AndroidManifest.xml revision bfa216ac261dd3c5035ad38795650ce5f4ce6fb7
1<?xml version="1.0" encoding="utf-8"?> 2<!-- 3/* //device/apps/common/AndroidManifest.xml 4** 5** Copyright 2006, The Android Open Source Project 6** 7** Licensed under the Apache License, Version 2.0 (the "License"); 8** you may not use this file except in compliance with the License. 9** You may obtain a copy of the License at 10** 11** http://www.apache.org/licenses/LICENSE-2.0 12** 13** Unless required by applicable law or agreed to in writing, software 14** distributed under the License is distributed on an "AS IS" BASIS, 15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16** See the License for the specific language governing permissions and 17** limitations under the License. 18*/ 19--> 20<manifest xmlns:android="http://schemas.android.com/apk/res/android" 21 package="android" coreApp="true" android:sharedUserId="android.uid.system" 22 android:sharedUserLabel="@string/android_system_label"> 23 24 <!-- ================================================ --> 25 <!-- Special broadcasts that only the system can send --> 26 <!-- ================================================ --> 27 <eat-comment /> 28 29 <protected-broadcast android:name="android.intent.action.SCREEN_OFF" /> 30 <protected-broadcast android:name="android.intent.action.SCREEN_ON" /> 31 <protected-broadcast android:name="android.intent.action.USER_PRESENT" /> 32 <protected-broadcast android:name="android.intent.action.TIME_SET" /> 33 <protected-broadcast android:name="android.intent.action.TIME_TICK" /> 34 <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" /> 35 <protected-broadcast android:name="android.intent.action.DATE_CHANGED" /> 36 <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" /> 37 <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" /> 38 <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" /> 39 <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" /> 40 <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" /> 41 <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" /> 42 <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" /> 43 <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" /> 44 <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" /> 45 <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" /> 46 <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" /> 47 <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" /> 48 <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" /> 49 <protected-broadcast android:name="android.intent.action.UID_REMOVED" /> 50 <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" /> 51 <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" /> 52 <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" /> 53 <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" /> 54 <protected-broadcast android:name="android.intent.action.BATTERY_LOW" /> 55 <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" /> 56 <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" /> 57 <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" /> 58 <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" /> 59 <protected-broadcast android:name="android.intent.action.CHARGING" /> 60 <protected-broadcast android:name="android.intent.action.DISCHARGING" /> 61 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" /> 62 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" /> 63 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" /> 64 <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" /> 65 <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" /> 66 <protected-broadcast android:name="android.intent.action.REBOOT" /> 67 <protected-broadcast android:name="android.intent.action.DOCK_EVENT" /> 68 <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" /> 69 <protected-broadcast android:name="android.intent.action.USER_ADDED" /> 70 <protected-broadcast android:name="android.intent.action.USER_REMOVED" /> 71 <protected-broadcast android:name="android.intent.action.USER_STARTING" /> 72 <protected-broadcast android:name="android.intent.action.USER_STARTED" /> 73 <protected-broadcast android:name="android.intent.action.USER_STOPPING" /> 74 <protected-broadcast android:name="android.intent.action.USER_STOPPED" /> 75 <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" /> 76 <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" /> 77 <protected-broadcast android:name="android.intent.action.USER_SWITCHED" /> 78 <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" /> 79 80 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" /> 81 <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" /> 82 <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" /> 83 <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" /> 84 <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" /> 85 86 <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" /> 87 88 <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" /> 89 <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" /> 90 <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" /> 91 <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" /> 92 <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" /> 93 <protected-broadcast android:name="android.app.action.SEND_DEVICE_INITIALIZER_STATUS" /> 94 95 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" /> 96 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" /> 97 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" /> 98 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" /> 99 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" /> 100 <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" /> 101 102 <protected-broadcast android:name="android.os.action.SETTING_RESTORED" /> 103 104 <protected-broadcast android:name="android.backup.intent.RUN" /> 105 <protected-broadcast android:name="android.backup.intent.CLEAR" /> 106 <protected-broadcast android:name="android.backup.intent.INIT" /> 107 108 <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" /> 109 <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" /> 110 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" /> 111 <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" /> 112 <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" /> 113 <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" /> 114 <protected-broadcast android:name="android.bluetooth.device.action.UUID" /> 115 <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" /> 116 <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" /> 117 <protected-broadcast android:name="android.bluetooth.device.action.FOUND" /> 118 <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" /> 119 <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" /> 120 <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" /> 121 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" /> 122 <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" /> 123 <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" /> 124 <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" /> 125 <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" /> 126 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" /> 127 <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" /> 128 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" /> 129 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" /> 130 <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" /> 131 <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" /> 132 <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" /> 133 <protected-broadcast 134 android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" /> 135 <protected-broadcast 136 android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" /> 137 <protected-broadcast 138 android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" /> 139 <protected-broadcast 140 android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" /> 141 <protected-broadcast 142 android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" /> 143 <protected-broadcast 144 android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" /> 145 <protected-broadcast 146 android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" /> 147 <protected-broadcast 148 android:name="android.bluetooth.headsetclient.profile.action.RESULT" /> 149 <protected-broadcast 150 android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" /> 151 <protected-broadcast 152 android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" /> 153 <protected-broadcast 154 android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" /> 155 <protected-broadcast 156 android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" /> 157 <protected-broadcast 158 android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" /> 159 <protected-broadcast 160 android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" /> 161 <protected-broadcast 162 android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" /> 163 <protected-broadcast 164 android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" /> 165 <protected-broadcast 166 android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" /> 167 <protected-broadcast 168 android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" /> 169 <protected-broadcast 170 android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" /> 171 <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" /> 172 <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" /> 173 <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" /> 174 <protected-broadcast android:name="android.btopp.intent.action.LIST" /> 175 <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" /> 176 <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" /> 177 <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" /> 178 <protected-broadcast android:name="android.btopp.intent.action.HIDE" /> 179 <protected-broadcast android:name="android.btopp.intent.action.RETRY" /> 180 <protected-broadcast android:name="android.btopp.intent.action.OPEN" /> 181 <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" /> 182 <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" /> 183 <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" /> 184 <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" /> 185 <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" /> 186 187 <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" /> 188 189 <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" /> 190 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 191 <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" /> 192 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" /> 193 <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" /> 194 195 <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" /> 196 <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" /> 197 198 <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" /> 199 <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" /> 200 <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" /> 201 <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" /> 202 <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" /> 203 <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" /> 204 <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" /> 205 <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" /> 206 207 <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" /> 208 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" /> 209 <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" /> 210 <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" /> 211 <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" /> 212 <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" /> 213 <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" /> 214 <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" /> 215 <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" /> 216 <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" /> 217 218 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" /> 219 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" /> 220 <!-- @deprecated. Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. --> 221 <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" /> 222 <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" /> 223 <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" /> 224 <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" /> 225 226 <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" /> 227 228 <protected-broadcast android:name="android.nfc.action.LLCP_LINK_STATE_CHANGED" /> 229 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" /> 230 <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" /> 231 <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" /> 232 233 <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" /> 234 235 <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" /> 236 <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" /> 237 238 <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" /> 239 240 <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" /> 241 <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" /> 242 <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" /> 243 <protected-broadcast android:name="android.intent.action.DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN" /> 244 245 <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" /> 246 <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" /> 247 <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" /> 248 <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" /> 249 <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" /> 250 <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" /> 251 <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" /> 252 <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" /> 253 <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" /> 254 <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" /> 255 <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" /> 256 <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" /> 257 <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" /> 258 <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" /> 259 <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" /> 260 <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" /> 261 <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" /> 262 <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" /> 263 <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" /> 264 <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" /> 265 <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" /> 266 <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" /> 267 <protected-broadcast 268 android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" /> 269 <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" /> 270 <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" /> 271 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" /> 272 <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" /> 273 <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" /> 274 <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" /> 275 <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" /> 276 <protected-broadcast android:name="android.intent.action.BUGREPORT_FINISHED" /> 277 278 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" /> 279 <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" /> 280 281 <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" /> 282 283 <protected-broadcast android:name="android.intent.action.PHONE_STATE" /> 284 285 <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" /> 286 287 <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" /> 288 <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" /> 289 <protected-broadcast android:name="android.location.MODE_CHANGED" /> 290 <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" /> 291 <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" /> 292 293 <protected-broadcast 294 android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" /> 295 296 <!