hide --> 1202 <permission android:name="android.permission.NET_ADMIN" 1203 android:protectionLevel="signature" /> 1204 1205 <!-- Allows registration for remote audio playback. @hide --> 1206 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK" 1207 android:protectionLevel="signature" /> 1208 1209 <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as 1210 built-in tuners and HDMI-in's. 1211 @hide This should only be used by OEM's TvInputService's. 1212 --> 1213 <permission android:name="android.permission.TV_INPUT_HARDWARE" 1214 android:protectionLevel="signature|privileged" /> 1215 1216 <!-- @SystemApi Allows to capture a frame of TV input hardware such as 1217 built-in tuners and HDMI-in's. 1218 @hide <p>Not for use by third-party applications. 1219 --> 1220 <permission android:name="android.permission.CAPTURE_TV_INPUT" 1221 android:protectionLevel="signature|privileged" /> 1222 1223 <!-- @hide Allows TvInputService to access DVB device. 1224 <p>Not for use by third-party applications. --> 1225 <permission android:name="android.permission.DVB_DEVICE" 1226 android:protectionLevel="signature|privileged" /> 1227 1228 <!-- @hide Allows enabling/disabling OEM unlock 1229 <p>Not for use by third-party applications. --> 1230 <permission android:name="android.permission.OEM_UNLOCK_STATE" 1231 android:protectionLevel="signature" /> 1232 1233 <!-- @hide Allows querying state of PersistentDataBlock 1234 <p>Not for use by third-party applications. --> 1235 <permission android:name="android.permission.ACCESS_PDB_STATE" 1236 android:protectionLevel="signature" /> 1237 1238 <!-- @hide Allows system update service to notify device owner about pending updates. 1239 <p>Not for use by third-party applications. --> 1240 <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE" 1241 android:protectionLevel="signature|privileged" /> 1242 1243 <!-- =========================================== --> 1244 <!-- Permissions associated with camera and image capture --> 1245 <!-- =========================================== --> 1246 <eat-comment /> 1247 1248 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when 1249 a camera is in use by an application. 1250 @hide --> 1251 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED" 1252 android:protectionLevel="signature|privileged" /> 1253 1254 <!-- Allows sending the camera service notifications about system-wide events. 1255 @hide --> 1256 <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS" 1257 android:protectionLevel="signature|privileged" /> 1258 1259 <!-- =========================================== --> 1260 <!-- Permissions associated with telephony state --> 1261 <!-- =========================================== --> 1262 <eat-comment /> 1263 1264 <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc. 1265 Does not include placing calls. 1266 <p>Not for use by third-party applications. --> 1267 <permission android:name="android.permission.MODIFY_PHONE_STATE" 1268 android:protectionLevel="signature|privileged" /> 1269 1270 <!-- Allows read only access to precise phone state. 1271 @hide Pending API council approval --> 1272 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE" 1273 android:protectionLevel="signature|privileged" /> 1274 1275 <!-- @SystemApi Allows read access to privileged phone state. 1276 @hide Used internally. --> 1277 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" 1278 android:protectionLevel="signature|privileged" /> 1279 1280 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1281 PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount 1282 corresponds to a device SIM. 1283 @hide --> 1284 <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION" 1285 android:protectionLevel="system|signature" /> 1286 1287 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1288 PhoneAccount#CAPABILITY_CALL_PROVIDER. 1289 @hide --> 1290 <permission android:name="android.permission.REGISTER_CALL_PROVIDER" 1291 android:protectionLevel="system|signature" /> 1292 1293 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1294 PhoneAccount#CAPABILITY_CONNECTION_MANAGER 1295 @hide --> 1296 <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER" 1297 android:protectionLevel="system|signature" /> 1298 1299 <!-- Must be required by a {@link android.telecom.InCallService}, 1300 to ensure that only the system can bind to it. 1301 <p>Protection level: system|signature 1302 --> 1303 <permission android:name="android.permission.BIND_INCALL_SERVICE" 1304 android:protectionLevel="system|signature" /> 1305 1306 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1307 to ensure that only the system can bind to it. 1308 @deprecated {@link android.telecom.ConnectionService}s should require 1309 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead. 1310 @SystemApi 1311 @hide --> 1312 <permission android:name="android.permission.BIND_CONNECTION_SERVICE" 1313 android:protectionLevel="system|signature" /> 1314 1315 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1316 to ensure that only the system can bind to it. 1317 <p>Protection level: system|signature 1318 --> 1319 <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE" 1320 android:protectionLevel="system|signature" /> 1321 1322 <!-- @SystemApi Allows an application to control the in-call experience. 1323 @hide --> 1324 <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE" 1325 android:protectionLevel="system|signature" /> 1326 1327 <!-- Allows an application to receive STK related commands. 1328 @hide --> 1329 <permission android:name="android.permission.RECEIVE_STK_COMMANDS" 1330 android:protectionLevel="system|signature" /> 1331 1332 <!-- ================================== --> 1333 <!-- Permissions for sdcard interaction --> 1334 <!-- ================================== --> 1335 <eat-comment /> 1336 1337 <!-- @SystemApi Allows an application to write to internal media storage 1338 @hide --> 1339 <permission android:name="android.permission.WRITE_MEDIA_STORAGE" 1340 android:protectionLevel="signature|privileged" /> 1341 1342 <!-- Allows an application to manage access to documents, usually as part 1343 of a document picker. 1344 <p>Protection level: signature 1345 --> 1346 <permission android:name="android.permission.MANAGE_DOCUMENTS" 1347 android:protectionLevel="signature" /> 1348 1349 <!-- ================================== --> 1350 <!-- Permissions for screenlock --> 1351 <!-- ================================== --> 1352 <eat-comment /> 1353 1354 <!-- Allows applications to disable the keyguard if it is not secure. 1355 <p>Protection level: normal 1356 --> 1357 <permission android:name="android.permission.DISABLE_KEYGUARD" 1358 android:description="@string/permdesc_disableKeyguard" 1359 android:label="@string/permlab_disableKeyguard" 1360 android:protectionLevel="normal" /> 1361 1362 <!-- ================================== --> 1363 <!-- Permissions to access other installed applications --> 1364 <!-- ================================== --> 1365 <eat-comment /> 1366 1367 <!-- @deprecated No longer enforced. --> 1368 <permission android:name="android.permission.GET_TASKS" 1369 android:label="@string/permlab_getTasks" 1370 android:description="@string/permdesc_getTasks" 1371 android:protectionLevel="normal" /> 1372 1373 <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really 1374 give access to task information. We need this new one because there are 1375 many existing apps that use add libraries and such that have validation 1376 code to ensure the app has requested the GET_TASKS permission by seeing 1377 if it has been granted the permission... if it hasn't, it kills the app 1378 with a message about being upset. So we need to have it continue to look 1379 like the app is getting that permission, even though it will never be 1380 checked, and new privileged apps can now request this one for real access. 1381 @hide 1382 @SystemApi --> 1383 <permission android:name="android.permission.REAL_GET_TASKS" 1384 android:protectionLevel="signature|privileged" /> 1385 1386 <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo. 1387 @hide --> 1388 <permission android:name="android.permission.START_TASKS_FROM_RECENTS" 1389 android:protectionLevel="signature|privileged" /> 1390 1391 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions 1392 across the users on the device, using singleton services and 1393 user-targeted broadcasts. This permission is not available to 1394 third party applications. --> 1395 <permission android:name="android.permission.INTERACT_ACROSS_USERS" 1396 android:protectionLevel="signature|privileged|development" /> 1397 1398 <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS} 1399 that removes restrictions on where broadcasts can be sent and allows other 1400 types of interactions. --> 1401 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL" 1402 android:protectionLevel="signature|installer" /> 1403 1404 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage 1405 users on the device. This permission is not available to 1406 third party applications. --> 1407 <permission android:name="android.permission.MANAGE_USERS" 1408 android:protectionLevel="signature|privileged" /> 1409 1410 <!-- @hide Allows an application to set the profile owners and the device owner. 1411 This permission is not available to third party applications.--> 1412 <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS" 1413 android:protectionLevel="signature" 1414 android:label="@string/permlab_manageProfileAndDeviceOwners" 1415 android:description="@string/permdesc_manageProfileAndDeviceOwners" /> 1416 1417 <!