1<?xml version="1.0" encoding="utf-8"?>
2<!--
3/* //device/apps/common/AndroidManifest.xml
4**
5** Copyright 2006, The Android Open Source Project
6**
7** Licensed under the Apache License, Version 2.0 (the "License");
8** you may not use this file except in compliance with the License.
9** You may obtain a copy of the License at
10**
11**     http://www.apache.org/licenses/LICENSE-2.0
12**
13** Unless required by applicable law or agreed to in writing, software
14** distributed under the License is distributed on an "AS IS" BASIS,
15** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16** See the License for the specific language governing permissions and
17** limitations under the License.
18*/
19-->
20<manifest xmlns:android="http://schemas.android.com/apk/res/android"
21    package="android" coreApp="true" android:sharedUserId="android.uid.system"
22    android:sharedUserLabel="@string/android_system_label">
23
24    <!-- ================================================ -->
25    <!-- Special broadcasts that only the system can send -->
26    <!-- ================================================ -->
27    <eat-comment />
28
29    <protected-broadcast android:name="android.intent.action.SCREEN_OFF" />
30    <protected-broadcast android:name="android.intent.action.SCREEN_ON" />
31    <protected-broadcast android:name="android.intent.action.USER_PRESENT" />
32    <protected-broadcast android:name="android.intent.action.TIME_SET" />
33    <protected-broadcast android:name="android.intent.action.TIME_TICK" />
34    <protected-broadcast android:name="android.intent.action.TIMEZONE_CHANGED" />
35    <protected-broadcast android:name="android.intent.action.DATE_CHANGED" />
36    <protected-broadcast android:name="android.intent.action.PRE_BOOT_COMPLETED" />
37    <protected-broadcast android:name="android.intent.action.BOOT_COMPLETED" />
38    <protected-broadcast android:name="android.intent.action.PACKAGE_INSTALL" />
39    <protected-broadcast android:name="android.intent.action.PACKAGE_ADDED" />
40    <protected-broadcast android:name="android.intent.action.PACKAGE_REPLACED" />
41    <protected-broadcast android:name="android.intent.action.MY_PACKAGE_REPLACED" />
42    <protected-broadcast android:name="android.intent.action.PACKAGE_REMOVED" />
43    <protected-broadcast android:name="android.intent.action.PACKAGE_FULLY_REMOVED" />
44    <protected-broadcast android:name="android.intent.action.PACKAGE_CHANGED" />
45    <protected-broadcast android:name="android.intent.action.PACKAGE_RESTARTED" />
46    <protected-broadcast android:name="android.intent.action.PACKAGE_DATA_CLEARED" />
47    <protected-broadcast android:name="android.intent.action.PACKAGE_FIRST_LAUNCH" />
48    <protected-broadcast android:name="android.intent.action.PACKAGE_NEEDS_VERIFICATION" />
49    <protected-broadcast android:name="android.intent.action.PACKAGE_VERIFIED" />
50    <protected-broadcast android:name="android.intent.action.PACKAGES_SUSPENDED" />
51    <protected-broadcast android:name="android.intent.action.PACKAGES_UNSUSPENDED" />
52    <protected-broadcast android:name="android.intent.action.ACTION_PREFERRED_ACTIVITY_CHANGED" />
53    <protected-broadcast android:name="android.intent.action.UID_REMOVED" />
54    <protected-broadcast android:name="android.intent.action.QUERY_PACKAGE_RESTART" />
55    <protected-broadcast android:name="android.intent.action.CONFIGURATION_CHANGED" />
56    <protected-broadcast android:name="android.intent.action.LOCALE_CHANGED" />
57    <protected-broadcast android:name="android.intent.action.BATTERY_CHANGED" />
58    <protected-broadcast android:name="android.intent.action.BATTERY_LOW" />
59    <protected-broadcast android:name="android.intent.action.BATTERY_OKAY" />
60    <protected-broadcast android:name="android.intent.action.ACTION_POWER_CONNECTED" />
61    <protected-broadcast android:name="android.intent.action.ACTION_POWER_DISCONNECTED" />
62    <protected-broadcast android:name="android.intent.action.ACTION_SHUTDOWN" />
63    <protected-broadcast android:name="android.intent.action.CHARGING" />
64    <protected-broadcast android:name="android.intent.action.DISCHARGING" />
65    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_LOW" />
66    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_OK" />
67    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_FULL" />
68    <protected-broadcast android:name="android.intent.action.DEVICE_STORAGE_NOT_FULL" />
69    <protected-broadcast android:name="android.intent.action.NEW_OUTGOING_CALL" />
70    <protected-broadcast android:name="android.intent.action.REBOOT" />
71    <protected-broadcast android:name="android.intent.action.DOCK_EVENT" />
72    <protected-broadcast android:name="android.intent.action.THERMAL_EVENT" />
73    <protected-broadcast android:name="android.intent.action.MASTER_CLEAR_NOTIFICATION" />
74    <protected-broadcast android:name="android.intent.action.USER_ADDED" />
75    <protected-broadcast android:name="android.intent.action.USER_REMOVED" />
76    <protected-broadcast android:name="android.intent.action.USER_STARTING" />
77    <protected-broadcast android:name="android.intent.action.USER_STARTED" />
78    <protected-broadcast android:name="android.intent.action.USER_STOPPING" />
79    <protected-broadcast android:name="android.intent.action.USER_STOPPED" />
80    <protected-broadcast android:name="android.intent.action.USER_BACKGROUND" />
81    <protected-broadcast android:name="android.intent.action.USER_FOREGROUND" />
82    <protected-broadcast android:name="android.intent.action.USER_SWITCHED" />
83    <protected-broadcast android:name="android.intent.action.USER_INITIALIZE" />
84    <protected-broadcast android:name="android.intent.action.INTENT_FILTER_NEEDS_VERIFICATION" />
85    <protected-broadcast android:name="android.intent.action.OVERLAY_ADDED" />
86    <protected-broadcast android:name="android.intent.action.OVERLAY_CHANGED" />
87    <protected-broadcast android:name="android.intent.action.OVERLAY_REMOVED" />
88    <protected-broadcast android:name="android.intent.action.OVERLAY_PRIORITY_CHANGED" />
89
90    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED" />
91    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGING" />
92    <protected-broadcast android:name="android.os.action.DEVICE_IDLE_MODE_CHANGED" />
93    <protected-broadcast android:name="android.os.action.POWER_SAVE_WHITELIST_CHANGED" />
94    <protected-broadcast android:name="android.os.action.POWER_SAVE_TEMP_WHITELIST_CHANGED" />
95    <protected-broadcast android:name="android.os.action.POWER_SAVE_MODE_CHANGED_INTERNAL" />
96
97    <!-- @deprecated This is rarely used and will be phased out soon. -->
98    <protected-broadcast android:name="android.os.action.SCREEN_BRIGHTNESS_BOOST_CHANGED" />
99
100    <protected-broadcast android:name="android.app.action.ENTER_CAR_MODE" />
101    <protected-broadcast android:name="android.app.action.EXIT_CAR_MODE" />
102    <protected-broadcast android:name="android.app.action.ENTER_DESK_MODE" />
103    <protected-broadcast android:name="android.app.action.EXIT_DESK_MODE" />
104    <protected-broadcast android:name="android.app.action.NEXT_ALARM_CLOCK_CHANGED" />
105
106    <protected-broadcast android:name="android.app.action.BUGREPORT_SHARING_DECLINED" />
107    <protected-broadcast android:name="android.app.action.BUGREPORT_FAILED" />
108    <protected-broadcast android:name="android.app.action.BUGREPORT_SHARE" />
109    <protected-broadcast android:name="android.app.action.SHOW_DEVICE_MONITORING_DIALOG" />
110
111    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_UPDATE_OPTIONS" />
112    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DELETED" />
113    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_DISABLED" />
114    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_ENABLED" />
115    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_HOST_RESTORED" />
116    <protected-broadcast android:name="android.appwidget.action.APPWIDGET_RESTORED" />
117
118    <protected-broadcast android:name="android.os.action.SETTING_RESTORED" />
119
120    <protected-broadcast android:name="android.app.backup.intent.RUN" />
121    <protected-broadcast android:name="android.app.backup.intent.CLEAR" />
122    <protected-broadcast android:name="android.app.backup.intent.INIT" />
123
124    <protected-broadcast android:name="android.bluetooth.intent.DISCOVERABLE_TIMEOUT" />
125    <protected-broadcast android:name="android.bluetooth.adapter.action.STATE_CHANGED" />
126    <protected-broadcast android:name="android.bluetooth.adapter.action.SCAN_MODE_CHANGED" />
127    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_STARTED" />
128    <protected-broadcast android:name="android.bluetooth.adapter.action.DISCOVERY_FINISHED" />
129    <protected-broadcast android:name="android.bluetooth.adapter.action.LOCAL_NAME_CHANGED" />
130    <protected-broadcast android:name="android.bluetooth.adapter.action.BLUETOOTH_ADDRESS_CHANGED" />
131    <protected-broadcast android:name="android.bluetooth.adapter.action.CONNECTION_STATE_CHANGED" />
132    <protected-broadcast android:name="android.bluetooth.device.action.UUID" />
133    <protected-broadcast android:name="android.bluetooth.device.action.MAS_INSTANCE" />
134    <protected-broadcast android:name="android.bluetooth.device.action.ALIAS_CHANGED" />
135    <protected-broadcast android:name="android.bluetooth.device.action.FOUND" />
136    <protected-broadcast android:name="android.bluetooth.device.action.DISAPPEARED" />
137    <protected-broadcast android:name="android.bluetooth.device.action.CLASS_CHANGED" />
138    <protected-broadcast android:name="android.bluetooth.device.action.ACL_CONNECTED" />
139    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECT_REQUESTED" />
140    <protected-broadcast android:name="android.bluetooth.device.action.ACL_DISCONNECTED" />
141    <protected-broadcast android:name="android.bluetooth.device.action.NAME_CHANGED" />
142    <protected-broadcast android:name="android.bluetooth.device.action.BOND_STATE_CHANGED" />
143    <protected-broadcast android:name="android.bluetooth.device.action.NAME_FAILED" />
144    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_REQUEST" />
145    <protected-broadcast android:name="android.bluetooth.device.action.PAIRING_CANCEL" />
146    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REPLY" />
147    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_CANCEL" />
148    <protected-broadcast android:name="android.bluetooth.device.action.CONNECTION_ACCESS_REQUEST" />
149    <protected-broadcast android:name="android.bluetooth.device.action.SDP_RECORD" />
150    <protected-broadcast android:name="android.bluetooth.device.action.BATTERY_LEVEL_CHANGED" />
151    <protected-broadcast android:name="android.bluetooth.devicepicker.action.LAUNCH" />
152    <protected-broadcast android:name="android.bluetooth.devicepicker.action.DEVICE_SELECTED" />
153    <protected-broadcast
154        android:name="android.bluetooth.headset.profile.action.CONNECTION_STATE_CHANGED" />
155    <protected-broadcast
156        android:name="android.bluetooth.headset.profile.action.AUDIO_STATE_CHANGED" />
157    <protected-broadcast
158        android:name="android.bluetooth.headset.action.VENDOR_SPECIFIC_HEADSET_EVENT" />
159    <protected-broadcast
160        android:name="android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED" />
161    <protected-broadcast
162        android:name="android.bluetooth.headsetclient.profile.action.CONNECTION_STATE_CHANGED" />
163    <protected-broadcast
164        android:name="android.bluetooth.headsetclient.profile.action.AUDIO_STATE_CHANGED" />
165    <protected-broadcast
166        android:name="android.bluetooth.headsetclient.profile.action.AG_EVENT" />
167    <protected-broadcast
168        android:name="android.bluetooth.headsetclient.profile.action.AG_CALL_CHANGED" />
169    <protected-broadcast
170        android:name="android.bluetooth.headsetclient.profile.action.RESULT" />
171    <protected-broadcast
172        android:name="android.bluetooth.headsetclient.profile.action.LAST_VTAG" />
173    <protected-broadcast
174        android:name="android.bluetooth.a2dp.profile.action.CONNECTION_STATE_CHANGED" />
175    <protected-broadcast
176        android:name="android.bluetooth.a2dp.profile.action.PLAYING_STATE_CHANGED" />
177    <protected-broadcast
178        android:name="android.bluetooth.a2dp.profile.action.CODEC_CONFIG_CHANGED" />
179    <protected-broadcast
180        android:name="android.bluetooth.a2dp-sink.profile.action.CONNECTION_STATE_CHANGED" />
181    <protected-broadcast
182        android:name="android.bluetooth.a2dp-sink.profile.action.PLAYING_STATE_CHANGED" />
183    <protected-broadcast
184        android:name="android.bluetooth.a2dp-sink.profile.action.AUDIO_CONFIG_CHANGED" />
185    <protected-broadcast
186        android:name="android.bluetooth.avrcp-controller.profile.action.CONNECTION_STATE_CHANGED" />
187    <protected-broadcast
188        android:name="android.bluetooth.input.profile.action.CONNECTION_STATE_CHANGED" />
189    <protected-broadcast
190        android:name="android.bluetooth.input.profile.action.PROTOCOL_MODE_CHANGED" />
191    <protected-broadcast
192        android:name="android.bluetooth.input.profile.action.VIRTUAL_UNPLUG_STATUS" />
193    <protected-broadcast
194        android:name="android.bluetooth.inputhost.profile.action.CONNECTION_STATE_CHANGED" />
195    <protected-broadcast
196        android:name="android.bluetooth.map.profile.action.CONNECTION_STATE_CHANGED" />
197    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.CONNECTION_STATE_CHANGED" />
198    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_RECEIVED" />
199    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_SENT_SUCCESSFULLY" />
200    <protected-broadcast android:name="android.bluetooth.mapmce.profile.action.MESSAGE_DELIVERED_SUCCESSFULLY" />
201    <protected-broadcast
202        android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
203    <protected-broadcast
204        android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
205    <protected-broadcast
206        android:name="android.bluetooth.pan.profile.action.CONNECTION_STATE_CHANGED" />
207    <protected-broadcast android:name="android.bluetooth.pbap.intent.action.PBAP_STATE_CHANGED" />
208    <protected-broadcast android:name="android.bluetooth.pbap.profile.action.CONNECTION_STATE_CHANGED" />
209    <protected-broadcast android:name="android.bluetooth.sap.profile.action.CONNECTION_STATE_CHANGED" />
210    <protected-broadcast android:name="android.btopp.intent.action.INCOMING_FILE_NOTIFICATION" />
211    <protected-broadcast android:name="android.btopp.intent.action.USER_CONFIRMATION_TIMEOUT" />
212    <protected-broadcast android:name="android.btopp.intent.action.LIST" />
213    <protected-broadcast android:name="android.btopp.intent.action.OPEN_OUTBOUND" />
214    <protected-broadcast android:name="android.btopp.intent.action.HIDE_COMPLETE" />
215    <protected-broadcast android:name="android.btopp.intent.action.CONFIRM" />
216    <protected-broadcast android:name="android.btopp.intent.action.HIDE" />
217    <protected-broadcast android:name="android.btopp.intent.action.RETRY" />
218    <protected-broadcast android:name="android.btopp.intent.action.OPEN" />
219    <protected-broadcast android:name="android.btopp.intent.action.OPEN_INBOUND" />
220    <protected-broadcast android:name="android.btopp.intent.action.TRANSFER_COMPLETE" />
221    <protected-broadcast android:name="android.btopp.intent.action.ACCEPT" />
222    <protected-broadcast android:name="android.btopp.intent.action.DECLINE" />
223    <protected-broadcast android:name="com.android.bluetooth.gatt.REFRESH_BATCHED_SCAN" />
224    <protected-broadcast android:name="com.android.bluetooth.pbap.authchall" />
225    <protected-broadcast android:name="com.android.bluetooth.pbap.userconfirmtimeout" />
226    <protected-broadcast android:name="com.android.bluetooth.pbap.authresponse" />
227    <protected-broadcast android:name="com.android.bluetooth.pbap.authcancelled" />
228    <protected-broadcast android:name="com.android.bluetooth.sap.USER_CONFIRM_TIMEOUT" />
229    <protected-broadcast android:name="com.android.bluetooth.sap.action.DISCONNECT_ACTION" />
230
231    <protected-broadcast android:name="android.hardware.display.action.WIFI_DISPLAY_STATUS_CHANGED" />
232
233    <protected-broadcast android:name="android.hardware.usb.action.USB_STATE" />
234    <protected-broadcast android:name="android.hardware.usb.action.USB_PORT_CHANGED" />
235    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_ATTACHED" />
236    <protected-broadcast android:name="android.hardware.usb.action.USB_ACCESSORY_DETACHED" />
237    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_ATTACHED" />
238    <protected-broadcast android:name="android.hardware.usb.action.USB_DEVICE_DETACHED" />
239
240    <protected-broadcast android:name="android.intent.action.HEADSET_PLUG" />
241    <protected-broadcast android:name="android.media.action.HDMI_AUDIO_PLUG" />
242
243    <protected-broadcast android:name="android.media.AUDIO_BECOMING_NOISY" />
244    <protected-broadcast android:name="android.media.RINGER_MODE_CHANGED" />
245    <protected-broadcast android:name="android.media.VIBRATE_SETTING_CHANGED" />
246    <protected-broadcast android:name="android.media.VOLUME_CHANGED_ACTION" />
247    <protected-broadcast android:name="android.media.MASTER_VOLUME_CHANGED_ACTION" />
248    <protected-broadcast android:name="android.media.MASTER_MUTE_CHANGED_ACTION" />
249    <protected-broadcast android:name="android.media.MASTER_MONO_CHANGED_ACTION" />
250    <protected-broadcast android:name="android.media.SCO_AUDIO_STATE_CHANGED" />
251    <protected-broadcast android:name="android.media.ACTION_SCO_AUDIO_STATE_UPDATED" />
252
253    <protected-broadcast android:name="android.intent.action.MEDIA_REMOVED" />
254    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTED" />
255    <protected-broadcast android:name="android.intent.action.MEDIA_CHECKING" />
256    <protected-broadcast android:name="android.intent.action.MEDIA_NOFS" />
257    <protected-broadcast android:name="android.intent.action.MEDIA_MOUNTED" />
258    <protected-broadcast android:name="android.intent.action.MEDIA_SHARED" />
259    <protected-broadcast android:name="android.intent.action.MEDIA_UNSHARED" />
260    <protected-broadcast android:name="android.intent.action.MEDIA_BAD_REMOVAL" />
261    <protected-broadcast android:name="android.intent.action.MEDIA_UNMOUNTABLE" />
262    <protected-broadcast android:name="android.intent.action.MEDIA_EJECT" />
263
264    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL" />
265    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE" />
266    <!-- @deprecated.  Only {@link android.net.ConnectivityManager.CONNECTIVITY_ACTION} is sent. -->
267    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_IMMEDIATE" />
268    <protected-broadcast android:name="android.net.conn.DATA_ACTIVITY_CHANGE" />
269    <protected-broadcast android:name="android.net.conn.RESTRICT_BACKGROUND_CHANGED" />
270    <protected-broadcast android:name="android.net.conn.BACKGROUND_DATA_SETTING_CHANGED" />
271    <protected-broadcast android:name="android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED" />
272
273    <protected-broadcast android:name="android.net.nsd.STATE_CHANGED" />
274
275    <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
276    <protected-broadcast android:name="android.nfc.action.TRANSACTION_DETECTED" />
277    <protected-broadcast android:name="com.android.nfc.action.LLCP_UP" />
278    <protected-broadcast android:name="com.android.nfc.action.LLCP_DOWN" />
279    <protected-broadcast android:name="com.android.nfc.cardemulation.action.CLOSE_TAP_DIALOG" />
280    <protected-broadcast android:name="com.android.nfc.handover.action.ALLOW_CONNECT" />
281    <protected-broadcast android:name="com.android.nfc.handover.action.DENY_CONNECT" />
282    <protected-broadcast android:name="com.android.nfc.handover.action.TIMEOUT_CONNECT" />
283    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_ON_DETECTED" />
284    <protected-broadcast android:name="com.android.nfc_extras.action.RF_FIELD_OFF_DETECTED" />
285    <protected-broadcast android:name="com.android.nfc_extras.action.AID_SELECTED" />
286    <!-- For NFC to BT handover -->
287    <protected-broadcast android:name="android.btopp.intent.action.WHITELIST_DEVICE" />
288    <protected-broadcast android:name="android.btopp.intent.action.STOP_HANDOVER_TRANSFER" />
289    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND" />
290    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_SEND_MULTIPLE" />
291    <protected-broadcast android:name="com.android.nfc.handover.action.CANCEL_HANDOVER_TRANSFER" />
292
293    <protected-broadcast android:name="android.intent.action.CLEAR_DNS_CACHE" />
294    <protected-broadcast android:name="android.intent.action.PROXY_CHANGE" />
295
296    <protected-broadcast android:name="android.os.UpdateLock.UPDATE_LOCK_CHANGED" />
297
298    <protected-broadcast android:name="android.intent.action.DREAMING_STARTED" />
299    <protected-broadcast android:name="android.intent.action.DREAMING_STOPPED" />
300    <protected-broadcast android:name="android.intent.action.ANY_DATA_STATE" />
301
302    <protected-broadcast android:name="com.android.server.WifiManager.action.START_SCAN" />
303    <protected-broadcast android:name="com.android.server.WifiManager.action.START_PNO" />
304    <protected-broadcast android:name="com.android.server.WifiManager.action.DELAYED_DRIVER_STOP" />
305    <protected-broadcast android:name="com.android.server.WifiManager.action.DEVICE_IDLE" />
306    <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED" />
307    <protected-broadcast android:name="com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED" />
308    <protected-broadcast android:name="com.android.internal.action.EUICC_FACTORY_RESET" />
309    <protected-broadcast android:name="com.android.server.usb.ACTION_OPEN_IN_APPS" />
310    <protected-broadcast android:name="com.android.server.am.DELETE_DUMPHEAP" />
311    <protected-broadcast android:name="com.android.server.net.action.SNOOZE_WARNING" />
312    <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.USER_DISMISSED_NOTIFICATION" />
313    <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.CONNECT_TO_NETWORK" />
314    <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_WIFI_NETWORK" />
315    <protected-broadcast android:name="com.android.server.wifi.ConnectToNetworkNotification.PICK_NETWORK_AFTER_FAILURE" />
316    <protected-broadcast android:name="android.net.wifi.WIFI_STATE_CHANGED" />
317    <protected-broadcast android:name="android.net.wifi.WIFI_AP_STATE_CHANGED" />
318    <protected-broadcast android:name="android.net.wifi.WIFI_CREDENTIAL_CHANGED" />
319    <protected-broadcast android:name="android.net.wifi.WIFI_SCAN_AVAILABLE" />
320    <protected-broadcast android:name="android.net.wifi.aware.action.WIFI_AWARE_STATE_CHANGED" />
321    <protected-broadcast android:name="android.net.wifi.SCAN_RESULTS" />
322    <protected-broadcast android:name="android.net.wifi.RSSI_CHANGED" />
323    <protected-broadcast android:name="android.net.wifi.STATE_CHANGE" />
324    <protected-broadcast android:name="android.net.wifi.LINK_CONFIGURATION_CHANGED" />
325    <protected-broadcast android:name="android.net.wifi.CONFIGURED_NETWORKS_CHANGE" />
326    <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_DEAUTH_IMMINENT" />
327    <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_ICON" />
328    <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_OSU_PROVIDERS_LIST" />
329    <protected-broadcast android:name="android.net.wifi.action.PASSPOINT_SUBSCRIPTION_REMEDIATION" />
330    <protected-broadcast android:name="android.net.wifi.supplicant.CONNECTION_CHANGE" />
331    <protected-broadcast android:name="android.net.wifi.supplicant.STATE_CHANGE" />
332    <protected-broadcast android:name="android.net.wifi.p2p.STATE_CHANGED" />
333    <protected-broadcast android:name="android.net.wifi.p2p.DISCOVERY_STATE_CHANGE" />
334    <protected-broadcast android:name="android.net.wifi.p2p.THIS_DEVICE_CHANGED" />
335    <protected-broadcast android:name="android.net.wifi.p2p.PEERS_CHANGED" />
336    <protected-broadcast android:name="android.net.wifi.p2p.CONNECTION_STATE_CHANGE" />
337    <protected-broadcast android:name="android.net.wifi.p2p.PERSISTENT_GROUPS_CHANGED" />