-- Defined in RestrictionsManager --> 297 <protected-broadcast 298 android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" /> 299 <!-- Defined in RestrictionsManager --> 300 301 <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" /> 302 <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" /> 303 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 304 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" /> 305 <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" /> 306 307 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SUBSCRIPTION_CHANGED" /> 308 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED" /> 309 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" /> 310 <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" /> 311 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" /> 312 <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" /> 313 314 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" /> 315 <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" /> 316 317 <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" /> 318 <protected-broadcast android:name="android.service.persistentdata.action.WIPE_IF_ALLOWED" /> 319 320 <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" /> 321 <!-- ====================================================================== --> 322 <!-- RUNTIME PERMISSIONS --> 323 <!-- ====================================================================== --> 324 <eat-comment /> 325 326 <!-- ====================================================================== --> 327 <!-- Permissions for accessing user's contacts including personal profile --> 328 <!-- ====================================================================== --> 329 <eat-comment /> 330 331 <!-- Used for runtime permissions related to user's contacts and profile. --> 332 <permission-group android:name="android.permission-group.CONTACTS" 333 android:icon="@drawable/perm_group_social_info" 334 android:label="@string/permgrouplab_contacts" 335 android:description="@string/permgroupdesc_contacts" 336 android:priority="100" /> 337 338 <!-- Allows an application to read the user's contacts data. --> 339 <permission android:name="android.permission.READ_CONTACTS" 340 android:permissionGroup="android.permission-group.CONTACTS" 341 android:label="@string/permlab_readContacts" 342 android:description="@string/permdesc_readContacts" 343 android:protectionLevel="dangerous" /> 344 345 <!-- Allows an application to write the user's contacts data. --> 346 <permission android:name="android.permission.WRITE_CONTACTS" 347 android:permissionGroup="android.permission-group.CONTACTS" 348 android:label="@string/permlab_writeContacts" 349 android:description="@string/permdesc_writeContacts" 350 android:protectionLevel="dangerous" /> 351 352 <!-- @deprecated No longer enforced. This was last enforced in API version 22. --> 353 <permission android:name="android.permission.READ_PROFILE" 354 android:permissionGroup="android.permission-group.CONTACTS" 355 android:label="@string/permlab_readProfile" 356 android:description="@string/permdesc_readProfile" 357 android:protectionLevel="dangerous" /> 358 359 <!-- @deprecated No longer enforced. This was last enforced in API version 22. --> 360 <permission android:name="android.permission.WRITE_PROFILE" 361 android:permissionGroup="android.permission-group.CONTACTS" 362 android:label="@string/permlab_writeProfile" 363 android:description="@string/permdesc_writeProfile" 364 android:protectionLevel="dangerous" /> 365 366 <!-- ====================================================================== --> 367 <!-- Permissions for accessing user's calendar --> 368 <!-- ====================================================================== --> 369 <eat-comment /> 370 371 <!-- Used for runtime permissions related to user's calendar. --> 372 <permission-group android:name="android.permission-group.CALENDAR" 373 android:icon="@drawable/perm_group_calendar" 374 android:label="@string/permgrouplab_calendar" 375 android:description="@string/permgroupdesc_calendar" 376 android:priority="200" /> 377 378 <!-- Allows an application to read the user's calendar data. --> 379 <permission android:name="android.permission.READ_CALENDAR" 380 android:permissionGroup="android.permission-group.CALENDAR" 381 android:label="@string/permlab_readCalendar" 382 android:description="@string/permdesc_readCalendar" 383 android:protectionLevel="dangerous" /> 384 385 <!-- Allows an application to write the user's calendar data. --> 386 <permission android:name="android.permission.WRITE_CALENDAR" 387 android:permissionGroup="android.permission-group.CALENDAR" 388 android:label="@string/permlab_writeCalendar" 389 android:description="@string/permdesc_writeCalendar" 390 android:protectionLevel="dangerous" /> 391 392 <!-- ====================================================================== --> 393 <!-- Permissions for accessing and modifying user's SMS messages --> 394 <!-- ====================================================================== --> 395 <eat-comment /> 396 397 <!-- Used for runtime permissions related to user's SMS messages. --> 398 <permission-group android:name="android.permission-group.SMS" 399 android:icon="@drawable/perm_group_messages" 400 android:label="@string/permgrouplab_sms" 401 android:description="@string/permgroupdesc_sms" 402 android:priority="300" /> 403 404 <!-- Allows an application to send SMS messages. --> 405 <permission android:name="android.permission.SEND_SMS" 406 android:permissionGroup="android.permission-group.SMS" 407 android:label="@string/permlab_sendSms" 408 android:description="@string/permdesc_sendSms" 409 android:permissionFlags="costsMoney" 410 android:protectionLevel="dangerous" /> 411 412 <!-- Allows an application to receive SMS messages. --> 413 <permission android:name="android.permission.RECEIVE_SMS" 414 android:permissionGroup="android.permission-group.SMS" 415 android:label="@string/permlab_receiveSms" 416 android:description="@string/permdesc_receiveSms" 417 android:protectionLevel="dangerous"/> 418 419 <!-- Allows an application to read SMS messages. --> 420 <permission android:name="android.permission.READ_SMS" 421 android:permissionGroup="android.permission-group.SMS" 422 android:label="@string/permlab_readSms" 423 android:description="@string/permdesc_readSms" 424 android:protectionLevel="dangerous" /> 425 426 <!-- Allows an application to receive WAP push messages. --> 427 <permission android:name="android.permission.RECEIVE_WAP_PUSH" 428 android:permissionGroup="android.permission-group.SMS" 429 android:label="@string/permlab_receiveWapPush" 430 android:description="@string/permdesc_receiveWapPush" 431 android:protectionLevel="dangerous" /> 432 433 <!-- Allows an application to monitor incoming MMS messages. --> 434 <permission android:name="android.permission.RECEIVE_MMS" 435 android:permissionGroup="android.permission-group.SMS" 436 android:label="@string/permlab_receiveMms" 437 android:description="@string/permdesc_receiveMms" 438 android:protectionLevel="dangerous" /> 439 440 <!-- Allows an application to read previously received cell broadcast 441 messages and to register a content observer to get notifications when 442 a cell broadcast has been received and added to the database. For 443 emergency alerts, the database is updated immediately after the 444 alert dialog and notification sound/vibration/speech are presented. 445 The "read" column is then updated after the user dismisses the alert. 446 This enables supplementary emergency assistance apps to start loading 447 additional emergency information (if Internet access is available) 448 when the alert is first received, and to delay presenting the info 449 to the user until after the initial alert dialog is dismissed. 450 @hide Pending API council approval --> 451 <permission android:name="android.permission.READ_CELL_BROADCASTS" 452 android:permissionGroup="android.permission-group.SMS" 453 android:label="@string/permlab_readCellBroadcasts" 454 android:description="@string/permdesc_readCellBroadcasts" 455 android:protectionLevel="dangerous" /> 456 457 <!-- =============================================================== --> 458 <!-- Permissions for accessing social info --> 459 <!-- =============================================================== --> 460 <eat-comment /> 461 462 <!-- Used for permissions that provide access to the user's social connections, 463 such as contacts, call logs, social stream, etc. This includes 464 both reading and writing of this data (which should generally be 465 expressed as two distinct permissions). --> 466 467 <permission-group android:name="android.permission-group.SOCIAL_INFO" 468 android:label="@string/permgrouplab_socialInfo" 469 android:icon="@drawable/perm_group_social_info" 470 android:description="@string/permgroupdesc_socialInfo" 471 android:permissionGroupFlags="personalInfo" 472 android:priority="1200" /> 473 474 <!-- Allows an application to read from the user's social stream. 475 @deprecated This functionality will be unsupported in the future; cursors returned 476 will be empty. Please do not use. --> 477 <permission android:name="android.permission.READ_SOCIAL_STREAM" 478 android:permissionGroup="android.permission-group.SOCIAL_INFO" 479 android:protectionLevel="dangerous" 480 android:label="@string/permlab_readSocialStream" 481 android:description="@string/permdesc_readSocialStream" /> 482 483 <!-- Allows an application to write (but not read) the user's 484 social stream data. 485 @deprecated This functionality will be unsupported in the future; cursors returned 486 will be empty. Please do not use. --> 487 <permission android:name="android.permission.WRITE_SOCIAL_STREAM" 488 android:permissionGroup="android.permission-group.SOCIAL_INFO" 489 android:protectionLevel="dangerous" 490 android:label="@string/permlab_writeSocialStream" 491 android:description="@string/permdesc_writeSocialStream" /> 492 493 <!-- ====================================================================== --> 494 <!-- Permissions for accessing the device location --> 495 <!-- ====================================================================== --> 496 <eat-comment /> 497 498 <!-- Used for permissions that allow accessing the device location. --> 499 <permission-group android:name="android.permission-group.LOCATION" 500 android:icon="@drawable/perm_group_location" 501 android:label="@string/permgrouplab_location" 502 android:description="@string/permgroupdesc_location" 503 android:priority="400" /> 504 505 <!-- Allows an app to access precise location. --> 506 <permission android:name="android.permission.ACCESS_FINE_LOCATION" 507 android:permissionGroup="android.permission-group.LOCATION" 508 android:label="@string/permlab_accessFineLocation" 509 android:description="@string/permdesc_accessFineLocation" 510 android:protectionLevel="dangerous" /> 511 512 <!-- Allows an app to access approximate location. --> 513 <permission android:name="android.permission.ACCESS_COARSE_LOCATION" 514 android:permissionGroup="android.permission-group.LOCATION" 515 android:label="@string/permlab_accessCoarseLocation" 516 android:description="@string/permdesc_accessCoarseLocation" 517 android:protectionLevel="dangerous" /> 518 519 <!-- ====================================================================== --> 520 <!-- Permissions for accessing the device telephony --> 521 <!-- ====================================================================== --> 522 <eat-comment /> 523 524 <!-- Used for permissions that are associated telephony features. --> 525 <permission-group android:name="android.permission-group.PHONE" 526 android:icon="@drawable/perm_group_phone_calls" 527 android:label="@string/permgrouplab_phone" 528 android:description="@string/permgroupdesc_phone" 529 android:priority="500" /> 530 531 <!-- Allows read only access to phone state. 532 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 533 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 534 minSdkVersion}</a> and <a 535 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 536 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 537 grants your app this permission. If you don't need this permission, be sure your <a 538 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 539 targetSdkVersion}</a> is 4 or higher. --> 540 <permission android:name="android.permission.READ_PHONE_STATE" 541 android:permissionGroup="android.permission-group.PHONE" 542 android:label="@string/permlab_readPhoneState" 543 android:description="@string/permdesc_readPhoneState" 544 android:protectionLevel="dangerous" /> 545 546 <!-- Allows an application to initiate a phone call without going through 547 the Dialer user interface for the user to confirm the call. --> 548 <permission android:name="android.permission.CALL_PHONE" 549 android:permissionGroup="android.permission-group.PHONE" 550 android:permissionFlags="costsMoney" 551 android:label="@string/permlab_callPhone" 552 android:description="@string/permdesc_callPhone" 553 android:protectionLevel="dangerous" /> 554 555 <!-- Allows an application to read the user's call log. 556 <p class="note"><strong>Note:</strong> If your app uses the 557 {@link #READ_CONTACTS} permission and <em>both</em> your <a 558 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 559 minSdkVersion}</a> and <a 560 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 561 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 562 grants your app this permission. If you don't need this permission, be sure your <a 563 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 564 targetSdkVersion}</a> is 16 or higher.</p> --> 565 <permission android:name="android.permission.READ_CALL_LOG" 566 android:permissionGroup="android.permission-group.PHONE" 567 android:label="@string/permlab_readCallLog" 568 android:description="@string/permdesc_readCallLog" 569 android:protectionLevel="dangerous" /> 570 571 <!-- Allows an application to write (but not read) the user's 572 contacts data. 573 <p class="note"><strong>Note:</strong> If your app uses the 574 {@link #WRITE_CONTACTS} permission and <em>both</em> your <a 575 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 576 minSdkVersion}</a> and <a 577 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 578 targetSdkVersion}</a> values are set to 15 or lower, the system implicitly 579 grants your app this permission. If you don't need this permission, be sure your <a 580 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 581 targetSdkVersion}</a> is 16 or higher.</p> --> 582 <permission android:name="android.permission.WRITE_CALL_LOG" 583 android:permissionGroup="android.permission-group.PHONE" 584 android:label="@string/permlab_writeCallLog" 585 android:description="@string/permdesc_writeCallLog" 586 android:protectionLevel="dangerous" /> 587 588 <!-- Allows an application to add voicemails into the system. --> 589 <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL" 590 android:permissionGroup="android.permission-group.PHONE" 591 android:label="@string/permlab_addVoicemail" 592 android:description="@string/permdesc_addVoicemail" 593 android:protectionLevel="dangerous" /> 594 595 <!-- Allows an application to use SIP service. --> 596 <permission android:name="android.permission.USE_SIP" 597 android:permissionGroup="android.permission-group.PHONE" 598 android:description="@string/permdesc_use_sip" 599 android:label="@string/permlab_use_sip" 600 android:protectionLevel="dangerous"/> 601 602 <!-- Allows an application to see the number being dialed during an outgoing 603 call with the option to redirect the call to a different number or 604 abort the call altogether. --> 605 <permission android:name="android.permission.PROCESS_OUTGOING_CALLS" 606 android:permissionGroup="android.permission-group.PHONE" 607 android:label="@string/permlab_processOutgoingCalls" 608 android:description="@string/permdesc_processOutgoingCalls" 609 android:protectionLevel="dangerous" /> 610 611 <!-- ====================================================================== --> 612 <!