-- Allows an application to get full detailed information about 1418 recently running tasks, with full fidelity to the real state. 1419 @hide --> 1420 <permission android:name="android.permission.GET_DETAILED_TASKS" 1421 android:protectionLevel="signature" /> 1422 1423 <!-- Allows an application to change the Z-order of tasks. 1424 <p>Protection level: normal 1425 --> 1426 <permission android:name="android.permission.REORDER_TASKS" 1427 android:label="@string/permlab_reorderTasks" 1428 android:description="@string/permdesc_reorderTasks" 1429 android:protectionLevel="normal" /> 1430 1431 <!-- @hide Allows an application to change to remove/kill tasks --> 1432 <permission android:name="android.permission.REMOVE_TASKS" 1433 android:protectionLevel="signature" /> 1434 1435 <!-- @SystemApi @hide Allows an application to create/manage/remove stacks --> 1436 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS" 1437 android:protectionLevel="signature|privileged" /> 1438 1439 <!-- Allows an application to start any activity, regardless of permission 1440 protection or exported state. 1441 @hide --> 1442 <permission android:name="android.permission.START_ANY_ACTIVITY" 1443 android:protectionLevel="signature" /> 1444 1445 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage} 1446 API is no longer supported. --> 1447 <permission android:name="android.permission.RESTART_PACKAGES" 1448 android:label="@string/permlab_killBackgroundProcesses" 1449 android:description="@string/permdesc_killBackgroundProcesses" 1450 android:protectionLevel="normal" /> 1451 1452 <!-- Allows an application to call 1453 {@link android.app.ActivityManager#killBackgroundProcesses}. 1454 <p>Protection level: normal 1455 --> 1456 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES" 1457 android:label="@string/permlab_killBackgroundProcesses" 1458 android:description="@string/permdesc_killBackgroundProcesses" 1459 android:protectionLevel="normal" /> 1460 1461 <!-- @SystemApi @hide Allows an application to retrieve a package's importance. 1462 This permission is not available to third party applications. --> 1463 <permission android:name="android.permission.GET_PACKAGE_IMPORTANCE" 1464 android:protectionLevel="signature|privileged" /> 1465 1466 <!-- ================================== --> 1467 <!-- Permissions affecting the display of other applications --> 1468 <!-- ================================== --> 1469 <eat-comment /> 1470 1471 <!-- Allows an application to open windows using the type 1472 {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT}, 1473 shown on top of all other applications. Very few applications 1474 should use this permission; these windows are intended for 1475 system-level interaction with the user. --> 1476 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW" 1477 android:label="@string/permlab_systemAlertWindow" 1478 android:description="@string/permdesc_systemAlertWindow" 1479 android:protectionLevel="signature|preinstalled|appop|pre23" /> 1480 1481 <!-- ================================== --> 1482 <!-- Permissions affecting the system wallpaper --> 1483 <!-- ================================== --> 1484 <eat-comment /> 1485 1486 <!-- Allows applications to set the wallpaper. 1487 <p>Protection level: normal 1488 --> 1489 <permission android:name="android.permission.SET_WALLPAPER" 1490 android:label="@string/permlab_setWallpaper" 1491 android:description="@string/permdesc_setWallpaper" 1492 android:protectionLevel="normal" /> 1493 1494 <!-- Allows applications to set the wallpaper hints. 1495 <p>Protection level: normal 1496 --> 1497 <permission android:name="android.permission.SET_WALLPAPER_HINTS" 1498 android:label="@string/permlab_setWallpaperHints" 1499 android:description="@string/permdesc_setWallpaperHints" 1500 android:protectionLevel="normal" /> 1501 1502 <!-- ============================================ --> 1503 <!-- Permissions for changing the system clock --> 1504 <!-- ============================================ --> 1505 <eat-comment /> 1506 1507 <!-- @SystemApi Allows applications to set the system time. 1508 <p>Not for use by third-party applications. --> 1509 <permission android:name="android.permission.SET_TIME" 1510 android:protectionLevel="signature|privileged" /> 1511 1512 <!-- Allows applications to set the system time zone. 1513 <p>Protection level: normal 1514 --> 1515 <permission android:name="android.permission.SET_TIME_ZONE" 1516 android:label="@string/permlab_setTimeZone" 1517 android:description="@string/permdesc_setTimeZone" 1518 android:protectionLevel="normal" /> 1519 1520 <!-- ==================================================== --> 1521 <!-- Permissions related to changing status bar --> 1522 <!-- ==================================================== --> 1523 <eat-comment /> 1524 1525 <!-- Allows an application to expand or collapse the status bar. 1526 <p>Protection level: normal 1527 --> 1528 <permission android:name="android.permission.EXPAND_STATUS_BAR" 1529 android:label="@string/permlab_expandStatusBar" 1530 android:description="@string/permdesc_expandStatusBar" 1531 android:protectionLevel="normal" /> 1532 1533 <!-- ============================================================== --> 1534 <!-- Permissions related to adding/removing shortcuts from Launcher --> 1535 <!-- ============================================================== --> 1536 <eat-comment /> 1537 1538 <!-- Allows an application to install a shortcut in Launcher. 1539 <p>Protection level: normal 1540 --> 1541 <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT" 1542 android:label="@string/permlab_install_shortcut" 1543 android:description="@string/permdesc_install_shortcut" 1544 android:protectionLevel="normal"/> 1545 1546 <!-- Allows an application to uninstall a shortcut in Launcher. 1547 <p>Protection level: normal 1548 --> 1549 <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT" 1550 android:label="@string/permlab_uninstall_shortcut" 1551 android:description="@string/permdesc_uninstall_shortcut" 1552 android:protectionLevel="normal"/> 1553 1554 <!-- ==================================================== --> 1555 <!-- Permissions related to accessing sync settings --> 1556 <!-- ==================================================== --> 1557 <eat-comment /> 1558 1559 <!-- Allows applications to read the sync settings. 1560 <p>Protection level: normal 1561 --> 1562 <permission android:name="android.permission.READ_SYNC_SETTINGS" 1563 android:description="@string/permdesc_readSyncSettings" 1564 android:label="@string/permlab_readSyncSettings" 1565 android:protectionLevel="normal" /> 1566 1567 <!-- Allows applications to write the sync settings. 1568 <p>Protection level: normal 1569 --> 1570 <permission android:name="android.permission.WRITE_SYNC_SETTINGS" 1571 android:description="@string/permdesc_writeSyncSettings" 1572 android:label="@string/permlab_writeSyncSettings" 1573 android:protectionLevel="normal" /> 1574 1575 <!-- Allows applications to read the sync stats. 1576 <p>Protection level: normal 1577 --> 1578 <permission android:name="android.permission.READ_SYNC_STATS" 1579 android:description="@string/permdesc_readSyncStats" 1580 android:label="@string/permlab_readSyncStats" 1581 android:protectionLevel="normal" /> 1582 1583 <!-- ============================================ --> 1584 <!-- Permissions for low-level system interaction --> 1585 <!-- ============================================ --> 1586 <eat-comment /> 1587 1588 <!-- @SystemApi @hide Change the screen compatibility mode of applications --> 1589 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY" 1590 android:protectionLevel="signature" /> 1591 1592 <!-- @SystemApi Allows an application to modify the current configuration, such 1593 as locale. --> 1594 <permission android:name="android.permission.CHANGE_CONFIGURATION" 1595 android:protectionLevel="signature|privileged|development" /> 1596 1597 <!-- Allows an application to read or write the system settings. 1598 <p>Protection level: signature 1599 --> 1600 <permission android:name="android.permission.WRITE_SETTINGS" 1601 android:label="@string/permlab_writeSettings" 1602 android:description="@string/permdesc_writeSettings" 1603 android:protectionLevel="signature|preinstalled|appop|pre23" /> 1604 1605 <!-- @SystemApi Allows an application to modify the Google service map. 1606 <p>Not for use by third-party applications. --> 1607 <permission android:name="android.permission.WRITE_GSERVICES" 1608 android:protectionLevel="signature|privileged" /> 1609 1610 <!-- @SystemApi Allows an application to call 1611 {@link android.app.ActivityManager#forceStopPackage}. 1612 @hide --> 1613 <permission android:name="android.permission.FORCE_STOP_PACKAGES" 1614 android:protectionLevel="signature|privileged" /> 1615 1616 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window 1617 An active window is the window that has fired an accessibility event. --> 1618 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT" 1619 android:protectionLevel="signature|privileged" /> 1620 1621 <!-- @SystemApi Modify the global animation scaling factor. 1622 <p>Not for use by third-party applications. --> 1623 <permission android:name="android.permission.SET_ANIMATION_SCALE" 1624 android:protectionLevel="signature|privileged|development" /> 1625 1626 <!-- @deprecated This functionality will be removed in the future; please do 1627 not use. Allow an application to make its activities persistent. --> 1628 <permission android:name="android.permission.PERSISTENT_ACTIVITY" 1629 android:label="@string/permlab_persistentActivity" 1630 android:description="@string/permdesc_persistentActivity" 1631 android:protectionLevel="normal" /> 1632 1633 <!