338    <protected-broadcast android:name="android.net.conn.TETHER_STATE_CHANGED" />
339    <protected-broadcast android:name="android.net.conn.INET_CONDITION_ACTION" />
340    <protected-broadcast android:name="android.net.conn.NETWORK_CONDITIONS_MEASURED" />
341    <protected-broadcast
342            android:name="android.net.ConnectivityService.action.PKT_CNT_SAMPLE_INTERVAL_ELAPSED" />
343    <protected-broadcast android:name="android.net.scoring.SCORE_NETWORKS" />
344    <protected-broadcast android:name="android.net.scoring.SCORER_CHANGED" />
345    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE" />
346    <protected-broadcast android:name="android.intent.action.EXTERNAL_APPLICATIONS_UNAVAILABLE" />
347    <protected-broadcast android:name="android.intent.action.AIRPLANE_MODE" />
348    <protected-broadcast android:name="android.intent.action.ADVANCED_SETTINGS" />
349    <protected-broadcast android:name="android.intent.action.APPLICATION_RESTRICTIONS_CHANGED" />
350
351    <!-- Legacy -->
352    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_START" />
353    <protected-broadcast android:name="android.intent.action.ACTION_IDLE_MAINTENANCE_END" />
354
355    <protected-broadcast android:name="com.android.server.ACTION_TRIGGER_IDLE" />
356
357    <protected-broadcast android:name="android.intent.action.HDMI_PLUGGED" />
358
359    <protected-broadcast android:name="android.intent.action.PHONE_STATE" />
360
361    <protected-broadcast android:name="android.intent.action.SUB_DEFAULT_CHANGED" />
362
363    <protected-broadcast android:name="android.location.GPS_ENABLED_CHANGE" />
364    <protected-broadcast android:name="android.location.PROVIDERS_CHANGED" />
365    <protected-broadcast android:name="android.location.MODE_CHANGED" />
366    <protected-broadcast android:name="android.location.GPS_FIX_CHANGE" />
367    <protected-broadcast android:name="android.net.proxy.PAC_REFRESH" />
368
369    <protected-broadcast android:name="android.telecom.action.DEFAULT_DIALER_CHANGED" />
370    <protected-broadcast android:name="android.provider.action.DEFAULT_SMS_PACKAGE_CHANGED" />
371    <protected-broadcast android:name="android.intent.action.CONTENT_CHANGED" />
372    <protected-broadcast android:name="android.provider.Telephony.MMS_DOWNLOADED" />
373
374    <protected-broadcast
375        android:name="com.android.server.connectivityservice.CONNECTED_TO_PROVISIONING_NETWORK_ACTION" />
376
377    <!-- Defined in RestrictionsManager -->
378    <protected-broadcast
379        android:name="android.intent.action.PERMISSION_RESPONSE_RECEIVED" />
380    <!-- Defined in RestrictionsManager -->
381
382    <protected-broadcast android:name="android.intent.action.REQUEST_PERMISSION" />
383    <protected-broadcast android:name="android.nfc.handover.intent.action.HANDOVER_STARTED" />
384    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
385    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_PROGRESS" />
386    <protected-broadcast android:name="android.nfc.handover.intent.action.TRANSFER_DONE" />
387
388    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_DATA_SUBSCRIPTION_CHANGED" />
389    <protected-broadcast android:name="android.intent.action.ACTION_DEFAULT_VOICE_SUBSCRIPTION_CHANGED" />
390    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_CONTENT_CHANGE" />
391    <protected-broadcast android:name="android.intent.action.ACTION_SUBINFO_RECORD_UPDATED" />
392
393    <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_DONE" />
394    <protected-broadcast android:name="android.intent.action.ACTION_SET_RADIO_CAPABILITY_FAILED" />
395
396    <protected-broadcast android:name="android.internal.policy.action.BURN_IN_PROTECTION" />
397    <protected-broadcast android:name="android.app.action.SYSTEM_UPDATE_POLICY_CHANGED" />
398    <protected-broadcast android:name="android.app.action.DEVICE_OWNER_CHANGED" />
399
400    <!-- Added in N -->
401    <protected-broadcast android:name="android.intent.action.ANR" />
402    <protected-broadcast android:name="android.intent.action.CALL" />
403    <protected-broadcast android:name="android.intent.action.CALL_PRIVILEGED" />
404    <protected-broadcast android:name="android.intent.action.DROPBOX_ENTRY_ADDED" />
405    <protected-broadcast android:name="android.intent.action.INPUT_METHOD_CHANGED" />
406    <protected-broadcast android:name="android.intent.action.internal_sim_state_changed" />
407    <protected-broadcast android:name="android.intent.action.LOCKED_BOOT_COMPLETED" />
408    <protected-broadcast android:name="android.intent.action.PRECISE_CALL_STATE" />
409    <protected-broadcast android:name="android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED" />
410    <protected-broadcast android:name="android.intent.action.SUBSCRIPTION_PHONE_STATE" />
411    <protected-broadcast android:name="android.intent.action.USER_INFO_CHANGED" />
412    <protected-broadcast android:name="android.intent.action.USER_UNLOCKED" />
413    <protected-broadcast android:name="android.intent.action.WALLPAPER_CHANGED" />
414
415    <protected-broadcast android:name="android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED" />
416    <protected-broadcast android:name="android.app.action.CHOOSE_PRIVATE_KEY_ALIAS" />
417    <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLED" />
418    <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED" />
419    <protected-broadcast android:name="android.app.action.DEVICE_ADMIN_ENABLED" />
420    <protected-broadcast android:name="android.app.action.LOCK_TASK_ENTERING" />
421    <protected-broadcast android:name="android.app.action.LOCK_TASK_EXITING" />
422    <protected-broadcast android:name="android.app.action.NOTIFY_PENDING_SYSTEM_UPDATE" />
423    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_CHANGED" />
424    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_EXPIRING" />
425    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_FAILED" />
426    <protected-broadcast android:name="android.app.action.ACTION_PASSWORD_SUCCEEDED" />
427    <protected-broadcast android:name="com.android.server.ACTION_EXPIRED_PASSWORD_NOTIFICATION" />
428
429    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_ADDED" />
430    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNLOCKED" />
431    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_REMOVED" />
432
433    <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_STATE_CHANGED" />
434    <protected-broadcast android:name="com.android.bluetooth.map.USER_CONFIRM_TIMEOUT" />
435    <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_SENT" />
436    <protected-broadcast android:name="com.android.bluetooth.BluetoothMapContentObserver.action.MESSAGE_DELIVERY" />
437    <protected-broadcast android:name="android.content.jobscheduler.JOB_DELAY_EXPIRED" />
438    <protected-broadcast android:name="android.content.syncmanager.SYNC_ALARM" />
439    <protected-broadcast android:name="android.media.INTERNAL_RINGER_MODE_CHANGED_ACTION" />
440    <protected-broadcast android:name="android.media.STREAM_DEVICES_CHANGED_ACTION" />
441    <protected-broadcast android:name="android.media.STREAM_MUTE_CHANGED_ACTION" />
442    <protected-broadcast android:name="android.net.sip.SIP_SERVICE_UP" />
443    <protected-broadcast android:name="android.nfc.action.ADAPTER_STATE_CHANGED" />
444    <protected-broadcast android:name="android.os.action.CHARGING" />
445    <protected-broadcast android:name="android.os.action.DISCHARGING" />
446    <protected-broadcast android:name="android.search.action.SEARCHABLES_CHANGED" />
447    <protected-broadcast android:name="android.security.STORAGE_CHANGED" />
448    <protected-broadcast android:name="android.security.action.TRUST_STORE_CHANGED" />
449    <protected-broadcast android:name="android.security.action.KEYCHAIN_CHANGED" />
450    <protected-broadcast android:name="android.security.action.KEY_ACCESS_CHANGED" />
451    <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_REGISTERED" />
452    <protected-broadcast android:name="android.telecom.action.PHONE_ACCOUNT_UNREGISTERED" />
453    <protected-broadcast android:name="android.telecom.action.SHOW_MISSED_CALLS_NOTIFICATION" />
454    <protected-broadcast android:name="android.telephony.action.CARRIER_CONFIG_CHANGED" />
455    <protected-broadcast android:name="android.telephony.action.DEFAULT_SUBSCRIPTION_CHANGED" />
456    <protected-broadcast android:name="android.telephony.action.DEFAULT_SMS_SUBSCRIPTION_CHANGED" />
457    <protected-broadcast android:name="android.telephony.action.SHOW_VOICEMAIL_NOTIFICATION" />
458
459    <protected-broadcast android:name="com.android.bluetooth.btservice.action.ALARM_WAKEUP" />
460    <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_POLL" />
461    <protected-broadcast android:name="com.android.server.action.NETWORK_STATS_UPDATED" />
462    <protected-broadcast android:name="com.android.server.NetworkTimeUpdateService.action.POLL" />
463    <protected-broadcast android:name="com.android.server.telecom.intent.action.CALLS_ADD_ENTRY" />
464    <protected-broadcast android:name="com.android.settings.location.MODE_CHANGING" />
465    <protected-broadcast android:name="com.android.settings.bluetooth.ACTION_DISMISS_PAIRING" />
466
467    <protected-broadcast android:name="NotificationManagerService.TIMEOUT" />
468    <protected-broadcast android:name="ScheduleConditionProvider.EVALUATE" />
469    <protected-broadcast android:name="EventConditionProvider.EVALUATE" />
470    <protected-broadcast android:name="SnoozeHelper.EVALUATE" />
471    <protected-broadcast android:name="wifi_scan_available" />
472
473    <protected-broadcast android:name="action.cne.started" />
474    <protected-broadcast android:name="android.content.jobscheduler.JOB_DEADLINE_EXPIRED" />
475    <protected-broadcast android:name="android.intent.action.ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW" />
476    <protected-broadcast android:name="android.net.conn.CONNECTIVITY_CHANGE_SUPL" />
477    <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" />
478    <protected-broadcast android:name="android.os.action.LIGHT_DEVICE_IDLE_MODE_CHANGED" />
479    <protected-broadcast android:name="android.os.storage.action.VOLUME_STATE_CHANGED" />
480    <protected-broadcast android:name="android.os.storage.action.DISK_SCANNED" />
481    <protected-broadcast android:name="com.android.server.action.UPDATE_TWILIGHT_STATE" />
482    <protected-broadcast android:name="com.android.server.action.RESET_TWILIGHT_AUTO" />
483    <protected-broadcast android:name="com.android.server.device_idle.STEP_IDLE_STATE" />
484    <protected-broadcast android:name="com.android.server.device_idle.STEP_LIGHT_IDLE_STATE" />
485    <protected-broadcast android:name="com.android.server.Wifi.action.TOGGLE_PNO" />
486    <protected-broadcast android:name="intent.action.ACTION_RF_BAND_INFO" />
487    <protected-broadcast android:name="android.intent.action.MEDIA_RESOURCE_GRANTED" />
488    <protected-broadcast android:name="android.app.action.NETWORK_LOGS_AVAILABLE" />
489    <protected-broadcast android:name="android.app.action.SECURITY_LOGS_AVAILABLE" />
490
491    <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED" />
492    <protected-broadcast android:name="android.app.action.INTERRUPTION_FILTER_CHANGED_INTERNAL" />
493    <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_CHANGED" />
494    <protected-broadcast android:name="android.app.action.NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED" />
495    <protected-broadcast android:name="android.os.action.ACTION_EFFECTS_SUPPRESSOR_CHANGED" />
496
497    <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" />
498    <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" />
499
500    <protected-broadcast android:name="android.intent.action.DYNAMIC_SENSOR_CHANGED" />
501
502    <protected-broadcast android:name="android.intent.action.ACTION_RADIO_OFF" />
503
504    <protected-broadcast android:name="android.accounts.LOGIN_ACCOUNTS_CHANGED" />
505    <protected-broadcast android:name="android.accounts.action.ACCOUNT_REMOVED" />
506    <protected-broadcast android:name="android.accounts.action.VISIBLE_ACCOUNTS_CHANGED" />
507
508    <protected-broadcast android:name="com.android.sync.SYNC_CONN_STATUS_CHANGED" />
509
510    <protected-broadcast android:name="com.android.phone.SIP_INCOMING_CALL" />
511    <protected-broadcast android:name="com.android.phone.SIP_ADD_PHONE" />
512    <protected-broadcast android:name="com.android.phone.SIP_REMOVE_PHONE" />
513    <protected-broadcast android:name="com.android.phone.SIP_CALL_OPTION_CHANGED" />
514
515    <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_CONNECTED" />
516    <protected-broadcast android:name="android.bluetooth.adapter.action.BLE_ACL_DISCONNECTED" />
517
518    <protected-broadcast android:name="android.bluetooth.input.profile.action.HANDSHAKE" />
519    <protected-broadcast android:name="android.bluetooth.input.profile.action.REPORT" />
520
521    <protected-broadcast android:name="android.intent.action.TWILIGHT_CHANGED" />
522
523    <protected-broadcast android:name="com.android.server.fingerprint.ACTION_LOCKOUT_RESET" />
524    <protected-broadcast android:name="android.net.wifi.PASSPOINT_ICON_RECEIVED" />
525    <protected-broadcast android:name="com.android.server.notification.CountdownConditionProvider" />
526
527    <protected-broadcast android:name="com.android.internal.location.ALARM_WAKEUP" />
528    <protected-broadcast android:name="com.android.internal.location.ALARM_TIMEOUT" />
529    <protected-broadcast android:name="android.intent.action.GLOBAL_BUTTON" />
530
531    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_AVAILABLE" />
532    <protected-broadcast android:name="android.intent.action.MANAGED_PROFILE_UNAVAILABLE" />
533    <protected-broadcast android:name="com.android.server.pm.DISABLE_QUIET_MODE_AFTER_UNLOCK" />
534
535    <protected-broadcast android:name="com.android.server.retaildemo.ACTION_RESET_DEMO" />
536
537    <protected-broadcast android:name="android.intent.action.DEVICE_LOCKED_CHANGED" />
538
539    <!-- Added in O -->
540    <!-- TODO: temporary broadcast used by AutoFillManagerServiceImpl; will be removed -->
541    <protected-broadcast android:name="com.android.internal.autofill.action.REQUEST_AUTOFILL" />
542    <protected-broadcast android:name="android.app.action.APPLICATION_DELEGATION_SCOPES_CHANGED" />
543    <protected-broadcast android:name="com.android.server.wm.ACTION_REVOKE_SYSTEM_ALERT_WINDOW_PERMISSION" />
544    <protected-broadcast android:name="android.media.tv.action.PARENTAL_CONTROLS_ENABLED_CHANGED" />
545
546    <protected-broadcast android:name="android.content.pm.action.SESSION_COMMITTED" />
547    <protected-broadcast android:name="android.os.action.USER_RESTRICTIONS_CHANGED" />
548    <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_ADDED_TO_WATCH_NEXT" />
549    <protected-broadcast android:name="android.media.tv.action.PREVIEW_PROGRAM_BROWSABLE_DISABLED" />
550    <protected-broadcast android:name="android.media.tv.action.WATCH_NEXT_PROGRAM_BROWSABLE_DISABLED" />
551    <protected-broadcast android:name="android.media.tv.action.CHANNEL_BROWSABLE_REQUESTED" />
552    <protected-broadcast android:name="com.android.server.InputMethodManagerService.SHOW_INPUT_METHOD_PICKER" />
553
554    <!-- ====================================================================== -->
555    <!--                          RUNTIME PERMISSIONS                           -->
556    <!-- ====================================================================== -->
557    <eat-comment />
558
559    <!-- ====================================================================== -->
560    <!-- Permissions for accessing user's contacts including personal profile   -->
561    <!-- ====================================================================== -->
562    <eat-comment />
563
564    <!-- Used for runtime permissions related to contacts and profiles on this
565        device. -->
566    <permission-group android:name="android.permission-group.CONTACTS"
567        android:icon="@drawable/perm_group_contacts"
568        android:label="@string/permgrouplab_contacts"
569        android:description="@string/permgroupdesc_contacts"
570        android:priority="100" />
571
572    <!-- Allows an application to read the user's contacts data.
573        <p>Protection level: dangerous
574    -->
575    <permission android:name="android.permission.READ_CONTACTS"
576        android:permissionGroup="android.permission-group.CONTACTS"
577        android:label="@string/permlab_readContacts"
578        android:description="@string/permdesc_readContacts"
579        android:protectionLevel="dangerous" />
580
581    <!-- Allows an application to write the user's contacts data.
582         <p>Protection level: dangerous
583    -->
584    <permission android:name="android.permission.WRITE_CONTACTS"
585        android:permissionGroup="android.permission-group.CONTACTS"
586        android:label="@string/permlab_writeContacts"
587        android:description="@string/permdesc_writeContacts"
588        android:protectionLevel="dangerous" />
589
590    <!-- ====================================================================== -->
591    <!-- Permissions for accessing user's calendar                              -->
592    <!-- ====================================================================== -->
593    <eat-comment />
594
595    <!-- Used for runtime permissions related to user's calendar. -->
596    <permission-group android:name="android.permission-group.CALENDAR"
597        android:icon="@drawable/perm_group_calendar"
598        android:label="@string/permgrouplab_calendar"
599        android:description="@string/permgroupdesc_calendar"
600        android:priority="200" />
601
602    <!-- Allows an application to read the user's calendar data.
603         <p>Protection level: dangerous
604    -->
605    <permission android:name="android.permission.READ_CALENDAR"
606        android:permissionGroup="android.permission-group.CALENDAR"
607        android:label="@string/permlab_readCalendar"
608        android:description="@string/permdesc_readCalendar"
609        android:protectionLevel="dangerous" />
610
611    <!-- Allows an application to write the user's calendar data.
612         <p>Protection level: dangerous
613    -->
614    <permission android:name="android.permission.WRITE_CALENDAR"
615        android:permissionGroup="android.permission-group.CALENDAR"
616        android:label="@string/permlab_writeCalendar"
617        android:description="@string/permdesc_writeCalendar"
618        android:protectionLevel="dangerous" />
619
620    <!-- ====================================================================== -->
621    <!-- Permissions for accessing and modifying user's SMS messages            -->
622    <!-- ====================================================================== -->
623    <eat-comment />
624
625    <!-- Used for runtime permissions related to user's SMS messages. -->
626    <permission-group android:name="android.permission-group.SMS"
627        android:icon="@drawable/perm_group_sms"
628        android:label="@string/permgrouplab_sms"
629        android:description="@string/permgroupdesc_sms"
630        android:priority="300" />
631
632    <!-- Allows an application to send SMS messages.
633         <p>Protection level: dangerous
634    -->
635    <permission android:name="android.permission.SEND_SMS"
636        android:permissionGroup="android.permission-group.SMS"
637        android:label="@string/permlab_sendSms"
638        android:description="@string/permdesc_sendSms"
639        android:permissionFlags="costsMoney"
640        android:protectionLevel="dangerous" />
641
642    <!-- Allows an application to receive SMS messages.
643         <p>Protection level: dangerous
644    -->
645    <permission android:name="android.permission.RECEIVE_SMS"
646        android:permissionGroup="android.permission-group.SMS"
647        android:label="@string/permlab_receiveSms"
648        android:description="@string/permdesc_receiveSms"
649        android:protectionLevel="dangerous"/>
650
651    <!-- Allows an application to read SMS messages.
652         <p>Protection level: dangerous
653    -->
654    <permission android:name="android.permission.READ_SMS"
655        android:permissionGroup="android.permission-group.SMS"
656        android:label="@string/permlab_readSms"
657        android:description="@string/permdesc_readSms"
658        android:protectionLevel="dangerous" />
659
660    <!-- Allows an application to receive WAP push messages.
661         <p>Protection level: dangerous
662    -->
663    <permission android:name="android.permission.RECEIVE_WAP_PUSH"
664        android:permissionGroup="android.permission-group.SMS"
665        android:label="@string/permlab_receiveWapPush"
666        android:description="@string/permdesc_receiveWapPush"
667        android:protectionLevel="dangerous" />
668
669    <!-- Allows an application to monitor incoming MMS messages.
670        <p>Protection level: dangerous
671    -->
672    <permission android:name="android.permission.RECEIVE_MMS"
673        android:permissionGroup="android.permission-group.SMS"
674        android:label="@string/permlab_receiveMms"
675        android:description="@string/permdesc_receiveMms"
676        android:protectionLevel="dangerous" />
677
678    <!-- Allows an application to read previously received cell broadcast
679         messages and to register a content observer to get notifications when
680         a cell broadcast has been received and added to the database. For
681         emergency alerts, the database is updated immediately after the
682         alert dialog and notification sound/vibration/speech are presented.
683         The "read" column is then updated after the user dismisses the alert.
684         This enables supplementary emergency assistance apps to start loading
685         additional emergency information (if Internet access is available)
686         when the alert is first received, and to delay presenting the info
687         to the user until after the initial alert dialog is dismissed.
688         <p>Protection level: dangerous
689         @hide Pending API council approval -->
690    <permission android:name="android.permission.READ_CELL_BROADCASTS"
691        android:permissionGroup="android.permission-group.SMS"
692        android:label="@string/permlab_readCellBroadcasts"
693        android:description="@string/permdesc_readCellBroadcasts"
694        android:protectionLevel="dangerous" />
695
696    <!-- ====================================================================== -->
697    <!-- Permissions for accessing external storage                             -->
698    <!-- ====================================================================== -->
699    <eat-comment />
700
701    <!-- Used for runtime permissions related to the shared external storage. -->
702    <permission-group android:name="android.permission-group.STORAGE"
703        android:icon="@drawable/perm_group_storage"
704        android:label="@string/permgrouplab_storage"
705        android:description="@string/permgroupdesc_storage"
706        android:priority="900" />
707
708    <!-- Allows an application to read from external storage.
709     <p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
710     granted this permission.</p>
711     <p>This permission is enforced starting in API level 19.  Before API level 19, this
712     permission is not enforced and all apps still have access to read from external storage.
713     You can test your app with the permission enforced by enabling <em>Protect USB
714     storage</em> under Developer options in the Settings app on a device running Android 4.1 or
715     higher.</p>
716     <p>Also starting in API level 19, this permission is <em>not</em> required to
717     read/write files in your application-specific directories returned by
718     {@link android.content.Context#getExternalFilesDir} and
719     {@link android.content.Context#getExternalCacheDir}.
720     <p class="note"><strong>Note:</strong> If <em>both</em> your <a
721     href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
722     minSdkVersion}</a> and <a
723     href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
724     targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
725     grants your app this permission. If you don't need this permission, be sure your <a
726     href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
727     targetSdkVersion}</a> is 4 or higher.