-- Permissions for accessing the device microphone --> 613 <!-- ====================================================================== --> 614 <eat-comment /> 615 616 <!-- Used for permissions that are associated with accessing 617 microphone audio from the device. Note that phone calls also capture audio 618 but are in a separate (more visible) permission group. --> 619 <permission-group android:name="android.permission-group.MICROPHONE" 620 android:icon="@drawable/perm_group_microphone" 621 android:label="@string/permgrouplab_microphone" 622 android:description="@string/permgroupdesc_microphone" 623 android:priority="600" /> 624 625 <!-- Allows an application to record audio. --> 626 <permission android:name="android.permission.RECORD_AUDIO" 627 android:permissionGroup="android.permission-group.MICROPHONE" 628 android:label="@string/permlab_recordAudio" 629 android:description="@string/permdesc_recordAudio" 630 android:protectionLevel="dangerous"/> 631 632 <!-- ====================================================================== --> 633 <!-- Permissions for accessing the device camera --> 634 <!-- ====================================================================== --> 635 <eat-comment /> 636 637 <!-- Used for permissions that are associated with accessing 638 camera or capturing images/video from the device. --> 639 <permission-group android:name="android.permission-group.CAMERA" 640 android:icon="@drawable/perm_group_camera" 641 android:label="@string/permgrouplab_camera" 642 android:description="@string/permgroupdesc_camera" 643 android:priority="700" /> 644 645 <!-- Required to be able to access the camera device. 646 <p>This will automatically enforce the <a 647 href="{@docRoot}guide/topics/manifest/uses-feature-element.html">{@code 648 <uses-feature>}</a> manifest element for <em>all</em> camera features. 649 If you do not require all camera features or can properly operate if a camera 650 is not available, then you must modify your manifest as appropriate in order to 651 install on devices that don't support all camera features.</p> --> 652 <permission android:name="android.permission.CAMERA" 653 android:permissionGroup="android.permission-group.CAMERA" 654 android:label="@string/permlab_camera" 655 android:description="@string/permdesc_camera" 656 android:protectionLevel="dangerous" /> 657 658 659 <!-- ====================================================================== --> 660 <!-- Permissions for accessing the device sensors --> 661 <!-- ====================================================================== --> 662 <eat-comment /> 663 664 <!-- Used for permissions that are associated with accessing 665 camera or capturing images/video from the device. --> 666 <permission-group android:name="android.permission-group.SENSORS" 667 android:label="@string/permgrouplab_sensors" 668 android:description="@string/permgroupdesc_sensors" 669 android:priority="800" /> 670 671 <!-- Allows an application to access data from sensors that the user uses to 672 measure what is happening inside his/her body, such as heart rate. --> 673 <permission android:name="android.permission.BODY_SENSORS" 674 android:permissionGroup="android.permission-group.SENSORS" 675 android:label="@string/permlab_bodySensors" 676 android:description="@string/permdesc_bodySensors" 677 android:protectionLevel="dangerous" /> 678 679 <!-- Allows an app to use fingerprint hardware. --> 680 <permission android:name="android.permission.USE_FINGERPRINT" 681 android:permissionGroup="android.permission-group.SENSORS" 682 android:label="@string/permlab_useFingerprint" 683 android:description="@string/permdesc_useFingerprint" 684 android:protectionLevel="normal" /> 685 686 <!-- ====================================================================== --> 687 <!-- INSTALLTIME PERMISSIONS --> 688 <!-- ====================================================================== --> 689 690 <!-- ================================== --> 691 <!-- Permissions for accessing messages --> 692 <!-- ================================== --> 693 <eat-comment /> 694 695 <!-- @SystemApi Allows an application (Phone) to send a request to other applications 696 to handle the respond-via-message action during incoming calls. 697 <p>Not for use by third-party applications. --> 698 <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE" 699 android:protectionLevel="signature|system" /> 700 701 <!-- Allows an application to filter carrier specific sms. 702 @hide --> 703 <permission android:name="android.permission.CARRIER_FILTER_SMS" 704 android:protectionLevel="signature|system" /> 705 706 <!-- @SystemApi Allows an application to receive emergency cell broadcast messages, 707 to record or display them to the user. 708 <p>Not for use by third-party applications. 709 @hide Pending API council approval --> 710 <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" 711 android:protectionLevel="signature|system" /> 712 713 <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record 714 or perform processing on them. --> 715 <!-- @hide --> 716 <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP" 717 android:protectionLevel="signature|system" /> 718 719 <!-- @SystemApi @hide Allows an application to execute contacts directory search. 720 This should only be used by ContactsProvider. 721 <p>Not for use by third-party applications. --> 722 <permission android:name="android.permission.BIND_DIRECTORY_SEARCH" 723 android:protectionLevel="signature|system" /> 724 725 <!-- =============================================================== --> 726 <!-- Permissions for accessing the user dictionary--> 727 <!-- =============================================================== --> 728 <eat-comment /> 729 730 <!-- Used for permissions that provide access to the user 731 calendar to create / view events.--> 732 <permission-group android:name="android.permission-group.USER_DICTIONARY" 733 android:label="@string/permgrouplab_dictionary" 734 android:icon="@drawable/perm_group_user_dictionary" 735 android:description="@string/permgroupdesc_dictionary" 736 android:permissionGroupFlags="personalInfo" 737 android:priority="1100" /> 738 739 <!-- Allows an application to read the user dictionary. This should 740 really only be required by an IME, or a dictionary editor like 741 the Settings app. --> 742 <permission android:name="android.permission.READ_USER_DICTIONARY" 743 android:permissionGroup="android.permission-group.USER_DICTIONARY" 744 android:label="@string/permlab_readDictionary" 745 android:description="@string/permdesc_readDictionary" 746 android:protectionLevel="dangerous"/> 747 748 <!-- Allows an application to write to the user dictionary. --> 749 <permission android:name="android.permission.WRITE_USER_DICTIONARY" 750 android:permissionGroup="android.permission-group.USER_DICTIONARY" 751 android:label="@string/permlab_writeDictionary" 752 android:description="@string/permdesc_writeDictionary" 753 android:protectionLevel="normal"/> 754 755 <!-- =============================================================== --> 756 <!-- Permissions for setting the device alarm --> 757 <!-- =============================================================== --> 758 <eat-comment /> 759 760 <!-- Allows an application to broadcast an Intent to set an alarm for the user. --> 761 <permission android:name="com.android.alarm.permission.SET_ALARM" 762 android:label="@string/permlab_setAlarm" 763 android:description="@string/permdesc_setAlarm" 764 android:protectionLevel="normal" /> 765 766 <!-- =============================================================== --> 767 <!-- Permissions for accessing the user voicemail --> 768 <!-- =============================================================== --> 769 <eat-comment /> 770 771 <!-- Allows an application to modify and remove existing voicemails in the system --> 772 <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL" 773 android:protectionLevel="system|signature" /> 774 775 <!-- Allows an application to read voicemails in the system. --> 776 <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL" 777 android:protectionLevel="system|signature" /> 778 779 <!-- ======================================= --> 780 <!-- Permissions for accessing location info --> 781 <!-- ======================================= --> 782 <eat-comment /> 783 784 <!-- Allows an application to access extra location provider commands --> 785 <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" 786 android:label="@string/permlab_accessLocationExtraCommands" 787 android:description="@string/permdesc_accessLocationExtraCommands" 788 android:protectionLevel="normal" /> 789 790 <!-- @SystemApi Allows an application to install a location provider into the Location Manager. 791 <p>Not for use by third-party applications. --> 792 <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER" 793 android:protectionLevel="signature|system" /> 794 795 <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files. 796 This should only be used by HDMI-CEC service. 797 --> 798 <permission android:name="android.permission.HDMI_CEC" 799 android:protectionLevel="signatureOrSystem" /> 800 801 <!-- @SystemApi Allows an application to use location features in hardware, 802 such as the geofencing api. 803 <p>Not for use by third-party applications. --> 804 <permission android:name="android.permission.LOCATION_HARDWARE" 805 android:protectionLevel="signature|system" /> 806 <uses-permission android:name="android.permission.LOCATION_HARDWARE"/> 807 808 <!-- Allows an application to create mock location providers for testing. --> 809 <permission android:name="android.permission.ACCESS_MOCK_LOCATION" 810 android:protectionLevel="signature" /> 811 812 <!-- ======================================= --> 813 <!-- Permissions for accessing networks --> 814 <!-- ======================================= --> 815 <eat-comment /> 816 817 <!-- Allows applications to open network sockets. --> 818 <permission android:name="android.permission.INTERNET" 819 android:description="@string/permdesc_createNetworkSockets" 820 android:label="@string/permlab_createNetworkSockets" 821 android:protectionLevel="normal" /> 822 823 <!-- Allows applications to access information about networks --> 824 <permission android:name="android.permission.ACCESS_NETWORK_STATE" 825 android:description="@string/permdesc_accessNetworkState" 826 android:label="@string/permlab_accessNetworkState" 827 android:protectionLevel="normal" /> 828 829 <!-- Allows applications to access information about Wi-Fi networks --> 830 <permission android:name="android.permission.ACCESS_WIFI_STATE" 831 android:description="@string/permdesc_accessWifiState" 832 android:label="@string/permlab_accessWifiState" 833 android:protectionLevel="normal" /> 834 835 <!-- Allows applications to change Wi-Fi connectivity state --> 836 <permission android:name="android.permission.CHANGE_WIFI_STATE" 837 android:description="@string/permdesc_changeWifiState" 838 android:label="@string/permlab_changeWifiState" 839 android:protectionLevel="dangerous" /> 840 841 <!-- @SystemApi @hide Allows applications to read Wi-Fi credential. 842 <p>Not for use by third-party applications. --> 843 <permission android:name="android.permission.READ_WIFI_CREDENTIAL" 844 android:protectionLevel="signature|system" /> 845 846 <!-- @SystemApi @hide Allow system apps to receive broadcast 847 when a wifi network credential is changed. 848 <p>Not for use by third-party applications. --> 849 <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE" 850 android:protectionLevel="signature|system" /> 851 852 <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created 853 by another application. Once reconfigured the original creator cannot make any further 854 modifications. 855 <p>Not for use by third-party applications. --> 856 <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG" 857 android:protectionLevel="signature|system" /> 858 859 <!-- @hide --> 860 <permission android:name="android.permission.ACCESS_WIMAX_STATE" 861 android:description="@string/permdesc_accessWimaxState" 862 android:label="@string/permlab_accessWimaxState" 863 android:protectionLevel="normal" /> 864 865 <!-- @hide --> 866 <permission android:name="android.permission.CHANGE_WIMAX_STATE" 867 android:description="@string/permdesc_changeWimaxState" 868 android:label="@string/permlab_changeWimaxState" 869 android:protectionLevel="dangerous" /> 870 871 <!--@SystemApi Allows applications to the the local WiFi and Bluetooth MAC address. 872 @hide 873 --> 874 <permission android:name="android.permission.SCORE_NETWORKS" 875 android:protectionLevel="signature|system" /> 876 877 <!-- ======================================= --> 878 <!-- Permissions for short range, peripheral networks --> 879 <!-- ======================================= --> 880 <eat-comment /> 881 882 <!-- Allows applications to connect to paired bluetooth devices --> 883 <permission android:name="android.permission.BLUETOOTH" 884 android:description="@string/permdesc_bluetooth" 885 android:label="@string/permlab_bluetooth" 886 android:protectionLevel="dangerous" /> 887 888 <!-- Allows applications to discover and pair bluetooth devices --> 889 <permission android:name="android.permission.BLUETOOTH_ADMIN" 890 android:description="@string/permdesc_bluetoothAdmin" 891 android:label="@string/permlab_bluetoothAdmin" 892 android:protectionLevel="dangerous" /> 893 894 <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to 895 allow or disallow phonebook access or message access. 896 This is not available to third party applications. --> 897 <permission android:name="android.permission.BLUETOOTH_PRIVILEGED" 898 android:protectionLevel="system|signature" /> 899 900 <!-- Control access to email providers exclusively for Bluetooth 901 @hide 902 --> 903 <permission android:name="android.permission.BLUETOOTH_MAP" 904 android:protectionLevel="signature" /> 905 906 <!-- Allows bluetooth stack to access files 907 @hide This should only be used by Bluetooth apk. 908 --> 909 <permission android:name="android.permission.BLUETOOTH_STACK" 910 android:protectionLevel="signature" /> 911 912 <!-- Allows applications to perform I/O operations over NFC --> 913 <permission android:name="android.permission.NFC" 914 android:description="@string/permdesc_nfc" 915 android:label="@string/permlab_nfc" 916 android:protectionLevel="normal" /> 917 918 <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs. 919 @hide --> 920 <permission android:name="android.permission.CONNECTIVITY_INTERNAL" 921 android:protectionLevel="signature|system" /> 922 923 <!-- @SystemApi 924 @hide --> 925 <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE" 926 android:protectionLevel="signature|system" /> 927 928 <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device. 929 @hide --> 930 <permission android:name="android.permission.LOOP_RADIO" 931 android:protectionLevel="signature|system" /> 932 933 <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth 934 @hide --> 935 <permission android:name="android.permission.NFC_HANDOVER_STATUS" 936 android:protectionLevel="signature|system" /> 937 938 <!-- ================================== --> 939 <!-- Permissions for accessing accounts --> 940 <!-- ================================== --> 941 <eat-comment /> 942 943 <!-- Permissions for direct access to the accounts managed 944 by the Account Manager. --> 945 <permission-group android:name="android.permission-group.ACCOUNTS" 946 android:label="@string/permgrouplab_accounts" 947 android:icon="@drawable/perm_group_accounts" 948 android:description="@string/permgroupdesc_accounts" 949 android:permissionGroupFlags="personalInfo" 950 android:priority="1000" /> 951 952 <!-- Allows access to the list of accounts in the Accounts Service --> 953 <permission android:name="android.permission.GET_ACCOUNTS" 954 android:permissionGroup="android.permission-group.ACCOUNTS" 955 android:protectionLevel="normal" 956 android:description="@string/permdesc_getAccounts" 957 android:label="@string/permlab_getAccounts" /> 958 959 <!