-- Allows an application to find out the space used by any package. 1634 <p>Protection level: normal 1635 --> 1636 <permission android:name="android.permission.GET_PACKAGE_SIZE" 1637 android:label="@string/permlab_getPackageSize" 1638 android:description="@string/permdesc_getPackageSize" 1639 android:protectionLevel="normal" /> 1640 1641 <!-- @deprecated No longer useful, see 1642 {@link android.content.pm.PackageManager#addPackageToPreferred} 1643 for details. --> 1644 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS" 1645 android:protectionLevel="signature" /> 1646 1647 <!-- Allows an application to receive the 1648 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is 1649 broadcast after the system finishes booting. If you don't 1650 request this permission, you will not receive the broadcast at 1651 that time. Though holding this permission does not have any 1652 security implications, it can have a negative impact on the 1653 user experience by increasing the amount of time it takes the 1654 system to start and allowing applications to have themselves 1655 running without the user being aware of them. As such, you must 1656 explicitly declare your use of this facility to make that visible 1657 to the user. 1658 <p>Protection level: normal 1659 --> 1660 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" 1661 android:label="@string/permlab_receiveBootCompleted" 1662 android:description="@string/permdesc_receiveBootCompleted" 1663 android:protectionLevel="normal" /> 1664 1665 <!-- Allows an application to broadcast sticky intents. These are 1666 broadcasts whose data is held by the system after being finished, 1667 so that clients can quickly retrieve that data without having 1668 to wait for the next broadcast. 1669 <p>Protection level: normal 1670 --> 1671 <permission android:name="android.permission.BROADCAST_STICKY" 1672 android:label="@string/permlab_broadcastSticky" 1673 android:description="@string/permdesc_broadcastSticky" 1674 android:protectionLevel="normal" /> 1675 1676 <!-- @SystemApi Allows mounting and unmounting file systems for removable storage. 1677 <p>Not for use by third-party applications.--> 1678 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS" 1679 android:protectionLevel="system|signature" /> 1680 1681 <!-- @SystemApi Allows formatting file systems for removable storage. 1682 <p>Not for use by third-party applications. --> 1683 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS" 1684 android:protectionLevel="system|signature" /> 1685 1686 <!-- Allows access to ASEC non-destructive API calls 1687 @hide --> 1688 <permission android:name="android.permission.ASEC_ACCESS" 1689 android:protectionLevel="signature" /> 1690 1691 <!-- Allows creation of ASEC volumes 1692 @hide --> 1693 <permission android:name="android.permission.ASEC_CREATE" 1694 android:protectionLevel="signature" /> 1695 1696 <!-- Allows destruction of ASEC volumes 1697 @hide --> 1698 <permission android:name="android.permission.ASEC_DESTROY" 1699 android:protectionLevel="signature" /> 1700 1701 <!-- Allows mount / unmount of ASEC volumes 1702 @hide --> 1703 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT" 1704 android:protectionLevel="signature" /> 1705 1706 <!-- Allows rename of ASEC volumes 1707 @hide --> 1708 <permission android:name="android.permission.ASEC_RENAME" 1709 android:protectionLevel="signature" /> 1710 1711 <!-- @SystemApi Allows applications to write the apn settings. 1712 <p>Not for use by third-party applications. --> 1713 <permission android:name="android.permission.WRITE_APN_SETTINGS" 1714 android:protectionLevel="signature|privileged" /> 1715 1716 <!-- Allows applications to change network connectivity state. 1717 <p>Protection level: normal 1718 --> 1719 <permission android:name="android.permission.CHANGE_NETWORK_STATE" 1720 android:description="@string/permdesc_changeNetworkState" 1721 android:label="@string/permlab_changeNetworkState" 1722 android:protectionLevel="signature|preinstalled|appop|pre23" /> 1723 1724 <!-- Allows an application to clear the caches of all installed 1725 applications on the device. 1726 <p>Protection level: system|signature 1727 --> 1728 <permission android:name="android.permission.CLEAR_APP_CACHE" 1729 android:protectionLevel="signature|privileged" /> 1730 1731 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback 1732 @hide --> 1733 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK" 1734 android:protectionLevel="signature|privileged" /> 1735 1736 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on 1737 behalf of the user. 1738 @hide --> 1739 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES" 1740 android:protectionLevel="signature|privileged" /> 1741 1742 <!-- @SystemApi Allows an application to do certain operations needed for 1743 interacting with the recovery (system update) system. 1744 @hide --> 1745 <permission android:name="android.permission.RECOVERY" 1746 android:protectionLevel="signature|privileged" /> 1747 1748 <!-- Allows the system to bind to an application's task services 1749 @hide --> 1750 <permission android:name="android.permission.BIND_JOB_SERVICE" 1751 android:protectionLevel="signature" /> 1752 <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/> 1753 1754 <!-- Allows an application to initiate configuration updates 1755 <p>An application requesting this permission is responsible for 1756 verifying the source and integrity of any update before passing 1757 it off to the various individual installer components 1758 @hide --> 1759 <permission android:name="android.permission.UPDATE_CONFIG" 1760 android:protectionLevel="signature|privileged" /> 1761 1762 <!-- ========================================= --> 1763 <!-- Permissions for special development tools --> 1764 <!-- ========================================= --> 1765 <eat-comment /> 1766 1767 <!-- @SystemApi Allows an application to read or write the secure system settings. 1768 <p>Not for use by third-party applications. --> 1769 <permission android:name="android.permission.WRITE_SECURE_SETTINGS" 1770 android:protectionLevel="signature|privileged|development" /> 1771 1772 <!-- @SystemApi Allows an application to retrieve state dump information from system services. 1773 <p>Not for use by third-party applications. --> 1774 <permission android:name="android.permission.DUMP" 1775 android:protectionLevel="signature|privileged|development" /> 1776 1777 <!-- @SystemApi Allows an application to read the low-level system log files. 1778 <p>Not for use by third-party applications, because 1779 Log entries can contain the user's private information. --> 1780 <permission android:name="android.permission.READ_LOGS" 1781 android:protectionLevel="signature|privileged|development" /> 1782 1783 <!-- @SystemApi Configure an application for debugging. 1784 <p>Not for use by third-party applications. --> 1785 <permission android:name="android.permission.SET_DEBUG_APP" 1786 android:protectionLevel="signature|privileged|development" /> 1787 1788 <!-- @SystemApi Allows an application to set the maximum number of (not needed) 1789 application processes that can be running. 1790 <p>Not for use by third-party applications. --> 1791 <permission android:name="android.permission.SET_PROCESS_LIMIT" 1792 android:protectionLevel="signature|privileged|development" /> 1793 1794 <!-- @SystemApi Allows an application to control whether activities are immediately 1795 finished when put in the background. 1796 <p>Not for use by third-party applications. --> 1797 <permission android:name="android.permission.SET_ALWAYS_FINISH" 1798 android:protectionLevel="signature|privileged|development" /> 1799 1800 <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes. 1801 <p>Not for use by third-party applications. --> 1802 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES" 1803 android:protectionLevel="signature|privileged|development" /> 1804 1805 <!-- ==================================== --> 1806 <!-- Private permissions --> 1807 <!-- ==================================== --> 1808 <eat-comment /> 1809 1810 <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. --> 1811 <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED" 1812 android:protectionLevel="signature|privileged" /> 1813 1814 <!-- @SystemApi Allows applications to RW to diagnostic resources. 1815 <p>Not for use by third-party applications. --> 1816 <permission android:name="android.permission.DIAGNOSTIC" 1817 android:protectionLevel="signature" /> 1818 1819 <!-- @SystemApi Allows an application to open, close, or disable the status bar 1820 and its icons. 1821 <p>Not for use by third-party applications. --> 1822 <permission android:name="android.permission.STATUS_BAR" 1823 android:protectionLevel="signature|privileged" /> 1824 1825 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk 1826 @hide --> 1827 <permission android:name="android.permission.STATUS_BAR_SERVICE" 1828 android:protectionLevel="signature" /> 1829 1830 <!-- @SystemApi Allows an application to force a BACK operation on whatever is the 1831 top activity. 1832 <p>Not for use by third-party applications. 1833 @hide 1834 --> 1835 <permission android:name="android.permission.FORCE_BACK" 1836 android:protectionLevel="signature" /> 1837 1838 <!-- @SystemApi Allows an application to update device statistics. 