728     <p>Protection level: dangerous
729     -->
730    <permission android:name="android.permission.READ_EXTERNAL_STORAGE"
731        android:permissionGroup="android.permission-group.STORAGE"
732        android:label="@string/permlab_sdcardRead"
733        android:description="@string/permdesc_sdcardRead"
734        android:protectionLevel="dangerous" />
735
736    <!-- Allows an application to write to external storage.
737         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
738         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
739         minSdkVersion}</a> and <a
740         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
741         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
742         grants your app this permission. If you don't need this permission, be sure your <a
743         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
744         targetSdkVersion}</a> is 4 or higher.
745         <p>Starting in API level 19, this permission is <em>not</em> required to
746         read/write files in your application-specific directories returned by
747         {@link android.content.Context#getExternalFilesDir} and
748         {@link android.content.Context#getExternalCacheDir}.
749         <p>Protection level: dangerous
750    -->
751    <permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"
752        android:permissionGroup="android.permission-group.STORAGE"
753        android:label="@string/permlab_sdcardWrite"
754        android:description="@string/permdesc_sdcardWrite"
755        android:protectionLevel="dangerous" />
756
757    <!-- ====================================================================== -->
758    <!-- Permissions for accessing the device location                          -->
759    <!-- ====================================================================== -->
760    <eat-comment />
761
762    <!-- Used for permissions that allow accessing the device location. -->
763    <permission-group android:name="android.permission-group.LOCATION"
764        android:icon="@drawable/perm_group_location"
765        android:label="@string/permgrouplab_location"
766        android:description="@string/permgroupdesc_location"
767        android:priority="400" />
768
769    <!-- Allows an app to access precise location.
770         Alternatively, you might want {@link #ACCESS_COARSE_LOCATION}.
771         <p>Protection level: dangerous
772    -->
773    <permission android:name="android.permission.ACCESS_FINE_LOCATION"
774        android:permissionGroup="android.permission-group.LOCATION"
775        android:label="@string/permlab_accessFineLocation"
776        android:description="@string/permdesc_accessFineLocation"
777        android:protectionLevel="dangerous|instant" />
778
779    <!-- Allows an app to access approximate location.
780         Alternatively, you might want {@link #ACCESS_FINE_LOCATION}.
781         <p>Protection level: dangerous
782    -->
783    <permission android:name="android.permission.ACCESS_COARSE_LOCATION"
784        android:permissionGroup="android.permission-group.LOCATION"
785        android:label="@string/permlab_accessCoarseLocation"
786        android:description="@string/permdesc_accessCoarseLocation"
787        android:protectionLevel="dangerous|instant" />
788
789    <!-- ====================================================================== -->
790    <!-- Permissions for accessing the device telephony                         -->
791    <!-- ====================================================================== -->
792    <eat-comment />
793
794    <!-- Used for permissions that are associated telephony features. -->
795    <permission-group android:name="android.permission-group.PHONE"
796        android:icon="@drawable/perm_group_phone_calls"
797        android:label="@string/permgrouplab_phone"
798        android:description="@string/permgroupdesc_phone"
799        android:priority="500" />
800
801    <!-- Allows read only access to phone state, including the phone number of the device,
802         current cellular network information, the status of any ongoing calls, and a list of any
803         {@link android.telecom.PhoneAccount}s registered on the device.
804         <p class="note"><strong>Note:</strong> If <em>both</em> your <a
805         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
806         minSdkVersion}</a> and <a
807         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
808         targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
809         grants your app this permission. If you don't need this permission, be sure your <a
810         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
811         targetSdkVersion}</a> is 4 or higher.
812         <p>Protection level: dangerous
813    -->
814    <permission android:name="android.permission.READ_PHONE_STATE"
815        android:permissionGroup="android.permission-group.PHONE"
816        android:label="@string/permlab_readPhoneState"
817        android:description="@string/permdesc_readPhoneState"
818        android:protectionLevel="dangerous" />
819
820    <!-- Allows read access to the device's phone number(s). This is a subset of the capabilities
821         granted by {@link #READ_PHONE_STATE} but is exposed to instant applications.
822         <p>Protection level: dangerous-->
823    <permission android:name="android.permission.READ_PHONE_NUMBERS"
824        android:permissionGroup="android.permission-group.PHONE"
825        android:label="@string/permlab_readPhoneNumbers"
826        android:description="@string/permdesc_readPhoneNumbers"
827        android:protectionLevel="dangerous|instant" />
828
829    <!-- Allows an application to initiate a phone call without going through
830        the Dialer user interface for the user to confirm the call.
831        <p>Protection level: dangerous
832    -->
833    <permission android:name="android.permission.CALL_PHONE"
834        android:permissionGroup="android.permission-group.PHONE"
835        android:permissionFlags="costsMoney"
836        android:label="@string/permlab_callPhone"
837        android:description="@string/permdesc_callPhone"
838        android:protectionLevel="dangerous" />
839
840    <!-- Allows an application to access the IMS call service: making and
841         modifying a call
842        <p>Protection level: signature|privileged
843        @hide
844    -->
845    <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE"
846        android:permissionGroup="android.permission-group.PHONE"
847        android:label="@string/permlab_accessImsCallService"
848        android:description="@string/permdesc_accessImsCallService"
849        android:protectionLevel="signature|privileged" />
850
851    <!-- Allows an application to read the user's call log.
852         <p class="note"><strong>Note:</strong> If your app uses the
853         {@link #READ_CONTACTS} permission and <em>both</em> your <a
854         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
855         minSdkVersion}</a> and <a
856         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
857         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
858         grants your app this permission. If you don't need this permission, be sure your <a
859         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
860         targetSdkVersion}</a> is 16 or higher.</p>
861         <p>Protection level: dangerous
862    -->
863    <permission android:name="android.permission.READ_CALL_LOG"
864        android:permissionGroup="android.permission-group.PHONE"
865        android:label="@string/permlab_readCallLog"
866        android:description="@string/permdesc_readCallLog"
867        android:protectionLevel="dangerous" />
868
869    <!-- Allows an application to write (but not read) the user's
870         call log data.
871         <p class="note"><strong>Note:</strong> If your app uses the
872         {@link #WRITE_CONTACTS} permission and <em>both</em> your <a
873         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
874         minSdkVersion}</a> and <a
875         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
876         targetSdkVersion}</a> values are set to 15 or lower, the system implicitly
877         grants your app this permission. If you don't need this permission, be sure your <a
878         href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
879         targetSdkVersion}</a> is 16 or higher.</p>
880         <p>Protection level: dangerous
881    -->
882    <permission android:name="android.permission.WRITE_CALL_LOG"
883        android:permissionGroup="android.permission-group.PHONE"
884        android:label="@string/permlab_writeCallLog"
885        android:description="@string/permdesc_writeCallLog"
886        android:protectionLevel="dangerous" />
887
888    <!-- Allows an application to add voicemails into the system.
889         <p>Protection level: dangerous
890    -->
891    <permission android:name="com.android.voicemail.permission.ADD_VOICEMAIL"
892        android:permissionGroup="android.permission-group.PHONE"
893        android:label="@string/permlab_addVoicemail"
894        android:description="@string/permdesc_addVoicemail"
895        android:protectionLevel="dangerous" />
896
897    <!-- Allows an application to use SIP service.
898         <p>Protection level: dangerous
899    -->
900    <permission android:name="android.permission.USE_SIP"
901        android:permissionGroup="android.permission-group.PHONE"
902        android:description="@string/permdesc_use_sip"
903        android:label="@string/permlab_use_sip"
904        android:protectionLevel="dangerous"/>
905
906    <!-- Allows an application to see the number being dialed during an outgoing
907         call with the option to redirect the call to a different number or
908         abort the call altogether.
909         <p>Protection level: dangerous
910    -->
911    <permission android:name="android.permission.PROCESS_OUTGOING_CALLS"
912        android:permissionGroup="android.permission-group.PHONE"
913        android:label="@string/permlab_processOutgoingCalls"
914        android:description="@string/permdesc_processOutgoingCalls"
915        android:protectionLevel="dangerous" />
916
917
918    <!-- Allows the app to answer an incoming phone call.
919         <p>Protection level: dangerous
920    -->
921    <permission android:name="android.permission.ANSWER_PHONE_CALLS"
922        android:permissionGroup="android.permission-group.PHONE"
923        android:label="@string/permlab_answerPhoneCalls"
924        android:description="@string/permdesc_answerPhoneCalls"
925        android:protectionLevel="dangerous|runtime" />
926
927    <!-- Allows a calling application which manages it own calls through the self-managed
928         {@link android.telecom.ConnectionService} APIs.  See
929         {@link android.telecom.PhoneAccount#CAPABILITY_SELF_MANAGED for more information on the
930         self-managed ConnectionService APIs.
931         <p>Protection level: normal
932    -->
933    <permission android:name="android.permission.MANAGE_OWN_CALLS"
934                android:label="@string/permlab_manageOwnCalls"
935                android:description="@string/permdesc_manageOwnCalls"
936                android:protectionLevel="normal" />
937
938    <!-- ====================================================================== -->
939    <!-- Permissions for accessing the device microphone                        -->
940    <!-- ====================================================================== -->
941    <eat-comment />
942
943    <!-- Used for permissions that are associated with accessing
944         microphone audio from the device. Note that phone calls also capture audio
945         but are in a separate (more visible) permission group. -->
946    <permission-group android:name="android.permission-group.MICROPHONE"
947        android:icon="@drawable/perm_group_microphone"
948        android:label="@string/permgrouplab_microphone"
949        android:description="@string/permgroupdesc_microphone"
950        android:priority="600" />
951
952    <!-- Allows an application to record audio.
953         <p>Protection level: dangerous
954    -->
955    <permission android:name="android.permission.RECORD_AUDIO"
956        android:permissionGroup="android.permission-group.MICROPHONE"
957        android:label="@string/permlab_recordAudio"
958        android:description="@string/permdesc_recordAudio"
959        android:protectionLevel="dangerous|instant"/>
960
961    <!-- ====================================================================== -->
962    <!-- Permissions for accessing the UCE Service                              -->
963    <!-- ====================================================================== -->
964
965    <!-- @hide Allows an application to Access UCE-Presence.
966         <p>Protection level: signature|privileged
967    -->
968    <permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE"
969        android:permissionGroup="android.permission-group.PHONE"
970        android:protectionLevel="signature|privileged"/>
971
972    <!-- @hide Allows an application to Access UCE-OPTIONS.
973         <p>Protection level: signature|privileged
974    -->
975    <permission android:name="android.permission.ACCESS_UCE_OPTIONS_SERVICE"
976        android:permissionGroup="android.permission-group.PHONE"
977        android:protectionLevel="signature|privileged"/>
978
979
980
981    <!-- ====================================================================== -->
982    <!-- Permissions for accessing the device camera                            -->
983    <!-- ====================================================================== -->
984    <eat-comment />
985
986    <!-- Used for permissions that are associated with accessing
987     camera or capturing images/video from the device. -->
988    <permission-group android:name="android.permission-group.CAMERA"
989        android:icon="@drawable/perm_group_camera"
990        android:label="@string/permgrouplab_camera"
991        android:description="@string/permgroupdesc_camera"
992        android:priority="700" />
993
994    <!-- Required to be able to access the camera device.
995         <p>This will automatically enforce the <a
996         href="{@docRoot}guide/topics/manifest/uses-feature-element.html">
997         <uses-feature>}</a> manifest element for <em>all</em> camera features.
998         If you do not require all camera features or can properly operate if a camera
999         is not available, then you must modify your manifest as appropriate in order to
1000         install on devices that don't support all camera features.</p>
1001         <p>Protection level: dangerous
1002    -->
1003    <permission android:name="android.permission.CAMERA"
1004        android:permissionGroup="android.permission-group.CAMERA"
1005        android:label="@string/permlab_camera"
1006        android:description="@string/permdesc_camera"
1007        android:protectionLevel="dangerous|instant" />
1008
1009
1010    <!-- ====================================================================== -->
1011    <!-- Permissions for accessing the device sensors                           -->
1012    <!-- ====================================================================== -->
1013    <eat-comment />
1014
1015    <!-- Used for permissions that are associated with accessing
1016         camera or capturing images/video from the device. -->
1017    <permission-group android:name="android.permission-group.SENSORS"
1018        android:icon="@drawable/perm_group_sensors"
1019        android:label="@string/permgrouplab_sensors"
1020        android:description="@string/permgroupdesc_sensors"
1021        android:priority="800" />
1022
1023    <!-- Allows an application to access data from sensors that the user uses to
1024         measure what is happening inside his/her body, such as heart rate.
1025         <p>Protection level: dangerous -->
1026    <permission android:name="android.permission.BODY_SENSORS"
1027        android:permissionGroup="android.permission-group.SENSORS"
1028        android:label="@string/permlab_bodySensors"
1029        android:description="@string/permdesc_bodySensors"
1030        android:protectionLevel="dangerous" />
1031
1032    <!-- Allows an app to use fingerprint hardware.
1033         <p>Protection level: normal
1034    -->
1035    <permission android:name="android.permission.USE_FINGERPRINT"
1036        android:permissionGroup="android.permission-group.SENSORS"
1037        android:label="@string/permlab_useFingerprint"
1038        android:description="@string/permdesc_useFingerprint"
1039        android:protectionLevel="normal" />
1040
1041    <!-- ====================================================================== -->
1042    <!-- REMOVED PERMISSIONS                                                    -->
1043    <!-- ====================================================================== -->
1044
1045    <!-- @hide We need to keep this around for backwards compatibility -->
1046    <permission android:name="android.permission.READ_PROFILE"
1047        android:protectionLevel="normal"
1048        android:permissionFlags="removed"/>
1049
1050    <!-- @hide We need to keep this around for backwards compatibility -->
1051    <permission android:name="android.permission.WRITE_PROFILE"
1052        android:protectionLevel="normal"
1053        android:permissionFlags="removed"/>
1054
1055    <!-- @hide We need to keep this around for backwards compatibility -->
1056    <permission android:name="android.permission.READ_SOCIAL_STREAM"
1057        android:protectionLevel="normal"
1058        android:permissionFlags="removed"/>
1059
1060    <!-- @hide We need to keep this around for backwards compatibility -->
1061    <permission android:name="android.permission.WRITE_SOCIAL_STREAM"
1062        android:protectionLevel="normal"
1063        android:permissionFlags="removed"/>
1064
1065    <!-- @hide We need to keep this around for backwards compatibility -->
1066    <permission android:name="android.permission.READ_USER_DICTIONARY"
1067        android:protectionLevel="normal"
1068        android:permissionFlags="removed"/>
1069
1070    <!-- @hide We need to keep this around for backwards compatibility -->
1071    <permission android:name="android.permission.WRITE_USER_DICTIONARY"
1072        android:protectionLevel="normal"
1073        android:permissionFlags="removed"/>
1074
1075    <!-- @hide We need to keep this around for backwards compatibility -->
1076    <permission android:name="android.permission.WRITE_SMS"
1077        android:protectionLevel="normal"
1078        android:permissionFlags="removed"/>
1079
1080    <!-- @hide We need to keep this around for backwards compatibility -->
1081    <permission android:name="com.android.browser.permission.READ_HISTORY_BOOKMARKS"
1082        android:protectionLevel="normal"
1083        android:permissionFlags="removed"/>
1084
1085    <!-- @hide We need to keep this around for backwards compatibility -->
1086    <permission android:name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS"
1087        android:protectionLevel="normal"
1088        android:permissionFlags="removed"/>
1089
1090    <!-- @hide We need to keep this around for backwards compatibility -->
1091    <permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"
1092        android:protectionLevel="normal"
1093        android:permissionFlags="removed"/>
1094
1095    <!-- @hide We need to keep this around for backwards compatibility -->
1096    <permission android:name="android.permission.MANAGE_ACCOUNTS"
1097        android:protectionLevel="normal"
1098        android:permissionFlags="removed"/>
1099
1100    <!-- @hide We need to keep this around for backwards compatibility -->
1101    <permission android:name="android.permission.USE_CREDENTIALS"
1102        android:protectionLevel="normal"
1103        android:permissionFlags="removed"/>
1104
1105    <!-- @hide We need to keep this around for backwards compatibility -->
1106    <permission android:name="android.permission.SUBSCRIBED_FEEDS_READ"
1107        android:protectionLevel="normal"
1108        android:permissionFlags="removed"/>
1109
1110    <!-- @hide We need to keep this around for backwards compatibility -->
1111    <permission android:name="android.permission.SUBSCRIBED_FEEDS_WRITE"
1112        android:protectionLevel="normal"
1113        android:permissionFlags="removed"/>
1114
1115    <!-- @hide We need to keep this around for backwards compatibility -->
1116    <permission android:name="android.permission.FLASHLIGHT"
1117        android:protectionLevel="normal"
1118        android:permissionFlags="removed"/>
1119
1120    <!-- ====================================================================== -->
1121    <!-- INSTALL PERMISSIONS                                                    -->
1122    <!-- ====================================================================== -->
1123
1124    <!-- ================================== -->
1125    <!-- Permissions for accessing messages -->
1126    <!-- ================================== -->
1127    <eat-comment />
1128
1129    <!-- @SystemApi Allows an application (Phone) to send a request to other applications
1130         to handle the respond-via-message action during incoming calls.
1131         <p>Not for use by third-party applications. -->
1132    <permission android:name="android.permission.SEND_RESPOND_VIA_MESSAGE"
1133        android:protectionLevel="signature|privileged" />
1134
1135    <!-- @SystemApi Allows an application to send SMS to premium shortcodes without user permission.
1136         <p>Not for use by third-party applications.
1137         @hide -->
1138    <permission android:name="android.permission.SEND_SMS_NO_CONFIRMATION"
1139        android:protectionLevel="signature|privileged" />
1140
1141    <!-- Allows an application to filter carrier specific sms.
1142         @hide -->
1143    <permission android:name="android.permission.CARRIER_FILTER_SMS"
1144        android:protectionLevel="signature|privileged" />
1145
1146    <!-- @SystemApi Allows an application to receive emergency cell broadcast messages,
1147         to record or display them to the user.
1148         <p>Not for use by third-party applications.
1149         @hide -->
1150    <permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST"
1151        android:protectionLevel="signature|privileged" />
1152
1153    <!-- Allows an application to monitor incoming Bluetooth MAP messages, to record
1154         or perform processing on them. -->
1155    <!-- @hide -->
1156    <permission android:name="android.permission.RECEIVE_BLUETOOTH_MAP"
1157        android:protectionLevel="signature|privileged" />
1158
1159    <!-- @SystemApi @hide Allows an application to execute contacts directory search.
1160         This should only be used by ContactsProvider.
1161         <p>Not for use by third-party applications. -->
1162    <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
1163        android:protectionLevel="signature|privileged" />
1164
1165    <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider.
1166         <p>Not for use by third-party applications. -->
1167    <permission android:name="android.permission.MODIFY_CELL_BROADCASTS"
1168                android:protectionLevel="signature|privileged" />
1169
1170    <!-- =============================================================== -->
1171    <!-- Permissions for setting the device alarm                        -->
1172    <!-- =============================================================== -->
1173    <eat-comment />
1174
1175    <!-- Allows an application to broadcast an Intent to set an alarm for the user.
1176         <p>Protection level: normal
1177    -->
1178    <permission android:name="com.android.alarm.permission.SET_ALARM"
1179        android:label="@string/permlab_setAlarm"
1180        android:description="@string/permdesc_setAlarm"
1181        android:protectionLevel="normal" />
1182
1183    <!-- =============================================================== -->
1184    <!-- Permissions for accessing the user voicemail                    -->
1185    <!-- =============================================================== -->
1186    <eat-comment />
1187
1188    <!-- Allows an application to modify and remove existing voicemails in the system.
1189        <p>Protection level: signature|privileged
1190    -->
1191    <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
1192        android:protectionLevel="signature|privileged" />
1193
1194    <!-- Allows an application to read voicemails in the system.
1195         <p>Protection level: signature|privileged
1196    -->
1197    <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
1198        android:protectionLevel="signature|privileged" />
1199
1200    <!-- ======================================= -->
1201    <!-- Permissions for accessing location info -->
1202    <!-- ======================================= -->
1203    <eat-comment />
1204
1205    <!-- Allows an application to access extra location provider commands.
1206         <p>Protection level: normal
1207    -->
1208    <permission android:name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS"
1209        android:label="@string/permlab_accessLocationExtraCommands"
1210        android:description="@string/permdesc_accessLocationExtraCommands"
1211        android:protectionLevel="normal" />
1212
1213    <!-- @SystemApi Allows an application to install a location provider into the Location Manager.
1214    <p>Not for use by third-party applications. -->
1215    <permission android:name="android.permission.INSTALL_LOCATION_PROVIDER"
1216        android:protectionLevel="signature|privileged" />
1217
1218    <!-- @SystemApi @hide Allows HDMI-CEC service to access device and configuration files.
1219         This should only be used by HDMI-CEC service.
1220    -->
1221    <permission android:name="android.permission.HDMI_CEC"
1222        android:protectionLevel="signature|privileged" />
1223
1224    <!-- @SystemApi Allows an application to use location features in hardware,
1225         such as the geofencing api.
1226         <p>Not for use by third-party applications. -->
1227    <permission android:name="android.permission.LOCATION_HARDWARE"
1228        android:protectionLevel="signature|privileged" />
1229    <uses-permission android:name="android.permission.LOCATION_HARDWARE"/>
1230
1231    <!-- @SystemApi Allows an application to create mock location providers for testing.
1232         <p>Protection level: signature
1233         @hide
1234    -->
1235    <permission android:name="android.permission.ACCESS_MOCK_LOCATION"
1236        android:protectionLevel="signature" />
1237
1238    <!-- ======================================= -->
1239    <!-- Permissions for accessing networks -->
1240    <!-- ======================================= -->
1241    <eat-comment />
1242
1243    <!-- Allows applications to open network sockets.
1244         <p>Protection level: normal
1245    -->
1246    <permission android:name="android.permission.INTERNET"
1247        android:description="@string/permdesc_createNetworkSockets"
1248        android:label="@string/permlab_createNetworkSockets"
1249        android:protectionLevel="normal|instant" />
1250
1251    <!-- Allows applications to access information about networks.
1252         <p>Protection level: normal
1253    -->
1254    <permission android:name="android.permission.ACCESS_NETWORK_STATE"
1255        android:description="@string/permdesc_accessNetworkState"
1256        android:label="@string/permlab_accessNetworkState"
1257        android:protectionLevel="normal|instant" />
1258
1259    <!-- Allows applications to access information about Wi-Fi networks.
1260         <p>Protection level: normal
1261    -->
1262    <permission android:name="android.permission.ACCESS_WIFI_STATE"
1263        android:description="@string/permdesc_accessWifiState"
1264        android:label="@string/permlab_accessWifiState"
1265        android:protectionLevel="normal" />
1266
1267    <!-- Allows applications to change Wi-Fi connectivity state.
1268         <p>Protection level: normal
1269    -->
1270    <permission android:name="android.permission.CHANGE_WIFI_STATE"
1271        android:description="@string/permdesc_changeWifiState"
1272        android:label="@string/permlab_changeWifiState"
1273        android:protectionLevel="normal" />
1274
1275    <!-- @SystemApi @hide Allows applications to read Wi-Fi credential.
1276         <p>Not for use by third-party applications. -->
1277    <permission android:name="android.permission.READ_WIFI_CREDENTIAL"
1278        android:protectionLevel="signature|privileged" />
1279
1280    <!-- @SystemApi @hide Allows applications to change tether state and run
1281         tether carrier provisioning.