-- Allows an application to act as an AccountAuthenticator for 960 the AccountManager --> 961 <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS" 962 android:permissionGroup="android.permission-group.ACCOUNTS" 963 android:protectionLevel="dangerous" 964 android:label="@string/permlab_authenticateAccounts" 965 android:description="@string/permdesc_authenticateAccounts" /> 966 967 <!-- Allows an application to request authtokens from the AccountManager --> 968 <permission android:name="android.permission.USE_CREDENTIALS" 969 android:permissionGroup="android.permission-group.ACCOUNTS" 970 android:protectionLevel="dangerous" 971 android:label="@string/permlab_useCredentials" 972 android:description="@string/permdesc_useCredentials" /> 973 974 <!-- Allows an application to manage the list of accounts in the AccountManager --> 975 <permission android:name="android.permission.MANAGE_ACCOUNTS" 976 android:permissionGroup="android.permission-group.ACCOUNTS" 977 android:protectionLevel="dangerous" 978 android:label="@string/permlab_manageAccounts" 979 android:description="@string/permdesc_manageAccounts" /> 980 981 <!-- @SystemApi Allows applications to call into AccountAuthenticators. 982 <p>Not for use by third-party applications. --> 983 <permission android:name="android.permission.ACCOUNT_MANAGER" 984 android:permissionGroup="android.permission-group.ACCOUNTS" 985 android:protectionLevel="signature" /> 986 987 <!-- ================================== --> 988 <!-- Permissions for accessing hardware that may effect battery life--> 989 <!-- ================================== --> 990 <eat-comment /> 991 992 <!-- Allows applications to enter Wi-Fi Multicast mode --> 993 <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE" 994 android:description="@string/permdesc_changeWifiMulticastState" 995 android:label="@string/permlab_changeWifiMulticastState" 996 android:protectionLevel="dangerous" /> 997 998 <!-- Allows access to the vibrator --> 999 <permission android:name="android.permission.VIBRATE" 1000 android:label="@string/permlab_vibrate" 1001 android:description="@string/permdesc_vibrate" 1002 android:protectionLevel="normal" /> 1003 1004 <!-- Allows access to the flashlight --> 1005 <permission android:name="android.permission.FLASHLIGHT" 1006 android:label="@string/permlab_flashlight" 1007 android:description="@string/permdesc_flashlight" 1008 android:protectionLevel="normal" /> 1009 1010 <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen 1011 from dimming --> 1012 <permission android:name="android.permission.WAKE_LOCK" 1013 android:label="@string/permlab_wakeLock" 1014 android:description="@string/permdesc_wakeLock" 1015 android:protectionLevel="normal" /> 1016 1017 <!-- Allows using the device's IR transmitter, if available --> 1018 <permission android:name="android.permission.TRANSMIT_IR" 1019 android:label="@string/permlab_transmitIr" 1020 android:description="@string/permdesc_transmitIr" 1021 android:protectionLevel="normal" /> 1022 1023 <!-- ==================================================== --> 1024 <!-- Permissions related to changing audio settings --> 1025 <!-- ==================================================== --> 1026 <eat-comment /> 1027 1028 <!-- Allows an application to modify global audio settings --> 1029 <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" 1030 android:label="@string/permlab_modifyAudioSettings" 1031 android:description="@string/permdesc_modifyAudioSettings" 1032 android:protectionLevel="normal" /> 1033 1034 <!-- ================================== --> 1035 <!-- Permissions for accessing hardware --> 1036 <!-- ================================== --> 1037 <eat-comment /> 1038 1039 <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices 1040 @hide --> 1041 <permission android:name="android.permission.MANAGE_USB" 1042 android:protectionLevel="signature|system" /> 1043 1044 <!-- @SystemApi Allows an application to access the MTP USB kernel driver. 1045 For use only by the device side MTP implementation. 1046 @hide --> 1047 <permission android:name="android.permission.ACCESS_MTP" 1048 android:protectionLevel="signature|system" /> 1049 1050 <!-- Allows access to hardware peripherals. Intended only for hardware testing. 1051 <p>Not for use by third-party applications. --> 1052 <permission android:name="android.permission.HARDWARE_TEST" 1053 android:protectionLevel="signature" /> 1054 1055 <!-- @SystemApi Allows access to FM 1056 @hide This is not a third-party API (intended for system apps).--> 1057 <permission android:name="android.permission.ACCESS_FM_RADIO" 1058 android:protectionLevel="signature|system" /> 1059 1060 <!-- Allows access to configure network interfaces, configure/use IPSec, etc. 1061 @hide --> 1062 <permission android:name="android.permission.NET_ADMIN" 1063 android:protectionLevel="signature" /> 1064 1065 <!-- Allows registration for remote audio playback. @hide --> 1066 <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK" 1067 android:protectionLevel="signature" /> 1068 1069 <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as 1070 built-in tuners and HDMI-in's. 1071 @hide This should only be used by OEM's TvInputService's. 1072 --> 1073 <permission android:name="android.permission.TV_INPUT_HARDWARE" 1074 android:protectionLevel="signatureOrSystem" /> 1075 1076 <!-- @SystemApi Allows to capture a frame of TV input hardware such as 1077 built-in tuners and HDMI-in's. 1078 @hide <p>Not for use by third-party applications. 1079 --> 1080 <permission android:name="android.permission.CAPTURE_TV_INPUT" 1081 android:protectionLevel="signatureOrSystem" /> 1082 1083 <!-- @hide Allows TvInputService to access DVB device. 1084 <p>Not for use by third-party applications. --> 1085 <permission android:name="android.permission.DVB_DEVICE" 1086 android:protectionLevel="signatureOrSystem" /> 1087 1088 <!-- @hide Allows enabling/disabling OEM unlock 1089 <p>Not for use by third-party applications. --> 1090 <permission android:name="android.permission.OEM_UNLOCK_STATE" 1091 android:protectionLevel="signature" /> 1092 1093 <!-- @hide Allows querying state of PersistentDataBlock 1094 <p>Not for use by third-party applications. --> 1095 <permission android:name="android.permission.ACCESS_PDB_STATE" 1096 android:protectionLevel="signature" /> 1097 1098 <!-- @hide Allows system update service to notify device owner about pending updates. 1099 <p>Not for use by third-party applications. --> 1100 <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE" 1101 android:protectionLevel="signatureOrSystem" /> 1102 1103 <!-- =========================================== --> 1104 <!-- Permissions associated with camera and image capture --> 1105 <!-- =========================================== --> 1106 <eat-comment /> 1107 1108 <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when 1109 a camera is in use by an application. 1110 @hide --> 1111 <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED" 1112 android:protectionLevel="signature|system" /> 1113 1114 <!-- Allows sending the camera service notifications about system-wide events. 1115 @hide --> 1116 <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS" 1117 android:protectionLevel="signature|system" /> 1118 1119 <!-- =========================================== --> 1120 <!-- Permissions associated with telephony state --> 1121 <!-- =========================================== --> 1122 <eat-comment /> 1123 1124 <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc. 1125 Does not include placing calls. 1126 <p>Not for use by third-party applications. --> 1127 <permission android:name="android.permission.MODIFY_PHONE_STATE" 1128 android:protectionLevel="signature|system" /> 1129 1130 <!-- Allows read only access to precise phone state. 1131 @hide Pending API council approval --> 1132 <permission android:name="android.permission.READ_PRECISE_PHONE_STATE" 1133 android:protectionLevel="signature|system" /> 1134 1135 <!-- @SystemApi Allows read access to privileged phone state. 1136 @hide Used internally. --> 1137 <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" 1138 android:protectionLevel="signature|system" /> 1139 1140 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1141 PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount 1142 corresponds to a device SIM. 1143 @hide --> 1144 <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION" 1145 android:protectionLevel="system|signature" /> 1146 1147 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1148 PhoneAccount#CAPABILITY_CALL_PROVIDER. 1149 @hide --> 1150 <permission android:name="android.permission.REGISTER_CALL_PROVIDER" 1151 android:protectionLevel="system|signature" /> 1152 1153 <!-- @SystemApi Protects the ability to register any PhoneAccount with 1154 PhoneAccount#CAPABILITY_CONNECTION_MANAGER 1155 @hide --> 1156 <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER" 1157 android:protectionLevel="system|signature" /> 1158 1159 <!-- Must be required by a {@link android.telecom.InCallService}, 1160 to ensure that only the system can bind to it. --> 1161 <permission android:name="android.permission.BIND_INCALL_SERVICE" 1162 android:protectionLevel="system|signature" /> 1163 1164 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1165 to ensure that only the system can bind to it. 1166 @deprecated {@link android.telecom.ConnectionService}s should require 1167 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead. 1168 @SystemApi 1169 @hide --> 1170 <permission android:name="android.permission.BIND_CONNECTION_SERVICE" 1171 android:protectionLevel="system|signature" /> 1172 1173 <!-- Must be required by a {@link android.telecom.ConnectionService}, 1174 to ensure that only the system can bind to it. --> 1175 <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE" 1176 android:protectionLevel="system|signature" /> 1177 1178 1179 <!-- @SystemApi Allows an application to control the in-call experience. 1180 @hide --> 1181 <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE" 1182 android:protectionLevel="system|signature" /> 1183 1184 <!-- ================================== --> 1185 <!-- Permissions for sdcard interaction --> 1186 <!-- ================================== --> 1187 <eat-comment /> 1188 1189 <!-- Allows an application to read from external storage. 1190 <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly 1191 granted this permission.</p> 1192 <p>This permission is enforced starting in API level 19. Before API level 19, this 1193 permission is not enforced and all apps still have access to read from external storage. 1194 You can test your app with the permission enforced by enabling <em>Protect USB 1195 storage</em> under Developer options in the Settings app on a device running Android 4.1 or 1196 higher.</p> 1197 <p>Also starting in API level 19, this permission is <em>not</em> required to 1198 read/write files in your application-specific directories returned by 1199 {@link android.content.Context#getExternalFilesDir} and 1200 {@link android.content.Context#getExternalCacheDir}. 1201 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 1202 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 1203 minSdkVersion}</a> and <a 1204 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1205 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 1206 grants your app this permission. If you don't need this permission, be sure your <a 1207 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1208 targetSdkVersion}</a> is 4 or higher.--> 1209 <permission android:name="android.permission.READ_EXTERNAL_STORAGE" 1210 android:label="@string/permlab_sdcardRead" 1211 android:description="@string/permdesc_sdcardRead" 1212 android:protectionLevel="normal" /> 1213 1214 <!-- Allows an application to write to external storage. 1215 <p class="note"><strong>Note:</strong> If <em>both</em> your <a 1216 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code 1217 minSdkVersion}</a> and <a 1218 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1219 targetSdkVersion}</a> values are set to 3 or lower, the system implicitly 1220 grants your app this permission. If you don't need this permission, be sure your <a 1221 href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code 1222 targetSdkVersion}</a> is 4 or higher. 1223 <p>Starting in API level 19, this permission is <em>not</em> required to 1224 read/write files in your application-specific directories returned by 1225 {@link android.content.Context#getExternalFilesDir} and 1226 {@link android.content.Context#getExternalCacheDir}. --> 1227 <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" 1228 android:label="@string/permlab_sdcardWrite" 1229 android:description="@string/permdesc_sdcardWrite" 1230 android:protectionLevel="normal" /> 1231 1232 <!-- @SystemApi Allows an application to write to internal media storage 1233 @hide --> 1234 <permission android:name="android.permission.WRITE_MEDIA_STORAGE" 1235 android:protectionLevel="signature|system" /> 1236 1237 <!-- Allows an application to manage access to documents, usually as part 1238 of a document picker. --> 1239 <permission android:name="android.permission.MANAGE_DOCUMENTS" 1240 android:protectionLevel="signature" /> 1241 1242 <!-- ================================== --> 1243 <!-- Permissions for screenlock --> 1244 <!-- ================================== --> 1245 <eat-comment /> 1246 1247 <!-- Allows applications to disable the keyguard if it is not secure. --> 1248 <permission android:name="android.permission.DISABLE_KEYGUARD" 1249 android:description="@string/permdesc_disableKeyguard" 1250 android:label="@string/permlab_disableKeyguard" 1251 android:protectionLevel="normal" /> 1252 1253 <!-- ================================== --> 1254 <!-- Permissions to access other installed applications --> 1255 <!-- ================================== --> 1256 <eat-comment /> 1257 1258 <!-- @deprecated No longer enforced. --> 1259 <permission android:name="android.permission.GET_TASKS" 1260 android:label="@string/permlab_getTasks" 1261 android:description="@string/permdesc_getTasks" 1262 android:protectionLevel="normal" /> 1263 1264 <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really 1265 give access to task information. We need this new one because there are 1266 many existing apps that use add libraries and such that have validation 1267 code to ensure the app has requested the GET_TASKS permission by seeing 1268 if it has been granted the permission... if it hasn't, it kills the app 1269 with a message about being upset. So we need to have it continue to look 1270 like the app is getting that permission, even though it will never be 1271 checked, and new privileged apps can now request this one for real access. 1272 @hide 1273 @SystemApi --> 1274 <permission android:name="android.permission.REAL_GET_TASKS" 1275 android:protectionLevel="signature|system" /> 1276 1277 <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo. 1278 @hide --> 1279 <permission android:name="android.permission.START_TASKS_FROM_RECENTS" 1280 android:protectionLevel="signature|system" /> 1281 1282 <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions 1283 across the users on the device, using singleton services and 1284 user-targeted broadcasts. This permission is not available to 1285 third party applications. --> 1286 <permission android:name="android.permission.INTERACT_ACROSS_USERS" 1287 android:protectionLevel="signature|system|development" /> 1288 1289 <!-- @hide Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS} 1290 that removes restrictions on where broadcasts can be sent and allows other 1291 types of interactions. --> 1292 <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL" 1293 android:protectionLevel="signature" /> 1294 1295 <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage 1296 users on the device. This permission is not available to 1297 third party applications. --> 1298 <permission android:name="android.permission.MANAGE_USERS" 1299 android:protectionLevel="signature|system" /> 1300 1301 <!-- @hide Allows an application to set the profile owners and the device owner. 1302 This permission is not available to third party applications.