1839 <p>Not for use by third-party applications. --> 1840 <permission android:name="android.permission.UPDATE_DEVICE_STATS" 1841 android:protectionLevel="signature|privileged" /> 1842 1843 <!-- @SystemApi @hide Allows an application to collect battery statistics --> 1844 <permission android:name="android.permission.GET_APP_OPS_STATS" 1845 android:protectionLevel="signature|privileged|development" /> 1846 1847 <!-- @SystemApi Allows an application to update application operation statistics. Not for 1848 use by third party apps. @hide --> 1849 <permission android:name="android.permission.UPDATE_APP_OPS_STATS" 1850 android:protectionLevel="signature|privileged|installer" /> 1851 1852 <!-- @SystemApi Allows an application to open windows that are for use by parts 1853 of the system user interface. 1854 <p>Not for use by third-party applications. 1855 @hide 1856 --> 1857 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW" 1858 android:protectionLevel="signature" /> 1859 1860 <!-- @SystemApi Allows an application to manage (create, destroy, 1861 Z-order) application tokens in the window manager. 1862 <p>Not for use by third-party applications. 1863 @hide 1864 --> 1865 <permission android:name="android.permission.MANAGE_APP_TOKENS" 1866 android:protectionLevel="signature" /> 1867 1868 <!-- @hide Allows the application to temporarily freeze the screen for a 1869 full-screen transition. --> 1870 <permission android:name="android.permission.FREEZE_SCREEN" 1871 android:protectionLevel="signature" /> 1872 1873 <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball) 1874 into the event stream and deliver them to ANY window. Without this 1875 permission, you can only deliver events to windows in your own process. 1876 <p>Not for use by third-party applications. 1877 @hide 1878 --> 1879 <permission android:name="android.permission.INJECT_EVENTS" 1880 android:protectionLevel="signature" /> 1881 1882 <!-- @hide Allows an application to register an input filter which filters the stream 1883 of user events (keys, touch, trackball) before they are dispatched to any window. --> 1884 <permission android:name="android.permission.FILTER_EVENTS" 1885 android:protectionLevel="signature" /> 1886 1887 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. --> 1888 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN" 1889 android:protectionLevel="signature" /> 1890 1891 <!-- @hide Allows an application to collect frame statistics --> 1892 <permission android:name="android.permission.FRAME_STATS" 1893 android:protectionLevel="signature" /> 1894 1895 <!-- @hide Allows an application to temporary enable accessibility on the device. --> 1896 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY" 1897 android:protectionLevel="signature" /> 1898 1899 <!-- @SystemApi Allows an application to watch and control how activities are 1900 started globally in the system. Only for is in debugging 1901 (usually the monkey command). 1902 <p>Not for use by third-party applications. 1903 @hide 1904 --> 1905 <permission android:name="android.permission.SET_ACTIVITY_WATCHER" 1906 android:protectionLevel="signature" /> 1907 1908 <!-- @SystemApi Allows an application to call the activity manager shutdown() API 1909 to put the higher-level system there into a shutdown state. 1910 @hide --> 1911 <permission android:name="android.permission.SHUTDOWN" 1912 android:protectionLevel="signature|privileged" /> 1913 1914 <!-- @SystemApi Allows an application to tell the activity manager to temporarily 1915 stop application switches, putting it into a special mode that 1916 prevents applications from immediately switching away from some 1917 critical UI such as the home screen. 1918 @hide --> 1919 <permission android:name="android.permission.STOP_APP_SWITCHES" 1920 android:protectionLevel="signature|privileged" /> 1921 1922 <!-- @SystemApi Allows an application to retrieve private information about 1923 the current top activity, such as any assist context it can provide. 1924 <p>Not for use by third-party applications. 1925 @hide 1926 --> 1927 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO" 1928 android:protectionLevel="signature" /> 1929 1930 <!-- Allows an application to retrieve the current state of keys and 1931 switches. 1932 <p>Not for use by third-party applications. 1933 @deprecated The API that used this permission has been removed. --> 1934 <permission android:name="android.permission.READ_INPUT_STATE" 1935 android:protectionLevel="signature" /> 1936 1937 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService}, 1938 to ensure that only the system can bind to it. 1939 <p>Protection level: signature 1940 --> 1941 <permission android:name="android.permission.BIND_INPUT_METHOD" 1942 android:protectionLevel="signature" /> 1943 1944 <!-- Must be required by an {@link android.media.midi.MidiDeviceService}, 1945 to ensure that only the system can bind to it. 1946 <p>Protection level: signature 1947 --> 1948 <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE" 1949 android:protectionLevel="signature" /> 1950 1951 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService}, 1952 to ensure that only the system can bind to it. 1953 <p>Protection level: signature 1954 --> 1955 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE" 1956 android:protectionLevel="signature" /> 1957 1958 <!-- Must be required by a {@link android.printservice.PrintService}, 1959 to ensure that only the system can bind to it. 1960 <p>Protection level: signature 1961 --> 1962 <permission android:name="android.permission.BIND_PRINT_SERVICE" 1963 android:protectionLevel="signature" /> 1964 1965 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService} 1966 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only 1967 the system can bind to it. 1968 <p>Protection level: signature 1969 --> 1970 <permission android:name="android.permission.BIND_NFC_SERVICE" 1971 android:protectionLevel="signature" /> 1972 1973 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it. 1974 @hide --> 1975 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE" 1976 android:protectionLevel="signature" /> 1977 1978 <!-- Must be required by a TextService (e.g. SpellCheckerService) 1979 to ensure that only the system can bind to it. 1980 <p>Protection level: signature 1981 --> 1982 <permission android:name="android.permission.BIND_TEXT_SERVICE" 1983 android:protectionLevel="signature" /> 1984 1985 <!-- Must be required by a {@link android.net.VpnService}, 1986 to ensure that only the system can bind to it. 1987 <p>Protection level: signature 1988 --> 1989 <permission android:name="android.permission.BIND_VPN_SERVICE" 1990 android:protectionLevel="signature" /> 1991 1992 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService}, 1993 to ensure that only the system can bind to it. 1994 <p>Protection level: system|signature 1995 --> 1996 <permission android:name="android.permission.BIND_WALLPAPER" 1997 android:protectionLevel="signature|privileged" /> 1998 1999 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService}, 2000 to ensure that only the system can bind to it. 2001 <p>Protection level: signature 2002 --> 2003 <permission android:name="android.permission.BIND_VOICE_INTERACTION" 2004 android:protectionLevel="signature" /> 2005 2006 <!-- Must be required by hotword enrollment application, 2007 to ensure that only the system can interact with it. 2008 @hide <p>Not for use by third-party applications.</p> --> 2009 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES" 2010 android:protectionLevel="signature|privileged" /> 2011 2012 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider}, 2013 to ensure that only the system can bind to it. 2014 @hide --> 2015 <permission android:name="android.permission.BIND_REMOTE_DISPLAY" 2016 android:protectionLevel="signature" /> 2017 2018 <!-- Must be required by a {@link android.media.tv.TvInputService} 2019 to ensure that only the system can bind to it. 2020 <p>Protection level: signature 2021 --> 2022 <permission android:name="android.permission.BIND_TV_INPUT" 2023 android:protectionLevel="signature|privileged" /> 2024 2025 <!-- @SystemApi Allows an application to modify parental controls 2026 <p>Not for use by third-party applications. 2027 @hide --> 2028 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS" 2029 android:protectionLevel="signature|privileged" /> 2030 2031 <!-- Must be required by a {@link android.media.routing.MediaRouteService} 2032 to ensure that only the system can interact with it. 2033 @hide --> 2034 <permission android:name="android.permission.BIND_ROUTE_PROVIDER" 2035 android:protectionLevel="signature" /> 2036 2037 <!-- Must be required by device administration receiver, to ensure that only the 2038 system can interact with it. 2039 <p>Protection level: signature 2040 --> 2041 <permission android:name="android.permission.BIND_DEVICE_ADMIN" 2042 android:protectionLevel="signature" /> 2043 2044 <!-- @SystemApi Required to add or remove another application as a device admin. 2045 <p>Not for use by third-party applications. 2046 @hide --> 2047 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS" 2048 android:protectionLevel="signature|privileged" /> 2049 2050 <!-- @SystemApi Allows low-level access to setting the orientation (actually 2051 rotation) of the screen. 2052 <p>Not for use by third-party applications. 2053 @hide 2054 --> 2055 <permission android:name="android.permission.SET_ORIENTATION" 2056 android:protectionLevel="signature" /> 2057 2058 <!-- @SystemApi Allows low-level access to setting the pointer speed. 2059 <p>Not for use by third-party applications. 