1282         <p>Not for use by third-party applications. -->
1283    <permission android:name="android.permission.TETHER_PRIVILEGED"
1284        android:protectionLevel="signature|privileged" />
1285
1286    <!-- @SystemApi @hide Allow system apps to receive broadcast
1287         when a wifi network credential is changed.
1288         <p>Not for use by third-party applications. -->
1289    <permission android:name="android.permission.RECEIVE_WIFI_CREDENTIAL_CHANGE"
1290        android:protectionLevel="signature|privileged" />
1291
1292    <!-- @SystemApi @hide Allows an application to modify any wifi configuration, even if created
1293     by another application. Once reconfigured the original creator cannot make any further
1294     modifications.
1295     <p>Not for use by third-party applications. -->
1296    <permission android:name="android.permission.OVERRIDE_WIFI_CONFIG"
1297        android:protectionLevel="signature|privileged" />
1298
1299    <!-- @hide -->
1300    <permission android:name="android.permission.ACCESS_WIMAX_STATE"
1301        android:description="@string/permdesc_accessWimaxState"
1302        android:label="@string/permlab_accessWimaxState"
1303        android:protectionLevel="normal" />
1304
1305    <!-- @hide -->
1306    <permission android:name="android.permission.CHANGE_WIMAX_STATE"
1307        android:description="@string/permdesc_changeWimaxState"
1308        android:label="@string/permlab_changeWimaxState"
1309        android:protectionLevel="normal" />
1310
1311    <!-- Allows applications to act as network scorers. @hide @SystemApi-->
1312    <permission android:name="android.permission.SCORE_NETWORKS"
1313        android:protectionLevel="signature|privileged" />
1314
1315    <!-- Allows applications to request network
1316         recommendations and scores from the NetworkScoreService.
1317         <p>Not for use by third-party applications. @hide -->
1318    <permission android:name="android.permission.REQUEST_NETWORK_SCORES"
1319        android:protectionLevel="signature|setup" />
1320
1321    <!-- Allows network stack services (Connectivity and Wifi) to coordinate
1322         <p>Not for use by third-party or privileged applications.
1323         @hide This should only be used by Connectivity and Wifi Services.
1324    -->
1325    <permission android:name="android.permission.NETWORK_STACK"
1326        android:protectionLevel="signature" />
1327
1328    <!-- Allows Settings and SystemUI to call methods in Networking services
1329         <p>Not for use by third-party or privileged applications.
1330         @hide This should only be used by Settings and SystemUI.
1331    -->
1332    <permission android:name="android.permission.NETWORK_SETTINGS"
1333        android:protectionLevel="signature" />
1334
1335    <!-- #SystemApi @hide Allows applications to access information about LoWPAN interfaces.
1336         <p>Not for use by third-party applications. -->
1337    <permission android:name="android.permission.ACCESS_LOWPAN_STATE"
1338        android:protectionLevel="signature|privileged" />
1339
1340    <!-- #SystemApi @hide Allows applications to change LoWPAN connectivity state.
1341         <p>Not for use by third-party applications. -->
1342    <permission android:name="android.permission.CHANGE_LOWPAN_STATE"
1343        android:protectionLevel="signature|privileged" />
1344
1345    <!-- #SystemApi @hide Allows applications to read LoWPAN credential.
1346         <p>Not for use by third-party applications. -->
1347    <permission android:name="android.permission.READ_LOWPAN_CREDENTIAL"
1348        android:protectionLevel="signature|privileged" />
1349
1350    <!-- #SystemApi @hide Allows a service to register or unregister
1351         new LoWPAN interfaces.
1352         <p>Not for use by third-party applications. -->
1353    <permission android:name="android.permission.MANAGE_LOWPAN_INTERFACES"
1354        android:protectionLevel="signature|privileged" />
1355
1356    <!-- ======================================= -->
1357    <!-- Permissions for short range, peripheral networks -->
1358    <!-- ======================================= -->
1359    <eat-comment />
1360
1361    <!-- Allows applications to connect to paired bluetooth devices.
1362         <p>Protection level: normal
1363    -->
1364    <permission android:name="android.permission.BLUETOOTH"
1365        android:description="@string/permdesc_bluetooth"
1366        android:label="@string/permlab_bluetooth"
1367        android:protectionLevel="normal" />
1368
1369    <!-- Allows applications to discover and pair bluetooth devices.
1370         <p>Protection level: normal
1371    -->
1372    <permission android:name="android.permission.BLUETOOTH_ADMIN"
1373        android:description="@string/permdesc_bluetoothAdmin"
1374        android:label="@string/permlab_bluetoothAdmin"
1375        android:protectionLevel="normal" />
1376
1377    <!-- @SystemApi Allows applications to pair bluetooth devices without user interaction, and to
1378         allow or disallow phonebook access or message access.
1379         This is not available to third party applications. -->
1380    <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
1381        android:protectionLevel="signature|privileged" />
1382
1383    <!-- Control access to email providers exclusively for Bluetooth
1384         @hide
1385    -->
1386    <permission android:name="android.permission.BLUETOOTH_MAP"
1387        android:protectionLevel="signature" />
1388
1389    <!-- Allows bluetooth stack to access files
1390         @hide This should only be used by Bluetooth apk.
1391    -->
1392    <permission android:name="android.permission.BLUETOOTH_STACK"
1393        android:protectionLevel="signature" />
1394
1395    <!-- Allows applications to perform I/O operations over NFC.
1396         <p>Protection level: normal
1397    -->
1398    <permission android:name="android.permission.NFC"
1399        android:description="@string/permdesc_nfc"
1400        android:label="@string/permlab_nfc"
1401        android:protectionLevel="normal" />
1402
1403    <!-- @SystemApi Allows an internal user to use privileged ConnectivityManager APIs.
1404         @hide -->
1405    <permission android:name="android.permission.CONNECTIVITY_INTERNAL"
1406        android:protectionLevel="signature|privileged" />
1407
1408    <!-- @SystemApi Allows an internal user to use restricted Networks.
1409         @hide -->
1410    <permission android:name="android.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS"
1411        android:protectionLevel="signature|privileged" />
1412
1413    <!-- Allows a system application to access hardware packet offload capabilities.
1414         @hide -->
1415    <permission android:name="android.permission.PACKET_KEEPALIVE_OFFLOAD"
1416        android:protectionLevel="signature|privileged" />
1417
1418    <!-- @SystemApi
1419         @hide -->
1420    <permission android:name="android.permission.RECEIVE_DATA_ACTIVITY_CHANGE"
1421        android:protectionLevel="signature|privileged" />
1422
1423    <!-- @SystemApi Allows access to the loop radio (Android@Home mesh network) device.
1424         @hide -->
1425    <permission android:name="android.permission.LOOP_RADIO"
1426        android:protectionLevel="signature|privileged" />
1427
1428    <!-- Allows sending and receiving handover transfer status from Wifi and Bluetooth
1429         @hide -->
1430    <permission android:name="android.permission.NFC_HANDOVER_STATUS"
1431        android:protectionLevel="signature|privileged" />
1432
1433    <!-- ================================== -->
1434    <!-- Permissions for accessing accounts -->
1435    <!-- ================================== -->
1436    <eat-comment />
1437
1438    <!-- Allows access to the list of accounts in the Accounts Service.
1439
1440    <p class="note"><strong>Note:</strong> Beginning with Android 6.0 (API level
1441    23), if an app shares the signature of the authenticator that manages an
1442    account, it does not need <code>"GET_ACCOUNTS"</code> permission to read
1443    information about that account. On Android 5.1 and lower, all apps need
1444    <code>"GET_ACCOUNTS"</code> permission to read information about any
1445    account.</p>
1446
1447    <p>Protection level: dangerous
1448    -->
1449    <permission android:name="android.permission.GET_ACCOUNTS"
1450        android:permissionGroup="android.permission-group.CONTACTS"
1451        android:protectionLevel="dangerous"
1452        android:description="@string/permdesc_getAccounts"
1453        android:label="@string/permlab_getAccounts" />
1454    <uses-permission android:name="android.permission.GET_ACCOUNTS"/>
1455
1456    <!-- @SystemApi Allows applications to call into AccountAuthenticators.
1457    <p>Not for use by third-party applications. -->
1458    <permission android:name="android.permission.ACCOUNT_MANAGER"
1459        android:protectionLevel="signature" />
1460
1461    <!-- ================================== -->
1462    <!-- Permissions for accessing hardware that may effect battery life-->
1463    <!-- ================================== -->
1464    <eat-comment />
1465
1466    <!-- Allows applications to enter Wi-Fi Multicast mode.
1467         <p>Protection level: normal
1468    -->
1469    <permission android:name="android.permission.CHANGE_WIFI_MULTICAST_STATE"
1470        android:description="@string/permdesc_changeWifiMulticastState"
1471        android:label="@string/permlab_changeWifiMulticastState"
1472        android:protectionLevel="normal" />
1473
1474    <!-- Allows access to the vibrator.
1475         <p>Protection level: normal
1476    -->
1477    <permission android:name="android.permission.VIBRATE"
1478        android:label="@string/permlab_vibrate"
1479        android:description="@string/permdesc_vibrate"
1480        android:protectionLevel="normal|instant" />
1481
1482    <!-- Allows using PowerManager WakeLocks to keep processor from sleeping or screen
1483         from dimming.
1484         <p>Protection level: normal
1485    -->
1486    <permission android:name="android.permission.WAKE_LOCK"
1487        android:label="@string/permlab_wakeLock"
1488        android:description="@string/permdesc_wakeLock"
1489        android:protectionLevel="normal|instant" />
1490
1491    <!-- Allows using the device's IR transmitter, if available.
1492         <p>Protection level: normal
1493    -->
1494    <permission android:name="android.permission.TRANSMIT_IR"
1495        android:label="@string/permlab_transmitIr"
1496        android:description="@string/permdesc_transmitIr"
1497        android:protectionLevel="normal" />
1498
1499    <!-- ==================================================== -->
1500    <!-- Permissions related to changing audio settings   -->
1501    <!-- ==================================================== -->
1502    <eat-comment />
1503
1504    <!-- Allows an application to modify global audio settings.
1505         <p>Protection level: normal
1506    -->
1507    <permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"
1508        android:label="@string/permlab_modifyAudioSettings"
1509        android:description="@string/permdesc_modifyAudioSettings"
1510        android:protectionLevel="normal" />
1511
1512    <!-- ================================== -->
1513    <!-- Permissions for accessing hardware -->
1514    <!-- ================================== -->
1515    <eat-comment />
1516
1517    <!-- @SystemApi Allows an application to manage preferences and permissions for USB devices
1518         @hide -->
1519    <permission android:name="android.permission.MANAGE_USB"
1520        android:protectionLevel="signature|privileged" />
1521
1522    <!-- @SystemApi Allows an application to access the MTP USB kernel driver.
1523         For use only by the device side MTP implementation.
1524         @hide -->
1525    <permission android:name="android.permission.ACCESS_MTP"
1526        android:protectionLevel="signature|privileged" />
1527
1528    <!-- @SystemApi Allows access to hardware peripherals.  Intended only for hardware testing.
1529         <p>Not for use by third-party applications.
1530         @hide
1531    -->
1532    <permission android:name="android.permission.HARDWARE_TEST"
1533        android:protectionLevel="signature" />
1534
1535    <!-- @SystemApi Allows access to Broadcast Radio
1536         @hide This is not a third-party API (intended for system apps).-->
1537    <permission android:name="android.permission.ACCESS_BROADCAST_RADIO"
1538        android:protectionLevel="signature|privileged" />
1539
1540    <!-- @deprecated @SystemApi Allows access to FM
1541         @hide This is not a third-party API (intended for system apps).-->
1542    <permission android:name="android.permission.ACCESS_FM_RADIO"
1543        android:protectionLevel="signature|privileged" />
1544
1545    <!-- Allows access to configure network interfaces, configure/use IPSec, etc.
1546         @hide -->
1547    <permission android:name="android.permission.NET_ADMIN"
1548        android:protectionLevel="signature" />
1549
1550    <!-- Allows registration for remote audio playback. @hide -->
1551    <permission android:name="android.permission.REMOTE_AUDIO_PLAYBACK"
1552        android:protectionLevel="signature" />
1553
1554    <!-- @SystemApi Allows TvInputService to access underlying TV input hardware such as
1555         built-in tuners and HDMI-in's.
1556         @hide This should only be used by OEM's TvInputService's.
1557    -->
1558    <permission android:name="android.permission.TV_INPUT_HARDWARE"
1559        android:protectionLevel="signature|privileged" />
1560
1561    <!-- @SystemApi Allows to capture a frame of TV input hardware such as
1562         built-in tuners and HDMI-in's.
1563         @hide <p>Not for use by third-party applications.
1564    -->
1565    <permission android:name="android.permission.CAPTURE_TV_INPUT"
1566        android:protectionLevel="signature|privileged" />
1567
1568    <!-- @hide Allows TvInputService to access DVB device.
1569   <p>Not for use by third-party applications. -->
1570    <permission android:name="android.permission.DVB_DEVICE"
1571        android:protectionLevel="signature|privileged" />
1572
1573    <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by carrier state
1574         @hide <p>Not for use by third-party applications. -->
1575    <permission android:name="android.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE"
1576        android:protectionLevel="signature|privileged" />
1577
1578    <!-- @SystemApi Allows reading and enabling/disabling the OEM unlock allowed by user state
1579         @hide <p>Not for use by third-party applications. -->
1580    <permission android:name="android.permission.MANAGE_USER_OEM_UNLOCK_STATE"
1581        android:protectionLevel="signature|privileged" />
1582
1583    <!-- @SystemApi Allows reading the OEM unlock state
1584         @hide <p>Not for use by third-party applications. -->
1585    <permission android:name="android.permission.READ_OEM_UNLOCK_STATE"
1586        android:protectionLevel="signature|privileged" />
1587
1588    <!-- @hide Allows enabling/disabling OEM unlock
1589   <p>Not for use by third-party applications. -->
1590    <permission android:name="android.permission.OEM_UNLOCK_STATE"
1591        android:protectionLevel="signature" />
1592
1593    <!-- @hide Allows querying state of PersistentDataBlock
1594   <p>Not for use by third-party applications. -->
1595    <permission android:name="android.permission.ACCESS_PDB_STATE"
1596        android:protectionLevel="signature" />
1597
1598    <!-- @hide Allows system update service to notify device owner about pending updates.
1599   <p>Not for use by third-party applications. -->
1600    <permission android:name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE"
1601        android:protectionLevel="signature|privileged" />
1602
1603    <!-- =========================================== -->
1604    <!-- Permissions associated with camera and image capture -->
1605    <!-- =========================================== -->
1606    <eat-comment />
1607
1608    <!-- @SystemApi Allows disabling the transmit-indicator LED that is normally on when
1609         a camera is in use by an application.
1610         @hide -->
1611    <permission android:name="android.permission.CAMERA_DISABLE_TRANSMIT_LED"
1612        android:protectionLevel="signature|privileged" />
1613
1614    <!-- Allows sending the camera service notifications about system-wide events.
1615        @hide -->
1616    <permission android:name="android.permission.CAMERA_SEND_SYSTEM_EVENTS"
1617        android:protectionLevel="signature|privileged" />
1618
1619    <!-- =========================================== -->
1620    <!-- Permissions associated with telephony state -->
1621    <!-- =========================================== -->
1622    <eat-comment />
1623
1624    <!-- @SystemApi Allows modification of the telephony state - power on, mmi, etc.
1625         Does not include placing calls.
1626         <p>Not for use by third-party applications. -->
1627    <permission android:name="android.permission.MODIFY_PHONE_STATE"
1628        android:protectionLevel="signature|privileged" />
1629
1630    <!-- Allows read only access to precise phone state.
1631         @hide Pending API council approval -->
1632    <permission android:name="android.permission.READ_PRECISE_PHONE_STATE"
1633        android:protectionLevel="signature|privileged" />
1634
1635    <!-- @SystemApi Allows read access to privileged phone state.
1636         @hide Used internally. -->
1637    <permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"
1638        android:protectionLevel="signature|privileged" />
1639
1640    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1641         PhoneAccount#CAPABILITY_SIM_SUBSCRIPTION. This capability indicates that the PhoneAccount
1642         corresponds to a device SIM.
1643         @hide -->
1644    <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION"
1645        android:protectionLevel="signature|privileged" />
1646
1647    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1648         PhoneAccount#CAPABILITY_CALL_PROVIDER.
1649         @hide -->
1650    <permission android:name="android.permission.REGISTER_CALL_PROVIDER"
1651        android:protectionLevel="signature|privileged" />
1652
1653    <!-- @SystemApi Protects the ability to register any PhoneAccount with
1654         PhoneAccount#CAPABILITY_CONNECTION_MANAGER
1655         @hide -->
1656    <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER"
1657        android:protectionLevel="signature|privileged" />
1658
1659    <!-- Must be required by a {@link android.telecom.InCallService},
1660         to ensure that only the system can bind to it.
1661         <p>Protection level: signature|privileged
1662    -->
1663    <permission android:name="android.permission.BIND_INCALL_SERVICE"
1664        android:protectionLevel="signature|privileged" />
1665
1666    <!-- Must be required by a link {@link android.telephony.VisualVoicemailService} to ensure that
1667         only the system can bind to it.
1668         <p>Protection level: signature|privileged
1669    -->
1670    <permission
1671      android:name="android.permission.BIND_VISUAL_VOICEMAIL_SERVICE"
1672      android:protectionLevel="signature|privileged"/>
1673
1674    <!-- Must be required by a {@link android.telecom.CallScreeningService},
1675         to ensure that only the system can bind to it.
1676         <p>Protection level: signature|privileged
1677    -->
1678    <permission android:name="android.permission.BIND_SCREENING_SERVICE"
1679        android:protectionLevel="signature|privileged" />
1680
1681    <!-- Must be required by a {@link android.telecom.ConnectionService},
1682         to ensure that only the system can bind to it.
1683         @deprecated {@link android.telecom.ConnectionService}s should require
1684                 android.permission.BIND_TELECOM_CONNECTION_SERVICE instead.
1685         @SystemApi
1686         @hide -->
1687    <permission android:name="android.permission.BIND_CONNECTION_SERVICE"
1688        android:protectionLevel="signature|privileged" />
1689
1690    <!-- Must be required by a {@link android.telecom.ConnectionService},
1691         to ensure that only the system can bind to it.
1692         <p>Protection level: signature|privileged
1693    -->
1694    <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE"
1695        android:protectionLevel="signature|privileged" />
1696
1697    <!-- @SystemApi Allows an application to control the in-call experience.
1698         @hide -->
1699    <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE"
1700        android:protectionLevel="signature|privileged" />
1701
1702    <!-- Allows an application to receive STK related commands.
1703         @hide -->
1704    <permission android:name="android.permission.RECEIVE_STK_COMMANDS"
1705        android:protectionLevel="signature|privileged" />
1706
1707      <!-- Allows an application to send EMBMS download intents to apps
1708           @hide -->
1709    <permission android:name="android.permission.SEND_EMBMS_INTENTS"
1710        android:protectionLevel="signature|privileged" />
1711
1712    <!-- Must be required by an ImsService to ensure that only the
1713         system can bind to it.
1714         <p>Protection level: signature|privileged
1715         @SystemApi
1716         @hide
1717    -->
1718    <permission android:name="android.permission.BIND_IMS_SERVICE"
1719        android:protectionLevel="signature|privileged" />
1720
1721    <!-- Allows an application to manage embedded subscriptions (those on a eUICC) through
1722         EuiccManager APIs.
1723         <p>Protection level: signature|privileged|development
1724         TODO(b/35851809): Mark this as a SystemApi and remove com. prefix.
1725         @hide -->
1726    <permission android:name="com.android.permission.WRITE_EMBEDDED_SUBSCRIPTIONS"
1727                android:protectionLevel="signature|privileged|development" />
1728
1729    <!-- Must be required by an EuiccService to ensure that only the system can bind to it.
1730         <p>Protection level: signature
1731         TODO(b/35851809): Mark this as a SystemApi and remove com. prefix.
1732         @hide -->
1733    <permission android:name="com.android.permission.BIND_EUICC_SERVICE"
1734                android:protectionLevel="signature" />
1735
1736    <!-- ================================== -->
1737    <!-- Permissions for sdcard interaction -->
1738    <!-- ================================== -->
1739    <eat-comment />
1740
1741    <!-- @SystemApi Allows an application to write to internal media storage
1742         @hide  -->
1743    <permission android:name="android.permission.WRITE_MEDIA_STORAGE"
1744        android:protectionLevel="signature|privileged" />
1745
1746    <!-- Allows an application to manage access to documents, usually as part
1747         of a document picker.
1748         <p>This permission should <em>only</em> be requested by the platform
1749         document management app.  This permission cannot be granted to
1750         third-party apps.
1751         <p>Protection level: signature
1752    -->
1753    <permission android:name="android.permission.MANAGE_DOCUMENTS"
1754        android:protectionLevel="signature" />
1755
1756    <!-- @hide Allows an application to cache content.
1757         <p>Not for use by third-party applications.
1758         <p>Protection level: signature
1759    -->
1760    <permission android:name="android.permission.CACHE_CONTENT"
1761        android:protectionLevel="signature" />
1762
1763    <!-- @SystemApi @hide
1764         Allows an application to aggressively allocate disk space.
1765         <p>Not for use by third-party applications.
1766    -->
1767    <permission android:name="android.permission.ALLOCATE_AGGRESSIVE"
1768        android:protectionLevel="signature|privileged" />
1769
1770    <!-- ================================== -->
1771    <!-- Permissions for screenlock         -->
1772    <!-- ================================== -->
1773    <eat-comment />
1774
1775    <!-- Allows applications to disable the keyguard if it is not secure.
1776         <p>Protection level: normal
1777    -->
1778    <permission android:name="android.permission.DISABLE_KEYGUARD"
1779        android:description="@string/permdesc_disableKeyguard"
1780        android:label="@string/permlab_disableKeyguard"
1781        android:protectionLevel="normal" />
1782
1783    <!-- ================================== -->
1784    <!-- Permissions to access other installed applications  -->
1785    <!-- ================================== -->
1786    <eat-comment />
1787
1788    <!-- @deprecated No longer enforced. -->
1789    <permission android:name="android.permission.GET_TASKS"
1790        android:label="@string/permlab_getTasks"
1791        android:description="@string/permdesc_getTasks"
1792        android:protectionLevel="normal" />
1793
1794    <!-- New version of GET_TASKS that apps can request, since GET_TASKS doesn't really
1795         give access to task information.  We need this new one because there are
1796         many existing apps that use add libraries and such that have validation
1797         code to ensure the app has requested the GET_TASKS permission by seeing
1798         if it has been granted the permission...  if it hasn't, it kills the app
1799         with a message about being upset.  So we need to have it continue to look
1800         like the app is getting that permission, even though it will never be
1801         checked, and new privileged apps can now request this one for real access.
1802         @hide
1803         @SystemApi -->
1804    <permission android:name="android.permission.REAL_GET_TASKS"
1805        android:protectionLevel="signature|privileged" />
1806
1807    <!-- Allows an application to start a task from a ActivityManager#RecentTaskInfo.