--> 1303 <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS" 1304 android:protectionLevel="signature" 1305 android:label="@string/permlab_manageProfileAndDeviceOwners" 1306 android:description="@string/permdesc_manageProfileAndDeviceOwners" /> 1307 1308 <!-- Allows an application to get full detailed information about 1309 recently running tasks, with full fidelity to the real state. 1310 @hide --> 1311 <permission android:name="android.permission.GET_DETAILED_TASKS" 1312 android:protectionLevel="signature" /> 1313 1314 <!-- Allows an application to change the Z-order of tasks --> 1315 <permission android:name="android.permission.REORDER_TASKS" 1316 android:label="@string/permlab_reorderTasks" 1317 android:description="@string/permdesc_reorderTasks" 1318 android:protectionLevel="normal" /> 1319 1320 <!-- @hide Allows an application to change to remove/kill tasks --> 1321 <permission android:name="android.permission.REMOVE_TASKS" 1322 android:protectionLevel="signature" /> 1323 1324 <!-- @SystemApi @hide Allows an application to create/manage/remove stacks --> 1325 <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS" 1326 android:protectionLevel="signature|system" /> 1327 1328 <!-- Allows an application to start any activity, regardless of permission 1329 protection or exported state. 1330 @hide --> 1331 <permission android:name="android.permission.START_ANY_ACTIVITY" 1332 android:protectionLevel="signature" /> 1333 1334 <!-- @deprecated The {@link android.app.ActivityManager#restartPackage} 1335 API is no longer supported. --> 1336 <permission android:name="android.permission.RESTART_PACKAGES" 1337 android:label="@string/permlab_killBackgroundProcesses" 1338 android:description="@string/permdesc_killBackgroundProcesses" 1339 android:protectionLevel="normal" /> 1340 1341 <!-- Allows an application to call 1342 {@link android.app.ActivityManager#killBackgroundProcesses}. --> 1343 <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES" 1344 android:label="@string/permlab_killBackgroundProcesses" 1345 android:description="@string/permdesc_killBackgroundProcesses" 1346 android:protectionLevel="normal" /> 1347 1348 <!-- ================================== --> 1349 <!-- Permissions affecting the display of other applications --> 1350 <!-- ================================== --> 1351 <eat-comment /> 1352 1353 <!-- Allows an application to open windows using the type 1354 {@link android.view.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT}, 1355 shown on top of all other applications. Very few applications 1356 should use this permission; these windows are intended for 1357 system-level interaction with the user. --> 1358 <permission android:name="android.permission.SYSTEM_ALERT_WINDOW" 1359 android:label="@string/permlab_systemAlertWindow" 1360 android:description="@string/permdesc_systemAlertWindow" 1361 android:protectionLevel="dangerous" /> 1362 1363 <!-- ================================== --> 1364 <!-- Permissions affecting the system wallpaper --> 1365 <!-- ================================== --> 1366 <eat-comment /> 1367 1368 <!-- Allows applications to set the wallpaper --> 1369 <permission android:name="android.permission.SET_WALLPAPER" 1370 android:label="@string/permlab_setWallpaper" 1371 android:description="@string/permdesc_setWallpaper" 1372 android:protectionLevel="normal" /> 1373 1374 <!-- Allows applications to set the wallpaper hints --> 1375 <permission android:name="android.permission.SET_WALLPAPER_HINTS" 1376 android:label="@string/permlab_setWallpaperHints" 1377 android:description="@string/permdesc_setWallpaperHints" 1378 android:protectionLevel="normal" /> 1379 1380 <!-- ============================================ --> 1381 <!-- Permissions for changing the system clock --> 1382 <!-- ============================================ --> 1383 <eat-comment /> 1384 1385 <!-- @SystemApi Allows applications to set the system time. 1386 <p>Not for use by third-party applications. --> 1387 <permission android:name="android.permission.SET_TIME" 1388 android:protectionLevel="signature|system" /> 1389 1390 <!-- Allows applications to set the system time zone --> 1391 <permission android:name="android.permission.SET_TIME_ZONE" 1392 android:label="@string/permlab_setTimeZone" 1393 android:description="@string/permdesc_setTimeZone" 1394 android:protectionLevel="normal" /> 1395 1396 <!-- ==================================================== --> 1397 <!-- Permissions related to changing status bar --> 1398 <!-- ==================================================== --> 1399 <eat-comment /> 1400 1401 <!-- Allows an application to expand or collapse the status bar. --> 1402 <permission android:name="android.permission.EXPAND_STATUS_BAR" 1403 android:label="@string/permlab_expandStatusBar" 1404 android:description="@string/permdesc_expandStatusBar" 1405 android:protectionLevel="normal" /> 1406 1407 <!-- ============================================================== --> 1408 <!-- Permissions related to adding/removing shortcuts from Launcher --> 1409 <!-- ============================================================== --> 1410 <eat-comment /> 1411 1412 <!-- Allows an application to install a shortcut in Launcher --> 1413 <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT" 1414 android:label="@string/permlab_install_shortcut" 1415 android:description="@string/permdesc_install_shortcut" 1416 android:protectionLevel="dangerous"/> 1417 1418 <!-- Allows an application to uninstall a shortcut in Launcher --> 1419 <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT" 1420 android:label="@string/permlab_uninstall_shortcut" 1421 android:description="@string/permdesc_uninstall_shortcut" 1422 android:protectionLevel="dangerous"/> 1423 1424 <!-- ==================================================== --> 1425 <!-- Permissions related to accessing sync settings --> 1426 <!-- ==================================================== --> 1427 <eat-comment /> 1428 1429 <!-- Allows applications to read the sync settings --> 1430 <permission android:name="android.permission.READ_SYNC_SETTINGS" 1431 android:description="@string/permdesc_readSyncSettings" 1432 android:label="@string/permlab_readSyncSettings" 1433 android:protectionLevel="normal" /> 1434 1435 <!-- Allows applications to write the sync settings --> 1436 <permission android:name="android.permission.WRITE_SYNC_SETTINGS" 1437 android:description="@string/permdesc_writeSyncSettings" 1438 android:label="@string/permlab_writeSyncSettings" 1439 android:protectionLevel="normal" /> 1440 1441 <!-- Allows applications to read the sync stats --> 1442 <permission android:name="android.permission.READ_SYNC_STATS" 1443 android:description="@string/permdesc_readSyncStats" 1444 android:label="@string/permlab_readSyncStats" 1445 android:protectionLevel="normal" /> 1446 1447 <!-- ============================================ --> 1448 <!-- Permissions for low-level system interaction --> 1449 <!-- ============================================ --> 1450 <eat-comment /> 1451 1452 <!-- @SystemApi @hide Change the screen compatibility mode of applications --> 1453 <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY" 1454 android:protectionLevel="signature" /> 1455 1456 <!-- Allows an application to access all multi-user external storage @hide --> 1457 <permission android:name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE" 1458 android:protectionLevel="signature" /> 1459 1460 <!-- @SystemApi Allows an application to modify the current configuration, such 1461 as locale. --> 1462 <permission android:name="android.permission.CHANGE_CONFIGURATION" 1463 android:protectionLevel="signature|system|development" /> 1464 1465 <!-- Allows an application to read or write the system settings. --> 1466 <permission android:name="android.permission.WRITE_SETTINGS" 1467 android:label="@string/permlab_writeSettings" 1468 android:description="@string/permdesc_writeSettings" 1469 android:protectionLevel="normal" /> 1470 1471 <!-- @SystemApi Allows an application to modify the Google service map. 1472 <p>Not for use by third-party applications. --> 1473 <permission android:name="android.permission.WRITE_GSERVICES" 1474 android:protectionLevel="signature|system" /> 1475 1476 <!-- @SystemApi Allows an application to call 1477 {@link android.app.ActivityManager#forceStopPackage}. 1478 @hide --> 1479 <permission android:name="android.permission.FORCE_STOP_PACKAGES" 1480 android:protectionLevel="signature|system" /> 1481 1482 <!-- @SystemApi @hide Allows an application to retrieve the content of the active window 1483 An active window is the window that has fired an accessibility event. --> 1484 <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT" 1485 android:protectionLevel="signature|system" /> 1486 1487 <!-- @SystemApi Modify the global animation scaling factor. 1488 <p>Not for use by third-party applications. --> 1489 <permission android:name="android.permission.SET_ANIMATION_SCALE" 1490 android:protectionLevel="signature|system|development" /> 1491 1492 <!-- @deprecated This functionality will be removed in the future; please do 1493 not use. Allow an application to make its activities persistent. --> 1494 <permission android:name="android.permission.PERSISTENT_ACTIVITY" 1495 android:label="@string/permlab_persistentActivity" 1496 android:description="@string/permdesc_persistentActivity" 1497 android:protectionLevel="normal" /> 1498 1499 <!-- Allows an application to find out the space used by any package. --> 1500 <permission android:name="android.permission.GET_PACKAGE_SIZE" 1501 android:label="@string/permlab_getPackageSize" 1502 android:description="@string/permdesc_getPackageSize" 1503 android:protectionLevel="normal" /> 1504 1505 <!-- @deprecated No longer useful, see 1506 {@link android.content.pm.PackageManager#addPackageToPreferred} 1507 for details. --> 1508 <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS" 1509 android:protectionLevel="signature" /> 1510 1511 <!-- Allows an application to receive the 1512 {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is 1513 broadcast after the system finishes booting. If you don't 1514 request this permission, you will not receive the broadcast at 1515 that time. Though holding this permission does not have any 1516 security implications, it can have a negative impact on the 1517 user experience by increasing the amount of time it takes the 1518 system to start and allowing applications to have themselves 1519 running without the user being aware of them. As such, you must 1520 explicitly declare your use of this facility to make that visible 1521 to the user. --> 1522 <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" 1523 android:label="@string/permlab_receiveBootCompleted" 1524 android:description="@string/permdesc_receiveBootCompleted" 1525 android:protectionLevel="normal" /> 1526 1527 <!-- Allows an application to broadcast sticky intents. These are 1528 broadcasts whose data is held by the system after being finished, 1529 so that clients can quickly retrieve that data without having 1530 to wait for the next broadcast. --> 1531 <permission android:name="android.permission.BROADCAST_STICKY" 1532 android:label="@string/permlab_broadcastSticky" 1533 android:description="@string/permdesc_broadcastSticky" 1534 android:protectionLevel="normal" /> 1535 1536 <!-- @SystemApi Allows mounting and unmounting file systems for removable storage. 1537 <p>Not for use by third-party applications.--> 1538 <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS" 1539 android:protectionLevel="system|signature" /> 1540 1541 <!-- @SystemApi Allows formatting file systems for removable storage. 1542 <p>Not for use by third-party applications. --> 1543 <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS" 1544 android:protectionLevel="system|signature" /> 1545 1546 <!-- Allows access to ASEC non-destructive API calls 1547 @hide --> 1548 <permission android:name="android.permission.ASEC_ACCESS" 1549 android:protectionLevel="signature" /> 1550 1551 <!-- Allows creation of ASEC volumes 1552 @hide --> 1553 <permission android:name="android.permission.ASEC_CREATE" 1554 android:protectionLevel="signature" /> 1555 1556 <!-- Allows destruction of ASEC volumes 1557 @hide --> 1558 <permission android:name="android.permission.ASEC_DESTROY" 1559 android:protectionLevel="signature" /> 1560 1561 <!-- Allows mount / unmount of ASEC volumes 1562 @hide --> 1563 <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT" 1564 android:protectionLevel="signature" /> 1565 1566 <!-- Allows rename of ASEC volumes 1567 @hide --> 1568 <permission android:name="android.permission.ASEC_RENAME" 1569 android:protectionLevel="signature" /> 1570 1571 <!-- @SystemApi Allows applications to write the apn settings. 1572 <p>Not for use by third-party applications. --> 1573 <permission android:name="android.permission.WRITE_APN_SETTINGS" 1574 android:protectionLevel="signature|system" /> 1575 1576 <!-- Allows an application to allow access the subscribed feeds ContentProvider. 1577 @hide 1578 @removed 1579 --> 1580 <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ" 1581 android:label="@string/permlab_subscribedFeedsRead" 1582 android:description="@string/permdesc_subscribedFeedsRead" 1583 android:protectionLevel="normal" /> 1584 1585 <!-- 1586 @hide 1587 @removed 1588 --> 1589 <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE" 1590 android:label="@string/permlab_subscribedFeedsWrite" 1591 android:description="@string/permdesc_subscribedFeedsWrite" 1592 android:protectionLevel="dangerous" /> 1593 1594 <!-- Allows applications to change network connectivity state --> 1595 <permission android:name="android.permission.CHANGE_NETWORK_STATE" 1596 android:description="@string/permdesc_changeNetworkState" 1597 android:label="@string/permlab_changeNetworkState" 1598 android:protectionLevel="normal" /> 1599 1600 <!-- Allows an application to clear the caches of all installed 1601 applications on the device. --> 1602 <permission android:name="android.permission.CLEAR_APP_CACHE" 1603 android:protectionLevel="dangerous" /> 1604 1605 <!-- @SystemApi Allows an application to use any media decoder when decoding for playback 1606 @hide --> 1607 <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK" 1608 android:protectionLevel="signature|system" /> 1609 1610 <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on 1611 behalf of the user. 1612 @hide --> 1613 <permission android:name="android.permission.MANAGE_CA_CERTIFICATES" 1614 android:protectionLevel="signature|system" /> 1615 1616 <!-- @SystemApi Allows an application to do certain operations needed for 1617 interacting with the recovery (system update) system. 1618 @hide --> 1619 <permission android:name="android.permission.RECOVERY" 1620 android:protectionLevel="signature|system" /> 1621 1622 <!-- Allows the system to bind to an application's task services 1623 @hide --> 1624 <permission android:name="android.permission.BIND_JOB_SERVICE" 1625 android:protectionLevel="signature" /> 1626 <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/> 1627 1628 <!-- Allows an application to initiate configuration updates 1629 <p>An application requesting this permission is responsible for 1630 verifying the source and integrity of any update before passing 1631 it off to the various individual installer components 1632 @hide --> 1633 <permission android:name="android.permission.UPDATE_CONFIG" 1634 android:protectionLevel="signature|system" /> 1635 1636 <!-- ========================================= --> 1637 <!-- Permissions for special development tools --> 1638 <!-- ========================================= --> 1639 <eat-comment /> 1640 1641 <!-- @SystemApi Allows an application to read or write the secure system settings. 1642 <p>Not for use by third-party applications. --> 1643 <permission android:name="android.permission.WRITE_SECURE_SETTINGS" 1644 android:protectionLevel="signature|system|development" /> 1645 1646 <!-- @SystemApi Allows an application to retrieve state dump information from system services. 