2060 @hide 2061 --> 2062 <permission android:name="android.permission.SET_POINTER_SPEED" 2063 android:protectionLevel="signature" /> 2064 2065 <!-- Allows low-level access to setting input device calibration. 2066 <p>Not for use by normal applications. 2067 @hide --> 2068 <permission android:name="android.permission.SET_INPUT_CALIBRATION" 2069 android:protectionLevel="signature" /> 2070 2071 <!-- Allows low-level access to setting the keyboard layout. 2072 <p>Not for use by third-party applications. 2073 @hide --> 2074 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT" 2075 android:protectionLevel="signature" /> 2076 2077 <!-- Allows an application to monitor changes in tablet mode. 2078 <p>Not for use by third-party applications. 2079 @hide --> 2080 <permission android:name="android.permission.TABLET_MODE_LISTENER" 2081 android:protectionLevel="signature" /> 2082 2083 <!-- Allows an application to request installing packages. Apps 2084 targeting APIs greater than 22 must hold this permission in 2085 order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}. 2086 <p>Protection level: normal 2087 --> 2088 <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES" 2089 android:label="@string/permlab_requestInstallPackages" 2090 android:description="@string/permdesc_requestInstallPackages" 2091 android:protectionLevel="normal" /> 2092 2093 <!-- @SystemApi Allows an application to install packages. 2094 <p>Not for use by third-party applications. --> 2095 <permission android:name="android.permission.INSTALL_PACKAGES" 2096 android:protectionLevel="signature|privileged" /> 2097 2098 <!-- @SystemApi Allows an application to clear user data. 2099 <p>Not for use by third-party applications 2100 @hide 2101 --> 2102 <permission android:name="android.permission.CLEAR_APP_USER_DATA" 2103 android:protectionLevel="signature|installer" /> 2104 2105 <!-- @SystemApi Allows an application to delete cache files. 2106 <p>Not for use by third-party applications. --> 2107 <permission android:name="android.permission.DELETE_CACHE_FILES" 2108 android:protectionLevel="signature|privileged" /> 2109 2110 <!-- @SystemApi Allows an application to delete packages. 2111 <p>Not for use by third-party applications. --> 2112 <permission android:name="android.permission.DELETE_PACKAGES" 2113 android:protectionLevel="signature|privileged" /> 2114 2115 <!-- @SystemApi Allows an application to move location of installed package. 2116 @hide --> 2117 <permission android:name="android.permission.MOVE_PACKAGE" 2118 android:protectionLevel="signature|privileged" /> 2119 2120 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is 2121 enabled or not. 2122 <p>Not for use by third-party applications. --> 2123 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE" 2124 android:protectionLevel="signature|privileged" /> 2125 2126 <!-- Allows an application to grant specific permissions. 2127 @hide --> 2128 <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS" 2129 android:protectionLevel="signature|installer" /> 2130 2131 <!-- Allows an app that has this permission and the permissions to install packages 2132 to request certain runtime permissions to be granted at installation. 2133 @hide 2134 @SystemApi --> 2135 <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS" 2136 android:protectionLevel="signature|installer|verifier" /> 2137 2138 <!-- Allows an application to revoke specific permissions. 2139 @hide 2140 @SystemApi --> 2141 <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS" 2142 android:protectionLevel="signature|installer|verifier" /> 2143 2144 <!-- @hide Allows an application to observe permission changes. --> 2145 <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS" 2146 android:protectionLevel="signature|privileged" /> 2147 2148 <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features. 2149 <p>Not for use by third-party applications. 2150 @hide 2151 --> 2152 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER" 2153 android:protectionLevel="signature" /> 2154 2155 <!-- @SystemApi Allows an application to take screen shots and more generally 2156 get access to the frame buffer data. 2157 <p>Not for use by third-party applications. --> 2158 <permission android:name="android.permission.READ_FRAME_BUFFER" 2159 android:protectionLevel="signature|privileged" /> 2160 2161 <!-- Allows an application to use InputFlinger's low level features. 2162 @hide --> 2163 <permission android:name="android.permission.ACCESS_INPUT_FLINGER" 2164 android:protectionLevel="signature" /> 2165 2166 <!-- Allows an application to configure and connect to Wifi displays 2167 @hide --> 2168 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY" 2169 android:protectionLevel="signature" /> 2170 2171 <!-- Allows an application to control low-level features of Wifi displays 2172 such as opening an RTSP socket. This permission should only be used 2173 by the display manager. 2174 @hide --> 2175 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY" 2176 android:protectionLevel="signature" /> 2177 2178 <!-- @SystemApi Allows an application to control VPN. 2179 <p>Not for use by third-party applications.</p> 2180 @hide --> 2181 <permission android:name="android.permission.CONTROL_VPN" 2182 android:protectionLevel="signature|privileged" /> 2183 <uses-permission android:name="android.permission.CONTROL_VPN" /> 2184 2185 <!-- @SystemApi Allows an application to capture audio output. 2186 <p>Not for use by third-party applications.</p> --> 2187 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT" 2188 android:protectionLevel="signature|privileged" /> 2189 2190 <!-- @SystemApi Allows an application to capture audio for hotword detection. 2191 <p>Not for use by third-party applications.</p> 2192 @hide --> 2193 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD" 2194 android:protectionLevel="signature|privileged" /> 2195 2196 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions. 2197 <p>Not for use by third-party applications.</p> 2198 @hide --> 2199 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING" 2200 android:protectionLevel="signature|privileged" /> 2201 2202 <!-- @SystemApi Allows an application to capture video output. 2203 <p>Not for use by third-party applications.</p> --> 2204 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT" 2205 android:protectionLevel="signature|privileged" /> 2206 2207 <!-- @SystemApi Allows an application to capture secure video output. 2208 <p>Not for use by third-party applications.</p> --> 2209 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT" 2210 android:protectionLevel="signature|privileged" /> 2211 2212 <!-- @SystemApi Allows an application to know what content is playing and control its playback. 2213 <p>Not for use by third-party applications due to privacy of media consumption</p> --> 2214 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL" 2215 android:protectionLevel="signature|privileged" /> 2216 2217 <!-- @SystemApi Required to be able to disable the device (very dangerous!). 2218 <p>Not for use by third-party applications. 2219 @hide 2220 --> 2221 <permission android:name="android.permission.BRICK" 2222 android:protectionLevel="signature" /> 2223 2224 <!-- @SystemApi Required to be able to reboot the device. 2225 <p>Not for use by third-party applications. --> 2226 <permission android:name="android.permission.REBOOT" 2227 android:protectionLevel="signature|privileged" /> 2228 2229 <!-- @SystemApi Allows low-level access to power management. 2230 <p>Not for use by third-party applications. 2231 @hide 2232 --> 2233 <permission android:name="android.permission.DEVICE_POWER" 2234 android:protectionLevel="signature" /> 2235 2236 <!-- Allows access to the PowerManager.userActivity function. 2237 <p>Not for use by third-party applications. @hide @SystemApi --> 2238 <permission android:name="android.permission.USER_ACTIVITY" 2239 android:protectionLevel="signature|privileged" /> 2240 2241 <!-- @hide Allows low-level access to tun tap driver --> 2242 <permission android:name="android.permission.NET_TUNNELING" 2243 android:protectionLevel="signature" /> 2244 2245 <!-- Run as a manufacturer test application, running as the root user. 2246 Only available when the device is running in manufacturer test mode. 2247 <p>Not for use by third-party applications. 2248 --> 2249 <permission android:name="android.permission.FACTORY_TEST" 2250 android:protectionLevel="signature" /> 2251 2252 <!-- Allows an application to broadcast a notification that an application 2253 package has been removed. 2254 <p>Not for use by third-party applications. 2255 --> 2256 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED" 2257 android:protectionLevel="signature" /> 2258 2259 <!-- Allows an application to broadcast an SMS receipt notification. 2260 <p>Not for use by third-party applications. 2261 --> 2262 <permission android:name="android.permission.BROADCAST_SMS" 2263 android:protectionLevel="signature" /> 2264 2265 <!-- Allows an application to broadcast a WAP PUSH receipt notification. 2266 <p>Not for use by third-party applications. 2267 --> 2268 <permission android:name="android.permission.BROADCAST_WAP_PUSH" 2269 android:protectionLevel="signature" /> 2270 2271 <!-- @SystemApi Allows an application to broadcast privileged networking requests. 2272 <p>Not for use by third-party applications. @hide --> 2273 <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED" 2274 android:protectionLevel="signature|privileged" /> 2275 2276 <!