1808         @hide -->
1809    <permission android:name="android.permission.START_TASKS_FROM_RECENTS"
1810        android:protectionLevel="signature|privileged" />
1811
1812    <!-- @SystemApi @hide Allows an application to call APIs that allow it to do interactions
1813         across the users on the device, using singleton services and
1814         user-targeted broadcasts.  This permission is not available to
1815         third party applications. -->
1816    <permission android:name="android.permission.INTERACT_ACROSS_USERS"
1817        android:protectionLevel="signature|privileged|development" />
1818
1819    <!-- @SystemApi Fuller form of {@link android.Manifest.permission#INTERACT_ACROSS_USERS}
1820         that removes restrictions on where broadcasts can be sent and allows other
1821         types of interactions
1822         @hide -->
1823    <permission android:name="android.permission.INTERACT_ACROSS_USERS_FULL"
1824        android:protectionLevel="signature|installer" />
1825
1826    <!-- @SystemApi @hide Allows an application to call APIs that allow it to query and manage
1827         users on the device. This permission is not available to
1828         third party applications. -->
1829    <permission android:name="android.permission.MANAGE_USERS"
1830        android:protectionLevel="signature|privileged" />
1831
1832    <!-- @hide Allows an application to create, remove users and get the list of
1833         users on the device. Applications holding this permission can only create restricted,
1834         guest, managed, demo, and ephemeral users. For creating other kind of users,
1835         {@link android.Manifest.permission#MANAGE_USERS} is needed.
1836         This permission is not available to third party applications. -->
1837    <permission android:name="android.permission.CREATE_USERS"
1838        android:protectionLevel="signature" />
1839
1840    <!-- @hide Allows an application to set the profile owners and the device owner.
1841         This permission is not available to third party applications.-->
1842    <permission android:name="android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS"
1843        android:protectionLevel="signature"
1844        android:label="@string/permlab_manageProfileAndDeviceOwners"
1845        android:description="@string/permdesc_manageProfileAndDeviceOwners" />
1846
1847    <!-- Allows an application to get full detailed information about
1848         recently running tasks, with full fidelity to the real state.
1849         @hide -->
1850    <permission android:name="android.permission.GET_DETAILED_TASKS"
1851        android:protectionLevel="signature" />
1852
1853    <!-- Allows an application to change the Z-order of tasks.
1854         <p>Protection level: normal
1855    -->
1856    <permission android:name="android.permission.REORDER_TASKS"
1857        android:label="@string/permlab_reorderTasks"
1858        android:description="@string/permdesc_reorderTasks"
1859        android:protectionLevel="normal" />
1860
1861    <!-- @hide Allows an application to change to remove/kill tasks -->
1862    <permission android:name="android.permission.REMOVE_TASKS"
1863        android:protectionLevel="signature" />
1864
1865    <!-- @SystemApi @hide Allows an application to create/manage/remove stacks -->
1866    <permission android:name="android.permission.MANAGE_ACTIVITY_STACKS"
1867        android:protectionLevel="signature|privileged" />
1868
1869    <!-- @SystemApi @hide Allows an application to embed other activities -->
1870    <permission android:name="android.permission.ACTIVITY_EMBEDDING"
1871                android:protectionLevel="signature|privileged" />
1872
1873    <!-- Allows an application to start any activity, regardless of permission
1874         protection or exported state.
1875         @hide -->
1876    <permission android:name="android.permission.START_ANY_ACTIVITY"
1877        android:protectionLevel="signature" />
1878
1879    <!-- @deprecated The {@link android.app.ActivityManager#restartPackage}
1880        API is no longer supported. -->
1881    <permission android:name="android.permission.RESTART_PACKAGES"
1882        android:label="@string/permlab_killBackgroundProcesses"
1883        android:description="@string/permdesc_killBackgroundProcesses"
1884        android:protectionLevel="normal" />
1885
1886    <!-- Allows an application to call
1887        {@link android.app.ActivityManager#killBackgroundProcesses}.
1888         <p>Protection level: normal
1889    -->
1890    <permission android:name="android.permission.KILL_BACKGROUND_PROCESSES"
1891        android:label="@string/permlab_killBackgroundProcesses"
1892        android:description="@string/permdesc_killBackgroundProcesses"
1893        android:protectionLevel="normal" />
1894
1895    <!-- @SystemApi @hide Allows an application to query process states and current
1896         OOM adjustment scores.
1897         <p>Not for use by third-party applications. -->
1898    <permission android:name="android.permission.GET_PROCESS_STATE_AND_OOM_SCORE"
1899        android:protectionLevel="signature|privileged|development" />
1900
1901    <!-- Allows use of PendingIntent.getIntent().
1902         @hide -->
1903    <permission android:name="android.permission.GET_INTENT_SENDER_INTENT"
1904        android:protectionLevel="signature" />
1905
1906    <!-- ================================== -->
1907    <!-- Permissions affecting the display of other applications  -->
1908    <!-- ================================== -->
1909    <eat-comment />
1910
1911    <!-- Allows an app to create windows using the type
1912         {@link android.view.WindowManager.LayoutParams#TYPE_APPLICATION_OVERLAY},
1913         shown on top of all other apps.  Very few apps
1914         should use this permission; these windows are intended for
1915         system-level interaction with the user.
1916
1917         <p class="note"><strong>Note:</strong> If the app
1918         targets API level 23 or higher, the app user must explicitly grant
1919         this permission to the app through a permission management screen. The app requests
1920         the user's approval by sending an intent with action
1921         {@link android.provider.Settings#ACTION_MANAGE_OVERLAY_PERMISSION}.
1922         The app can check whether it has this authorization by calling
1923         {@link android.provider.Settings#canDrawOverlays
1924         Settings.canDrawOverlays()}.
1925         <p>Protection level: signature -->
1926    <permission android:name="android.permission.SYSTEM_ALERT_WINDOW"
1927        android:label="@string/permlab_systemAlertWindow"
1928        android:description="@string/permdesc_systemAlertWindow"
1929        android:protectionLevel="signature|preinstalled|appop|pre23|development" />
1930
1931    <!-- @deprecated Use {@link android.Manifest.permission#REQUEST_COMPANION_RUN_IN_BACKGROUND}
1932         @hide
1933    -->
1934    <permission android:name="android.permission.RUN_IN_BACKGROUND"
1935        android:label="@string/permlab_runInBackground"
1936        android:description="@string/permdesc_runInBackground"
1937        android:protectionLevel="signature" />
1938
1939    <!-- @deprecated Use
1940        {@link android.Manifest.permission#REQUEST_COMPANION_USE_DATA_IN_BACKGROUND}
1941         @hide
1942    -->
1943    <permission android:name="android.permission.USE_DATA_IN_BACKGROUND"
1944        android:label="@string/permlab_useDataInBackground"
1945        android:description="@string/permdesc_useDataInBackground"
1946        android:protectionLevel="signature" />
1947
1948    <!-- @hide Allows an application to set display offsets for the screen.
1949         This permission is not available to third party applications. -->
1950    <permission android:name="android.permission.SET_DISPLAY_OFFSET"
1951        android:protectionLevel="signature|privileged" />
1952
1953    <!-- Allows a companion app to run in the background.
1954         <p>Protection level: normal
1955    -->
1956    <permission android:name="android.permission.REQUEST_COMPANION_RUN_IN_BACKGROUND"
1957                android:label="@string/permlab_runInBackground"
1958                android:description="@string/permdesc_runInBackground"
1959                android:protectionLevel="normal" />
1960
1961    <!-- Allows a companion app to use data in the background.
1962         <p>Protection level: normal
1963    -->
1964    <permission android:name="android.permission.REQUEST_COMPANION_USE_DATA_IN_BACKGROUND"
1965                android:label="@string/permlab_useDataInBackground"
1966                android:description="@string/permdesc_useDataInBackground"
1967                android:protectionLevel="normal" />
1968
1969
1970    <!-- ================================== -->
1971    <!-- Permissions affecting the system wallpaper -->
1972    <!-- ================================== -->
1973    <eat-comment />
1974
1975    <!-- Allows applications to set the wallpaper.
1976         <p>Protection level: normal
1977     -->
1978    <permission android:name="android.permission.SET_WALLPAPER"
1979        android:label="@string/permlab_setWallpaper"
1980        android:description="@string/permdesc_setWallpaper"
1981        android:protectionLevel="normal" />
1982
1983    <!-- Allows applications to set the wallpaper hints.
1984         <p>Protection level: normal
1985    -->
1986    <permission android:name="android.permission.SET_WALLPAPER_HINTS"
1987        android:label="@string/permlab_setWallpaperHints"
1988        android:description="@string/permdesc_setWallpaperHints"
1989        android:protectionLevel="normal" />
1990
1991    <!-- Allow the app to read the system wallpaper image without
1992        holding the READ_EXTERNAL_STORAGE permission.
1993        <p>Not for use by third-party applications.
1994        @hide
1995        @SystemApi
1996    -->
1997    <permission android:name="android.permission.READ_WALLPAPER_INTERNAL"
1998        android:protectionLevel="signature|privileged" />
1999
2000    <!-- ============================================ -->
2001    <!-- Permissions for changing the system clock -->
2002    <!-- ============================================ -->
2003    <eat-comment />
2004
2005    <!-- @SystemApi Allows applications to set the system time.
2006    <p>Not for use by third-party applications. -->
2007    <permission android:name="android.permission.SET_TIME"
2008        android:protectionLevel="signature|privileged" />
2009
2010    <!-- Allows applications to set the system time zone.
2011         <p>Not for use by third-party applications.
2012    -->
2013    <permission android:name="android.permission.SET_TIME_ZONE"
2014        android:label="@string/permlab_setTimeZone"
2015        android:description="@string/permdesc_setTimeZone"
2016        android:protectionLevel="signature|privileged" />
2017
2018    <!-- ==================================================== -->
2019    <!-- Permissions related to changing status bar   -->
2020    <!-- ==================================================== -->
2021    <eat-comment />
2022
2023    <!-- Allows an application to expand or collapse the status bar.
2024         <p>Protection level: normal
2025    -->
2026    <permission android:name="android.permission.EXPAND_STATUS_BAR"
2027        android:label="@string/permlab_expandStatusBar"
2028        android:description="@string/permdesc_expandStatusBar"
2029        android:protectionLevel="normal" />
2030
2031    <!-- ============================================================== -->
2032    <!-- Permissions related to adding/removing shortcuts from Launcher -->
2033    <!-- ============================================================== -->
2034    <eat-comment />
2035
2036    <!-- Allows an application to install a shortcut in Launcher.
2037         <p>Protection level: normal
2038    -->
2039    <permission android:name="com.android.launcher.permission.INSTALL_SHORTCUT"
2040        android:label="@string/permlab_install_shortcut"
2041        android:description="@string/permdesc_install_shortcut"
2042        android:protectionLevel="normal"/>
2043
2044    <!--This permission is no longer supported.
2045    -->
2046    <permission android:name="com.android.launcher.permission.UNINSTALL_SHORTCUT"
2047        android:label="@string/permlab_uninstall_shortcut"
2048        android:description="@string/permdesc_uninstall_shortcut"
2049        android:protectionLevel="normal"/>
2050
2051    <!-- ==================================================== -->
2052    <!-- Permissions related to accessing sync settings   -->
2053    <!-- ==================================================== -->
2054    <eat-comment />
2055
2056    <!-- Allows applications to read the sync settings.
2057         <p>Protection level: normal
2058    -->
2059    <permission android:name="android.permission.READ_SYNC_SETTINGS"
2060        android:description="@string/permdesc_readSyncSettings"
2061        android:label="@string/permlab_readSyncSettings"
2062        android:protectionLevel="normal" />
2063
2064    <!-- Allows applications to write the sync settings.
2065         <p>Protection level: normal
2066    -->
2067    <permission android:name="android.permission.WRITE_SYNC_SETTINGS"
2068        android:description="@string/permdesc_writeSyncSettings"
2069        android:label="@string/permlab_writeSyncSettings"
2070        android:protectionLevel="normal" />
2071
2072    <!-- Allows applications to read the sync stats.
2073         <p>Protection level: normal
2074    -->
2075    <permission android:name="android.permission.READ_SYNC_STATS"
2076        android:description="@string/permdesc_readSyncStats"
2077        android:label="@string/permlab_readSyncStats"
2078        android:protectionLevel="normal" />
2079
2080    <!-- ============================================ -->
2081    <!-- Permissions for low-level system interaction -->
2082    <!-- ============================================ -->
2083    <eat-comment />
2084
2085    <!-- @SystemApi @hide Change the screen compatibility mode of applications -->
2086    <permission android:name="android.permission.SET_SCREEN_COMPATIBILITY"
2087        android:protectionLevel="signature" />
2088
2089    <!-- @SystemApi Allows an application to modify the current configuration, such
2090         as locale. -->
2091    <permission android:name="android.permission.CHANGE_CONFIGURATION"
2092        android:protectionLevel="signature|privileged|development" />
2093
2094    <!-- Allows an application to read or write the system settings.
2095
2096        <p class="note"><strong>Note:</strong> If the app targets API level 23
2097        or higher, the app user
2098        must explicitly grant this permission to the app through a permission management screen.
2099        The app requests the user's approval by sending an intent with action
2100        {@link android.provider.Settings#ACTION_MANAGE_WRITE_SETTINGS}. The app
2101        can check whether it has this authorization by calling {@link
2102        android.provider.Settings.System#canWrite Settings.System.canWrite()}.
2103
2104        <p>Protection level: signature
2105    -->
2106    <permission android:name="android.permission.WRITE_SETTINGS"
2107        android:label="@string/permlab_writeSettings"
2108        android:description="@string/permdesc_writeSettings"
2109        android:protectionLevel="signature|preinstalled|appop|pre23" />
2110
2111    <!-- @SystemApi Allows an application to modify the Google service map.
2112    <p>Not for use by third-party applications. -->
2113    <permission android:name="android.permission.WRITE_GSERVICES"
2114        android:protectionLevel="signature|privileged" />
2115
2116    <!-- @SystemApi Allows an application to call
2117        {@link android.app.ActivityManager#forceStopPackage}.
2118        @hide -->
2119    <permission android:name="android.permission.FORCE_STOP_PACKAGES"
2120        android:protectionLevel="signature|privileged" />
2121
2122    <!-- @SystemApi @hide Allows an application to retrieve the content of the active window
2123         An active window is the window that has fired an accessibility event. -->
2124    <permission android:name="android.permission.RETRIEVE_WINDOW_CONTENT"
2125        android:protectionLevel="signature|privileged" />
2126
2127    <!-- @SystemApi Modify the global animation scaling factor.
2128    <p>Not for use by third-party applications. -->
2129    <permission android:name="android.permission.SET_ANIMATION_SCALE"
2130        android:protectionLevel="signature|privileged|development" />
2131
2132    <!-- @deprecated This functionality will be removed in the future; please do
2133         not use. Allow an application to make its activities persistent. -->
2134    <permission android:name="android.permission.PERSISTENT_ACTIVITY"
2135        android:label="@string/permlab_persistentActivity"
2136        android:description="@string/permdesc_persistentActivity"
2137        android:protectionLevel="normal" />
2138
2139    <!-- Allows an application to find out the space used by any package.
2140         <p>Protection level: normal
2141    -->
2142    <permission android:name="android.permission.GET_PACKAGE_SIZE"
2143        android:label="@string/permlab_getPackageSize"
2144        android:description="@string/permdesc_getPackageSize"
2145        android:protectionLevel="normal" />
2146
2147    <!-- @deprecated No longer useful, see
2148         {@link android.content.pm.PackageManager#addPackageToPreferred}
2149         for details. -->
2150    <permission android:name="android.permission.SET_PREFERRED_APPLICATIONS"
2151        android:protectionLevel="signature|verifier" />
2152
2153    <!-- Allows an application to receive the
2154         {@link android.content.Intent#ACTION_BOOT_COMPLETED} that is
2155         broadcast after the system finishes booting.  If you don't
2156         request this permission, you will not receive the broadcast at
2157         that time.  Though holding this permission does not have any
2158         security implications, it can have a negative impact on the
2159         user experience by increasing the amount of time it takes the
2160         system to start and allowing applications to have themselves
2161         running without the user being aware of them.  As such, you must
2162         explicitly declare your use of this facility to make that visible
2163         to the user.
2164         <p>Protection level: normal
2165    -->
2166    <permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"
2167        android:label="@string/permlab_receiveBootCompleted"
2168        android:description="@string/permdesc_receiveBootCompleted"
2169        android:protectionLevel="normal" />
2170
2171    <!-- Allows an application to broadcast sticky intents.  These are
2172         broadcasts whose data is held by the system after being finished,
2173         so that clients can quickly retrieve that data without having
2174         to wait for the next broadcast.
2175         <p>Protection level: normal
2176    -->
2177    <permission android:name="android.permission.BROADCAST_STICKY"
2178        android:label="@string/permlab_broadcastSticky"
2179        android:description="@string/permdesc_broadcastSticky"
2180        android:protectionLevel="normal" />
2181
2182    <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
2183    <p>Not for use by third-party applications.-->
2184    <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
2185        android:protectionLevel="signature|privileged" />
2186
2187    <!-- @SystemApi Allows formatting file systems for removable storage.
2188    <p>Not for use by third-party applications. -->
2189    <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
2190        android:protectionLevel="signature|privileged" />
2191
2192    <!-- @hide -->
2193    <permission android:name="android.permission.STORAGE_INTERNAL"
2194        android:protectionLevel="signature" />
2195
2196    <!-- Allows access to ASEC non-destructive API calls
2197         @hide  -->
2198    <permission android:name="android.permission.ASEC_ACCESS"
2199        android:protectionLevel="signature" />
2200
2201    <!-- Allows creation of ASEC volumes
2202         @hide  -->
2203    <permission android:name="android.permission.ASEC_CREATE"
2204        android:protectionLevel="signature" />
2205
2206    <!-- Allows destruction of ASEC volumes
2207         @hide  -->
2208    <permission android:name="android.permission.ASEC_DESTROY"
2209        android:protectionLevel="signature" />
2210
2211    <!-- Allows mount / unmount of ASEC volumes
2212         @hide  -->
2213    <permission android:name="android.permission.ASEC_MOUNT_UNMOUNT"
2214        android:protectionLevel="signature" />
2215
2216    <!-- Allows rename of ASEC volumes
2217         @hide  -->
2218    <permission android:name="android.permission.ASEC_RENAME"
2219        android:protectionLevel="signature" />
2220
2221    <!-- @SystemApi Allows applications to write the apn settings.
2222    <p>Not for use by third-party applications. -->
2223    <permission android:name="android.permission.WRITE_APN_SETTINGS"
2224        android:protectionLevel="signature|privileged" />
2225
2226    <!-- Allows applications to change network connectivity state.
2227         <p>Protection level: normal
2228    -->
2229    <permission android:name="android.permission.CHANGE_NETWORK_STATE"
2230        android:description="@string/permdesc_changeNetworkState"
2231        android:label="@string/permlab_changeNetworkState"
2232        android:protectionLevel="normal" />
2233
2234    <!-- Allows an application to clear the caches of all installed
2235         applications on the device.
2236         <p>Protection level: signature|privileged
2237    -->
2238    <permission android:name="android.permission.CLEAR_APP_CACHE"
2239        android:protectionLevel="signature|privileged" />
2240
2241    <!-- @SystemApi Allows an application to use any media decoder when decoding for playback
2242         @hide -->
2243    <permission android:name="android.permission.ALLOW_ANY_CODEC_FOR_PLAYBACK"
2244        android:protectionLevel="signature|privileged" />
2245
2246    <!-- @SystemApi Allows an application to install and/or uninstall CA certificates on
2247         behalf of the user.
2248         @hide -->
2249    <permission android:name="android.permission.MANAGE_CA_CERTIFICATES"
2250        android:protectionLevel="signature|privileged" />
2251
2252    <!-- @SystemApi Allows an application to do certain operations needed for
2253         interacting with the recovery (system update) system.
2254         @hide -->
2255    <permission android:name="android.permission.RECOVERY"
2256        android:protectionLevel="signature|privileged" />
2257
2258    <!-- Allows the system to bind to an application's task services
2259         @hide -->
2260    <permission android:name="android.permission.BIND_JOB_SERVICE"
2261        android:protectionLevel="signature" />
2262    <uses-permission android:name="android.permission.BIND_JOB_SERVICE"/>
2263
2264    <!-- Allows an application to initiate configuration updates
2265         <p>An application requesting this permission is responsible for
2266         verifying the source and integrity of any update before passing
2267         it off to the various individual installer components
2268         @hide -->
2269    <permission android:name="android.permission.UPDATE_CONFIG"
2270        android:protectionLevel="signature|privileged" />
2271
2272    <!-- Allows a time zone rule updater application to request
2273         the system installs / uninstalls timezone rules.
2274         <p>An application requesting this permission is responsible for
2275         verifying the source and integrity of the update before passing
2276         it off to the installer components.
2277         @SystemApi @hide -->
2278    <permission android:name="android.permission.UPDATE_TIME_ZONE_RULES"
2279        android:protectionLevel="signature|privileged" />
2280
2281    <!-- Must be required by a time zone rule updater application,
2282         to ensure that only the system can trigger it.
2283         @hide -->
2284    <permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"
2285        android:protectionLevel="signature" />
2286    <uses-permission android:name="android.permission.TRIGGER_TIME_ZONE_RULES_CHECK"/>
2287
2288    <!-- Allows the system to reset throttling in shortcut manager.
2289         @hide -->
2290    <permission android:name="android.permission.RESET_SHORTCUT_MANAGER_THROTTLING"
2291        android:protectionLevel="signature" />
2292
2293    <!-- Allows the system to bind to the discovered Network Recommendation Service.
2294         @SystemApi @hide -->
2295    <permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"
2296        android:protectionLevel="signature" />
2297    <uses-permission android:name="android.permission.BIND_NETWORK_RECOMMENDATION_SERVICE"/>
2298
2299    <!-- Allows an application to enable, disable and change priority of
2300         runtime resource overlays.
2301         @hide -->
2302    <permission android:name="android.permission.CHANGE_OVERLAY_PACKAGES"
2303        android:protectionLevel="signature|privileged" />
2304
2305    <!-- ========================================= -->
2306    <!-- Permissions for special development tools -->
2307    <!-- ========================================= -->
2308    <eat-comment />
2309
2310    <!-- @SystemApi Allows an application to read or write the secure system settings.
2311    <p>Not for use by third-party applications. -->
2312    <permission android:name="android.permission.WRITE_SECURE_SETTINGS"
2313        android:protectionLevel="signature|privileged|development" />
2314
2315    <!-- @SystemApi Allows an application to retrieve state dump information from system services.
2316    <p>Not for use by third-party applications. -->
2317    <permission android:name="android.permission.DUMP"
2318        android:protectionLevel="signature|privileged|development" />
2319
2320    <!-- @SystemApi Allows an application to read the low-level system log files.
2321    <p>Not for use by third-party applications, because
2322    Log entries can contain the user's private information. -->
2323    <permission android:name="android.permission.READ_LOGS"
2324        android:protectionLevel="signature|privileged|development" />
2325
2326    <!-- @SystemApi Configure an application for debugging.
2327    <p>Not for use by third-party applications. -->
2328    <permission android:name="android.permission.SET_DEBUG_APP"
2329        android:protectionLevel="signature|privileged|development" />
2330
2331    <!-- @SystemApi Allows an application to set the maximum number of (not needed)
2332         application processes that can be running.
2333         <p>Not for use by third-party applications. -->
2334    <permission android:name="android.permission.SET_PROCESS_LIMIT"
2335        android:protectionLevel="signature|privileged|development" />
2336
2337    <!-- @SystemApi Allows an application to control whether activities are immediately
2338         finished when put in the background.
2339         <p>Not for use by third-party applications. -->
2340    <permission android:name="android.permission.SET_ALWAYS_FINISH"
2341        android:protectionLevel="signature|privileged|development" />
2342
2343    <!-- @SystemApi Allow an application to request that a signal be sent to all persistent processes.