1647 <p>Not for use by third-party applications. --> 1648 <permission android:name="android.permission.DUMP" 1649 android:protectionLevel="signature|system|development" /> 1650 1651 <!-- @SystemApi Allows an application to read the low-level system log files. 1652 <p>Not for use by third-party applications, because 1653 Log entries can contain the user's private information. --> 1654 <permission android:name="android.permission.READ_LOGS" 1655 android:protectionLevel="signature|system|development" /> 1656 1657 <!-- @SystemApi Configure an application for debugging. 1658 <p>Not for use by third-party applications. --> 1659 <permission android:name="android.permission.SET_DEBUG_APP" 1660 android:protectionLevel="signature|system|development" /> 1661 1662 <!-- @SystemApi Allows an application to set the maximum number of (not needed) 1663 application processes that can be running. 1664 <p>Not for use by third-party applications. --> 1665 <permission android:name="android.permission.SET_PROCESS_LIMIT" 1666 android:protectionLevel="signature|system|development" /> 1667 1668 <!-- @SystemApi Allows an application to control whether activities are immediately 1669 finished when put in the background. 1670 <p>Not for use by third-party applications. --> 1671 <permission android:name="android.permission.SET_ALWAYS_FINISH" 1672 android:protectionLevel="signature|system|development" /> 1673 1674 <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes. 1675 <p>Not for use by third-party applications. --> 1676 <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES" 1677 android:protectionLevel="signature|system|development" /> 1678 1679 <!-- ==================================== --> 1680 <!-- Private permissions --> 1681 <!-- ==================================== --> 1682 <eat-comment /> 1683 1684 <!-- @SystemApi Allows applications to RW to diagnostic resources. 1685 <p>Not for use by third-party applications. --> 1686 <permission android:name="android.permission.DIAGNOSTIC" 1687 android:protectionLevel="signature" /> 1688 1689 <!-- @SystemApi Allows an application to open, close, or disable the status bar 1690 and its icons. 1691 <p>Not for use by third-party applications. --> 1692 <permission android:name="android.permission.STATUS_BAR" 1693 android:protectionLevel="signature|system" /> 1694 1695 <!-- Allows an application to be the status bar. Currently used only by SystemUI.apk 1696 @hide --> 1697 <permission android:name="android.permission.STATUS_BAR_SERVICE" 1698 android:protectionLevel="signature" /> 1699 1700 <!-- Allows an application to force a BACK operation on whatever is the 1701 top activity. 1702 <p>Not for use by third-party applications. --> 1703 <permission android:name="android.permission.FORCE_BACK" 1704 android:protectionLevel="signature" /> 1705 1706 <!-- @SystemApi Allows an application to update device statistics. 1707 <p>Not for use by third-party applications. --> 1708 <permission android:name="android.permission.UPDATE_DEVICE_STATS" 1709 android:protectionLevel="signature|system" /> 1710 1711 <!-- @SystemApi @hide Allows an application to collect battery statistics --> 1712 <permission android:name="android.permission.GET_APP_OPS_STATS" 1713 android:protectionLevel="signature|system|development" /> 1714 1715 <!-- @SystemApi Allows an application to update application operation statistics. Not for 1716 use by third party apps. @hide --> 1717 <permission android:name="android.permission.UPDATE_APP_OPS_STATS" 1718 android:protectionLevel="signature|system" /> 1719 1720 <!-- Allows an application to open windows that are for use by parts 1721 of the system user interface. 1722 <p>Not for use by third-party applications. --> 1723 <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW" 1724 android:protectionLevel="signature" /> 1725 1726 <!-- Allows an application to manage (create, destroy, 1727 Z-order) application tokens in the window manager. 1728 <p>Not for use by third-party applications. --> 1729 <permission android:name="android.permission.MANAGE_APP_TOKENS" 1730 android:protectionLevel="signature" /> 1731 1732 <!-- @hide Allows the application to temporarily freeze the screen for a 1733 full-screen transition. --> 1734 <permission android:name="android.permission.FREEZE_SCREEN" 1735 android:protectionLevel="signature" /> 1736 1737 <!-- Allows an application to inject user events (keys, touch, trackball) 1738 into the event stream and deliver them to ANY window. Without this 1739 permission, you can only deliver events to windows in your own process. 1740 <p>Not for use by third-party applications. --> 1741 <permission android:name="android.permission.INJECT_EVENTS" 1742 android:protectionLevel="signature" /> 1743 1744 <!-- @hide Allows an application to register an input filter which filters the stream 1745 of user events (keys, touch, trackball) before they are dispatched to any window. --> 1746 <permission android:name="android.permission.FILTER_EVENTS" 1747 android:protectionLevel="signature" /> 1748 1749 <!-- @hide Allows an application to retrieve the window token from the accessibility manager. --> 1750 <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN" 1751 android:protectionLevel="signature" /> 1752 1753 <!-- @hide Allows an application to collect frame statistics --> 1754 <permission android:name="android.permission.FRAME_STATS" 1755 android:protectionLevel="signature" /> 1756 1757 <!-- @hide Allows an application to temporary enable accessibility on the device. --> 1758 <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY" 1759 android:protectionLevel="signature" /> 1760 1761 <!-- Allows an application to watch and control how activities are 1762 started globally in the system. Only for is in debugging 1763 (usually the monkey command). 1764 <p>Not for use by third-party applications. --> 1765 <permission android:name="android.permission.SET_ACTIVITY_WATCHER" 1766 android:protectionLevel="signature" /> 1767 1768 <!-- @SystemApi Allows an application to call the activity manager shutdown() API 1769 to put the higher-level system there into a shutdown state. 1770 @hide --> 1771 <permission android:name="android.permission.SHUTDOWN" 1772 android:protectionLevel="signature|system" /> 1773 1774 <!-- @SystemApi Allows an application to tell the activity manager to temporarily 1775 stop application switches, putting it into a special mode that 1776 prevents applications from immediately switching away from some 1777 critical UI such as the home screen. 1778 @hide --> 1779 <permission android:name="android.permission.STOP_APP_SWITCHES" 1780 android:protectionLevel="signature|system" /> 1781 1782 <!-- Allows an application to retrieve private information about 1783 the current top activity, such as any assist context it can provide. 1784 <p>Not for use by third-party applications. --> 1785 <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO" 1786 android:protectionLevel="signature" /> 1787 1788 <!-- Allows an application to retrieve the current state of keys and 1789 switches. 1790 <p>Not for use by third-party applications. 1791 @deprecated The API that used this permission has been removed. --> 1792 <permission android:name="android.permission.READ_INPUT_STATE" 1793 android:protectionLevel="signature" /> 1794 1795 <!-- Must be required by an {@link android.inputmethodservice.InputMethodService}, 1796 to ensure that only the system can bind to it. --> 1797 <permission android:name="android.permission.BIND_INPUT_METHOD" 1798 android:protectionLevel="signature" /> 1799 1800 <!-- Must be required by an {@link android.media.midi.MidiDeviceService}, 1801 to ensure that only the system can bind to it. --> 1802 <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE" 1803 android:protectionLevel="signature" /> 1804 1805 <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService}, 1806 to ensure that only the system can bind to it. --> 1807 <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE" 1808 android:protectionLevel="signature" /> 1809 1810 <!-- Must be required by a {@link android.printservice.PrintService}, 1811 to ensure that only the system can bind to it. --> 1812 <permission android:name="android.permission.BIND_PRINT_SERVICE" 1813 android:protectionLevel="signature" /> 1814 1815 <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService} 1816 or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only 1817 the system can bind to it. --> 1818 <permission android:name="android.permission.BIND_NFC_SERVICE" 1819 android:protectionLevel="signature" /> 1820 1821 <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it. 1822 @hide --> 1823 <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE" 1824 android:protectionLevel="signature" /> 1825 1826 <!-- Must be required by a TextService (e.g. SpellCheckerService) 1827 to ensure that only the system can bind to it. --> 1828 <permission android:name="android.permission.BIND_TEXT_SERVICE" 1829 android:protectionLevel="signature" /> 1830 1831 <!-- Must be required by a {@link android.net.VpnService}, 1832 to ensure that only the system can bind to it. --> 1833 <permission android:name="android.permission.BIND_VPN_SERVICE" 1834 android:protectionLevel="signature" /> 1835 1836 <!-- Must be required by a {@link android.service.wallpaper.WallpaperService}, 1837 to ensure that only the system can bind to it. --> 1838 <permission android:name="android.permission.BIND_WALLPAPER" 1839 android:protectionLevel="signature|system" /> 1840 1841 <!-- Must be required by a {@link android.service.voice.VoiceInteractionService}, 1842 to ensure that only the system can bind to it. --> 1843 <permission android:name="android.permission.BIND_VOICE_INTERACTION" 1844 android:protectionLevel="signature" /> 1845 1846 <!-- Must be required by hotword enrollment application, 1847 to ensure that only the system can interact with it. 1848 @hide <p>Not for use by third-party applications.</p> --> 1849 <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES" 1850 android:protectionLevel="signature|system" /> 1851 1852 <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider}, 1853 to ensure that only the system can bind to it. 1854 @hide --> 1855 <permission android:name="android.permission.BIND_REMOTE_DISPLAY" 1856 android:protectionLevel="signature" /> 1857 1858 <!-- Must be required by a {@link android.media.tv.TvInputService} 1859 to ensure that only the system can bind to it. --> 1860 <permission android:name="android.permission.BIND_TV_INPUT" 1861 android:protectionLevel="signature|system" /> 1862 1863 <!-- @SystemApi Allows an application to modify parental controls 1864 <p>Not for use by third-party applications. 1865 @hide --> 1866 <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS" 1867 android:protectionLevel="signature|system" /> 1868 1869 <!-- Must be required by a {@link android.media.routing.MediaRouteService} 1870 to ensure that only the system can interact with it. 1871 @hide --> 1872 <permission android:name="android.permission.BIND_ROUTE_PROVIDER" 1873 android:protectionLevel="signature" /> 1874 1875 <!-- Must be required by device administration receiver, to ensure that only the 1876 system can interact with it. --> 1877 <permission android:name="android.permission.BIND_DEVICE_ADMIN" 1878 android:protectionLevel="signature" /> 1879 1880 <!-- @SystemApi Required to add or remove another application as a device admin. 1881 <p>Not for use by third-party applications. 1882 @hide --> 1883 <permission android:name="android.permission.MANAGE_DEVICE_ADMINS" 1884 android:protectionLevel="signature|system" /> 1885 1886 <!-- Allows low-level access to setting the orientation (actually 1887 rotation) of the screen. 1888 <p>Not for use by third-party applications. --> 1889 <permission android:name="android.permission.SET_ORIENTATION" 1890 android:protectionLevel="signature" /> 1891 1892 <!-- Allows low-level access to setting the pointer speed. 1893 <p>Not for use by third-party applications. --> 1894 <permission android:name="android.permission.SET_POINTER_SPEED" 1895 android:protectionLevel="signature" /> 1896 1897 <!-- Allows low-level access to setting input device calibration. 1898 <p>Not for use by normal applications. 1899 @hide --> 1900 <permission android:name="android.permission.SET_INPUT_CALIBRATION" 1901 android:protectionLevel="signature" /> 1902 1903 <!-- Allows low-level access to setting the keyboard layout. 1904 <p>Not for use by third-party applications. 1905 @hide --> 1906 <permission android:name="android.permission.SET_KEYBOARD_LAYOUT" 1907 android:protectionLevel="signature" /> 1908 1909 <!-- Allows an application to request installing packages. Apps 1910 targeting APIs greater than 22 must hold this permission in 1911 order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}.--> 1912 <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES" 1913 android:label="@string/permlab_requestInstallPackages" 1914 android:description="@string/permdesc_requestInstallPackages" 1915 android:protectionLevel="normal" /> 1916 1917 <!-- @SystemApi Allows an application to install packages. 1918 <p>Not for use by third-party applications. --> 1919 <permission android:name="android.permission.INSTALL_PACKAGES" 1920 android:protectionLevel="signature|system" /> 1921 1922 <!-- Allows an application to clear user data. 1923 <p>Not for use by third-party applications. --> 1924 <permission android:name="android.permission.CLEAR_APP_USER_DATA" 1925 android:protectionLevel="signature" /> 1926 1927 <!-- @SystemApi Allows an application to delete cache files. 1928 <p>Not for use by third-party applications. --> 1929 <permission android:name="android.permission.DELETE_CACHE_FILES" 1930 android:protectionLevel="signature|system" /> 1931 1932 <!-- @SystemApi Allows an application to delete packages. 1933 <p>Not for use by third-party applications. --> 1934 <permission android:name="android.permission.DELETE_PACKAGES" 1935 android:protectionLevel="signature|system" /> 1936 1937 <!-- @SystemApi Allows an application to move location of installed package. 1938 @hide --> 1939 <permission android:name="android.permission.MOVE_PACKAGE" 1940 android:protectionLevel="signature|system" /> 1941 1942 <!-- @SystemApi Allows an application to change whether an application component (other than its own) is 1943 enabled or not. 1944 <p>Not for use by third-party applications. --> 1945 <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE" 1946 android:protectionLevel="signature|system" /> 1947 1948 <!-- @hide Allows an application to grant or revoke specific permissions. --> 1949 <permission android:name="android.permission.GRANT_REVOKE_PERMISSIONS" 1950 android:protectionLevel="signature" /> 1951 1952 <!-- @hide Allows an application to observe permission changes. --> 1953 <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS" 1954 android:protectionLevel="signatureOrSystem" /> 1955 1956 <!-- Allows an application to use SurfaceFlinger's low level features. 1957 <p>Not for use by third-party applications. --> 1958 <permission android:name="android.permission.ACCESS_SURFACE_FLINGER" 1959 android:protectionLevel="signature" /> 1960 1961 <!-- @SystemApi Allows an application to take screen shots and more generally 1962 get access to the frame buffer data. 1963 <p>Not for use by third-party applications. --> 1964 <permission android:name="android.permission.READ_FRAME_BUFFER" 1965 android:protectionLevel="signature|system" /> 1966 1967 <!-- Allows an application to use InputFlinger's low level features. 1968 @hide --> 1969 <permission android:name="android.permission.ACCESS_INPUT_FLINGER" 1970 android:protectionLevel="signature" /> 1971 1972 <!-- Allows an application to configure and connect to Wifi displays 1973 @hide --> 1974 <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY" 1975 android:protectionLevel="signature" /> 1976 1977 <!-- Allows an application to control low-level features of Wifi displays 1978 such as opening an RTSP socket. This permission should only be used 1979 by the display manager. 1980 @hide --> 1981 <permission android:name="android.permission.CONTROL_WIFI_DISPLAY" 1982 android:protectionLevel="signature" /> 1983 1984 <!