-- @SystemApi Not for use by third-party applications. --> 2277 <permission android:name="android.permission.MASTER_CLEAR" 2278 android:protectionLevel="signature|privileged" /> 2279 2280 <!-- @SystemApi Allows an application to call any phone number, including emergency 2281 numbers, without going through the Dialer user interface for the user 2282 to confirm the call being placed. 2283 <p>Not for use by third-party applications. --> 2284 <permission android:name="android.permission.CALL_PRIVILEGED" 2285 android:protectionLevel="signature|privileged" /> 2286 2287 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide --> 2288 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING" 2289 android:protectionLevel="signature|privileged" /> 2290 2291 <!-- @SystemApi Allows an application to perform SIM Activation @hide --> 2292 <permission android:name="android.permission.PERFORM_SIM_ACTIVATION" 2293 android:protectionLevel="signature|privileged" /> 2294 2295 <!-- @SystemApi Allows enabling/disabling location update notifications from 2296 the radio. 2297 <p>Not for use by third-party applications. --> 2298 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES" 2299 android:protectionLevel="signature|privileged" /> 2300 2301 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin 2302 database, to change values that get uploaded. 2303 <p>Not for use by third-party applications. --> 2304 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES" 2305 android:protectionLevel="signature|privileged" /> 2306 2307 <!-- @SystemApi Allows an application to collect component usage 2308 statistics 2309 <p>Declaring the permission implies intention to use the API and the user of the 2310 device can grant permission through the Settings application. --> 2311 <permission android:name="android.permission.PACKAGE_USAGE_STATS" 2312 android:protectionLevel="signature|privileged|development|appop" /> 2313 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" /> 2314 2315 <!-- @hide Allows an application to change the app idle state of an app. 2316 <p>Not for use by third-party applications. --> 2317 <permission android:name="android.permission.CHANGE_APP_IDLE_STATE" 2318 android:protectionLevel="signature" /> 2319 2320 <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to 2321 access the network and acquire wakelocks. 2322 <p>Not for use by third-party applications. --> 2323 <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST" 2324 android:protectionLevel="system|signature" /> 2325 2326 <!-- Permission an application must hold in order to use 2327 {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}. 2328 This is a normal permission: an app requesting it will always be granted the 2329 permission, without the user needing to approve or see it. --> 2330 <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS" 2331 android:protectionLevel="normal" /> 2332 2333 <!-- @SystemApi Allows an application to collect battery statistics --> 2334 <permission android:name="android.permission.BATTERY_STATS" 2335 android:protectionLevel="signature|privileged|development" /> 2336 2337 <!-- @SystemApi Allows an application to control the backup and restore process. 2338 <p>Not for use by third-party applications. 2339 @hide pending API council --> 2340 <permission android:name="android.permission.BACKUP" 2341 android:protectionLevel="signature|privileged" /> 2342 2343 <!-- Allows a package to launch the secure full-backup confirmation UI. 2344 ONLY the system process may hold this permission. 2345 @hide --> 2346 <permission android:name="android.permission.CONFIRM_FULL_BACKUP" 2347 android:protectionLevel="signature" /> 2348 2349 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService}, 2350 to ensure that only the system can bind to it. --> 2351 <permission android:name="android.permission.BIND_REMOTEVIEWS" 2352 android:protectionLevel="signature|privileged" /> 2353 2354 <!-- @SystemApi Allows an application to tell the AppWidget service which application 2355 can access AppWidget's data. The normal user flow is that a user 2356 picks an AppWidget to go into a particular host, thereby giving that 2357 host application access to the private data from the AppWidget app. 2358 An application that has this permission should honor that contract. 2359 <p>Not for use by third-party applications. --> 2360 <permission android:name="android.permission.BIND_APPWIDGET" 2361 android:protectionLevel="signature|privileged" /> 2362 2363 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new 2364 keyguard widget 2365 @hide --> 2366 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET" 2367 android:protectionLevel="signature|privileged" /> 2368 2369 <!-- @SystemApi Internal permission allowing an application to query/set which 2370 applications can bind AppWidgets. 2371 @hide --> 2372 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS" 2373 android:protectionLevel="signature|privileged" /> 2374 2375 <!-- Allows applications to change the background data setting. 2376 <p>Not for use by third-party applications. 2377 @hide pending API council --> 2378 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING" 2379 android:protectionLevel="signature" /> 2380 2381 <!-- @SystemApi This permission can be used on content providers to allow the global 2382 search system to access their data. Typically it used when the 2383 provider has some permissions protecting it (which global search 2384 would not be expected to hold), and added as a read-only permission 2385 to the path in the provider where global search queries are 2386 performed. This permission can not be held by regular applications; 2387 it is used by applications to protect themselves from everyone else 2388 besides global search. --> 2389 <permission android:name="android.permission.GLOBAL_SEARCH" 2390 android:protectionLevel="signature|privileged" /> 2391 2392 <!-- Internal permission protecting access to the global search 2393 system: ensures that only the system can access the provider 2394 to perform queries (since this otherwise provides unrestricted 2395 access to a variety of content providers), and to write the 2396 search statistics (to keep applications from gaming the source 2397 ranking). 2398 @hide --> 2399 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL" 2400 android:protectionLevel="signature" /> 2401 2402 <!-- @SystemApi Internal permission to allows an application to read indexable data. 2403 @hide --> 2404 <permission android:name="android.permission.READ_SEARCH_INDEXABLES" 2405 android:protectionLevel="signature|privileged" /> 2406 2407 <!-- @SystemApi Allows applications to set a live wallpaper. 2408 @hide XXX Change to signature once the picker is moved to its 2409 own apk as Ghod Intended. --> 2410 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT" 2411 android:protectionLevel="signature|privileged" /> 2412 2413 <!-- @SystemApi Allows applications to read dream settings and dream state. 2414 @hide --> 2415 <permission android:name="android.permission.READ_DREAM_STATE" 2416 android:protectionLevel="signature|privileged" /> 2417 2418 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming. 2419 @hide --> 2420 <permission android:name="android.permission.WRITE_DREAM_STATE" 2421 android:protectionLevel="signature|privileged" /> 2422 2423 <!-- @SystemApi Allow an application to read and write the cache partition. 2424 @hide --> 2425 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM" 2426 android:protectionLevel="signature|privileged" /> 2427 2428 <!-- Must be required by default container service so that only 2429 the system can bind to it and use it to copy 2430 protected data to secure containers or files 2431 accessible to the system. 2432 @hide --> 2433 <permission android:name="android.permission.COPY_PROTECTED_DATA" 2434 android:protectionLevel="signature" /> 2435 2436 <!-- @SystemApi Internal permission protecting access to the encryption methods 2437 @hide 2438 --> 2439 <permission android:name="android.permission.CRYPT_KEEPER" 2440 android:protectionLevel="signature|privileged" /> 2441 2442 <!-- @SystemApi Allows an application to read historical network usage for 2443 specific networks and applications. @hide --> 2444 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY" 2445 android:protectionLevel="signature|privileged" /> 2446 2447 <!-- Allows an application to manage network policies (such as warning and disable 2448 limits) and to define application-specific rules. @hide --> 2449 <permission android:name="android.permission.MANAGE_NETWORK_POLICY" 2450 android:protectionLevel="signature" /> 2451 2452 <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used 2453 by system services like download manager and media server. Not for use by 2454 third party apps. @hide --> 2455 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING" 2456 android:protectionLevel="signature|privileged" /> 2457 2458 <!-- C2DM permission. 2459 @hide Used internally. 2460 --> 2461 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE" 2462 android:protectionLevel="signature" /> 2463 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/> 2464 2465 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will 2466 trust it to verify packages. 2467 --> 2468 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT" 2469 android:protectionLevel="signature|privileged" /> 2470 2471 <!-- Must be required by package verifier receiver, to ensure that only the 2472 system can interact with it. 2473 @hide 2474 --> 2475 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER" 2476 android:protectionLevel="signature" /> 2477 2478 <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the 2479 PackageManager will trust it to verify intent filters. 