2344    <p>Not for use by third-party applications. -->
2345    <permission android:name="android.permission.SIGNAL_PERSISTENT_PROCESSES"
2346        android:protectionLevel="signature|privileged|development" />
2347
2348    <!-- ==================================== -->
2349    <!-- Private permissions                  -->
2350    <!-- ==================================== -->
2351    <eat-comment />
2352
2353    <!-- @SystemApi Allows access to the list of accounts in the Accounts Service. -->
2354    <permission android:name="android.permission.GET_ACCOUNTS_PRIVILEGED"
2355        android:protectionLevel="signature|privileged" />
2356
2357    <!-- Allows but does not guarantee access to user passwords at the conclusion of add account
2358    @hide -->
2359    <permission android:name="android.permission.GET_PASSWORD"
2360        android:protectionLevel="signature" />
2361
2362    <!-- @SystemApi Allows applications to RW to diagnostic resources.
2363    <p>Not for use by third-party applications. -->
2364    <permission android:name="android.permission.DIAGNOSTIC"
2365        android:protectionLevel="signature" />
2366
2367    <!-- @SystemApi Allows an application to open, close, or disable the status bar
2368         and its icons.
2369         <p>Not for use by third-party applications. -->
2370    <permission android:name="android.permission.STATUS_BAR"
2371        android:protectionLevel="signature|privileged" />
2372
2373    <!-- Allows an application to be the status bar.  Currently used only by SystemUI.apk
2374    @hide -->
2375    <permission android:name="android.permission.STATUS_BAR_SERVICE"
2376        android:protectionLevel="signature" />
2377
2378    <!-- Allows an application to bind to third party quick settings tiles.
2379         <p>Should only be requested by the System, should be required by
2380         TileService declarations.-->
2381    <permission android:name="android.permission.BIND_QUICK_SETTINGS_TILE"
2382        android:protectionLevel="signature" />
2383
2384    <!-- @SystemApi Allows an application to force a BACK operation on whatever is the
2385         top activity.
2386         <p>Not for use by third-party applications.
2387         @hide
2388    -->
2389    <permission android:name="android.permission.FORCE_BACK"
2390        android:protectionLevel="signature" />
2391
2392    <!-- @SystemApi Allows an application to update device statistics.
2393    <p>Not for use by third-party applications. -->
2394    <permission android:name="android.permission.UPDATE_DEVICE_STATS"
2395        android:protectionLevel="signature|privileged" />
2396
2397    <!-- @SystemApi @hide Allows an application to collect battery statistics -->
2398    <permission android:name="android.permission.GET_APP_OPS_STATS"
2399        android:protectionLevel="signature|privileged|development" />
2400
2401    <!-- @SystemApi Allows an application to update application operation statistics. Not for
2402         use by third party apps.
2403         @hide -->
2404    <permission android:name="android.permission.UPDATE_APP_OPS_STATS"
2405        android:protectionLevel="signature|privileged|installer" />
2406
2407    <!-- @SystemApi Allows an application to update the user app op restrictions.
2408         Not for use by third party apps.
2409         @hide -->
2410    <permission android:name="android.permission.MANAGE_APP_OPS_RESTRICTIONS"
2411        android:protectionLevel="signature|installer" />
2412
2413    <!-- @SystemApi Allows an application to open windows that are for use by parts
2414         of the system user interface.
2415         <p>Not for use by third-party applications.
2416         @hide
2417    -->
2418    <permission android:name="android.permission.INTERNAL_SYSTEM_WINDOW"
2419        android:protectionLevel="signature" />
2420
2421    <!-- @SystemApi Allows an application to use
2422         {@link android.view.WindowManager.LayoutsParams#PRIVATE_FLAG_HIDE_NON_SYSTEM_OVERLAY_WINDOWS}
2423         to hide non-system-overlay windows.
2424         <p>Not for use by third-party applications.
2425         @hide
2426    -->
2427    <permission android:name="android.permission.HIDE_NON_SYSTEM_OVERLAY_WINDOWS"
2428                android:protectionLevel="signature|installer" />
2429
2430    <!-- @SystemApi Allows an application to manage (create, destroy,
2431         Z-order) application tokens in the window manager.
2432         <p>Not for use by third-party applications.
2433         @hide
2434    -->
2435    <permission android:name="android.permission.MANAGE_APP_TOKENS"
2436        android:protectionLevel="signature" />
2437
2438    <!-- Allows System UI to register listeners for events from Window Manager.
2439         @hide -->
2440    <permission android:name="android.permission.REGISTER_WINDOW_MANAGER_LISTENERS"
2441        android:protectionLevel="signature" />
2442
2443    <!-- @hide Allows the application to temporarily freeze the screen for a
2444         full-screen transition. -->
2445    <permission android:name="android.permission.FREEZE_SCREEN"
2446        android:protectionLevel="signature" />
2447
2448    <!-- @SystemApi Allows an application to inject user events (keys, touch, trackball)
2449         into the event stream and deliver them to ANY window.  Without this
2450         permission, you can only deliver events to windows in your own process.
2451         <p>Not for use by third-party applications.
2452         @hide
2453    -->
2454    <permission android:name="android.permission.INJECT_EVENTS"
2455        android:protectionLevel="signature" />
2456
2457    <!-- @hide Allows an application to register an input filter which filters the stream
2458         of user events (keys, touch, trackball) before they are dispatched to any window. -->
2459    <permission android:name="android.permission.FILTER_EVENTS"
2460        android:protectionLevel="signature" />
2461
2462    <!-- @hide Allows an application to retrieve the window token from the accessibility manager. -->
2463    <permission android:name="android.permission.RETRIEVE_WINDOW_TOKEN"
2464        android:protectionLevel="signature" />
2465
2466    <!-- @hide Allows an application to modify accessibility information from another app. -->
2467    <permission android:name="android.permission.MODIFY_ACCESSIBILITY_DATA"
2468                android:protectionLevel="signature" />
2469
2470    <!-- @hide Allows an application to change the accessibility volume. -->
2471    <permission android:name="android.permission.CHANGE_ACCESSIBILITY_VOLUME"
2472                android:protectionLevel="signature" />
2473
2474    <!-- @hide Allows an application to collect frame statistics -->
2475    <permission android:name="android.permission.FRAME_STATS"
2476         android:protectionLevel="signature" />
2477
2478    <!-- @hide Allows an application to temporary enable accessibility on the device. -->
2479    <permission android:name="android.permission.TEMPORARY_ENABLE_ACCESSIBILITY"
2480        android:protectionLevel="signature" />
2481
2482    <!-- @SystemApi Allows an application to watch and control how activities are
2483         started globally in the system.  Only for is in debugging
2484         (usually the monkey command).
2485         <p>Not for use by third-party applications.
2486         @hide
2487    -->
2488    <permission android:name="android.permission.SET_ACTIVITY_WATCHER"
2489        android:protectionLevel="signature" />
2490
2491    <!-- @SystemApi Allows an application to call the activity manager shutdown() API
2492         to put the higher-level system there into a shutdown state.
2493         @hide -->
2494    <permission android:name="android.permission.SHUTDOWN"
2495        android:protectionLevel="signature|privileged" />
2496
2497    <!-- @SystemApi Allows an application to tell the activity manager to temporarily
2498         stop application switches, putting it into a special mode that
2499         prevents applications from immediately switching away from some
2500         critical UI such as the home screen.
2501         @hide -->
2502    <permission android:name="android.permission.STOP_APP_SWITCHES"
2503        android:protectionLevel="signature|privileged" />
2504
2505    <!-- @SystemApi Allows an application to retrieve private information about
2506         the current top activity, such as any assist context it can provide.
2507         <p>Not for use by third-party applications.
2508         @hide
2509    -->
2510    <permission android:name="android.permission.GET_TOP_ACTIVITY_INFO"
2511        android:protectionLevel="signature" />
2512
2513    <!-- Allows an application to retrieve the current state of keys and
2514         switches.
2515         <p>Not for use by third-party applications.
2516         @deprecated The API that used this permission has been removed. -->
2517    <permission android:name="android.permission.READ_INPUT_STATE"
2518        android:protectionLevel="signature" />
2519
2520    <!-- Must be required by an {@link android.inputmethodservice.InputMethodService},
2521         to ensure that only the system can bind to it.
2522         <p>Protection level: signature
2523    -->
2524    <permission android:name="android.permission.BIND_INPUT_METHOD"
2525        android:protectionLevel="signature" />
2526
2527    <!-- Must be required by an {@link android.media.midi.MidiDeviceService},
2528         to ensure that only the system can bind to it.
2529         <p>Protection level: signature
2530    -->
2531    <permission android:name="android.permission.BIND_MIDI_DEVICE_SERVICE"
2532        android:protectionLevel="signature" />
2533
2534    <!-- Must be required by an {@link android.accessibilityservice.AccessibilityService},
2535         to ensure that only the system can bind to it.
2536         <p>Protection level: signature
2537    -->
2538    <permission android:name="android.permission.BIND_ACCESSIBILITY_SERVICE"
2539        android:protectionLevel="signature" />
2540
2541    <!-- Must be required by a {@link android.printservice.PrintService},
2542         to ensure that only the system can bind to it.
2543         <p>Protection level: signature
2544    -->
2545    <permission android:name="android.permission.BIND_PRINT_SERVICE"
2546        android:protectionLevel="signature" />
2547
2548    <!-- Must be required by a {@link android.printservice.recommendation.RecommendationService},
2549     to ensure that only the system can bind to it.
2550     @hide
2551     @SystemApi
2552     <p>Protection level: signature
2553    -->
2554    <permission android:name="android.permission.BIND_PRINT_RECOMMENDATION_SERVICE"
2555            android:protectionLevel="signature" />
2556
2557    <!-- Allows applications to get the installed and enabled print services.
2558         @hide
2559         @SystemApi
2560         <p>Protection level: signature|preinstalled
2561    -->
2562    <permission android:name="android.permission.READ_PRINT_SERVICES"
2563        android:protectionLevel="signature|preinstalled" />
2564
2565    <!-- Allows applications to get the currently recommended print services for printers.
2566         @hide
2567         @SystemApi
2568         <p>Protection level: signature|preinstalled
2569    -->
2570    <permission android:name="android.permission.READ_PRINT_SERVICE_RECOMMENDATIONS"
2571        android:protectionLevel="signature|preinstalled" />
2572
2573    <!-- Must be required by a {@link android.nfc.cardemulation.HostApduService}
2574         or {@link android.nfc.cardemulation.OffHostApduService} to ensure that only
2575         the system can bind to it.
2576         <p>Protection level: signature
2577    -->
2578    <permission android:name="android.permission.BIND_NFC_SERVICE"
2579        android:protectionLevel="signature" />
2580
2581    <!-- Must be required by the PrintSpooler to ensure that only the system can bind to it.
2582         @hide -->
2583    <permission android:name="android.permission.BIND_PRINT_SPOOLER_SERVICE"
2584        android:protectionLevel="signature" />
2585
2586    <!-- Must be required by the CompanionDeviceManager to ensure that only the system can bind to it.
2587         @hide -->
2588    <permission android:name="android.permission.BIND_COMPANION_DEVICE_MANAGER_SERVICE"
2589        android:protectionLevel="signature" />
2590
2591    <!-- @SystemApi Must be required by the RuntimePermissionPresenterService to ensure
2592         that only the system can bind to it.
2593         @hide -->
2594    <permission android:name="android.permission.BIND_RUNTIME_PERMISSION_PRESENTER_SERVICE"
2595        android:protectionLevel="signature" />
2596
2597    <!-- Must be required by a TextService (e.g. SpellCheckerService)
2598         to ensure that only the system can bind to it.
2599         <p>Protection level: signature
2600    -->
2601    <permission android:name="android.permission.BIND_TEXT_SERVICE"
2602        android:protectionLevel="signature" />
2603
2604    <!-- Must be required by a {@link android.net.VpnService},
2605         to ensure that only the system can bind to it.
2606         <p>Protection level: signature
2607    -->
2608    <permission android:name="android.permission.BIND_VPN_SERVICE"
2609        android:protectionLevel="signature" />
2610
2611    <!-- Must be required by a {@link android.service.wallpaper.WallpaperService},
2612         to ensure that only the system can bind to it.
2613         <p>Protection level: signature|privileged
2614    -->
2615    <permission android:name="android.permission.BIND_WALLPAPER"
2616        android:protectionLevel="signature|privileged" />
2617
2618    <!-- Must be required by a {@link android.service.voice.VoiceInteractionService},
2619         to ensure that only the system can bind to it.
2620         <p>Protection level: signature
2621    -->
2622    <permission android:name="android.permission.BIND_VOICE_INTERACTION"
2623        android:protectionLevel="signature" />
2624
2625    <!-- Must be required by a {@link android.service.autofill.AutofillService},
2626         to ensure that only the system can bind to it.
2627         <p>Protection level: signature
2628    -->
2629    <permission android:name="android.permission.BIND_AUTOFILL_SERVICE"
2630        android:protectionLevel="signature" />
2631
2632    <!-- @hide TODO(b/37563972): remove once clients use BIND_AUTOFILL_SERVICE -->
2633    <permission android:name="android.permission.BIND_AUTOFILL"
2634        android:protectionLevel="signature" />
2635
2636    <!-- Must be required by hotword enrollment application,
2637         to ensure that only the system can interact with it.
2638         @hide <p>Not for use by third-party applications.</p> -->
2639    <permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES"
2640        android:protectionLevel="signature|privileged" />
2641
2642    <!-- Must be required by a {@link com.android.media.remotedisplay.RemoteDisplayProvider},
2643         to ensure that only the system can bind to it.
2644         @hide -->
2645    <permission android:name="android.permission.BIND_REMOTE_DISPLAY"
2646        android:protectionLevel="signature" />
2647
2648    <!-- Must be required by a {@link android.media.tv.TvInputService}
2649         to ensure that only the system can bind to it.
2650         <p>Protection level: signature|privileged
2651    -->
2652    <permission android:name="android.permission.BIND_TV_INPUT"
2653        android:protectionLevel="signature|privileged" />
2654
2655    <!-- @SystemApi
2656         Must be required by a {@link com.android.media.tv.remoteprovider.TvRemoteProvider}
2657         to ensure that only the system can bind to it.
2658         <p>Protection level: signature|privileged
2659         <p>Not for use by third-party applications. </p>
2660         @hide  -->
2661    <permission android:name="android.permission.BIND_TV_REMOTE_SERVICE"
2662        android:protectionLevel="signature|privileged" />
2663
2664    <!-- @SystemApi
2665         Must be required for a virtual remote controller for TV.
2666         <p>Protection level: signature|privileged
2667         <p>Not for use by third-party applications. </p>
2668         @hide  -->
2669    <permission android:name="android.permission.TV_VIRTUAL_REMOTE_CONTROLLER"
2670        android:protectionLevel="signature|privileged" />
2671
2672    <!-- Allows an application to change HDMI CEC active source.
2673         <p>Not for use by third-party applications.
2674         @hide -->
2675    <permission android:name="android.permission.CHANGE_HDMI_CEC_ACTIVE_SOURCE"
2676        android:protectionLevel="signature|privileged" />
2677
2678    <!-- @SystemApi Allows an application to modify parental controls
2679         <p>Not for use by third-party applications.
2680         @hide -->
2681    <permission android:name="android.permission.MODIFY_PARENTAL_CONTROLS"
2682        android:protectionLevel="signature|privileged" />
2683
2684    <!-- @SystemApi Allows an application to read TvContentRatingSystemInfo
2685         <p>Not for use by third-party applications.
2686         @hide -->
2687    <permission android:name="android.permission.READ_CONTENT_RATING_SYSTEMS"
2688        android:protectionLevel="signature|privileged" />
2689
2690    <!-- @SystemApi Allows an application to notify TV inputs by sending broadcasts.
2691         <p>Protection level: signature|privileged
2692         <p>Not for use by third-party applications.
2693         @hide -->
2694    <permission android:name="android.permission.NOTIFY_TV_INPUTS"
2695         android:protectionLevel="signature|privileged" />
2696
2697    <!-- Must be required by a {@link android.media.routing.MediaRouteService}
2698         to ensure that only the system can interact with it.
2699         @hide -->
2700    <permission android:name="android.permission.BIND_ROUTE_PROVIDER"
2701        android:protectionLevel="signature" />
2702
2703    <!-- Must be required by device administration receiver, to ensure that only the
2704         system can interact with it.
2705         <p>Protection level: signature
2706    -->
2707    <permission android:name="android.permission.BIND_DEVICE_ADMIN"
2708        android:protectionLevel="signature" />
2709
2710    <!-- @SystemApi Required to add or remove another application as a device admin.
2711         <p>Not for use by third-party applications.
2712         @hide -->
2713    <permission android:name="android.permission.MANAGE_DEVICE_ADMINS"
2714        android:protectionLevel="signature|privileged" />
2715
2716    <!-- @SystemApi Allows low-level access to setting the orientation (actually
2717         rotation) of the screen.
2718         <p>Not for use by third-party applications.
2719         @hide
2720    -->
2721    <permission android:name="android.permission.SET_ORIENTATION"
2722        android:protectionLevel="signature" />
2723
2724    <!-- @SystemApi Allows low-level access to setting the pointer speed.
2725         <p>Not for use by third-party applications.
2726         @hide
2727    -->
2728    <permission android:name="android.permission.SET_POINTER_SPEED"
2729        android:protectionLevel="signature" />
2730
2731    <!-- Allows low-level access to setting input device calibration.
2732         <p>Not for use by normal applications.
2733         @hide -->
2734    <permission android:name="android.permission.SET_INPUT_CALIBRATION"
2735        android:protectionLevel="signature" />
2736
2737    <!-- Allows low-level access to setting the keyboard layout.
2738         <p>Not for use by third-party applications.
2739         @hide -->
2740    <permission android:name="android.permission.SET_KEYBOARD_LAYOUT"
2741        android:protectionLevel="signature" />
2742
2743    <!-- Allows an application to query tablet mode state and monitor changes
2744         in it.
2745         <p>Not for use by third-party applications.
2746         @hide -->
2747    <permission android:name="android.permission.TABLET_MODE"
2748        android:protectionLevel="signature" />
2749
2750    <!-- Allows an application to request installing packages. Apps
2751         targeting APIs greater than 25 must hold this permission in
2752         order to use {@link android.content.Intent#ACTION_INSTALL_PACKAGE}.
2753         <p>Protection level: signature
2754    -->
2755    <permission android:name="android.permission.REQUEST_INSTALL_PACKAGES"
2756        android:label="@string/permlab_requestInstallPackages"
2757        android:description="@string/permdesc_requestInstallPackages"
2758        android:protectionLevel="signature|appop" />
2759
2760    <!-- Allows an application to request deleting packages. Apps
2761         targeting APIs greater than 25 must hold this permission in
2762         order to use {@link android.content.Intent#ACTION_UNINSTALL_PACKAGE}.
2763         <p>Protection level: normal
2764    -->
2765    <permission android:name="android.permission.REQUEST_DELETE_PACKAGES"
2766        android:label="@string/permlab_requestDeletePackages"
2767        android:description="@string/permdesc_requestDeletePackages"
2768        android:protectionLevel="normal" />
2769
2770    <!-- @SystemApi Allows an application to install packages.
2771    <p>Not for use by third-party applications. -->
2772    <permission android:name="android.permission.INSTALL_PACKAGES"
2773        android:protectionLevel="signature|privileged" />
2774
2775    <!-- @SystemApi Allows an application to clear user data.
2776         <p>Not for use by third-party applications
2777         @hide
2778    -->
2779    <permission android:name="android.permission.CLEAR_APP_USER_DATA"
2780        android:protectionLevel="signature|installer" />
2781
2782    <!-- @hide Allows an application to get the URI permissions
2783         granted to another application.
2784         <p>Not for use by third-party applications
2785    -->
2786    <permission android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS"
2787        android:protectionLevel="signature" />
2788
2789    <!-- @hide Allows an application to clear the URI permissions
2790         granted to another application.
2791         <p>Not for use by third-party applications
2792    -->
2793    <permission
2794        android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS"
2795        android:protectionLevel="signature" />
2796
2797    <!-- @SystemApi Allows an application to delete cache files.
2798    <p>Not for use by third-party applications. -->
2799    <permission android:name="android.permission.DELETE_CACHE_FILES"
2800        android:protectionLevel="signature|privileged" />
2801
2802    <!-- @SystemApi Allows an application to delete packages.
2803         <p>Not for use by third-party applications.
2804         <p>Starting in {@link android.os.Build.VERSION_CODES#N}, user confirmation is requested
2805         when the application deleting the package is not the same application that installed the
2806         package. -->
2807    <permission android:name="android.permission.DELETE_PACKAGES"
2808        android:protectionLevel="signature|privileged" />
2809
2810    <!-- @SystemApi Allows an application to move location of installed package.
2811         @hide -->
2812    <permission android:name="android.permission.MOVE_PACKAGE"
2813        android:protectionLevel="signature|privileged" />
2814
2815    <!-- @SystemApi Allows an application to change whether an application component (other than its own) is
2816         enabled or not.
2817         <p>Not for use by third-party applications. -->
2818    <permission android:name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"
2819        android:protectionLevel="signature|privileged" />
2820
2821    <!-- @SystemApi Allows an application to grant specific permissions.
2822         @hide -->
2823    <permission android:name="android.permission.GRANT_RUNTIME_PERMISSIONS"
2824        android:protectionLevel="signature|installer|verifier" />
2825
2826    <!-- @SystemApi Allows an app that has this permission and the permissions to install packages
2827         to request certain runtime permissions to be granted at installation.
2828         @hide -->
2829    <permission android:name="android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS"
2830        android:protectionLevel="signature|installer|verifier" />
2831
2832    <!-- @SystemApi Allows an application to revoke specific permissions.
2833        @hide -->
2834    <permission android:name="android.permission.REVOKE_RUNTIME_PERMISSIONS"
2835         android:protectionLevel="signature|installer|verifier" />
2836
2837    <!-- @hide Allows an application to observe permission changes. -->
2838    <permission android:name="android.permission.OBSERVE_GRANT_REVOKE_PERMISSIONS"
2839        android:protectionLevel="signature|privileged" />
2840
2841    <!-- @SystemApi Allows an application to use SurfaceFlinger's low level features.
2842         <p>Not for use by third-party applications.
2843         @hide
2844    -->
2845    <permission android:name="android.permission.ACCESS_SURFACE_FLINGER"
2846        android:protectionLevel="signature" />
2847
2848    <!-- @SystemApi Allows an application to take screen shots and more generally
2849         get access to the frame buffer data.
2850         <p>Not for use by third-party applications. -->
2851    <permission android:name="android.permission.READ_FRAME_BUFFER"
2852        android:protectionLevel="signature|privileged" />
2853
2854    <!-- Allows an application to use InputFlinger's low level features.
2855         @hide -->
2856    <permission android:name="android.permission.ACCESS_INPUT_FLINGER"
2857        android:protectionLevel="signature" />
2858
2859    <!-- Allows an application to disable/enable input devices.
2860         Could be used to prevent unwanted touch events
2861         on a touchscreen, for example during swimming or rain.
2862         @hide -->
2863    <permission android:name="android.permission.DISABLE_INPUT_DEVICE"
2864        android:protectionLevel="signature" />
2865
2866    <!-- Allows an application to configure and connect to Wifi displays
2867         @hide -->
2868    <permission android:name="android.permission.CONFIGURE_WIFI_DISPLAY"
2869        android:protectionLevel="signature" />
2870
2871    <!-- Allows an application to control low-level features of Wifi displays
2872         such as opening an RTSP socket.  This permission should only be used
2873         by the display manager.