-- @SystemApi Allows an application to control VPN. 1985 <p>Not for use by third-party applications.</p> 1986 @hide --> 1987 <permission android:name="android.permission.CONTROL_VPN" 1988 android:protectionLevel="signature|system" /> 1989 <uses-permission android:name="android.permission.CONTROL_VPN" /> 1990 1991 <!-- @SystemApi Allows an application to capture audio output. 1992 <p>Not for use by third-party applications.</p> --> 1993 <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT" 1994 android:protectionLevel="signature|system" /> 1995 1996 <!-- @SystemApi Allows an application to capture audio for hotword detection. 1997 <p>Not for use by third-party applications.</p> 1998 @hide --> 1999 <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD" 2000 android:protectionLevel="signature|system" /> 2001 2002 <!-- @SystemApi Allows an application to modify audio routing and override policy decisions. 2003 <p>Not for use by third-party applications.</p> 2004 @hide --> 2005 <permission android:name="android.permission.MODIFY_AUDIO_ROUTING" 2006 android:protectionLevel="signature|system" /> 2007 2008 <!-- @SystemApi Allows an application to capture video output. 2009 <p>Not for use by third-party applications.</p> --> 2010 <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT" 2011 android:protectionLevel="signature|system" /> 2012 2013 <!-- @SystemApi Allows an application to capture secure video output. 2014 <p>Not for use by third-party applications.</p> --> 2015 <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT" 2016 android:protectionLevel="signature|system" /> 2017 2018 <!-- @SystemApi Allows an application to know what content is playing and control its playback. 2019 <p>Not for use by third-party applications due to privacy of media consumption</p> --> 2020 <permission android:name="android.permission.MEDIA_CONTENT_CONTROL" 2021 android:protectionLevel="signature|system" /> 2022 2023 <!-- Required to be able to disable the device (very dangerous!). 2024 <p>Not for use by third-party applications.. --> 2025 <permission android:name="android.permission.BRICK" 2026 android:protectionLevel="signature" /> 2027 2028 <!-- @SystemApi Required to be able to reboot the device. 2029 <p>Not for use by third-party applications. --> 2030 <permission android:name="android.permission.REBOOT" 2031 android:protectionLevel="signature|system" /> 2032 2033 <!-- Allows low-level access to power management. 2034 <p>Not for use by third-party applications. --> 2035 <permission android:name="android.permission.DEVICE_POWER" 2036 android:protectionLevel="signature" /> 2037 2038 <!-- Allows access to the PowerManager.userActivity function. 2039 <p>Not for use by third-party applications. @hide @SystemApi --> 2040 <permission android:name="android.permission.USER_ACTIVITY" 2041 android:protectionLevel="signature|system" /> 2042 2043 <!-- @hide Allows low-level access to tun tap driver --> 2044 <permission android:name="android.permission.NET_TUNNELING" 2045 android:protectionLevel="signature" /> 2046 2047 <!-- Run as a manufacturer test application, running as the root user. 2048 Only available when the device is running in manufacturer test mode. 2049 <p>Not for use by third-party applications. --> 2050 <permission android:name="android.permission.FACTORY_TEST" 2051 android:protectionLevel="signature" /> 2052 2053 <!-- Allows an application to broadcast a notification that an application 2054 package has been removed. 2055 <p>Not for use by third-party applications. --> 2056 <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED" 2057 android:protectionLevel="signature" /> 2058 2059 <!-- Allows an application to broadcast an SMS receipt notification. 2060 <p>Not for use by third-party applications. --> 2061 <permission android:name="android.permission.BROADCAST_SMS" 2062 android:protectionLevel="signature" /> 2063 2064 <!-- Allows an application to broadcast a WAP PUSH receipt notification. 2065 <p>Not for use by third-party applications. --> 2066 <permission android:name="android.permission.BROADCAST_WAP_PUSH" 2067 android:protectionLevel="signature" /> 2068 2069 <!-- @SystemApi Allows an application to broadcast privileged networking requests. 2070 <p>Not for use by third-party applications. @hide --> 2071 <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED" 2072 android:protectionLevel="signature|system" /> 2073 2074 <!-- @SystemApi Not for use by third-party applications. --> 2075 <permission android:name="android.permission.MASTER_CLEAR" 2076 android:protectionLevel="signature|system" /> 2077 2078 <!-- @SystemApi Allows an application to call any phone number, including emergency 2079 numbers, without going through the Dialer user interface for the user 2080 to confirm the call being placed. 2081 <p>Not for use by third-party applications. --> 2082 <permission android:name="android.permission.CALL_PRIVILEGED" 2083 android:protectionLevel="signature|system" /> 2084 2085 <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide --> 2086 <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING" 2087 android:protectionLevel="signature|system" /> 2088 2089 <!-- @SystemApi Allows an application to perform SIM Activation @hide --> 2090 <permission android:name="android.permission.PERFORM_SIM_ACTIVATION" 2091 android:protectionLevel="signature|system" /> 2092 2093 <!-- @SystemApi Allows enabling/disabling location update notifications from 2094 the radio. 2095 <p>Not for use by third-party applications. --> 2096 <permission android:name="android.permission.CONTROL_LOCATION_UPDATES" 2097 android:protectionLevel="signature|system" /> 2098 2099 <!-- @SystemApi Allows read/write access to the "properties" table in the checkin 2100 database, to change values that get uploaded. 2101 <p>Not for use by third-party applications. --> 2102 <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES" 2103 android:protectionLevel="signature|system" /> 2104 2105 <!-- @SystemApi Allows an application to collect component usage 2106 statistics 2107 <p>Declaring the permission implies intention to use the API and the user of the 2108 device can grant permission through the Settings application. --> 2109 <permission android:name="android.permission.PACKAGE_USAGE_STATS" 2110 android:protectionLevel="signature|development|appop" /> 2111 <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" /> 2112 2113 <!-- @hide Allows an application to change the app idle state of an app. 2114 <p>Not for use by third-party applications. --> 2115 <permission android:name="android.permission.CHANGE_APP_IDLE_STATE" 2116 android:protectionLevel="signature" /> 2117 2118 <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to 2119 access the network and acquire wakelocks. 2120 <p>Not for use by third-party applications. --> 2121 <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST" 2122 android:protectionLevel="system|signature" /> 2123 2124 <!-- @SystemApi Allows an application to collect battery statistics --> 2125 <permission android:name="android.permission.BATTERY_STATS" 2126 android:protectionLevel="signature|system|development" /> 2127 2128 <!-- @SystemApi Allows an application to control the backup and restore process. 2129 <p>Not for use by third-party applications. 2130 @hide pending API council --> 2131 <permission android:name="android.permission.BACKUP" 2132 android:protectionLevel="signature|system" /> 2133 2134 <!-- Allows a package to launch the secure full-backup confirmation UI. 2135 ONLY the system process may hold this permission. 2136 @hide --> 2137 <permission android:name="android.permission.CONFIRM_FULL_BACKUP" 2138 android:protectionLevel="signature" /> 2139 2140 <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService}, 2141 to ensure that only the system can bind to it. --> 2142 <permission android:name="android.permission.BIND_REMOTEVIEWS" 2143 android:protectionLevel="signature|system" /> 2144 2145 <!-- @SystemApi Allows an application to tell the AppWidget service which application 2146 can access AppWidget's data. The normal user flow is that a user 2147 picks an AppWidget to go into a particular host, thereby giving that 2148 host application access to the private data from the AppWidget app. 2149 An application that has this permission should honor that contract. 2150 <p>Not for use by third-party applications. --> 2151 <permission android:name="android.permission.BIND_APPWIDGET" 2152 android:protectionLevel="signature|system" /> 2153 2154 <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new 2155 keyguard widget 2156 @hide --> 2157 <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET" 2158 android:protectionLevel="signature|system" /> 2159 2160 <!-- @SystemApi Internal permission allowing an application to query/set which 2161 applications can bind AppWidgets. 2162 @hide --> 2163 <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS" 2164 android:protectionLevel="signature|system" /> 2165 2166 <!-- Allows applications to change the background data setting. 2167 <p>Not for use by third-party applications. 2168 @hide pending API council --> 2169 <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING" 2170 android:protectionLevel="signature" /> 2171 2172 <!-- @SystemApi This permission can be used on content providers to allow the global 2173 search system to access their data. Typically it used when the 2174 provider has some permissions protecting it (which global search 2175 would not be expected to hold), and added as a read-only permission 2176 to the path in the provider where global search queries are 2177 performed. This permission can not be held by regular applications; 2178 it is used by applications to protect themselves from everyone else 2179 besides global search. --> 2180 <permission android:name="android.permission.GLOBAL_SEARCH" 2181 android:protectionLevel="signature|system" /> 2182 2183 <!-- Internal permission protecting access to the global search 2184 system: ensures that only the system can access the provider 2185 to perform queries (since this otherwise provides unrestricted 2186 access to a variety of content providers), and to write the 2187 search statistics (to keep applications from gaming the source 2188 ranking). 2189 @hide --> 2190 <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL" 2191 android:protectionLevel="signature" /> 2192 2193 <!-- @SystemApi Internal permission to allows an application to read indexable data. 2194 @hide --> 2195 <permission android:name="android.permission.READ_SEARCH_INDEXABLES" 2196 android:protectionLevel="signature|system" /> 2197 2198 <!-- @SystemApi Allows applications to set a live wallpaper. 2199 @hide XXX Change to signature once the picker is moved to its 2200 own apk as Ghod Intended. --> 2201 <permission android:name="android.permission.SET_WALLPAPER_COMPONENT" 2202 android:protectionLevel="signature|system" /> 2203 2204 <!-- @SystemApi Allows applications to read dream settings and dream state. 2205 @hide --> 2206 <permission android:name="android.permission.READ_DREAM_STATE" 2207 android:protectionLevel="signature|system" /> 2208 2209 <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming. 2210 @hide --> 2211 <permission android:name="android.permission.WRITE_DREAM_STATE" 2212 android:protectionLevel="signature|system" /> 2213 2214 <!-- @SystemApi Allow an application to read and write the cache partition. 2215 @hide --> 2216 <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM" 2217 android:protectionLevel="signature|system" /> 2218 2219 <!-- Must be required by default container service so that only 2220 the system can bind to it and use it to copy 2221 protected data to secure containers or files 2222 accessible to the system. 2223 @hide --> 2224 <permission android:name="android.permission.COPY_PROTECTED_DATA" 2225 android:protectionLevel="signature" /> 2226 2227 <!-- @SystemApi Internal permission protecting access to the encryption methods 2228 @hide 2229 --> 2230 <permission android:name="android.permission.CRYPT_KEEPER" 2231 android:protectionLevel="signature|system" /> 2232 2233 <!-- @SystemApi Allows an application to read historical network usage for 2234 specific networks and applications. @hide --> 2235 <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY" 2236 android:protectionLevel="signature|system" /> 2237 2238 <!-- Allows an application to manage network policies (such as warning and disable 2239 limits) and to define application-specific rules. @hide --> 2240 <permission android:name="android.permission.MANAGE_NETWORK_POLICY" 2241 android:protectionLevel="signature" /> 2242 2243 <!-- @SystemApi Allows an application to account its network traffic against other UIDs. Used 2244 by system services like download manager and media server. Not for use by 2245 third party apps. @hide --> 2246 <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING" 2247 android:protectionLevel="signature|system" /> 2248 2249 <!-- C2DM permission. 2250 @hide Used internally. 2251 --> 2252 <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE" 2253 android:protectionLevel="signature" /> 2254 <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/> 2255 2256 <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will 2257 trust it to verify packages. 2258 --> 2259 <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT" 2260 android:protectionLevel="signature|system" /> 2261 2262 <!-- Must be required by package verifier receiver, to ensure that only the 2263 system can interact with it. 2264 @hide 2265 --> 2266 <permission android:name="android.permission.BIND_PACKAGE_VERIFIER" 2267 android:protectionLevel="signature" /> 2268 2269 <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the 2270 PackageManager will trust it to verify intent filters. 2271 --> 2272 <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT" 2273 android:protectionLevel="signature|system" /> 2274 2275 <!-- Must be required by intent filter verifier receiver, to ensure that only the 2276 system can interact with it. 2277 @hide 2278 --> 2279 <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER" 2280 android:protectionLevel="signature" /> 2281 2282 <!-- @SystemApi Allows applications to access serial ports via the SerialManager. 2283 @hide --> 2284 <permission android:name="android.permission.SERIAL_PORT" 2285 android:protectionLevel="signature|system" /> 2286 2287 <!-- Allows the holder to access content providers from outside an ApplicationThread. 2288 This permission is enforced by the ActivityManagerService on the corresponding APIs, 2289 in particular ActivityManagerService#getContentProviderExternal(String) and 2290 ActivityManagerService#removeContentProviderExternal(String). 2291 @hide 2292 --> 2293 <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY" 2294 android:protectionLevel="signature" /> 2295 2296 <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless 2297 OTA reboot *not* occur while the lock is held. 2298 @hide --> 2299 <permission android:name="android.permission.UPDATE_LOCK" 2300 android:protectionLevel="signatureOrSystem" /> 2301 2302 <!-- @SystemApi Allows an application to read the current set of notifications, including 2303 any metadata and intents attached. 2304 @hide --> 2305 <permission android:name="android.permission.ACCESS_NOTIFICATIONS" 2306 android:protectionLevel="signature|system" /> 2307 2308 <!-- Marker permission for applications that wish to access notification policy. --> 2309 <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY" 2310 android:description="@string/permdesc_access_notification_policy" 2311 android:label="@string/permlab_access_notification_policy" 2312 android:protectionLevel="normal" /> 2313 2314 <!-- Allows access to keyguard secure storage. Only allowed for system processes. 2315 @hide --> 2316 <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE" 2317 android:protectionLevel="signature" /> 2318 2319 <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide --> 2320 <permission android:name="android.permission.MANAGE_FINGERPRINT" 2321 android:protectionLevel="signature" /> 2322 2323 <!