2480 --> 2481 <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT" 2482 android:protectionLevel="signature|privileged" /> 2483 2484 <!-- Must be required by intent filter verifier receiver, to ensure that only the 2485 system can interact with it. 2486 @hide 2487 --> 2488 <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER" 2489 android:protectionLevel="signature" /> 2490 2491 <!-- @SystemApi Allows applications to access serial ports via the SerialManager. 2492 @hide --> 2493 <permission android:name="android.permission.SERIAL_PORT" 2494 android:protectionLevel="signature|privileged" /> 2495 2496 <!-- Allows the holder to access content providers from outside an ApplicationThread. 2497 This permission is enforced by the ActivityManagerService on the corresponding APIs, 2498 in particular ActivityManagerService#getContentProviderExternal(String) and 2499 ActivityManagerService#removeContentProviderExternal(String). 2500 @hide 2501 --> 2502 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY" 2503 android:protectionLevel="signature" /> 2504 2505 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless 2506 OTA reboot *not* occur while the lock is held. 2507 @hide --> 2508 <permission android:name="android.permission.UPDATE_LOCK" 2509 android:protectionLevel="signature|privileged" /> 2510 2511 <!-- @SystemApi Allows an application to read the current set of notifications, including 2512 any metadata and intents attached. 2513 @hide --> 2514 <permission android:name="android.permission.ACCESS_NOTIFICATIONS" 2515 android:protectionLevel="signature|privileged" /> 2516 2517 <!-- Marker permission for applications that wish to access notification policy. 2518 <p>Protection level: normal 2519 --> 2520 <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY" 2521 android:description="@string/permdesc_access_notification_policy" 2522 android:label="@string/permlab_access_notification_policy" 2523 android:protectionLevel="normal" /> 2524 2525 <!-- Allows access to keyguard secure storage. Only allowed for system processes. 2526 @hide --> 2527 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE" 2528 android:protectionLevel="signature" /> 2529 2530 <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide --> 2531 <permission android:name="android.permission.MANAGE_FINGERPRINT" 2532 android:protectionLevel="system|signature" /> 2533 2534 <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide --> 2535 <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT" 2536 android:protectionLevel="signature" /> 2537 2538 <!-- Allows an application to control keyguard. Only allowed for system processes. 2539 @hide --> 2540 <permission android:name="android.permission.CONTROL_KEYGUARD" 2541 android:protectionLevel="signature" /> 2542 2543 <!-- Allows an application to listen to trust changes. Only allowed for system processes. 2544 @hide --> 2545 <permission android:name="android.permission.TRUST_LISTENER" 2546 android:protectionLevel="signature" /> 2547 2548 <!-- @SystemApi Allows an application to provide a trust agent. 2549 @hide For security reasons, this is a platform-only permission. --> 2550 <permission android:name="android.permission.PROVIDE_TRUST_AGENT" 2551 android:protectionLevel="signature|privileged" /> 2552 2553 <!-- Allows an application to launch the trust agent settings activity. 2554 @hide --> 2555 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS" 2556 android:protectionLevel="signature|privileged" /> 2557 2558 <!-- @SystemApi Must be required by an {@link 2559 android.service.trust.TrustAgentService}, 2560 to ensure that only the system can bind to it. 2561 @hide --> 2562 <permission android:name="android.permission.BIND_TRUST_AGENT" 2563 android:protectionLevel="signature" /> 2564 2565 <!-- Must be required by an {@link 2566 android.service.notification.NotificationListenerService}, 2567 to ensure that only the system can bind to it. 2568 <p>Protection level: signature 2569 --> 2570 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE" 2571 android:protectionLevel="signature" /> 2572 2573 <!-- Must be required by a {@link 2574 android.service.chooser.ChooserTargetService}, to ensure that 2575 only the system can bind to it. 2576 <p>Protection level: signature 2577 --> 2578 <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE" 2579 android:protectionLevel="signature" /> 2580 2581 <!-- Must be required by a {@link 2582 android.service.notification.ConditionProviderService}, 2583 to ensure that only the system can bind to it. 2584 <p>Protection level: signature 2585 --> 2586 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE" 2587 android:protectionLevel="signature" /> 2588 2589 <!-- Must be required by an {@link android.service.dreams.DreamService}, 2590 to ensure that only the system can bind to it. 2591 <p>Protection level: signature 2592 --> 2593 <permission android:name="android.permission.BIND_DREAM_SERVICE" 2594 android:protectionLevel="signature" /> 2595 2596 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the 2597 carrier setup application to enforce that this permission is required 2598 @hide This is not a third-party API (intended for OEMs and system apps). --> 2599 <permission android:name="android.permission.INVOKE_CARRIER_SETUP" 2600 android:protectionLevel="signature|privileged" /> 2601 2602 <!-- @SystemApi Allows an application to listen for network condition observations. 2603 @hide This is not a third-party API (intended for system apps). --> 2604 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS" 2605 android:protectionLevel="signature|privileged" /> 2606 2607 <!-- @SystemApi Allows an application to provision and access DRM certificates 2608 @hide This is not a third-party API (intended for system apps). --> 2609 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES" 2610 android:protectionLevel="signature|privileged" /> 2611 2612 <!-- Api Allows an application to manage media projection sessions. 2613 @hide This is not a third-party API (intended for system apps). --> 2614 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION" 2615 android:protectionLevel="signature" /> 2616 2617 <!-- @SystemApi Allows an application to read install sessions 2618 @hide This is not a third-party API (intended for system apps). --> 2619 <permission android:name="android.permission.READ_INSTALL_SESSIONS" 2620 android:label="@string/permlab_readInstallSessions" 2621 android:description="@string/permdesc_readInstallSessions" 2622 android:protectionLevel="normal"/> 2623 2624 <!-- @SystemApi Allows an application to remove DRM certificates 2625 @hide This is not a third-party API (intended for system apps). --> 2626 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES" 2627 android:protectionLevel="signature|privileged" /> 2628 2629 <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead --> 2630 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE" 2631 android:protectionLevel="signature|privileged" /> 2632 2633 <!-- Allows an application to interact with the currently active 2634 {@link android.service.voice.VoiceInteractionService}. 2635 @hide --> 2636 <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE" 2637 android:protectionLevel="signature" /> 2638 2639 <!-- The system process that is allowed to bind to services in carrier apps will 2640 have this permission. Carrier apps should use this permission to protect 2641 their services that only the system is allowed to bind to. 2642 <p>Protection level: system|signature 2643 --> 2644 <permission android:name="android.permission.BIND_CARRIER_SERVICES" 2645 android:label="@string/permlab_bindCarrierServices" 2646 android:description="@string/permdesc_bindCarrierServices" 2647 android:protectionLevel="signature|privileged" /> 2648 2649 <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT 2650 flag is set. 2651 @hide --> 2652 <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT" 2653 android:protectionLevel="signature" /> 2654 2655 <!-- Allows applications to kill UIDs. 2656 <p>Not for use by third-party applications. 2657 @hide --> 2658 <permission android:name="android.permission.KILL_UID" 2659 android:protectionLevel="signature|installer" /> 2660 2661 <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address. 2662 @hide --> 2663 <permission android:name="android.permission.LOCAL_MAC_ADDRESS" 2664 android:protectionLevel="signature|privileged" /> 2665 2666 <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices. 2667 @hide --> 2668 <permission android:name="android.permission.PEERS_MAC_ADDRESS" 2669 android:protectionLevel="signature" /> 2670 2671 <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications 2672 can use this permission to ensure incoming Nfc messages are from the Nfc stack 2673 and not simulated by another application. 2674 @hide --> 2675 <permission android:name="android.permission.DISPATCH_NFC_MESSAGE" 2676 android:protectionLevel="signature|privileged" /> 2677 2678 <!