2874         @hide -->
2875    <permission android:name="android.permission.CONTROL_WIFI_DISPLAY"
2876        android:protectionLevel="signature" />
2877
2878    <!-- Allows an application to control the color modes set for displays system-wide.
2879         <p>Not for use by third-party applications.</p>
2880         @hide -->
2881    <permission android:name="android.permission.CONFIGURE_DISPLAY_COLOR_MODE"
2882        android:protectionLevel="signature" />
2883
2884    <!-- @SystemApi Allows an application to control VPN.
2885         <p>Not for use by third-party applications.</p>
2886         @hide -->
2887    <permission android:name="android.permission.CONTROL_VPN"
2888        android:protectionLevel="signature|privileged" />
2889    <uses-permission android:name="android.permission.CONTROL_VPN" />
2890
2891    <!-- @SystemApi Allows an application to capture audio output.
2892         <p>Not for use by third-party applications.</p> -->
2893    <permission android:name="android.permission.CAPTURE_AUDIO_OUTPUT"
2894        android:protectionLevel="signature|privileged" />
2895
2896    <!-- @SystemApi Allows an application to capture audio for hotword detection.
2897         <p>Not for use by third-party applications.</p>
2898         @hide -->
2899    <permission android:name="android.permission.CAPTURE_AUDIO_HOTWORD"
2900        android:protectionLevel="signature|privileged" />
2901
2902    <!-- @SystemApi Allows an application to modify audio routing and override policy decisions.
2903         <p>Not for use by third-party applications.</p>
2904         @hide -->
2905    <permission android:name="android.permission.MODIFY_AUDIO_ROUTING"
2906        android:protectionLevel="signature|privileged" />
2907
2908    <!-- @SystemApi Allows an application to capture video output.
2909         <p>Not for use by third-party applications.</p> -->
2910    <permission android:name="android.permission.CAPTURE_VIDEO_OUTPUT"
2911        android:protectionLevel="signature|privileged" />
2912
2913    <!-- @SystemApi Allows an application to capture secure video output.
2914         <p>Not for use by third-party applications.</p> -->
2915    <permission android:name="android.permission.CAPTURE_SECURE_VIDEO_OUTPUT"
2916        android:protectionLevel="signature|privileged" />
2917
2918    <!-- @SystemApi Allows an application to know what content is playing and control its playback.
2919         <p>Not for use by third-party applications due to privacy of media consumption</p>  -->
2920    <permission android:name="android.permission.MEDIA_CONTENT_CONTROL"
2921        android:protectionLevel="signature|privileged" />
2922
2923    <!-- @SystemApi @hide Allows an application to set the volume key long-press listener.
2924         <p>When it's set, the application will receive the volume key long-press event
2925         instead of changing volume.</p>
2926         <p>Not for use by third-party applications</p> -->
2927    <permission android:name="android.permission.SET_VOLUME_KEY_LONG_PRESS_LISTENER"
2928        android:protectionLevel="signature|privileged|development" />
2929
2930    <!-- @SystemApi @hide Allows an application to set media key event listener.
2931         <p>When it's set, the application will receive the media key event before
2932         any other media sessions. If the event is handled by the listener, other sessions
2933         cannot get the event.</p>
2934         <p>Not for use by third-party applications</p> -->
2935    <permission android:name="android.permission.SET_MEDIA_KEY_LISTENER"
2936        android:protectionLevel="signature|privileged|development" />
2937
2938    <!-- @SystemApi Required to be able to disable the device (very dangerous!).
2939         <p>Not for use by third-party applications.
2940         @hide
2941    -->
2942    <permission android:name="android.permission.BRICK"
2943        android:protectionLevel="signature" />
2944
2945    <!-- @SystemApi Required to be able to reboot the device.
2946    <p>Not for use by third-party applications. -->
2947    <permission android:name="android.permission.REBOOT"
2948        android:protectionLevel="signature|privileged" />
2949
2950   <!-- @SystemApi Allows low-level access to power management.
2951        <p>Not for use by third-party applications.
2952        @hide
2953    -->
2954   <permission android:name="android.permission.DEVICE_POWER"
2955        android:protectionLevel="signature" />
2956
2957   <!-- Allows access to the PowerManager.userActivity function.
2958   <p>Not for use by third-party applications. @hide @SystemApi -->
2959    <permission android:name="android.permission.USER_ACTIVITY"
2960        android:protectionLevel="signature|privileged" />
2961
2962   <!-- @hide Allows low-level access to tun tap driver -->
2963    <permission android:name="android.permission.NET_TUNNELING"
2964        android:protectionLevel="signature" />
2965
2966    <!-- Run as a manufacturer test application, running as the root user.
2967         Only available when the device is running in manufacturer test mode.
2968         <p>Not for use by third-party applications.
2969    -->
2970    <permission android:name="android.permission.FACTORY_TEST"
2971        android:protectionLevel="signature" />
2972
2973    <!-- Allows an application to broadcast a notification that an application
2974         package has been removed.
2975         <p>Not for use by third-party applications.
2976    -->
2977    <permission android:name="android.permission.BROADCAST_PACKAGE_REMOVED"
2978        android:protectionLevel="signature" />
2979
2980    <!-- Allows an application to broadcast an SMS receipt notification.
2981         <p>Not for use by third-party applications.
2982    -->
2983    <permission android:name="android.permission.BROADCAST_SMS"
2984        android:protectionLevel="signature" />
2985
2986    <!-- Allows an application to broadcast a WAP PUSH receipt notification.
2987         <p>Not for use by third-party applications.
2988    -->
2989    <permission android:name="android.permission.BROADCAST_WAP_PUSH"
2990        android:protectionLevel="signature" />
2991
2992    <!-- @SystemApi Allows an application to broadcast privileged networking requests.
2993         <p>Not for use by third-party applications.
2994         @hide
2995         @deprecated Use {@link android.Manifest.permission#REQUEST_NETWORK_SCORES} instead
2996    -->
2997    <permission android:name="android.permission.BROADCAST_NETWORK_PRIVILEGED"
2998        android:protectionLevel="signature|privileged" />
2999
3000    <!-- @SystemApi Not for use by third-party applications. -->
3001    <permission android:name="android.permission.MASTER_CLEAR"
3002        android:protectionLevel="signature|privileged" />
3003
3004    <!-- @SystemApi Allows an application to call any phone number, including emergency
3005         numbers, without going through the Dialer user interface for the user
3006         to confirm the call being placed.
3007         <p>Not for use by third-party applications. -->
3008    <permission android:name="android.permission.CALL_PRIVILEGED"
3009        android:protectionLevel="signature|privileged" />
3010
3011    <!-- @SystemApi Allows an application to perform CDMA OTA provisioning @hide -->
3012    <permission android:name="android.permission.PERFORM_CDMA_PROVISIONING"
3013        android:protectionLevel="signature|privileged" />
3014
3015    <!-- @SystemApi Allows an application to perform SIM Activation @hide -->
3016    <permission android:name="android.permission.PERFORM_SIM_ACTIVATION"
3017        android:protectionLevel="signature|privileged" />
3018
3019    <!-- @SystemApi Allows enabling/disabling location update notifications from
3020         the radio.
3021         <p>Not for use by third-party applications. -->
3022    <permission android:name="android.permission.CONTROL_LOCATION_UPDATES"
3023        android:protectionLevel="signature|privileged" />
3024
3025    <!-- @SystemApi Allows read/write access to the "properties" table in the checkin
3026         database, to change values that get uploaded.
3027         <p>Not for use by third-party applications. -->
3028    <permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES"
3029        android:protectionLevel="signature|privileged" />
3030
3031    <!-- @SystemApi Allows an application to collect component usage
3032         statistics
3033         <p>Declaring the permission implies intention to use the API and the user of the
3034         device can grant permission through the Settings application. -->
3035    <permission android:name="android.permission.PACKAGE_USAGE_STATS"
3036        android:protectionLevel="signature|privileged|development|appop" />
3037    <uses-permission android:name="android.permission.PACKAGE_USAGE_STATS" />
3038
3039    <!-- @hide Allows an application to change the app idle state of an app.
3040         <p>Not for use by third-party applications. -->
3041    <permission android:name="android.permission.CHANGE_APP_IDLE_STATE"
3042        android:protectionLevel="signature" />
3043
3044    <!-- @hide @SystemApi Allows an application to temporarily whitelist an inactive app to
3045         access the network and acquire wakelocks.
3046         <p>Not for use by third-party applications. -->
3047    <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST"
3048        android:protectionLevel="signature|privileged" />
3049
3050    <!-- Permission an application must hold in order to use
3051         {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}.
3052         This is a normal permission: an app requesting it will always be granted the
3053         permission, without the user needing to approve or see it. -->
3054    <permission android:name="android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS"
3055        android:label="@string/permlab_requestIgnoreBatteryOptimizations"
3056        android:description="@string/permdesc_requestIgnoreBatteryOptimizations"
3057        android:protectionLevel="normal" />
3058
3059    <!-- @SystemApi Allows an application to collect battery statistics -->
3060    <permission android:name="android.permission.BATTERY_STATS"
3061        android:protectionLevel="signature|privileged|development" />
3062
3063    <!-- @SystemApi Allows an application to control the backup and restore process.
3064    <p>Not for use by third-party applications.
3065         @hide pending API council -->
3066    <permission android:name="android.permission.BACKUP"
3067        android:protectionLevel="signature|privileged" />
3068
3069    <!-- Allows a package to launch the secure full-backup confirmation UI.
3070         ONLY the system process may hold this permission.
3071         @hide -->
3072    <permission android:name="android.permission.CONFIRM_FULL_BACKUP"
3073        android:protectionLevel="signature" />
3074
3075    <!-- @SystemApi Must be required by a {@link android.widget.RemoteViewsService},
3076         to ensure that only the system can bind to it. -->
3077    <permission android:name="android.permission.BIND_REMOTEVIEWS"
3078        android:protectionLevel="signature|privileged" />
3079
3080    <!-- @SystemApi Allows an application to tell the AppWidget service which application
3081         can access AppWidget's data.  The normal user flow is that a user
3082         picks an AppWidget to go into a particular host, thereby giving that
3083         host application access to the private data from the AppWidget app.
3084         An application that has this permission should honor that contract.
3085         <p>Not for use by third-party applications. -->
3086    <permission android:name="android.permission.BIND_APPWIDGET"
3087        android:protectionLevel="signature|privileged" />
3088
3089    <!-- @SystemApi Private permission, to restrict who can bring up a dialog to add a new
3090         keyguard widget
3091         @hide -->
3092    <permission android:name="android.permission.BIND_KEYGUARD_APPWIDGET"
3093        android:protectionLevel="signature|privileged" />
3094
3095    <!-- @SystemApi Internal permission allowing an application to query/set which
3096         applications can bind AppWidgets.
3097         @hide -->
3098    <permission android:name="android.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS"
3099        android:protectionLevel="signature|privileged" />
3100
3101    <!-- Allows applications to change the background data setting.
3102    <p>Not for use by third-party applications.
3103         @hide pending API council -->
3104    <permission android:name="android.permission.CHANGE_BACKGROUND_DATA_SETTING"
3105        android:protectionLevel="signature" />
3106
3107    <!-- @SystemApi This permission can be used on content providers to allow the global
3108         search system to access their data.  Typically it used when the
3109         provider has some permissions protecting it (which global search
3110         would not be expected to hold), and added as a read-only permission
3111         to the path in the provider where global search queries are
3112         performed.  This permission can not be held by regular applications;
3113         it is used by applications to protect themselves from everyone else
3114         besides global search. -->
3115    <permission android:name="android.permission.GLOBAL_SEARCH"
3116        android:protectionLevel="signature|privileged" />
3117
3118    <!-- Internal permission protecting access to the global search
3119         system: ensures that only the system can access the provider
3120         to perform queries (since this otherwise provides unrestricted
3121         access to a variety of content providers), and to write the
3122         search statistics (to keep applications from gaming the source
3123         ranking).
3124         @hide -->
3125    <permission android:name="android.permission.GLOBAL_SEARCH_CONTROL"
3126        android:protectionLevel="signature" />
3127
3128    <!-- @SystemApi Internal permission to allows an application to read indexable data.
3129        @hide -->
3130    <permission android:name="android.permission.READ_SEARCH_INDEXABLES"
3131        android:protectionLevel="signature|privileged" />
3132
3133    <!-- @SystemApi Allows applications to set a live wallpaper.
3134         @hide XXX Change to signature once the picker is moved to its
3135         own apk as Ghod Intended. -->
3136    <permission android:name="android.permission.SET_WALLPAPER_COMPONENT"
3137        android:protectionLevel="signature|privileged" />
3138
3139    <!-- @SystemApi Allows applications to read dream settings and dream state.
3140         @hide -->
3141    <permission android:name="android.permission.READ_DREAM_STATE"
3142        android:protectionLevel="signature|privileged" />
3143
3144    <!-- @SystemApi Allows applications to write dream settings, and start or stop dreaming.
3145         @hide -->
3146    <permission android:name="android.permission.WRITE_DREAM_STATE"
3147        android:protectionLevel="signature|privileged" />
3148
3149    <!-- @SystemApi Allow an application to read and write the cache partition.
3150         @hide -->
3151    <permission android:name="android.permission.ACCESS_CACHE_FILESYSTEM"
3152        android:protectionLevel="signature|privileged" />
3153
3154    <!-- Must be required by default container service so that only
3155         the system can bind to it and use it to copy
3156         protected data to secure containers or files
3157         accessible to the system.
3158         @hide -->
3159    <permission android:name="android.permission.COPY_PROTECTED_DATA"
3160        android:protectionLevel="signature" />
3161
3162    <!-- @SystemApi Internal permission protecting access to the encryption methods
3163        @hide
3164    -->
3165    <permission android:name="android.permission.CRYPT_KEEPER"
3166        android:protectionLevel="signature|privileged" />
3167
3168    <!-- @SystemApi Allows an application to read historical network usage for
3169         specific networks and applications. @hide -->
3170    <permission android:name="android.permission.READ_NETWORK_USAGE_HISTORY"
3171        android:protectionLevel="signature|privileged" />
3172
3173    <!-- Allows an application to manage network policies (such as warning and disable
3174         limits) and to define application-specific rules. @hide -->
3175    <permission android:name="android.permission.MANAGE_NETWORK_POLICY"
3176        android:protectionLevel="signature" />
3177
3178    <!-- @SystemApi @hide @deprecated use UPDATE_DEVICE_STATS instead -->
3179    <permission android:name="android.permission.MODIFY_NETWORK_ACCOUNTING"
3180        android:protectionLevel="signature|privileged" />
3181
3182    <!-- @SystemApi @hide Allows an application to manage carrier subscription plans. -->
3183    <permission android:name="android.permission.MANAGE_SUBSCRIPTION_PLANS"
3184        android:protectionLevel="signature|privileged" />
3185
3186    <!-- C2DM permission.
3187         @hide Used internally.
3188     -->
3189    <permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"
3190          android:protectionLevel="signature" />
3191    <uses-permission android:name="android.intent.category.MASTER_CLEAR.permission.C2D_MESSAGE"/>
3192
3193    <!-- @SystemApi @hide Package verifier needs to have this permission before the PackageManager will
3194         trust it to verify packages.
3195    -->
3196    <permission android:name="android.permission.PACKAGE_VERIFICATION_AGENT"
3197        android:protectionLevel="signature|privileged" />
3198
3199    <!-- Must be required by package verifier receiver, to ensure that only the
3200         system can interact with it.
3201         @hide
3202    -->
3203    <permission android:name="android.permission.BIND_PACKAGE_VERIFIER"
3204        android:protectionLevel="signature" />
3205
3206    <!-- @SystemApi @hide Intent filter verifier needs to have this permission before the
3207         PackageManager will trust it to verify intent filters.
3208    -->
3209    <permission android:name="android.permission.INTENT_FILTER_VERIFICATION_AGENT"
3210        android:protectionLevel="signature|privileged" />
3211
3212    <!-- Must be required by intent filter verifier receiver, to ensure that only the
3213         system can interact with it.
3214         @hide
3215    -->
3216    <permission android:name="android.permission.BIND_INTENT_FILTER_VERIFIER"
3217        android:protectionLevel="signature" />
3218
3219    <!-- @SystemApi Allows applications to access serial ports via the SerialManager.
3220         @hide -->
3221    <permission android:name="android.permission.SERIAL_PORT"
3222        android:protectionLevel="signature|privileged" />
3223
3224    <!-- Allows the holder to access content providers from outside an ApplicationThread.
3225         This permission is enforced by the ActivityManagerService on the corresponding APIs,
3226         in particular ActivityManagerService#getContentProviderExternal(String) and
3227         ActivityManagerService#removeContentProviderExternal(String).
3228         @hide
3229    -->
3230    <permission android:name="android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY"
3231        android:protectionLevel="signature" />
3232
3233    <!-- @SystemApi Allows an application to hold an UpdateLock, recommending that a headless
3234         OTA reboot *not* occur while the lock is held.
3235         @hide -->
3236    <permission android:name="android.permission.UPDATE_LOCK"
3237        android:protectionLevel="signature|privileged" />
3238
3239    <!-- @SystemApi Allows an application to read the current set of notifications, including
3240         any metadata and intents attached.
3241         @hide -->
3242    <permission android:name="android.permission.ACCESS_NOTIFICATIONS"
3243        android:protectionLevel="signature|privileged|appop" />
3244
3245    <!-- Marker permission for applications that wish to access notification policy.
3246         <p>Protection level: normal
3247    -->
3248    <permission android:name="android.permission.ACCESS_NOTIFICATION_POLICY"
3249        android:description="@string/permdesc_access_notification_policy"
3250        android:label="@string/permlab_access_notification_policy"
3251        android:protectionLevel="normal" />
3252
3253    <!-- Allows modification of do not disturb rules and policies. Only allowed for system
3254        processes.
3255        @hide -->
3256    <permission android:name="android.permission.MANAGE_NOTIFICATIONS"
3257                android:protectionLevel="signature" />
3258
3259    <!-- Allows notifications to be colorized
3260         <p>Not for use by third-party applications. @hide -->
3261    <permission android:name="android.permission.USE_COLORIZED_NOTIFICATIONS"
3262                android:protectionLevel="signature|setup" />
3263
3264    <!-- Allows access to keyguard secure storage.  Only allowed for system processes.
3265        @hide -->
3266    <permission android:name="android.permission.ACCESS_KEYGUARD_SECURE_STORAGE"
3267        android:protectionLevel="signature" />
3268
3269    <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide -->
3270    <permission android:name="android.permission.MANAGE_FINGERPRINT"
3271        android:protectionLevel="signature|privileged" />
3272
3273    <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide -->
3274    <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT"
3275        android:protectionLevel="signature" />
3276
3277    <!-- Allows an application to control keyguard.  Only allowed for system processes.
3278        @hide -->
3279    <permission android:name="android.permission.CONTROL_KEYGUARD"
3280        android:protectionLevel="signature" />
3281
3282    <!-- Allows an application to listen to trust changes.  Only allowed for system processes.
3283        @hide -->
3284    <permission android:name="android.permission.TRUST_LISTENER"
3285        android:protectionLevel="signature" />
3286
3287    <!-- @SystemApi Allows an application to provide a trust agent.
3288         @hide For security reasons, this is a platform-only permission. -->
3289    <permission android:name="android.permission.PROVIDE_TRUST_AGENT"
3290        android:protectionLevel="signature|privileged" />
3291
3292    <!-- Allows an application to launch the trust agent settings activity.
3293        @hide -->
3294    <permission android:name="android.permission.LAUNCH_TRUST_AGENT_SETTINGS"
3295        android:protectionLevel="signature|privileged" />
3296
3297    <!-- @SystemApi Must be required by an {@link
3298        android.service.trust.TrustAgentService},
3299        to ensure that only the system can bind to it.
3300        @hide -->
3301    <permission android:name="android.permission.BIND_TRUST_AGENT"
3302        android:protectionLevel="signature" />
3303
3304    <!-- Must be required by an {@link
3305         android.service.notification.NotificationListenerService},
3306         to ensure that only the system can bind to it.
3307         <p>Protection level: signature
3308    -->
3309    <permission android:name="android.permission.BIND_NOTIFICATION_LISTENER_SERVICE"
3310        android:protectionLevel="signature" />
3311
3312    <!-- @SystemApi Must be required by an {@link
3313         android.service.notification.NotificationAssistantService} to ensure that only the system
3314         can bind to it.
3315         <p>Protection level: signature
3316         @hide
3317    -->
3318    <permission android:name="android.permission.BIND_NOTIFICATION_ASSISTANT_SERVICE"
3319        android:protectionLevel="signature" />
3320
3321    <!-- Must be required by a {@link
3322         android.service.chooser.ChooserTargetService}, to ensure that
3323         only the system can bind to it.
3324         <p>Protection level: signature
3325    -->
3326    <permission android:name="android.permission.BIND_CHOOSER_TARGET_SERVICE"
3327        android:protectionLevel="signature" />
3328
3329    <!-- @SystemApi Must be held by services that extend
3330         {@link android.service.resolver.ResolverRankerService}.
3331         <p>Protection level: signature|privileged
3332         @hide
3333    -->
3334    <permission android:name="android.permission.PROVIDE_RESOLVER_RANKER_SERVICE"
3335                android:protectionLevel="signature|privileged" />
3336
3337    <!-- @SystemApi Must be required by services that extend
3338         {@link android.service.resolver.ResolverRankerService}, to ensure that only the system can
3339         bind to them.
3340         <p>Protection level: signature
3341         @hide
3342    -->
3343    <permission android:name="android.permission.BIND_RESOLVER_RANKER_SERVICE"
3344        android:protectionLevel="signature" />
3345
3346    <!-- Must be required by a {@link
3347         android.service.notification.ConditionProviderService},
3348         to ensure that only the system can bind to it.
3349         <p>Protection level: signature
3350         -->
3351    <permission android:name="android.permission.BIND_CONDITION_PROVIDER_SERVICE"
3352        android:protectionLevel="signature" />
3353
3354    <!-- Must be required by an {@link android.service.dreams.DreamService},
3355         to ensure that only the system can bind to it.
3356         <p>Protection level: signature
3357    -->
3358    <permission android:name="android.permission.BIND_DREAM_SERVICE"
3359        android:protectionLevel="signature" />
3360
3361    <!-- Must be required by an {@link android.app.usage.CacheQuotaService} to ensure that only the
3362         system can bind to it.
3363         @hide This is not a third-party API (intended for OEMs and system apps).
3364    -->
3365    <permission android:name="android.permission.BIND_CACHE_QUOTA_SERVICE"
3366                android:protectionLevel="signature" />
3367
3368    <!-- @SystemApi Allows an application to call into a carrier setup flow. It is up to the
3369         carrier setup application to enforce that this permission is required
3370         @hide This is not a third-party API (intended for OEMs and system apps). -->
3371    <permission android:name="android.permission.INVOKE_CARRIER_SETUP"
3372        android:protectionLevel="signature|privileged" />
3373
3374    <!-- @SystemApi Allows an application to listen for network condition observations.