-- Allows an application to control keyguard. Only allowed for system processes. 2324 @hide --> 2325 <permission android:name="android.permission.CONTROL_KEYGUARD" 2326 android:protectionLevel="signature" /> 2327 2328 <!-- Allows an application to listen to trust changes. Only allowed for system processes. 2329 @hide --> 2330 <permission android:name="android.permission.TRUST_LISTENER" 2331 android:protectionLevel="signature" /> 2332 2333 <!-- @SystemApi Allows an application to provide a trust agent. 2334 @hide For security reasons, this is a platform-only permission. --> 2335 <permission android:name="android.permission.PROVIDE_TRUST_AGENT" 2336 android:protectionLevel="signatureOrSystem" /> 2337 2338 <!-- Allows an application to launch the trust agent settings activity. 2339 @hide --> 2340 <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS" 2341 android:protectionLevel="signatureOrSystem" /> 2342 2343 <!-- @SystemApi Must be required by an {@link 2344 android.service.trust.TrustAgentService}, 2345 to ensure that only the system can bind to it. 2346 @hide --> 2347 <permission android:name="android.permission.BIND_TRUST_AGENT" 2348 android:protectionLevel="signature" /> 2349 2350 <!-- Must be required by an {@link 2351 android.service.notification.NotificationListenerService}, 2352 to ensure that only the system can bind to it. --> 2353 <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE" 2354 android:protectionLevel="signature" /> 2355 2356 <!-- Must be required by a {@link 2357 android.service.chooser.ChooserTargetService}, to ensure that 2358 only the system can bind to it. --> 2359 <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE" 2360 android:protectionLevel="signature" /> 2361 2362 <!-- @SystemApi Must be required by a {@link 2363 android.service.notification.ConditionProviderService}, 2364 to ensure that only the system can bind to it. 2365 @hide --> 2366 <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE" 2367 android:protectionLevel="signature" /> 2368 2369 <!-- Must be required by an {@link android.service.dreams.DreamService}, 2370 to ensure that only the system can bind to it. --> 2371 <permission android:name="android.permission.BIND_DREAM_SERVICE" 2372 android:protectionLevel="signature" /> 2373 2374 <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the 2375 carrier setup application to enforce that this permission is required 2376 @hide This is not a third-party API (intended for OEMs and system apps). --> 2377 <permission android:name="android.permission.INVOKE_CARRIER_SETUP" 2378 android:protectionLevel="signature|system" /> 2379 2380 <!-- @SystemApi Allows an application to listen for network condition observations. 2381 @hide This is not a third-party API (intended for system apps). --> 2382 <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS" 2383 android:protectionLevel="signature|system" /> 2384 2385 <!-- @SystemApi Allows an application to provision and access DRM certificates 2386 @hide This is not a third-party API (intended for system apps). --> 2387 <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES" 2388 android:protectionLevel="signature|system" /> 2389 2390 <!-- Api Allows an application to manage media projection sessions. 2391 @hide This is not a third-party API (intended for system apps). --> 2392 <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION" 2393 android:protectionLevel="signature" /> 2394 2395 <!-- @SystemApi Allows an application to read install sessions 2396 @hide This is not a third-party API (intended for system apps). --> 2397 <permission android:name="android.permission.READ_INSTALL_SESSIONS" 2398 android:label="@string/permlab_readInstallSessions" 2399 android:description="@string/permdesc_readInstallSessions" 2400 android:protectionLevel="normal"/> 2401 2402 <!-- @SystemApi Allows an application to remove DRM certificates 2403 @hide This is not a third-party API (intended for system apps). --> 2404 <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES" 2405 android:protectionLevel="signature|system" /> 2406 2407 <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead --> 2408 <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE" 2409 android:protectionLevel="signature|system" /> 2410 2411 <!-- Allows an application to interact with the currently active 2412 {@link android.service.voice.VoiceInteractionService}. 2413 @hide --> 2414 <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE" 2415 android:protectionLevel="signature" /> 2416 2417 <!-- Allows an app that has this permission and a permissions to install packages 2418 to request all runtime permissions to be granted at installation. 2419 @hide --> 2420 <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS" 2421 android:protectionLevel="signature" /> 2422 2423 <!-- Allows receiving status updates from a device initializer. 2424 @hide Not for use by third-party applications. --> 2425 <permission android:name="android.permission.RECEIVE_DEVICE_INITIALIZER_STATUS" 2426 android:protectionLevel="signature" /> 2427 2428 <!-- The system process that is allowed to bind to services in carrier apps will 2429 have this permission. Carrier apps should use this permission to protect 2430 their services that only the system is allowed to bind to. --> 2431 <permission android:name="android.permission.BIND_CARRIER_SERVICES" 2432 android:label="@string/permlab_bindCarrierServices" 2433 android:description="@string/permdesc_bindCarrierServices" 2434 android:protectionLevel="signature|system" /> 2435 2436 <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT 2437 flag is set. 2438 @hide --> 2439 <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT" 2440 android:protectionLevel="signature" /> 2441 2442 <!-- @SystemApi Allows applications to kill UIDs. 2443 <p>Not for use by third-party applications. 2444 @hide --> 2445 <permission android:name="android.permission.KILL_UID" 2446 android:protectionLevel="signature" /> 2447 2448 <!-- Allows applications to act as network scorers. @hide @SystemApi--> 2449 <permission android:name="android.permission.LOCAL_MAC_ADDRESS" 2450 android:protectionLevel="signatureOrSystem" /> 2451 2452 <!-- The system process is explicitly the only one allowed to launch the 2453 confirmation UI for full backup/restore --> 2454 <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/> 2455 2456 <application android:process="system" 2457 android:persistent="true" 2458 android:hasCode="false" 2459 android:label="@string/android_system_label" 2460 android:allowClearUserData="false" 2461 android:backupAgent="com.android.server.backup.SystemBackupAgent" 2462 android:killAfterRestore="false" 2463 android:icon="@drawable/ic_launcher_android" 2464 android:supportsRtl="true" 2465 android:theme="@style/Theme.Material.DayNight.DarkActionBar"> 2466 <activity android:name="com.android.internal.app.ChooserActivity" 2467 android:theme="@style/Theme.DeviceDefault.Resolver" 2468 android:finishOnCloseSystemDialogs="true" 2469 android:excludeFromRecents="true" 2470 android:documentLaunchMode="never" 2471 android:relinquishTaskIdentity="true" 2472 android:process=":ui"> 2473 <intent-filter> 2474 <action android:name="android.intent.action.CHOOSER" /> 2475 <category android:name="android.intent.category.DEFAULT" /> 2476 </intent-filter> 2477 </activity> 2478 <activity android:name="com.android.internal.app.IntentForwarderActivity" 2479 android:finishOnCloseSystemDialogs="true" 2480 android:theme="@style/Theme.NoDisplay" 2481 android:excludeFromRecents="true" 2482 android:label="@string/user_owner_label" 2483 android:exported="true" 2484 > 2485 </activity> 2486 <activity-alias android:name="com.android.internal.app.ForwardIntentToUserOwner" 2487 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 2488 android:exported="true" 2489 android:label="@string/user_owner_label"> 2490 </activity-alias> 2491 <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile" 2492 android:targetActivity="com.android.internal.app.IntentForwarderActivity" 2493 android:icon="@drawable/ic_corp_icon" 2494 android:exported="true" 2495 android:label="@string/managed_profile_label"> 2496 </activity-alias> 2497 <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity" 2498 android:theme="@style/Theme.Material.DayNight.Dialog" 2499 android:label="@string/heavy_weight_switcher_title" 2500 android:finishOnCloseSystemDialogs="true" 2501 android:excludeFromRecents="true" 2502 android:process=":ui"> 2503 </activity> 2504 <activity android:name="com.android.internal.app.PlatLogoActivity" 2505 android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen" 2506 android:configChanges="orientation|keyboardHidden" 2507 android:process=":ui"> 2508 </activity> 2509 <activity android:name="com.android.internal.app.DisableCarModeActivity" 2510 android:theme="@style/Theme.NoDisplay" 2511 android:excludeFromRecents="true" 2512 android:process=":ui"> 2513 </activity> 2514 <activity android:name="com.android.internal.app.DumpHeapActivity" 2515 android:theme="@style/Theme.Translucent.NoTitleBar" 2516 android:label="@string/dump_heap_title" 2517 android:finishOnCloseSystemDialogs="true" 2518 android:noHistory="true" 2519 android:excludeFromRecents="true" 2520 android:process=":ui"> 2521 </activity> 2522 <provider android:name="com.android.server.am.DumpHeapProvider" 2523 android:authorities="com.android.server.heapdump" 2524 android:grantUriPermissions="true" 2525 android:multiprocess="false" 2526 android:singleUser="true" /> 2527 2528 <activity android:name="android.accounts.ChooseAccountActivity" 2529 android:excludeFromRecents="true" 2530 android:exported="true" 2531 android:theme="@style/Theme.Material.DayNight.Dialog" 2532 android:label="@string/choose_account_label" 2533 android:process=":ui"> 2534 </activity> 2535 2536 <activity android:name="android.accounts.ChooseTypeAndAccountActivity" 2537 android:excludeFromRecents="true" 2538 android:exported="true" 2539 android:theme="@style/Theme.Material.DayNight.Dialog" 2540 android:label="@string/choose_account_label" 2541 android:process=":ui"> 2542 </activity> 2543 2544 <activity android:name="android.accounts.ChooseAccountTypeActivity" 2545 android:excludeFromRecents="true" 2546 android:theme="@style/Theme.Material.DayNight.Dialog" 2547 android:label="@string/choose_account_label" 2548 android:process=":ui"> 2549 </activity> 2550 2551 <activity android:name="android.accounts.CantAddAccountActivity" 2552 android:excludeFromRecents="true" 2553 android:exported="true" 2554 android:theme="@style/Theme.Material.DayNight.Dialog.NoActionBar" 2555 android:process=":ui"> 2556 </activity> 2557 2558 <activity android:name="android.accounts.GrantCredentialsPermissionActivity" 2559 android:excludeFromRecents="true" 2560 android:exported="true" 2561 android:theme="@style/Theme.Material.DayNight.DialogWhenLarge" 2562 android:process=":ui"> 2563 </activity> 2564 2565 <activity android:name="android.content.SyncActivityTooManyDeletes" 2566 android:theme="@style/Theme.Material.DayNight.Dialog" 2567 android:label="@string/sync_too_many_deletes" 2568 android:process=":ui"> 2569 </activity> 2570 2571 <activity android:name="com.android.internal.app.ShutdownActivity" 2572 android:permission="android.permission.SHUTDOWN" 2573 android:theme="@style/Theme.NoDisplay" 2574 android:excludeFromRecents="true"> 2575 <intent-filter> 2576 <action android:name="android.intent.action.ACTION_REQUEST_SHUTDOWN" /> 2577 <category android:name="android.intent.category.DEFAULT" /> 2578 </intent-filter> 2579 <intent-filter> 2580 <action android:name="android.intent.action.REBOOT" /> 2581 <category android:name="android.intent.category.DEFAULT" /> 2582 </intent-filter> 2583 </activity> 2584 2585 <activity android:name="com.android.internal.app.NetInitiatedActivity" 2586 android:theme="@style/Theme.Material.DayNight.Dialog.Alert" 2587 android:excludeFromRecents="true" 2588 android:process=":ui"> 2589 </activity> 2590 2591 <receiver android:name="com.android.server.BootReceiver" 2592 android:primaryUserOnly="true"> 2593 <intent-filter android:priority="1000"> 2594 <action android:name="android.intent.action.BOOT_COMPLETED" /> 2595 </intent-filter> 2596 </receiver> 2597 2598 <receiver android:name="com.android.server.updates.CertPinInstallReceiver" 2599 android:permission="android.permission.UPDATE_CONFIG"> 2600 <intent-filter> 2601 <action android:name="android.intent.action.UPDATE_PINS" /> 2602 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2603 </intent-filter> 2604 </receiver> 2605 2606 <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver" 2607 android:permission="android.permission.UPDATE_CONFIG"> 2608 <intent-filter> 2609 <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" /> 2610 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2611 </intent-filter> 2612 </receiver> 2613 2614 <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver" 2615 android:permission="android.permission.UPDATE_CONFIG"> 2616 <intent-filter> 2617 <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" /> 2618 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2619 </intent-filter> 2620 </receiver> 2621 2622 <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver" 2623 android:permission="android.permission.UPDATE_CONFIG"> 2624 <intent-filter> 2625 <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" /> 2626 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2627 </intent-filter> 2628 </receiver> 2629 2630 <receiver android:name="com.android.server.updates.TzDataInstallReceiver" 2631 android:permission="android.permission.UPDATE_CONFIG"> 2632 <intent-filter> 2633 <action android:name="android.intent.action.UPDATE_TZDATA" /> 2634 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2635 </intent-filter> 2636 </receiver> 2637 2638 <receiver android:name="com.android.server.updates.SELinuxPolicyInstallReceiver" 2639 android:permission="android.permission.UPDATE_CONFIG"> 2640 <intent-filter> 2641 <action android:name="android.intent.action.UPDATE_SEPOLICY" /> 2642 <data android:scheme="content" android:host="*" android:mimeType="*/*" /> 2643 </intent-filter> 2644 </receiver> 2645 2646 <receiver android:name="com.android.server.MasterClearReceiver" 2647 android:permission="android.permission.MASTER_CLEAR"> 2648 <intent-filter 2649 android:priority="100" > 2650 <!-- For Checkin, Settings, etc.: action=MASTER_CLEAR --> 2651 <action android:name="android.intent.action.MASTER_CLEAR" /> 2652 2653 <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR --> 2654 <action android:name="com.google.android.c2dm.intent.RECEIVE" /> 2655 <category android:name="android.intent.category.MASTER_CLEAR" /> 2656 </intent-filter> 2657 </receiver> 2658 2659 <service android:name="com.android.internal.os.storage.ExternalStorageFormatter" 2660 android:permission="android.permission.MASTER_CLEAR" 2661 android:exported="true" /> 2662 2663 <service android:name="android.hardware.location.GeofenceHardwareService" 2664 android:permission="android.permission.LOCATION_HARDWARE" 2665 android:exported="false" /> 2666 2667 <service android:name="com.android.internal.backup.LocalTransportService" 2668 android:permission="android.permission.CONFIRM_FULL_BACKUP" 2669 android:exported="false"> 2670 <intent-filter> 2671 <action android:name="android.backup.TRANSPORT_HOST" /> 2672 </intent-filter> 2673 </service> 2674 2675 <service android:name="com.android.server.MountServiceIdler" 2676 android:exported="true" 2677 android:permission="android.permission.BIND_JOB_SERVICE" > 2678 </service> 2679 2680 <service android:name="com.android.server.backup.FullBackupJob" 2681 android:exported="true" 2682 android:permission="android.permission.BIND_JOB_SERVICE" > 2683 </service> 2684 2685 <service android:name="com.android.server.backup.KeyValueBackupJob" 2686 android:permission="android.permission.BIND_JOB_SERVICE" > 2687 </service> 2688 2689 <service 2690 android:name="com.android.server.pm.BackgroundDexOptService" 2691 android:exported="true" 2692 android:permission="android.permission.BIND_JOB_SERVICE"> 2693 </service> 2694 2695 </application> 2696 2697</manifest> 2698