-- The system process is explicitly the only one allowed to launch the 2679 confirmation UI for full backup/restore --> 2680 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/> 2681 2682 <application android:process="system" 2683 android:persistent="true" 2684 android:hasCode="false" 2685 android:label="@string/android_system_label" 2686 android:allowClearUserData="false" 2687 android:backupAgent="com.android.server.backup.SystemBackupAgent" 2688 android:killAfterRestore="false" 2689 android:icon="@drawable/ic_launcher_android" 2690 android:supportsRtl="true" 2691 android:theme="@style/Theme.Material.DayNight.DarkActionBar"> 2692 <activity android:name="com.android.internal.app.ChooserActivity" 2693 android:theme="@style/Theme.DeviceDefault.Resolver" 2694 android:finishOnCloseSystemDialogs="true" 2695 android:excludeFromRecents="true" 2696 android:documentLaunchMode="never" 2697 android:relinquishTaskIdentity="true" 2698 android:process=":ui"> 2699 <intent-filter> 2700 <action android:name="android.intent.action.CHOOSER" /> 2701 <category android:name="android.intent.category.DEFAULT" /> 2702 <category android:name="android.intent.category.VOICE" /> 2703 </intent-filter> 2704 </activity> 2705 <activity android:name="com.android.internal.app.IntentForwarderActivity" 2706 android:finishOnCloseSystemDialogs="true" 2707 android:theme="@style/Theme.NoDisplay" 2708 android:excludeFromRecents="true" 2709 android:label="@string/user_owner_label" 2710 android:exported="true" 2711 > 2712 </activity> 2713 <activity-alias android:name="com.android.internal.app.ForwardIntentToParent" 2714 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 2715 android:exported="true" 2716 android:label="@string/user_owner_label"> 2717 </activity-alias> 2718 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile" 2719 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 2720 android:icon="@drawable/ic_corp_icon" 2721 android:exported="true" 2722 android:label="@string/managed_profile_label"> 2723 </activity-alias> 2724 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity" 2725 android:theme="@style/Theme.Material.DayNight.Dialog" 2726 android:label="@string/heavy_weight_switcher_title" 2727 android:finishOnCloseSystemDialogs="true" 2728 android:excludeFromRecents="true" 2729 android:process=":ui"> 2730 </activity> 2731 <activity android:name="com.android.internal.app.PlatLogoActivity" 2732 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen" 2733 android:configChanges="orientation|keyboardHidden" 2734 android:process=":ui"> 2735 </activity> 2736 <activity android:name="com.android.internal.app.DisableCarModeActivity" 2737 android:theme="@style/Theme.NoDisplay" 2738 android:excludeFromRecents="true" 2739 android:process=":ui"> 2740 </activity> 2741 <activity android:name="com.android.internal.app.DumpHeapActivity" 2742 android:theme="@style/Theme.Translucent.NoTitleBar" 2743 android:label="@string/dump_heap_title" 2744 android:finishOnCloseSystemDialogs="true" 2745 android:noHistory="true" 2746 android:excludeFromRecents="true" 2747 android:process=":ui"> 2748 </activity> 2749 <provider android:name="com.android.server.am.DumpHeapProvider" 2750 android:authorities="com.android.server.heapdump" 2751 android:grantUriPermissions="true" 2752 android:multiprocess="false" 2753 android:singleUser="true" /> 2754 2755 <activity android:name="android.accounts.ChooseAccountActivity" 2756 android:excludeFromRecents="true" 2757 android:exported="true" 2758 android:theme="@style/Theme.Material.DayNight.Dialog" 2759 android:label="@string/choose_account_label" 2760 android:process=":ui"> 2761 </activity> 2762 2763 <activity android:name="android.accounts.ChooseTypeAndAccountActivity" 2764 android:excludeFromRecents="true" 2765 android:exported="true" 2766 android:theme="@style/Theme.Material.DayNight.Dialog" 2767 android:label="@string/choose_account_label" 2768 android:process=":ui"> 2769 </activity> 2770 2771 <activity android:name="android.accounts.ChooseAccountTypeActivity" 2772 android:excludeFromRecents="true" 2773 android:theme="@style/Theme.Material.DayNight.Dialog" 2774 android:label="@string/choose_account_label" 2775 android:process=":ui"> 2776 </activity> 2777 2778 <activity android:name="android.accounts.CantAddAccountActivity" 2779 android:excludeFromRecents="true" 2780 android:exported="true" 2781 android:theme="@style/Theme.Material.DayNight.Dialog.NoActionBar" 2782 android:process=":ui"> 2783 </activity> 2784 2785 <activity android:name="android.accounts.GrantCredentialsPermissionActivity" 2786 android:excludeFromRecents="true" 2787 android:exported="true" 2788 android:theme="@style/Theme.Material.DayNight.DialogWhenLarge" 2789 android:process=":ui"> 2790 </activity> 2791 2792 <activity android:name="android.content.SyncActivityTooManyDeletes" 2793 android:theme="@style/Theme.Material.DayNight.Dialog" 2794 android:label="@string/sync_too_many_deletes" 2795 android:process=":ui"> 2796 </activity> 2797 2798 <activity android:name="com.android.internal.app.ShutdownActivity" 2799 android:permission="android.permission.SHUTDOWN" 2800 android:theme="@style/Theme.NoDisplay" 2801 android:excludeFromRecents="true"> 2802 <intent-filter> 2803 <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" /> 2804 <category android:name="android.intent.category.DEFAULT" /> 2805 </intent-filter> 2806 <intent-filter> 2807 <action android:name="android.intent.action.REBOOT" /> 2808 <category android:name="android.intent.category.DEFAULT" /> 2809 </intent-filter> 2810 </activity> 2811 2812 <activity android:name="com.android.internal.app.NetInitiatedActivity" 2813 android:theme="@style/Theme.Material.DayNight.Dialog.Alert" 2814 android:excludeFromRecents="true" 2815 android:process=":ui"> 2816 </activity> 2817 2818 <receiver android:name="com.android.server.BootReceiver" 2819 android:systemUserOnly="true"> 2820 <intent-filter android:priority="1000"> 2821 <action android:name="android.intent.action.BOOT_COMPLETED" /> 2822 </intent-filter> 2823 </receiver> 2824 2825 <receiver android:name="com.android.server.updates.CertPinInstallReceiver" 2826 android:permission="android.permission.UPDATE_CONFIG"> 2827 <intent-filter> 2828 <action android:name="android.intent.action.UPDATE_PINS" /> 2829 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2830 </intent-filter> 2831 </receiver> 2832 2833 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" 2834 android:permission="android.permission.UPDATE_CONFIG"> 2835 <intent-filter> 2836 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" /> 2837 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2838 </intent-filter> 2839 </receiver> 2840 2841 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" 2842 android:permission="android.permission.UPDATE_CONFIG"> 2843 <intent-filter> 2844 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" /> 2845 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2846 </intent-filter> 2847 </receiver> 2848 2849 <receiver android:name="com.android.server.updates.ApnDbInstallReceiver" 2850 android:permission="android.permission.UPDATE_CONFIG"> 2851 <intent-filter> 2852 <action android:name="android.intent.action.UPDATE_APN_DB" /> 2853 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2854 </intent-filter> 2855 </receiver> 2856 2857 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" 2858 android:permission="android.permission.UPDATE_CONFIG"> 2859 <intent-filter> 2860 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" /> 2861 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2862 </intent-filter> 2863 </receiver> 2864 2865 <receiver android:name="com.android.server.updates.TzDataInstallReceiver" 2866 android:permission="android.permission.UPDATE_CONFIG"> 2867 <intent-filter> 2868 <action android:name="android.intent.action.UPDATE_TZDATA" /> 2869 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2870 </intent-filter> 2871 </receiver> 2872 2873 <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" 2874 android:permission="android.permission.UPDATE_CONFIG"> 2875 <intent-filter> 2876 <action android:name="android.intent.action.UPDATE_SEPOLICY" /> 2877 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2878 </intent-filter> 2879 </receiver> 2880 2881 <receiver android:name="com.android.server.MasterClearReceiver" 2882 android:permission="android.permission.MASTER_CLEAR"> 2883 <intent-filter 2884 android:priority="100" > 2885 <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR --> 2886 <action android:name="android.intent.action.MASTER_CLEAR" /> 2887 2888 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR --> 2889 <action android:name="com.google.android.c2dm.intent.RECEIVE" /> 2890 <category android:name="android.intent.category.MASTER_CLEAR" /> 2891 </intent-filter> 2892 </receiver> 2893 2894 <service android:name="android.hardware.location.GeofenceHardwareService" 2895 android:permission="android.permission.LOCATION_HARDWARE" 2896 android:exported="false" /> 2897 2898 <service android:name="com.android.internal.backup.LocalTransportService" 2899 android:permission="android.permission.CONFIRM_FULL_BACKUP" 2900 android:exported="false"> 2901 <intent-filter> 2902 <action android:name="android.backup.TRANSPORT_HOST" /> 2903 </intent-filter> 2904 </service> 2905 2906 <service android:name="com.android.server.MountServiceIdler" 2907 android:exported="true" 2908 android:permission="android.permission.BIND_JOB_SERVICE" > 2909 </service> 2910 2911 <service android:name="com.android.server.backup.FullBackupJob" 2912 android:exported="true" 2913 android:permission="android.permission.BIND_JOB_SERVICE" > 2914 </service> 2915 2916 <service android:name="com.android.server.backup.KeyValueBackupJob" 2917 android:permission="android.permission.BIND_JOB_SERVICE" > 2918 </service> 2919 2920 <service 2921 android:name="com.android.server.pm.BackgroundDexOptService" 2922 android:exported="true" 2923 android:permission="android.permission.BIND_JOB_SERVICE"> 2924 </service> 2925 2926 </application> 2927 2928</manifest> 2929