3375         @hide This is not a third-party API (intended for system apps). -->
3376    <permission android:name="android.permission.ACCESS_NETWORK_CONDITIONS"
3377        android:protectionLevel="signature|privileged" />
3378
3379    <!-- @SystemApi Allows an application to provision and access DRM certificates
3380         @hide This is not a third-party API (intended for system apps). -->
3381    <permission android:name="android.permission.ACCESS_DRM_CERTIFICATES"
3382        android:protectionLevel="signature|privileged" />
3383
3384    <!-- Api Allows an application to manage media projection sessions.
3385         @hide This is not a third-party API (intended for system apps). -->
3386    <permission android:name="android.permission.MANAGE_MEDIA_PROJECTION"
3387        android:protectionLevel="signature" />
3388
3389    <!-- @SystemApi Allows an application to read install sessions
3390         @hide This is not a third-party API (intended for system apps). -->
3391    <permission android:name="android.permission.READ_INSTALL_SESSIONS"
3392        android:label="@string/permlab_readInstallSessions"
3393        android:description="@string/permdesc_readInstallSessions"
3394        android:protectionLevel="normal"/>
3395
3396    <!-- @SystemApi Allows an application to remove DRM certificates
3397         @hide This is not a third-party API (intended for system apps). -->
3398    <permission android:name="android.permission.REMOVE_DRM_CERTIFICATES"
3399        android:protectionLevel="signature|privileged" />
3400
3401    <!-- @deprecated Use {@link android.Manifest.permission#BIND_CARRIER_SERVICES} instead -->
3402    <permission android:name="android.permission.BIND_CARRIER_MESSAGING_SERVICE"
3403        android:protectionLevel="signature|privileged" />
3404
3405    <!-- Allows an application to interact with the currently active
3406         {@link android.service.voice.VoiceInteractionService}.
3407         @hide -->
3408    <permission android:name="android.permission.ACCESS_VOICE_INTERACTION_SERVICE"
3409        android:protectionLevel="signature" />
3410
3411    <!-- The system process that is allowed to bind to services in carrier apps will
3412         have this permission. Carrier apps should use this permission to protect
3413         their services that only the system is allowed to bind to.
3414         <p>Protection level: signature|privileged
3415    -->
3416    <permission android:name="android.permission.BIND_CARRIER_SERVICES"
3417        android:label="@string/permlab_bindCarrierServices"
3418        android:description="@string/permdesc_bindCarrierServices"
3419        android:protectionLevel="signature|privileged" />
3420
3421    <!-- Allows an application to query whether DO_NOT_ASK_CREDENTIALS_ON_BOOT
3422         flag is set.
3423         @hide -->
3424    <permission android:name="android.permission.QUERY_DO_NOT_ASK_CREDENTIALS_ON_BOOT"
3425                android:protectionLevel="signature" />
3426
3427    <!-- @SystemApi Allows applications to kill UIDs.
3428        <p>Not for use by third-party applications.
3429         @hide -->
3430    <permission android:name="android.permission.KILL_UID"
3431                android:protectionLevel="signature|installer" />
3432
3433    <!-- @SystemApi Allows applications to read the local WiFi and Bluetooth MAC address.
3434        @hide -->
3435    <permission android:name="android.permission.LOCAL_MAC_ADDRESS"
3436                android:protectionLevel="signature|privileged" />
3437
3438    <!-- @SystemApi Allows access to MAC addresses of WiFi and Bluetooth peer devices.
3439        @hide -->
3440    <permission android:name="android.permission.PEERS_MAC_ADDRESS"
3441                android:protectionLevel="signature|setup" />
3442
3443    <!-- Allows the Nfc stack to dispatch Nfc messages to applications. Applications
3444        can use this permission to ensure incoming Nfc messages are from the Nfc stack
3445        and not simulated by another application.
3446        @hide -->
3447    <permission android:name="android.permission.DISPATCH_NFC_MESSAGE"
3448                android:protectionLevel="signature|privileged" />
3449
3450    <!-- @SystemApi Allows changing day / night mode when system is configured with
3451         config_lockDayNightMode set to true. If requesting app does not have permission,
3452         it will be ignored.
3453        @hide -->
3454    <permission android:name="android.permission.MODIFY_DAY_NIGHT_MODE"
3455                android:protectionLevel="signature|privileged" />
3456
3457    <!-- The system process is explicitly the only one allowed to launch the
3458         confirmation UI for full backup/restore -->
3459    <uses-permission android:name="android.permission.CONFIRM_FULL_BACKUP"/>
3460
3461    <!-- Allows the holder to access and manage instant applications on the device.
3462    @hide -->
3463    <permission android:name="android.permission.ACCESS_INSTANT_APPS"
3464            android:protectionLevel="signature|installer|verifier" />
3465
3466    <!-- Allows the holder to view the instant applications on the device.
3467    @hide -->
3468    <permission android:name="android.permission.VIEW_INSTANT_APPS"
3469            android:protectionLevel="signature|preinstalled" />
3470
3471    <!-- Allows receiving the usage of media resource e.g. video/audio codec and
3472         graphic memory.
3473         @hide -->
3474    <permission android:name="android.permission.RECEIVE_MEDIA_RESOURCE_USAGE"
3475                android:protectionLevel="signature|privileged" />
3476
3477    <!-- Must be required by system/priv apps when accessing the sound trigger
3478         APIs given by {@link SoundTriggerManager}.
3479         @hide <p>Not for use by third-party applications.</p> -->
3480    <permission android:name="android.permission.MANAGE_SOUND_TRIGGER"
3481        android:protectionLevel="signature|privileged" />
3482
3483    <!-- @SystemApi Allows trusted applications to dispatch managed provisioning message to Managed
3484         Provisioning app. If requesting app does not have permission, it will be ignored.
3485         @hide -->
3486    <permission android:name="android.permission.DISPATCH_PROVISIONING_MESSAGE"
3487                android:protectionLevel="signature|privileged" />
3488
3489    <!-- Allows the holder to read blocked numbers. See
3490         {@link android.provider.BlockedNumberContract}.
3491         @hide -->
3492    <permission android:name="android.permission.READ_BLOCKED_NUMBERS"
3493                android:protectionLevel="signature" />
3494
3495    <!-- Allows the holder to write blocked numbers. See
3496         {@link android.provider.BlockedNumberContract}.
3497         @hide -->
3498    <permission android:name="android.permission.WRITE_BLOCKED_NUMBERS"
3499                android:protectionLevel="signature" />
3500
3501    <!-- Must be required by an {@link android.service.vr.VrListenerService}, to ensure that only
3502         the system can bind to it.
3503         <p>Protection level: signature -->
3504    <permission android:name="android.permission.BIND_VR_LISTENER_SERVICE"
3505        android:protectionLevel="signature" />
3506
3507    <!-- Must be required by system apps when accessing restricted VR APIs.
3508         @hide
3509         @SystemApi
3510         <p>Protection level: signature -->
3511    <permission android:name="android.permission.RESTRICTED_VR_ACCESS"
3512        android:protectionLevel="signature|preinstalled" />
3513
3514    <!-- Required to make calls to {@link android.service.vr.IVrManager}.
3515         @hide -->
3516    <permission android:name="android.permission.ACCESS_VR_MANAGER"
3517            android:protectionLevel="signature" />
3518
3519    <!-- Required to access VR-Mode state and state change events via {android.app.VrStateCallback}
3520         @hide -->
3521    <permission android:name="android.permission.ACCESS_VR_STATE"
3522        android:protectionLevel="signature|preinstalled" />
3523
3524    <!-- Allows an application to whitelist tasks during lock task mode
3525         @hide <p>Not for use by third-party applications.</p> -->
3526    <permission android:name="android.permission.UPDATE_LOCK_TASK_PACKAGES"
3527        android:protectionLevel="signature|setup" />
3528
3529    <!-- @SystemApi Allows an application to replace the app name displayed alongside notifications
3530         in the N-release and later.
3531         @hide  <p>Not for use by third-party applications.</p> -->
3532    <permission android:name="android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME"
3533                android:protectionLevel="signature|privileged" />
3534
3535    <!-- @SystemApi Allows an application to show notifications before the device is provisioned.
3536         @hide  <p>Not for use by third-party applications.</p> -->
3537    <permission android:name="android.permission.NOTIFICATION_DURING_SETUP"
3538                android:protectionLevel="signature|privileged" />
3539
3540    <!-- @SystemApi Allows an application to manage auto-fill sessions.
3541         @hide  <p>Not for use by third-party applications.</p> -->
3542    <permission android:name="android.permission.MANAGE_AUTO_FILL"
3543        android:protectionLevel="signature" />
3544
3545    <!-- Allows an app to set the theme overlay in /vendor/overlay
3546         being used.
3547         @hide  <p>Not for use by third-party applications.</p> -->
3548    <permission android:name="android.permission.MODIFY_THEME_OVERLAY"
3549                android:protectionLevel="signature" />
3550
3551    <!-- Allows an instant app to create foreground services. -->
3552    <permission android:name="android.permission.INSTANT_APP_FOREGROUND_SERVICE"
3553        android:protectionLevel="signature|development|instant|appop" />
3554
3555    <application android:process="system"
3556                 android:persistent="true"
3557                 android:hasCode="false"
3558                 android:label="@string/android_system_label"
3559                 android:allowClearUserData="false"
3560                 android:backupAgent="com.android.server.backup.SystemBackupAgent"
3561                 android:killAfterRestore="false"
3562                 android:icon="@drawable/ic_launcher_android"
3563                 android:supportsRtl="true"
3564                 android:theme="@style/Theme.DeviceDefault.Light.DarkActionBar"
3565                 android:defaultToDeviceProtectedStorage="true"
3566                 android:directBootAware="true">
3567        <activity android:name="com.android.internal.app.ChooserActivity"
3568                android:theme="@style/Theme.DeviceDefault.Resolver"
3569                android:finishOnCloseSystemDialogs="true"
3570                android:excludeFromRecents="true"
3571                android:documentLaunchMode="never"
3572                android:relinquishTaskIdentity="true"
3573                android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
3574                android:process=":ui"
3575                android:visibleToInstantApps="true">
3576            <intent-filter>
3577                <action android:name="android.intent.action.CHOOSER" />
3578                <category android:name="android.intent.category.DEFAULT" />
3579                <category android:name="android.intent.category.VOICE" />
3580            </intent-filter>
3581        </activity>
3582        <activity android:name="com.android.internal.app.AccessibilityButtonChooserActivity"
3583                  android:exported="false"
3584                  android:theme="@style/Theme.DeviceDefault.Resolver"
3585                  android:finishOnCloseSystemDialogs="true"
3586                  android:excludeFromRecents="true"
3587                  android:documentLaunchMode="never"
3588                  android:relinquishTaskIdentity="true"
3589                  android:configChanges="screenSize|smallestScreenSize|screenLayout|orientation|keyboard|keyboardHidden"
3590                  android:process=":ui"
3591                  android:visibleToInstantApps="true">
3592            <intent-filter>
3593                <action android:name="com.android.internal.intent.action.CHOOSE_ACCESSIBILITY_BUTTON" />
3594                <category android:name="android.intent.category.DEFAULT" />
3595            </intent-filter>
3596        </activity>
3597        <activity android:name="com.android.internal.app.IntentForwarderActivity"
3598                android:finishOnCloseSystemDialogs="true"
3599                android:theme="@style/Theme.NoDisplay"
3600                android:excludeFromRecents="true"
3601                android:label="@string/user_owner_label"
3602                android:exported="true"
3603                >
3604        </activity>
3605        <activity-alias android:name="com.android.internal.app.ForwardIntentToParent"
3606                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
3607                android:exported="true"
3608                android:label="@string/user_owner_label">
3609        </activity-alias>
3610        <activity-alias android:name="com.android.internal.app.ForwardIntentToManagedProfile"
3611                android:targetActivity="com.android.internal.app.IntentForwarderActivity"
3612                android:icon="@drawable/ic_corp_icon"
3613                android:exported="true"
3614                android:label="@string/managed_profile_label">
3615        </activity-alias>
3616        <activity android:name="com.android.internal.app.HeavyWeightSwitcherActivity"
3617                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3618                android:label="@string/heavy_weight_switcher_title"
3619                android:finishOnCloseSystemDialogs="true"
3620                android:excludeFromRecents="true"
3621                android:process=":ui">
3622        </activity>
3623        <activity android:name="com.android.internal.app.PlatLogoActivity"
3624                android:theme="@style/Theme.Wallpaper.NoTitleBar.Fullscreen"
3625                android:configChanges="orientation|keyboardHidden"
3626                android:process=":ui">
3627        </activity>
3628        <activity android:name="com.android.internal.app.DisableCarModeActivity"
3629                android:theme="@style/Theme.NoDisplay"
3630                android:excludeFromRecents="true"
3631                android:process=":ui">
3632        </activity>
3633        <activity android:name="com.android.internal.app.DumpHeapActivity"
3634                android:theme="@style/Theme.Translucent.NoTitleBar"
3635                android:label="@string/dump_heap_title"
3636                android:finishOnCloseSystemDialogs="true"
3637                android:noHistory="true"
3638                android:excludeFromRecents="true"
3639                android:process=":ui">
3640        </activity>
3641        <provider android:name="com.android.server.am.DumpHeapProvider"
3642                android:authorities="com.android.server.heapdump"
3643                android:grantUriPermissions="true"
3644                android:multiprocess="false"
3645                android:singleUser="true" />
3646
3647        <activity android:name="android.accounts.ChooseAccountActivity"
3648                android:excludeFromRecents="true"
3649                android:exported="true"
3650                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3651                android:label="@string/choose_account_label"
3652                android:process=":ui"
3653                android:visibleToInstantApps="true">
3654        </activity>
3655
3656        <activity android:name="android.accounts.ChooseTypeAndAccountActivity"
3657                android:excludeFromRecents="true"
3658                android:exported="true"
3659                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3660                android:label="@string/choose_account_label"
3661                android:process=":ui"
3662                android:visibleToInstantApps="true">
3663        </activity>
3664
3665        <activity android:name="android.accounts.ChooseAccountTypeActivity"
3666                android:excludeFromRecents="true"
3667                android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3668                android:label="@string/choose_account_label"
3669                android:process=":ui"
3670                android:visibleToInstantApps="true">
3671        </activity>
3672
3673        <activity android:name="android.accounts.CantAddAccountActivity"
3674                android:excludeFromRecents="true"
3675                android:exported="true"
3676                android:theme="@style/Theme.DeviceDefault.Light.Dialog.NoActionBar"
3677                android:process=":ui">
3678        </activity>
3679
3680        <activity android:name="android.accounts.GrantCredentialsPermissionActivity"
3681                android:excludeFromRecents="true"
3682                android:exported="true"
3683                android:theme="@style/Theme.DeviceDefault.Light.DialogWhenLarge"
3684                android:process=":ui"
3685                android:visibleToInstantApps="true">
3686        </activity>
3687
3688        <activity android:name="android.content.SyncActivityTooManyDeletes"
3689               android:theme="@style/Theme.DeviceDefault.Light.Dialog"
3690               android:label="@string/sync_too_many_deletes"
3691               android:process=":ui">
3692        </activity>
3693
3694        <activity android:name="com.android.internal.app.ShutdownActivity"
3695            android:permission="android.permission.SHUTDOWN"
3696            android:theme="@style/Theme.NoDisplay"
3697            android:excludeFromRecents="true">
3698            <intent-filter>
3699                <action android:name="com.android.internal.intent.action.REQUEST_SHUTDOWN" />
3700                <category android:name="android.intent.category.DEFAULT" />
3701            </intent-filter>
3702            <intent-filter>
3703                <action android:name="android.intent.action.REBOOT" />
3704                <category android:name="android.intent.category.DEFAULT" />
3705            </intent-filter>
3706        </activity>
3707
3708        <activity android:name="com.android.internal.app.NetInitiatedActivity"
3709                android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
3710                android:excludeFromRecents="true"
3711                android:process=":ui">
3712        </activity>
3713
3714        <activity android:name="com.android.internal.app.SystemUserHomeActivity"
3715                  android:enabled="false"
3716                  android:process=":ui"
3717                  android:systemUserOnly="true"
3718                  android:theme="@style/Theme.Translucent.NoTitleBar">
3719            <intent-filter android:priority="-100">
3720                <action android:name="android.intent.action.MAIN" />
3721                <category android:name="android.intent.category.HOME" />
3722            </intent-filter>
3723        </activity>
3724
3725        <!-- Activity to prompt user if it's ok to create a new user sandbox for a
3726             specified account. -->
3727        <activity android:name="com.android.internal.app.ConfirmUserCreationActivity"
3728                android:excludeFromRecents="true"
3729                android:process=":ui"
3730                android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert">
3731            <intent-filter android:priority="1000">
3732                <action android:name="android.os.action.CREATE_USER" />
3733                <category android:name="android.intent.category.DEFAULT" />
3734            </intent-filter>
3735        </activity>
3736
3737        <activity android:name="com.android.internal.app.UnlaunchableAppActivity"
3738                android:theme="@style/Theme.DeviceDefault.Light.Dialog.Alert"
3739                android:excludeFromRecents="true"
3740                android:process=":ui">
3741        </activity>
3742
3743        <activity android:name="com.android.settings.notification.NotificationAccessConfirmationActivity"
3744                  android:theme="@android:style/Theme.DeviceDefault.Light.Dialog.Alert"
3745                  android:excludeFromRecents="true">
3746        </activity>
3747
3748        <receiver android:name="com.android.server.BootReceiver"
3749                android:systemUserOnly="true">
3750            <intent-filter android:priority="1000">
3751                <action android:name="android.intent.action.BOOT_COMPLETED" />
3752            </intent-filter>
3753        </receiver>
3754
3755        <receiver android:name="com.android.server.updates.CertPinInstallReceiver"
3756                android:permission="android.permission.UPDATE_CONFIG">
3757            <intent-filter>
3758                <action android:name="android.intent.action.UPDATE_PINS" />
3759                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3760            </intent-filter>
3761        </receiver>
3762
3763        <receiver android:name="com.android.server.updates.IntentFirewallInstallReceiver"
3764                android:permission="android.permission.UPDATE_CONFIG">
3765            <intent-filter>
3766                <action android:name="android.intent.action.UPDATE_INTENT_FIREWALL" />
3767                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3768            </intent-filter>
3769        </receiver>
3770
3771        <receiver android:name="com.android.server.updates.SmsShortCodesInstallReceiver"
3772                android:permission="android.permission.UPDATE_CONFIG">
3773            <intent-filter>
3774                <action android:name="android.intent.action.UPDATE_SMS_SHORT_CODES" />
3775                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3776            </intent-filter>
3777        </receiver>
3778
3779        <receiver android:name="com.android.server.updates.ApnDbInstallReceiver"
3780                android:permission="android.permission.UPDATE_CONFIG">
3781            <intent-filter>
3782                <action android:name="com.android.internal.intent.action.UPDATE_APN_DB" />
3783                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3784            </intent-filter>
3785        </receiver>
3786
3787        <receiver android:name="com.android.server.updates.CarrierProvisioningUrlsInstallReceiver"
3788                android:permission="android.permission.UPDATE_CONFIG">
3789            <intent-filter>
3790                <action android:name="android.intent.action.UPDATE_CARRIER_PROVISIONING_URLS" />
3791                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3792            </intent-filter>
3793        </receiver>
3794
3795        <receiver android:name="com.android.server.updates.TzDataInstallReceiver"
3796                android:permission="android.permission.UPDATE_CONFIG">
3797            <intent-filter>
3798                <action android:name="android.intent.action.UPDATE_TZDATA" />
3799                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3800            </intent-filter>
3801        </receiver>
3802
3803        <receiver android:name="com.android.server.updates.CertificateTransparencyLogInstallReceiver"
3804                android:permission="android.permission.UPDATE_CONFIG">
3805            <intent-filter>
3806                <action android:name="android.intent.action.UPDATE_CT_LOGS" />
3807                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3808            </intent-filter>
3809        </receiver>
3810
3811        <receiver android:name="com.android.server.updates.LangIdInstallReceiver"
3812                android:permission="android.permission.UPDATE_CONFIG">
3813            <intent-filter>
3814                <action android:name="android.intent.action.UPDATE_LANG_ID" />
3815                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3816            </intent-filter>
3817        </receiver>
3818
3819        <receiver android:name="com.android.server.updates.SmartSelectionInstallReceiver"
3820                android:permission="android.permission.UPDATE_CONFIG">
3821            <intent-filter>
3822                <action android:name="android.intent.action.UPDATE_SMART_SELECTION" />
3823                <data android:scheme="content" android:host="*" android:mimeType="*/*" />
3824            </intent-filter>
3825        </receiver>
3826
3827        <receiver android:name="com.android.server.MasterClearReceiver"
3828            android:permission="android.permission.MASTER_CLEAR">
3829            <intent-filter
3830                    android:priority="100" >
3831                <!-- For Checkin, Settings, etc.: action=FACTORY_RESET -->
3832                <action android:name="android.intent.action.FACTORY_RESET" />
3833                <!-- As above until all the references to the deprecated MASTER_CLEAR get updated to
3834                     FACTORY_RESET. -->
3835                <action android:name="android.intent.action.MASTER_CLEAR" />
3836
3837                <!-- MCS always uses REMOTE_INTENT: category=MASTER_CLEAR -->
3838                <action android:name="com.google.android.c2dm.intent.RECEIVE" />
3839                <category android:name="android.intent.category.MASTER_CLEAR" />
3840            </intent-filter>
3841        </receiver>
3842
3843        <service android:name="android.hardware.location.GeofenceHardwareService"
3844            android:permission="android.permission.LOCATION_HARDWARE"
3845            android:exported="false" />
3846
3847        <service android:name="com.android.internal.backup.LocalTransportService"
3848                android:permission="android.permission.CONFIRM_FULL_BACKUP"
3849                android:exported="false">
3850            <intent-filter>
3851                <action android:name="android.backup.TRANSPORT_HOST" />
3852            </intent-filter>
3853        </service>
3854
3855        <service android:name="com.android.server.MountServiceIdler"
3856                 android:exported="true"
3857                 android:permission="android.permission.BIND_JOB_SERVICE" >
3858        </service>
3859
3860        <service android:name="com.android.server.backup.FullBackupJob"
3861                 android:exported="true"
3862                 android:permission="android.permission.BIND_JOB_SERVICE" >
3863        </service>
3864
3865        <service android:name="com.android.server.backup.KeyValueBackupJob"
3866                 android:permission="android.permission.BIND_JOB_SERVICE" >
3867        </service>
3868
3869        <service android:name="com.android.server.content.SyncJobService"
3870                 android:permission="android.permission.BIND_JOB_SERVICE" >
3871        </service>
3872
3873        <service android:name="com.android.server.pm.BackgroundDexOptService"
3874                 android:exported="true"
3875                 android:permission="android.permission.BIND_JOB_SERVICE">
3876        </service>
3877
3878        <service android:name="com.android.server.PruneInstantAppsJobService"
3879                 android:permission="android.permission.BIND_JOB_SERVICE" >
3880        </service>
3881
3882        <service android:name="com.android.server.storage.DiskStatsLoggingService"
3883                 android:permission="android.permission.BIND_JOB_SERVICE" >
3884        </service>
3885
3886        <service android:name="com.android.server.PreloadsFileCacheExpirationJobService"
3887                 android:permission="android.permission.BIND_JOB_SERVICE" >
3888        </service>
3889
3890        <service android:name="com.android.server.camera.CameraStatsJobService"
3891                 android:permission="android.permission.BIND_JOB_SERVICE" >
3892        </service>
3893
3894        <service android:name="com.android.server.timezone.TimeZoneUpdateIdler"
3895                 android:permission="android.permission.BIND_JOB_SERVICE" >
3896        </service>
3897    </application>
3898
3899</manifest>
3900